Sentences with phrase «appropriate security audit»

When the need to put confidential information on the site is unavoidable, because it must be made available to defined user groups (lawyers for example), then an appropriate security audit and security testing should be conducted to evaluate the security risks, and such risks should be formally accepted by senior management.

Not exact matches

The Pilot application process includes the submission of an application package by a motor carrier to DOT, DOT verification of the information in the package, completion of safety and security vetting of the carrier and drivers by DOT and the Department of Homeland Security, completion of a Pre-Authorization Safety Audit (PASA) of the carrier (including its drivers included in the Pilot) and publication of the results in both the FMCSA and Federal Registers, and as appropriate granting the carrier operating authoritysecurity vetting of the carrier and drivers by DOT and the Department of Homeland Security, completion of a Pre-Authorization Safety Audit (PASA) of the carrier (including its drivers included in the Pilot) and publication of the results in both the FMCSA and Federal Registers, and as appropriate granting the carrier operating authoritySecurity, completion of a Pre-Authorization Safety Audit (PASA) of the carrier (including its drivers included in the Pilot) and publication of the results in both the FMCSA and Federal Registers, and as appropriate granting the carrier operating authority by DOT.
«Although employed or engaged by the same company, and sharing a common interest in appropriate financial disclosure as required by securities laws, outside auditors and in - house lawyers bring different perspectives to their roles and each must meet different legal and regulatory requirements that apply to their respective missions in the audit process,» Krebs said.
The legal distinction between reality and virtual reality applied to court cases is very much open to debate, however, assuming that the environment is as accurate and detailed as possible, the evidence has been integrated correctly and the technology is used in an appropriate way, there is no reason that the virtual can not be accepted as the real; in the same way that security and disability audits can be conducted for the construction industry using 3D models and virtual reality.
We reserve the right to intercept, store, archive, delete or view such emails for security / audit purposes and where necessary instigate appropriate proceedings against the parties involved.
Provided Board and Executive reporting on budget impacts on programs, forecasted long - term funding requirements while directing outside consultants, as appropriate, for independent attestation of security audits directed.
TREB will require that Members (1) utilize appropriate security protection, such as firewalls, as long as such requirement does not impose security obligations greater than those employed concurrently by TREB; and (2) maintain an audit trail of Consumers» activity on the VOW and make that information available to TREB if TREB has reason to believe that any VOW has been the cause of, or permitted a breach in, the security of the MLS ® data or a violation of applicable MLS ® Rules and Policies (including the VOW Rules).
MLSs that allow persistent downloading of the MLS database by participants for display or distribution on the Internet or by other electronic means may require that participants» websites (1) utilize appropriate security protection, such as firewalls, provided that any security obligations imposed on participants may not be greater than those employed concurrently by the MLS, and / or (2) maintain an audit trail of consumer activity on participants» websites and make that information available to the MLS if the MLS has reason to believe that a participant's IDX website has caused or permitted a breach in the security of the data or a violation of MLS rules related to use by consumers.
a b c d e f g h i j k l m n o p q r s t u v w x y z