Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • ...ween the Internet and system components, including the choke router at the Internet, the DMZ router and firewall, the DMZ cardholder segment, the perimeter rou ...
    446 bytes (56 words) - 12:06, 16 June 2010
  • ...older data environment to the Internet such that outbound traffic can only access IP addresses within the DMZ.'''<br> ...ound traffic from the cardholder data environment to the Internet can only access IP addresses within the DMZ.<br> ...
    2 KB (276 words) - 11:07, 16 June 2010
  • ...loyees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key prot ...-control.jpg]] [[PCI-1.1.3:|PCI-1.1.3 Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal networ ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...] The ECPA also criminalizes obtaining, altering, or preventing authorized access to electronic storage.[[FN65]] Under the ECPA, it is a crime to break into ...servers:''' Search and seizure of defendant's e-mail files from server of Internet service provider (ISP) by technicians of ISP was reasonable under Fourth Am ...
    3 KB (456 words) - 11:09, 18 February 2009
  • ...d turn off computer to control information that came into their homes from internet. U.S.C.A. Const. Amend. 1; M.C.L.A. § 722.675(1). Cyberspace Communications ...preventing use of library computers to view online pornography. Children's Internet Protection Act, § 1701, 114 Stat. 2763A-335. Miller v. Northwest Region Lib ...
    4 KB (578 words) - 12:38, 18 February 2009
  • ...nces, network segmentation, and intrusion detection) are used to authorize access and control information flows from and to networks. ...has policies and procedures regarding program development, program change, access to programs and data, and computer operations, which are periodically revie ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...ime. California, for example, defines computer crime to be the intentional access of a computer system "for the purpose" of a scheme or artifice to defraud o ...zed access to computer systems, have argued in defense that they attempted access to computer systems not knowing what systems they might get into.[[FN5]] ...
    3 KB (513 words) - 18:22, 22 February 2009
  • ...activity. An individual with a remote terminal at his or her home may get access to the victim's computer system from virtually anywhere there is a phone co ...from gaining access to a computer that is not reflected by a change in the access code. ...
    4 KB (717 words) - 18:04, 22 February 2009
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    442 bytes (66 words) - 12:09, 16 June 2010
  • :'''Prohibit direct public access between external networks and any system component that stores cardholder i :* To determine that direct access between external public networks and components storing cardholder data are ...
    2 KB (308 words) - 11:40, 3 March 2007
  • =='''Sample Internet Acceptable Use Standard'''== This Internet Acceptable Use Standard builds on the objectives established in the [[Sampl ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • Under federal law, it is illegal to use any unauthorized access device, including a computer, to obtain money, goods, services, or any othe ...uirement of the Digital Millennium Copyright Act (DMCA), where it provided Internet service provider with information that identified two newsgroup sites creat ...
    4 KB (642 words) - 11:15, 18 February 2009
  • ...sed had a password known only to her, and system's log-on banner described access to "monitor" the computer system, not to engage in law enforcement intrusio ...ted that in general, all computer and electronic files should be free from access by any but the authorized user of those files, and defendant's computer was ...
    5 KB (741 words) - 18:58, 22 February 2009
  • ...ts and passwords have been changed. (Use vendor manuals and sources on the Internet to find vendor-supplied accounts and passwords.)'''<br> ::::* Default SNMP community strings on access points were changed. ...
    3 KB (369 words) - 14:23, 27 February 2007
  • ...re sent from your computer through the Internet via cleartext. Anyone with access to the medium used to carry the data (the routers, computers, telecommunica ...
    1 KB (218 words) - 16:40, 14 June 2007
  • ...e Internet (for example, laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...standards are acceptable and that updates are current prior to authorizing access to employee-owned or mobile end point devices.'''<br> ...
    2 KB (296 words) - 10:57, 16 June 2010
  • :'''DCIDs: Director of Central Intelligence Directives.''' Protecting Special Access Program Information Within Information Systems policy excerpt: [[Media:JAFA ...evelopment of Internet Acceptable Use Standards:''' [[Media:Development-of-Internet-Acceptable-Use-Standards.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • Third party personnel who have been granted access to Company information or systems are covered by this standard and must com ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...h as Secure Sockets Layer (SSL), Point-to-Point Tunneling Protocol (PPTP), Internet Protocol Security (IPSEC) to safeguard sensitive cardholder data during tra ...] (e.g., SSL) wherever cardholder data is transmitted or received over the Internet by performing the following:'''<br> ...
    2 KB (346 words) - 12:22, 31 January 2014
  • ...ing for schools and libraries on the installation of filtering software on Internet-ready computers to block objectionable content. ...) the E-rate program, under the Communications Act of 1934, which provides Internet and telecommunications subsidies to schools and libraries. ...
    5 KB (707 words) - 19:01, 10 April 2011
  • ...Develop and maintain secure systems and applications and implement Strong Access Control Measures. == * Unscrupulous individuals use security vulnerabilities to gain privileged access to systems. Many of these vulnerabilities are fixed via vendor security pat ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...ous, fraudulent, or economic reasons. Additionally, the degree of internal access granted to some users increases the risk of accidental damage or loss of in ...n information on all new employees. The sensitivity of a particular job or access level may warrant additional background and credit checks. Institutions sho ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...e National Institute of Standards and Technology (NIST), CobiT, HIPAA, the Internet Security Forum (ISF), and ISO 27002 each provide robust guidance on physica ...nes Physical and Environmental Security objectives to prevent unauthorized access, damage and interference to business premises and information; prevent loss ...
    4 KB (592 words) - 19:28, 14 June 2007
  • ...ad within minutes (some say even seconds) with devastating consequences to Internet and otherwise. ...to recognize the safety of a limited set of programs (e.g., those that can access or modify only a given subset of machine resources) while rejecting both so ...
