Search Results for the EPA National Library Catalog

Items Found: 56

Showing: Items 1 - 50

Your Search: (SUBJECT=Access control)

 
 
 

1 2 NEXT
Select Item Title Year Published
13th National Computer Security Conference, Omni Shoreham Hotel, Washington, D.C., 1-4 October, 1990 proceedings : Information systems security, standards - the key to the future / 1990
Access to government information in the United States 2005
Access to medical and exposure records. 2001
Access to research data in the 21st century : an on going dialogue among interested parties : report of a workshop / 2002
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : EPA Needs to Improve Safeguards for Personally Identifiable Information. 2014
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
At a Glance : Management Alert: EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information. 2018
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network. 2011
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders. 2018
Computer fraud & security bulletin. 1978
Computer security : make the commitment / 1989
Computer security awareness training / 1990
Computer security requirements guidance for applying the Department of Defense trusted computer system evaluation criteria in specific environments. 1985
Computer software duplication. 1993
Computer systems security 1989
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Defending secrets, sharing data : new locks and keys for electronic information. 1987
Effect of the HIPAA privacy rule on health research : proceedings of a workshop presented to the National Cancer Policy Forum / 2006
Electronic recordkeeping 1989
Ensuring the integrity, accessibility, and stewardship of research data in the digital age / 2009
EPA Needs to Improve Physical Security at Its Offices in Las Vegas, Nevada. Audit Report. 2010
EPA needs to improve safeguards for personally identifiable information / 2014
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
Expanding access to research data : reconciling risks and opportunities. 2005
Federal information in the electronic age policy issues for the 1990s / 1990
Final report : security of Region VIII's dial-up access / 2000
General records schedules 1988
Harnessing the power of digital data for science and society : report of the Interagency Working Group on Digital Data to the Committee on Science of the National Science and Technology Council. 2009
Influence of CBI requirements on TSCA implementation / 1992
Information security : fundamental weaknesses place EPA data and operations at risk / 1999
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters / 2005
Information security series : security practices : comprehensive environmental response, compensation, and liability information system. 2006
Information security series : security practices : integrated compliance information system. 2006
Management Alert : EPA's Incident Tracking System Lacks Required Controls to Protect Personal Information/ 2018
Microcomputer security. 1993
Network security tools 2005
Password management : protecting EPA information resources. 1996
Privacy protection/policies for e-information systems. 1999
Private lives and public policies : confidentiality and accessibility of government statistics / 1993
Public report for options to make the toxic release inventory (TRI) data base accessible to the public 1988
Putting people on the map : protecting confidentiality with linked social-spatial data / 2007
RCRA Confidential Business Information Security Manual. 1992
Reagan-Bush transition team's activities at six selected agencies : report to the Chairman, Committee on Energy and Commerce, House of Representatives 1982
Region IV computer security policy and procedures 1993
Secret software : making the most of computer resources for data protection, information recovery, forensic examination, crime investigation and more / 2000
Security classified and controlled information : history, status, and emerging management issues / 2006
Self-Reported Data Unreliable for Assessing EPA's Computer Security Program. Briefing Report. 2010
1 2 NEXT

Save, Print or Email Selected Records