Computer security policy

Results: 3514



#Item
51Security / Prevention / Safety / National security / Computer security / Crime prevention / Cryptography / Information governance / Information security / Continuous auditing / IT risk

Microsoft Word - Information Resource Activity Review Policy.docx

Add to Reading List

Source URL: it.ouhsc.edu

Language: English - Date: 2014-12-11 11:30:27
52Security / Prevention / Cyberwarfare / National security / United States Department of Homeland Security / Cybercrime / Hacking / Computer security / Cyberwarfare in the United States / Cyberspace / Cyber-attack / National Cyber Security Policy

The Collaboration Imperative for Cyberspace Stakeholders Author: Mr. Riley Repko, HQE to the Air Force Deputy Chief of Staff for Operations, Plans & Requirements Executive Summary I. Challenge Cyberspace is a core enable

Add to Reading List

Source URL: www.it-aac.org

Language: English - Date: 2015-06-22 12:07:28
53P3P / World Wide Web / Internet privacy / Computing / Privacy / Identity management / Computer security / Cyberspace / CUPS / Privacy policy / HTTP cookie / Medical privacy

A “Nutrition Label” for Privacy Patrick Gage Kelley,* Joanna Bresee,* Lorrie Faith Cranor,* Robert W. Reeder** * Carnegie Mellon University School of Computer Science

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-06-17 17:35:23
54Security / Cyberwarfare / Computer network security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer virus / Intellectual property / Internet privacy / Website

TERMS The use of this website is subject to the following Terms, the Privacy Policy and any addi:onal terms and condi:ons and no:ces displayed by us on this website from :me to :me (together ‘Terms’). In the Terms, "

Add to Reading List

Source URL: yarrabend.com.au

Language: English - Date: 2016-06-17 02:00:37
55Internet privacy / Computing / World Wide Web / HTTP cookie / Computer security / Privacy / Personally identifiable information / Web analytics / P3P

Microsoft Word - PRIVACY POLICY.doc

Add to Reading List

Source URL: www.visitnacogdoches.org

Language: English - Date: 2008-08-01 16:37:28
56Security / Computer security / Computing / Identity management / Privacy / Identity documents / Computer access control / Internet privacy / Personally identifiable information / United States Postal Service / HTTP cookie / Credit card

Microsoft Word - privacy_policy

Add to Reading List

Source URL: hotelnorthampton.com

Language: English - Date: 2012-11-30 09:33:52
57Internet privacy / Computing / Privacy / Cyberspace / Computer security / HTTP cookie / Personally identifiable information / Medical privacy / P3P / Network Advertising Initiative

Privacy Policy This privacy policy sets out how the A.D.F.P. uses and protects any information that you give the A.D.F.P. when you use this website. The A.D.F.P. is committed to ensuring that your privacy is protected. S

Add to Reading List

Source URL: www.adfp.co.uk

Language: English - Date: 2012-01-11 09:49:19
58Internet privacy / Privacy / Data security / Computing / Computer security / Privacy policy / HTTP cookie / Information privacy / Personally identifiable information / Medical privacy / P3P

Privacy policy statement 1.0 Statement of Intent This is the VisitScotland website policy relating to the personal information that you may be asked to provide when using this website. This includes personal data, e-mail

Add to Reading List

Source URL: www.conventionscotland.com

Language: English - Date: 2012-10-31 10:29:53
59Cryptography / Security / Computer security / Key management / Computer network security / National security / USB flash drive / FIPS 140 / Critical Security Parameter / Key / Password / Zeroisation

iStorage Limited │www.istorage-uk.com SECURE USB FLASH DRIVE datAshur Pro 3.0 Non-Proprietary Security Policy FIPSSECURITY POLICY VERSION 1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-15 09:06:22
60Business / Computing / Technology / Industrial automation / Internet of Things / Predix / Technology forecasting / Customer experience management / Help desk / Computer security incident management / Technical support / General Electric

Technical Support Policy Predix Platform Services You may receive technical support services from GE (“us” or “we”) for the Predix platform in three ways, as described below. DEFINITIONS: The following terms as u

Add to Reading List

Source URL: www.predix.io

Language: English - Date: 2016-08-18 18:39:54
UPDATE