Security Information Service

Results: 3404



#Item
371National security / Computer network security / Government / Information Risk Management / Risk analysis / National Offender Management Service / National Probation Service / Asset / TRAC / Security / Computer security / Data security

IT Security Policy This instruction applies to:- Reference:- Prisons

Add to Reading List

Source URL: www.justice.gov.uk

Language: English - Date: 2014-05-22 13:21:08
372Cyberwarfare / Crime prevention / National security / FireEye /  Inc. / Information security / Attack / Threat / Computer network security / Security / Computer security

Leading Global Digital Communications Specialist Implements FireEye as a Service to Protect Clients from Advanced Attackers C U S T O M E R

Add to Reading List

Source URL: www.fireeye.fr

Language: English - Date: 2015-04-30 15:17:11
373Public safety / Cyberwarfare / Computer law / Federal Information Security Management Act / United States Computer Emergency Readiness Team / Einstein / Managed Trusted Internet Protocol Service / National Cyber Security Division / International Cybercrime / United States Department of Homeland Security / Security / Computer security

fEDERAL iNFORMATION sECURITY MANAGEMENT ACT

Add to Reading List

Source URL: www.whitehouse.gov

Language: English - Date: 2015-02-27 17:46:21
374Government / Employment / Recruitment / Vetting / Security clearance / National Offender Management Service / Criminal record / National Probation Service / Classified information in the United Kingdom / Security / Espionage / National security

National Security Framework: security vetting

Add to Reading List

Source URL: www.justice.gov.uk

Language: English - Date: 2014-06-03 07:03:46
375Portal software / Microsoft Office 365 / Calendaring software / Personal information managers / Application software / Microsoft Exchange Server / Microsoft Outlook / Cloud computing / Software / Microsoft SharePoint

Dimension Data China/Hong Kong Limited I. Service Category (A) Productivity Apps Table 1a: Productivity Apps Items (Service items passing all General, Security and Technical Requirements)

Add to Reading List

Source URL: www.infocloud.gov.hk

Language: English - Date: 2012-12-09 19:55:48
376Information security / NHS Constitution for England / Child care / Day care / Health

xix – Governance and Management of the Service (including confidentiality of records) Rationale and Policy Considerations

Add to Reading List

Source URL: www.stpaulsnt.catholic.edu.au

Language: English
377Business / Statement on Auditing Standards No. 70: Service Organizations / Audit / Financial audit / Information technology controls / Internal control / Security controls / Information security / External auditor / Auditing / Accountancy / Risk

SCHOOL BOARD OF SEMINOLE COUNTY, FLORIDA MANAGEMENT LETTER For The Year Ended June 30, 2010 INDEPENDENT AUDITOR’S MANAGEMENT LETTER Chairman and Members of

Add to Reading List

Source URL: www.myflorida.com

Language: English - Date: 2011-10-10 16:37:50
378National Health Service / Confidentiality / Journalism sourcing / Secrecy / Personally identifiable information / Patient Information Advisory Group / Caldicott Report / Applied ethics / Ethics / Security

Explanatory guidance Confidentiality: disclosing records for financial and administrative purposes 1 In our Confidentiality guidance, we advise that: 33

Add to Reading List

Source URL: www.gmc-uk.org

Language: English - Date: 2015-04-22 12:29:49
379United States Public Health Service / United States Department of Health and Human Services / United States Department of Homeland Security / Centers for Disease Control and Prevention / RHOB / Nicole Lurie / Rho / Medicine / Government / Health

HOUSE COMMITTEE ON APPROPRIATIONS Schedule for the Week of April *Schedule subject to change* (Refer to Committee Site for webcast information)

Add to Reading List

Source URL: appropriations.house.gov

Language: English - Date: 2015-04-13 16:01:07
380Payment systems / Computer network security / Computer security / Regulatory compliance / Payment card industry / Managed security service / Information security / Public safety / Clone Systems /  Inc. / Security / Credit cards / Data privacy

Microsoft Word - AMBIRON and TRUSTWAVE MERGE.doc

Add to Reading List

Source URL: www.ftvcapital.com

Language: English - Date: 2009-01-31 04:06:35
UPDATE