<--- Back to Details
First PageDocument Content
Data security / Enterprise architecture / Information Risk Management / Security Policy Framework / Common Criteria / Contract management / Security controls / Office of Government Commerce / Supplier relationship management / Information technology management / Computer security / Security
Date: 2013-11-22 05:49:18
Data security
Enterprise architecture
Information Risk Management
Security Policy Framework
Common Criteria
Contract management
Security controls
Office of Government Commerce
Supplier relationship management
Information technology management
Computer security
Security

The Supplier Assurance Framework: Good Practice Guidance Government is reliant on ICT systems to function effectively and to deliver services to the citizen. Increasingly, these systems and services are provided by 3rd p

Add to Reading List

Source URL: www.nationalarchives.gov.uk

Download Document from Source Website

File Size: 70,01 KB

Share Document on Facebook

Similar Documents

    Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

   Service Organization Controls (SOC) 3  for   Security, Availability and Confidentiality   

DocID: 1vidI - View Document

Microsoft Word - CABForum_Network_Security_Controls.doc

Microsoft Word - CABForum_Network_Security_Controls.doc

DocID: 1uUnT - View Document

Thomson Reuters Service Organization Controls 3 SysTrust Report System Description of the Thomson Reuters Legal Tracker System Based in the United States Relevant to Security, Availability, Processing

Thomson Reuters Service Organization Controls 3 SysTrust Report System Description of the Thomson Reuters Legal Tracker System Based in the United States Relevant to Security, Availability, Processing

DocID: 1uQLo - View Document

D ATA S H E E T  Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

D ATA S H E E T Lastline Enterprise: Protect Email, Web, Network or Cloud Traffic from Advanced Malware Detect the Malware that Slips Past Your Security Controls Lastline® Enterprise™ delivers unmatched detection of

DocID: 1utCb - View Document

Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

Mind your (R, Φ)s: Location-Based Privacy Controls for Consumer Drones Tavish Vaidya Micah Sherr {tavish, msherr}@cs.georgetown.edu Georgetown University, Washington, DC USA

DocID: 1udM0 - View Document