State Policy Network

Results: 367



#Item
301Digital media / Internet privacy / Computer network / Acceptable use policy / Peer-to-peer / Information security / Network security / Email / Computing / Internet

STATE OF TENNESSEE Department of Finance and Administration AMENDMENT # 1 RFP # [removed]

Add to Reading List

Source URL: www.tn.gov

Language: English - Date: 2013-06-03 14:27:57
302Internet privacy / Computer law / Law / Online Privacy Protection Act / Personally identifiable information / P3P / HTTP cookie / World Wide Web / Network Advertising Initiative / Ethics / Computing / Privacy

State of Nevada e-government Steering Committee Policy Control No. 3.03

Add to Reading List

Source URL: ndep.nv.gov

Language: English - Date: 2011-01-28 14:28:43
303Public safety / Information technology management / Computer network security / Information security / Security controls / Security awareness / Software asset management / Information security management system / IT risk / Computer security / Data security / Security

State of Florida - Department of Environmental Protection DEP 390 Information Technology Security Policies and Standards POLICY MAINTENANCE ADMINISTRATOR: CIO, Office of Technology and Information Services 1.0 PURPOSE/SC

Add to Reading List

Source URL: www.dep.state.fl.us

Language: English - Date: 2013-10-31 16:17:10
304American Association of State Colleges and Universities / North Central Association of Colleges and Schools / Rocky Mountain Athletic Conference / University of Nebraska at Kearney / Computer lab / Acceptable use policy / Internet access / Internet / Computer network / Computing / Digital media / Electronics

UNIVERSITY OF NEBRASKA AT KEARNEY

Add to Reading List

Source URL: www.unk.edu

Language: English - Date: 2014-03-25 09:12:20
305Authorization / Password / Computer network / System administrator / Data security / Computer network security / Information security / Identity correlation / Computing / Security / Computer security

ASU System Policy Effective Date: March 4, 2011 Subject: Appropriate Use of Information & Technology Resources 1. Purpose Arkansas State University System (University) invests substantial and sufficient

Add to Reading List

Source URL: www.asusystem.edu

Language: English - Date: 2011-03-17 17:08:24
306Computer security / Data security / Computer network security / Data breach / Health Insurance Portability and Accountability Act / Personally identifiable information / Chief information officer / Physical security / Computer security incident management / Security / National security / Public safety

State of Vermont Incident Response Policy Originally Approved: [removed]Approved by: Tom Pelham

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2011-05-08 22:57:22
307Government / Accessibility / Job Accommodation Network / Americans with Disabilities Act / National Council on Disability / Equal opportunity employment / Rehabilitation Act / Disability / Office of Federal Contract Compliance Programs / Law / Special education in the United States / United States

Business Strategies that Work: A Framework for Disability Inclusion ACCOMPANYING RESEARCH COMPENDIUM A Selective List of Federal and State Agency Regulatory and Policy Materials, Research Studies, and Other Policy Report

Add to Reading List

Source URL: www.dol.gov

Language: English - Date: 2013-03-11 13:10:17
308Password / Cryptography / Network security / Two-factor authentication / Crypt / Password strength / Password manager / Security / Computer security / Access control

State of Vermont User Password Policy and Guidelines ®

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2012-11-30 11:34:07
309Malware / Computer security / Antivirus software / Spyware / Server / Computer virus / Distributed firewall / Computer network security / System software / Cyberwarfare

State of Vermont Malicious Software Protection Originally Approved: [removed]Approved by: Tom Pelham Policy Number:

Add to Reading List

Source URL: dii.vermont.gov

Language: English - Date: 2011-05-08 22:57:22
310Hacking / Software testing / Computer network security / Vulnerability / Adobe Acrobat / Cross-site scripting / Firefox / Privilege escalation / Buffer overflow / Software / Computing / Microsoft Windows

State of Tennessee Department of Finance and Administration Office for Information Resources Security Policy and Audit Security Advisory Summary

Add to Reading List

Source URL: www.nettn.net

Language: English - Date: 2010-09-16 14:51:14
UPDATE