Search results

Jump to navigation Jump to search

Page title matches

  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...ementation, and maintenance of the Asset Identification and Classification Policy and associated standards and guidelines.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014

Page text matches

  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...lse: Security can be communicated, taught, or measured effectively without policy.'''<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...d Classification Policy:|'''Sample Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy defines objectives for establishing specific standards to define, identify, ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...s on an annual basis. This section provides access to Information Security Policy Framework templates (for example, policies and standards) that are needed t '''SOX Policy Sample Library'''<br> ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...curity (and privacy) of customer information. This section provides sample Policy Framework templates (for example, policies and standards) that are needed t '''GLBA Policy Sample Library'''<br> ...
    2 KB (263 words) - 12:52, 14 July 2006
  • ...sification Policy:|'''Sample HIPAA Asset Identification and Classification Policy''']]<br> :The Asset Identification and Classification Policy is required to comply with HIPAA (Subpart C Section 164.308(a)1C,2 and Sect ...
    5 KB (614 words) - 16:46, 25 July 2006
  • :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive managemen Obtain a copy of the organization’s security policy and evaluate the effectiveness. Points to be taken into consideration inclu ...
    3 KB (351 words) - 16:49, 25 June 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (281 words) - 14:46, 2 March 2007
  • ...s that wish to exceed GLBA requirements and establish a more comprehensive Policy Framework.<br> ...ssification Policy:|'''Sample GLBA Asset Identification and Classification Policy''']]<br> ...
    4 KB (535 words) - 16:51, 25 July 2006
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (296 words) - 14:47, 2 March 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sample Information Systems and Technology Security Policy== This Information Systems and Technology Security Policy define Company objectives for establishing specific standards on the protec ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish, publish, maintain, and disseminate a security policy that:'''<br> :* Read the information security policy, and verify the policy is published and disseminated to all relevant system users (including vendo ...
    2 KB (294 words) - 14:46, 2 March 2007
  • ...he templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain '''HIPAA Policy Sample Library'''<br> ...
    2 KB (260 words) - 13:17, 15 June 2007
  • ...s to support the protection objectives established in the Asset Protection Policy.<br> ...s to support the protection objectives established in the Asset Protection Policy.<br> ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ...rter and supporting policies that are required to comply with ISO Security Policy objectives.<br> ...formation Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security ...
    2 KB (202 words) - 12:40, 15 June 2007
  • ==Sample End User Computing and Technology Policy== The End User Computing and Technology Policy define the Company objectives for establishing specific standards on approp ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...Policy''']] builds on the objectives established in the Security Awareness Policy, and provides specific instructions and requirements for providing security ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ...objectives established in the Asset Protection Policy and Asset Management Policy.<br> ...bjectives and builds on the objectives established in the Asset Management Policy by providing specific requirements and instructions for life cycle manageme ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ==Information Security Policy== ==Information security policy document== ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...vices is performed in accordance with the organization’s vendor management policy.<br> ...vices is performed in accordance with the organization’s vendor management policy. .<br> ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br> 1. Obtain the organization’s vendor management policy and discuss with those responsible for third-party service management if th ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...the objectives established in the Asset Identification and Classification Policy.<br> ...the objectives established in the Asset Identification and Classification Policy by providing specific requirements for classifying information assets.<br> ...
    1 KB (159 words) - 17:08, 25 July 2006
  • ...he templates from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain a '''ISO 17799 Policy Sample Library'''<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...r needs delivered in minutes? Take a look at [http://policymachine.com The Policy Machine - a Lazarus Alliance service.]<br> == Adaptive Policy Best Practices == ...
    5 KB (705 words) - 11:39, 30 May 2015
  • ...standards has been developed that supports the objectives of the security policy. ...r the standards framework effectively meets the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...distributed media including that distributed to individuals, and that this policy requires the following: ...
    2 KB (295 words) - 14:23, 2 March 2007
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...violations to the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] and its associated standards.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ::* Obtain and review the policy requiring updates to anti-virus software and definitions. ...hat the logs are being retained in accordance with the company’s retention policy. ...
    1 KB (199 words) - 18:10, 28 February 2007
  • ...distributed media including that distributed to individuals, and that this policy requires the following: ...
