Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...mputer systems makes defining them difficult, both from technical and from policy perspectives. California's definition of computer systems, seems narrower t ...
    2 KB (243 words) - 03:35, 18 February 2009
  • ...d to compare against the actual situation. Review periodically against the policy for software usage the existence of any personal or unlicensed software or ...
    2 KB (281 words) - 17:31, 5 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (295 words) - 01:42, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (307 words) - 01:31, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (298 words) - 01:59, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for "closed-loop" ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (310 words) - 01:37, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (311 words) - 02:04, 2 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • ...nsure timely identification of local and international legal, contractual, policy and regulatory requirements related to information, information service del ...
    2 KB (306 words) - 13:13, 4 May 2006
  • ===Policy on the use of cryptographic controls=== ...sibilities for implementation of and the monitoring of compliance with the policy<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ITIL 9.3.2 Release policy and planning Service Support.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ...e was no announced monitoring policy on the network, university's computer policy stated that in general, all computer and electronic files should be free fr ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (338 words) - 13:45, 6 March 2007
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific instructio ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ISO 177993.1 Information security policy.<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • [[Security Policy:|'''Security Policy''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assessing and ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (681 words) - 21:56, 15 January 2014
  • :a) establishing a formal policy prohibiting the use of unauthorized software (see 15.1.2) :b) establishing a formal policy to protect against risks associated with obtaining files and software eithe ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ISO 17799 3.1 Information security policy 6.3 Responding to security incidents and malfunctions.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (368 words) - 02:03, 2 May 2006
  • ...ity Assessment and Management Policy, and Threat Assessment and Monitoring Policy.<br> ...and hardening various technologies in accordance with the Asset Protection Policy.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ISO3.1 Information security policy<br> ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Department policy requires that the video surveillance application and order be filed separat ...
    2 KB (227 words) - 15:30, 21 May 2010
  • * ISO 177993.1 Information security policy.<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • ...n is more susceptible due to inherent genetic or other factors, there is a policy choice whether to set policies for protecting the general population that a ...an one in a million has become common place in public health discourse and policy. How consensus settled on this particular figure is unclear. In some respec ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::*Maintain an Information Security Policy. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']], and provides specific instructions and requirements on the proper and ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for following app ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for the proper id ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ===Backup policy=== ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • [[PO6.1:| 6.1 IT Policy and Control Environment]]<br> [[PO6.4:| 6.4 Policy Rollout]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']] defines objectives for establishing specific standards on the assessme ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirements for performing th ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> * Know and follow '''<Your Company Name>''' End User Computing and Technology Policy.<br> ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the developme ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for proper contro ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • ...ity or carrier value added services that are not explicitly listed in this policy guide should not be considered prohibited. ...her BYOD technology for corporate network access unless acceptance of this policy and all associated Company policies are first accepted and subsequent Compa ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific instructio ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ==SUB-CHAPTER I—FEDERAL INFORMATION POLICY== ...
    2 KB (207 words) - 11:58, 23 May 2010
  • ...ol sub-process defines the processes, the allocation of responsibility the policy statements and the management framework.<br> ...to be met in order to implement security management. The process ends with POLICY STATEMENTS. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • Often when a company has no clear policy about use of computer time, the defendant can argue that he or she believed ...
    3 KB (513 words) - 18:22, 22 February 2009
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ...gress to be kept classified in the interest of national defense or foreign policy. ...
    2 KB (327 words) - 00:58, 1 June 2010
  • '''Maintain an Information Security Policy ''' * [[PCI 12:|'''Requirement 12: Maintain a policy that addresses information security.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...ement leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security acros ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...curity controls both at inception of the coverage and over the term of the policy. ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ISO 3.1 Information security policy.<br> ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ...our notions of what is fair and just, and conflict with the strong public policy of our State.” The court held that "the First Amendment simply does not per ...
    2 KB (314 words) - 19:35, 10 April 2011
  • ISO 3.1 Information security policy <br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • ...outline. It is reviewed at least twice a year and will include a strategy, policy, scope, objectives, roles and responsibilities, the CM processes, activitie ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] , and provides specific instructions and requirements for life cycle m ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ::* Updated the FDIC Statement of Policy issued pursuant to Section 19 of the Federal Deposit Insurance Act that pro ...://www.fdic.gov/news/news/financial/2002/fil0282.html Amended Statement of Policy on Bank Merger Act Transactions - "Anti-Money Laundering Record"]<br> ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...derstanding and practice, and statute did not impermissibly delegate basic policy matters to police officers, judges, and juries for resolution on an ad hoc ...
