Content Security Policy

Results: 234



#Item
41Ethics / Content management systems / Government / Administration / Information technology management / Information security / Records management / Personally identifiable information / Security controls / Security / Data security / Computer security

Records-and-information-management-policy-v2.0

Add to Reading List

Source URL: www.nzqa.govt.nz

Language: English - Date: 2015-03-17 15:54:31
42Government / Medicine / Content management systems / Administration / Information technology management / Records management / Freedom of information legislation / Queensland State Archives / Privacy / Ethics / Public records / Medical informatics

Records Management Policy Purpose: Training and Development Australia recognises the importance of privacy and security of personal details of all students, staff, clinic clients and customers.

Add to Reading List

Source URL: vocation.com.au

Language: English - Date: 2015-03-11 15:15:16
43Computing / Deep content inspection / Network security / Application firewall / Distributed firewall / Check Point / Computer network security / Computer security / Cyberwarfare

Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration the legiti

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:56
44Computer network security / Privacy / Internet activism / Technology / Computing / Great Firewall of China / Google China / Censorship / Citizen Lab / Content-control software / Internet censorship / Internet

Testimony of Rebecca MacKinnon Visiting Fellow, Center for Information Technology Policy, Princeton University Co-Founder, Global Voices Online (globalvoicesonline.org) At the hearing: “The Google Predicament:

Add to Reading List

Source URL: rconversation.blogs.com

Language: English - Date: 2010-03-10 08:13:58
45Energy development / Environment / Energy policy / Low-carbon economy / Carbon sequestration / Renewable energy / Carbon capture and storage / Energy industry / Energy security / Energy economics / Energy / Technology

EPPSA Annual ReportEuropean Power Plant Suppliers Association Content

Add to Reading List

Source URL: www.eppsa.eu

Language: English - Date: 2012-12-03 06:02:45
46HTTP / Computer security / Content Security Policy / Firefox / Website / Internet privacy / World Wide Web / Mozilla Add-ons / Bing / Software / Computing / Free software

Poster: UserCSP- User Specified Content Security Policies Kailas Patil Tanvi Vyas Frederik Braun

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2013-06-25 08:17:50
47Business / Administration / Accountability / Security / Medical informatics / Records management / Information security / Document management system / Medical record / Information technology management / Public records / Content management systems

SESLHD POLICY COVER SHEET NAME OF DOCUMENT Records Management

Add to Reading List

Source URL: www.seslhd.health.nsw.gov.au

Language: English - Date: 2012-11-11 22:17:56
48Public safety / Data security / Computing / Computer security / Information security / Internet privacy / Authorization / ISO/IEC 27002 / Internet / Security / Crime prevention / National security

Security Policy Extract This extract from the Western Power Security Policy is published on the Western Power Internet site to promote the policy content to external companies who may use Western Power’s IT facilities.

Add to Reading List

Source URL: westernpower.com.au

Language: English - Date: 2014-05-23 01:05:46
49Network security / Computer security / Content-control software / Information security audit / Password policy / Security / Computer network security / Password

Questions for technical support (especially e-safety) It is a school’s responsibility to ensure that their chosen technical support provider(s) carry out all the necessary measures to do with e-safety and other technic

Add to Reading List

Source URL: slp.somerset.gov.uk

Language: English - Date: 2012-06-13 05:25:03
50Business / Content management systems / Mass surveillance / National security / Public records / National Security Agency / Records management / Records life-cycle / Cascading Style Sheets / Administration / Information technology management / Surveillance

DOCID: [removed]UNCLASSIFIED//FOR OFFICIAL USE ONLY NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE NSA/CSS POLICY 1-6

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-07 00:20:42
UPDATE