{"title":"Policies","authors":"Richard Price","doi":"10.4324/9781003098447-5","DOIUrl":null,"url":null,"abstract":"Data Governance [8] System-wide Baseline Security Standards [9] System-wide High Impact Security Standards [10] Standards for Security Controls in Purchasing [11] Software as a Service (SaaS) Checklist [12] Standards for Data Classification and System Security Categorization [13] Data Classification [14] Adverse Impact [15] Standards for Individuals with Privileged Access [16] Security Standards for Mobile Devices [17] System-Wide Incident Response Procedure to Data Breaches [18] First Information Report [19] Student Data Use Guidelines [20] Employee Data Use Guidelines [21] Office of Information Security Risk Assessment Process [22] Risk Acceptance process [23] Request to Access Electronic Communications of Others [24] EU General Data Protection Regulation Compliance [25]","PeriodicalId":177127,"journal":{"name":"Empire and Indigeneity","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Empire and Indigeneity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4324/9781003098447-5","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Data Governance [8] System-wide Baseline Security Standards [9] System-wide High Impact Security Standards [10] Standards for Security Controls in Purchasing [11] Software as a Service (SaaS) Checklist [12] Standards for Data Classification and System Security Categorization [13] Data Classification [14] Adverse Impact [15] Standards for Individuals with Privileged Access [16] Security Standards for Mobile Devices [17] System-Wide Incident Response Procedure to Data Breaches [18] First Information Report [19] Student Data Use Guidelines [20] Employee Data Use Guidelines [21] Office of Information Security Risk Assessment Process [22] Risk Acceptance process [23] Request to Access Electronic Communications of Others [24] EU General Data Protection Regulation Compliance [25]