    2 KB (307 words) - 14:24, 2 March 2007
  • ...nd prevent the use of unauthorized software. Obtain and review the company policy as it relates to software use to see that this is clearly articulated. ...ns and computers to determine if they are in conformance with organization policy. ...
    2 KB (314 words) - 18:27, 25 June 2006
  • ...would reflect adversely on Company, can be considered a violation of this policy.<br> ...ipment constitutes expressed consent by those covered by the scope of this policy to such monitoring, recording, and auditing. Actual or suspected misuse of ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...storage and maintenance of hardcopy and electronic media, and verify this policy requires periodic media inventories. Verify related processes by performing ...
    2 KB (310 words) - 14:28, 2 March 2007
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing sec ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ...ication_and_Classification_Policy:|Asset Identification and Classification Policy]], and provides specific instructions and requirements for handling informa ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...tablished in the [[Sample_Security_Awareness_Policy:|'''Security Awareness Policy''']], and provides specific instructions and requirements for providing ong ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (275 words) - 17:10, 23 January 2014
  • ...ogy Security Policy:|'''Sample Information Systems and Technology Security Policy''']]<br> :The Sample Information Systems and Technology Security Policy serves as the top level document setting the holistic tone for the subseque ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...tion and Classification Policy:|'''Asset Identification and Classification Policy''']].<br> ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (365 words) - 19:25, 14 January 2014
  • :::* Obtain and review the policy requiring updates to anti-virus software and definitions. ...hat the logs are being retained in accordance with the company’s retention policy. ...
    2 KB (333 words) - 18:15, 28 February 2007
  • Job descriptions, employment agreements, and policy awareness acknowledgements increase accountability for security. Management ...or desktop and workstation users would typically review the acceptable-use policy and include issues like desktop security, log-on requirements, password adm ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • '''PO 6.4 Policy Rollout'''<br> ISO 17799 3.1 Information security policy.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ..."Company) [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing sec ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...ael S. Baum, Federal Certification Authority Liability and Policy: Law and Policy of Certificate-Based Public Key and Digital Signatures 9 (National Institut ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...s. Information Security standards provide more measurable guidance in each policy area. Information Security procedures describe how to implement the standar ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...uration file enforcing the password parameters as defined by the corporate policy document: '''Technical Standard – Access Controls.'''<br> <p><font color=#008000>Passwords on all platforms adhere to the corporate policy document: '''Technical Standard – Access Controls.'''</font></p><br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...cknowledge in writing they have read and understood the company’s security policy and procedures.''' ISO 3.1 Information security policy<br> ...
    2 KB (333 words) - 16:42, 5 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...tion_and_Classification_Policy:|'''Asset Identification and Classification Policy''']], and provides specific instructions and requirements for classifying i ...e not to exceed five (5) years unless otherwise required by law or Company policy.<br> ...
    5 KB (583 words) - 17:44, 23 January 2014
  • ...ss, legal, and/or regulatory purposes, as documented in the data retention policy.'''<br> ...
    3 KB (420 words) - 14:46, 28 February 2007
  • == Requirement 12: Maintain a policy that addresses information security. == *A strong security policy sets the security tone for the whole company, and lets employees know what ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific auditing a ### Change security policy or configuration settings ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 12.2 Reviews of security policy and technical compliance.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...in a set of policies to support IT strategy. These policies should include policy intent, roles and responsibilities, exception process, compliance approach * ISO 17799 3.1 Information security policy 6.1 Security in job definition and resourcing.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • This Asset Protection Policy defines Company objectives for establishing specific standards on the prote ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...al review of the code-based policies is recommended. Without a P3P Privacy Policy in place, a site’s cookies could be blocked or impaired by Internet Explore ...
    2 KB (251 words) - 09:52, 16 September 2011
  • ISO 17799 3.1 Information security policy.<br> ISO 12.2 Reviews of security policy and technical compliance.<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ...' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFAN_6_3.pdf]]<br> :Discusses how computer security funds should be allotted into various areas: policy, awareness and training, risk assessment, technology, and process.<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ===Compliance Oriented Policy Samples=== :1. [[Security_Policy:|'''ISO Security Policy''']]<br> ...
    6 KB (774 words) - 12:41, 25 May 2007
  • ...Company") [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']] defines objectives for establishing a formal Security Awareness Progra ...ed in the [[Sample Security Awareness Policy:|'''Sample Security Awareness Policy''']], and provides specific instructions and requirements for providing app ...
