Computer security policy

Results: 3514



#Item
61Information privacy / Payment cards / Economy / Computing / E-commerce / Business / Cryptography / Computer law / Payment Card Industry Data Security Standard / Information security / Data security / Network segmentation

Microsoft Word - PCI DSS Information Security Policy (v2016.1)

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:04
62Internet privacy / Computing / Computer security / Cyberspace / HTTP cookie / Privacy policy / Privacy / Personally identifiable information / P3P / Privacy concerns with social networking services

    ARUBA AIRLINES WEBSITE PRIVACY POLICY   PRIVACY POLICY - ARUBAAIRLINES.COM

Add to Reading List

Source URL: arubaairlines.com

Language: English - Date: 2015-11-12 11:59:44
63Privacy / Internet privacy / Identity management / Computing / Personally identifiable information / Computer security / Government / HTTP cookie / Medical privacy / In re Gateway Learning Corp. / FTC regulation of behavioral advertising

Realeflow Privacy Policy – May 20, 2014 Realeflow, LLC (“Realeflow”) has created this Privacy Policy to demonstrate our commitment to privacy and security. This Privacy Policy describes our policies and procedures

Add to Reading List

Source URL: realeflow.com

Language: English - Date: 2015-10-06 16:57:07
64Security / Prevention / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Acceptable use policy / Authorization / Freedom of information laws by country / Privacy

RUTGERS POLICY Section: Section Title: Information Technology Policy Name: Acceptable Use Policy for Information Technology Resources Formerly Book: N/A Approval Authority: Senior Vice President for Administration

Add to Reading List

Source URL: policies.rutgers.edu

Language: English - Date: 2016-08-22 21:33:41
65Digital media / Security / Technology / Privacy of telecommunications / Cybercrime / Computer network security / Email / Internet privacy / Electronic Communications Privacy Act / Computer security / Internet / Privacy

ADMINISTRATIVE POLICY NOISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, iPads) I. POLICY ISSUANCE

Add to Reading List

Source URL: cityofsitka.com

Language: English - Date: 2015-08-13 16:32:14
66Computer access control / Computer security / Cryptography / Identity management / Password / Security / Challengeresponse authentication / Crypt / Password synchronization / Password policy

Fischer Identity™ Turn Identity Management into a Strategic Advantage Password Reset & Synchronization

Add to Reading List

Source URL: www.fischerinternational.com

Language: English - Date: 2016-06-03 10:12:26
67Health informatics / Computing / Computer security / XACML / Health information exchange / Security Assertion Markup Language / Electronic health record / Health

IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

Add to Reading List

Source URL: www.ihe-suisse.ch

Language: English - Date: 2016-05-17 20:50:28
68Cryptography / Computer access control / Obfuscation / Password / Security / Crypt / Cryptographic software / Password policy / Password strength

Directions To Open Encrypted E-Mails From The State Of Utah When you open an encrypted e-mail from the State of Utah you will see the following message: Depending on which e-mail program you use, you may also see the f

Add to Reading List

Source URL: laborcommission.utah.gov

Language: English - Date: 2015-09-15 11:55:14
69Security / Cyberwarfare / Prevention / Computer network security / Cybercrime / Email / Password / Computer security / Internet privacy / Rootkit / Computer virus / Internet

IT ACCEPTABLE USE STANDARDS PURPOSE A standard includes specific low level mandatory controls that help enforce and support a policy. The purpose of this document is to support and outline in detail

Add to Reading List

Source URL: bufa.ca

Language: English - Date: 2016-07-11 09:00:51
70Internet privacy / World Wide Web / Computing / Software / Hypertext Transfer Protocol / Internet advertising / Computer access control / HTTP cookie / Internet marketing / Web analytics / Ghostery / DoubleClick

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus1, Nicholas Weaver2 1 Max

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:33:43
UPDATE