Jump to main content
US EPA
United States Environmental Protection Agency
Search
Search
Environmental Topics
Laws & Regulations
About EPA
Menu
Environmental Topics
Laws & Regulations
About EPA
Related Topics:
EPA National Library Network
Contact Us
Search Results for the EPA National Library Catalog
Items Found: 32
Showing: Items 1 - 32
Your Search: (SUBJECT=Data protection)
Sort Results:
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Title
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
AWBERC Library/Cincinnati,OH
CCTE/GLTED Library/Duluth,MN
CEMM/ACESD Library/Narragansett,RI
CEMM/EPD Library/Athens,GA
CEMM/GEMMD Library/Gulf Breeze,FL
CPHEA/PESD Library/Corvallis,OR
Env Science Center Library/Ft Meade,MD
Headquarters Library/Washington,DC
Law Library/Washington,DC
NEIC Library/Denver,CO
NRMRL/GWERD Library/Ada,OK
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 7 IRC Library/Kansas City,KS
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
books
documents
journals
reference
audiovisual
ebooks
Select Item
Title
Year Published
1
Agency catalog of data policies and standards.
1991
2
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
2016
3
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
4
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
2016
5
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
6
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
2011
7
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
2018
8
Business continuity planning for data centers and systems : a strategic implementation guide /
2008
9
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
2016
10
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
11
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
2016
12
Defending secrets, sharing data : new locks and keys for electronic information.
1987
13
Ensuring the integrity, accessibility, and stewardship of research data in the digital age /
2009
14
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
2011
15
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
2005
16
Information security law : control of digital assets /
2006
17
Information security manual /
1989
18
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
2006
19
Information security series : security practices : integrated compliance information system.
2006
20
Pesticides Formulation: Relation to Safety in Use.
1953
21
Privacy in the information age /
1997
22
Privacy law sourcebook 2002 : United States law, international law, and recent developments /
2002
23
Protecting your library's digital sources : the essential guide to planning and preservation /
2004
24
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems /
1993
25
Safeguard critical documents and valuables.
2018
26
Status of EPA's Implementation of the DATA Act /
2016
27
Techniques and applications of digital watermarking and content protection /
2003
28
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
2012
29
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
2011
30
The security risk assessment handbook : a complete guide for performing security risk assessments /
2010
31
The use of chip implants for workers : study.
2018
32
Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders /
2018
Save, Print or Email Selected Records
Select Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Select Format
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
Email Address:
(if applicable)