Security information management

Results: 13712



#Item
291Acceptable use policy / Information technology management / Internet access / Internet / Wireless security / Sumter County Library /  FL

Wireless Security Disclaimer & Internet Acceptable Use Policy • The Library’s wireless network is not secure. Information sent from your laptop can be captured by anyone else with a wireless device and the appropriat

Add to Reading List

Source URL: www.lockportlibrary.org

Language: English
292Standards organizations / Accreditation / Quality assurance / Professional certification / ISO/IEC JTC 1 / ISO 10303 / Information technology management / ISO/IEC 17025 / Cyber security standards

Extension of Scope Program Scope Extension CB Application for Accreditation FA 5031

Add to Reading List

Source URL: www.anab.org

Language: English - Date: 2016-07-15 09:15:56
293Security / Actuarial science / Project management / Risk management / Probability / Risk / Psychological resilience / Resilience / Resilience assurance

LEVERAGING RISK REGISTER INFORMATION FOR DEVELOPING RESILIENCE THROUGH RISK INTELLIGENCE 1 M.C. Leva and N. Balfe 1,2

Add to Reading List

Source URL: www.resilience-engineering-association.org

Language: English - Date: 2016-03-30 08:29:45
294Actuarial science / Risk management / Security / Auditing / Enterprise risk management / Information technology audit / Risk / Financial risk / ERM / Risk IT / IT risk management

Enterprise risk management for Corporates Sven Heiligtag September 14, 2012

Add to Reading List

Source URL: www.ccfz.ch

Language: English - Date: 2012-09-16 09:47:26
295Civil service in the United States / Data security / Personal life / Personally identifiable information / Privacy / United States Office of Personnel Management / Social Security number / Rsum / Object Process Methodology / United States Department of Education / United States federal civil service / Federal Resume

General Information Optional Application for Federal Employment – OF 612 You may apply for most Federal jobs with a résumé, an Optional Application for Federal Employment (OF 612), or other written format. If your r

Add to Reading List

Source URL: www.fmma30.com

Language: English - Date: 2015-03-18 10:15:24
296Identity management / Privacy / Law / Internet privacy / Money laundering / Information security / BNP Paribas / Information privacy

Privacy Policy in Respect of Handling of Personal Information

Add to Reading List

Source URL: cdn-pays.bnpparibas.com

Language: English - Date: 2016-03-07 03:01:02
297Bangladesh Institute of Bank Management / Banking in Bangladesh / Mora Banc Grup / Bangladesh / Mahbubur / Index of Bangladesh-related articles / Bayazid Sarker

RESEARCH MONOGRAPH 007 Information System Security in Banks: Bangladesh Perspective Md. Shihab Uddin Khan

Add to Reading List

Source URL: ssadmin.bibm.org.bd

Language: English - Date: 2014-08-19 02:58:03
298ISO/IEC 27001:2013 / Standards organizations / Information technology management / ISO/IEC 27001:2005 / Information security management system

ISO/IECCompliance Request for Information ISO/IECCompliance Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 08:09:40
299Computer access control / Identity management / Federated identity / Security / Computer security / Single sign-on / Authentication / Password / Information security / Privacy / Health Insurance Portability and Accountability Act / Electronic authentication

Privacy Implications for Single Sign-on Authentication In a Hospital Environment Rosa R. Heckle Wayne G. Lutters

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
300SoftQuad Software / Digital rights / Human rights / Identity management / Privacy / XMetaL / Privacy Office of the U.S. Department of Homeland Security / Chief privacy officer / Personally identifiable information

C:rsCKS~1DatamingtQuadtaL8ACKSO~1.XML

Add to Reading List

Source URL: docs.house.gov

Language: English
UPDATE