Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Environmental Topics
Laws & Regulations
About EPA
Menu
Environmental Topics
Laws & Regulations
About EPA
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 59
Showing: Items 1 - 50
Your Search: (SUBJECT=Access control)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
1
2
NEXT
Select Item
Title
Year Published
1
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future /
1990
2
Access to government information in the United States
2005
3
Access to medical and exposure records.
2001
4
Access to research data in the 21st century : an on going dialogue among interested parties : report of a workshop /
2002
5
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
6
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
7
At a Glance : EPA Needs to Improve Safeguards for Personally Identifiable Information.
2014
8
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
9
At a Glance : Management Alert: EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information.
2018
10
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
2011
11
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
2018
12
Case Study : Ohio Environmental Protection Agency's Electronic Discharge Monitoring Report (eDMR) System Reaches 99% Adoption.
2010
13
Computer security : make the commitment /
1989
14
Computer security awareness training /
1990
15
Computer security requirements guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments.
1985
16
Computer software duplication.
1993
17
Computer systems security
1989
18
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
19
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
20
Defending secrets, sharing data : new locks and keys for electronic information.
1987
21
Effect of the HIPAA privacy rule on health research : proceedings of a workshop presented to the National Cancer Policy Forum /
2006
22
Ensuring the integrity, accessibility, and stewardship of research data in the digital age /
2009
23
EPA Needs to Improve Physical Security at Its Offices in Las Vegas, Nevada. Audit Report.
2010
24
EPA needs to improve safeguards for personally identifiable information /
2014
25
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
26
Expanding access to research data : reconciling risks and opportunities.
2005
27
Federal information in the electronic age policy issues for the 1990s /
1990
28
Final report : security of Region VIII's dial-up access /
2000
29
General records schedules
1988
30
Harnessing the power of digital data for science and society : report of the Interagency Working Group on Digital Data to the Committee on Science of the National Science and Technology Council.
2009
31
ICIS Governance Fact Sheet.
2011
32
ICIS-NPDES Batch System Flow Configuration Document : Version 2.1 /
2010
33
Influence of CBI requirements on TSCA implementation /
1992
34
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
2005
35
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
2006
36
Information security series : security practices : integrated compliance information system.
2006
37
Integrated Compliance Information System : ICIS Reports - Schedule Evaluation.
2009
38
Integrated Compliance Information System National Pollutant Discharge Elimination System (ICIS-NPDES) Data Exchange Template For Electronic Reporting of DMRs.
2011
39
Integrated Compliance Information System NPDES : Technical Specification Document Expected Discharge Monitoring Report (DMR) Schedule Version 2.1.
2009
40
Management Alert : EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information /
2018
41
Microcomputer security.
1993
42
Network security tools
2005
43
Office of Enforcement and Compliance Assurance Integrated Compliance Information System ICIS Batch DMR - Technical Specification Version 1.1 For Electronic Reporting of DMRs.
2011
44
Password management : protecting EPA information resources.
1996
45
Private lives and public policies : confidentiality and accessibility of government statistics /
1993
46
Public report for options to make the toxic release inventory (TRI) data base accessible to the public
1988
47
Putting people on the map : protecting confidentiality with linked social-spatial data /
2007
48
RCRA Confidential Business Information Security Manual.
1992
49
Reagan-Bush transition team's activities at six selected agencies : report to the Chairman, Committee on Energy and Commerce, House of Representatives
1982
50
Region IV computer security policy and procedures /
1993
1
2
NEXT
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)