Computer security policy

Results: 3514



#Item
761Law / Computer security / Criminal law / Isambard Kingdom Brunel / Brunel University / Brunel / Acceptable use policy / Software copyright / Data Protection Act / Computer law / Computer crimes / Computing

Information Strategy Brunel Acceptable Computer Use Policy (BACUP) The purpose of this document is to lay forth the rules for computer use by Brunel

Add to Reading List

Source URL: www.brunel.ac.uk

Language: English - Date: 2014-08-28 05:16:44
762Cross-platform software / Java programming language / Java platform / Computing platforms / Java / Application programming interface / Windows API / Windows Registry / Thread / Computing / Computer programming / Software engineering

To appear in IEEE Security and Privacy, Oakland, CA. May 9-12, [removed]Flexible Policy-Directed Code Safety David Evans [removed]

Add to Reading List

Source URL: naccio.cs.virginia.edu

Language: English - Date: 1999-10-27 18:22:23
763Internet / Network performance / Computer network security / Proxy server / Computer network / Transmission Control Protocol / Mobile data offloading / Windows Vista networking technologies / Computing / Computer networking / Internet privacy

IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 200X 1 A Policy-Oriented Architecture for Opportunistic Communication on Multiple Wireless Networks

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2007-04-26 15:15:48
764Law / Electronics / Computer crimes / Data privacy / Privacy law / Information security / Copyright / Computer network / Acceptable use policy / Computer law / Computer security / Computing

Microsoft Word - Computer Use Regulations - V2 2 (September 2013)

Add to Reading List

Source URL: www.ntu.ac.uk

Language: English - Date: 2014-10-02 04:57:15
765Computing / Acceptable use policy / Etiquette / Internet culture / Password / Email spam / Internet / Electronics / Email / Computer security / Spamming

Conexim Australia Pty Limited – Acceptable Use Policy Acceptable Use Policy By using any of Conexim’s Services, the Customer agrees to comply with Conexim’s Acceptable Use Policy (“AUP”). This Acceptable Use P

Add to Reading List

Source URL: www.conexim.com.au

Language: English - Date: 2008-06-26 22:09:28
766Acceptable use policy / Computer security / Email / Etiquette / Internet culture / Origin / Contract / Internet / IO Group /  Inc. v. Veoh Networks /  Inc. / Contract law / Computing / Law

VisualTour Terms and Conditions You should read this Legal information carefully before using this Web Site. By using the Web Site, you agree to the following terms of use. If you do not agree to these terms, please do n

Add to Reading List

Source URL: www.visualtour.com

Language: English - Date: 2013-02-12 17:43:35
767Government / Policy / Public-key cryptography / Computer security / Security and safety features new to Windows Vista / Group Policy / Microsoft Windows / Windows Vista / Decision theory

E-Lock Policy Manager White Paper E-Lock Policy Manager Table of Contents

Add to Reading List

Source URL: www.elock.com

Language: English
768Acceptable use policy / Computer security / Etiquette / Internet / Internet culture / Electronics / Password / SMS / IO Group /  Inc. v. Veoh Networks /  Inc. / Technology / Email / Mobile technology

Acceptable Use Policy This is the Acceptable Use Policy of the MEDIONmobile prepaid service of MEDION Australia Pty Limited for ALDImobile and forms part of the Terms on which we provide Services. MEDION reserves the rig

Add to Reading List

Source URL: m3.aldimobile.com.au

Language: English - Date: 2014-10-15 23:47:57
769Data security / System administration / Password / Computer network security / Information security / Computer security / Su / Password policy / Password manager / Security / Crime prevention / National security

Top 10 Security Mistakes REPRINTED FROM: Computerworld JUL 9, 2001 ARTICLE ID: 793 by Alan S. Horowitz You may not be able to prevent serious break-in attempts, but you can at least avoid

Add to Reading List

Source URL: www.nigelpentland.co.uk

Language: English - Date: 2005-02-12 16:21:02
770Privacy / Law / Computer law / Data Protection Act / Information privacy / Information security / Privacy policy / Personally identifiable information / Telecommunications data retention / Privacy law / Ethics / Data privacy

Privacy and Security Law Report ® Reproduced with permission from Privacy & Security Law Report, 13 PVLR 626, [removed]Copyright 姝 2014 by The Bureau of National Affairs, Inc[removed]http://www.bna.com

Add to Reading List

Source URL: media.mofo.com

Language: English - Date: 2014-05-15 13:35:42
UPDATE