Computer security policy

Results: 3514



#Item
591Information / Computing / Acceptable use policy / Computer security / Etiquette / Internet culture / Email spam / Copyright / Computer network / Email / Spamming / Data

Version 1.1 Last Updated 19th September 2014 Table of Contents 1.

Add to Reading List

Source URL: www.onthenet.com.au

Language: English - Date: 2014-09-18 19:39:10
592Crime prevention / National security / Key escrow / Public-key cryptography / Computer security / Key / Export of cryptography in the United States / Disk encryption / Cryptography / Key management / Computer network security

Transcript of a US Presentation given at a US/UK Government Meeting on Encryption Policy held in London in late 1996 or earlyInitial Presentation (UK) We welcome opportunity for consultation on the subject of encr

Add to Reading List

Source URL: www.cyber-rights.org

Language: English - Date: 1999-07-06 14:11:43
593Telecommunications engineering / University of Colorado Colorado Springs / Computer network / Wireless access point / Wireless / IEEE 802.11 / Internet access / Wireless security / Wi-Fi / Wireless networking / Technology / Electronic engineering

CAMPUS POLICY Now is the tie for all good men to POLICY NUMBER:

Add to Reading List

Source URL: www.uccs.edu

Language: English - Date: 2015-04-22 23:03:13
594Ethics / Secrecy / Security / Patent / Intellectual rights to magic methods / Injunction / Japanese trade secrets / Data General Corp. v. Digital Computer Controls /  Inc. / Intellectual property law / Trade secrets / Law

Trade Secrets Laws This document provides a brief overview of trade secret policy. Before making any decisions regarding intellectual property, consult an attorney or other official source. What is a trade secret? A desi

Add to Reading List

Source URL: www.uakron.edu

Language: English - Date: 2009-08-01 20:36:36
595Etiquette / Internet / Internet culture / Computing / Electronics / Acceptable use policy / Computer security / Email

Microsoft Word - InternetAcceptableUsePolicy.doc

Add to Reading List

Source URL: www.ctctel.com

Language: English - Date: 2014-04-29 09:34:43
596Public safety / Management / Actuarial science / Crime prevention / Information security / ISO/IEC 27001 / Security controls / Risk management / Risk / Security / Computer security / Data security

Group policy Security policy statement Purpose The continued good reputation and success of Colt’s business is dependent on our governance and control framework supporting our physical, information and personnel asset

Add to Reading List

Source URL: www.colt.net

Language: English - Date: 2015-04-15 07:07:43
597Mass surveillance / Privacy of telecommunications / Computer law / Crime prevention / Regulation of Investigatory Powers Act / Foreign Intelligence Surveillance Act / National security / Security / Surveillance

Not Protectively Marked Information Assurance Policies and Guidance Surveillance Policy

Add to Reading List

Source URL: www.leicester.gov.uk

Language: English - Date: 2015-03-26 12:10:34
598Computer security / Library / Internet / Northern Illinois University / Acceptable use policy / Electronic Information for Libraries / Decline of library usage / Illinois / Chicago metropolitan area / Library science

Internet Policy The primary purpose of the computers in the University Libraries is to provide NIU community members with access to information which supports learning, teaching, and scholarly research. Use of the comput

Add to Reading List

Source URL: www.ulib.niu.edu

Language: English - Date: 2013-06-25 15:12:55
599Public safety / Identity management / Social issues / Human rights / National security / DV / Information privacy / Alan Westin / Internet privacy / Privacy / Ethics / Security

Dataveillance - 15 Years On Roger Clarke Principal, Xamax Consultancy Pty Ltd, Canberra Visiting Professor, Baker & McKenzie Cyberspace Law & Policy Centre, University of N.S.W. Visiting Fellow, Department of Computer Sc

Add to Reading List

Source URL: privacy.org.nz

Language: English - Date: 2014-09-24 22:15:05
600Password / Salt / Crypt / Password strength / Password policy / Security / Cryptography / Computer security

Operating Systems R. Stockton Gaines Editor

Add to Reading List

Source URL: www.cs.yale.edu

Language: English - Date: 2005-06-29 13:02:32
UPDATE