Technology policy

Results: 43148



#Item
491Technology / Digital media / Information technology / Content-control software / Digital rights management / Internet censorship / Internet / Public computer / Acceptable use policy / Child pornography / Public library / Computer Fraud and Abuse Act

INTERNET ACCEPTABLE USE POLICY

Add to Reading List

Source URL: www.cumberlandcountypubliclibrary.org

Language: English - Date: 2015-10-28 16:20:05
492Open data / Open content / Free culture movement / Open access / Academia / Data.gov.in / Ministry of Communications and Information Technology / Publishing / Open science / Data sharing / Open access movement in India

Government Open Data Use License - India National Data Sharing and Accessibility Policy Government of India 1. Preamble Structured data available in open format and open license for public access and use, usually termed

Add to Reading List

Source URL: www.mygov.in

Language: English - Date: 2016-06-24 06:42:22
493Science education / Education policy / Education / Science and technology / Experiential learning / Science /  technology /  engineering /  and mathematics / Science

NEWS RELEASE July 16, 2015 FOR IMMEDIATE RELEASE STEM LEADERSHIP CONFERENCE MAKES STEM DIVERSITY A NATIONAL PRIORITY #STEMsolve unites nation’s brightest minds to solve STEM crisis.

Add to Reading List

Source URL: usnewsstemsolutions.com

Language: English - Date: 2016-02-24 09:08:46
494Sustainability / Natural environment / Energy / Energy policy / Renewable energy commercialization / Energy economics / Climate change policy / Climate change mitigation / Low-carbon economy / Clean technology / Energy poverty / Renewable energy

Towards Harmonisation of the East African Community (EAC) Climate Change Policies, Laws and Institutions By Bernard Namanya Paper for presentation at the 3rd Global Climate Policy Conference, Ledger Plaza, Bahari Beach H

Add to Reading List

Source URL: climatestrategies.org

Language: English - Date: 2016-07-05 06:53:24
495Security / Prevention / Information technology management / Computer security / Data security / Cryptography / National security / Information security / Security management / Asset / ISO/IEC 27001:2013 / ISO/IEC 27001:2005

Bit10 IT Security Policy 1. Introduction Bit10 develops web and mobile applications and provides hosting services for websites and servers. The importance of the data on these systems is of paramount importance to Bit10

Add to Reading List

Source URL: www.bit10.net

Language: English - Date: 2015-09-15 10:13:06
496Internet privacy / Computing / Computer security / HTTP cookie / Personally identifiable information / Technology / Privacy / Opt-out / In re Gateway Learning Corp. / P3P

Rhode Island PBS Online Privacy Policy Nothing is more important to us than protecting the private information of our visitors. The RIPBS web site adheres to a strict policy for ensuring the privacy of your -and your chi

Add to Reading List

Source URL: www.pegri.tv

Language: English - Date: 2015-10-09 14:57:07
497Education / Educational psychology / Education policy / Science and technology / Distance education / Facilitator / Management / Science /  technology /  engineering /  and mathematics / PLF / Peer learning / Educational technology

Sustaining STEM: Peer Learning Facilitators and the Undergraduate STEM Network Mary Cianflone Program Specialist, UNM’s STEM Gateway grant Feb 19, 2014

Add to Reading List

Source URL: stemgateway.unm.edu

Language: English - Date: 2015-08-17 23:54:48
498Energy / Natural environment / Sustainability / Carbon sequestration / Carbon dioxide / Climate change policy / Energy economics / Climate change in Australia / Carbon capture and storage / Steelmaking / Low-carbon economy / Carbon footprint

FACT SHEET Addressing climate change through technology transfer and research Steelmakers are involved in many programmes to transfer technologies and practices, thereby improving or replacing existing processes or reduc

Add to Reading List

Source URL: www.worldsteel.org

Language: English
499Network architecture / Telephony / Interconnection / National Telecommunications Commission / Public switched telephone network / Local loop / Technology / Electronics / Communication / Unbundled access

EXECUTIVE ORDER NO. 59 PRESCRIBING THE POLICY GUIDELINES FOR COMPULSORY INTERCONNECTION OF AUTHORIZED PUBLIC TELECOMMUNICATIONS CARRIERS IN ORDER TO CREATE A UNIVERSALLY ACCESSIBLE AND FULLY INTEGRATED NATIONWIDE TELECOM

Add to Reading List

Source URL: www.ntcr4.com

Language: English - Date: 2013-04-23 21:34:00
500Security / Computer security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Vulnerability / Authorization / Computing

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Employees Adopted: May 24, 2002 ______________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-08-31 13:56:00
UPDATE