Security Information Service

Results: 3404



#Item
331Information technology audit / Mainframe computer / Information technology management / Risk / Auditing / Information technology audit process / Information security / Computer security / Data security / Security

DEPARTMENT OF CENTRAL MANAGEMENT SERVICES BUREAU OF COMMUNICATIONS AND COMPUTER SERVICES SERVICE ORGANIZATION CONTROL REPORT--- For the Year Ended: June 30, 2013 Release Date: July 2013 This Service Organization Control

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2013-07-24 10:25:00
332Legal professions / Law enforcement / Police / Security / Surveillance / Crown Office and Procurator Fiscal Service / Law / National security / Government

USING YOUR PERSONAL INFORMATION The Police Investigations and Review Commissioner (the PIRC) has differing functions under the Police, Public Order and Criminal Justice (Scotland) Act 2006 as amended by the Police and Fi

Add to Reading List

Source URL: www.pirc.scotland.gov.uk

Language: English - Date: 2015-03-24 10:06:56
333Crime prevention / National security / Public safety / Data security / Mainframe computer / Information technology management / Password / Computer security / Integrity / Security / Computer network security / Information technology audit

DEPARTMENT OF CENTRAL MANAGEMENT SERVICES BUREAU OF COMMUNICATIONS AND COMPUTER SERVICES SERVICE ORGANIZATION CONTROL REPORT--- For the Year Ended: June 30, 2012 Release Date: July 2012 This Service Organization Control

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2012-07-12 10:45:00
334Outsourcing / Quality of service / Streaming / Electronic engineering / Computing / Firewall / Service-level agreement / Management / Plusnet / Teletraffic / Telecommunications engineering / Computer network security

Critical Information Summary - Private Links This summary provides important information regarding OntheNet’s Private Links service. Full terms and conditions are available on our website www.onthenet.com.au/pdf/termsa

Add to Reading List

Source URL: www.onthenet.com.au

Language: English - Date: 2014-06-11 20:39:10
335Identity document / Email / Medical school / Security / Internet / Identification / Association of Commonwealth Universities / New Zealand / University of Otago

ITS Service Guidelines and Information University Username/ID Card /Library Access The University Username/ID Card/Library Access form is to request a username for people who are not members of staff (i.e., not on the U

Add to Reading List

Source URL: docushare.otago.ac.nz

Language: English
336Computing / Auditing / Methodology / Cloud computing / ISO / Information security / Transparency / Statement on Auditing Standards No. 70: Service Organizations / Regulatory compliance / Computer security / Security / Data security

Code of Practice for Cloud Service Providers This Code of Practice for Cloud Service Providers (‘Code’) from the Cloud Industry Forum (‘CIF’) is for organizations offering to customers remotely hosted IT services

Add to Reading List

Source URL: www.cloudindustryforum.org

Language: English - Date: 2015-01-28 05:04:13
337Security / Law enforcement / Firearms licence / Vetting / Criminal Records (Clean Slate) Act / Public records / Law / Knowledge / Criminal records / Employment / Recruitment

NZ Police Vetting Service Request and Consent Form The NZ Police Vetting Service Request and Consent form authorises the New Zealand Police to share information about you with Open Polytechnic. All information will be ke

Add to Reading List

Source URL: www.openpolytechnic.ac.nz

Language: English - Date: 2015-02-19 20:33:02
338Data security / Computer security / Crime prevention / Information security / National security / Emergency management / Business continuity planning / Business continuity / Disaster recovery / Public safety / Security / Management

BUSINESS CONTINUITY PLAN 1. Introduction The Office of the Information Commissioner (the Office) conducts business continuity planning an annual basis to ensure continuity of service in the event of human, technological

Add to Reading List

Source URL: www.oic.qld.gov.au

Language: English - Date: 2013-02-28 20:20:22
339Privacy / Ethics / Identity management / Social issues / Computer security / Personally identifiable information / Internet privacy / Information privacy / Software as a service / Computing / Cloud computing / Centralized computing

SECURITY & PRIVACY CHECKLIST FOR CLOUD SERVICE PROVIDERS IN HANDLING PERSONAL IDENTIFIABLE INFORMATION IN CLOUD PLATFORMS “Cloud001010010100101010100101001010

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2013-04-15 02:59:19
340Computer security / Denial-of-service attack / Intrusion prevention system / Firewall / Messaging Security / Bypass switch / Computer network security / Cyberwarfare / Computing

Network Intrusion Prevention System (IPS) The ability to monitor network traffic is a key component of protecting Fpweb.net’s information systems. Even still, defending those systems from the many threats can be a daun

Add to Reading List

Source URL: www.fpweb.net

Language: English - Date: 2014-12-23 16:56:42
UPDATE