Search results

Jump to navigation Jump to search

Page title matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • 3 KB (363 words) - 11:45, 29 August 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • 4 KB (644 words) - 14:43, 15 May 2007
  • ...sset Management Standard''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...s for establishing and maintaining legal evidence retention and protection standards for Company physical and electronic data stores, network devices, servers, ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • =='''Oracle Database Asset Protection Standards:'''== It is recommended that the accepted standards developed by the company be applied to the default profile to eliminate any ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • 7 KB (1,018 words) - 13:53, 14 May 2007

Page text matches

  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    5 KB (597 words) - 15:27, 16 November 2006
  • =='''Technical Standards Guides'''== ...iled descriptions and explanations. This section provides sample technical standards guides that your organization can copy and tailor to its unique requirement ...
    4 KB (512 words) - 12:05, 25 July 2006
  • ==Sources of standards for Information Security== ...d that coordinates the system. The ISO is the world's largest developer of standards. The ISO-15443: "Information technology - Security techniques - A framewor ...
    2 KB (287 words) - 14:29, 8 March 2007
  • ...ards for Privacy of Individually Identifiable Health Information, Security Standards for the Protection of Electronic Protected Health Information, and General ...
    400 bytes (47 words) - 13:15, 15 June 2007
  • ...1.3:]], [[PCI-1.1.4:]], [[PCI-1.1.5:]], and [[PCI-1.1.6:]], to verify that standards are complete. ...
    242 bytes (27 words) - 12:18, 16 June 2010
  • ...Information Security Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain a risk management-based ...ion Security Policy templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    1 KB (204 words) - 13:03, 14 July 2006
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information ...le Policy Framework templates (for example, Program Charter, policies, and standards) that are needed to create, implement, and maintain an Information Security ...
    2 KB (260 words) - 13:17, 15 June 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (278 words) - 21:22, 2 March 2007
  • ...nology Security Policy define Company objectives for establishing specific standards on the protection of the confidentiality, integrity, and availability of Co ...c perspective that must be addressed in the subordinate control documents; standards, procedures, and supporting documentation are described as follows.<br> ...
    4 KB (465 words) - 15:46, 13 January 2014
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (290 words) - 21:22, 2 March 2007
  • :'''Establish firewall configuration standards that include:'''<br> ...n standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation: ...
    2 KB (315 words) - 21:21, 2 March 2007
  • :::a. [[SOX.2.0.18:|'''SOX.2.0.18''']] A framework of security standards has been developed that supports the objectives of the security policy. Obtain a copy of the security standards and: ...
    3 KB (360 words) - 16:59, 25 June 2006
  • ...tion provides sample Policy Framework templates (for example, policies and standards) that are needed to create, implement, and maintain an Information Security ...ty Program that complies with GLBA. Additional best practices policies and standards are provided for financial organizations that wish to exceed GLBA requireme ...
    2 KB (263 words) - 12:52, 14 July 2006
  • '''BS 7799''' was a standard originally published by British Standards Institution (BSI) in 1995. It was written by the United Kingdom Government' ...n revised in June 2005 and finally incorporated in the ISO 27000 series of standards as [[ISO/IEC 27002]] in July 2007. ...
    2 KB (249 words) - 10:56, 27 October 2012
  • :[[Information_Security_Standards_Sources:|'''Sources of Information Security Standards''']]<br> ...to some international sites that provide many of the information security standards we should be familiar with.<br> ...
    1,015 bytes (132 words) - 14:09, 8 March 2007
  • :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> :'''(2)''' overseeing the implementation of policies, principles, standards, and guidelines on information security;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    3 KB (405 words) - 00:10, 13 June 2006
  • ...ion and Classification Policy defines objectives for establishing specific standards to define, identify, classify, and label information assets.<br> :The Asset Protection Policy defines objectives for establishing specific standards for providing an appropriate degree of confidentiality, integrity, and avai ...
    3 KB (404 words) - 14:53, 25 July 2006
  • ...chnology (NIST, At the time named National Bureau of Standards) to develop standards of minimum acceptable practices with the help of the National Security Agen ...
    1 KB (168 words) - 11:37, 23 May 2010
  • ...on of the Information Security Program Charter and associated policies and standards.<br> ...ion security awareness training for management should cover all topics and standards for employees or Users, as well as the following policies:<br> ...
    5 KB (662 words) - 17:54, 25 July 2006
  • ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as custome ...Security Program Charter by defining objectives for establishing specific standards to ensure the security and confidentiality of customer information, as well ...
    4 KB (535 words) - 16:51, 25 July 2006
  • '''PO 3.4 Technology Standards'''<br> ...pliance with these standards and guidelines. This forum directs technology standards and practices based on their business relevance, risks and compliance with ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • ...er:|'''Information Security Program Charter''']]. and associated policies, standards, guidelines, and procedures. ...arter:|'''Information Security Program Charter''']] and relevant policies, standards and guidelines must be properly communicated to Company corporate and busin ...
    3 KB (418 words) - 19:53, 14 January 2014
  • ...subscribe to alert services freely available on the Internet). Update your standards to address new vulnerability issues.<br> ...r security vulnerability information and updating the system configuration standards reviewed in Requirement 2 as new vulnerability issues are found.<br> ...
