Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...protection and management objectives, and define acceptable use of Company information assets.<br> ...iality, integrity, and availability of Company information assets. Company information assets are defined in the [[Sample Asset Identification and Classification ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • Links to helpful or interesting information security documents.<br> ...ed of lawyers, government policy and management professionals, information technology and security professionals, notaries from various legal systems, trade faci ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ==Security requirements of information systems== ...egory is to ensure that security is an integral part of the organization's information systems, and of the business processes associated with those systems.<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • '''Incident Management''' otherwise known as '''Information Security Incident Management''', is a [[Service_Level_Management: | Service ...should be established to ensure a quick, effective and orderly response to information security incidents.<br> ...
    9 KB (1,371 words) - 16:40, 23 May 2007
  • ...ly dependent on IT and mediate between imperatives of the business and the technology, so agreed priorities can be established.<br> Insert remediation plan, applicability, or any information that indicates what needs to be done.<br> ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...rganization. ITIL Security Management is based on the code of practice for information security management also known as ISO/IEC 17799. ...be safe against risks. When protecting information it is the value of the information that has to be protected. These values are stipulated by the confidentialit ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • ...al log-in to access workplace computer, personnel from employer's internet technology (IT) department had complete administrative access to all employees' comput ...rocedures reserved right to audit and monitor Internet use and warned that information flowing through the university network was not confidential, users of unive ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ===Start with a comprehensive audit of all software assets used in your enterprise.=== ...http://www.palamida.com Palamida] provide solutions that can automate this audit process and streamline ongoing compliance efforts.<br> ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...ing information management costs through automated categoriza... | Cutting information management costs through automated categoriza...]] ...or your Next Regulatory Audit | Email and IM Prep for your Next Regulatory Audit]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...g theft of information from computers by eliminating the requirement that information must have been stolen through an interstate or foreign communication; #*Information contained in a financial record of a financial institution, or contained in ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...e disabled, changed, or otherwise properly configured to prevent access to information classified as Proprietary or Confidential.<br> ...[[Media:Oracle_Audit_UNIX_Script.txt]] provides an excellent comprehensive audit examination that has stood up to many professional Oracle compliance audits ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...erform work on Company premises or who have been granted access to Company information or systems, are covered by this standard and must comply with associated gu ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...ding networks, systems, and applications that store, process, and transmit information assets.<br> ...pecific instructions and requirements for life cycle management of Company information systems, including hardware and software.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...l institutions – such as credit reporting agencies – that receive customer information from other financial institutions. ...npublic information or not, there must be a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...isions such as whether to deploy a standby database, a network replication technology, or a tape-based solution.</font><br> ...banks through SNA, serial ports, and other types of networks. The required technology must be set up on the disaster recovery system, because there is no single ...
    20 KB (3,195 words) - 02:47, 23 February 2007
  • ...ns for those public companies not accurately representing data and company information. ...step in any risk assessment process. Senior management should incorporate information on IT issues such as resource limitations, threats, priorities, and key con ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • Personal data are defined as "any information relating to an identified or identifiable natural person ("data subject"); ...o be very broad. Data are "personal data" when someone is able to link the information to a person, even if the person holding the data cannot make this link. Som ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • In 1996, the National Institute of Standards and Technology (NIST) defined electronic data interchange as "the computer-to-computer int ...onstruction, etc. In some cases, EDI will be used to create a new business information flow (that was not a paper flow before). This is the case in the Advanced S ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...nology Security Policies Demystified which is a combination of governance, technology and vigilance. If you are preparing to lead a company’s security function o ...tions however that does not provide a return on your investment; one being information security, both physical and digital unless IT security is your business.<br ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • ...h Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in your own environment ...system by creating standards for the use and dissemination of health care information.<br> ...
    32 KB (4,732 words) - 19:36, 29 November 2013
View ( | ) (20 | 50 | 100 | 250 | 500)