Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

Page title matches

  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010

Page text matches

  • ===Section 1=== ...
    846 bytes (82 words) - 12:24, 16 October 2014
  • 2
    See, e.g., U. C. C. § 1-201(39) (1992). ...
    55 bytes (8 words) - 12:37, 16 October 2014
  • :'''(1)''' intentionally accesses without authorization a facility through which a :'''(1)''' if the offense is committed for purposes of commercial advantage, malic ...
    2 KB (351 words) - 11:15, 9 June 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (634 words) - 13:00, 4 June 2010
  • Formally: ISO 20000-1 ('part 1') "promotes the adoption of a '''service management system''', integrated p ...t within the scope of ISO 20000-1. It comprises the same sections as 'part 1' but excludes the 'Requirements for a Management system' as no requirements ...
    2 KB (298 words) - 14:25, 23 April 2010
  • :'''(1)''' Each year each agency shall have performed an independent evaluation of :'''(1)''' for each agency with an Inspector General appointed under the Inspector ...
    4 KB (682 words) - 19:17, 3 June 2010
  • :1. All printed information shall be handled based on its confidentiality clas ..."background: white; border: 1px solid black; padding: 1em;"><table border="1"> ...
    5 KB (683 words) - 18:18, 23 January 2014
  • 1
    ==Footnote 1== ...
    394 bytes (57 words) - 12:40, 16 October 2014
  • === Chapter 1 - [[Defamation]]=== ...
    2 KB (209 words) - 09:53, 13 April 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ...fornia State Senator Peace on February 12, 2002, and became operative July 1, 2003. (1) Any agency that owns or licenses computerized data that includes personal ...
    3 KB (522 words) - 13:52, 26 October 2011
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:28, 16 October 2014
  • (1) Any actual damage sustained by that person as a result of the failure;<br> ...ability under this paragraph shall not be less than $100 nor greater than $1,000; and<br> ...
    4 KB (689 words) - 12:30, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    5 KB (728 words) - 14:07, 1 May 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • '''(1)''' provides information security protections commensurate with the risk an ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • :'''(1)''' developing and overseeing the implementation of policies, principles, s :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this subchapter, ...
    4 KB (671 words) - 10:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (953 words) - 14:13, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...ce on the processes, principles and terminology recommended for BCM. Part 1 offers good practice advice on the things that ought to be considered to ac ...t 2 describes a how the business continuity arrangements described in part 1 can be managed systematically using a documented BCMS. Since part 2 is a p ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . . . embo ...
    695 bytes (105 words) - 12:39, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (976 words) - 14:17, 1 May 2010
  • :'''(1)''' promulgating information security standards under section 11331 of titl :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this sub-chapter ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''(1)''' minimize the paperwork burden for individuals, small businesses, educat ::'''(B)''' security of information, including section 11332 of title 40 [1] ; and<br> ...
    3 KB (414 words) - 10:37, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • (a)(1) A domestic financial institution or nonfinancial trade or business, and a ...to not less than 2 times the amount of the transaction, but not more than $1,000,000, on any financial institution or agency that violates any provision ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • 1. '''Confidentiality''' Image:Information Classification Standard(1).png|Information Classification Standard page two of eight. ...
    5 KB (583 words) - 17:44, 23 January 2014
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:33, 1 June 2010
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:36, 1 June 2010
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding ...e of the computer and the value of such use is not more than $5,000 in any 1-year period;<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • :'''(1)''' provide timely technical assistance to operators of agency information ...
    1 KB (196 words) - 19:07, 3 June 2010
  • ...ade Law (UNCITRAL), 29th Sess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirem ...
    1 KB (161 words) - 12:29, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...nuary). Authentication: A pillar of information assurance. SC Magazine, 21(1), 55. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 1 .../www.e-publishing.af.mil/shared/media/epubs/AFI33-203V1.pdf AFI 33-203 Vol 1], Emission Security (Soon to be AFSSI 7700) ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...5(a)(3)(A), (4)(A), 7(g)(1), 5 U.S.C.A. §§ 7704(a)(3)(A), (4)(A), 7706(g)(1). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2 ...e sender's domain name. CAN-SPAM Act, §§ 5(a)(1, 6), 15 U.S.C.A. § 7704(a)(1, 6). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ### SHA-1 with 128-bit or 160 bit key Image:Encryption Standard(1).png|Encryption Standard page two of eight ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945). ...
    1 KB (184 words) - 18:49, 10 April 2011
  • Computer Crime Prevention Law — Ill. Rev. Stat., ch. 38, §§ 16D-1 to -7<br> Ind. Code § 35-43-1-4<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,068 words) - 17:23, 16 October 2009
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)