Computer security policy

Results: 3514



#Item
721United States government secrecy / Cryptography standards / National Information Assurance Partnership / Common Criteria / FIPS 140-2 / Information assurance / Information security / Committee on National Security Systems / National Security Agency / Computer security / Security / National security

FACT SHEET NSTISSP No. 11, Revised Fact Sheet National Information Assurance Acquisition Policy (Includes deferred compliance guidelines and procedures) July 2003

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
722Computer security / Identity management systems / Password policy / Password strength / Password / Security / Access control

2014 CAASPP Electronic Reporting Manual

Add to Reading List

Source URL: californiatac.org

Language: English - Date: 2014-08-11 13:58:42
723Privacy of telecommunications / Computer law / Privacy law / Human rights / Cyberspace / Legal aspects of computing / Telecommunications data retention / Patriot Act / Internet privacy / Ethics / Law / National security

Uberveillance Ubiquitous online surveillance and computer science – ethical and legal issues David Vaile Co-convenor, Cyberspace Law and Policy Community

Add to Reading List

Source URL: cyberlawcentre.org

Language: English - Date: 2014-09-08 12:40:30
724Password / Computer security / Windows Vista

Extended-privilege account: policy and procedures 1 Introduction

Add to Reading List

Source URL: www.brunel.ac.uk

Language: English - Date: 2015-03-27 07:31:12
725Information technology management / Risk analysis / Regulatory compliance / IT risk / Security / Business continuity / Risk / Management / Computer security / Data security / Information Risk Management

Compliance Policy Index: Governance Relevant Legislation, Standards and Agreements The following Standard applies to this policy and supporting documentation: AS[removed]Compliance programs Purpose

Add to Reading List

Source URL: www.yooralla.com.au

Language: English - Date: 2015-04-08 23:20:16
726Computer security / Email / Identity management systems / Password strength / Password policy / Password / Security / Access control

ONLINE REGISTRATION Tip Sheet ACCESSING USERNAMES/PASSWORDS

Add to Reading List

Source URL: www.playnrl.com

Language: English - Date: 2014-03-27 03:57:37
727Vulnerability / Cyberwarfare / Independent Safeguarding Authority / Failure / Internet privacy / Abuse / Computer security

Safeguarding Vulnerable Groups Policy Purpose of this Document This document contains guidelines and procedures for protecting the safety and welfare of children and vulnerable adults participating in university activiti

Add to Reading List

Source URL: www.ntu.ac.uk

Language: English - Date: 2015-04-16 21:33:59
728Identity management / Password / Security / Computer security / Access control

Northern Ireland Civil Service HR Policy 4.03 HRConnect Code of Practice This policy is about •

Add to Reading List

Source URL: www.dfpni.gov.uk

Language: English - Date: 2009-04-28 06:19:24
729Public safety / Computer security / Computer network security / Password / Information security / Network security / Malware / Password manager / Password policy / Security / Crime prevention / National security

Information Security Policy Final Version v1.0 ICT & Information Security Policy

Add to Reading List

Source URL: ngfl.northumberland.gov.uk

Language: English - Date: 2013-05-08 05:21:15
730Etiquette / Internet / Internet culture / Ethics / Internet privacy / School governor / Safety / Computing / Acceptable use policy / Computer security / Email

Information  on  the  use  of   Policy  Central  Enterprise  in   schools     Richard  Taylor  

Add to Reading List

Source URL: ngfl.northumberland.gov.uk

Language: English - Date: 2013-05-08 05:21:22
UPDATE