Computer security policy

Results: 3514



#Item
791Crime prevention / National security / Electronic commerce / Password / Information security / Asset / Access control / Backup / Password policy / Security / Computer security / Data security

Information Security Policy Version 2, 7 July[removed] 1 TABLE OF CONTENTS

Add to Reading List

Source URL: www.mansfield.ox.ac.uk

Language: English - Date: 2014-07-07 08:18:17
792Management / Data security / Public safety / Information assurance / CESG Listed Advisor Scheme / Information security / Risk / Accreditation / HMG Infosec Standard No.1 / Information Risk Management / Computer security / Security

NRS Information Assurance and Accreditation Policy Version: 1.0 Location: Security/Policies Page 3 of 8 Last saved date: [removed]

Add to Reading List

Source URL: www.nrscotland.gov.uk

Language: English - Date: 2013-12-08 11:12:16
793Security / Computing / Privacy / Computer law / Computer security / Data Protection Act / Information privacy / Data Protection Directive / Information security / Data privacy / Privacy law / Law

University of Exeter Data Protection Policy 1 Introduction

Add to Reading List

Source URL: www.exeter.ac.uk

Language: English - Date: 2014-10-04 16:41:55
794Security / Cyberwarfare / Network security / Information security / Virtual private network / Access control / Application firewall / Router / Wireless security / Computer network security / Computer security / Computing

Network Security Procedure (MPF1276) GOVERNING POLICY This procedure is made under the Information Security Policy. SCOPE This procedure applies to:

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
795Information / Data / Computer law / Data privacy / Privacy law / Data Protection Act / Information security / Information privacy / Data classification / Data management / Security / Data security

Data Protection Policy October 2013 Document title Data Protection Policy

Add to Reading List

Source URL: www.port.ac.uk

Language: English - Date: 2014-01-31 07:14:17
796Crime prevention / Data security / Public safety / Classified information / Government of the United Kingdom / Security Policy Framework / Information security / Security management / Security / National security / Computer security

Protective Security Policy Framework map for website - V1 2 - amended March 15

Add to Reading List

Source URL: www.protectivesecurity.gov.au

Language: English - Date: 2015-03-16 23:55:18
797Security / Management / Public safety / Information security / The Five Pillars of Organizational Excellence / Information technology management / Computer security / Data security

Group Policy Statement Information Technology In our changing business environment information systems are increasingly used to carry out our work, meet customers’ needs, and

Add to Reading List

Source URL: www.serco.com

Language: English - Date: 2015-03-25 10:52:40
798Identity management / Password / Roboform / Password policy / Password strength / Security / Access control / Computer security

US and UK Password Practices Leave Users Vulnerable, According to Survey Sponsored by Siber Systems uSamp Poll of 1,000 Consumers Shows Widespread Need for Better Security to Combat Hackers Fairfax, VA – March 3, 2015

Add to Reading List

Source URL: www.roboform.com

Language: English
799Public safety / Crime prevention / National security / Business software / Information security / Security management / JSAT Corporation / TRAC / SKY Perfect JSAT Corporation / Data security / Security / Computer security

Information Security Basic Policy (SKY Perfect JSAT Holdings Inc.) * This is an English translation of Corporate Governance Report prepared in Japanese for the purpose of referential use. Information Security Basic Polic

Add to Reading List

Source URL: www.skyperfectjsat.co.jp

Language: English - Date: 2014-04-23 02:22:31
800SKY Perfect JSAT Group / JSAT Corporation / Crime prevention / Information security / Spacecraft / Public safety / Security management / SKY PerfecTV! / SKY Perfect JSAT Corporation / Security / Computer security / Data security

Information Security Group Basic Policy (SKY Perfect JSAT Group) * This is an English translation of Corporate Governance Report prepared in Japanese for the purpose of referential use. Information Security Basic Policy

Add to Reading List

Source URL: www.skyperfectjsat.co.jp

Language: English - Date: 2014-04-23 02:22:30
UPDATE