    5 KB (728 words) - 14:07, 1 May 2010
  • ...t. Any accounts that remain should be investigated as they are most likely policy violations and a breakdown in the segregation of duties has occurred.<br> ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (459 words) - 17:56, 21 June 2006
  • *[[Network security policy]] ...
    1 KB (168 words) - 18:26, 14 June 2007
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']], and provides specific instructions and requirements on the proper and ...
    7 KB (953 words) - 14:13, 1 May 2010
  • The '''<Your Company Name>''' (the "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']] defines objectives for establishi ...dard builds on the objectives established in the [[Sample Asset Management Policy:|'''Sample Asset Management Standard''']], and provides specific instructio ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...ss, legal, and or regulatory purposes, as documented in the data retention policy.]]<br> ...
    4 KB (635 words) - 11:52, 28 March 2008
  • ==Business Continuity Management Policy Samples== ...ished in the Asset Protection Policy, and Threat Assessment and Monitoring Policy.<br> ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...ting that they have read and understood the company’s information security policy. ...
    2 KB (278 words) - 20:07, 2 March 2007
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (683 words) - 18:18, 23 January 2014
  • ...review and approval of appropriate organization-wide information security policy<br> ...rity policy, including external review as appropriate, and updating of the policy as needed<br> ...
    8 KB (996 words) - 12:49, 22 May 2007
  • :'''Ensure the security policy and procedures clearly define information security responsibilities for all ...
    2 KB (265 words) - 15:58, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (284 words) - 15:49, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (286 words) - 15:19, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (284 words) - 15:51, 2 March 2007
  • :::a. [[SOX.2.0.17:|'''SOX.2.0.17''']] An information security policy exists and has been approved by an appropriate level of executive managemen ...standards has been developed that supports the objectives of the security policy. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (285 words) - 15:50, 2 March 2007
  • ==Guidance Towards Establishing an Enterprise Wide Open-Source Usage Policy== A well-defined, supported, enforced management policy maximizes the rewards and minimizes the risks of the open-source software m ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (288 words) - 15:39, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (291 words) - 15:35, 2 March 2007
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    3 KB (418 words) - 19:53, 14 January 2014
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (295 words) - 15:33, 2 March 2007
  • ...gy. The Information Security Committee is comprised of lawyers, government policy and management professionals, information technology and security professio ...advice on the how and why of auditing firewalls, including a discussion of policy, design, audit, and tools.<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (290 words) - 15:52, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (295 words) - 15:53, 2 March 2007
  • :* Obtain the periodic media destruction policy and verify it covers all media with cardholder data. ...
    2 KB (298 words) - 14:33, 2 March 2007
  • ...ether they have been reexamined. Obtain the organization’s access security policy and discuss with those responsible whether they follow such standards and g ...
    2 KB (304 words) - 19:56, 25 June 2006
  • ...and documented in accordance with the organization's information security policy.<br> * Act in accordance with the organization's information security policy, including execution of processes or activities particular to the individua ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • '''PO 6.1 IT Policy and Control Environment'''<br> * ISO 17799 3.1 Information security policy.<br> ...
    4 KB (580 words) - 18:00, 23 June 2006
  • :::'''PCI-4.2 B:''' Verify existence of a policy stating that cardholder data is not to be sent via unencrypted emails.<br> ...
    2 KB (299 words) - 17:50, 28 February 2007
  • ::'''PCI-7.1:''' Obtain the written policy for data control, and determine that it includes the following:<br> ...
    2 KB (314 words) - 14:09, 1 March 2007
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for proper contro ...
    7 KB (976 words) - 14:17, 1 May 2010
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...objectives and support the objectives established in the Asset Protection Policy.<br> ...bjectives and builds on the objectives established in the Asset Protection Policy by providing specific requirements for physical access to information asset ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...onsider if they have been configured in accordance with the organization’s policy. ...
    2 KB (315 words) - 18:38, 25 June 2006
  • :* Obtain the periodic media destruction policy and verify it covers all media with cardholder data. ...
    2 KB (323 words) - 14:31, 2 March 2007
  • :* Obtain and examine the modem usage policy and verify that it specifies and or requires: ...
    2 KB (311 words) - 15:54, 2 March 2007
  • ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']] defines objectives for establishing specific standards on the assessme ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirements for assessing and ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...pled system components. To verify that each user is authorized per company policy, perform the following:'''<br> ...
