Content Security Policy

Results: 234



#Item
181Computer network security / Internet ethics / Acceptable use policy / Computer security / Etiquette / Internet culture / Internet privacy / Content-control software / Operating system / Computing / Electronics / Technology

TECHNOLOGY ACCEPTABLE USE POLICY FOR STUDENTS PURPOSE This policy provides the procedures, rules, guidelines and codes of conduct for the use of the technology and information networks at Socorro Consolidated Schools (SC

Add to Reading List

Source URL: www.socorro.k12.nm.us

Language: English - Date: 2013-02-13 18:12:54
182Public records / Archival science / Business / Security / Records management / Accountability / Information security / Archivist / Inventory / Content management systems / Administration / Information technology management

ANNEXURE 4: GUIDELINES FOR THE DEVELOPMENT OF A RECORDS MANAGEMENT POLICY AND EXAMPLE OF A RECORDS MANAGEMENT POLICY

Add to Reading List

Source URL: www.national.archives.gov.za

Language: English - Date: 2008-04-23 04:30:42
183Security / Data privacy / Health Insurance Portability and Accountability Act / Computer security / Data security / Protected health information / Information security / Confidentiality / Medical privacy / Ethics / Privacy law / Privacy

Administrative Manual Policy Name Policy Number Date this Version Effective Responsible for Content

Add to Reading List

Source URL: www.med.unc.edu

Language: English - Date: 2009-10-29 13:56:14
184Environment / Energy policy / Energy Action Coalition / Energy conservation / Sustainable energy / Energy industry / Low-carbon economy / Energy development / Energy security / Energy economics / Energy / Technology

National Energy Strategy 2030 content foreword

Add to Reading List

Source URL: 2010-2014.kormany.hu

Language: English - Date: 2012-02-15 04:40:42
185Clickjacking / Policy / Computer virus / Computing / Cross-platform software / JavaScript

Reining in the Web with Content Security Policy Sid Stamm Brandon Sterne Gervase Markham

Add to Reading List

Source URL: research.sidstamm.com

Language: English - Date: 2010-04-28 14:47:18
186Administration / Public records / Security / Records management / Government / Data security / Identity theft / Government procurement in the United States / Business continuity / Information technology management / Content management systems / Business

REGENTS’ POLICY PART V – FINANCE AND BUSINESS MANAGEMENT Chapter[removed]Business Practices P05[removed]Printing Standards: General Statement. Publications produced by and for the university will be simple, low in co

Add to Reading List

Source URL: www.alaska.edu

Language: English - Date: 2013-07-01 19:28:11
187Pharmaceuticals policy / Quality management system / Health / Business / Data security / Pharmaceutical industry / Food safety / Good manufacturing practice

Untitled Document This content was archived on June 24, 2013. Archived Content Information identified as archived on the Web is for reference, research or recordkeeping purposes. It

Add to Reading List

Source URL: www.hc-sc.gc.ca

Language: English - Date: 2013-07-09 17:13:11
188Digital media / Technology / Marketing / Internet privacy / Internet / Public library / Library / Content-control software / Information security / Internet ethics / Library science / Internet censorship

Township of Athens Public Library Township of Athens Public Library Policy Type: Operational

Add to Reading List

Source URL: www.athenslibrary.ca

Language: English - Date: 2014-01-25 12:41:25
189Government / Data privacy / Policy / Privacy policy / Internet privacy / Electronic health record / Info Source / Personally identifiable information / Privacy Office of the U.S. Department of Homeland Security / Ethics / Privacy law / Privacy

Untitled Document This content was archived on June 24, 2013. Archived Content Information identified as archived on the Web is for reference, research or recordkeeping purposes. It

Add to Reading List

Source URL: hc-sc.gc.ca

Language: English - Date: 2013-06-24 09:36:15
190System software / Content management systems / Healthcare reform in the United States / Medicare / Presidency of Lyndon B. Johnson / Federal Information Security Management Act / Laptop / Information security / Conversational Monitor System / Computer security / Computing / Security

Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE ACCEPTABLE USE OF CMS DESKTOP/LAPTOP AND

Add to Reading List

Source URL: www.cms.gov

Language: English - Date: 2013-08-07 15:49:46
UPDATE