Data security

Results: 28926



#Item
991Auditing / Financial audit / Information security / Internal audit / Audit / Business process / Statement on Auditing Standards No. 70: Service Organizations / Entity-level controls

SOC 1 (SSAE NO. 16) TYPE 2 REPORT ON CONTROLS PLACED IN OPERATION FOR DATA CENTER SERVICES BROADRIVER INC. AUGUST 1, 2014 TO JULY 31, 2015

Add to Reading List

Source URL: www.macstadium.com

Language: English - Date: 2016-04-25 16:34:29
992Backup software / Business continuity and disaster recovery / Data synchronization / Backup / Data security / Replication / Solid-state drive / Extensible Storage Engine / Disk partitioning / File system / Dynamic random-access memory / Veeam Backup & Replication

Fast Crash Recovery in RAMCloud

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-20 03:36:46
993Privacy / Data security / Policy / Privacy policy / Medical privacy / Information privacy / Confidential / Internet privacy / Personally identifiable information / Public records / Information security / Information sensitivity

Seattle University Data Privacy Policy Last updated: July 1, 2011 Definitions The data privacy policy is based on a tiered definition of confidential information; these definitions are intended to facilitate compliance w

Add to Reading List

Source URL: www.seattleu.edu

Language: English - Date: 2016-07-19 16:57:19
994Crime prevention / National security / Cryptography / Information governance / Data management / Information security / Computer security / Privacy / Data custodian / Data steward / Data sharing / Data Protection Act

UC Davis Policy and Procedure Manual Chapter 320, Records and Archives Section 40, Data Administration Policy Date: Supersedes: Responsible Department: Informational and Educational Technology

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2016-05-17 15:36:00
995Data security / Crime prevention / Cryptography / Information governance / National security / ISO/IEC 27002 / Computer security / Information security / Professional certification / Telecommuting / International Organization for Standardization / Security

Mobilität und Leihpersonal als Security-Fallen:

Add to Reading List

Source URL: sk.cis-cert.com

Language: English - Date: 2010-09-02 08:03:20
996E-commerce / Merchant services / Payment systems / Credit cards / 3-D Secure / Payment Card Industry Data Security Standard / MasterCard / Chargeback / Debit card / Visa Inc. / One-time password / Payment gateway

Press Release 10 February 2015 AsiaPay Launches New Hosted 3D Secure ACS Service for Banks AsiaPay Technology, the ePayment technology arm of AsiaPay, focusing on innovative payment technologies and services across Asia-

Add to Reading List

Source URL: www.asiapay.com

Language: English - Date: 2015-02-10 23:19:57
997Physical security / Cloud storage / Computer networking / Data center / Data management / Distributed data storage / Closed-circuit television / Access control

TERMS OF REFERENCE Project: INSTALLATION AND FRUNISHINGS OF THE INFORMATION AND COMMUNICATION TECHNOLOGY DIVISION (ICTD) DATA CENTER

Add to Reading List

Source URL: nbi.gov.ph

Language: English - Date: 2015-11-24 05:47:58
998Crime prevention / National security / Cryptography / Information governance / Security / Privacy policy / Information security / Freedom of information laws by country / Computer security / Privacy / Internet privacy

NovemberSecurity Practices & Procedures for Managing Sensitive Personal Data & Information BNP Paribas Asset Management India Private Limited

Add to Reading List

Source URL: www.bnpparibasmf.in

Language: English - Date: 2015-04-05 05:10:20
999Cloud infrastructure / Business continuity and disaster recovery / Data security / Dimension Data Holdings / Computer security / Backup / Cloud computing

GLMKPP00027 Conservation Infographic 7

Add to Reading List

Source URL: www.dimensiondata.com

Language: English - Date: 2016-04-20 07:57:10
1000Computer security / Computer network security / Data security / Application security / Certified Information Systems Security Professional / Enterprise software / Software / Web application security / HP Application Security Center

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today’s session – Understand different types of application

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:25
UPDATE