    3 KB (345 words) - 14:24, 1 March 2007
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (281 words) - 01:30, 2 May 2006
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...ementation, and maintenance of the Asset Identification and Classification Policy and associated standards and guidelines.<br> ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...mputer systems makes defining them difficult, both from technical and from policy perspectives. California's definition of computer systems, seems narrower t ...
    2 KB (243 words) - 03:35, 18 February 2009
  • ...d to compare against the actual situation. Review periodically against the policy for software usage the existence of any personal or unlicensed software or ...
    2 KB (281 words) - 17:31, 5 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (295 words) - 01:42, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (307 words) - 01:31, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (298 words) - 01:59, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (304 words) - 20:21, 1 May 2006
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for "closed-loop" ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (310 words) - 01:37, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (311 words) - 02:04, 2 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy.<br> ...
    2 KB (321 words) - 15:35, 25 June 2006
  • ...nsure timely identification of local and international legal, contractual, policy and regulatory requirements related to information, information service del ...
    2 KB (306 words) - 13:13, 4 May 2006
  • ===Policy on the use of cryptographic controls=== ...sibilities for implementation of and the monitoring of compliance with the policy<br> ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ITIL 9.3.2 Release policy and planning Service Support.<br> ...
    2 KB (296 words) - 17:59, 3 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (329 words) - 01:35, 2 May 2006
  • ...e was no announced monitoring policy on the network, university's computer policy stated that in general, all computer and electronic files should be free fr ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (325 words) - 01:16, 2 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (338 words) - 13:45, 6 March 2007
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (331 words) - 18:47, 1 May 2006
  • ISO 17799 3.1 Information security policy 4.1 Information security infrastructure.<br> ...
    2 KB (317 words) - 20:10, 1 May 2006
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific instructio ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (765 words) - 20:00, 15 January 2014
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ISO 177993.1 Information security policy.<br> ...
    2 KB (346 words) - 18:25, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (367 words) - 16:28, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    2 KB (345 words) - 01:18, 2 May 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (673 words) - 18:16, 14 January 2014
  • [[Security Policy:|'''Security Policy''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']] defines objectives for establishing specific standards on the assessme ...t and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']], and provides specific instructions and requirements for assessing and ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (681 words) - 21:56, 15 January 2014
  • :a) establishing a formal policy prohibiting the use of unauthorized software (see 15.1.2) :b) establishing a formal policy to protect against risks associated with obtaining files and software eithe ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ISO 17799 3.1 Information security policy 6.3 Responding to security incidents and malfunctions.<br> ...
    2 KB (353 words) - 18:22, 1 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (368 words) - 02:03, 2 May 2006
  • ...ity Assessment and Management Policy, and Threat Assessment and Monitoring Policy.<br> ...and hardening various technologies in accordance with the Asset Protection Policy.<br> ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ISO3.1 Information security policy<br> ...
    3 KB (394 words) - 17:12, 22 March 2007
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (390 words) - 12:10, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Department policy requires that the video surveillance application and order be filed separat ...
    2 KB (227 words) - 15:30, 21 May 2010
  • * ISO 177993.1 Information security policy.<br> ...
    3 KB (377 words) - 14:10, 8 August 2006
  • ...n is more susceptible due to inherent genetic or other factors, there is a policy choice whether to set policies for protecting the general population that a ...an one in a million has become common place in public health discourse and policy. How consensus settled on this particular figure is unclear. In some respec ...
    10 KB (1,633 words) - 16:03, 22 December 2007
  • ::*Maintain an Information Security Policy. ...
