Security information management

Results: 13712



#Item
311Digital rights / Human rights / Privacy / Data security / Identity management / Internet privacy / Medical privacy / Personally identifiable information / Personal Information Protection and Electronic Documents Act / Do Not Track legislation

PRIVACY POLICYINTRODUCTION

Add to Reading List

Source URL: mtnz.tradedesk.co.za

Language: English - Date: 2016-06-09 05:35:34
312Crime prevention / Cryptography / Information governance / National security / Computer security / Information security / Memory protection / Capability-based security / Protection ring / Operating system / Principle of least privilege / Process management

PROCEEDINGS OF THE IEEE, VOL. 63, NO. 9, SEPTEMBER] [Sa]

Add to Reading List

Source URL: ix.cs.uoregon.edu

Language: English - Date: 2010-10-08 02:30:09
313Cloud infrastructure / CloudPassage / Computer security / Information technology management / DevOps / Cloud computing / Orchestration / Provisioning / Halo

INSTANT VISIBILITY, CONTINUOUS PROTECTION On-demand, automated infrastructure security that works anywhere, at any scale VALUE...DELIVERED

Add to Reading List

Source URL: 2hvcbhl545p46lgtq2nhxci9-wpengine.netdna-ssl.com

Language: English - Date: 2016-08-18 15:38:03
314Safety engineering / Avionics / Global Positioning System / Information technology management / Telematics / DO-178B / Advanced transportation controller / Validation / Computer security

Coll a bor at ing w it h clients to develop innovat i v e ne w technology ®

Add to Reading List

Source URL: www.vanteon.com

Language: English - Date: 2015-12-29 11:35:24
315Computer security / National security / Security / Crime prevention / Cryptography / Tata Consultancy Services / Information security / Resilience / Chief information security officer / Threat / MasterCraft / Tata Research Development and Design Centre

TCS Enterprise Security and Risk Management Solutions and Services Enterprise Security and Risk Management The digital era has created unprecedented opportunities for organizations to conduct

Add to Reading List

Source URL: www.tcs.com

Language: English - Date: 2015-01-21 03:50:21
316Crime prevention / National security / Cryptography / Information governance / Data management / Information security / Computer security / Privacy / Data custodian / Data steward / Data sharing / Data Protection Act

UC Davis Policy and Procedure Manual Chapter 320, Records and Archives Section 40, Data Administration Policy Date: Supersedes: Responsible Department: Informational and Educational Technology

Add to Reading List

Source URL: manuals.ucdavis.edu

Language: English - Date: 2016-05-17 15:36:00
317Physical security / Cloud storage / Computer networking / Data center / Data management / Distributed data storage / Closed-circuit television / Access control

TERMS OF REFERENCE Project: INSTALLATION AND FRUNISHINGS OF THE INFORMATION AND COMMUNICATION TECHNOLOGY DIVISION (ICTD) DATA CENTER

Add to Reading List

Source URL: nbi.gov.ph

Language: English - Date: 2015-11-24 05:47:58
318Crime prevention / National security / Cryptography / Information governance / Security / Privacy policy / Information security / Freedom of information laws by country / Computer security / Privacy / Internet privacy

NovemberSecurity Practices & Procedures for Managing Sensitive Personal Data & Information BNP Paribas Asset Management India Private Limited

Add to Reading List

Source URL: www.bnpparibasmf.in

Language: English - Date: 2015-04-05 05:10:20
319Computer security / Data security / Security / Cyberwarfare / Computer network security / ISO/IEC 27002 / Vulnerability / Information security management system / Security controls / Information security / ISO/IEC 27001:2013 / NIST Cybersecurity Framework

WRITTEN INFORMATION   SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.    Copyright © 2016 

Add to Reading List

Source URL: examples.complianceforge.com

Language: English - Date: 2016-07-28 21:18:17
320Data security / Privacy / Identity documents / Identity management / Personal life / Personally identifiable information / Internet privacy / Privacy Office of the U.S. Department of Homeland Security / Email / Information security

KEY PRIVACY LAWS AND OTHER GUIDANCE The Department of Commerce adheres to federal privacy laws and guidance to ensure that the collection, use, and maintenance of sensitive information,

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-11-23 16:00:03
UPDATE