    2 KB (303 words) - 18:22, 28 February 2007
  • Katz, Non-Warrant Search Challenges US v. Ross: Evolving Standards of Warrantless Searches, 74 J Crim L and Criminology 172 (1983). ...
    413 bytes (60 words) - 03:02, 5 March 2009
  • ..., including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> :'''(2)''' requiring agencies, consistent with the standards promulgated under such section 11331 and the requirements of this subchapte ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ...f Management and Budget or the Director thereof, the National Institute of Standards and Technology, or the head of any agency, with respect to the authorized u ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • ==Policies, Standards, and Guidelines== ...ise but do not have a reportable status to a companies Board of Directors. Standards are approved by a companies technology review board.<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ...olicy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...olicy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk m ...
    5 KB (705 words) - 11:39, 30 May 2015
  • '''4. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (729 words) - 13:40, 23 June 2006
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (766 words) - 13:42, 23 June 2006
  • ...Develop configuration standards for all system components. Make sure these standards address all known security vulnerabilities and industry best practices.'''< ...
    2 KB (283 words) - 17:00, 26 June 2006
  • ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...
    5 KB (728 words) - 14:07, 1 May 2010
  • ...s from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information ...el of protection. This section provides templates for Information Security standards that are required to comply with ISO Asset Classification and Control objec ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • ...oftware and data. This section provides templates for Information Security standards that are required to comply with ISO Systems Development and Maintenance ob ...ions and requirements for establishing and maintaining baseline protection standards for Company network devices, servers, and desktops.<br> ...
    5 KB (613 words) - 18:14, 25 July 2006
  • ...ary authority to establish and implement technology- and solution-specific standards.<br> ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label sensitive information assets such as all ele ...
    5 KB (614 words) - 16:46, 25 July 2006
  • ...ts; ensure compliance of systems with organizational security policies and standards; and maximize the effectiveness of and to minimize interference to or from ==Identification of Applicable Statutes, Regulations and Certification Standards== ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''7. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (779 words) - 13:45, 23 June 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...ommon security parameter settings are included in the system configuration standards.<br> ...
    3 KB (366 words) - 13:52, 28 February 2007
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (821 words) - 18:11, 28 August 2006
  • :'''(4)''' consult with the National Institute of Standards and Technology, agencies or offices operating or exercising control of nati ...Federal information security incident center to the extent consistent with standards and guidelines for national security systems, issued in accordance with law ...
    1 KB (196 words) - 19:07, 3 June 2010
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    6 KB (816 words) - 13:41, 23 June 2006
  • '''PO 8.2 IT Standards and Quality Practices'''<br> Identify and maintain standards, procedures and practices for key IT processes to guide the organization in ...
    3 KB (460 words) - 16:08, 21 June 2006
  • ...policy area. Information Security procedures describe how to implement the standards. ...ure that the Information Security Program Charter and associated policies, standards, guidelines, and procedures are properly communicated and understood by est ...
    2 KB (316 words) - 15:19, 13 January 2014
  • ...the current network diagram is consistent with the firewall configuration standards. ...
    2 KB (287 words) - 10:55, 4 July 2015
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • *15: Compliance - ensuring conformance with information security policies, standards, laws and regulations ...ection outlines a risk assessment process although there are more specific standards covering this area such as ISO Technical Report TR 13335 GMITS Part 3 - Gui ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ...ions and requirements for establishing and maintaining baseline protection standards for Company network devices, servers, and desktops. ## Protection standards must be established and implemented for all computing and network resources ...
    5 KB (681 words) - 21:56, 15 January 2014
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...quired for each system ID. Password configuration is based on Corporate IT standards.<br> ...
    7 KB (895 words) - 13:44, 23 June 2006
  • '''8. Risk: Insufficient security standards may allow unauthorized access to production systems and business data store ...for each administrator ID. Password configuration is based on Corporate IT standards.<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • ...e to have cast doubt upon the "computational infeasibility" assumed by the standards, for digital signature as well as confidentiality encryption software. See ...
    805 bytes (108 words) - 15:50, 3 April 2007
  • ...mple Information Security Program Charter''']] and associated policies and standards.<br> ...ion security awareness training for management should cover all topics and standards for employees or Users, as well as the following policies:<br> ...
    6 KB (752 words) - 14:02, 1 May 2010
  • ==NIST: National Institute of Standards and Technology Publications== ===FIPS: Federal Information Processing Standards=== ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ...e personal firewall software is configured by the organization to specific standards and is not alterable by mobile computer users.<br> ...
    442 bytes (66 words) - 12:09, 16 June 2010
  • '''PO 8.3 Development and Acquisition Standards'''<br> ...e standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; a ...
    6 KB (863 words) - 13:12, 23 June 2006
  • Develop and follow a set of procedures and standards that is consistent with the business organization’s overall procurement pro ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    3 KB (442 words) - 13:59, 23 June 2006
  • ...ysical security needs and decipher which or which parts of these and other standards are most applicable.<br> ...ssing facilities. This section provides templates for Information Security standards that are required to comply with ISO Physical and Environmental Security ob ...
    4 KB (592 words) - 19:28, 14 June 2007
  • :* '''PCI-1.1.5.a:''' Verify that firewall and router configuration standards include a documented list of services, protocols and ports necessary for bu ...documented and implemented by examining firewall and router configuration standards and settings for each service. An example of an insecure service, protocol, ...