    3 KB (372 words) - 17:59, 7 July 2006
  • ...' (the "Company") [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropri ...stablished in the [[Sample Acceptable Use Policy:|'''Sample Acceptable Use Policy''']], and provides specific instructions and requirements on the proper and ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    3 KB (403 words) - 12:37, 23 June 2006
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    5 KB (737 words) - 15:24, 21 January 2014
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for following app ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for the proper id ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ===Backup policy=== ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • [[PO6.1:| 6.1 IT Policy and Control Environment]]<br> [[PO6.4:| 6.4 Policy Rollout]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']] defines objectives for establishing specific standards on the assessme ...sessment and Monitoring Policy:|'''Sample Threat Assessment and Monitoring Policy''']], and provides specific instructions and requirements for performing th ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> * Know and follow '''<Your Company Name>''' End User Computing and Technology Policy.<br> ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']], and provides specific instructions and requirements for the developme ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...he "Company") [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']] defines objectives for establishing specific standards for protecting ...lished in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Policy''']], and provides specific instructions and requirements for proper contro ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • ...ity or carrier value added services that are not explicitly listed in this policy guide should not be considered prohibited. ...her BYOD technology for corporate network access unless acceptance of this policy and all associated Company policies are first accepted and subsequent Compa ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...dard builds on the objectives established in the [[Sample Asset Protection Policy:|'''Sample Asset Protection Standard''']], and provides specific instructio ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ==SUB-CHAPTER I—FEDERAL INFORMATION POLICY== ...
    2 KB (207 words) - 11:58, 23 May 2010
  • ...ol sub-process defines the processes, the allocation of responsibility the policy statements and the management framework.<br> ...to be met in order to implement security management. The process ends with POLICY STATEMENTS. ...
    32 KB (4,804 words) - 14:10, 27 February 2009
  • Often when a company has no clear policy about use of computer time, the defendant can argue that he or she believed ...
    3 KB (513 words) - 18:22, 22 February 2009
  • ...ly customizable versions are available from [http://policy-machine.com The Policy Machine].<br> ...
    7 KB (974 words) - 19:34, 16 January 2014
  • ...gress to be kept classified in the interest of national defense or foreign policy. ...
    2 KB (327 words) - 00:58, 1 June 2010
  • '''Maintain an Information Security Policy ''' * [[PCI 12:|'''Requirement 12: Maintain a policy that addresses information security.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • ...ement leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security acros ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...curity controls both at inception of the coverage and over the term of the policy. ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ISO 3.1 Information security policy.<br> ...
    4 KB (548 words) - 14:21, 4 May 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    4 KB (594 words) - 19:50, 25 June 2006
  • ...our notions of what is fair and just, and conflict with the strong public policy of our State.” The court held that "the First Amendment simply does not per ...
    2 KB (314 words) - 19:35, 10 April 2011
  • ISO 3.1 Information security policy <br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • ...outline. It is reviewed at least twice a year and will include a strategy, policy, scope, objectives, roles and responsibilities, the CM processes, activitie ...
    4 KB (570 words) - 16:12, 23 March 2007
  • ...he "Company") [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] defines objectives for establishing specific standards for properly ma ...lished in the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] , and provides specific instructions and requirements for life cycle m ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ::* Updated the FDIC Statement of Policy issued pursuant to Section 19 of the Federal Deposit Insurance Act that pro ...://www.fdic.gov/news/news/financial/2002/fil0282.html Amended Statement of Policy on Bank Merger Act Transactions - "Anti-Money Laundering Record"]<br> ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...derstanding and practice, and statute did not impermissibly delegate basic policy matters to police officers, judges, and juries for resolution on an ad hoc ...
    4 KB (562 words) - 12:09, 18 February 2009
  • :* SP-4; Supervisory Policy On Large Scale Integrated Financial Software Systems (LSIS), November 1988 :* SP-5; Interagency Policy On Contingency Planning For Financial Institutions, July 1989 ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ...urity_Awareness_Standard:|Sample Third Party Security Awareness Standard]] policy example.<br> :* Policy – The institution has defined and documented its polices relevant to the pa ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • * [http://iac.dtic.mil/iatac/ia_policychart.html DoD IA Policy Chart] DoD IA Policy Chart ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...ness continuity is having a clear, unambiguous and appropriately resourced policy ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ...access visual depictions that constituted obscenity or child pornography; policy was consistent with library's interest in providing internet access for res ...
    4 KB (578 words) - 12:38, 18 February 2009
  • ...ancial institution discloses nonpublic information or not, there must be a policy in place to protect the information from foreseeable threats in security an ...agreement. In summary, the financial privacy rule provides for a privacy policy agreement between the company and the consumer pertaining to the protection ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...of the offsite storage facility should respond to the data classification policy and the enterprise’s media storage practices. IT management should ensure t ...
