Sensitive security information

Results: 1968



#Item
31

Payment Card Industry Data Security Standards (PCI DSS) Merchant Services Payment Card Processing Procedures The main contact and employees that will have access to sensitive payment card information are responsible for

Add to Reading List

Source URL: finance.fiu.edu

Language: English - Date: 2015-06-04 09:25:08
    32

    Customer Information Manager Customer Information Manager (CIM) simplifies data security and repeat transactions by storing customer profiles that include sensitive cardholder data on our secure servers. The profiles ca

    Add to Reading List

    Source URL: www.authorize.net

    Language: English
      33Transportation Security Administration / Transportation in the United States / United States Department of Homeland Security / Airport security / Sensitive Security Information / Security / Aviation security / Aftermath of the September 11 attacks

      GAO-15-704T, Aviation Security: TSA Has Taken Steps to Improve Vetting of Airport Workers

      Add to Reading List

      Source URL: www.gao.gov

      Language: English - Date: 2015-06-16 10:10:41
      34Staff / War in Afghanistan / NATO / Central Intelligence Agency / Military / International relations / International Security Assistance Force

      NON SENSITIVE INFORMATION RELEASABLE TO THE PUBLIC RS Media Ground Rules For the safety and security of RS Forces and embedded media, media will adhere to the below established ground rules. These ground rules will be ag

      Add to Reading List

      Source URL: www.rs.nato.int

      Language: English - Date: 2015-06-02 08:53:37
      35Government / Emergency management / Visa Waiver Program / Homeland security / National security / Sensitive Security Information / United States Department of Homeland Security / Public safety / Law enforcement in the United States

      Statement for the Record The Honorable Francis X. Taylor Under Secretary, Office of Intelligence and Analysis U.S. Department of Homeland Security

      Add to Reading List

      Source URL: docs.house.gov

      Language: English - Date: 2015-06-01 09:45:21
      36Internet privacy / Law / United States government secrecy / Privacy / Attorney-client privilege / Government / United States Department of Justice v. Reporters Committee for Freedom of the Press / Sensitive Security Information / Privacy law / Privacy Act / United States administrative law

      Plaintiffs Motion for Preliminary Injunction - Reply

      Add to Reading List

      Source URL: www.ecoesq.com

      Language: English - Date: 2012-11-28 23:27:01
      37Oracle Corporation / Oracle Database / Leakage / Computer security / Information leakage / Software / Security / Electrical engineering

      Precise Enforcement of Progress-Sensitive Security Scott Moore, Aslan Askarov, and Stephen Chong Harvard School of Engineering and Applied Science {sdmoore,aslan,chong}@seas.harvard.edu Abstract Program progress (or term

      Add to Reading List

      Source URL: csf2012.seas.harvard.edu

      Language: English - Date: 2012-07-05 18:15:11
      38Scheduling algorithms / Operations research / Planning / Scheduling / Thread / Parallel computing / Information flow / Lock / Actor model / Computing / Concurrent computing / Concurrency

      2011 IEEE Symposium on Security and Privacy Timing- and Termination-Sensitive Secure Information Flow: Exploring a New Approach Vineeth Kashyap

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2011-04-10 18:07:04
      39Maritime security / United States Coast Guard / Security guard / Airport security / International Ship and Port Facility Security Code / Sensitive Security Information / Sector Commander / Security / Public safety / Crime prevention

      Status: This is the original version (as it was originally made). UK Statutory Instruments are not carried in their revised form on this site. STATUTORY INSTRUMENTSNo. 2048

      Add to Reading List

      Source URL: www.seasecurity.org

      Language: English - Date: 2012-09-13 05:34:57
      40Zionism / Resistance movements / Israel / Levant / United States Department of Homeland Security / Hamas / Airport security / Second Intifada / Sensitive Security Information / Western Asia / Asia / Security

      COME TO ISRAEL WITH SSI! – 5 STEPS TO GET YOU TO ISRAEL IN 5 WEEKS How to Attend SSI’s Advanced Homeland Security Training in Israel STEP 1: The Advanced Program was developed in response to the progress in US counte

      Add to Reading List

      Source URL: www.homelandsecurityssi.com

      Language: English
      UPDATE