Back to Results
First PageMeta Content
Data security / Information security / National security / Authentication / Authorization / Identity management / Password / Security / Computer security / Crime prevention


Glossary IT Policy Glossary 0ABCDEFGHIJKLMNOPQRSTUVWXYZ For more information about glossary entries please contact the Policy and Planning Department. 0
Add to Reading List

Document Date: 2014-09-30 14:59:37


Open Document

File Size: 81,21 KB

Share Result on Facebook

Company

IAM / Identity Management Leadership Group / UW / /

IndustryTerm

redundant data communications connections / security audit / storage media / federal law / security incident management / computer systems / party processing sensitive data / access management software / software applications / telecommunications / storage systems / e-discovery / encryption algorithm / security devices / electronic services / /

Organization

office of Human Relations / UW-Madison office of the CIO IT Policy Program / Planning Department / Department of Health and Human Services / Registrar's Office / /

Person

Mac See / Also / Wikipedia (Encryption) Used / /

Position

data custodian / VP IT / custodian / CIO / Private / Chief Information Officer / /

PublishedMedium

Human Relations / /

Technology

Encryption / cryptography / 2008 encryption / public key / encryption algorithm / Information Technology / PKI / block cipher / private key / secret key / PDA / /

URL

http /

SocialTag