    5 KB (700 words) - 18:07, 23 June 2006
  • ...vices is performed in accordance with the organization's vendor management policy. ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ...to current system accounts should be investigated as they are most likely policy violations and the result of a breakdown with segregation of duties or poss ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...the need for security policies, standards and regulations, best practices policy framework, Command Center resources and benefits, as well as precepts of de ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...mply with the [[Sample Asset Management Policy:|'''Sample Asset Management Policy''']] and associated standards, guidelines, and procedures can result in dis ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...on ensuring that, from its inception, a requested IT service is reliable, policy-compliant, cost-effective, and adaptable to changing business needs. ...
    3 KB (461 words) - 14:19, 23 April 2010
  • ...ttps://auditmachine.com/ IT Audit Machine], [http://policymachine.com/ The Policy Machine], [https://lazarusalliance.com/services/your-personal-cxo/ Cybervis ...'s], [http://lazarusalliance.com/services/policies-governance/ governance, policy development], [http://lazarusalliance.com/services/audit-compliance/ IT aud ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...olding that Tasini failed to allege any personal injury resulting from the policy. ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...t from behaviour which is detrimental to the company as a whole. Charging policy needs to be simultaneously simple, fair and realistic. ...
    6 KB (885 words) - 10:12, 23 March 2007
  • :* Clear understanding of the provider’s security incidence response policy and assurance that the provider will communicate security incidents promptl ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...vices is performed in accordance with the organization's vendor management policy.<br> ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...vices is performed in accordance with the organization's vendor management policy. ...
    6 KB (870 words) - 18:08, 21 June 2006
  • ...the Federal Government; and (10) coordinate the development and review of policy associated with Federal information technology acquisition.<br> ...ct of Pilot Programs - Authorizes the Administrator of Federal Procurement Policy (FPP) to conduct pilot programs in order to test alternative approaches for ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ferent uses or discloses personal information not disclosed in the privacy policy under which personal information was collected. ...ng mechanisms should be carefully and fully disclosed in a website privacy policy. Furthermore, it is a best practice for websites that allow behavioral adve ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • Establishing a firm-wide metadata scrubbing and management policy. Implementing metadata-related policies and procedures can eliminate the ne ...
    4 KB (587 words) - 22:52, 15 March 2010
  • *5: [[Security policy]] - management direction ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ::c. access control policy, covering: :1. the information security policy; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...security controls we need to comply with the companies corporate security policy.<br> * Policy enforcement<br> ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...org/en/udrp/udrp-policy-24oct99.htm Uniform Domain Name Dispute Resolution Policy] (UDRP) proceeding. ...istrative proceedings under ICANN’s Uniform Domain Name Dispute Resolution Policy (UDRP). The UDRP allows a trademark owner to challenge domain name registr ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • ii. Are there any PUBLIC POLICY problems? ...
    8 KB (1,401 words) - 09:26, 7 April 2009
  • ISO 3.1 Information security policy.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...ice [http://www.usdoj.gov/criminal/cybercrime/ccpolicy.html Computer Crime Policy & Programs] ...
    5 KB (773 words) - 11:40, 27 August 2011
  • ...to overcome the presumption. These presumptions are expressions of social policy, such as the validity of marriage, sanity in civil cases, legitimacy of a c ...
    6 KB (1,070 words) - 10:18, 11 August 2009
  • | Policy |Describes the policy contents and KPA goals recommended by the CMM. ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...nutes? Take a look at [http://policy-machine.com/policymachine/choices The Policy Machine - a Lazarus Alliance service.]'''<br> *[http://policymachine.com The Policy Machine] ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • ...en it failed to maintain the data security promises it made in its privacy policy. The settlement requires Eli Lilly to implement physical, administrative an ...d would remain anonymous. The FTC noted that Alexa had changed its privacy policy, that the product was no longer on the market, and that Amazon had settled ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...ercept over or from within the targeted facilities. It is the Department's policy to name as potential subjects all persons whose involvement in the alleged ...e or law enforcement officer as defined in 18 U.S.C. § 2510(7). Department policy precludes the use of multiple affiants except when it is indicated clearly ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...ement leadership should be established to approve the information security policy, assign security roles and co-ordinate the implementation of security acros ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • 5. Make Your Own Security Policy . . . . . . . . . . . . . . 14 you should obtain the security policy of the site that you intend to ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...whose placement on the network is approved in accordance with institution policy. Change controls are typically used for devices inside the external perimet ...m required for work to be performed. The financial institution’s security policy should address access rights to system resources and how those rights are t ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • ...s involving the policy holder then some compensation may be payable to the policy holder that is commensurate to the suffering/damage. ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...ancial institution discloses nonpublic information or not, there must be a policy in place to protect the information from foreseeable threats in security an ...p agreement. In summary, the financial privacy rule provides for a privacy policy agreement between the company and the consumer pertaining to the protection ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...red on legislative policy, to deter fraudulent activities and transparency policy which misleads executives to treat the symptoms and not the cause.'<br> ...responsibility to endorse the organization's strategy, develop directional policy, appoint, supervise and remunerate senior executives and to ensure accounta ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • # [[Security policy]] - management direction ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...tricted what adults could read to a level appropriate only for minors. The policy also constituted an impermissible prior restraint because it lacked adequat ...The court dismissed a lawsuit challenging the City of Livermore libraries’ policy of open access to the Internet. Plaintiffs had argued that the library shou ...
