Information governance

Results: 9000



#Item
191Law / Discovery / Information governance / Records management / Motion in United States law / Government / Motion to compel / Deposition / Lawsuit / United States House of Representatives / Common law / Civil discovery under United States federal law

IN THE SUPREME COURT OF ALABAMA November 4, 2009 ORDER IT IS ORDERED that Rule 16, Rule 26, Rule 33(c), Rule 34, Rule 45, and Form 51A, Alabama Rules of Civil Procedure, be amended to read in accordance with Appendices A

Add to Reading List

Source URL: judicial.alabama.gov

Language: English - Date: 2009-11-05 14:32:28
192Computing / Information technology / Information / Data management / Data warehousing / Business intelligence / Business software / Data visualization / Information technology governance / SAS / Dashboard / Institutional research

UGA’s Strategic Planning Dashboard

Add to Reading List

Source URL: oir.uga.edu

Language: English - Date: 2015-10-06 12:56:53
193Information and communication technologies for development / Internet / Internet Governance Forum / Internet governance / World Summit on the Information Society

UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT Chairman’s draft recommendations on the basis of the consolidated version of the rolling document

Add to Reading List

Source URL: www.umic.pt

Language: English - Date: 2012-03-26 05:23:46
194Internet / Computing / Internet in the United States / Domain name system / Internet Assigned Numbers Authority / Internet governance / ICANN / DNS root zone / Regional Internet registry / Internet Architecture Board / IANA / Domain name

Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions from the U.S. Commerce Department’s National Telecommunications and Information Administration (NTIA) to the Global Mul

Add to Reading List

Source URL: www.ianacg.org

Language: English - Date: 2015-10-29 09:16:24
195Security / Prevention / Safety / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Internet privacy

CROWD VALLEY Security Policies Updated 22nd October 2015

Add to Reading List

Source URL: crowdvalley.com

Language: English - Date: 2016-08-04 10:56:39
196Politics / Technology / Open government / Structure / E-commerce / Information technology / E-government / Digital Single Market / European Single Market / E-governance / Social enterprise / E-democracy

Jobs and Growth through the Digital Economic Model The Digital Single Market Strategy, sioned by the European Parliament.

Add to Reading List

Source URL: europeanmovement.eu

Language: English - Date: 2016-05-10 06:26:55
197Enterprise application integration / Software engineering / Architectural pattern / Service-oriented architecture / Thomas Erl / Information technology management / Computing / Service-orientation / Service-oriented / Information technology governance / SOA governance / Service-oriented infrastructure

SOACP Module 1: Fundamental SOA & Service-Oriented Computing This course provides a well-rounded, end-to-end overview of service-oriented computing, service-orientation and SOA. Attendees benefit from this fundamental co

Add to Reading List

Source URL: www.soaschool.com

Language: English - Date: 2015-12-04 15:27:05
198Internet / Regional Internet registries / Computing / Rseaux IP Europens Network Coordination Centre / AFRINIC / Internet governance / ICANN / Internet Governance Forum / Latin America and Caribbean Network Information Centre / NetMundial Initiative / Asia-Pacific Network Information Centre / American Registry for Internet Numbers

NRO Update To be the flagship and global leader for collaborative Internet number resource management as a central element of an open, stable and secure Internet

Add to Reading List

Source URL: ripe69.ripe.net

Language: English - Date: 2014-11-07 03:59:26
199Security / Prevention / Computer security / Identification / Cryptography / Crime prevention / Information governance / National security / Common Criteria / Biometrics / Protection Profile / Fingerprint

Biometric Spoof Detection in the Context of Common Criteria Frank Grefrath, German Federal Office for Information Security Nils Tekampe, TÜV Informationstechnik GmbH 11. ICCC, September 2010, Turkey

Add to Reading List

Source URL: www.yourcreativesolutions.nl

Language: English - Date: 2010-08-25 09:46:40
200Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
UPDATE