Computer security policy

Results: 3514



#Item
271National security / Boulder /  Colorado / Public safety / Internet privacy / Computer security / Security policy / Prevention / Password strength / Password policy / Security / Password / Crime prevention

CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE:

Add to Reading List

Source URL: www-static.bouldercolorado.gov

Language: English - Date: 2013-07-19 17:58:29
272Process management / Value / Value chain / Computer security / Management / Marketing / Business / Security

Chain-computerisation for interorganisational publicPRIVATE policy implementation A new approach to developing non-intrusive information infrastructures that improve publicPRIVATE policy implementation

Add to Reading List

Source URL: keteninformatisering.nl

Language: English - Date: 2007-01-14 13:54:56
273Security / Law / Computer law / Data Protection Act / Privacy / Information security / Information privacy / Personally identifiable information / Data protection (privacy) laws in Russia / Data privacy / Privacy law / Ethics

Data Protection Policy 1.0 Policy 1.1

Add to Reading List

Source URL: www.wlv.ac.uk

Language: English - Date: 2015-06-18 05:34:30
274Crime prevention / Data security / Information security / National security / Due diligence / Public safety / Law / Security / Computer security

(Provisional Translation) Main Points of the Inspection Policy and Inspection Program for FY2015(1) Basic Direction Role of inspections Ensure investor confidence in the markets by ensuring the integrity of capita

Add to Reading List

Source URL: www.fsa.go.jp

Language: English - Date: 2015-05-22 03:01:21
275Crime prevention / Computer network security / Security guard / Surveillance / Academi / Attack / Information security / Private security industry in South Africa / Security / Public safety / Computer security

Microsoft Word - PSC Policy SPM.doc

Add to Reading List

Source URL: psm.du.edu

Language: English - Date: 2012-12-18 17:52:46
276Cryptography / Password policy / Password fatigue / Password / Security / Computer security

How to Create an I Have A Plan Iowa® Professional Center Account 1. Go to http://procenter.ihaveaplaniowa.gov. 2. Select Create a Professional Center Account. 3. Choose your role and select the Go button.

Add to Reading List

Source URL: www.iowacollegeaid.gov

Language: English - Date: 2014-08-11 11:38:55
277Data security / Crime prevention / National security / Public safety / Computing / Information security / Cloud computing / Security controls / Privacy / Security / Computer security / Computer network security

Microsoft Word - Information System Product Review Policy

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2015-01-29 14:32:03
278Computer network security / Information security / Security controls / Vulnerability / Threat / Authentication / Attack / Access control / Authorization / Security / Computer security / Cyberwarfare

National Risk Management Policy and Framework for National Security Systems

Add to Reading List

Source URL: www.ncsc.gov

Language: English - Date: 2012-05-15 07:38:22
279Digital media / Internet privacy / Internet / Computer network / Privacy / Network security / Electronic Communications Privacy Act / Password / Criticism of Facebook / Ethics / Technology / Computer law

TECHNOLOGY RESPONSIBLE USE Policy Code:

Add to Reading List

Source URL: www.whiteville.k12.nc.us

Language: English - Date: 2015-02-11 08:31:18
280Small form-factor pluggable transceiver / Universal Serial Bus / FIPS 140 / Fortinet / Personal computer hardware / OSI protocols / Security token / ProCurve Products / HP Networking Products / Ethernet / Computer hardware / Computing

FIPSSecurity Policy FortiGate-1500D and 3700D FortiGate 1500D MGMT 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-29 09:48:14
UPDATE