Search results
Jump to navigation
Jump to search
Page title matches
- ==Footnote 1== ...394 bytes (57 words) - 12:40, 16 October 2014
- == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...5 KB (702 words) - 12:20, 16 June 2010
Page text matches
- ===Section 1=== ...846 bytes (82 words) - 12:24, 16 October 2014
- See, e.g., U. C. C. § 1-201(39) (1992). ...55 bytes (8 words) - 12:37, 16 October 2014
- :'''(1)''' intentionally accesses without authorization a facility through which a :'''(1)''' if the offense is committed for purposes of commercial advantage, malic ...2 KB (351 words) - 11:15, 9 June 2010
- :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...4 KB (634 words) - 13:00, 4 June 2010
- Formally: ISO 20000-1 ('part 1') "promotes the adoption of a '''service management system''', integrated p ...t within the scope of ISO 20000-1. It comprises the same sections as 'part 1' but excludes the 'Requirements for a Management system' as no requirements ...2 KB (298 words) - 14:25, 23 April 2010
- :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...4 KB (682 words) - 19:17, 3 June 2010
- :1. All printed information shall be handled based on its confidentiality clas ..."background: white; border: 1px solid black; padding: 1em;"><table border="1"> ...5 KB (683 words) - 18:18, 23 January 2014
- ==Footnote 1== ...394 bytes (57 words) - 12:40, 16 October 2014
- === Chapter 1 - [[Defamation]]=== ...2 KB (209 words) - 09:53, 13 April 2011
- {| id="table1" width="100%" border="1" | 1.0 ...6 KB (752 words) - 14:02, 1 May 2010
- ...fornia State Senator Peace on February 12, 2002, and became operative July 1, 2003. (1) Any agency that owns or licenses computerized data that includes personal ...3 KB (522 words) - 13:52, 26 October 2011
- (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...4 KB (689 words) - 12:28, 16 October 2014
- (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...4 KB (689 words) - 12:30, 16 October 2014
- {| id="table1" width="100%" border="1" | 1.0 ...5 KB (728 words) - 14:07, 1 May 2010
- '''(1)''' provides information security protections commensurate with the risk an ...709 bytes (103 words) - 10:41, 2 June 2010
- '''(1)''' provides information security protections commensurate with the risk an ...709 bytes (103 words) - 21:02, 3 June 2010
- :'''(1)''' developing and overseeing the implementation of policies, principles, s :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this subchapter, ...4 KB (671 words) - 10:44, 1 June 2010
- {| id="table1" width="100%" border="1" | 1.0 ...7 KB (953 words) - 14:13, 1 May 2010
- {| id="table1" width="100%" border="1" | 1.0 ...8 KB (1,184 words) - 14:12, 1 May 2010
- ...ce on the processes, principles and terminology recommended for BCM. Part 1 offers good practice advice on the things that ought to be considered to ac ...t 2 describes a how the business continuity arrangements described in part 1 can be managed systematically using a documented BCMS. Since part 2 is a p ...7 KB (1,040 words) - 10:48, 27 October 2012