Property | Value |
rdfs:label | |
is dcterms:subject of | - Report on the Implementation of the 2003 OECD Guidelines for Protecting Consumers from Fraudulent and Deceptive Commercial Practices Across Borders
- Audi v. D'Amato
- GAO Reports - 2006
- OMB Memorandum M-06-15
- International Profit Associates v. Paisola
- Report on Phishing: A Report to the Minister of Public Safety and Emergency Preparedness Canada and the Attorney General of the United States
- Framework for Privacy Analysis of Programs, Technologies, and Applications
- Federal Funding Accountability and Transparency Act of 2006
- Intelligence Community Directive 301
- Internet Governance Forum (IGF): The First Two Years
- Mele v. Davidson & Associates
- Investools v. Investtools.com
- Playing it Safe: Avoiding Online Gaming Risks
- Roadmap to Secure Control Systems in the Energy Sector
- High tech crime tools
- Lighthouse Plastics, LLC v. Lighthouse Plastics, LLC
- The Architecture for Privacy in a Networked Health Information Environment
- Key v. DSW
- Automated Targeting System
- Warning, Alert, and Response Network Act
- BS 7799
- FM 2-22.401
- NIST Special Publication 800-88
- U.S. v. Romm
- Veterans Benefits, Health Care, and Information Technology Act of 2006
- 2006 e-Government Strategy, Responsive Government: A New Service Agenda
- Merck v. Mediplan
- Graham & Buffet v. www.vilcabamba.com
- Safeguarding Your Data
- Information Technology Sector Coordinating Council
- Data Security: Federal and State Laws
- Policy Coordinating Committee for Public Diplomacy and Strategic Communication
- 2005 Annual Report to Congress on Foreign Economic and Industrial Espionage
- National DNA Database
- Center for Identity Management and Information Protection
- Germany Secure in the Web
- A Strategy for a Secure Information Society – “Dialogue, partnership and empowerment”
- Tdata v. Aircraft Technical Publishers
- Digital Broadband Content: Digital Content Strategies and Policies
- The Future Environment Facing the Canadian Broadcasting System
- U.S. v. Choicepoint
- Institute for Law and the Web
- Unlawful Internet Gambling Enforcement Act of 2006
- Wachter Management v. Dexter & Chaney
- Mobilizing Information to Prevent Terrorism: Accelerating Development of a Trusted Information Sharing Environment
- Kirby v. Sega
- Analogue to Digital TV Switchover
- Nexa Center for Internet & Society
- Intelligence Community Directive 1
- Executive Order 13402
- Ford Motor v. Cross
- Teen Challenge International USA v. Elleson
- A Matter of Size: Triennial Review of the National Nanotechnology Initiative
- Bar-Ayal v. Time Warner Cable
- National Military Strategy for Cyberspace Operations
- Twenty-First Century Government: Expanding Broadband Access and Usage in California
- Trademark Dilution Revision Act of 2006
- Affinity Internet v. Consolidated Credit
- Department of Homeland Security Appropriations Act of 2007
- Degidio v. West Group
- People and Processes: Current State of Telecommunications and Electric Power Interdependencies
- Law Enforcement Information Sharing Program Coordinating Committee
- POST Data Encryption
- National Federation of the Blind v. Target
- Recommendations for Identity Theft Related Data Breach Notification
- Audi AG v. D'Amato
- Boschetto v. Hansing
- Preservation and Long-term Access Through Networked Services
- Malware: viruses, worms, Trojan horses
- NSTAC Report to the President on Telecommunications and Electric Power Interdependencies: The Implications of Long-Term Outages
- Interscope Records v. Duty
- President's Identity Theft Task Force
- Businesses Must Provide Victims and Law Enforcement with Transaction Records Relating to Identity Theft
- FIPS 200
- Personal Information: Agency and Reseller Adherence to Key Privacy Principles
- National Trust Framework
- California Broadband Initiative
- Intellipedia
- Privacy Technology Focus Group Final Report
- POST Pervasive Computing
- Apple Corp v. Apple Computer
- In re Guidance Software
- EISAS – European Information Sharing and Alert System
- Best Western Int’l v. Doe
- FMI 2-22.9
- Fusion Center Guidelines: Developing and Sharing Information and Intelligence in a New Era
- Freedom Calls Foundation v. Bukstel
- Digital Content Strategies and Policies
- Keeping Citizen Trust: What Can A State CIO Do To Protect Privacy?
