Property | Value |
rdfs:label | |
is dcterms:subject of | - Space Acquisitions: DOD Faces Challenges in Fully Realizing Benefits of Satellite Acquisition Improvements
- The Safety Challenge and Promise of Automotive Electronics: Insights from Unintended Acceleration
- VA Administrative Investigations: Improvements Needed in Collecting and Sharing Information
- Federal Information Technology Shared Services Strategy
- Cybercrime: Conceptual Issues for Congress and U.S. Law Enforcement
- Unmanned Aircraft Systems: Measuring Progress and Addressing Potential Privacy Concerns Would Facilitate Integration into the National Airspace System
- GAO Reports - 2012
- Handbook for Safeguarding Sensitive Personally Identifiable Information
- Roadshow Films Pty Ltd & Ors v iiNet Ltd
- Recommendations for Standardized Implementation of Digital Privacy Controls
- Report to the President: Realizing the Full Potential of Government-held Spectrum to Spur Economic Growth
- Contracting Guidance to Support Modular Development
- IT Supply Chain: National Security-Related Agencies Need to Better Address Risks
- Updating U.S. Federal Cybersecurity Policy and Guidance
- Recommendation of the Council on the Protection of Children Online
- Report on a Digital Freedom Strategy in EU Foreign Policy
- OMB Memorandum M-12-10
- Effort to Consolidate Governmentwide Acquisition Data Systems Should Be Reassessed
- Data Security Breach Notification Laws
- Privacy Enforcement and Protection Unit
- Significant Cyber Events Since 2006
- Federal Telework: Program Measurement Continues to Confront Data Reliability Issues
- Bollea v. Gawker Media
- Unleashing the Potential of Cloud Computing in Europe-Accompanying Staff Working Document
- Code of Best Practices in Fair Use for Academic and Research Libraries
- A Strategy for E-procurement
- Export Enforcement Coordination Center
- Understanding Voice over Internet Protocol
- The Networked Energy Web: The Convergence of Energy Efficiency, Smart Grid, and Distributed Power Generation as the Next Frontier of the ICT Revolution
- Opinion 05/2012 on Cloud Computing
- Information Technology: HUD's Fiscal Year 2011 Expenditure Plan Satisfies Statutory Conditions
- Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
- Security Categorization and Control Selection for National Security Systems
- Recommendations for the Remediation of Bots in ISP Networks
- Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy
- In the Matter of Rules and Regulations Implementing the Telephone Consumer Protection Act of 1991
- CJCSI 6211.02D
- PortfolioStat
- Enforceable Codes of Conduct: Protecting Consumers Across Borders
- MHealth Task Force: Findings and Recommendations
- In Short: Advertising & Privacy Disclosures in a Digital World
- ICT for Disabled People
- Medical Devices: FDA Should Expand Its Consideration of Information Security for Certain Types of Devices
- Mobile Device Location Data: Additional Federal Actions Could Help Protect Consumer Privacy
- Middle Class Tax Relief and Job Creation Act of 2012
- Public Interest Declassification Board Reauthorization Act of 2012
- Recommendations for Establishing an Identity Ecosystem Governance Structure for the National Strategy for Trusted Identities in Cyberspace
- Cybersecurity: Managing Risks for Greater Opportunities
- Medicare: Action Needed to Remove Social Security Numbers from Medicare Cards
- Federal Support for and Involvement in State and Local Fusion Centers
- Order to File Special Report
- Towards a Comprehensive European Framework for Online Gambling
- Selected Federal Data Security Breach Legislation
- FM 3-55
- Tetris Holding v. Xio Interactive
- Cybersecurity: Threats Impacting the Nation
- Consumers and Mobile Financial Services
- Oracle America, Inc. v. Google
- Privacy Considerations of Online Behavioural Tracking
- Nanotechnology: Improved Performance Information Needed for Environmental, Health, and Safety Research
- Study on Specialized Intellectual Property Courts
- Executive Order 13587
- IT Supply Chain: Additional Efforts Needed by National Security-Related Agencies to Address Risks
- Leading Education by Advancing Digital Commission
- Global Survey on Internet Privacy and Freedom of Expression
- Espinoza v. County of Orange
- NIST Special Publication 800-40
- The Development and Diffusion of Digital Content
- The Use of the Internet for Terrorist Purposes
- Foreign Police Assistance: Defined Roles and Improved Information Sharing Could Enhance Interagency Collaboration
- Unmanned Aircraft System Operations in UK Airspace–Guidance
- Best Practices to Address Online and Mobile Threats
- Social Security Administration: Improved Planning and Performance Measures Are Needed to Help Ensure Successful Technology Modernization
- Protection of Digital Computer and Communications Systems and Networks
- DHS Records Working Group
- Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Datasets Containing Non-terrorism Information
- ICS-CERT Year in Review: Industrial Control Systems Cyber Emergency Response Team, 2012
- E-books: Developments and Policy Considerations
- Creating Effective Cloud Computing Contracts for the Federal Government, Best Practices for Acquiring IT as a Service
- Bringing e-commerce benefits to consumers
- Lessons Learned: Roadblocks and Opportunities for Open Source Software (OSS) in U.S. Government
- Data Breach Response Checklist
- Digital Hubs Pilot Project
- Investigative Report on the U.S. National Security Issues Posed by Chinese Telecommunications Companies Huawei and ZTE
- Anonymisation: Managing Data Protection Risk, Code of Practice
- Intelligence Community Legal Reference Book
- Department of the Army, Information Collection
- Intelligent Transportation Systems: Improved DOT Collaboration and Communication Could Enhance the Use of Technology to Manage Congestion
- The Internet of Things: A Reality Check
