National Institute of Standards and Technology / University of North Carolina / /
IndustryTerm
owned/managed devices / software use / information technology security / Electronic media / to internal agency networks / public network / government computer systems / software meets / basic information technology security requirements / Internet Web page / information technology implementation / electronic communications / technology overhaul / technology devices / information technology systems / portable storage devices / telecommunications / confidential information technology security / Public records law / agency technology devices / law enforcement personnel / software licensing agreements / information technology security framework / information technology security features / mobile computing devices / information technology resources / distributed information technology assets / information technology services / information-processing activity / /
Organization
National Institute of Standards and Technology / Enterprise Security and Risk Management Office / North Carolina government / Congress / N.C.G.S. Chapter / Manual / University of North Carolina / State government / Department of Homeland Security / office of Information Technology Services / International Organization for Standardization Standard / /
Position
custodian / State CIO / CIO / State Chief Information Officer / General / /
ProvinceOrState
North / North Carolina / /
PublishedMedium
Public Law / /
Technology
Encryption / cellular telephone / 030501 Using Encryption / information technology / mobile computing / Using Encryption / /