- Yao Chang (Emperor Wucheng)
- Empress She (but might be Consort Sun)
- Empress Zhang (created 402)
- Empress Qi (created 412)
- Yao Hong (姚泓), the Crown Prince (created 402), later emperor
- Yao Yi (姚懿), the Duke of Taiyuan (created 402)
- Yao Bi (姚弼), the Duke of Guangping (created 402, forced to commit suicide 416)
- Yao Huang (姚洸), the Duke of Chenliu (created 402)
- Yao Xuan (姚宣), Duke (created 402)
- Yao Chen (姚諶), Duke (created 402)
- Yao Yin (姚愔), the Duke of Nanyang (created 402, executed by Yao Hong 416)
- Yao Pu (姚璞), the Duke of Pingyuan (created 402, executed by Liu Yu 417)
- Yao Zhi (姚質), Duke (created 402)
- Yao Kui (姚逵), Duke (created 402)
- Yao Yu (姚裕), Duke (created 402)
- Yao Guoer (姚國兒), Duke (created 402)
- Yao Geng'er (姚耕兒)
- Yao Huangmei (姚黃眉), Duke of Longxi of Northern Wei
- Princess Xiping, concubine of Emperor Mingyuan of Northern Wei
Read more about this topic: Yao Xing
Other articles related to "personal information, personal, information":
... The Personal Information Protection and Electronic Documents Act ("PIPEDA") governs the topic of data privacy, and how private-sector companies can collect, use and disclose personal ... laws were strong enough to protect the personal information of citizens of other nationalities ... provisions of the Canadian Standards Association's Model Code for the Protection of Personal Information, developed in 1995 ...
... Threats to health care information can be categorized under three headings Human threats, such as employees or hackers Natural and environmental threats, such as earthquakes, hurricanes and fires ... Therefore, one will find health information systems professionals having these particular threats in mind when discussing ways to protect the health information of patients ... protect the processing and free movement of personal data, including for purposes of health care ...
... the mark is doing business, in order to extract personal information which can then be used, for example, to steal money ... exactly like email from that business, and will ask the mark to "verify" some personal information at the website, to which a link is provided, in ... The site contains a form asking for personal information such as credit card numbers, which the mark feels compelled to give or lose all access to the service ...
... Anonymity De-identification Personal identifier Personal identity Pseudonymity Bundesdatenschutzgesetz ...
... was hacked into by criminals who stole the personal information of more than 35 million users ... The information for almost all of the Cyworld/Nate members was compromised ... Because Cyworld/Nate requires its members to submit personal information for membership, the 2011 Nate Data Leakage was quite detrimental as the hackers had ...
Famous quotes containing the word personal:
“It is very certain that each man carries in his eye the exact indication of his rank in the immense scale of men, and we are always learning to read it. A complete man should need no auxiliaries to his personal presence.”
—Ralph Waldo Emerson (18031882)