Information Technology Security Assessment

Results: 459



#Item
131Ethics / Audit / Information technology audit / Data Protection Act / Information security / Information privacy / Risk assessment / Information technology audit process / Chief audit executive / Risk / Auditing / Security

ICO code of practice Assessment notices code of practice

Add to Reading List

Source URL: ico.org.uk

Language: English - Date: 2015-01-06 12:11:19
132Security / Probability / Information technology audit / Enterprise risk management / Risk management / Internal control / Risk assessment / Dodd–Frank Wall Street Reform and Consumer Protection Act / Information technology controls / Risk / Actuarial science / Auditing

Export-Import Bank Reauthorization Act of 2014 Rep. Gary Miller and Rep. Maxine Waters Section–by-Section Summary TITLE I. REAUTHORIZATION Section 101. Reauthorization of the Export-Import Bank

Add to Reading List

Source URL: democrats.financialservices.house.gov

Language: English - Date: 2014-10-14 11:39:20
133Public safety / Security controls / Federal Information Security Management Act / Information security / National Institute of Standards and Technology / Personally identifiable information / Risk management framework / Security awareness / Authentication / Computer security / Security / Data security

Privacy Impact Assessment for Person Authentication Service (PAS)

Add to Reading List

Source URL: www2.ed.gov

Language: English - Date: 2015-01-12 16:12:44
134Risk analysis / Risk management / Actuarial science / Security / Software development process / Project management / Systems engineering process / IT risk management / Information Technology Security Assessment / Risk / Management / Ethics

INDEPENDENT REVIEW OF A PROPOSED REPLACEMENT FOR THE STATE’S CURRENT ALL-PAYER CLAIMS DATABASE (APCD), KNOWN IN VERMONT AS THE VERMONT HEALTH

Add to Reading List

Source URL: bgs.vermont.gov

Language: English - Date: 2015-01-15 14:30:29
135Computing / Software engineering / Information society / Interpreter / Harri Hursti / Voter-verified paper audit trail / Software bug / Pointer / Hursti Hack / Electronic voting / Election fraud / Politics

Security Analysis of the Diebold AccuBasic Interpreter David Wagner David Jefferson Matt Bishop Voting Systems Technology Assessment Advisory Board (VSTAAB) with the assistance of:

Add to Reading List

Source URL: votingsystems.cdn.sos.ca.gov

Language: English - Date: 2014-12-02 18:09:19
136Cyberwarfare / Computer network security / Software testing / Security controls / Information security / Vulnerability / Information Technology Security Assessment / Penetration test / Computer security / Data security / Security

DEPARTMENT OF HEALTH & HUMAN SERVICES Centers for Medicare & Medicaid Services 7500 Security Boulevard Baltimore, MD[removed]Framework for Independent Assessment of

Add to Reading List

Source URL: www.yourhealthidaho.org

Language: English - Date: 2014-12-23 07:17:27
137Computer security / Data security / Information technology management / Risk analysis / IT risk / European Banking Authority / Risk assessment / Risk management / European Union / Risk / Security / Management

EBA/RTS[removed]December 2013 EBA FINAL draft regulatory technical standards on criteria to identify categories of staff whose professional activities have a material impact on an institution’s risk profile under Ar

Add to Reading List

Source URL: www.eba.europa.eu

Language: English - Date: 2014-08-04 11:47:27
138Crime prevention / National security / Public safety / Privacy / Science and Technology Options Assessment / Internet privacy / Open-source software / Cloud computing / Information privacy / Security / Ethics / Human rights

Science and Technology Options Assessment (STOA) Mass Surveillance Part 2 – Technology foresight, options for longer term security

Add to Reading List

Source URL: www.europarl.europa.eu

Language: English - Date: 2015-01-09 09:26:07
139Computing / Risk management / Risk management framework / Information security / Security controls / Information Technology Security Assessment / Computer security / Security / Data security

Continuous Diagnostics and Mitigation (CDM) Overview Training

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-07-18 10:28:16
140Risk management / Data privacy / Computer security / Health Insurance Portability and Accountability Act / Privacy law / Health informatics / Information privacy / Risk assessment / National Strategy for Trusted Identities in Cyberspace / Ethics / Risk / Management

October 29, 2013 Jacob Reider, MD Acting National Coordinator for Health Information Technology Department of Health and Human Services 200 Independence Avenue, S.W. Washington, DC 20201

Add to Reading List

Source URL: healthit.gov

Language: English - Date: 2013-11-05 09:56:00
UPDATE