Computer security policy

Results: 3514



#Item
651Intelligence analysis / Military intelligence / Central Intelligence Agency / McLean /  Virginia / Inter-Services Intelligence / Counterintelligence / Open-source intelligence / Computer security / Information policy / Espionage / Security / National security

DO NOT COPY ! PROPERTY OF ECIPS European Centre for Information Policy and Security (ECIPS) ECIPS Transparency Register no DO NOT COPY ! PROPERTY OF ECIPS

Add to Reading List

Source URL: ecips.eu

Language: English - Date: 2014-04-21 10:41:25
652Cyberwarfare / Computer network security / National security / Information security / Security controls / Vulnerability / Classified information / Threat / Security policy / Security / Computer security / Data security

European Centre for Information Policy and Security (ECIPS) ECIPS Information Security Policy I. POLICY

Add to Reading List

Source URL: ecips.eu

Language: English - Date: 2014-05-14 16:35:05
653Computer security / Etiquette / Internet / Internet culture / Cloud computing / Email / Computing / Acceptable use policy

ACCEPTABLE USE POLICY This ACCEPTABLE USE POLICY ("AUP") describes acceptable use of and access to the Services offered by Cloud Data Centre Ltd and its subsidiaries and affiliates (collectively, "Cloud DC") such as, but

Add to Reading List

Source URL: www.clouddc.com.au

Language: English - Date: 2015-01-21 22:43:00
654Data security / Information security / National security / Public safety / Prevention / Security / Computer security / Crime prevention

Electronic Information Security Information Classification Registers ADMINISTRATION The table below shows the functional areas relating to administrative data and their respective Information Owners.

Add to Reading List

Source URL: www.policy.monash.edu

Language: English - Date: 2012-09-24 00:49:10
655Computer-mediated communication / Internet / Computer security / Acceptable use policy / Etiquette / Internet culture / Email spam / Internet privacy / Journal of the American Medical Association / Email / Spamming / Computing

Jama Software Acceptable Use Policy Last Updated January 1, 2015 THIS ACCEPTABLE USE POLICY CONTAINS LEGALLY BINDING TERMS APPLICABLE TO YOUR USE OF JAMA’S SOLUTIONS AND SERVICES, AS DEFINED HEREIN. IF YOU DO NOT AGREE

Add to Reading List

Source URL: www.jamasoftware.com

Language: English - Date: 2015-02-26 15:55:15
656Crime prevention / Public safety / Computer security / Data security / Information security / Internet privacy / Security guard / Personally identifiable information / Privacy policy / Security / Ethics / Privacy

Examination of Estimates of ExpenditureReply Serial No. CONTROLLING OFFICER’S REPLY TO INITIAL WRITTEN QUESTION

Add to Reading List

Source URL: twdc.police.gov.hk

Language: English - Date: 2014-12-29 10:25:04
657Law / Security / Ethics / Data Protection Directive / European Union / Profiling practices / Decision making / Decision support system / Data mining / Data privacy / Privacy law / Decision theory

Minding the Machine: Article 15 of the EC Data Protection Directive and Automated Profiling [Published in Computer Law & Security Report, 2001, volume 17, pp. 17–24; also published in Privacy Law & Policy Reporter, 200

Add to Reading List

Source URL: folk.uio.no

Language: English - Date: 2001-06-25 06:31:25
658Email / Computer security / Computing / Cryptographic protocols / DMARC / DomainKeys Identified Mail / Phishing / Anti-spam techniques / Sender Policy Framework / Email authentication / Spam filtering / Spamming

DMARC Providing domain owners control of their brand in the email channel January 2012 DMARC Defined

Add to Reading List

Source URL: dmarc.org

Language: English - Date: 2013-11-07 14:27:51
659Social systems / Welfare economics / Welfare state / Social vulnerability / Vulnerability / Division for Social Policy and Development / Computer security / Social protection / Cyberwarfare / Risk / Sociology / United Nations Secretariat

ARev.1 ST/ESA/284 REPORT ON THE WORLD SOCIAL SITUATION, 2003 Social Vulnerability: Sources and Challenges

Add to Reading List

Source URL: www.un.org

Language: English - Date: 2008-08-12 12:27:13
660Public safety / Critical infrastructure protection / Cyberwarfare / Computer crimes / National security / United States Department of Homeland Security / Security engineering

FOR IMMEDIATE RELEASE Jenny Cleveland, (Financial Services Industry Supports Cybersecurity Legislation Washington, D.C. — June 21, 2011— Today Leigh Williams, president of BITS, the technology policy di

Add to Reading List

Source URL: www.bits.org

Language: English - Date: 2013-03-01 14:19:03
UPDATE