- Silpada Designs v. O'Malley
- BeSTGRID
- The Information Sharing Environment Interim Implementation Plan
- Broussard v. Compulink
- Bavaro Palace v. Vacation Tours
- Cybercrime: The Council of Europe Convention
- Internet Access Tax Moratorium: Revenue Impacts Will Vary by State
- C.V. Starr & Co. v. AIG
- Online Payment Systems for E-Commerce
- Progress Report of the Department of Justice's Task Force on Intellectual Property
- Computing Community Consortium
- NSTAC Report to the President on the National Coordinating Center
- In re CardSystems Solutions
- Disruptive Technology Office
- Data Mining Report: DHS Privacy Office Response to House Report 108-774
- I2010 eGovernment Action Plan
- Bustamante v. Intuit
- Hewlett-Packard v. Midwest Information Technology
- Christensen Firm v. Chameleon Data
- Stratton Faxon v. National Mutual
- Surfing on Thin Ice: Consumers and Malware, Adware, Spam and Phishing
- Picture It Sold v. I Sold It
- Choice Hotels International v. Wright
- Export Controls: Agencies Should Assess Vulnerabilities and Improve Guidance for Protecting Export-Controlled Information at Companies
- Department of Veterans Affairs Information Security Enhancement Act of 2006
- Seattle Laptop v. A-1 Best Computer
- 24 Hour Fitness v. 24/7 Tribeca Fitness
- Personal Information: Key Federal Privacy Laws Do Not Require Information Resellers to Safeguard All Sensitive Data
- Financial Institutions and Customer Information: Complying with the Safeguards Rule
- CNSSP No. 18
- How Not to Get Hooked by a ‘Phishing’ Scam
- Research Libraries Group
- APC Internet Rights Charter
- The Risk of Criminal Exploitation of Online Auctions
- A1 Mortgage v. A1 Mortgage & Financial Services
- Maruti.Com v. Maruti Udyog
- Public-Private Sector Intelligence Coordination
- Edina Realty v. TheMLSonline.com
- Gerardange v. Templer
- TNT USA v. TrafiExpress
- E-Government Code
- American Council on Education v. FCC
- The Crimeware Landscape: Malware, Phishing, Identity Theft and Beyond
- Implementing a Trusted Information Sharing Environment Implementing an Information Sharing Environment
- FTC v. ERG Ventures
- Einhorn v. Mergatroyd Productions
- POST Computer Crime
- Pepper Patch v. Bell Buckle Country Store
- World Information Society Report 2006
- Protecting Consumers from Cyberfraud
- Global Internet Freedom Consortium
- ISE Privacy Guidelines
- Federal Plan for Cyber Security and Information Assurance Research and Development
- Defending Cell Phones and PDAs Against Attack
- TECHINT: Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations
- Pichey v. Ameritech Interactive
- Sunlight Saunas v. Sundance Sauna
- Pop Warner Little Scholars v. N.H. Youth Football
- Almeida v. Amazon.com
- Anthony v. Yahoo!
- Yahoo! v. Yahooahtos.com
- Our Cultural Commonwealth
- Internet: Status Report on Legislative Attempts to Protect Children from Unsuitable Material on the Web
- Making Privacy Notices Simple: An OECD Report and Recommendations
- Internet Auctions: A Guide for Buyers and Sellers
- Updated Guidance for IRS Computer Security Incident Reporting
- Document and Benefit Fraud Task Forces
- Business Action to Support the Information Society
- Adam Walsh Child Protection and Safety Act of 2006
- In the Matter of Take-Two Interactive
- Intelligence Collection Group
- McKillip Industries v. Integrated Label
- An Introduction to the ISE Privacy Guidelines
- Albert Furst von Thurn und Taxis v. Karl Prince von Thurn und Taxis
- A Strategy for a Secure Information Society - "Dialogue, Partnership and Empowerment"
- State v. Secure Computer
- Georeferencing: The Geographic Associations of Information
- Dawson v. Brandsberg
- FTC v. Seismic Entertainment
- Internet Commerce Association
- Israeli Law, Information and Technology Authority
- Digital Broadband Content
- Jihadis and the Internet
- Joint Project Agreement
- Measuring Innovation in the 21st Century Economy Advisory Committee
- DiMeo v. Max
- What Price Privacy? The Unlawful Trade in Confidential Personal Information
- Directive on Privacy and Electronic Communications
- PAM 25-1-1
- Survey of DHS Data Mining Activities
- Mitigations for Security Vulnerabilities Found in Control System Networks
- Report on Orphan Works
- ICT4Peace Foundation
- ICT in Developing Countries
- CRS Reports - 2006
- Privacy and Biometrics: Building a Conceptual Foundation
- Australian Government Information Interoperability Framework
|