Search Results
Results 441 - 450 of about 838 for 2025年4月宏观经济数据. Documents are displayed in order of relevance.
-
OIG Closing of 22-0028-I Board Trading Activity
4 MEMORANDUM DATE: July 11, 2022 TO: Jerome H. Powell Chair Board of Governors...4 of 4 Based on our findings, we are closing our investigation into the
-
Observations on Cybersecurity Risk Management Processes for Vendors Supporting the Main Street Lending Program and the Secondary Market Corporate Credit Facility
.4 The SMCCF was designed to provide liquidity for outstanding corporate...4 Because no transactions were made under the PMCCF while it was operational
-
2022 Audit of the Board's Information Security Program
4 (managed and measurable) maturity. Since our review last year, we found...4 (managed and measurable) represents an effective level of security.4
-
2022 Audit of the CFPB's Information Security Program
4 (managed and measurable) maturity. Since our review last year, we found...4 (managed and measurable) represents an effective level of security.
-
Semiannual Report to Congress, October 1, 2021-March 31, 2022
4 (managed and measurable) maturity. The Board has opportunities to mature
-
The Board Can Enhance Certain Governance Processes Related to Reviewing and Approving Supervisory Proposals
4 Update, in consultation with the Board of Governors, the director of...4 of 46 Finding 4: The Board Can Clarify How Some Operations Are to Be
-
Executive Summary: 2022 Audit of the CFPB's Information Security Program
4 (managed and measurable) maturity. Since our review last year, we found...4 (managed and measurable) represents an effective level of security.
-
Executive Summary: 2022 Audit of the Board's Information Security Program
4 (managed and measurable) maturity. Since our review last year, we found...4 (managed and measurable) represents an effective level of security.
-
2023 Major Management Challenges for the CFPB
4 of 11 Contents Ensuring an Effective Information Security Program 5
-
2023 Major Management Challenges for the CFPB
4 of 11 Contents Ensuring an Effective Information Security Program 5