    3 KB (353 words) - 12:28, 16 June 2010
  • ...le Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...ptable Use Policy:|'''Sample Acceptable Use Policy''']] and its associated standards.<br> ...
    6 KB (857 words) - 12:22, 19 July 2007
  • ...mmissioners lacked the qualifications required by law, irregular selection standards or procedures for composing the jury roll, and improperly sent or served ju ...
    1 KB (167 words) - 20:02, 22 February 2009
  • ...)''' implements information security policies and practices as required by standards and guidelines for national security systems, issued in accordance with law ...
    709 bytes (103 words) - 10:41, 2 June 2010
  • ...)''' implements information security policies and practices as required by standards and guidelines for national security systems, issued in accordance with law ...
    709 bytes (103 words) - 21:02, 3 June 2010
  • ...erwise unchanged) in 2007 to align with the other [[ISO/IEC 27000-series]] standards. # Compliance - ensuring conformance with [[information security policies]], standards, laws and regulations ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ...led '''blackers''', because they convert RED signals to BLACK. [[TEMPEST]] standards spelled out in NSTISSAM TEMPEST 2-95 specify shielding or a minimum physica ...
    1 KB (170 words) - 16:06, 14 June 2007
  • * ''International Journal of IT Standards and Standardization Research'', ISSN: 1539-3054 (internet), 1539-3062 (prin [[Category:ISO standards|#20000]] ...
    2 KB (298 words) - 14:25, 23 April 2010
  • '''BS 25999''' is the British Standards Institution (BSI)'s standard in the field of [[Business continuity planning ...s a Business Continuity Management (BCM) standard published by the British Standards Institution (BSI). ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...
    2 KB (287 words) - 14:26, 27 February 2007
  • ...t Management Standard defines Company objectives for establishing specific standards for the management of the networks, systems, and applications that store, p The Company will establish and maintain Asset Protection Standards in accordance with the information asset protection objectives established ...
    3 KB (389 words) - 17:40, 14 January 2014
  • ...ccess to applications because the database passwords do not meet corporate standards.'''<br> ...re required for each user. Password configuration is based on Corporate IT standards.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...s name in his own hand, intended to be bound." In re National Institute of Standards and Technology — Use of Electronic Data Interchange to Create Valid Obligat ...
    695 bytes (105 words) - 12:39, 16 October 2014
  • ...spe.hhs.gov/admnsimp/pl104191.htm HIPAA] requires the adoption of national standards for electronic health care transactions and national identifiers for provid ...urity. It was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB, Mast ...
    4 KB (556 words) - 14:03, 8 March 2007
  • ...ies, including an explanation or listing of security policies, principles, standards and compliance requirements of importance to the organization<br> ...Security Program Charter by defining objectives for establishing specific standards to properly classify and label information assets.<br> ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ...her speech is obscene is determined partly by reference to local community standards. As a result, speech that is legally obscene and therefore without constitu * Whether the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient intere ...
    6 KB (925 words) - 18:53, 10 April 2011
  • ...mple Information Security Program Charter''']] and associated policies and standards.<br> '''C. Standards''' ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • ...cal Information Infrastructure. To promote the development of key security standards and guidelines to support the implementation of and compliance with the Fed * Standards for categorizing information and information systems by mission impact. ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ...anagement approach to develop and implement Information Security policies, standards, guidelines, and procedures. The Information Security Program will protect ...set Protection Policy defines Company objectives for establishing specific standards on the protection of the confidentiality, integrity, and availability of Co ...
    10 KB (1,314 words) - 18:06, 15 March 2009
  • ...sset Management Standard''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...s for establishing and maintaining legal evidence retention and protection standards for Company physical and electronic data stores, network devices, servers, ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...ecurity policy and discuss with those responsible whether they follow such standards and guidelines dealing with sensitive backup data. ...
    2 KB (304 words) - 19:56, 25 June 2006
  • ...ceptable Use Standard defines Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunicat ...illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely on Company, c ...
    3 KB (464 words) - 17:48, 14 January 2014
  • ...s; security personnel enforce access rights in accordance with institution standards. Because of their internal access levels and intimate knowledge of financia ...pport security awareness and strengthen compliance with security policies, standards, and procedures. Ultimately, the behavior and priorities of senior manageme ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ...ject management techniques. The section details general project management standards, procedures, and controls and discusses various development, acquisition, a ...in all situations. However, organizations should employ project management standards, procedures, and controls commensurate with the characteristics and risks o ...
    12 KB (1,538 words) - 22:41, 25 April 2007
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle.<br> ...
    2 KB (298 words) - 18:26, 28 February 2007
  • ...nce of information and communication technology'' was published in 2005 by Standards Australia. The standard provides principles, a model and vocabulary as a ba ...
    1 KB (150 words) - 16:22, 20 April 2010
  • ...h those responsible for third-party service management if they follow such standards. Obtain and test evidence that the selection of vendors for outsourced serv ...
    2 KB (306 words) - 18:32, 14 June 2006
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (297 words) - 18:33, 28 February 2007
  • ...h those responsible for third-party service management if they follow such standards. ...
    2 KB (295 words) - 15:40, 25 June 2006
  • ...ardized reports, such as trust services reports or a Statement of Auditing Standards 70 (SAS 70) report. ...
