Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...ific objectives required to create, implement, and maintain an Information Security Program that complies with HIPAA (Subpart C Sections 164.308, 164.310, 164. ...[[Sample_Information_Security_Program_Charter:|'''Sample HIPAA Information Security Program Charter''']]<br> ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ==Sample Information Systems and Technology Security Policy== ...protection of the confidentiality, integrity, and availability of Company information assets. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • ...ific objectives required to create, implement, and maintain an Information Security Program that complies with GLBA (Interagency Guidelines). Also, additional ...[[Sample Information Security Program Charter:|'''Sample GLBA Information Security Program Charter''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...rticular technologies and specific solutions. This section provides sample security policies that an organization can clone and tailor to its unique requiremen :[[Sample Information Security Program Charter:|'''Sample Information Security Program Charter''']]<br> ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ==Sample Security Awareness Standard== ...ation of the [[Sample Information Security Program Charter:|'''Information Security Program Charter''']]. and associated policies, standards, guidelines, and p ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...ontrols) that are needed to create, implement, and maintain an Information Security Program that complies with HIPAA.<br> ...andards) that are needed to create, implement, and maintain an Information Security Program that complies with HIPAA Subpart C Sections 164.308, 164.310, 164.3 ...
    2 KB (260 words) - 13:17, 15 June 2007
  • ==Use of computer security consultants, EDP auditors, and computer professionals== ...ssional organization for security professionals is the Information Systems Security Association.[[FN36]] ...
    2 KB (298 words) - 15:17, 22 February 2009
  • =='''Sample Management Security Awareness Standard'''== ...specific standards for the education and communication of the Information Security Program Charter and associated policies and standards.<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
  • :'''Ensure the security policy and procedures clearly define information security responsibilities for all employees and contractors.'''<br> ...4:''' Verify that information security policies clearly define information security responsibilities for both employees and contractors. ...
    2 KB (265 words) - 15:58, 2 March 2007
  • '''DS 5.1 Management of IT Security'''<br> ...rity at the highest appropriate organizational level, so the management of security actions is in line with business requirements. ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...c attention to communicating IT security awareness and the message that IT security is everyone’s responsibility.<br> ...f, information asset owners, etc.) are not informed of or trained in their security responsibilities.'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat '''True or False: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat '''True or False: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...[plaintext]] information '''RED Signals''' from those that carry encrypted information, or [[ciphertext]] '''BLACK signals'''.<br> *[[Security engineering]] ...
    1 KB (170 words) - 16:06, 14 June 2007
  • '''DS 11.6 Security Requirements for Data Management '''<br> Establish arrangements to identify and apply security requirements applicable to the receipt, processing, physical storage and ou ...
    5 KB (649 words) - 18:23, 5 May 2006
  • ...nd prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service de ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed. ''' ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...ation (HORSE) Project Wiki''' is evolving every day. There are information security practitioners adding content and providing guidance to the end user.<br> ...that one day this will be the most authoritative comprehensive information security wiki on the planet. ...
    2 KB (280 words) - 11:17, 30 November 2008
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ...secured by the [http://safetynet-info.com SafetyNET] advanced information security suite of products available only from Lazarus Alliance.<br> '''Contact information:'''<br> ...
    876 bytes (127 words) - 14:51, 29 February 2008
View ( | ) (20 | 50 | 100 | 250 | 500)