Data security

Results: 28926



#Item
261Privacy of telecommunications / Information privacy / Privacy / European Union directives / Law / National security / General Data Protection Regulation / Telecommunications data retention / Data retention / Data Retention Directive / Data Protection Directive / Communications data

ARTICLE 29 DATA PROTECTION WORKING PARTY 16/EN WP 240 Opinionon the evaluation and review of the

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2016-07-28 04:40:29
262Computing / Software / Online backup services / Cloud storage / Data security / Data synchronization / File hosting / Cloud computing / Dropbox / ShareFile / Password / Google Drive

CLOUD ADOPTION RISK REPORT Table of Contents INTRODUCTION ........................................................................................................2 SENSITIVE DATA IN THE CLOUD ..........................

Add to Reading List

Source URL: info.skyhighnetworks.com

Language: English - Date: 2016-08-23 00:16:32
263Security / Prevention / Safety / Data security / Crime prevention / Cryptography / Information governance / National security / Information security / Vulnerability / Computer security

lead security analyst reporting to – head of information security direct reports – IT security analyst working hours – full time is 35 hours a week. You’ll agree your working pattern with your manager. the purpo

Add to Reading List

Source URL: financial-ombudsman.org.uk

Language: English - Date: 2016-02-24 11:29:57
264Prevention / Security / Legal documents / Safety / Contract law / Secrecy / Computer security / Data security / Government procurement in the United States / Confidentiality / Contract / Information security

Crown Contracts Confidentiality Policy

Add to Reading List

Source URL: 147.109.254.181

Language: English - Date: 2016-08-24 07:19:54
265Prevention / Security / Safety / Computer security / Crime prevention / Cryptography / Data security / Information security / National security / Internet privacy / Privacy

Student Affairs Data Block Access Policy Last amendedOverview /Purpose Data Stewards for The University of Georgia have entrusted the Department of Student Affairs Assessment and Staff Development (ASD) to

Add to Reading List

Source URL: asd.studentaffairs.uga.edu

Language: English - Date: 2016-06-21 13:25:33
266Computer security / Computing / Information technology management / Information technology / Data security / ISO/IEC 27000-series / ISO/IEC 20000 / ISO/IEC 27001:2013 / Security controls

Neue ISO 27004: Kennzahlen für Security

Add to Reading List

Source URL: sk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:06
267Backup software / Software / Computing / Data security / Veeam Backup & Replication / Backup / Remote backup service / Data deduplication / Backup Exec

 Save time with simple and intuitive Web interface and reliable product that does not require babysitting  Backup faster with LAN-free

Add to Reading List

Source URL: nakivo.com

Language: English - Date: 2016-08-02 11:29:46
268Economy / E-commerce / Payment systems / Money / Financial services / Information privacy / Payment cards / Merchant services / Payment Card Industry Data Security Standard / Credit card / Information security / Data security

PB&J Restaurants Information Security Policies and Procedures 1

Add to Reading List

Source URL: www.eatpbj.com

Language: English - Date: 2014-11-14 17:28:11
269Computing / Data management / Information science / Information / Data management plan / Data-intensive computing / Data center / Research data archiving / Data curation / Cloud computing security / Open data

Thoughts on data policy solutions and data-centric career paths Terence Critchlow SSDBM 2011

Add to Reading List

Source URL: ssdbm2011.ssdbm.org

Language: English - Date: 2011-09-01 19:47:29
270Government / Security / Criminal records / Law enforcement in the United States / Federal Bureau of Investigation / United States intelligence agencies / Law enforcement / Clarksburg /  West Virginia / FBI Criminal Justice Information Services Division / Law Enforcement National Data Exchange / Uniform Crime Reports / National Crime Information Center

Classification: CJIS Trainer/Auditor II (UCR) Title Code: V00672 Pay Range: 24 POSITION SUMMARY: This entry level position is responsible for training and auditing associated with the collection, use, application,

Add to Reading List

Source URL: www.mshp.dps.mo.gov

Language: English - Date: 2016-07-20 15:35:51
UPDATE