Computer security policy

Results: 3514



#Item
81Prevention / Computer access control / Access control / Password / Security / Challengeresponse authentication / Password notification email / Password policy

Black Canada with red flag - CMYK

Add to Reading List

Source URL: www.saskatchewan.ca

Language: English - Date: 2015-10-21 17:07:18
82Security / Computer security / Computer network security / Computer access control / Login

Microsoft Word - computer policy 2013

Add to Reading List

Source URL: engineering.buffalo.edu

Language: English - Date: 2016-08-03 12:29:41
83Security / Prevention / Information technology management / Computer security / Data security / Cryptography / National security / Information security / Security management / Asset / ISO/IEC 27001:2013 / ISO/IEC 27001:2005

Bit10 IT Security Policy 1. Introduction Bit10 develops web and mobile applications and provides hosting services for websites and servers. The importance of the data on these systems is of paramount importance to Bit10

Add to Reading List

Source URL: www.bit10.net

Language: English - Date: 2015-09-15 10:13:06
84Internet privacy / Privacy / Computing / Law / Computer security / HTTP cookie / Personally identifiable information / Medical privacy / Personal Information Protection and Electronic Documents Act / Facebook Beacon / P3P / Privacy concerns with social networking services

Privacy Policy Big Nasty Hillclimb LLC or "we" or "us" or "our") is committed to responsible information handling practices. You can visit most pages on the Sites (as defined below) without giving us any information abou

Add to Reading List

Source URL: www.bignastyhillclimb.com

Language: English - Date: 2012-04-15 14:22:20
85Internet privacy / Computing / Hypertext Transfer Protocol / World Wide Web / Privacy / Identity documents / Computer security / Computer access control / HTTP cookie / Google Analytics / Personally identifiable information / Information privacy

COMPANY SHOP LIMITED – PRIVACY POLICY Company Shop Limited (we) are committed to protecting and respecting your privacy. This policy (together with our Terms and Conditions, http://www.staffshop.co.uk and any other doc

Add to Reading List

Source URL: www.companyshop.co.uk

Language: English - Date: 2015-06-05 11:14:41
86Internet privacy / Computing / Computer security / HTTP cookie / Personally identifiable information / Technology / Privacy / Opt-out / In re Gateway Learning Corp. / P3P

Rhode Island PBS Online Privacy Policy Nothing is more important to us than protecting the private information of our visitors. The RIPBS web site adheres to a strict policy for ensuring the privacy of your -and your chi

Add to Reading List

Source URL: www.pegri.tv

Language: English - Date: 2015-10-09 14:57:07
87Internet privacy / Privacy / Computing / Identity management / Computer security / Privacy policy / HTTP cookie / Personally identifiable information / Digital media / In re Gateway Learning Corp. / P3P

Comics Studies Society (CSS) Privacy Statement and Return/Refund Policy Privacy Policy Comics Studies Society (CSS) ("us", "we", or "our") operates http://www.comicssociety.org (the "Site"). CSS is committed to protectin

Add to Reading List

Source URL: www.comicssociety.org

Language: English - Date: 2016-02-07 21:47:27
88Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
89Computer security / Cryptography / Software / Cryptography standards / Resource Access Control Facility / FIPS 140-2 / FIPS 140 / Z/OS / Code signing / IBM System z

z/OS Version 2 Release 1 RACF Signature Verification Security Policy IBM® z/OS® Version 2 Release 1 Security Server RACF® Signature Verification Module version 1.0 FIPSNon-Proprietary Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2016-07-19 10:01:42
90Computing / Computer security / Utility software / Identity management / Computer access control / SOA Security / WS-Security / Security Assertion Markup Language / WS-SecureConversation / WS-Policy / Security Patterns / XML Signature

trust claims buffer overrun tokens

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2013-01-08 15:17:40
UPDATE