Computer security policy

Results: 3514



#Item
931Computing / ISO/IEC 27001 / Information security management system / Computer network security / Information security / Threat / Audit / ISO/IEC 27001 lead auditor / ISO/IEC 27003 / Data security / Computer security / Security

TQCSI POLICIES FOR AUDITING & CERTIFICATION OF ISO[removed]This policy document describes policies determined by TQCSI’s Certification Approval Panel in the interpretation of ISO[removed]for the auditing and certification

Add to Reading List

Source URL: www.tqcsi.com

Language: English - Date: 2014-10-01 00:31:19
932Cryptography / Social engineering / Password strength / Password policy / Password / Security / Computer security

Information Security Animations –Social Engineering Attack (Script) Social Engineering Attack From the information security perspective, social engineering attack refers to an attack exploiting human weaknesses or che

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2012-06-20 06:06:51
933Law / United States federal banking legislation / Credit / Data privacy / Computer law / Fair Credit Reporting Act / ChoicePoint / Identity theft / Privacy policy / Privacy / Ethics / Security

Microsoft Word - mierzwinski22sept05.doc

Add to Reading List

Source URL: www.identitytheft.org

Language: English - Date: 2007-06-28 00:38:32
934Information Risk Management / Computer security / Data security / CESG Listed Advisor Scheme / Risk management / Information security / Information assurance / HMG Infosec Standard No.1 / Security Policy Framework / Security / Risk / Management

HMG IA Standard No. 1, web version - Issue 3.5, Oct 09

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2012-05-18 00:21:51
935Communication / Email / Computer security / Internet / Information and communications technology / Information and communication technologies in education / Password / Internet privacy / Acceptable use policy / Computing / Technology / Information technology

POLICY Acceptable Use Policy Purpose To specify the acceptable use of Macquarie University Information and

Add to Reading List

Source URL: mq.edu.au

Language: English - Date: 2014-06-24 00:49:01
936Prevention / Business / Information Risk Management / Risk analysis / SKY Perfect JSAT Group / JSAT Corporation / Information security / Risk management / Asset / Security / Data security / Computer security

Information Security Basic Policy (SKY Perfect JSAT Group) * This is an English translation of Corporate Governance Report prepared in Japanese for the purpose of referential use. Information Security Basic Policy (SKY P

Add to Reading List

Source URL: www.sptvjsat.com

Language: English - Date: 2014-04-21 00:50:51
937Cyberwarfare / Computer network security / Information technology management / Information security / TRAC / Freedom of information legislation / Threat / Information security management system / Privacy in Australian law / Computer security / Security / Data security

Policy [Optional heading here. Change font size to suit] Policy # QH-POL-066:2014 Information Security

Add to Reading List

Source URL: www.health.qld.gov.au

Language: English - Date: 2014-09-28 20:32:39
938Australian Sports Commission / Politics / Security / Computer security / Data security / Prevention / Humanities / Law / Policy

National Organisational Development Network By laws and Policies

Add to Reading List

Source URL: www.ausport.gov.au

Language: English - Date: 2014-09-15 21:38:16
939Cyberwarfare / Crime prevention / Computer network security / Information security / Legal aspects of computing / Attack / Cyber-security regulation / Cyber security standards / Security / Computer security / National security

POLICY ADVISORY May 11, 2011 Comments on “Discussion Draft on National Cyber Security Policy” Rohan Joshi & Srijith K Nair

Add to Reading List

Source URL: takshashila.org.in

Language: English - Date: 2011-05-15 22:28:17
940Electronic commerce / Spamming / Email spam / IiNet / Spam / Network security / Computer security / Acceptable use policy / AFACT v iiNet Ltd / Internet / Computing / Email

Our Customer Relationship Agreement ACCEPTABLE USE POLICY iiNet Limited ACN[removed]Phone: [removed]Internode Pty Ltd ABN[removed]Phone: [removed]

Add to Reading List

Source URL: www.iinet.net.au

Language: English - Date: 2014-08-25 22:20:55
UPDATE