Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...mputer systems makes defining them difficult, both from technical and from policy perspectives. California's definition of computer systems, seems narrower t ...
    2 KB (243 words) - 03:35, 18 February 2009
  • ...d to compare against the actual situation. Review periodically against the policy for software usage the existence of any personal or unlicensed software or ...
    2 KB (281 words) - 17:31, 5 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (295 words) - 01:42, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (307 words) - 01:31, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (298 words) - 01:59, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for "closed-loop" ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (310 words) - 01:37, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (311 words) - 02:04, 2 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • ...nsure timely identification of local and international legal, contractual, policy and regulatory requirements related to information, information service del ...
    2 KB (306 words) - 13:13, 4 May 2006
  • ===Policy on the use of cryptographic controls=== ...sibilities for implementation of and the monitoring of compliance with the policy<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ITIL 9.3.2 Release policy and planning Service Support.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ...e was no announced monitoring policy on the network, university's computer policy stated that in general, all computer and electronic files should be free fr ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (338 words) - 13:45, 6 March 2007
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific instructio ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ISO 177993.1 Information security policy.<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • [[Security Policy:|'''Security Policy''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assessing and ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (681 words) - 21:56, 15 January 2014
  • :a) establishing a formal policy prohibiting the use of unauthorized software (see 15.1.2) :b) establishing a formal policy to protect against risks associated with obtaining files and software eithe ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ISO 17799 3.1 Information security policy 6.3 Responding to security incidents and malfunctions.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (368 words) - 02:03, 2 May 2006
  • ...ity Assessment and Management Policy, and Threat Assessment and Monitoring Policy.<br> ...and hardening various technologies in accordance with the Asset Protection Policy.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ISO3.1 Information security policy<br> ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Department policy requires that the video surveillance application and order be filed separat ...
    2 KB (227 words) - 15:30, 21 May 2010
  • * ISO 177993.1 Information security policy.<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • ...n is more susceptible due to inherent genetic or other factors, there is a policy choice whether to set policies for protecting the general population that a ...an one in a million has become common place in public health discourse and policy. How consensus settled on this particular figure is unclear. In some respec ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::*Maintain an Information Security Policy. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']], and provides specific instructions and requirements on the proper and ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for following app ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for the proper id ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ===Backup policy=== ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • [[PO6.1:| 6.1 IT Policy and Control Environment]]<br> [[PO6.4:| 6.4 Policy Rollout]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']] defines objectives for establishing specific standards on the assessme ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirements for performing th ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> * Know and follow '''<Your Company Name>''' End User Computing and Technology Policy.<br> ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the developme ...
    12 KB (1,656 words) - 14:15, 1 May 2010
View ( | ) (20 | 50 | 100 | 250 | 500)