Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as custome ...Security Program Charter by defining objectives for establishing specific standards to ensure the security and confidentiality of customer information, as well ...
    4 KB (535 words) - 16:51, 25 July 2006
  • '''PO 3.4 Technology Standards'''<br> ...pliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compliance with ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ...er:|'''Information Security Program Charter''']]. and associated policies, standards, guidelines, and procedures. ...arter:|'''Information Security Program Charter''']] and relevant policies, standards and guidelines must be properly communicated to Company corporate and busin ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...subscribe to alert services freely available on the Internet). Update your standards to address new vulnerability issues.<br> ...r security vulnerability information and updating the system configuration standards reviewed in Requirement 2 as new vulnerability issues are found.<br> ...
    2 KB (303 words) - 18:22, 28 February 2007
  • Katz, Non-Warrant Search Challenges US v. Ross: Evolving Standards of Warrantless Searches, 74 J Crim L and Criminology 172 (1983). ...
    413 bytes (60 words) - 03:02, 5 March 2009
  • ..., including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> :'''(2)''' requiring agencies, consistent with the standards promulgated under such section 11331 and the requirements of this subchapte ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • ==Policies, Standards, and Guidelines== ...ise but do not have a reportable status to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...olicy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...olicy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''4. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...Develop configuration standards for all system components. Make sure these standards address all known security vulnerabilities and industry best practices.'''< ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...
    5 KB (728 words) - 14:07, 1 May 2010
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information ...el of protection. This section provides templates for Information Security standards that are required to comply with ISO Asset Classification and Control objec ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...oftware and data. This section provides templates for Information Security standards that are required to comply with ISO Systems Development and Maintenance ob ...ions and requirements for establishing and maintaining baseline protection standards for Company network devices, servers, and desktops.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...ary authority to establish and implement technology- and solution-specific standards.<br> ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as all ele ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...ts; ensure compliance of systems with organizational security policies and standards; and maximize the effectiveness of and to minimize interference to or from ==Identification of Applicable Statutes, Regulations and Certification Standards== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''7. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...ommon security parameter settings are included in the system configuration standards.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
View ( | ) (20 | 50 | 100 | 250 | 500)