Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010

Page text matches

  • ===Section 1=== ...
    846 bytes (82 words) - 12:24, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • :'''(1)''' intentionally accesses without authorization a facility through which a :'''(1)''' if the offense is committed for purposes of commercial advantage, malic ...
    2 KB (351 words) - 11:15, 9 June 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (634 words) - 13:00, 4 June 2010
  • Formally: ISO 20000-1 ('part 1') "promotes the adoption of a '''service management system''', integrated p ...t within the scope of ISO 20000-1. It comprises the same sections as 'part 1' but excludes the 'Requirements for a Management system' as no requirements ...
    2 KB (298 words) - 14:25, 23 April 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (682 words) - 19:17, 3 June 2010
  • :1. All printed information shall be handled based on its confidentiality clas ..."background: white; border: 1px solid black; padding: 1em;"><table border="1"> ...
    5 KB (683 words) - 18:18, 23 January 2014
  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • === Chapter 1 - [[Defamation]]=== ...
    2 KB (209 words) - 09:53, 13 April 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ...fornia State Senator Peace on February 12, 2002, and became operative July 1, 2003. (1) Any agency that owns or licenses computerized data that includes personal ...
    3 KB (522 words) - 13:52, 26 October 2011
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:28, 16 October 2014
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:30, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    5 KB (728 words) - 14:07, 1 May 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • :'''(1)''' developing and overseeing the implementation of policies, principles, s :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this subchapter, ...
    4 KB (671 words) - 10:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (953 words) - 14:13, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...ce on the processes, principles and terminology recommended for BCM. Part 1 offers good practice advice on the things that ought to be considered to ac ...t 2 describes a how the business continuity arrangements described in part 1 can be managed systematically using a documented BCMS. Since part 2 is a p ...
    7 KB (1,040 words) - 10:48, 27 October 2012
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)