Jump to main content
United States Environmental Protection Agency
EPA National Library Network
Search Results for the EPA National Library Catalog
Items Found: 34
Showing: Items 1 - 34
Your Search: (SUBJECT=Data protection.)
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
CEMM/GEMMD Library/Gulf Breeze,FL
Env Science Center Library/Ft Meade,MD
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 7 IRC Library/Kansas City,KS
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
Agency catalog of data policies and standards.
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
Business continuity planning for data centers and systems : a strategic implementation guide /
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Defending secrets, sharing data : new locks and keys for electronic information.
Ensuring the integrity, accessibility, and stewardship of research data in the digital age /
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
Information security law : control of digital assets /
Information security manual /
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
Information security series : security practices : integrated compliance information system.
Information technology : security techniques : code of practice for information security management = Technologies de l'information : techniques de scurité : code de pratique pour la gestion de scurité d'information.
Oracle 8i backup & recovery handbook
Pesticides Formulation: Relation to Safety in Use.
Privacy in the information age /
Privacy law sourcebook 2002 : United States law, international law, and recent developments /
Protecting your library's digital sources : the essential guide to planning and preservation /
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems /
Safeguard critical documents and valuables.
Status of EPA's Implementation of the DATA Act /
Techniques and applications of digital watermarking and content protection /
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
The security risk assessment handbook : a complete guide for performing security risk assessments /
The use of chip implants for workers : study.
Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders /
Save, Print or Email Selected Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
to ask a question, provide feedback, or report a problem.
Laws & Regulations