Display title | Template:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.15 Personally identifiable information processing and transparency |
Default sort key | Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Appendix 1.15 Personally identifiable information processing and transparency |
Page length (in bytes) | 3,100 |
Namespace | Template |
Page ID | 14077 |
Page content language | en - English |
Page content model | wikitext |
Indexing by robots | Allowed |
Number of redirects to this page | 0 |
Number of subpages of this page | 0 (0 redirects; 0 non-redirects) |
Edit | Allow only administrators (infinite) |
Move | Allow only administrators (infinite) |
Page creator | Shawndouglas (talk | contribs) |
Date of page creation | 22:45, 14 March 2023 |
Latest editor | Shawndouglas (talk | contribs) |
Date of latest edit | 22:45, 14 March 2023 |
Total number of edits | 2 |
Total number of distinct authors | 1 |
Recent number of edits (within past 90 days) | 0 |
Recent number of distinct authors | 0 |