Computer security policy

Results: 3514



#Item
241Security / Prevention / United States government secrecy / Data security / National security / Computer security / Committee on National Security Systems / Information security / Classified information / National Industrial Security Program / Classified information in the United States

Committee on National Security Systems CNSS Policy No. 18 JuneNational Policy

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2014-05-06 15:09:48
242Privacy / Data security / Computing / Computer security / Data protection / Wirecard / Bundesdatenschutzgesetz / Internet privacy / Information privacy / Personally identifiable information / HTTP cookie

Privacy Policy Wirecard AG and its subsidiaries (Wirecard Group) offer their customers products and services relating to electronic payment transactions. The objective is to allow companies and consumers worldwide to pro

Add to Reading List

Source URL: www.wirecardbank.com

Language: English - Date: 2015-10-06 05:39:59
243Health / Prevention / Security / Food and Drug Administration / Cyberwarfare / Medical technology / Medical device / Medical equipment / Pharmaceuticals policy / Risk management / Computer security / Control system security

Content of Premarket Submissions for Management of Cybersecurity in Medical Devices Guidance for Industry and Food and Drug Administration Staff Document Issued on: October 2, 2014

Add to Reading List

Source URL: www.fda.gov

Language: English
244Computer security / Identity management / Access control / Internet privacy / Privacy / Security / Authorization / Privilege / Acceptable use policy / Privacy concerns with social networking services

Foothill-De Anza Community College District Board of Trustees Board Policy Manual Computer and Network Use: Rights and Responsibilities

Add to Reading List

Source URL: ets.fhda.edu

Language: English - Date: 2015-03-12 18:57:54
245Computer security / Data security / National security / Crime prevention / Cryptography / Privacy policy / Information security / Smart meter / Internet privacy / Privacy / Medical privacy / Information privacy

Department of Energy Voluntary Code of Conduct Integrity / Security Workgroup I. Areas of Consensus

Add to Reading List

Source URL: www.smartgrid.gov

Language: English - Date: 2015-02-12 06:56:55
246Corporate governance / National Association of Corporate Directors / Internet privacy / Privacy / HTTP cookie / Medical privacy / Politics / Computing / Computer security

NACD’s SIMPLY SMARTER SYSTEM – PRIVACY POLICY This Privacy Policy covers the privacy practices that NACD employs when providing support, subscriptions, or software as a service (the "Services") to NACD clients throug

Add to Reading List

Source URL: mysimplysmarter.com

Language: English - Date: 2015-06-26 14:32:16
247

Intuitive security policy configuration in mobile devices using context profiling Aditi Gupta∗ , Markus Miettinen† , N. Asokan‡ and Marcin Nagy‡ ∗ Department of Computer Science Purdue University, United States

Add to Reading List

Source URL: asokan.org

Language: English - Date: 2012-11-26 07:39:34
    248

    Int. J. Information and Computer Security, Vol. 5, No. 4, 2013 Extensible policy framework for heterogeneous network environments Lawrence Teo UNC Charlotte,

    Add to Reading List

    Source URL: sefcom.asu.edu

    Language: English - Date: 2015-06-15 12:50:50
      249Prevention / Security / Safety / Taxation in the United States / National security / Crime prevention / Cryptography / Social Security number / Computer security / Social Security / Medical privacy / Background check

      City of Marshall Policy and Procedure Regarding Use and Disclosure of Social Security Numbers 1. Purpose.

      Add to Reading List

      Source URL: www.cityofmarshall.com

      Language: English - Date: 2010-05-07 18:41:31
      250Computing / Computer security / Hypertext Transfer Protocol / Computer network security / Business / Ajax / JavaScript / Hacking / XMLHttpRequest / HTTP cookie / IBM / Same-origin policy

      IBM Research, Tokyo Research Laboratory Security Model for the Client-Side Web Application Environments May 24, 2007

      Add to Reading List

      Source URL: w2spconf.com

      Language: English - Date: 2012-02-07 16:10:03
      UPDATE