Computer security policy

Results: 3514



#Item
641Computer security / Cryptography / Identity management systems / Password strength / Password policy / Password / Security / Access control

Guidelines to change your password before its expiry date If after having gone through these guidelines you are still experiencing difficulties with changing your password, please contact the Helpdesk: By Telephone: 020

Add to Reading List

Source URL: www.ioe.ac.uk

Language: English - Date: 2015-04-17 02:02:35
642House of Morgan / Computer security / Computing / JPMorgan Chase / Internet / Acceptable use policy / Password / Chase / Information security / Investment banking / Investment / Email

Global Technology Acceptable Use Policy for Contingent Workers (AUP-CW) The Acceptable Use Policy for Contingent Workers (AUP-CW) defines appropriate and inappropriate uses of JPMorgan Chase technology or information re

Add to Reading List

Source URL: www.jpmorganchase.com

Language: English
643Electronics / Technology / Internet / New media / Scientific revolution / Virtual reality / Public computer / Library / Legal aspects of computing / Computer law / Computer security / Digital media

PUBLIC INTERNET USE POLICY The Corangamite Regional Library Corporation (CRLC) provides computer and Internet access under the following terms and conditions. By using the library’s Internet service, users agree to the

Add to Reading List

Source URL: corangamitelibrary.vic.gov.au

Language: English - Date: 2015-01-15 21:09:19
644Identity management / Computing / OpenID / Web services / Phorm / Identity assurance / Digital identity / Information Card / ICAM / Federated identity / Identity / Computer security

Trust Framework Provider Assessment PackageThis document comprises the Assessment Package submitted by the Open Identity Exchange Corporation (OIX) to the United States Office of Governmentwide Policy (OGP) p

Add to Reading List

Source URL: openidentityexchange.org

Language: English - Date: 2014-06-06 18:30:57
645Critical infrastructure protection / Infrastructure / Security engineering / Computer security / National security / Security / United States Department of Homeland Security

FOR IMMEDIATE RELEASE Jenny Cleveland, (BITS President Testifies on Cyber Risks to Capital Markets WASHINGTON, DC—June 1, 2012—Today, Paul Smocer, president of BITS, the technology policy division of Th

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-03-01 14:31:18
646Data security / Computing / Law / Data Protection Act / Data management / Internet privacy / Information privacy / Database / Backup / Data privacy / Privacy law / Computer law

Royal College of Psychiatrists PERSONAL DATA: Security, Confidentiality and Respecting Personal Information College Policy and Procedures regarding Data Protection, Freedom of Information and Confidentiality Approved by

Add to Reading List

Source URL: www.rcpsych.ac.uk

Language: English - Date: 2013-07-22 09:20:50
647United States Department of Homeland Security / Security engineering / Internet in the United States / Cyber-security regulation / Critical infrastructure protection / Computer security / ICANN / Information warfare / National Strategy to Secure Cyberspace / Cyberwarfare / National security / Security

FOR IMMEDIATE RELEASE Ann Patterson, (Greg Rattray to Lead BITS Security Program Washington, D.C.— September 7, 2010— BITS, the technology policy division of The Financial Services Roundtable, announced

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:09
648Computing / Netfilter / Firewall / Iptables / Stateful firewall / IPv6 / Network address translation / NuFW / PF / System software / Software / Computer network security

Playing with network layers to bypass firewalls’ filtering policy Éric Leblond OISF Cansecwest 2012

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2012-03-09 21:48:18
649HTTP / HTTP cookie / Computing / Computer security / Google Analytics / Cookie / Login / Zombie cookie / Local shared object / Internet privacy / Web analytics / Internet

COOLEY LLP COOKIES POLICY We at Cooley use a variety of technologies to help us to deliver customised visitor experiences. In particular, we may use a technology called "cookies" to provide you with, for example, customi

Add to Reading List

Source URL: www.cooley.com

Language: English - Date: 2015-02-10 11:57:25
650United States Department of Homeland Security / United States Department of the Treasury / Computer security / Critical infrastructure protection / National security / Security / Public safety

FOR IMMEDIATE RELEASE Jenny Cleveland, (John Carlson to Lead BITS Security and Fraud Efforts Washington, D.C. — December 1, 2011— BITS, the technology policy division of The Financial

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2012-10-01 16:42:15
UPDATE