    6 KB (829 words) - 19:14, 17 April 2007
  • ...anagement approach to develop and implement Information Security policies, standards, guidelines, and procedures. The Information Security Program will protect ...assification Standard defines Company objectives for establishing specific standards on the identification, classification, and labeling of Company information ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (304 words) - 18:36, 28 February 2007
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (307 words) - 18:29, 28 February 2007
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (304 words) - 18:28, 28 February 2007
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...
    2 KB (318 words) - 13:54, 28 February 2007
  • ...Technology Policy define the Company objectives for establishing specific standards on appropriate business use of the Company's information and telecommunicat ...illegal, harassing, offensive, or in violation of other Company policies, standards or guidelines, or any other uses that would reflect adversely on Company, c ...
    4 KB (507 words) - 14:58, 21 January 2014
  • ...el of protection. This section provides templates for Information Security standards that are required to comply with ISO Asset Classification and Control objec ...
    1 KB (159 words) - 17:08, 25 July 2006
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (316 words) - 18:30, 28 February 2007
  • Review and optimize IT policies, standards and procedures to ensure that legal and regulatory requirements are covered ...
    2 KB (261 words) - 13:14, 4 May 2006
  • ::'''Examine the organization’s system configuration standards for network components and critical servers, including any wireless access ...
    3 KB (341 words) - 14:28, 27 February 2007
  • :'''Developmental Email Acceptable Usage Standards:''' [[Media:Developmental Electronic Mail Acceptable Usage Standard.pdf]]<b ...cceptable Use Standards:''' [[Media:Development-of-Internet-Acceptable-Use-Standards.pdf]]<br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ...on customers by determining their requirements and aligning them to the IT standards and practices. Roles and responsibilities concerning conflict resolution be ...
    2 KB (273 words) - 20:01, 1 May 2006
  • Efficiently evaluate compliance with IT policies, standards and procedures, including legal and regulatory requirements, based on busin ...
    2 KB (271 words) - 13:16, 4 May 2006
  • ...e personal firewall software is configured by the organization to specific standards and is not alterable by mobile computer users.'''<br> ...
    2 KB (267 words) - 10:51, 16 June 2010
  • ...itten software development processes to confirm they are based on industry standards and that security is included throughout the life cycle. From review of wri ...
    2 KB (334 words) - 18:37, 28 February 2007
  • ...ory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • ...ory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • ...t individual objectives derived from the organization’s goals, established standards and specific job responsibilities. Employees should receive coaching on per ...
    2 KB (284 words) - 19:38, 1 May 2006
  • ...installed and active, which is configured by the organization to specific standards and not alterable by the employee.<br> ...
    3 KB (340 words) - 11:39, 3 March 2007
  • ...rting on Controls at a Service Organization, was finalized by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA) in ...Public Company Accounting Oversight Board (PCAOB) will also issue auditing standards for public companies (i.e., registrants of the SEC) on a go-forward basis.< ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...timely independent assurance about the compliance of IT with its policies, standards and procedures, as well as with generally accepted practices.<br> ...
    2 KB (300 words) - 13:39, 4 May 2006
  • :* Verify that firewall and router configuration standards include a description of groups, roles, and responsibilities for logical ma ...
    2 KB (265 words) - 12:24, 16 June 2010
  • There are two standards of mental competency that might exempt a person from prosecution for comput ...
    2 KB (304 words) - 18:37, 22 February 2009
  • ...aff to ensure that controls are functioning in accordance with established standards? Please provide a list of system reviews performed during the period under ...
    2 KB (354 words) - 20:12, 25 June 2006
  • :::'''(ii)''' related information security policies, procedures, standards, and guidelines; and<br> ...all be performed in accordance with generally accepted government auditing standards; and<br> ...
    4 KB (634 words) - 13:00, 4 June 2010
  • [[PO3.4:| 3.4 Technology Standards]]<br> [[PO8.2:| 8.2 IT Standards and Quality Practices]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...with the requirements of this subchapter and related policies, procedures, standards, and guidelines, including—<br> :::'''(i)''' information security standards promulgated under section 11331 of title 40; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ...rtificate-Based Public Key and Digital Signatures 9 (National Institute of Standards and Technology 1994) (hereinafter "Baum"). Sender and recipient have a mutu ...
    1 KB (144 words) - 12:26, 16 October 2014
  • ...actual situation at hand. Where the defendant has merely followed industry standards, it is possible that the defendant would do more social good by giving lect ...
    2 KB (344 words) - 21:37, 22 February 2009
  • ...ith the requirements of this sub-chapter and related policies, procedures, standards, and guidelines, including—<br> :::'''(i)''' information security standards promulgated by the Director under section 11331 of title 40; and<br> ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • :* '''PCI-1.1.6.a''' Verify that firewall and router configuration standards require review of firewall and router rule sets at least every six months.< ...
    2 KB (288 words) - 12:27, 16 June 2010
  • ...wall and security software configurations to verify that security software standards are acceptable and that updates are current prior to authorizing access to ...
    2 KB (296 words) - 10:57, 16 June 2010
  • ...ents are fulfilled effectively and to conform to architecture policies and standards. The IT infrastructure should be assessed on a periodic basis to ensure tha ...
    2 KB (329 words) - 13:34, 4 May 2006
  • ...or consideration of the narrow question of whether COPA’s use of community standards to identify material harmful to minors violated the First Amendment. ...disseminating material to a national audience to observe varying community standards does not violate the First Amendment.” Id. at 580. Although the Court did n ...
