Computer security policy

Results: 3514



#Item
281National security / Computer security / Public safety / ISO/IEC 27001 / Information security management system / Information security / ISO 14000 / Security / Data security / Crime prevention

Information Security Policy PDMS’ Management has established an Information Security Policy, which supports the strategic aims of the business and is committed to maintaining and improving information security within P

Add to Reading List

Source URL: www.pdms.com

Language: English - Date: 2015-05-27 08:45:08
282Software release life cycle / Computing / Technology / Electronics / Computer network security / Content-control software / Fortinet

Fortinet Product Life Cycle Information Fortinet suggests that customers familiarize themselves with the Fortinet Product Life Cycle Policy . Particularly important to Fortinet customers are the three product life cycle

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:09:09
283DigiNotar / Government / Computer crimes / General Intelligence and Security Service / Government of the Netherlands

Netherlands Cyber Security Strategy Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:13:24
284NFR / Demo / Computing / Technology / Computer network security / Content-control software / Fortinet

Microsoft Word - Worldwide Demo Policy v1 _CLEAN - Effective May-11_.doc

Add to Reading List

Source URL: corex.at

Language: English - Date: 2015-05-13 12:09:31
285Computer security / Data security / Privacy law / Computer law / Data privacy / Information security / Family Educational Rights and Privacy Act / Credit card / Identity theft / Security / Government / Law

Heartland Community College Security and Appropriate Use Policy

Add to Reading List

Source URL: www.heartland.edu

Language: English - Date: 2013-10-01 15:53:55
286Email / Etiquette / Internet culture / Computing / Electronics / Sensitive Security Information / United States Department of Homeland Security / Computer security / Acceptable use policy

DHS IA Compliance System - Rules of Behavior Acceptable Use The following rules of behavior and acceptable use policy apply to all users of the DHS Compliance System whether DHS employees or contractors. Because writte

Add to Reading List

Source URL: auxdata2.uscg.gov

Language: English - Date: 2009-05-29 11:19:57
287Computer security / Identity document / Credential / Door / Crime prevention / Security / Identity management / Access control

Policy Title: Secured Buildings Policy #: FC-1 Purpose: Policy:

Add to Reading List

Source URL: www.southdakotasafetycouncil.org

Language: English - Date: 2015-05-20 10:04:29
288National security / Computer network security / Computer security / Data management / Data security / Internet privacy / Operating system / Privilege / Abilene Christian University / Security / Ethics / Crime prevention

Policy for the Responsible Use of Technology Resources

Add to Reading List

Source URL: www.acu.edu

Language: English - Date: 2009-12-16 23:05:58
289Password / Cryptography / Identity management systems / Password policy / Password strength / Security / Computer security / Access control

Student Password Complexity

Add to Reading List

Source URL: content.xap.com

Language: English - Date: 2015-05-14 16:26:32
290Computing / Computer law / Internet privacy / Social issues / Information privacy / Data Protection Act / HTTP cookie / Personally identifiable information / Information security / Ethics / Privacy / Law

Privacy Policy Personal Information DiscountIf´s information security system will use its best endeavours to ensure that privacy of all personal information you choose to provide us with is duly protected. Personal Info

Add to Reading List

Source URL: www.discountif.com

Language: English - Date: 2015-05-05 09:07:57
UPDATE