Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 10 of 63 on Federal computer system identified by that agency pursuant to subsection (a) that....
" Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the information contained in such system. "
Implementation of the Computer Security Act (Public Law 100-235): Hearing ... - Page 51
by United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Transportation, Aviation, and Materials - 1990 - 176 pages
Full view - About this book

Summary of Activities of the Committee on Science and ..., Volumes 2-10

United States. Congress. House. Committee on Science and Technology - 1988
...privacy of each Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such system. Copies of each such plan shall be transmitted to the National Bureau of Standards and...
Full view - About this book

Compilation of the Social Security Laws: Including the Social Security Act ...

United States - Social security - 2004
...privacy of each Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such system. Copies of each such plan shall be transmitted to the National Bureau of Standards "2 and...
Full view - About this book

Compilation of Intelligence Laws and Related Laws and Executive Orders of ...

United States - Intelligence service - 1990
...privacy of each Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such system. Copies of each such plan shall be transmitted to the National Bureau of Standards and...
Full view - About this book

A Five-year Plan, Meeting the Automatic Data Processing and ...

Administrative agencies - 1990
...out in the Computer Security Act (PL 100-235, 40 USC 759 note). That is, the measures taken should be "commensurate with the risk and magnitude of the...unauthorized access to or modification of the information." High value transactions, transmissions of highly sensitive information, and transactions that directly...
Full view - About this book

Information Systems: Agencies Overlook Security Controls During Development ...

United States. General Accounting Office - Computer crimes - 1988 - 51 pages
...the act to establish by January 1989, a plan for the security and privacy of each such system that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such systems. In addition, the central management agencies have provided information security requirements...
Full view - About this book

Electronic Delivery of Public Assistance Benefits: Technology ..., Volume 22

Electronic benefits transfers - 1988 - 23 pages
...assure "cost-effective" security and privacy: agency security plans developed according to the standards are to be commensurate with the risk and magnitude of the harm resulting from loss, misuse, unauthorized access to, or modification of, sensitive information in the computer systems.49...
Full view - About this book

Summary of Activities of the Committee on Science, Space, and Technology ...

United States. Congress. House. Committee on Science, Space, and Technology - Legislation - 1989 - 367 pages
...privacy of each Federal computer system identified by that agency pursuant to subsection (a) that is commensurate with the risk and magnitude of the harm...to or modification of the information contained in such system. Copies of each such plan shall be transmitted to the National Bureau of Standards Mi SEAT....
Full view - About this book

Computer Security: Hearing Before the Subcommittee on Technology ..., Volume 4

United States. Congress. House. Committee on Science, Space, and Technology. Subcommittee on Technology and Competitiveness - Computer networks - 1991 - 157 pages
...information. Part of the wisdom of the Computer Security Act, is its recognition of the need for security commensurate with the risk and magnitude of the harm...resulting from the loss, misuse, or unauthorized access to the information contained in computer systems. Defining broad categories of information to be afforded...
Full view - About this book

Workshop on Security Procedures for the Interchange of Electronic Documents ...

Roy Saltman - Computer networks - 1994 - 173 pages
...information in Federal computer systems. The Act states that implementation of protective techniques shall be "commensurate with the risk and magnitude of the...unauthorized access to or modification of the information ..." For messages where confidentiality is a major issue, it might be determined that it is worth the...
Full view - About this book

National Fine Center: Expectations High, But Development Behind Schedule ...

United States. General Accounting Office - Fines (Penalties) - 1993 - 32 pages
...agency to establish a plan for security and privacy that is commensurate with the risk and magnitude of harm resulting from the loss, misuse, or unauthorized...to or modification of the information contained in such a system. To carry out these requirements effectively, agencies need to perform risk analyses...
Full view - About this book




  1. My library
  2. Help
  3. Advanced Book Search
  4. Download EPUB
  5. Download PDF