Computer security policy

Results: 3514



#Item
801Environment / Climate change policy / Carbon finance / Adaptation to global warming / Global warming / Social vulnerability / Vulnerability / Computer security / Risk / United Nations Framework Convention on Climate Change / Climate change

Introduction of the work of the Consultative Group of Experts on non-Annex I National Communications Executive Committee of the Warsaw International Mechanism for Loss and Damage, Bonn, Germany, [removed]March 2014

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2014-03-25 14:26:51
802Identity management / Gates / Construction / Security / Access control / Computer security

Revised Gate Policy: June 2014 Dear Members,
 Please find for your reference and benefit, the updated main gate access policy. 
Main changes are a focus on members to access ONLY using their membership access card, t

Add to Reading List

Source URL: www.ranelagh.com.au

Language: English - Date: 2014-10-08 18:19:10
803Crime prevention / National security / Electronic commerce / Computing / Internet privacy / Verisign / Information privacy / Computer security / Data security / Ethics / Privacy / Security

Online Trust and Data Protection Policy Thousands of businesses provide data and information to CreditorWatch for the exclusive use described in our Disclosure of Use Policy. It is important that we ensure that the data

Add to Reading List

Source URL: creditorwatch.com.au

Language: English - Date: 2012-07-15 23:26:09
804National security / Computing / Internet privacy / User / Authorization / Password / Computer security / Security / Computer network security / Crime prevention

Acceptable Use Policy (AUP) The campus IT facilities are provided by the College and managed by the Information Technology Services Office (ITSO). This information systems policy aims to provide a good working environmen

Add to Reading List

Source URL: www.twc.edu.hk

Language: English - Date: 2013-09-03 05:24:58
805Computing / Public safety / Information Risk Management / Risk analysis / Information security / Backup / Vulnerability / Incident management / Data center / Data security / Security / Computer security

Computer Operations Procedure (MPF1272) GOVERNING POLICY This procedure is made under the Information Security Policy. SCOPE This procedure applies to providers of University information systems and information assets re

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
806Cyberwarfare / Virtual LAN / Network Access Control / Cisco Systems / Market segmentation / Access control list / Network security / Virtual private network / Computer security / Computer network security / Computing / Security

Network Segmentation Through Policy Abstraction: How TrustSec Simplifies Segmentation and Improves Security Sept[removed]In most organizations networks grow all the time. New stacks of security appliances, new

Add to Reading List

Source URL: www.cisco.com

Language: English
807Data privacy / Information privacy / HTTP cookie / Computing / Internet / Computer security / Information privacy law / Telecommunications data retention / Privacy / Internet privacy / European Data Protection Supervisor

SPECIFIC PRIVACY STATEMENT FOR THE PUBLIC CONSULTATION ON THE PRELIMINARY OPINION OF THE EXPERT PANEL ON COMPETITION AMONG HEALTH CARE PROVIDERS IN THE EUROPEAN UNION – INVESTIGATING POLICY OPTIONS

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2015-02-24 05:58:45
808Computer security / Barracuda Networks / Application firewall / Reverse proxy / Load balancing / XML firewall / Firewall / Application delivery controller / FTPS / Computing / System software / Computer network security

Introduction Available in five models, the Barracuda Web Application Firewall can be used to securely deploy applications of any size. Barracuda Web Application Firewall Architecture Barracuda Energize Updates Policy De

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2014-05-15 11:48:48
809Identity management / Roboform / Password / Random password generator / Hacker / Password cracking / Password policy / Security / Computer security / Cryptography

Siber Systems, Inc. Adds Three Security Tools to RoboForm Site Password Generator, Strength Assessment Tool and Hacking Detector Help Users Fight Back Against Hackers, Keep Data Safe Online Fairfax, VA – October 16, 20

Add to Reading List

Source URL: www.roboform.com

Language: English
810Computer security / Electronic health record / Health informatics / Access control / Health / Medicine / Security

www.icarehealth.com.au Sample PCEHR Security and Access Policy* for residential aged care With guidance from the National eHealth Transition Authority (NeHTA), we have modified the following sample Personally Controlled

Add to Reading List

Source URL: www.icarehealth.com.au

Language: English - Date: 2013-10-29 20:36:02
UPDATE