Computer security policy

Results: 3514



#Item
131Internet privacy / Identity documents / Privacy / Identity management / Personally identifiable information / Medical privacy / HTTP cookie / Password / Computer security / P3P / Privacy concerns with social networking services

PRIVACY POLICY Your privacy, and the privacy of all our visitors, is important to HySpeed Computing. We’ve therefore developed a Privacy Policy that describes how we collect, use, disclose, transfer, and store your inf

Add to Reading List

Source URL: hyspeedcomputing.com

Language: English - Date: 2013-09-26 09:37:27
132Locksmithing / Physical security / Access control / Computer security / Doors / Key / Lock / Rekeying / Authorization / Key management / Electronic key management

UC Davis Policy and Procedure Manual Chapter 360, Physical Facilities Section 50, Key/Access Card Control Date: , reissuedSupersedes: Responsible Department: Facilities Operations and Management

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2016-06-07 17:39:07
133Computer access control / Password / Security / Login / Identity management / Password strength / Password policy

Infiniti Tech Info Retailer User Guide Version 4.0 Date Copyright© 2014 by Nissan Motor, Ltd.

Add to Reading List

Source URL: www.infiniti-techinfo.com

Language: English - Date: 2014-09-23 13:58:25
134Library science / Public library / Open access / Internet / Library / Computer security / Sumter County Library /  FL

INTERNET & COMPUTER USE POLICY LOCKPORT PUBLIC LIBRARY The mission of the Lockport Public Library is to be the life-long learning center of its community. In support of this mission, the Lockport Public Library offers co

Add to Reading List

Source URL: www.lockportlibrary.org

Language: English - Date: 2011-08-25 11:12:37
135Cryptography / Computer access control / Security / Password / Biometrics / Speaker recognition / Computer security / Authentication / Challengeresponse authentication / Key / Password policy / Password manager

HCI and Security Systems Andrew Patrick National Research Council of Canada 1200 Montreal Rd. Ottawa, ON K1A 0R6

Add to Reading List

Source URL: www.andrewpatrick.ca

Language: English - Date: 2002-09-20 12:11:46
136Public-key cryptography / Key management / Public key infrastructure / Transport Layer Security / Computer access control / Smart card / Public key certificate / Certificate authority / Security token / Authentication / Certificate policy / X.509

eID Management The right choice for E-Private Banking Liechtensteinische Landesbank AG E-banking is an important service

Add to Reading List

Source URL: www.aeteurope.com

Language: English - Date: 2016-03-09 10:47:39
137Crime prevention / Cryptography / Information governance / National security / California State University / Information security / Humboldt State University / California State Polytechnic University /  Pomona / Vulnerability / Computer security / California State Student Association / Charles B. Reed

| Responsible Use Policy Effective Date: | Revised Date: POLICY OBJECTIVE The CSU Information Security policy provides defines user, including faculty, staff, students, third parties, and CS

Add to Reading List

Source URL: security.sdsu.edu

Language: English - Date: 2015-09-16 14:23:03
138Cryptography / Security / Crime prevention / Information governance / National security / Password / Challengeresponse authentication / Information security / Computer security / Password policy / Password strength

Human Factors Considerations for User Identification on Air Traffic Control Systems Kenneth Allendoerfer Shantanu Pai

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2005-06-21 09:58:19
139Cryptography / Crime prevention / Information governance / National security / Data management / Information security / Data steward / Database / Computer security

ENTERPRISE IT STANDARDS AND PROCEDURES DATA STEWARDSHIP STANDARDS Policy: Enterprise Data Stewardship Policy

Add to Reading List

Source URL: www.montana.edu

Language: English - Date: 2016-01-19 13:45:51
140Cybercrime / Cyberwarfare / Cyberinfrastructure / E-Science / Horizon / European Union Agency for Network and Information Security / Net neutrality / Computer security

ACM - Europe Public Policy Committee (EUACM) October newsletter LAW AND POLICY Cybersecurity

Add to Reading List

Source URL: europe.acm.org

Language: English - Date: 2015-12-14 16:16:59
UPDATE