Computer security policy

Results: 3514



#Item
991Computer security / Data security / National security / Public safety / Information privacy / Telecommunications data retention / Information security / Internet privacy / Information sensitivity / Privacy / Ethics / Security

A Data privacy, secrecy and security policy 11 March 2014 v2.0 Administrator of the National Health Funding Pool: Data privacy, secrecy and security policy

Add to Reading List

Source URL: www.publichospitalfunding.gov.au

Language: English - Date: 2015-03-02 01:47:28
992Credit cards / Data privacy / Investment Policy Statement / Bureau of Diplomatic Security / Payment systems / Computer law

INFORMATION PUBLICATION SCHEME

Add to Reading List

Source URL: www.dss.gov.au

Language: English - Date: 2013-12-11 22:51:27
993Computer-mediated communication / Computing / Spamming / Sender Policy Framework / Sender ID / Simple Mail Transfer Protocol / Internet security / Message transfer agent / Anti-spam techniques / Spam filtering / Email authentication / Email

Microsoft Word - Sender Policy Framework - new template version Sep.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-12-19 17:39:45
994Crime prevention / Computer security / Data security / Security Policy Framework / Information security / Security guard / Emergency management / Information security management system / Security controls / Security / Public safety / National security

The ACT Government Protective Security Policy Framework

Add to Reading List

Source URL: justice.act.gov.au

Language: English - Date: 2014-08-19 19:54:18
995Australia / Internet privacy / Social Security / Centrelink / Data security / Password policy / Password manager / Password / Security / Computer security

PDF Document

Add to Reading List

Source URL: www.humanservices.gov.au

Language: English - Date: 2014-02-06 18:50:54
996Crime prevention / Public safety / Computer security / Data security / Information security / Internet privacy / Security guard / Personally identifiable information / Privacy policy / Security / Ethics / Privacy

Examination of Estimates of Expenditure[removed]Reply Serial No. CONTROLLING OFFICER’S REPLY TO INITIAL WRITTEN QUESTION

Add to Reading List

Source URL: www.police.gov.hk

Language: English - Date: 2014-12-29 10:25:04
997Identity management / Law / Privacy / Information privacy / Sandy Bay /  Hong Kong / Internet privacy / University of Hong Kong / Data breach / Pok Fu Lam Road / Ethics / Security / Computer security

The IHP’s Policy & Guidelines in Protection of Personal Data (Privacy) The IHP as a data user undertakes to comply with the requirements of the Personal Data (Privacy) Ordinance to ensure that personal data kept are ac

Add to Reading List

Source URL: www.ihp.hku.hk

Language: English - Date: 2015-01-11 23:15:29
998Federated identity / Security / Cyberwarfare / Apple ID / Password policy / Password / Knowledge-based authentication / Computer security

Microsoft Word - MyVIT pdf tutorial with screens for New Applicants

Add to Reading List

Source URL: www.vit.vic.edu.au

Language: English - Date: 2011-10-05 20:45:06
999Computer security / Data security / Crime prevention / Security guard / Surveillance / Information security / Security Policy Framework / Emergency management / Risk management / Security / Public safety / National security

Physical security management guidelines Event security Approved 13 December 2011

Add to Reading List

Source URL: www.protectivesecurity.gov.au

Language: English - Date: 2014-12-07 22:52:10
1000Computer security / Standard Operating Environment / System administration / Information security / Operating system / X Window System / Open standard / Software / System software / Computing

Whole-of-Government Common Operating Environment Policy Document Version Control Document name

Add to Reading List

Source URL: www.finance.gov.au

Language: English - Date: 2013-07-02 19:43:21
UPDATE