Search Results for the EPA National Library Catalog

Items Found: 39
Showing: Items 1 - 39
Your Search: (SUBJECT=Data protection)


 
 
 
Select Item Title Year Published
Agency catalog of data policies and standards. 1991
At a Glance : CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas. 2016
At a Glance : Cybersecurity Act of 2015 Report: CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : Cybersecurity Act of 2015 Report: EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information. 2016
At a Glance : EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
At a Glance : Region 9 Technical and Computer Room Security Vulnerabilities Increase Risk to EPA's Network. 2011
At a Glance : Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders. 2018
Business continuity planning for data centers and systems : a strategic implementation guide / 2008
Case Study : Ohio Environmental Protection Agency's Electronic Discharge Monitoring Report (eDMR) System Reaches 99% Adoption. 2010
CSB Has Effective "Identify" and "Recover" Information Security Functions, but Attention Is Needed in Other Information Security Function Areas / 2016
Cybersecurity Act of 2015 Report : CSB's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Cybersecurity Act of 2015 Report : EPA's Policies and Procedures to Protect Systems With Personally Identifiable Information / 2016
Defending secrets, sharing data : new locks and keys for electronic information. 1987
Ensuring the integrity, accessibility, and stewardship of research data in the digital age / 2009
EPA's Contract Oversight and Controls Over Personal Computers Need Improvement. 2011
ICIS Governance Fact Sheet. 2011
ICIS-NPDES Batch System Flow Configuration Document : Version 2.1 / 2010
Information security : weaknesses persist at federal agencies despite progress made in implementing related statutory requirements : report to congressional requesters / 2005
Information security law : control of digital assets / 2006
Information security manual / 1989
Information security series : security practices : comprehensive environmental response, compensation, and liability information system. 2006
Information security series : security practices : integrated compliance information system. 2006
Integrated Compliance Information System : ICIS Reports - Schedule Evaluation. 2009
Integrated Compliance Information System National Pollutant Discharge Elimination System (ICIS-NPDES) Data Exchange Template For Electronic Reporting of DMRs. 2011
Integrated Compliance Information System NPDES : Technical Specification Document Expected Discharge Monitoring Report (DMR) Schedule Version 2.1. 2009
Office of Enforcement and Compliance Assurance Integrated Compliance Information System ICIS Batch DMR - Technical Specification Version 1.1 For Electronic Reporting of DMRs. 2011
Pesticides Formulation: Relation to Safety in Use. 1953
Privacy law sourcebook 2002 : United States law, international law, and recent developments / 2002
Protecting your library's digital sources : the essential guide to planning and preservation / 2004
Report of audit : computer systems integrity : EPA must fully address longstanding information resources management problems / 1993
Safeguard critical documents and valuables. 2018
Status of EPA's Implementation of the DATA Act / 2016
Techniques and applications of digital watermarking and content protection / 2003
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / 2012
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets / 2011
The ICIS Resource. 2011
The security risk assessment handbook : a complete guide for performing security risk assessments / 2010
The use of chip implants for workers : study. 2018
Without a Process for Monitoring Sensitive Data, EPA Region 4 Risks Unauthorized Access to File Servers and Share Folders / 2018

Save, Print or Email Selected Records