Computer security policy

Results: 3514



#Item
321Technology / Internet / Acceptable use policy / Etiquette / Internet culture / Password / Information security / Information and communication technologies in education / Email / Computing / Computer security

Student AUP* Code of Practice (*ICT Acceptable Use Policy) Effective from 13 January 2014 Version Number: 3.0

Add to Reading List

Source URL: www.salford.ac.uk

Language: English - Date: 2014-01-13 07:21:46
322Ethics / Privacy / Identity management / Government / Social issues / Personally identifiable information / Information security / Internet privacy / Security controls / Security / Data security / Computer security

PRIVACY POLICY NUMBER: ISO-POL-010-E REFERENCES:

Add to Reading List

Source URL: www.fiscal.ca.gov

Language: English - Date: 2015-04-07 13:39:18
323Computer security / Comparison of privilege authorization features / Password policy / Password / Cryptographic software / Security

Sesame Copyright  2000. All educational programs and activities conducted by The Ohio State University Extension are available to all potential clientele on a nondiscriminatory basis without regard to race, color, cr

Add to Reading List

Source URL: www.sesamesoft.com

Language: English - Date: 2004-11-23 14:34:14
324Cryptography / Password policy / Privileged password management / Password / Security / Computer security

How to Create Professional Accounts from the I Have A Plan Iowa® Professional Center Note: This feature is only available to users who have administrative level access. 1. Sign into your Professional Center Account at:

Add to Reading List

Source URL: www.iowacollegeaid.gov

Language: English - Date: 2014-08-04 11:28:29
325National security / Crime prevention / Responsible disclosure / Vulnerability / Computer security / Security / Cyberwarfare

The Dutch experience Implementing a RD policy 2nd National Cyber Security Strategies Workshop

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:31:46
326Public safety / Computer security / Data security / Privacy law / Gramm–Leach–Bliley Act / Information security / Internet privacy / Privacy policy / City University of New York / Security / Ethics / Crime prevention

CUNY GLB Information Security Program _9-21-04_.doc

Add to Reading List

Source URL: www.cuny.edu

Language: English - Date: 2015-06-03 11:14:07
327Cyberwarfare / Virtual private network / Internet security / Secure Shell / Transport Layer Security / Cisco Systems VPN Client / UT-VPN / SSL-Explorer: Community Edition / Computer network security / Computing / Computer security

Security Policy for Router

Add to Reading List

Source URL: vpn.nic.in

Language: English - Date: 2011-12-27 05:41:48
328Crime prevention / Computer security / Identity management / Physical security / Access control / Authorization / Security / Public safety / National security

Microsoft Word - POLICY NUMBER 001-A - access control _7_.doc

Add to Reading List

Source URL: www.doit.state.nm.us

Language: English - Date: 2009-11-05 18:43:35
329Computer security / Identity management systems / Identity management / Self-service password reset / Password policy / Password / Access control / Security

FORGOT YOUR PASSWORD? START HERE F REQUENTLY A SKED Q UESTIONS The FAQs are designed to provide you answers to commonly asked questions and a better understanding of the

Add to Reading List

Source URL: www.share.state.nm.us

Language: English - Date: 2014-05-23 19:34:01
330Computer law / International trade / Law / Privacy / Internet privacy / Network neutrality / Free trade / Consumer protection / Computer security / Business / Ethics / Identity management

THE DIGITAL DOZEN The Obama Administration’s digital trade policy is anchored in principles that secure and protect innovation, a free and open Internet, and commerce without barriers.

Add to Reading List

Source URL: ustr.gov

Language: English - Date: 2015-05-01 10:20:41
UPDATE