Computer security policy

Results: 3514



#Item
341Computing / Federal Information Security Management Act / Cloud computing / Project management office / United States Department of Homeland Security / Information security / Regulatory compliance / Computer security / Security / Public safety

FedRAMP Forward 2 Year Priorities December 17, 2014 In December 2010, the White House published the “25 Point Implementation Plan to Reform Federal IT.”1 A key component of that plan, the “Cloud First” policy, m

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-03-05 16:36:38
342Computer security / Identity management systems / Federated identity / Self-service password reset / Identity management / Password policy / Password / Access control / Security

FORGOT YOUR PASSWORD? START HERE E RROR M ESSAGES Before you contact the Help Desk for assistance with Forgot Your Password (FYP) or a password reset,

Add to Reading List

Source URL: www.share.state.nm.us

Language: English - Date: 2014-05-23 19:34:01
343Data management / Computer security / Data security / Security / Information security / National security / Data center / Server / File area network / Computing / Concurrent computing / Distributed computing

Microsoft Word - Server Consolidation Policy

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2015-01-29 14:37:28
344Computer security / Data security / Crime prevention / Information security / National security / Emergency management / Risk management / Security / Public safety / Prevention

The Basic Policy of Critical Information Infrastructure Protection (3rd Edition) (Tentative Translation)

Add to Reading List

Source URL: www.nisc.go.jp

Language: English - Date: 2015-05-26 00:08:44
345Crime prevention / National security / Public safety / Computer security / Electronic commerce / Internet privacy / Password / Information security / Information privacy / Security / Ethics / Privacy

Privacy Policy Summary of MTM Privacy Policy MTM Technologies, Inc. (the “Company” or “MTM”,) Privacy Policy is a statement that discloses some or all of the ways MTM gathers, uses, discloses and manages MTM cust

Add to Reading List

Source URL: www.mtm.com

Language: English - Date: 2014-11-19 15:21:36
346Password / Identity management systems / Cryptographic software / Password policy / Password strength / Security / Computer security / Access control

SchoolView Set up for Students Step 1: Go to the PCSH website and select SchoolView from the right column: Step 2: Select SchoolView Login: 1

Add to Reading List

Source URL: schools.district279.org

Language: English - Date: 2015-01-20 12:49:28
347National security / Public safety / Information security / Computer security / Security policy / Security engineering / Dependability / Security / Prevention / Crime prevention

CHAPTER 27 Conclusions We are in the middle of a huge change in how security is done. Ten years ago, the security manager of a large company was usually a retired

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:58:03
348Internet / Acceptable use policy / Computer security / Etiquette / Internet culture / Content-control software / Network security / Websense / Email / Computing / Digital media

Contact: Susan Seale The Internet Acceptable Use Policy (for parents and children) This policy is made available via the school website, is provided to all parents (current and prospective) in the office, is provided to

Add to Reading List

Source URL: www.fintonhouse.org.uk

Language: English - Date: 2014-08-29 06:18:32
349Internet / Security / Federated identity / Computer crimes / Password policy / Two-factor authentication / Password / Email / Computing

ShuttlePro Registration Instructions ----------------------------------------------------------------------------------------------------------------------------- -- Step 1: Send an e-mail with the following information

Add to Reading List

Source URL: www.travel.harvard.edu

Language: English - Date: 2015-01-14 09:14:13
350Cyberwarfare / Network security / Information security / Vulnerability / Network service / Acceptable use policy / Computer security / Security / Computing

Housing Services Internet and UCSF Network Use Agreement UCSF’s Internet and network resources are designed to facilitate the sharing of knowledge and information. This enhances and supports the educational and researc

Add to Reading List

Source URL: campuslifeservices.ucsf.edu

Language: English - Date: 2011-06-22 17:47:46
UPDATE