Jump to main content
United States Environmental Protection Agency
Laws & Regulations
Laws & Regulations
EPA National Library Network
Search Results for the EPA National Library Catalog
Items Found: 39
Showing: Items 1 - 39
Your Search: (SUBJECT=Data protection)
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
CEMM/GEMMD Library/Gulf Breeze,FL
Env Science Center Library/Ft Meade,MD
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
Agency catalog of data policies and standards.
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas.
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
Business continuity planning for data centers and systems : a strategic implementation guide /
Case Study : Ohio Environmental Protection Agency's Electronic Discharge Monitoring Report (eDMR) System Reaches 99% Adoption.
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas /
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Defending secrets, sharing data : new locks and keys for electronic information.
Ensuring the integrity, accessibility, and stewardship of research data in the digital age /
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
ICIS Governance Fact Sheet.
ICIS-NPDES Batch System Flow Configuration Document : Version 2.1 /
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
Information security law : control of digital assets /
Information security manual /
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
Information security series : security practices : integrated compliance information system.
Integrated Compliance Information System : ICIS Reports - Schedule Evaluation.
Integrated Compliance Information System National Pollutant Discharge Elimination System (ICIS-NPDES) Data Exchange Template For Electronic Reporting of DMRs.
Integrated Compliance Information System NPDES : Technical Specification Document Expected Discharge Monitoring Report (DMR) Schedule Version 2.1.
Office of Enforcement and Compliance Assurance Integrated Compliance Information System ICIS Batch DMR - Technical Specification Version 1.1 For Electronic Reporting of DMRs.
Pesticides Formulation: Relation to Safety in Use.
Privacy law sourcebook 2002 : United States law, international law, and recent developments /
Protecting your library's digital sources : the essential guide to planning and preservation /
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems /
Safeguard critical documents and valuables.
Status of EPA's Implementation of the DATA Act /
Techniques and applications of digital watermarking and content protection /
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
The ICIS Resource.
The security risk assessment handbook : a complete guide for performing security risk assessments /
The use of chip implants for workers : study.
Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders /
Save, Print or Email Selected Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL