Information security management system

Results: 3115



#Item
481Administration / Accountability / Project management / Records management / Electronic document and records management system / Enterprise content management / Document management system / Information security / Business continuity / Information technology management / Content management systems / Business

Key Considerations when Initiating and Implementing an Electronic Documents and Records Management System

Add to Reading List

Source URL: www.naa.gov.au

Language: English - Date: 2015-03-26 18:55:50
482Technology / Document management system / Title 21 CFR Part 11 / Electronic signature / Password / Portable Document Format / Validation / Active Directory / Information security / Computing / Pharmaceutical industry / Information technology management

White paper infoRouter in the Life Sciences Industry: 21 CFR Part 11 Compliance Overview of 21 CFR Part 11 The final version of the 21 CFR Part 11 regulation released by the FDA in 1997 provides a

Add to Reading List

Source URL: www.inforouter.com

Language: English - Date: 2015-03-26 12:06:42
483Management / Email / Risk management / X Window System / Software / Computing / Security

FILMING PERMIT APPLICATION FORM APPLICANT INFORMATION COMPANY DETAILS Company/Applicant Name (responsible for the filming): Does the company name match the name insured on the public liability insurance (PLI)?

Add to Reading List

Source URL: www.corangamite.vic.gov.au

Language: English - Date: 2015-02-02 19:01:17
484United States Department of Defense / Key management / Defense Information Systems Agency / SIPRNet / Public key infrastructure / Defense Enrollment and Eligibility Reporting System / Common Access Card / NIPRNet / Global Information Grid / Cryptography / Military communications / Wide area networks

DOD P ROGRAMS Public Key Infrastructure (PKI) Increment 2 Executive Summary • In September 2010, the National Security Agency (NSA) Senior Acquisition Executive approved the procurement of

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2012-01-17 12:15:00
485Development / Data security / Information security management system / World Trade Organization / United States Agency for International Development / Southern African Development Community / East African Community / Geneva / Africa / International trade / African Union

Standards Alliance Workshop on Building Institutional Capacity in the Use of Trade-Related International Support Measures (ISMs) November 17-24, 2014 Geneva Workshop on Building Institutional Capacity in the Use of Trade

Add to Reading List

Source URL: esango.un.org

Language: English - Date: 2014-12-03 15:17:59
486Computer security / Accountancy / Data security / Information technology governance / COBIT / Information Systems Audit and Control Association / Information security management system / Vulnerability / Certified Information Systems Auditor / Auditing / Information technology audit / Information technology management

Conference Progam & Key Events[removed]August , 2015 Sheraton on the Park – Elizabeth Street, Sydney Sunday 9th August Conference Registration

Add to Reading List

Source URL: www.oceaniacacs2015.org

Language: English - Date: 2015-04-08 01:47:21
487Software / Shibboleth / Identity management systems / Identity management / Security Assertion Markup Language / Java enterprise platform / Apache Tomcat / Internally displaced person / SAML 2.0 / Federated identity / Computing / System software

Migrating from Shibboleth 1 to Shibboleth 2 IdP Andy Swiffin, University of Dundee – [removed]Rev 1.2 Note: These case studies, prepared by member organisations of the UK federation, are provided for information purpos

Add to Reading List

Source URL: ukfederation.org.uk

Language: English - Date: 2010-06-03 13:48:37
488Computer security / Network management / System administration / VMware / Data security / Security information and event management / Accelops / VMware ESX / SolarWinds / Computing / Information technology management / System software

CASE STUDY Lenlyn Holdings Consolidates Security and IT Monitoring Tools with AccelOps Customer: Lenlyn Holdings PLC Industry: Financial Services

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-03-30 22:44:51
489Information technology audit / Computer security / Information security management system / Audit / Internal audit / Information security audit / Information security / Public safety / National security / Data security / Security / Auditing

ISO IEC[removed]Translated into Plain English

Add to Reading List

Source URL: www.praxiom.com

Language: English - Date: 2014-10-19 15:28:40
490Accountability / Freedom of Information Act / Right to Information Act / Information security management system / Law / India / Ethics / Freedom of information legislation / Freedom of information in the United Kingdom / Data security

Department of Sustainability, Environment, Water, Population and Communities Agency Plan

Add to Reading List

Source URL: laptop.deh.gov.au

Language: English - Date: 2013-03-17 22:54:35
UPDATE