Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ss, legal, and or regulatory purposes, as documented in the data retention policy.]]<br> ...
    4 KB (635 words) - 11:52, 28 March 2008
  • ==Business Continuity Management Policy Samples== ...ished in the Asset Protection Policy, and Threat Assessment and Monitoring Policy.<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...ting that they have read and understood the company’s information security policy. ...
    2 KB (278 words) - 20:07, 2 March 2007
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (683 words) - 18:18, 23 January 2014
  • ...review and approval of appropriate organization-wide information security policy<br> ...rity policy, including external review as appropriate, and updating of the policy as needed<br> ...
    8 KB (996 words) - 12:49, 22 May 2007
  • :'''Ensure the security policy and procedures clearly define information security responsibilities for all ...
    2 KB (265 words) - 15:58, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (284 words) - 15:49, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (286 words) - 15:19, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (284 words) - 15:51, 2 March 2007
  • :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive managemen ...standards has been developed that supports the objectives of the security policy. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (285 words) - 15:50, 2 March 2007
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (288 words) - 15:39, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (291 words) - 15:35, 2 March 2007
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (418 words) - 19:53, 14 January 2014
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (295 words) - 15:33, 2 March 2007
  • ...gy. The Information Security Committee is comprised of lawyers, government policy and management professionals, information technology and security professio ...advice on the how and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (290 words) - 15:52, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (295 words) - 15:53, 2 March 2007
View ( | ) (20 | 50 | 100 | 250 | 500)