    32 KB (4,920 words) - 19:22, 10 April 2011
  • ...form Act of 1996]] (Clinger-Cohen Act), explicitly emphasizes a risk-based policy for cost-effective security. In support of and reinforcing this legislation ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • :'''(3)''' report any significant deficiency in a policy, procedure, or practice identified under paragraph (1) or (2)—<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...es that signed up for the safe harbor program were not meeting the privacy policy transparency requirements that were agreed to under the plan. See http://eu ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • :'''(3)''' report any significant deficiency in a policy, procedure, or practice identified under paragraph (1) or (2)—<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...trol … than [a] public library, bookstore or newsstand”). It reflects “the policy of the United States . . . to preserve the vibrantand competitive free mark ...
    6 KB (919 words) - 14:33, 10 April 2011
  • ...mitations on a competitor’s access to such information could raise serious policy concerns. ...er the settlement’s terms, DoubleClick was required to explain its privacy policy in “easy-to-read” language; conduct a public information campaign consistin ...
    21 KB (3,283 words) - 13:26, 26 April 2011
  • ===FCC broadband policy statement=== ...sion (FCC) issued a Broadband Policy Statement (also known as the Internet Policy Statement), which lists four principles of open Internet "To encourage broa ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...ch can be made annually. Institutions are also required to create a formal policy on what will be disclosed, controls around them along with the validation a structural models, and the complexities of public policy and existing regulation. Banks’ senior management will determine corporate ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • ...companies are now providing Internet services. The '''Cable Communications Policy Act''' ("the Cable Act"), 47 U.S.C. § 551 restricts when the government can ...fiable information from California consumers to post a conspicuous privacy policy. The text of this law, as well as the legislative counsel's digest and the ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • *[[44_USC_3501-3549 | 44 USC 3501-3549 Coordination of Federal Information Policy]] *[http://www.techlawforum.net/category/internet-policy/ Santa Clara University School of Law Tech LawForum] ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...companies are now providing Internet services. The '''Cable Communications Policy Act''' ("the Cable Act"), 47 U.S.C. § 551 restricts when the government can ...fiable information from California consumers to post a conspicuous privacy policy. The text of this law, as well as the legislative counsel's digest and the ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • ...f copyrighted material do not constitute copyright infringement."). Online Policy Group v. Diebold, Inc., 337 F. Supp. 2d 1195, 1200 (N.D. Cal. 2004) ("fair ====Public Policy==== ...
    31 KB (4,913 words) - 07:20, 11 April 2011
  • ::* A written and adequate data security policy is in effect covering all major operating systems, databases, and applicati ::* Existing controls comply with the data security policy, best practices, or regulatory guidance ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...red on legislative policy, to deter fraudulent activities and transparency policy which misleads executives to treat the symptoms and not the cause.' ...responsibility to endorse the organization's strategy, develop directional policy, appoint, supervise and remunerate senior executives and to ensure accounta ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • ...vices is performed in accordance with the organization’s vendor management policy. ...tify and remove more these data elements that represent potential privacy, policy, and security threats.<br> ...
    39 KB (5,914 words) - 17:55, 13 April 2007
  • ...isk management areas. An effective IT risk assessment process will improve policy and internal controls decisions across the organization.<br> ...elf-assessments on IT-related controls can provide early identification of policy noncompliance or weaknesses in controls. ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ===Public policy=== Trademark law is designed to fulfill the public policy objective of consumer protection, by preventing the public from being misle ...
