Computer security policy

Results: 3514



#Item
151Information technology management / Crime prevention / Cryptography / Information governance / National security / Acceptable use policy / SharePoint / Computer security

IT ACCEPTABLE USE POLICY PURPOSE The purpose of the Acceptable Use Policy for Brock University’s Information Technology (IT) systems is to protect the University, our students and employees from potential harm resultin

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:53
152Cyberwarfare / Cybercrime / National security / Computer security / Internet security / National Cyber Security Centre / Cyber hygiene / International Multilateral Partnership Against Cyber Threats / National Cyber Security Policy

National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport

Add to Reading List

Source URL: www.thehaguesecuritydelta.com

Language: English - Date: 2016-04-06 11:34:24
153Crime prevention / National security / Cryptography / Information governance / Data management / Information security / Computer security / Privacy / Data custodian / Data steward / Data sharing / Data Protection Act

UC Davis Policy and Procedure Manual Chapter 320, Records and Archives Section 40, Data Administration Policy Date: Supersedes: Responsible Department: Informational and Educational Technology

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2016-05-17 15:36:00
154Crime prevention / National security / Cryptography / Information governance / Security / Privacy policy / Information security / Freedom of information laws by country / Computer security / Privacy / Internet privacy

NovemberSecurity Practices & Procedures for Managing Sensitive Personal Data & Information BNP Paribas Asset Management India Private Limited

Add to Reading List

Source URL: www.bnpparibasmf.in

Language: English - Date: 2015-04-05 05:10:20
155Crime prevention / Cryptography / Information governance / National security / Computer security / California State University / Information security / Vulnerability / System administrator / Humboldt State University / ISO/IEC 27001:2005 / California State Student Association

CSU Responsible Use Policy - FINAL

Add to Reading List

Source URL: its.sjsu.edu

Language: English - Date: 2015-12-07 11:34:10
156Locksmithing / Perimeter security / Physical security / Access control / National security / Key management / Key / Security alarm / Lock / Authorization / Computer security / Electronic key management

Office of the President University Policy SUBJECT: Building Access Control

Add to Reading List

Source URL: www.fau.edu

Language: English - Date: 2015-11-16 11:13:19
157Waste / Industrial ecology / Data security / Electronic waste / Computer recycling / Recycling / Extended producer responsibility / Municipal solid waste / Solving the E-waste Problem / Bioleaching / Chemical waste / Global waste trade

United Nations University Press is the publishing arm of the United ­Nations University. UNU Press publishes scholarly and policy-oriented books and periodicals on the issues facing the United Nations and its peoples an

Add to Reading List

Source URL: www.step-initiative.org

Language: English - Date: 2015-02-02 05:44:20
158Identity management / Cryptography / Password / Security / Password policy / Password fatigue

Password Management Strategies for Online Accounts Shirley Gaw Edward W. Felten Department of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2006-05-26 19:02:51
159Computer security / Vulnerability / Information security / Application security / Threat model / Software development / Software / Threat / Draft:ICT Security Policy System: A Case Study / Mobile security

ISSA ISSA Journal | November 2009 The Global Voice of Information Security

Add to Reading List

Source URL: www.denimgroup.com

Language: English - Date: 2014-01-13 18:22:32
160Energy economics / Home automation / Building automation / Environmental technology / Lighting / Efficient energy use / Lighting control system / Computer network / Energy policy / Computer security / Energy industry / Internet of things

Background Discussion for July 6 IEA Workshop on Digital Networks — www.iea.org/Textbase/events Buildings as Networks: Danger, Opportunity, and Guiding Principles for Energy Efficiency Alan Meier and Bruce Nordman1, L

Add to Reading List

Source URL: nordman.lbl.gov

Language: English - Date: 2007-11-15 16:35:32
UPDATE