Network security policy

Results: 1254



#Item
881Crime prevention / Electronic commerce / National security / Secure communication / Public safety / National Cyber Security Division / International Cybercrime / Security / Computer network security / Computer security

TIA Cybersecurity Working Group Scope, Charter and Mission Scope: The scope of the TIA Cybersecurity Working Group encompasses all public policy issues related to the security of ICT equipment and services. Charter: The

Add to Reading List

Source URL: www.tiaonline.org

Language: English - Date: 2013-10-23 12:01:45
882Computing / Technology / Content-control software / Computer network security / Privacy / Internet censorship / Michael Posner / Global Network Initiative / Global Internet Freedom Task Force / Ethics / Computer law / Censorship

Promoting Global Internet Freedom: Policy and Technology

Add to Reading List

Source URL: ipmall.info

Language: English - Date: 2014-05-23 13:47:55
883Media technology / New media / Scientific revolution / Virtual reality / Walla! / Network security / Technology / Digital media / Digital technology / Internet

Microsoft Word - INTERNET-POLICY update.doc

Add to Reading List

Source URL: www.mrsc.org

Language: English - Date: 2008-07-10 14:38:02
884United States Department of Homeland Security / Cyberwarfare / Computer network security / Computer security / Secure communication / Monsanto / National Cyber Security Division / Security / Public safety / National security

April 26, 2013 Office of Policy Analysis and Development National Telecommunications and Information Administration U.S. Department of Commerce 1401 Constitution Avenue NW. Room 4725

Add to Reading List

Source URL: www.ntia.doc.gov

Language: English - Date: 2013-04-29 10:53:45
885Computer security / Public safety / Computer network / Telecommunications engineering / Computing / Network security / Server / Information security / Vulnerability / Security / Crime prevention / National security

Statewide Policy SUBJECT: Acceptable Use of State Information Assets NUMBER: [removed]

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 22:11:31
886United States Department of Defense / Military acquisition / Assistant Secretary of Defense for Networks and Information Integration / Network management / Science and technology in the United States / Under Secretary of Defense for Policy / Defense Intelligence Agency / Under Secretary of Defense for Acquisition /  Technology and Logistics / Defense Technical Information Center / United States federal executive departments / Military science / National security

DoD Directive[removed], October 18, 2012

Add to Reading List

Source URL: www.dtic.mil

Language: English - Date: 2012-10-18 09:02:59
887Computer network / Telecommunications engineering / Email / Home server / Password / Information security audit / Criticism of Facebook / Digital media / Technology / Internet

Oklahoma City University Computer Use Policy[removed]Introduction General

Add to Reading List

Source URL: www.okcu.edu

Language: English - Date: 2007-04-10 01:00:00
888Public economics / Computer network security / National Strategy for Trusted Identities in Cyberspace / Funding Opportunity Announcement / Economic policy / Federal grants in the United States / Grant / National Institute of Standards and Technology / Electronic submission / Grants / Federal assistance in the United States / Public finance

NSTIC Steering Group Secretariat Cooperative Agreement

Add to Reading List

Source URL: www.nist.gov

Language: English - Date: 2012-03-09 14:07:44
889Network architecture / Security / Cyberwarfare / Password / Access control / Remote access policy / Virtual private network / Mobile virtual private network / Computer network security / Computing / Internet privacy

Island County, WA - Remote Access Policy

Add to Reading List

Source URL: www.mrsc.org

Language: English - Date: 2013-06-19 16:49:07
890Public safety / Electronic commerce / Data security / Computer network security / Information security / Password policy / Password / Email / Network security / Security / Crime prevention / National security

ESPC Information Security Best Practices ESPC Member Companies (“Members” or “Companies”) believe that strong information security practices are essential to maintain trust in, and the viability of, the email eco

Add to Reading List

Source URL: www.espcoalition.org

Language: English - Date: 2011-09-19 13:28:06
UPDATE