Protected computer

Results: 695



#Item
341Login / Computer security / SAP Logon Ticket / Password policy / Password / Access control / Security

LOG ON FEPMIS User account It is important to maintain and protect the security of the program. User names and passwords are assigned to individuals, and should be protected. Not under any circumstance should a user name

Add to Reading List

Source URL: www.isp.idaho.gov

Language: English - Date: 2014-02-18 10:37:36
342Criminal law / Computer network security / Cybercrime / Protected computer / Government / Computer Fraud and Abuse Act / United States Code / National Information Infrastructure Protection Act / Computer law / Law / Information technology audit

PUBLIC LAW[removed]—OCT. 16, [removed]STAT[removed]Public Law[removed]99th Congress

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-04-24 15:26:09
343Computer network security / Wireless networking / Wireless / Cryptographic protocols / IEEE 802.11 / BlackBerry / Wireless security / Wi-Fi Protected Access / Wi-Fi / Computing / Technology

  Blackberry  OS   [removed].

Add to Reading List

Source URL: oit.ua.edu

Language: English - Date: 2012-08-28 10:04:03
344Law / Protected health information / Tuscola / Privacy / Health / Computer security / Data security / Privacy law / Data privacy / Health Insurance Portability and Accountability Act

Tuscola County Health Department (TCHD) Request for Additional Restrictions on the Use and Disclosure of Protected Health Information (PHI) by Individuals To be filled out by the individual or authorized representative r

Add to Reading List

Source URL: www.tchd.us

Language: English - Date: 2013-06-26 11:01:03
345Data security / Privacy law / Privacy / National security / Health Insurance Portability and Accountability Act / Information security / Information privacy / Chief privacy officer / Internet privacy / Ethics / Security / Computer security

POLICY NUMBER[removed]July 8, 2014 POLICY: BREACHES OF PRIVACY & SECURITY OF PROTECTED HEALTH

Add to Reading List

Source URL: policies.uchc.edu

Language: English - Date: 2014-08-15 13:13:38
346Public safety / Computer security / Data security / Information security / Employee engagement / Vulnerability / Security / Crime prevention / National security

A GUIDE FOR ORGANISATIONS What is security culture? “How could this happen? The system is protected by state-of-the-art security technology meaning it is virtually impossible to access without entering the correct pass

Add to Reading List

Source URL: www.cpni.gov.uk

Language: English - Date: 2014-07-29 09:35:16
347Data privacy / Computer security / Health Insurance Portability and Accountability Act / Data security / Privacy / Data breach / Protected health information / Confidentiality / Ethics / Privacy law / Security

HIPAA AND ATTORNEYS: HOW IT APPLIES AND WHY YOU SHOULD CARE IN NEVADA

Add to Reading List

Source URL: nvbar.org

Language: English - Date: 2014-08-11 17:53:48
348Sex laws / United States Federal Sentencing Guidelines / United States federal law / Pornography / Protected computer / Human sexuality / Ages of consent in North America / Child pornography laws in the United States / Computer law / Law / Criminal law

Report to Congress: Federal Child Pornography Offenses - Appendix B

Add to Reading List

Source URL: www.ussc.gov.

Language: English - Date: 2014-01-08 18:19:10
349Cryptographic protocols / Data / Information / Internet protocols / Extensible Authentication Protocol / Wireless security / Wi-Fi Protected Access / TACACS+ / TACACS / Computer network security / Computing / Wireless networking

FIPS[removed]Security Policy for Cisco 4402 and 4404 Wireless LAN Controllers Feb 05, 2014 Version 4.1

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-10 13:05:34
350Virtual memory / Central processing unit / Memory management / CPU cache / Translation lookaside buffer / Solid-state drive / Cache / Page table / Computer data storage / Computer hardware / Computer memory / Computing

A Protected Block Device for Persistent Memory Feng Chen Louisiana State University [removed] Michael P. Mesnier

Add to Reading List

Source URL: storageconference.us

Language: English - Date: 2014-06-07 16:49:20
UPDATE