Date |
Page |
Action |
User |
Comment |
Action |
Fri 29 of Jan, 2010 15:58 CST |
System and Data Backups
|
Updated |
twright |
[approved by rdickey] |
|
Fri 29 of Jan, 2010 15:58 CST |
System and Data Backups
|
Updated |
twright |
[approved by rdickey] |
|
Fri 29 of Jan, 2010 15:58 CST |
System and Data Backups
|
Updated |
twright |
[approved by rdickey] |
|
Fri 29 of Jan, 2010 15:58 CST |
System and Data Backups
|
Updated |
twright |
[approved by rdickey] |
|
Wed 08 of Dec, 2010 13:38 CST |
Malicious Software Protections (antiv...
|
Updated |
twright |
[approved by admin] |
|
Wed 08 of Dec, 2010 13:38 CST |
Malicious Software Protections (antiv...
|
Updated |
twright |
[approved by admin] |
|
Wed 08 of Dec, 2010 13:38 CST |
Malicious Software Protections (antiv...
|
Updated |
twright |
[approved by admin] |
|
Mon 01 of Feb, 2010 08:25 CST |
Vendor and Third Party System Access
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 08:25 CST |
Vendor and Third Party System Access
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 08:25 CST |
Vendor and Third Party System Access
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 08:25 CST |
Vendor and Third Party System Access
|
Updated |
rdickey |
[approved by rdickey] |
|
Tue 18 of Jan, 2011 12:40 CST |
Portable Communication Device Policy
|
Updated |
admin |
|
|
Wed 28 of Apr, 2010 15:51 CDT |
Monitoring of Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Wed 28 of Apr, 2010 15:51 CDT |
Monitoring of Computer Resources
|
Updated |
twright |
Item 5 changed to put the responsibility on the departments to identify and correct inappropriate use. [approved by rdickey] |
|
Wed 28 of Apr, 2010 15:51 CDT |
Monitoring of Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Thu 02 of Dec, 2010 17:13 CST |
DRAFT-Data Set Maintenance
|
Updated |
bhall |
Added Examples |
|
Fri 15 of Jan, 2010 12:38 CST |
Volunteer Agreement
|
Updated |
rdickey |
|
|