Sensitive security information

Results: 1968



#Item
471Adobe Systems / Computer file formats / Technical communication tools / Cross-platform software / Portable Document Format / Adobe Acrobat / Digital rights management / Adobe LiveCycle / Adobe AIR / Software / Computing / Graphics file formats

Adobe Content Security Solution Brief Adobe solutions for sharing and securing classified content Securely store your most sensitive information in a web-based environment The Internet irreversibly changed what, where,

Add to Reading List

Source URL: 1105govinfoevents.com

Language: English - Date: 2014-10-28 13:55:14
472Email / Etiquette / Internet culture / Computing / Electronics / Sensitive Security Information / United States Department of Homeland Security / Computer security / Acceptable use policy

DHS IA Compliance System - Rules of Behavior Acceptable Use The following rules of behavior and acceptable use policy apply to all users of the DHS Compliance System whether DHS employees or contractors. Because writte

Add to Reading List

Source URL: ordermgmt.uscg.gov

Language: English - Date: 2012-09-25 15:10:58
473Public safety / National Cyber Security Division / Sensitive security information / Secure Flight / Critical infrastructure protection / Transportation Security Administration / National Consortium for the Study of Terrorism and Responses to Terrorism / Chemical Facility Anti-Terrorism Standards / Federal Emergency Management Agency / United States Department of Homeland Security / National security / Security

Preventing Terrorism and Enhancing Security Preventing Terrorism and Enhancing Security Protecting the American people from terrorist threats is our founding principle and our highest priority. The Department of Homelan

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2012-12-04 10:16:17
474Adobe LiveCycle / Adobe software / Portable Document Format / Adobe Systems / Adobe Flex / Document collaboration / Computing / Software / Computer graphics

Adobe LiveCycle ES Solution Brief Adobe security solutions for government agencies Continuously monitoring your sensitive documents Continued incidents of information leaks highlight the increasing need for new approac

Add to Reading List

Source URL: www.holmans.com

Language: English - Date: 2014-09-29 17:29:45
475United States Department of Homeland Security / Aftermath of the September 11 attacks / Transportation Security Administration / Transportation in the United States / Airport security / Screening / Referral marketing / Sensitive security information / Security / National security / Aviation security

U.S. House of Representatives Committee on Science and Technology Subcommittee on Investigations and Oversight Testimony of Mr. Larry Willis, M.A., B.S.E.E. Program Manager for the Science and Technology Directorate Depa

Add to Reading List

Source URL: science.house.gov

Language: English - Date: 2011-04-06 12:17:04
476Aftermath of the September 11 attacks / Transportation Security Administration / Transportation in the United States / Rulemaking / Regulatory Flexibility Act / Aviation and Transportation Security Act / Code of Federal Regulations / Airport security / Sensitive Security Information / Security / United States administrative law / Government

Federal Register / Vol. 79, No[removed]Tuesday, September 23, [removed]Rules and Regulations PARTS 3002, 3007, 3009, 3016, 3034, 3035, and 3052—[AMENDED] 1. The authority citation for parts 3002, 3007, 3009, 3016, 3034, 3

Add to Reading List

Source URL: www.tsa.gov

Language: English - Date: 2014-10-30 10:56:59
477Sensitive Security Information / Computer law / Information technology audit / National Information Infrastructure Protection Act

Page[removed]TITLE 42—THE PUBLIC HEALTH AND WELFARE if the unauthorized disclosure of such information could reasonably be expected to have a significant adverse effect on the health and safety of the public or the commo

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2014-06-05 12:08:00
478Computing / Computer network security / Computer security / Data breach / Secure communication / Identity management / United States Department of Veterans Affairs / Unisys / Internet privacy / Data security / Security / Ethics

A summer of disk-content According to the Privacy Rights Clearinghouse, between April 2005 and Nov. 29, 2006, more than 97.3 million records containing sensitive personal information were compromised as the result of com

Add to Reading List

Source URL: download.101com.com

Language: English - Date: 2006-12-14 12:51:00
479Email / Etiquette / Internet culture / Computing / Electronics / Sensitive Security Information / United States Department of Homeland Security / Computer security / Acceptable use policy

DHS IA Compliance System - Rules of Behavior Acceptable Use The following rules of behavior and acceptable use policy apply to all users of the DHS Compliance System whether DHS employees or contractors. Because writte

Add to Reading List

Source URL: auxdata.uscg.gov

Language: English - Date: 2007-10-17 12:47:55
480Staff / Information security / Internet / Email / Security / Computing

**FOR OFFICIAL USE ONLY-PRIVACY SENSITIVE** This information is subject to the Privacy Act of[removed]The information accessed through this system is For Official Use Only and must be protected IAW DOD[removed]R. This emai

Add to Reading List

Source URL: jfsc.ndu.edu

Language: English - Date: 2014-07-30 15:35:30
UPDATE