Date |
Page |
Action |
User |
Comment |
Action |
Mon 01 of Feb, 2010 07:21 CST |
City Information Technology Policies
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:21 CST |
City Information Technology Policies
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:21 CST |
City Information Technology Policies
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:31 CST |
Approval to Utilize Computer Resources
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:33 CST |
Computer and User Operations
|
Updated |
rdickey |
|
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
twright |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:42 CST |
Malicious Software Protection
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:43 CST |
Electronic Mail Policy
|
Updated |
rdickey |
[approved by rdickey] |
|
Mon 01 of Feb, 2010 07:47 CST |
Security and Privacy
|
Updated |
rdickey |
|
|