    4 KB (684 words) - 18:59, 10 April 2011
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    2 KB (323 words) - 15:09, 3 May 2006
  • ...pproval from relevant parties. The test plan is based on organization wide standards and defines roles, responsibilities and success criteria. The plan consider ...
    2 KB (322 words) - 17:43, 3 May 2006
  • ...Management Standard define Company's objectives for establishing specific standards for the assessment and ongoing management of vulnerabilities. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ...c keys should be generated and handled in accordance with Company password standards established in the Access Control Standard. ...c keys should be generated and handled in accordance with Company password standards established in the Access Control Standard. ...
    4 KB (558 words) - 15:12, 21 January 2014
  • :* Apply appropriate industry standards or other external standards. ...
    5 KB (847 words) - 17:07, 25 April 2007
  • ...oversee the development and implementation by the Secretary of Commerce of standards and guidelines pertaining to Federal computer systems; (5) designate execut ...sory and binding by such Secretary. Authorizes the Secretary to waive such standards when compliance would adversely affect the mission of a computer operator o ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    3 KB (394 words) - 17:12, 22 March 2007
  • Establish procedures in line with the enterprise development and change standards that require a post-implementation review of the operational information sy ...
    3 KB (394 words) - 11:59, 23 June 2006
  • ...anner on a continual basis. Ensure contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk management shoul ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...e personal firewall software is configured by the organization to specific standards and is not alterable by mobile computer users.]]<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...Asset Management Policy''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in :::D. Review regulatory requirements and Company policies, standards, procedures, and guidelines.<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • ...cess Technology Guidelines''' defines objectives for establishing specific standards on the assessment and ongoing management of wireless technologies utilized ...t Management Policy:|'''Sample Asset Management Policy''']] and associated standards, guidelines, and procedures can result in disciplinary actions up to and in ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    3 KB (436 words) - 14:30, 4 May 2006
  • ...lassification Standard define Company objectives for establishing specific standards on the identification, classification, and labeling of Company information ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...ties, exception process, compliance approach and references to procedures, standards and guidelines. The policies should address key topics such as quality, sec ...
    3 KB (421 words) - 18:02, 23 June 2006
  • ...al Guide (TR-39 formerly known as TG-3) developed by ANSI as part of theX9 standards for financial institutions. ...
    2 KB (235 words) - 09:48, 23 October 2012
  • ...ols provide reasonable assurance that IT security policies, procedures and standards have been documented, communicated to the appropriate individuals, and are ...
    3 KB (442 words) - 18:58, 1 May 2006
  • :* Apply appropriate industry standards or other external standards. ...specialists should be developed to keep up with industrial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...and business processes depend, requires a consistent approach to security standards in the areas of database configurations, maintenance, and administration. I * Access standards ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...Asset Management Policy''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...ents shall comply with applicable laws, regulations, and Company policies, standards, and guidelines.<br> ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    3 KB (497 words) - 14:57, 23 June 2006
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.''' ...
    4 KB (517 words) - 18:12, 21 June 2006
  • ...subscribe to alert services freely available on the Internet). Update your standards to address new vulnerability issues.]]<br> ...
    4 KB (578 words) - 18:46, 28 February 2007
  • ...nd Monitoring Standard define Company objectives for establishing specific standards for the assessment and ongoing monitoring of threats to Company information ...
    3 KB (365 words) - 19:25, 14 January 2014
  • ...with appropriate EDI messages. It also refers specifically to a family of standards. In 1996, the National Institute of Standards and Technology (NIST) defined electronic data interchange as "the computer- ...
    18 KB (2,828 words) - 11:22, 27 August 2011
  • ...specialists should be developed to keep up with industrial trends, monitor standards and [[Information_Security_Audit | security audit]] assessment methods and ...
    3 KB (470 words) - 13:39, 6 March 2007
  • ...ley, HIPAA, PCI, GLBA, FedRAMP, Cyber Essentials, Safe Harbor, FISMA, FIPS standards, NIST Special Publications, and many others, it is easy to understand why t ...tifications such as CISSP, CISA, CISM, CIPP, GIAC, and many other industry standards. ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ...le Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    7 KB (953 words) - 14:13, 1 May 2010
  • ...ity risks are introduced by technical designs incompatible with enterprise standards.'''<br> ...
    4 KB (538 words) - 13:16, 23 June 2006
  • In December 2006, the British Standards Institution (BSI) released an independent standard for BCP — BS 25999-1. Pr The 2008 book ''Exercising for Excellence'', published by The British Standards Institution identified three types of exercises that can be employed when t ...
    15 KB (2,046 words) - 11:39, 27 October 2012
  • ...Asset Protection Policy''']] defines objectives for establishing specific standards for protecting the confidentiality, integrity, and availability of Company ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    7 KB (976 words) - 14:17, 1 May 2010
  • ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (649 words) - 18:23, 5 May 2006
  • [[AI6.1:| 6.1 Change Standards and Procedures]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...Asset Protection Policy''']] defines objectives for establishing specific standards for protecting the confidentiality, integrity, and availability of '''<Your ...otection Policy:|'''Sample Asset Protection Policy''']] and its associated standards.<br> ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...) Social Computing Guidelines defines objectives for establishing specific standards for the responsible engagement for those Employee’s who choose to create or ...ion or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • * Lack of standards and controls for end-user systems ...ecorded and processed in compliance with acceptable accounting methods and standards and are in compliance with policies set forth by the board of directors and ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (730 words) - 19:05, 17 April 2007
  • :* Technology standards This section provides templates for Information Security standards that are required to comply with ISO Communications and Operations Manageme ...
