Computer security policy

Results: 3514



#Item
161Scientific method / Computer network security / Computer security / Cryptography / Cyberwarfare / National security / Database / Data analysis / Data sharing

Youth Chances Additional File 4 Page 1 Youth Chances Data Sharing Policy Information for researchers interested in analysing Youth Chances data: How to access and use Youth Chances data

Add to Reading List

Source URL: www.youthchances.org

Language: English - Date: 2013-11-19 06:44:55
162Cloud infrastructure / Cloud computing / Cloud computing security / Computer security / Hypervisor / VM / Cloud computing issues / HP CloudSystem

hardware security module (HSM) geotag platform trust policy hardened virtual server image Trusted Platform BIOS

Add to Reading List

Source URL: cloudschool.com

Language: English - Date: 2016-06-06 17:05:59
163E-commerce / Data security / Privacy / National security / Identity documents / Privacy policy / Internet privacy / Personally identifiable information / Freedom of information laws by country / Medical privacy / Computer security / Online banking

Privacy Policy Axis Bank Limited (The Bank) recognizes the expectations of its customers with regard to privacy, confidentiality and security of their personal information that resides with the Bank. Keeping personal inf

Add to Reading List

Source URL: www.axisbank.com

Language: English - Date: 2016-03-03 00:15:04
164Web development / Hypertext Transfer Protocol / JavaScript / Ajax / Computer network security / Same-origin policy / Mashup / HTTP cookie / Cross-site scripting / XMLHttpRequest / Web 2.0 / Internet privacy

Protection and Communication Abstractions for Web Browsers in MashupOS Helen J. Wang Xiaofeng Fan

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
165Crime prevention / Cryptography / Information governance / National security / Cultural globalization / Internet / Content-control software / Computer security / World Wide Web / Educational technology / Draft:ICT Security Policy System: A Case Study / Acceptable use policy

INTER‐LAKES SCHOOL DISTRICT    TECHNOLOGY USAGE POLICY    The Inter‐Lakes School District (hereto referred as “District”) recognizes the value of computer and other electronic  resources 

Add to Reading List

Source URL: www.interlakes.org

Language: English - Date: 2016-05-31 20:05:19
166Webmail / Crime prevention / Cryptography / Information governance / National security / Internet privacy / Privacy / Email / Medical privacy / Outlook.com / Computer security / Privacy concerns with social networking services

Notice of Privacy Policy Effective October 25, 2010We are required by law to inform our clients of our policies regarding privacy of client information

Add to Reading List

Source URL: www.snideradvisors.com

Language: English - Date: 2015-10-12 12:00:35
167Computer access control / Identity management / Identity management systems / Metadata standards / XACML / SAML 2.0 / Security Assertion Markup Language / Medical record

Swiss Electronic Patient Dossier (EPD-CH) Policy Enforcement by Authorization Decision Request (ADR-CH) and Policy Management by

Add to Reading List

Source URL: www.ihe-suisse.ch

Language: English - Date: 2016-05-17 20:50:28
168Identity management / Password / Security / Social networking services / Computer access control / Twitter / Social media / Crypt / Challengeresponse authentication / Password policy / Password strength

Social Media as a Resource for Understanding Security Experiences: A Qualitative Analysis of #Password Tweets Paul Dunphy1 , Vasilis Vlachokyriakos1 , Anja Thieme1 , James Nicholson2 , John McCarthy3 , Patrick Olivier1 1

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-02-21 12:56:54
169Communications technology / Information and communications technology / Information technology / Hong Kong / Information and communication technologies for development / Draft:ICT Security Policy System: A Case Study

The Hong Kong Computer Society Sees Talent Development as Top Priority for 2014 Digital 21 Strategy Mr. Peter Yan, Hong Kong Computer Society Vice President (Policy and Communications) and Honorary Secretary For consulta

Add to Reading List

Source URL: www.digital21.gov.hk

Language: English - Date: 2014-01-20 06:40:25
170Cybercrime / National security / Cyberwarfare / Education policy / Science and technology / Science /  technology /  engineering /  and mathematics / Computer security

For Immediate Release Wednesday, April 9, 2014 U.S. News STEM Solutions National Leadership Conference to Host “Cyber Security is STEM” Lunch Panel DHS Cyber Security Education Chief and Cyber Security Leaders to Acc

Add to Reading List

Source URL: usnewsstemsolutions.com

Language: English - Date: 2014-04-16 17:41:32
UPDATE