    4 KB (570 words) - 19:02, 14 June 2007
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (305 words) - 17:31, 3 August 2006
  • By not allowing access to the Internet from company resources.<br> ...
    2 KB (309 words) - 17:34, 3 August 2006
  • ...y to the Internet (e.g., laptops used by employees), and which are used to access the organization’s network, have personal firewall software installed and a ...
    3 KB (340 words) - 11:39, 3 March 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to Company information or systems, are covered by this standard and must co ...any information systems and equipment including Electronic Mail Resources, Internet Resources, and Telecommunications Resources.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...e, or have read or write permission to a socket for communicating over the Internet.<br> ...
    2 KB (341 words) - 18:37, 14 June 2007
  • ...the logging information is in line with business requirements in terms of access rights and retention requirements.<br> ::'''4. Risk: Users may have inappropriate access to the application system.'''<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...sms. The code also can be hidden in programs that are downloaded from the Internet or brought into the institution on diskette. At times, the malicious code ...Most malicious code is general in application, potentially affecting all Internet users with whatever operating system or application the code needs to funct ...
    4 KB (568 words) - 17:25, 10 April 2007
  • ...ed by others to perform work on Company premises, or who have been granted access to and use of Company information or systems are covered by this standard a ...able Use Standard:|'''Sample Electronic Mail Acceptable Use Standard''']], Internet Resources, and Telecommunications Resources.<br> ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...es also have attempted to regulate material distributed to minors over the Internet, with mixed success. ...itutional a state statute that prohibited sending sexual material over the Internet with the intent to seduce minors. But see Hatch v. Superior Court, 80 Cal. ...
    4 KB (639 words) - 19:02, 10 April 2011
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,358 words) - 11:00, 18 February 2009
  • ...to restrict access to sites based on geographic locale of each particular Internet user, COPA essentially required that every publisher abide by the most rest ...nment must independently link all images upon which conviction is based to Internet. 18 U.S.C.A. § 2252A(a)(5)(B). U.S. v. Henriques, 234 F.3d 263 (5th Cir. 20 ...
    9 KB (1,359 words) - 12:35, 18 February 2009
  • ...each type of crime has a range of punishments. In California, for example, access to defraud can be treated as a felony, involving punishment of up to three ...ed sexual conduct was not available after conviction of attempting via the internet to persuade a minor to engage in sexual activity and traveling in interstat ...
    4 KB (680 words) - 12:52, 18 February 2009
  • ...ave committed the crime. Where a log is maintained of individuals who have access to the computer, it may be possible to elicit an admission that no effort w ...of expert regarding availability of allegedly comparable materials on the Internet, as mere availability of such materials did not show that community accepte ...
    3 KB (431 words) - 21:02, 22 February 2009
  • ...fferent coding errors can be exploited by an attacker to gain unauthorized access to a computer system. In addition, design considerations for minimizing the ...nt is also relevant to traditional dial-up users (users who connect to the Internet using a modem).<br> ...
    10 KB (1,527 words) - 12:47, 25 April 2007
  • ...an include advising employees of the existence of a trade secret, limiting access to the information to a "need to know basis," requiring employees to sign c ==Disclosure over the Internet== ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • :* How would the department function if mainframe, network and/or Internet access were not available? ...
    3 KB (453 words) - 18:45, 25 April 2007
  • Mere allegation that senders of unsolicited e-mails failed to remove Internet access service provider within ten days of telephone call to senders' general coun ...e-mail headers referring to non-functional e-mail address as sender and an Internet domain not linked to sender did not make the headers materially false or ma ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • ...t access to media, while ensuring that all employees have authorization to access the minimum data required to perform their responsibilities. More sensitive ...beacons, and remote deletion capabilities. The latter two controls can be Internet-based. Homing beacons send a message to the institution whenever they are ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • ...ata center has adequate physical security controls to prevent unauthorized access to the data center. :* Data Center Personnel – All data center personnel should be authorized to access the data center (key cards, login ID’s, secure passwords, etc.). Data cente ...
    21 KB (3,112 words) - 16:52, 15 June 2007
  • ...rey v. Demon Internet Ltd., 1999 WL 477647 (High Ct. U.K. 1999). Defendant Internet service provider, hosted a newsgroup that contained a posting defamatory of ...available online will be considered to be republished each time that users access it. Defendant printed articles identifying plaintiff as “a suspected Mafia ...
    6 KB (895 words) - 14:52, 10 April 2011
  • ...jurisdictions and are subject to laws independent of their presence on the Internet. Trout, B. (2007). "Cyberlaw: A Legal Arsenal For Online Business", New Yor ...mits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. Ther ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...on service is provided;” or “(2) intentionally exceeds an authorization to access that facility; and thereby obtains...[an] electronic communication while it ...t Service Provider Association, Electronic Evidence Compliance—A Guide for Internet Service Providers, 18 BERKELEY TECH. L. J. 945, 965 (2003) ([No Stored Comm ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • *Implement strict access controls and permissions. ...s largest payment networks, Visa and MasterCard have established mandatory Internet and Intranet security guidelines that merchants must follow known as the Pa ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • * Put a firewall between your server and the Internet. * Allow linked server access only to those logins that need it. ...
    7 KB (1,018 words) - 13:53, 14 May 2007
  • The Federal Trade Commission has formed an Internet Advertising Group within the Bureau of Consumer Protection’s Division of Ad ...Marketing on the Internet: The Rules of the Road,”; (iii) “Selling on the Internet: Prompt Delivery Rules,”; (iiii) “How to Comply with the Children’s Online ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...serve the vibrantand competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State reg ===Protections for Restricting Access=== ...
    6 KB (919 words) - 14:33, 10 April 2011
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)