    19 KB (2,609 words) - 13:51, 23 May 2007
  • ...nsider [[corporate governance]] issues such as [[privacy]], regulatory and standards [[Regulatory compliance|compliance]], [[audits|auditing]], [[Business conti ...prevention, detection, and response to threats. A framework published by a standards organization, such as [[Risk IT]], [[CobiT]], [[PCI: | PCI DSS]], [[ISO/IEC ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...Asset Management Policy''']] defines objectives for establishing specific standards for properly managing the Company Information Technology infrastructure, in ...ated, as necessary, if implemented changes have been adopted as production standards.<br> ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • ...le Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    8 KB (1,184 words) - 14:12, 1 May 2010
  • ...nt and Management Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • ...nt and Monitoring Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    5 KB (738 words) - 20:24, 1 May 2006
  • ...olicies to meet regulatory mandates covers the need for security policies, standards and regulations, best practices policy framework, Command Center resources ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...onstraints due to applicable laws, directives, executive orders, policies, standards, or regulations. The following activities related to managing organizationa ...
    4 KB (528 words) - 16:58, 28 March 2010
  • Included in this responsibility are development and maintenance of policies, standards, processes, systems and measurements that enable the organization to manage ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...was negotiated, this was top of mind, and accordingly much more stringent standards were contemplated, and quickly adopted in some key countries including the ...on Basel II: International Convergence of Capital Measurement and Capital Standards: A Revised Framework. No new elements have been introduced in this compilat ...
    19 KB (2,934 words) - 21:46, 2 September 2012
  • :::'''(ii)''' related information security policies, procedures, standards, and guidelines; and<br> ...
    4 KB (682 words) - 19:17, 3 June 2010
  • ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (819 words) - 13:54, 23 June 2006
  • * United States Department of Health and Human Services (HHS) Security Standards; Final Rule: 45 CFR Parts 160, 162, and 164 * HHS Standards for Privacy of Individually Identifiable Health Information; Final Rule: 45 ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ::* PCI-1.1.9 Configuration standards for routers. ...
    6 KB (781 words) - 12:31, 23 June 2006
  • ...nt and Management Policy''']] defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • ...roducts can be found in ISO/IEC 15408 or other evaluation or certification standards, as appropriate.<br> ...
    6 KB (878 words) - 13:34, 23 June 2006
  • ...ble opportunity to know what was prohibited, and it also provided explicit standards for law enforcement to apply. K.S.A. 21-3755(a)(1), (d). State v. Rupnick, ...
    5 KB (763 words) - 12:30, 18 February 2009
  • ...t Protection Standard defines Company objectives for establishing specific standards on the protection of the confidentiality, integrity, and availability of Co ...
    5 KB (673 words) - 18:16, 14 January 2014
  • ...ed in accordance with design specifications, development and documentation standards and quality requirements. Approve and sign off on each key stage of the app ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ...le Acceptable Use Policy''']] defines objectives for establishing specific standards on the appropriate business use of information assets.<br> ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • =='''Oracle Database Asset Protection Standards:'''== It is recommended that the accepted standards developed by the company be applied to the default profile to eliminate any ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • ...nt and Monitoring Policy''']] defines objectives for establishing specific standards on the assessment and ongoing monitoring of threats to Company information ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...c Fraud Prevention Guidelines defines objectives for establishing specific standards on the assessment and ongoing management of vulnerabilities.<br> ...ion or systems, are covered by this policy and must comply with associated standards and guidelines.<br> ...
    14 KB (2,165 words) - 16:53, 22 September 2009
  • ...Asset Protection Policy''']] defines objectives for establishing specific standards for protecting the confidentiality, integrity, and availability of Company ...be submitted to <Insert Title> in accordance with the Information Security Standards Exception Procedure. Prior to official management approval of any exception ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • ...acle_Database_Asset_Protection_Standards: Oracle Database Asset Protection Standards]<br> ...tabase_Asset_Protection_Standards: Microsoft SQL Database Asset Protection Standards]<br> ...
    28 KB (4,261 words) - 11:45, 28 March 2008
  • ...subscribe to alert services freely available on the Internet). Update your standards to address new vulnerability issues.<br> ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...e and or software used by the new (or changed) system meets organizational standards, approval of any non-standard functions, locations, or users, including app ...
    8 KB (996 words) - 12:49, 22 May 2007
  • :::a. [[SOX.2.0.18:|'''SOX.2.0.18''']] A framework of security standards has been developed that supports the objectives of the security policy. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • ...suitable data protection legislation, based on internationally recognised standards, to be enacted in 2014. ...
    5 KB (762 words) - 16:03, 29 August 2014
  • :2. Review the institution’s IT audit standards manual and/or IT-related sections of the institution’s general audit manual :2. Determine whether the institution has appropriate standards and processes for risk-based auditing and internal risk assessments that: ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...nature cryptosystem designed and implemented as prescribed in the industry standards is extremely remote, [[30]] and is far less than the risk of undetected for ...hird party is referred to as a "certification authority" in most technical standards and in these Guidelines. ...