    39 KB (6,281 words) - 14:29, 26 April 2011
  • ...rds through profiles. Database authentication MUST use a password security policy to maintain database access security. You MUST implement password constrain ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...been granted access to Company information or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...of the EU's Commission of Home Affairs, complained about the US bilateral policy concerning PNR. The US had signed in February 2008 a memorandum of understa ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...le vendor master file with the employee address file, to uncover potential policy violations or fraud. Moving forward, increase the tests and gradually expan ...
    15 KB (2,212 words) - 17:29, 19 February 2015
  • The implementation phase involves policy changes, material acquisitions, staffing and testing. ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • An acceptable use policy. It documents permitted system uses and activities for a specific user, and ...de the development and implementation of an IT strategy and an IT security policy, the organization of IT staff to separate conflicting duties and planning f ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • # Online Policy Group v. Diebold, Inc., 337 F.Supp.2d 1195, 1202 n.12 (N.D. Cal. 2004) ("Hy ...523 (2d Cir. 1991). A "fair use is not infringement of a copyright" Online Policy Group v. Diebold, Inc., 337 F.Supp.2d 1195, 1200 (N.D.Cal. 2004) (citing Ca ...
    27 KB (4,215 words) - 07:04, 11 April 2011
  • Courts across the country have upheld Section 230 immunity and its policy of regulatory forbearance in a variety of factual contexts. ...gainst AOL, as well claims such as negligence, breaching a mandated public policy, intentional nuisance, and emotional distress); Promissory Estoppel can wai ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...implementation in any other state under the standard provisions of public policy (law)). Under Article 34 Statute of the ICJ only states may be parties in c ...
    20 KB (3,032 words) - 13:27, 12 October 2011
  • ...is the influence of the National Security Agency in cipher development and policy. NSA was involved with the design of Data Encryption Standard during its de ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...ssments should also be performed that are driven by a check listed company policy that will provide consistent results.<br> ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...er messages stored by provider of communication service based on "informal policy that the text messages would not be audited"). ...no reasonable expectation of privacy in computer in light of computer use policy); American Postal Workers Union, Columbus Area Local AFL-CIO v. United Stat ...
    154 KB (23,956 words) - 13:16, 5 August 2011
  • ** Policy gaps? ...
    23 KB (3,630 words) - 10:19, 27 October 2012
  • In other cases, network providers may wish to establish a more limited policy. Here are three examples of relatively narrow banners that will generate co ...access, view, or obtain obscene materials. To ensure compliance with this policy, the Cyber-Fun Internet Café reserves the right to record the names and add ...
    83 KB (12,981 words) - 12:42, 5 August 2011
  • ...lection of content through the use of reasonably available technology, DOJ policy requires that the government may not use any inadvertently collected conten ...of wire communications, see 18 U.S.C. § 2516(1), and by Justice Department policy in the case of electronic communications (except for numeric pagers). See U ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...proved dispute resolution organization. See http://www.icann.org/udrp/udrp-policy-24oct99.htm. Generally, complainants must show that they have valid rights ...pix put the domain name on hold through the ICANN prior dispute resolution policy. In reversing the district court’s grant of summary judgment to ISS, the Ni ...
    29 KB (4,582 words) - 10:16, 13 April 2011
  • ...P/DMCA/finkelstein_on_dmca.html How To Win (DMCA) Exemptions And Influence Policy]''. ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • .../ WIPO Intellectual Property Handbook (a comprehensive introduction to the policy, law and use of IP)] ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...unlikely ever to be identified. The Court of Appeal considered sentencing policy for deception offenses involving "identity theft" and concluded that a pris ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...e intended to "intimidate or coerce a civilian population," "influence the policy of a government by intimidation or coercion," or are undertaken "to affect ...al Support Provisions of the Anti-Terrorism Laws". ''Cardozo Pub. [?] Law Policy & Ethics Journal'' 2 (2003): 107. ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...the search violated the Fourth Amendment. See id. Under Payton, it is good policy for prosecutors and agents seeking a warrant in the Ninth Circuit to always ...neys' Manual, §9-19.210. Importantly, however, failure to comply with this policy "may not be litigated, and a court may not entertain such an issue as the b ...
    138 KB (21,660 words) - 13:18, 5 August 2011