Network security policy

Results: 1254



#Item
651Computer security / Data security / Computer network security / National security / Newcrest Mining / Human security / Security guard / Security / Crime prevention / Public safety

Standard Template for Newcrest Policy

Add to Reading List

Source URL: www.newcrest.com.au

Language: English - Date: 2014-07-25 02:08:57
652Computing / Internet / Data security / Computer security / Computer network security / Information security / Password / Internet privacy / Email / Security / Crime prevention / National security

[removed][removed][removed]New York State Information Technology Policy No: NYS-P14-001

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-27 10:29:56
653Software / Computer virus / Macro virus / Computer security / Computer worm / System software / Computer network security / Malware

SUSD #30 Computer Virus Detection Policy Introduction The number of computer security incidents and the resulting cost of business disruption and service restoration continue to escalate. Implementing solid security poli

Add to Reading List

Source URL: www.susd30.us

Language: English - Date: 2012-06-12 18:16:11
654System administration / Computer network security / Malware / Rogue software / Spyware / Superuser / Operating system / Vulnerability / Help desk / Computing / Espionage / Cyberwarfare

UL Lafayette Policy Governing the Granting of Administrative Rights to Faculty/Staff Workstations Administrator rights are typically reserved for University Computing Services (UCS) personnel who are responsible for prov

Add to Reading List

Source URL: helpdesk.louisiana.edu

Language: English - Date: 2013-07-29 15:20:44
655Technology / Public safety / Computer network security / Wireless / Cryptography / Information security / Mobile computing / Computer security / Password / Security / Crime prevention / National security

SUSD #30 Portable Computing Policy 1.0 Overview Portable computing devices are becoming increasingly powerful and affordable. Their small size and functionality are making them ever more desirable to replace traditional

Add to Reading List

Source URL: www.susd30.us

Language: English - Date: 2012-06-12 18:58:07
656Computer network security / Crime prevention / National security / Data security / Vulnerability / Information security / Social vulnerability / SAINT / Critical infrastructure protection / Security / Computer security / Cyberwarfare

Responsible University Officer Chief Information Officer Responsible Office Information Technology Services Vulnerability Management Policy

Add to Reading List

Source URL: its.unc.edu

Language: English - Date: 2014-08-14 10:38:45
657Wireless / Wireless LAN / Service set / Wireless access point / Internet Authentication Service / RADIUS / Computer network / Wireless security / Cracking of wireless networks / Wireless networking / Technology / Computing

CSM Wireless Policy 1.0 Purpose This policy prohibits access to College of Saint Mary (CSM) networks via unsecured wireless communication mechanisms. Only wireless systems that meet the criteria of this policy are approv

Add to Reading List

Source URL: www.csm.edu

Language: English - Date: 2014-07-16 13:12:16
658Cyberwarfare / Crime prevention / National security / Computer network security / Information security / Security controls / Vulnerability / ISO/IEC 27002 / Information security management system / Security / Computer security / Data security

Responsible University Officer Chief Information Officer Responsible Office Information Technology Services Information Security Liaison Policy

Add to Reading List

Source URL: its.unc.edu

Language: English - Date: 2014-08-14 10:38:34
659Broadband / Acceptable use policy / Computer security / Etiquette / Merit Network / Network service / Server / National Science Foundation Network / Computer network / Computing / Internet / Electronics

andrew johnson Today, 9:38 AM CAMPUS NETWORK AND INTERNET ACCESS ACCEPTABLE USE AGREEMENT - Jan 03, 2001 In an effort to provide useful and efficient service to our users and to ensure the reliability and security of our

Add to Reading List

Source URL: www.ncmich.edu

Language: English - Date: 2013-12-12 18:50:45
660Computer law / Computer security / Email / New media / Scientific revolution / Legal aspects of computing / Information security / Network security / Computer network / Technology / Computing / Internet

STATEWIDE INTERNET USAGE POLICY The Department of Information Technology POLICY STATEMENT Each agency shall define and implement an acceptable Internet use policy for its employees to facilitate the efficient and product

Add to Reading List

Source URL: dfeh.ca.gov

Language: English - Date: 2011-04-12 19:46:15
UPDATE