    22 KB (3,420 words) - 15:18, 3 April 2007
  • ...Encryption Standard]] (DES). AES was announced by [[National Institute of Standards and Technology]] (NIST) as U.S. [[Federal Information Processing Standard|F ...s operated jointly by the United States Government's National Institute of Standards and Technology (NIST) Computer Security Division and the Communications Sec ...
    18 KB (2,766 words) - 11:41, 28 March 2008
  • ...t, Office of Management and Budget (OMB), and that usage now appears in US standards such as the [http://NIST.gov NIST] ''Guide to Protecting the Confidentialit ** 201 CMR 17.00: Standards for The Protection of Personal Information of Residents of the Commonwealth ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • '''AI 6.1 Change Standards and Procedures'''<br> ...
    10 KB (1,393 words) - 14:28, 23 June 2006
  • ...tigatory processes, including specification of roles and responsibilities, standards for collection of evidence and chain of custody of evidence<br> ...
    10 KB (1,387 words) - 14:04, 22 May 2007
  • * Consideration of business value of and legal-regulatory-certificatory standards for information assets affected by the new or changed system(s) ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...e members of the European Union are required to adhere to certain “minimum standards” in processing “personal data.” Personal data is defined as “any informatio (1) EU Standards for Processing Personal Data. ...
    19 KB (2,863 words) - 16:43, 21 September 2011
  • ...ive Simplification (AS) provisions, requires the establishment of national standards for electronic health care transactions and national identifiers for provid ...ation provisions also address the security and privacy of health data. The standards are meant to improve the efficiency and effectiveness of the nation's healt ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • ...res or disasters. This section provides templates for Information Security standards that are required to comply with ISO Business Continuity Management objecti ...
    9 KB (1,274 words) - 00:17, 1 June 2007
  • ...idelines and constraints for the SCM process. Guidelines can come forth of standards or preferences from the customers. Constraints may be corporate policies or ...nformance of software product and processes to the applicable regulations, standards, guidelines, plans, and procedures (Scott & Nisse, 2001). ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • ...ICSA), is a high ranking professional who is trained to uphold the highest standards of corporate governance, effective operations, compliance and administratio ...hand is a form of self regulation. It allows the sector to determine what standards are acceptable or unacceptable. It also preempts over zealous legislation t ...
    29 KB (4,284 words) - 17:19, 20 April 2010
  • ...publisher abide by the most restrictive and conservative state's community standards, and, furthermore, COPA was not readily susceptible to narrowing constructi ...
    9 KB (1,358 words) - 11:00, 18 February 2009
  • ...publisher abide by the most restrictive and conservative state's community standards, and, furthermore, COPA was not readily susceptible to narrowing constructi ...
    9 KB (1,359 words) - 12:35, 18 February 2009
  • ...ort their compliance with the provisions of the Law; these self-regulation standards become binding on Data Controllers and provide prima facie evidence that th ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • ...containers are designed to meet either fire-resistant or burglar-resistant standards. Labels describing expected tolerance levels are usually attached to safes ...
    10 KB (1,485 words) - 14:22, 10 April 2007
  • ...er statutes and common law that require fitness for use or similar quality standards. ...
    11 KB (1,798 words) - 14:44, 14 June 2007
  • # Community for Creative Non-Violence v. Reid, 490 U.S. 730 (1989) set standards for determining when a work was a work made for hire under the 1976 Act (in ...
    6 KB (1,026 words) - 06:44, 11 April 2011
  • ...Use of services/data on mobile devices in violation of 3rd party industry standards and regulations (e.g., PCI, HIPAA, etc.); ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...s crucial. Effective key management systems are based on an agreed set of standards, procedures, and secure methods that address ...
    13 KB (2,019 words) - 11:46, 28 March 2008
  • :* Monitoring and controlling the growth, pricing, underwriting standards, and ongoing credit quality of loans originated through E-banking channels ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...proceedings. Since 1970, there have been many legislative and regulatory standards imposed to help prevent money laundering and to strengthen the government’s ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...nd security requirements and payment card industry ([[PCI:|PCI]]) security standards put a further onus on companies to stay abreast of ever-changing and increa The Privacy Rule is the most complex of the four, setting standards for how protected health information (PHI) "in any form or medium" should b ...
    19 KB (2,886 words) - 16:53, 29 August 2014
  • ...National Institute of Science and Technology, actuarial societies, and ISO standards. Methods, definitions and goals vary widely according to whether the risk m Certain aspects of many of the risk management standards have come under criticism for having no measurable improvement on risk even ...
    27 KB (4,185 words) - 23:45, 10 March 2010
  • ...in one nation may be decidedly illegal in another. In fact, even different standards concerning the burden of proof in a civil case can cause jurisdictional pro ...ss these activities or conduct will be invisibly regulated by the inherent standards of the community, in this case the internet “users.” And just as certain p ...
    20 KB (2,921 words) - 16:47, 29 August 2014
  • ...] (AES) are block cipher designs which have been designated [[cryptography standards]] by the US government (though DES's designation was finally withdrawn afte ...ing its development at IBM and its consideration by the National Bureau of Standards as a possible Federal Standard for cryptography. DES was designed to be sec ...
    26 KB (3,873 words) - 11:44, 28 March 2008
  • ...d entities except small health plans, which have until 2004 to comply. The standards, which implement requirements of the Health Insurance Portability and Accou ...on, as long as the entity is otherwise in compliance with the regulation’s standards. ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • ...each booklet as warranted by changes in technology or by the evolution of standards related to financial institution IT practices. Additional booklets will be ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • * standards ...
