Computer security policy

Results: 3514



#Item
671Computer security / Computing / Security / Information technology governance / Information technology management / Information Systems Audit and Control Association / COBIT / Corporate governance of information technology / Certified Information Systems Auditor / Information technology audit / Data security / Auditing

ISACA Intellectual Property Guidelines ISACA administers, maintains and enforces an intellectual property (IP) policy that is designed to facilitate dissemination of its copyrighted IP, while still protecting it. The pol

Add to Reading List

Source URL: www.isaca.sk

Language: English - Date: 2012-01-23 04:22:58
672Security / Privacy / Computer security / Data security / Information privacy / International Safe Harbor Privacy Principles / Binding corporate rules / Information security / Internet privacy / Data privacy / Privacy law / Ethics

Fluor Data Protection Binding Corporate Rules Policy PART I: INTRODUCTION AND BACKGROUND Purpose This Data Protection Binding Corporate Rules Policy (“Policy”) establishes the approach of Fluor to compliance with Eur

Add to Reading List

Source URL: www.fluor.com

Language: English - Date: 2014-09-04 23:31:10
673Public safety / Crime prevention / Cyberwarfare / Computer crimes / Computer security / Information security / Critical infrastructure / International Cybercrime / National Cyber Security Division / Security / National security / United States Department of Homeland Security

Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures

Add to Reading List

Source URL: www.enisa.europa.eu

Language: English
674Computer network security / Data security / National security / Information security / Password / Risk management / Layered security / Sender Policy Framework / Information assurance / Computer security / Security / Cyberwarfare

GUIDANCE Defence in depth: Practical considerations CERT Australia encourages stakeholders to follow defence in depth strategies as a key component in their individual risk mitigation strategies. This document provides

Add to Reading List

Source URL: www.cert.gov.au

Language: English - Date: 2015-04-20 18:13:16
675Computing / Telecommunications engineering / IEEE 802.1X / Wireless community network / Wireless network / Network Access Control / Wireless security / Computer network security / Wireless networking / Technology

Wireless Acceptable Use Policy LAST UPDATED: 31st July 2014 VERSION 1 This policy applies to all schools using a community wireless network in order to connect users to the school’s managed network service. It applies

Add to Reading List

Source URL: n4l.co.nz

Language: English - Date: 2014-10-23 05:24:15
676Data security / National security / Privacy / Customer proprietary network information / Information security / Personally identifiable information / Identity theft / Internet privacy / Consumer protection / Security / Computer security / Ethics

Statement of Laura Moy Senior Policy Counsel New America’s Open Technology Institute Before the House of Representatives Energy & Commerce Committee Subcommittee on Commerce, Manufacturing, and Trade Hearing on

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-03-17 10:57:33
677Information technology management / Information security management system / Serco Group / Information security / Security controls / Data security / Computer security / Security

Group Policy Statement Security We work in many different countries providing a wide range of services, which make a difference to the lives of millions of people around the world. The provision of these services is who

Add to Reading List

Source URL: www.serco.com

Language: English - Date: 2015-03-25 10:52:40
678Caregiver / Yooralla / Freedom of Information Act / Threat / Online shopping / Right to Information Act / Cyberwarfare / Law / Freedom of information legislation / Computer security / Family

Open Disclosure Policy Index: Management Relevant Legislation, Standards and Agreements The following Legislation applies to this policy and supporting documentation: Charter of Human Rights and Responsibilities Act 20

Add to Reading List

Source URL: www.yooralla.com.au

Language: English - Date: 2015-04-08 23:20:14
679Common Security and Defence Policy / Government / National security / Security / European Network and Information Security Agency / Computer security

Cyber Security in Europe ENISA supporting the National Cyber Security Strategies – An evaluation framework Liveri Dimitra Security and Resilience of Communication Networks Officer

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2014-11-28 10:14:53
680Technology / Internet / Media technology / New media / Scientific revolution / Virtual reality / Access control / Public-access television / Computer security / Security / Digital media

Internet Access Policy Access to the internet via Public Access Network are provided for educational, informational and recreational purposes. All users agree to use these resources in a responsible manner and also to re

Add to Reading List

Source URL: www.library.camden.nsw.gov.au

Language: English - Date: 2013-10-24 01:38:08
UPDATE