Security information management

Results: 13712



#Item
861Records management / Internet privacy / Business / Computing / Accountability / Computer file / Inter-process communication / Freedom of information legislation

Guidelines for local storage of personnel files Introduction Monash University is committed to ensuring the privacy and security of Monash staff personnel files. In accordance with the Privacy and Data Protection Act 201

Add to Reading List

Source URL: www.privacy.monash.edu.au

Language: English - Date: 2015-01-14 17:55:22
862Ethics / Information / Security / Privacy / Data erasure / Shred / Paper shredder / Backup / Internet privacy / Computing / Data security / Data management

DATA BYTE Captricity for Enterprise Data Privacy, Security & Disaster Recovery Overview Secure, HIPPA-compliant enterprise data transformation is our specialty at Captricity. We realize the sensitive nature of your busi

Add to Reading List

Source URL: captricity.com

Language: English - Date: 2014-10-28 11:45:41
863Computer security / Public safety / Information technology management / Data security / Information security / Information privacy / Data governance / Data Protection Act / Security / Crime prevention / National security

The GoodCorporation Data Protection Framework GoodCorporation has developed this framework to help organisations ensure that all personal data they obtain in the course of their operations is properly protected and is us

Add to Reading List

Source URL: goodcorporation.com

Language: English - Date: 2015-04-07 10:16:36
864Identity management / Social issues / Government / Westpac / Internet privacy / Information security / Personally identifiable information / Online shopping / P3P / Ethics / Security / Privacy

RAMS Privacy Policy When you trust us with your personal information, you expect us to protect it and keep it safe. We are bound by the Privacy ActCth) (‘Privacy Act’) and will protect your personal informatio

Add to Reading List

Source URL: www.rams.com.au

Language: English - Date: 2014-12-04 20:29:31
865Information / Business intelligence / Business software / Marketing / Location intelligence / Data quality / Geo / Microsoft Dynamics GP / Enterprise asset management / Business / Intelligence / Data management

Unlocking Business Value in Government with Location Economics Citizens rely on government agencies for public safety, security and services. With Canada’s increasingly high annual population growth, agencies must be p

Add to Reading List

Source URL: offers.dmtispatial.com

Language: English - Date: 2015-05-25 10:17:10
866Data security / Business / ISO/IEC 27001 lead auditor / Computer security / ISO/IEC 27001 / Information security management system / Audit / Business continuity / Internal audit / Risk / Auditing / Security

PDF Document

Add to Reading List

Source URL: bascertification.com

Language: English - Date: 2013-06-04 08:15:33
867Global Monitoring for Environment and Security / Space policy of the European Union / Geographic information system / Geospatial analysis / Science / Situation awareness / Geography / Geospatial intelligence / Geographic information systems in geospatial intelligence / Cartography / Geodesy / European Space Agency

USE OF SPACE APPLICATIONS IN HUMANITARIAN OPERATIONS Report from the workshop Warsaw, 17-18 May 2012 During a large scale crisis effective management of the situation requires not only mobilisation of necessary resources

Add to Reading List

Source URL: swfound.org

Language: English - Date: 2012-12-13 10:18:23
868Security / Software testing / Data security / Metasploit Project / Rapid7 / Information security / Vulnerability / Penetration test / Security risk / Computer security / Computer network security / Cyberwarfare

Risk Visibility and Management: How IT Security Teams Can Enable Speed With Control The world rotates around the sun at a speed of 67,000 miles per hour. That can feel slow when compared to how fast organizations need t

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-03-26 20:54:42
869Actuarial science / Business / Risk management / Security / Internal audit / Finance / Audit / Enterprise risk management / Information technology audit process / Auditing / Management / Risk

FINANCE AND TREASURY How to handle financial risk – a brief guide for directors “Risk comes from not knowing what you’re doing.” – Warren Buffet

Add to Reading List

Source URL: www.cpaaustralia.com.au

Language: English
870Public safety / Crime prevention / Computer security / Information security management system / Biometrics / ISO/IEC 27001 / Corporate governance of information technology / Information security / Surveillance / Security / Data security / National security

CASE STUDY The Voice of Security Top voice biometric specialist secures ISO27001 re-certification VoiceVault is a specialist industry leader in the provision of voice-based biometric

Add to Reading List

Source URL: certificationeurope.co.uk

Language: English - Date: 2012-11-14 08:34:55
UPDATE