Jump to main content
United States Environmental Protection Agency
EPA National Library Network
Search Results for the EPA National Library Catalog
Items Found: 56
Showing: Items 1 - 50
Your Search: (SUBJECT=Access control)
Publication dates (newest-oldest)
Publication dates (oldest-newest)
Choose a Library:
(CTRL-CLICK for multiple libraries)
Search all libraries
Capital Group(All DC-area libraries)
CEMM/GEMMD Library/Gulf Breeze,FL
Env Science Center Library/Ft Meade,MD
NVFEL Library/Ann Arbor, MI
OCSPP Chemical Library/Washington,DC
Region 1 Library/Boston,MA
Region 2 Library/New York,NY
Region 3 Library/Philadelphia, PA
Region 4 Library/Atlanta,GA
Region 5 Library/Chicago,IL
Region 6 Library/Dallas,TX
Region 7 IRC Library/Kansas City,KS
Region 8 Technical Library/Denver,CO
Region 9 Library/San Francisco,CA
Region 10 Library/Seattle,WA
Research Triangle Park Library/RTP, NC
Choose a Collection:
(CTRL-CLICK for multiple collections)
Search all collections
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future /
Access to government information in the United States
Access to medical and exposure records.
Access to research data in the 21st century : an on going dialogue among interested parties : report of a workshop /
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information.
At a Glance : EPA Needs to Improve Safeguards for Personally Identifiable Information.
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
At a Glance : Management Alert: EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information.
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network.
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders.
Computer fraud & security bulletin.
Computer security : make the commitment /
Computer security awareness training /
Computer security requirements guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments.
Computer software duplication.
Computer systems security
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information /
Defending secrets, sharing data : new locks and keys for electronic information.
Effect of the HIPAA privacy rule on health research : proceedings of a workshop presented to the National Cancer Policy Forum /
Ensuring the integrity, accessibility, and stewardship of research data in the digital age /
EPA Needs to Improve Physical Security at Its Offices in Las Vegas, Nevada. Audit Report.
EPA needs to improve safeguards for personally identifiable information /
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement.
Expanding access to research data : reconciling risks and opportunities.
Federal information in the electronic age policy issues for the 1990s /
Final report : security of Region VIII's dial-up access /
General records schedules
Harnessing the power of digital data for science and society : report of the Interagency Working Group on Digital Data to the Committee on Science of the National Science and Technology Council.
Influence of CBI requirements on TSCA implementation /
Information security : fundamental weaknesses place EPA data and operations at risk /
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters /
Information security series : security practices : comprehensive environmental response, compensation, and liability information system.
Information security series : security practices : integrated compliance information system.
Management Alert : EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information/
Network security tools
Password management : protecting EPA information resources.
Privacy protection/policies for e-information systems.
Private lives and public policies : confidentiality and accessibility of government statistics /
Public report for options to make the toxic release inventory (TRI) data base accessible to the public
Putting people on the map : protecting confidentiality with linked social-spatial data /
RCRA Confidential Business Information Security Manual.
Reagan-Bush transition team's activities at six selected agencies : report to the Chairman, Committee on Energy and Commerce, House of Representatives
Region IV computer security policy and procedures
Secret software : making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more /
Security classified and controlled information : history, status, and emerging management issues /
Self-Reported Data Unreliable for Assessing EPA's Computer Security Program. Briefing Report.
Save, Print or Email Selected Records
Selected (this page only)
Selected (across pages)
All (this page only)
All (all pages - 500 item maximum)
Text (Brief Information)
Text (Full Information)
Endnote (Endnote Import)
ASCII delimited for EXCEL
to ask a question, provide feedback, or report a problem.
Laws & Regulations