Found 6 datasets matching "Security Violation".
-
Sensitive Regulated Data: Permitted and Restricted UsesPurposeScope and AuthorityStandardViolation of the Standard - Misuse of InformationDefinitionsReferencesAppendix A: Personally Identifiable...
Search relevance: 49.75 | Views last month: 0 -
Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the Security Reports. This is in...
Search relevance: 42.23 | Views last month: 1 -
The purpose of the study was to evaluate the extent to which deterrence or cooperative strategies motivated firms and their facilities to comply with environmental regulations. The project...
Search relevance: 21.80 | Views last month: 0 -
Decisions issued by Administrative Law Judges of the Departmental Appeals Board's Civil Remedies Division concerning fraud and abuse determinations by the Office of the Inspector General (OIG) or...
Search relevance: 17.22 | Views last month: 0 -
Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including disallowances, terminations and...
Search relevance: 14.07 | Views last month: 7 -
Decisions issued by the Chair and Board Members of the Departmental Appeals Board concerning determinations in discretionary, project grant programs, including disallowances, terminations and...
Search relevance: 14.07 | Views last month: 0