Security information management

Results: 13712



#Item
561Information technology management / Data management / Crime prevention / National security / Backup / Off-site data protection / Data remanence / Computer security / Data center / Computing / Security / Data security

OFFSITE DATA PROTECTION FIVE BEST PRACTICES FOR PROTECTING BACKUP DATA Backup encryption should be one of many activities that formulate a comprehensive security strategy. In many environments, storage has operated outs

Add to Reading List

Source URL: www.ironmountain.ro

Language: English
562Information / Data management / Backup / Data security / Remote backup service / Data deduplication / Disk staging / Disk-to-disk / Storage efficiency / Backup software / Computing / Information technology management

The Storage Paradigm Shift: Surviving the Data Explosion with Disk- and Tape-Based Data Protection

Add to Reading List

Source URL: www.tentonmarketing.com

Language: English - Date: 2014-12-17 12:51:00
563Privacy / Security / Identity management / Social issues / Policy / Privacy policy / University of California / Cloud computing / Information security / Association of Public and Land-Grant Universities / Ethics / Computing

UC SANTA BARBARA POLICY AND PROCEDURE Guidelines Concerning Click-Through Agreements Contact: Policy Office - Administrative Services; Information Security - Enterprise Technology Services; Procurement Services - Adminis

Add to Reading List

Source URL: www.policy.ucsb.edu

Language: English - Date: 2015-06-10 20:22:42
564Section 508 Amendment to the Rehabilitation Act / Accessibility / PDF/UA / Website / Web content / Software / Technology / Content management systems / Web accessibility / World Wide Web

Social  Security  Administration     Agency  Comments  on  Docket  #ATBCB-­2015-­0002,  Information   and  Communication  Technology  (ICT)  Standards  and  Guidelines

Add to Reading List

Source URL: law.resource.org

Language: English - Date: 2015-05-28 16:05:35
565Personal life / Socioeconomics / Application for employment / Background check / Dismissal / Social Security / Résumé / Employment / Recruitment / Management

TOWN OF YORK, MAINE APPLICATION FOR EMPLOYMENT Thank you for your interest in employment with the Town of York. General Information and Instructions 1.

Add to Reading List

Source URL: www.agamenticus.org

Language: English - Date: 2015-03-18 11:36:24
566Government / Emergency management / Visa Waiver Program / Homeland security / National security / Sensitive Security Information / United States Department of Homeland Security / Public safety / Law enforcement in the United States

Statement for the Record The Honorable Francis X. Taylor Under Secretary, Office of Intelligence and Analysis U.S. Department of Homeland Security

Add to Reading List

Source URL: docs.house.gov

Language: English - Date: 2015-06-01 09:45:21
567Identity management / Social issues / Government / Data privacy / Internet privacy / Credit card / Personally identifiable information / FTC Fair Information Practice / Privacy policy / Ethics / Privacy / Law

FIRST DATA CANADA LTD. PRIVACY PRINCIPLES At First Data Canada Ltd. (“First Data”, “we”, “us” or “our”), we know that the accuracy, confidentiality, security, and privacy of personal information is import

Add to Reading List

Source URL: cloud1.firstdata.com

Language: English - Date: 2015-07-18 15:48:12
568National Archives of Scotland / New Town /  Edinburgh / Records management / Mental Welfare Commission for Scotland / Information security / NHS Scotland / Government / Business / Content management systems / Executive agencies of the Scottish Government / Security

Public Records (Scotland) Act 2011 Mental Welfare Commission for Scotland Assessment Report The Keeper of the Records of Scotland 20 August 2014

Add to Reading List

Source URL: www.nas.gov.uk

Language: English - Date: 2014-08-28 06:40:53
569Computer security / Data security / Intrusion detection system / Sguil / OSSIM / OSSEC / Security information and event management / System software / Computer network security / Software

INTRUSION DETECTION About the Course Knowledge Transfer

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:12:38
570Network management / Computer security / System administration / Internet protocols / Internet standards / OSSEC / Security information and event management / Security event manager / Log analysis / System software / Computing / Information technology management

Silensec documents RED CHUNGU 13_07_16_v4(web)

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:19:36
UPDATE