Computer security policy

Results: 3514



#Item
121Security / Prevention / Safety / Crime prevention / Criminal records / Computer security / Cryptography / FBI Criminal Justice Information Services Division / National Crime Information Center / Security awareness / Federal Bureau of Investigation / Information security

U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy

Add to Reading List

Source URL: kentuckystatepolice.org

Language: English - Date: 2016-06-22 13:33:27
122Internet privacy / Privacy / Computing / Data security / Computer security / Privacy policy / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P / Privacy concerns regarding Google

Privacy Policy The following text is a full statement of the privacy policy of Mergermarket Limited (we, us, our) with registered address at 10 Queen Street Place, London, EC4R 1BE. We respect your privacy rights. This p

Add to Reading List

Source URL: www.debtwire.com

Language: English - Date: 2015-07-31 11:28:40
123Computing / Information privacy / Computer security / Privacy / Computer law / Technology / Identity documents / Internet privacy / Privacy policy / Personally identifiable information / Payment Card Industry Data Security Standard / HTTP cookie

Privacy Policy We are committed to protecting your privacy. We will only use the information that we collect about you lawfully in accordance with the Data Protection Act. We collect information about you for 2 reasons:

Add to Reading List

Source URL: www.ssc.com.fj

Language: English - Date: 2014-06-25 16:33:21
124Internet privacy / Privacy / Computing / HTTP cookie / Personally identifiable information / Medical privacy / Computer security / Government

Microsoft Word - PRIVACY POLICY

Add to Reading List

Source URL: charleys.com

Language: English - Date: 2016-08-19 18:23:27
125Security / Prevention / Computer security / Computer network security / Cryptography / Crime prevention / National security / Password / Spyware / Password manager / Password policy

Read this folder – for our safety Safeguard valuable knowledge At University of Copenhagen we procure and convey knowledge. Electronically, in writing and orally. Quite simply, that is our main activity and value at C

Add to Reading List

Source URL: informationssikkerhed.ku.dk

Language: English - Date: 2011-10-17 17:46:46
126Internet privacy / Computing / Computer security / Microsoft / Computer access control / Hypertext Transfer Protocol / Privacy / Identity documents / HTTP cookie / Information privacy / Personally identifiable information / Single sign-on

  Castle Software, Inc. Data Privacy & Security Policy Castle Software, Inc. ("Castle") is committed to protecting the privacy of its users. Because  Castle gathers certain types of information abou

Add to Reading List

Source URL: www.castlelearning.com

Language: English - Date: 2015-09-17 09:11:17
127Computer security / Quality / Cryptography / Data security / Information security / National security / Management system

QUALITY AND INFORMATION SECURITY MANAGEMENT SYSTEM POLICY HGC’s Quality and Information Security Policy Statement: Operational standards of efficiency, effectiveness, quality and information security are observed in al

Add to Reading List

Source URL: www.hgc.gov.ph

Language: English - Date: 2016-04-15 11:52:38
128Crime prevention / National security / Cryptography / Information governance / Cybercrime / Computer security / Internet privacy / National Security Agency / Network security

Network Security Activities Under the University’s Electronic Communications Policy This guidance is intended to assist the Campuses and Laboratories in undertaking additional network security efforts. This guidance sp

Add to Reading List

Source URL: security.ucop.edu

Language: English - Date: 2016-02-01 23:11:50
129Computer security / Access control / Identity management / Perimeter security / Physical security / Information security

The University of Alabama Access to Building Information Policy Background On occasion, there are requests for access to, building plans, architectural drawings, blueprints, engineering plans, buildings specifications, s

Add to Reading List

Source URL: bis.ua.edu

Language: English - Date: 2013-10-02 12:17:18
130Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / Computer security / Internet

Internet Account – Administrator/Faculty/Staff

Add to Reading List

Source URL: www.hfcsd.org

Language: English - Date: 2009-09-03 14:04:23
UPDATE