Security level management

Results: 626



#Item
451Management / Security / Actuarial science / Information Technology Infrastructure Library / Software development process / Risk management / Business case / Program assurance / Project management / Information technology management / Business

Centrally Commissioned Processes and Reviews for the Australian Government High-Level Overview

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2013-11-18 17:50:14
452Health informatics / International standards / Nursing informatics / Standards organizations / Office of the National Coordinator for Health Information Technology / Health Level 7 / Privacy policy / Consent management / Electronic health record / Health / Medicine / Medical informatics

Privacy & Security Tiger Team: Input on C/A workgroup recommendations for behavioral health & CEHRT

Add to Reading List

Source URL: www.healthit.gov

Language: English - Date: 2014-07-15 15:34:35
453United States Department of Homeland Security / Incident management / Disaster preparedness / Humanitarian aid / Occupational safety and health / National Incident Management System / Federal Emergency Management Agency / California Emergency Management Agency / Incident Command System / Emergency management / Public safety / Management

Standardized Emergency Management System (SEMS) Guidelines Part I. System Description Section F State Level

Add to Reading List

Source URL: www.calema.ca.gov

Language: English - Date: 2014-08-13 13:00:37
454Business software / Issue tracking system / Network operations center / Network On Chip / Backup / Ticket / Electronics / Business / Network management / Data security / Electronic engineering

Position Profile Job Title: NOC Technician Level 1 Effective Date: [removed]Organizational Structure Reports To: NOC (Network Operations Center) Supervisor

Add to Reading List

Source URL: www.digitalwest.net

Language: English - Date: 2014-07-18 15:33:41
455Management / Corporate governance / Security / Process management / Internal control / Audit / Business process / Information security / Entity-level controls / Auditing / Business / Corporations law

2007 Annual Report, Segment 4 - Freddie Mac

Add to Reading List

Source URL: www.freddiemac.com

Language: English
456Security / Risk / Emergency management / Biosafety level / Biological hazard / Emergency / Safety / Prevention / Biology

BIOLOGICAL SPILL Hazard Specific - 4 Revision: November 21, 2011 Supersedes: August 2009

Add to Reading List

Source URL: cert.arizona.edu

Language: English - Date: 2013-05-09 14:33:12
457Ethics / Business / Security / Financial institutions / Institutional investors / Service-level agreement / Risk management / Insurance / Risk / Information technology management / Management / Actuarial science

ENTERPRISE GOODS & SERVICES RISK MANAGEMENT SERVICE LEVEL AGREEMENT (SLA)

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2014-01-31 19:06:48
458Risk / Internal control / Internal audit / Management / Central Intelligence Agency / Information security management system / Entity-level controls / Committee of Sponsoring Organizations of the Treadway Commission / Auditing / Accountancy / Business

Office of the State Controller Self-Assessment of Internal Controls Control Environment Objectives and Risks Agency ____________________________

Add to Reading List

Source URL: www.ncosc.net

Language: English - Date: 2011-05-22 11:30:09
459Firefighting in the United States / Wildland fire suppression / United States Department of Homeland Security / Incident management / National Response Framework / National Interagency Fire Center / National preparedness level / Wildfire suppression / Firefighter / Public safety / Firefighting / Emergency management

Emergency Support Function #8 – Public Health and Medical Services Annex

Add to Reading List

Source URL: www.fema.gov

Language: English - Date: 2012-07-19 08:45:56
460Management / Public safety / National security / National Institute of Standards and Technology / Standards for Security Categorization of Federal Information and Information Systems / Threat / Risk / Information sensitivity / Reputation / Computer security / Security / Data security

Federal Identity, Credential, and Access Management Trust Framework Solutions Determination of Identity Assurance Level Requirement for Agency Applications Accepting FICAM TFS Approved Third Party Credentials Version 1.0

Add to Reading List

Source URL: www.idmanagement.gov

Language: English - Date: 2014-06-20 10:43:56
UPDATE