Computer security policy

Results: 3514



#Item
31Library science / Technology / Security / Internet / Public computer / Library / Computer security / Public library / Sumter County Library /  FL / Kropyvnytskyi Region Universal Research Library

HERITAGE PUBLIC LIBRARY PUBLIC ACCESS COMPUTER AND INTERNET POLICY Subject to the laws, regulations, and ordinances of the United States of America, the Commonwealth of Virginia, and the counties of Charles City and New

Add to Reading List

Source URL: www.heritagepubliclibrary.org

Language: English - Date: 2014-06-16 17:07:41
32Data security / Prevention / Safety / Security / Computer security / National security / Information privacy / Personal Information Protection and Electronic Documents Act / Privacy / Medical privacy / Internet privacy / Information security

Privacy Statement & Terms of Use Kinder Morgan Canada is firmly committed to maintaining confidentiality, respecting personal privacy, and protecting personal information. Our policy is based on the federal Personal Info

Add to Reading List

Source URL: www.kindermorgan.com

Language: English - Date: 2015-01-29 11:27:09
33Computer access control / Obfuscation / Computer security / Cryptography / Password / Security / Brute-force attack / Password policy / Password psychology

Of Passwords and People: Measuring the Effect of Password-Composition Policies Saranga Komanduri1 , Richard Shay1 , Patrick Gage Kelley1 , Michelle L. Mazurek1 , Lujo Bauer1 , Nicolas Christin1 , Lorrie Faith Cranor1 , a

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2016-08-21 11:38:22
34Security / Academia / Internet of Things / Economic development / Organizational theory / Public policy / Smart city / Sustainable urban planning / Computer security / Penton / ISO/IEC JTC 1/SWG 5

Real-world IoT. 
 Real people.
 Real projects. MANUFACTURING

Add to Reading List

Source URL: www.bpinetwork.org

Language: English - Date: 2016-06-22 19:21:38
35Internet privacy / Computing / Privacy / Identity management / Technology / Personally identifiable information / Gmail / Medical privacy / Computer security / HTTP cookie / ViaSat / Anonymity

WildBlue Communications, Inc. – Subscriber Privacy Policy This Privacy Policy covers all web sites under the wildblue.net domain (such as www.wildblue.net and help.wildblue.net) and applies to all current and former c

Add to Reading List

Source URL: www.orderwirelessinternet.com

Language: English - Date: 2013-01-04 20:30:45
36Security / National security / Prevention / Government / United States Office of Personnel Management / E-QIP / Crime prevention / Espionage / United States government secrecy / Security clearance / QIP / Computer security

Microsoft Word - DOC e-QIP Policy rvsd _2_.doc

Add to Reading List

Source URL: osec.doc.gov

Language: English - Date: 2004-09-29 10:42:58
37Computing / Security / Crime prevention / Cryptography / Information governance / National security / Computer network security / Computer security / Email / System administrator

MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY Policy – User Responsibilities – Patrons Adopted: May 24, 2002 ________________________________________

Add to Reading List

Source URL: mus.edu

Language: English - Date: 2015-09-01 14:10:20
38Internet privacy / Computing / Computer security / Privacy / HTTP cookie / Digital media / Personally identifiable information / Medical privacy / P3P / Zombie cookie

Microsoft Word - privacy-policy-template.docx

Add to Reading List

Source URL: www.bestdefender.com

Language: English - Date: 2015-08-24 22:11:39
39Internet privacy / Computing / Privacy / HTTP cookie / Personally identifiable information / Computer security / Government / P3P

Privacy Policy Privacy Statement Thanks for visiting website of Indian Institute of Management, Ahmedabad (IIMA). IIMA understands that the privacy of its users is important. Information collected on http://www.iimahd.er

Add to Reading List

Source URL: www.iima.ac.in

Language: English - Date: 2011-06-15 07:09:42
40Government / Law / Privacy law / Data security / Prevention / Information privacy / Computer security / National security / Privacy / Medical privacy / Internet privacy / Information security

KENNEDY HEALTH CARE GROUP PRIVACY POLICY AND PROCEDURE 1 POLICY

Add to Reading List

Source URL: www.kennedyhealthcare.com.au

Language: English - Date: 2014-03-05 22:00:36
UPDATE