Computer security policy

Results: 3514



#Item
1

A Characterization of IPv6 Network Security Policy Mark Allman International Computer Science Institute MAPRG Meeting April 2016

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2016-04-04 11:55:18
    2

    Colleen M. Swanson travellingcryptographer.com • Research Interests Computer security and applied cryptography, privacy-enhancing technologies, security/privacy-related public policy, i

    Add to Reading List

    Source URL: travellingcryptographer.com

    - Date: 2017-10-03 15:50:40
      3

      Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman* , J. Alex Halderman* , and Edward W. Felten*,† * Center for Information Technology Policy and Dept. of Computer Science, Princeton Universit

      Add to Reading List

      Source URL: www.usenix.org

      - Date: 2007-07-03 10:25:07
        4

        Math Department Computer Lab Policy (effective) • For security reasons, the lab coordinator or a lab employee must be present any time

        Add to Reading List

        Source URL: gato-docs.its.txstate.edu

        - Date: 2016-05-05 09:09:00
          5

          PROPOSED POLICY P02Mobile Device Security Policy University employees and students who use a laptop computer or mobile device (e.g. portable hard drives, USB flash drives, smartphones, tablets) are responsibl

          Add to Reading List

          Source URL: alaska.edu

          - Date: 2015-02-18 18:41:14
            6

            San Luis Obispo County Library: Chromebook Policy San Luis Obispo County Library is now offering Chromebooks for checkout. Chromebooks are a newer generation computer: lightweight and fast, with security built-in to prot

            Add to Reading List

            Source URL: www.slolibrary.org

            - Date: 2015-07-15 12:43:32
              7Security / Human rights / Prevention / Identity management / Crime prevention / National security / Secure communication / Internet privacy / Mus / Privacy / Computer security

              MONTANA BOARD OF REGENTS OF HIGHER EDUCATION Policy and Procedures Manual SUBJECT: INFORMATION TECHNOLOGY PolicyPrivacy, Security, and Monitoring Approved: May 24, 2002; Revised: May 25, 2012

              Add to Reading List

              Source URL: mus.edu

              Language: English - Date: 2012-05-29 12:54:58
              8Computing / Prevention / Security / Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Security awareness / Data center / Internet

              Computer and Network Security Original Implementation: January 24, 1995 Last Revision: November 2, 2015 This policy establishes the conditions and security requirements for the use of computing equipment and networks at

              Add to Reading List

              Source URL: www.sfasu.edu

              Language: English - Date: 2016-07-26 16:47:37
              9Prevention / Safety / Security / Computer security / Data security / Auditing / National security / Information security / Internal control / Risk management / Audit / Resilience

              ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES

              Add to Reading List

              Source URL: www.astrazeneca.com

              Language: English - Date: 2016-01-07 10:04:53
              10Internet privacy / Computing / Prevention / Computer security / Privacy / Personally identifiable information / HTTP cookie / Medical privacy / Facebook Beacon / Web beacon / Password / In re Gateway Learning Corp.

              Privacy policy Table of Contents.

              Add to Reading List

              Source URL: 2015.icufn.org

              Language: English
              UPDATE