Examples of Information Security Handbook in a sentence
Protected Information shall mean and include collectively, as per The Port Authority of New York & New Jersey Information Security Handbook (October 15, 2008, corrected as of November 14, 2013), Confidential Information, Confidential Proprietary Information, Confidential Privileged Information and information that is labeled, marked or otherwise identified by or on behalf of the Authority so as to reasonably connote that such information is confidential, privileged, sensitive or proprietary in nature.
Confidential information shall also mean and include collectively, as per The Port Authority of New York & New Jersey Information Security Handbook (October 15, 2008, corrected as of November 14, 2013), Protected Information, Confidential Proprietary Information, Confidential Privileged Information and information that is labeled, marked or otherwise identified by or on behalf of the Authority so as to reasonably connote that such information is confidential, privileged, sensitive or proprietary in nature.
Federal, HHS, and CMS policies and standards include but are not limited to: All pertinent National Institute of Standards and Technology publications; the HHS Information Systems Program Handbook and the CMS Information Security Handbook.
Confidential information shall also mean and include collectively, as per The Port Authority of New York & New Jersey Information Security Handbook (October 15, 2008, corrected as of February, 9 2009), Confidential Proprietary Information, Confidential Privileged Information and information that is labeled, marked or otherwise identified by or on behalf of the Authority so as to reasonably connote that such information is confidential, privileged, sensitive or proprietary in nature.
Federal, HHS, and CMS policies and standards include but are not limited to: all pertinent National Institute of Standards and Technology publications; the HHS Information Systems Program Handbook and the CMS Information Security Handbook.
National Institute of Standards and Technology Special Publication 800-100, Information Security Handbook: A Guide for Managers, October 2006.
This requirement may be waived in exceptional circumstances and firms seeking to be considered should refer to § 3.2 of the Information Security Handbook for details on this policy and the process for waiver.
Federal, HHS, and CMS policies and standards include but are not limited to: All pertinent NIST publications; the HHS Automated Information Systems Security Handbook and the CMS Information Security Handbook.
Federal, HHS, and CMS policies and standards include but are not limited to: All pertinent National Institute of Standards and Technology publications; HHS Information Systems Program Handbook and the CMS Information Security Handbook.
NOTE: The Information Security Handbook requires that certain criteria be met prior to being granted access to Confidential Information.