Security Information Service

Results: 3404



#Item
781Risk management / Computer security / Data security / Actuarial science / Vulnerability / Security risk / Security management / IT risk management / Information security / Security / Management / Risk

PROTECTING ART COLLECTIONS: A STRATEGIC APPROACH Inspector Richard Roberts Australian Protective Service, ACT

Add to Reading List

Source URL: www.aic.gov.au

Language: English - Date: 2009-06-04 14:36:35
782Data security / Prevention / Information technology management / Actuarial science / Risk management / Information security / Skills Framework for the Information Age / Government of South Australia / Security / Public safety / Computer security

Risk categories Risk category Sub categories Service delivery

Add to Reading List

Source URL: deta.qld.gov.au

Language: English - Date: 2014-03-31 02:57:11
783Technology / Information science / Telemedicine / Telecare / EHealth / Royal Flying Doctor Service of Australia / Center for Telehealth and E-Health Law / Health informatics / Telehealth / Health

MOBILE SECURITY STARTS FROM ME 流動資訊保安 由我做起 RICKY CHEUNG

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2015-01-15 02:02:06
784Computer law / Credit cards / Data privacy / Payment systems / Payment Card Industry Data Security Standard / Managed security service / Information security / Vulnerability / SecurityMetrics / Computer security / Security / Cyberwarfare

ISS Assessment Process Prepared by: Kelvin Heath, Chief Security Officer Vectra Corporation Ltd 17th October 2013 Vectra Corporation

Add to Reading List

Source URL: www.auda.org.au

Language: English - Date: 2014-07-13 21:29:34
785Research methods / Sociology / Business intelligence / ORC International / Census / Questionnaire / Orc / Information security / Australian Public Service / Statistics / Survey methodology / Science

2014 APS employee census 42227552895500Frequently asked questions

Add to Reading List

Source URL: www.apsc.gov.au

Language: English - Date: 2014-05-05 21:06:06
786Aviation security / Year of birth missing / Place of birth missing / Sensitive Security Information / United States government secrecy / United States federal executive departments / Federal Air Marshal Service / John S. Pistole / Transportation Security Administration / United States Department of Homeland Security / Security / National security

AVIATION SECURITY ADVISORY COMMITTEE (ASAC)

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2015-01-30 11:36:04
787National security / Crime prevention / Maritime security / United States Coast Guard / Computer security / Security guard / Information security management system / Sensitive security information / Security / Data security / Public safety

APPLICATION FORM FOR APPROVAL OF A MARITIME SECURITY PLAN FOR A PORT SERVICE PROVIDER

Add to Reading List

Source URL: www.infrastructure.gov.au

Language: English - Date: 2012-08-14 01:21:07
788Business / Administration / Public records / Records management / Data security / Accountability / Backup / Cloud computing / Computer file / Computing / Content management systems / Information technology management

RECORDS MANAGEMENT FOR ORGANISATIONS FUNDED UNDER THE SERVICE AGREEMENT 2012–2015: FACT SHEET 2: STORAGE Date: September 2014

Add to Reading List

Source URL: www.dhs.vic.gov.au

Language: English - Date: 2014-09-17 01:36:24
789Data privacy / Confidentiality / Journalism sourcing / Secrecy / Personally identifiable information / Internet privacy / Privacy / De-identification / Information security / Ethics / Applied ethics / Security

National Statistical Service Confidentiality 1

Add to Reading List

Source URL: nss.gov.au

Language: English - Date: 2015-02-25 19:38:48
790International economics / Offshoring / Telecommuting / Service-level agreement / Information security / Business process outsourcing / Outsourcing relationship management / Outsourcing / Business / Management

IT OUTSOURCING SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:29:56
UPDATE