19 results found (page 1 of 2)
https://www.academia.edu/161285835/Urban_experience_with_telecommunication_mobile_phones_l…

Lektionen in NetArt: Tipps Thomas Dreher Sammeltipps 1-3 (2007-2009) Die hier gesammelten Projekte schaffen Stadtereignisse oder Möglichkeiten zur Stadterfahrung mit den Medien Telefon, Computer, Internet (mit schnurlosen Zugängen), Mobilfunk und digitale Lokalisierung (GPS u.a.)…

https://www.federalregister.gov/documents/2020/05/01/2020-07419/21st-century-cures-act-int…

…Required by Law” 2. Health Care Providers, Health IT Developers, Exchanges, and Networks a. Health Care Providers b. Health IT Developers of Certified Health IT Limiting the Definition of Health IT Developer to Developers of Certified Health IT Applicability of Information Blocki…

https://www.federalregister.gov/documents/2018/11/23/2018-24170/medicare-program-revisions…

…EMENTARY INFORMATION: Table of Contents Addenda Available Only Through the Internet on the CMS Website CPT (Current Procedural Terminology) Copyright Notice I. Executive Summary A. Purpose 1. Summary of the Major Provisions 2. Summary of Costs and Benefits B. Determination of Pra…

https://www.academia.edu/26668161/Update_on_the_Rule_of_Law_for_Human_Rights_in_ASEAN_The_…

…ce of Mutual Legal Assistance Laws in Some States 38 c. Forming ASEAN Education Networks 38 d. Initiatives amongst ASEAN Judiciaries and Legislatures 38 2. On Legislative and Substantive Changes Speciically Promoting the Rule of Law in Pursuit of Integration 39 a. Lack of Informa…

https://www.federalregister.gov/documents/2022/11/23/2022-23918/medicare-program-hospital-…

…ION CONTACT: SUPPLEMENTARY INFORMATION: Addenda Available Only Through the Internet on the CMS Website Current Procedural Terminology (CPT) Copyright Notice Table of Contents I. Summary and Background A. Executive Summary of This Document 1. Purpose 2. Summary of the Major Provis…

https://www.federalregister.gov/documents/2025/01/06/2024-30983/hipaa-security-rule-to-str…

…to Regulated Entities Deploying Multi-Factor Authentication f. Costs Related to Network Segmentation g. Cost Related to Disabling Ports and Removing Extraneous Software h. Costs Related to Regulated Entities Conducting Penetration Testing i. Costs Arising From Reporting Contingen…