    4 KB (562 words) - 12:09, 18 February 2009
  • :* SP-4; Supervisory Policy On Large Scale Integrated Financial Software Systems (LSIS), November 1988 :* SP-5; Interagency Policy On Contingency Planning For Financial Institutions, July 1989 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...urity_Awareness_Standard:|Sample Third Party Security Awareness Standard]] policy example.<br> :* Policy – The institution has defined and documented its polices relevant to the pa ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • * [http://iac.dtic.mil/iatac/ia_policychart.html DoD IA Policy Chart] DoD IA Policy Chart ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...ness continuity is having a clear, unambiguous and appropriately resourced policy ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...access visual depictions that constituted obscenity or child pornography; policy was consistent with library's interest in providing internet access for res ...
    4 KB (578 words) - 12:38, 18 February 2009
  • ...ancial institution discloses nonpublic information or not, there must be a policy in place to protect the information from foreseeable threats in security an ...agreement. In summary, the financial privacy rule provides for a privacy policy agreement between the company and the consumer pertaining to the protection ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...of the offsite storage facility should respond to the data classification policy and the enterprise’s media storage practices. IT management should ensure t ...
    5 KB (700 words) - 18:07, 23 June 2006
  • ...vices is performed in accordance with the organization's vendor management policy. ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...the need for security policies, standards and regulations, best practices policy framework, Command Center resources and benefits, as well as precepts of de ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...mply with the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] and associated standards, guidelines, and procedures can result in dis ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...on ensuring that, from its inception, a requested IT service is reliable, policy-compliant, cost-effective, and adaptable to changing business needs. ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ttps://auditmachine.com/ IT Audit Machine], [http://policymachine.com/ The Policy Machine], [https://lazarusalliance.com/services/your-personal-cxo/ Cybervis ...'s], [http://lazarusalliance.com/services/policies-governance/ governance, policy development], [http://lazarusalliance.com/services/audit-compliance/ IT aud ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...olding that Tasini failed to allege any personal injury resulting from the policy. ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...t from behaviour which is detrimental to the company as a whole. Charging policy needs to be simultaneously simple, fair and realistic. ...
    6 KB (885 words) - 10:12, 23 March 2007
  • :* Clear understanding of the provider’s security incidence response policy and assurance that the provider will communicate security incidents promptl ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...vices is performed in accordance with the organization's vendor management policy.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy. ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...the Federal Government; and (10) coordinate the development and review of policy associated with Federal information technology acquisition.<br> ...ct of Pilot Programs - Authorizes the Administrator of Federal Procurement Policy (FPP) to conduct pilot programs in order to test alternative approaches for ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ferent uses or discloses personal information not disclosed in the privacy policy under which personal information was collected. ...ng mechanisms should be carefully and fully disclosed in a website privacy policy. Furthermore, it is a best practice for websites that allow behavioral adve ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • Establishing a firm-wide metadata scrubbing and management policy. Implementing metadata-related policies and procedures can eliminate the ne ...
    4 KB (587 words) - 22:52, 15 March 2010
  • *5: [[Security policy]] - management direction ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ::c. access control policy, covering: :1. the information security policy; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...security controls we need to comply with the companies corporate security policy.<br> * Policy enforcement<br> ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...org/en/udrp/udrp-policy-24oct99.htm Uniform Domain Name Dispute Resolution Policy] (UDRP) proceeding. ...istrative proceedings under ICANN’s Uniform Domain Name Dispute Resolution Policy (UDRP). The UDRP allows a trademark owner to challenge domain name registr ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • ii. Are there any PUBLIC POLICY problems? ...
    8 KB (1,401 words) - 09:26, 7 April 2009
  • ISO 3.1 Information security policy.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...ice [http://www.usdoj.gov/criminal/cybercrime/ccpolicy.html Computer Crime Policy & Programs] ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...to overcome the presumption. These presumptions are expressions of social policy, such as the validity of marriage, sanity in civil cases, legitimacy of a c ...
    6 KB (1,070 words) - 10:18, 11 August 2009
  • | Policy |Describes the policy contents and KPA goals recommended by the CMM. ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...nutes? Take a look at [http://policy-machine.com/policymachine/choices The Policy Machine - a Lazarus Alliance service.]'''<br> *[http://policymachine.com The Policy Machine] ...
    12 KB (1,686 words) - 11:47, 30 May 2015
View ( | ) (20 | 50 | 100 | 250 | 500)