Computer security policy

Results: 3514



#Item
451Cryptography / Cyberwarfare / Identity management systems / Password strength / Password policy / Password / Security / Computer security

Security Awareness Incident Response Scenarios Experiential Learning for Meetings or to Supplement Presentations General instructions: Partners choose 2 role-play situations to work on. Each participant takes one to resp

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 05:52:14
452Password / Transaction authentication number / Login / Cryptographic software / Password manager / Password policy / Access control / Security / Computer security

-Information Ethic Guideline about accessing to Loyola ■We established regulation for protecting personal information in April of 2003 and try to use and protect the personal information properly in Sophia University

Add to Reading List

Source URL: www.sophia.ac.jp

Language: English - Date: 2010-04-26 22:08:10
453Internet privacy / Data Protection Act / Law / Information privacy / Computing / Criminal law / Information privacy law / Information security / Data privacy / Privacy law / Computer law

University Student Services Confidentiality Policy 1. Introduction Student Services believe students have the right to confidentiality to protect their interests and to ensure that relationships based on trust can be dev

Add to Reading List

Source URL: students.shu.ac.uk

Language: English - Date: 2015-03-03 12:14:26
454Computer law / Law / Security / Privacy / Data Protection Act / Information security / Information privacy / Internet privacy / Data protection (privacy) laws in Russia / Ethics / Data privacy / Privacy law

Department of Social Protection Data Protection Policy 1. Purpose and scope The Department of Social and Family Affairs is committed to protecting the rights and privacy of individuals in accordance with

Add to Reading List

Source URL: www.welfare.ie

Language: English - Date: 2013-01-04 10:01:55
455Public safety / Electronic commerce / Computer security / National Health Service / Information security / Caldicott guardian / Password / Security / Crime prevention / National security

QUESTIONS FOR REVIEW OF COMPLIANCE WITH SECTION 60 CONFIDENTIALITY AND DISCLOSURE POLICY

Add to Reading List

Source URL: www.ecric.nhs.uk

Language: English - Date: 2007-02-05 11:28:00
456Password / Cryptographic software / Cryptography / Crypt / Password policy / KeePass / Software / Security / Computer security

Password Protection APPENDIX B PASSWORD PROTECTION The payroll system provides password protection as a standard feature. If you do not wish to implement a password, you may change one or both passwords to blanks. This

Add to Reading List

Source URL: www.datasmithpayroll.com

Language: English - Date: 2008-09-16 20:41:59
457Electronic warfare / Computer crimes / Security / Hacking / Cyberterrorism / Military technology / Electromagnetic pulse / Critical infrastructure protection / Computer security / Cybercrime / Cyberwarfare / National security

Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress

Add to Reading List

Source URL: www.iwar.org.uk

Language: English - Date: 2008-11-19 06:31:43
458Computing / Internet / Acceptable use policy / Computer security / Etiquette / ESafety / National Telecommunications and Information Administration / Learning platform / Email / Digital media / Technology

e-Safety Policy Broadclyst Community Primary School Revised: October 2011

Add to Reading List

Source URL: www.bcps.org.uk

Language: English - Date: 2014-12-10 11:59:55
459Data security / Information technology management / Computer law / Security controls / Information security / COBIT / Regulatory compliance / NIST Special Publication 800-53 / ISO/IEC 27001 / Security / Computer security / Computing

Altius IT Policy Collection Compliance and Standards Matrix Security Control Governance Altius IT Policy and Plan

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-10 16:42:50
460Law / Computer crimes / Information technology / Internet / Computer security / Acceptable use policy / Information and communications technology / Internet privacy / Data Protection Act / Computing / Computer law / Technology

London Metropolitan University ICT Acceptable Usage Policy March 2009 Version 2

Add to Reading List

Source URL: metranet.londonmet.ac.uk

Language: English - Date: 2013-07-01 09:31:56
UPDATE