Security log

Results: 472



#Item
371Computing / Internet / Email / Data security / Personally identifiable information / Internet privacy / Protected health information / Health Insurance Portability and Accountability Act / Encryption / Security / Cryptography / Computer security

HIPAA Privacy and Security: FAQs 1. Use of paper case/procedure log books or papers (e.g., CORES reports) containing PHI or PII (personally identifiable information) Q: What is the best practice regarding PHI/PII? A: The

Add to Reading List

Source URL: www.uwmedicine.org

Language: English - Date: 2013-11-15 14:35:11
372Anticipatory thinking / Security / Decision theory / Actuarial science / Emergency management / Quality function deployment / Hazard analysis / House of Quality / Hazard / Management / Risk / Ethics

Modeling and Assessing of Train-Person Collision Accidents on the National Railway of South Korea Chan-Woo Park ⋅ Jong-Bae Wang ⋅ Sang-Log Kwak⋅ Don-Bum Choi Korea Railroad Research Institute, Uiwang, Korea

Add to Reading List

Source URL: www.intlrailsafety.com

Language: English - Date: 2010-12-20 01:16:49
373Operation Enduring Freedom / Shawnee State University / Vern Riffe / International Security Assistance Force

May 27, 2014 Log# 14-14 For Immediate Release Ohio Army National Guard engineer unit to deploy COLUMBUS, Ohio — About 157 Soldiers from the Ohio Army National Guard’s 1191st

Add to Reading List

Source URL: ong.ohio.gov

Language: English - Date: 2014-05-27 13:53:01
374Computer security / Identity management / Password / Cryptographic software / Security

DHS OHA Log In & Change Password Learning Center

Add to Reading List

Source URL: apps.state.or.us

Language: English - Date: 2013-04-16 18:29:43
375Computer security / Login / User / Identity management / Password manager / Common Access Card / Security / Access control / Password

Did You Know…The myPers website provides a 24/7 online self-service capability to numerous personnel actions? Log on to myPers.af.mil using your CAC: [removed].

Add to Reading List

Source URL: www.162fw.ang.af.mil

Language: English - Date: 2013-02-27 10:36:50
376Information technology management / Information security / Security log / Windows Security Log / Log management and intelligence / Computer security / Security / Computing

[removed]New York State Information Technology Standard No: NYS-S14-005 IT Standard:

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
377Identity management systems / Computer security / Cryptographic software / Computer crimes / Self-service password reset / Password strength / Password / Security / Cryptography

DHS OHA Log In & Change Your Password Learning Center

Add to Reading List

Source URL: apps.state.or.us

Language: English - Date: 2013-04-16 18:17:04
378Information technology management / Information security / Security log / Login / Log management and intelligence / Windows Security Log / Computer security / Security / Computing

Microsoft Word - Enterprise_Security_Logging_Standard_v1.0.docx

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
379Rickenbacker / 121st Air Refueling Wing / Columbus /  Ohio / Rickenbacker International Airport / United States Air National Guard / Ohio Air National Guard / Ohio / United States Air Force / United States

Oct. 12, 2012 Log # 12-51 For Immediate Release Ohio National Guard to conduct ribbon-cutting for new main security gate at Rickenbacker Air National Guard Base

Add to Reading List

Source URL: www.ong.ohio.gov

Language: English - Date: 2012-10-19 09:22:59
380Password / Social Security / Social Security number / Taxation in the United States

Ordering a Background Investigation 1. Go to https://apps.geninfo.com/Login.aspx?CompanyParm=IU and log in using your user ID and password. 2. The Notification and Access Security Requirement screen will appear. This scr

Add to Reading List

Source URL: www.iu.edu

Language: English - Date: 2014-05-29 12:22:59
UPDATE