    12 KB (1,863 words) - 11:32, 9 June 2010
  • ...ICSA), is a high ranking professional who is trained to uphold the highest standards of corporate governance, effective operations, compliance and administratio ...hand is a form of self regulation. It allows the sector to determine what standards are acceptable or unacceptable. It also preempts over zealous legislation t ...
    45 KB (6,604 words) - 15:20, 15 April 2010
  • The legislation set new or enhanced standards for all U.S. public company boards, management and public accounting firms. #:Title II consists of nine sections and establishes standards for external auditor independence, to limit conflicts of interest. It also ...
    38 KB (5,614 words) - 14:31, 15 April 2010
  • ...establish probable cause be qualified according to the "Aguilar-Spinelli" standards (Aguilar v. Texas, 378 U.S. 108 (1964) and Spinelli v. United States, 393 U ...search warrants for video surveillance meet certain higher, constitutional standards required under Title III. See United States v. Falls, 34 F.3d 674 (8th Cir. ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...variety of hardware components, system software, policies, practices, and standards, PKI can provide for authentication, data integrity, defenses against custo ...key lengths remain appropriate, cryptographic modules conform to industry standards, and procedures are followed to safeguard the CA system ...
    78 KB (11,440 words) - 02:00, 10 April 2007
  • Pre-established standards or requirements a product or project must meet. ...l over the world. 2) A worldwide network of computer networks, governed by standards and protocols developed by the Internet Engineering Task Force (IETF). ...
    74 KB (11,078 words) - 13:08, 9 April 2007
  • ...il the mid 1990s. This wider adoption and awareness has led to a number of standards, including [[ISO 20000|ISO/IEC 20000]] which is an international standard c [[Category:Standards]] ...
    37 KB (5,348 words) - 10:12, 8 September 2011
  • ===Preserving Internet standards=== ...eparation on the Internet would signal the decline of fundamental Internet standards and international consensus authority. Further, the legislation asserts tha ...
    52 KB (7,736 words) - 20:12, 1 October 2011
  • ...s a list of companies that have pledged to meet the BBB Online Reliability standards for online business practices on its Web site. See http://www.bbbonline.org ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...ocedure. Accordingly, this court will not apply the Dendrite or the Cahill standards."); Solers, Inc. v. Doe, 977 A.2d 941 (D.C. 2009) ("the test we now adopt c ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • developing Internet standards in which case the procedures for copyrights defined in the Internet Standards process must be ...
    75 KB (10,622 words) - 14:38, 3 April 2007
  • ...son with knowledge. Different circuits have articulated slightly different standards for the admissibility of computer-stored business records. Some courts simp ...cords. Although some litigants have argued for more stringent authenticity standards for electronic evidence, courts have resisted those arguments. See, e.g., U ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • * Publishing standards, guidance, and guidelines for protecting cardholder information and monitor ...
    25 KB (3,921 words) - 12:53, 12 November 2011
  • ...[[Foreign Intelligence Surveillance Act]] (FISA), as well as lowering the standards under which the secret FISA court can authorize the FBI to spy on your phon ...
    22 KB (3,315 words) - 00:16, 16 September 2011
  • ...the Foreign Intelligence Surveillance Act (FISA), as well as lowering the standards under which the secret FISA court can authorize the FBI to spy on your phon ...
    23 KB (3,434 words) - 17:34, 13 April 2011
  • .... Bush on December 16, 2003, establishes the United States' first national standards for the sending of commercial e-mail and requires the Federal Trade Commiss ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...Promotion Act (CBDTPA), known in early drafts as the Security Systems and Standards Certification Act (SSSCA). This bill, if it had passed, would have dealt wi ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...ah.nist.gov/pub/nist_internal_reports/NISTAPP_Nov02.pdf "Use of Technology Standards and Interoperable Databases With Machine-Readable, Tamper-Resistant Travel ...aimed that the provision "falls short of meeting even basic constitutional standards of due process and fairness [as it] continues to allow the Attorney General ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...of rights, but the evolution of new national and international enforcement standards has been dramatic in recent years due to two principal factors. The first c ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • ...rrowly, this understanding will facilitate cost control, configuration and standards management, root cause and problem analysis, prevention of loss or misuse o ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...rmation, many containing social security numbers. Poor corporate diligence standards which can result in data breaches include: ...
    37 KB (5,577 words) - 14:50, 12 November 2011
  • ...ntent providers] to restrict speech; rather, it allows [them] to establish standards of decency without risking liability for doing so.” Green v. American Onlin ...
    38 KB (5,571 words) - 14:45, 10 April 2011
  • ...ourt held that this allegation "does not remotely satisfy Fourth Amendment standards" because "a 'person's mere propinquity to others independently suspected of ...ew York Tel. Co., 434 U.S. 159, 169 n.16 (1977) (applying Fourth Amendment standards to pen registers before the enactment of the pen register act, holding that ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...rks are not evaluated under Matlock; instead, they are evaluated under the standards of O'Connor v. Ortega, 480 U.S. 709 (1987). ...ombined law enforcement and employer search satisfied the Fourth Amendment standards of O'Connor v. Ortega. ...
    154 KB (23,956 words) - 13:16, 5 August 2011