Network security policy

Results: 1254



#Item
671Computer network security / Authorization / Access control / Digital Terrestrial Multimedia Broadcast / Security controls / Computer network / Information security / Computer security / Security / Data security

State of Michigan Administrative Guide to State Government POLICY 1335 Information Technology Access Control Issued: April 12, 2007 Revised: March 21, 2012

Add to Reading List

Source URL: www.michigan.gov

Language: English - Date: 2012-12-07 19:44:32
672Internet / Hanover / Technology / Electronics / Network security / Acceptable use policy / Digital media / Computer network / Telecommunications engineering

Policy: 7188 NETWORK AND INTERNET SAFETY FOR STUDENTS The New Hanover County School system’s wide area network (WAN) connects thousands of users to electronic information, communication tools, and the World Wide Web. T

Add to Reading List

Source URL: www.nhcs.net

Language: English - Date: 2012-04-23 15:26:28
673Computing / Quality assurance / Computer network security / Security controls / Information security / Certification and Accreditation / Accreditation / IT risk management / Federal Information Security Management Act / Computer security / Data security / Security

Policy Summary No. 23 Security Certification and Accreditation Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-28 18:16:00
674Computer network security / Computer security / Crime prevention / National security / Secure communication / United States Department of Homeland Security / International Multilateral Partnership Against Cyber Threats / Government / Computer crimes / Security / Public safety

UPDATED – Analysis of the Cybersecurity Information Sharing Act of 2014: A Major Step Back on Privacy Robyn Greene, Policy Counsel The Cybersecurity Information Sharing Act of[removed]CISA) (S[removed]i takes a significant

Add to Reading List

Source URL: oti.newamerica.net

Language: English - Date: 2014-07-11 18:34:27
675Security / McAfee / Antivirus software / Companies listed on the New York Stock Exchange / Vulnerability / Threat / Spyware / McAfee VirusScan / Host Based Security System / Cyberwarfare / Computer security / Computer network security

Data Sheet McAfee Embedded Control—Retail System integrity, change control, and policy compliance for retail point‑of‑sale systems McAfee® Embedded Control for Retail maintains the integrity of your point-of-sale

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:52:49
676Health informatics / International standards / Computer network security / Identity / Identity management / Authentication / Patient portal / Personal health record / Password / Health / Computer security / Security

HIT Policy Committee Transmittal Letter, May 3, 2013

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2013-08-15 17:16:50
677Computer network security / Mobile computers / Mobile technology / Electronics / Mobile virtual private network / Mobile business intelligence / Technology / Provisioning / Telecommunications

Mobile Device Acceptable Use Policy

Add to Reading List

Source URL: www.wcccd.edu

Language: English - Date: 2012-12-11 12:28:44
678Computing / Computer network security / Information security / Security controls / Network Access Control / Security policy / Information security management system / HITRUST / Computer security / Data security / Security

Enterprise Information Security Policies

Add to Reading List

Source URL: www.tennessee.gov

Language: English - Date: 2014-04-21 13:24:29
679Risk / Data security / Risk management / Computer network security / Security controls / Information security / IT risk / Security risk / Vulnerability / Computer security / Security / Management

Policy Summary No. 7 Security Threat and Risk Assessment Information Security Branch, Office of the Chief Information Officer Ministry of Citizens’ Services, Province of British Columbia http://www.cio.gov.bc.ca/cio/in

Add to Reading List

Source URL: www.cio.gov.bc.ca

Language: English - Date: 2013-03-27 20:17:13
680Public administration / Computing / Digital Postmarks / Postal system / E-Authentication / General Services Administration / Authentication / United States Postal Service / Email / Security / Technology / Computer network security

GSA’s Secure Transport Service makes it possible for every agency to meet the new GSA/OMB e-Authentication Policy The General Service Administration’s (GSA) Secure Transport Service (STS) makes possible production us

Add to Reading List

Source URL: www.fda.gov

Language: English - Date: 2003-12-22 17:39:50
UPDATE