Off-topic Talk Where overpaid, underworked S2000 owners waste the worst part of their days before the drive home. This forum is for general chit chat and discussions not covered by the other off-topic forums.

NEW GAME! whats do you have copied RIGHT NOW!

Thread Tools
 
Old Dec 17, 2003 | 03:39 PM
  #1  
JustAyoungMC's Avatar
Thread Starter
Registered User
 
Joined: Dec 2002
Posts: 8,579
Likes: 1
From: G-Town, TX
Default NEW GAME! whats do you have copied RIGHT NOW!

just press ctrl-v

lets see it
Reply
Old Dec 17, 2003 | 03:41 PM
  #2  
JustAyoungMC's Avatar
Thread Starter
Registered User
 
Joined: Dec 2002
Posts: 8,579
Likes: 1
From: G-Town, TX
Default

"and for some reason there were squirrels everywhere "
Reply
Old Dec 17, 2003 | 03:50 PM
  #3  
s2k2004's Avatar
Registered User
 
Joined: May 2002
Posts: 240
Likes: 1
From: Wilmington
Default

19808
Reply
Old Dec 17, 2003 | 04:07 PM
  #4  
Presidente's Avatar
Registered User
 
Joined: Sep 2002
Posts: 15,176
Likes: 0
From: Under Construction
Default

Reply
Old Dec 17, 2003 | 04:10 PM
  #5  
S2KDudeRick's Avatar
Registered User
 
Joined: Sep 2003
Posts: 1,158
Likes: 0
From: Brownsburg
Default

RRewerts@Hotmail.com
Reply
Old Dec 17, 2003 | 04:44 PM
  #6  
steve c's Avatar
Registered User
 
Joined: Jun 2001
Posts: 6,792
Likes: 4
Default

APPENDIX- A
INITIAL INFORMATION SECURITY ASSESSMENT

Describe how your organization addresses each issue in your information security plan. If your plan documents specifically address an issue, you may simply cite the section or reference number in lieu of a detailed response. Please feel free to respond using another format; however, we request that you use the reference numbers for each section to aid our review of your response.

CONCEPT CATEGORY CONCEPT DESCRIPTIONS RESPONSE
1 Program Planning and Management A program exists that encompasses security and privacy issues and is adequately maintained.
1.1 Obtain senior management and board, approval, commitment, and direction
1.2 Formally appoint a central point of contact for security and privacy coordination
1.3 Strategically plan, monitor, and maintain security and privacy program
1.4 Establish and document security and privacy roles and responsibilities
1.5 Incorporate requirements and involvement of businesses into program
1.6 Establish program metrics
1.7 Ensure appropriate budget and resources are allocated to the program
2 Security & Privacy Policy and Practice Management A viable and comprehensive privacy program addresses all elements of information privacy compliance & preparedness.
2.1 Develop and implement enterprise policies, standards, and guidelines
Reply
Old Dec 17, 2003 | 04:46 PM
  #7  
HKStallion's Avatar
20 Year Member
 
Joined: Sep 2002
Posts: 1,160
Likes: 15
From: Raleigh
Default

XV-Z10000
Reply

Trending Topics

Old Dec 17, 2003 | 04:56 PM
  #8  
Tedow's Avatar
Former Moderator
 
Joined: Jan 2001
Posts: 2,751
Likes: 1
From: Arlington, VA
Default

http://forums.s2ki.com/forums/showthread.p...threadid=169328
Reply
Old Dec 17, 2003 | 05:04 PM
  #9  
Mindcore's Avatar
Former Moderator
25 Year Member
Former Moderator
 
Joined: Oct 2000
Posts: 16,175
Likes: 0
From: Erock is da shizzle
Default

true because the longer I am away from you, the greater is


What the hell???
Reply
Old Dec 17, 2003 | 05:04 PM
  #10  
LordVagabond's Avatar
Banned
 
Joined: Oct 2001
Posts: 3,721
Likes: 0
From: Calgary
Default

Upper Paleolithic Rock Art
- Tracks and hoof prints
Reply



All times are GMT -8. The time now is 05:15 PM.