- Electricity Subsector Cybersecurity Risk Management Process
- Defense Biometrics: Additional Training for Leaders and More Timely Transmission of Data Could Enhance the Use of Biometrics in Afghanistan
- U.S. National Science Foundation: An Overview
- FM 6-01.1
- Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies
- Internet Global Growth: Lessons for the Future
- Cyber Security Task Force: Public-Private Information Sharing
- Application Whitelisting Explained
- U.S. v. RockYou
- Industry Botnet Group
- CNSSP-15
- Australia: Telecommunications Data Retention-An Overview
- Stop Trading on Congressional Knowledge Act of 2012
- (Third) Report of the Acting General Counsel Concerning Social Media Cases
- Privacy: Federal Law Should Be Updated to Address Changing Technology Landscape
- Smart Grid Privacy Workshop Summary Report
- Telecommunications: Exposure and Testing Requirements for Mobile Phones Should Be Reassessed
- Driver's License Security: Federal Leadership Needed to Address Remaining Vulnerabilities
- Notice of Non-Compliance with California Online Privacy Protection Act
- Homeland Security: DHS and TSA Face Challenges Overseeing Acquisition of Screening Technologies
- Report on Consumer Protection in Online and Mobile Payments
- Cybersecurity and the Evolving Role of State Regulation
- CRS Reports - 2012
- Outsourced Cloud Computing
- Open Data Case Studies
- Cyberbullying Hurts: Respect for Rights in the Digital Age
- CERT-EU
- Intelligence Information Sharing: Final Report and Recommendations
- Global Privacy Resources Booklet
- Decision on Strengthening the Protection of Online Information
- Defense Weather Satellite System
- Strategies to Mitigate Targeted Cyber Intrusions
- Virtual Currency Schemes
- ENISA Threat Landscape 2012: Responding to the Evolving Threat Environment
- Cloud Computing at the Social Security Administration
- Cloud SLA Considerations for the Government Consumer
- National Insider Threat Policy
- Operation High Roller
- Electronic Warfare Data and Reprogrammable Library Support Program
- Bring Your Own Device: A Toolkit to Support Federal Agencies Implementing Bring Your Own Device (BYOD) Programs
- To Date, DISH Network Is Cooperating with the Court-Appointed Special Master's Examination of Its Compliance with the Section 119 Statutory License
- NIST Special Publication 800-61
- Executive Order 13618
- Information Technology: FDA Needs to Fully Implement Key Management Practices to Lessen Modernization Risks
- ATP 2-22.9
- Mobile Premium Services: Meeting the Challenges
- Critical Cloud Computing - A CIIP Perspective on Cloud Computing Services
- Mobile User Objective System
- 2012 Global E-Government Survey: E-Government for the People
- Guidelines for Access, Retention, Use, and Dissemination by the National Counterterrorism Center and Other Agencies of Information in Data Sets Containing Non-Terrorism Information
- 2012 Data Mining Report
- Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions
- Industrial Internet: Pushing the Boundaries of Minds and Machines
- Respectful and Responsible Relationships: There's No App for That
- Opinion of the European Economic and Social Committee on the 'Green Paper on Online Gambling in the Internal Market'
- Proactive Policy Measures by Internet Service Providers Against Botnets
- NIST Special Publication 800-146
- Prescription Drug Data: HHS Has Issued Health Privacy and Security Regulations but Needs to Improve Guidance and Oversight
- Mobile Payments: An Evolving Landscape
- Facebook v. Power Ventures
- The Future of Scientific Knowledge Discovery in Open Networked Environments: Summary of a Workshop
- Defense Acquisition Guidebook
- In the Matter of Upromise, Inc.
- China, Internet Freedom, and U.S. Policy
- Nationwide Public Safety Broadband Network
- Global Network of Internet and Society Research Centers
- Cloud Computing: An Overview of the Technology and the Issues Facing American Innovators
- Mobile and Privacy: Privacy Design Guidelines for Mobile Application Development
- Building a 21st Century Digital Government
- Deposit Requirements for Registration of Automated Databases that Predominantly Consist of Photographs
- DoD Directive 3000.09
- First Cloud Policy
- Privacy Impact Assessment for the National Cybersecurity Protection System
- Brown Institute for Media Innovation
- Digital Government: Building a 21st Century Platform to Better Serve the American People
- FM 3-36
- Building Privacy into Ontario's Smart Meter Data Management System: A Control Framework
- Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)
- European Cybercrime Centre
- The Impact of the Acquisition and Use of Patents on the Smartphone Industry
- Wiretapping, Tape Recorders, and Legal Ethics: An Abridged Overview of Questions Posed by Attorney Involvement in Secretly Recording Conversation
- Information Security and Security Breach Notification Guidance
- The Reallocation Imperative: A New Vision for Spectrum Policy
- Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts
- Research Information Network
- Practical Guide to Cloud Service Level Agreements
- Mobile Privacy Principles
- Feasibility Study Report (FSR) Improvement Quick Wins
- Cyber Mission Force
- Rising to the Challenge: U.S. Innovation Policy for Global Economy
- Mobile Apps for Kids: Current Privacy Disclosures are Disappointing
- Consortium for Cybersecurity Action
- Best Practices for Mobile Application Developers
- ICT Applications for the Smart Grid: Opportunities and Policy Implications
- Intellectual Property and the U.S. Economy: Industries in Focus
- CDT Analysis of the European Commission's Proposed Data Protection Regulation
- Joint Publication 3-13
- Refund Fraud and Identity Theft Global Report
- U.S.-EU Cooperation Against Terrorism
- Secure BGP Deployment Report
- Occupying the Information High Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage
- Transforming the Security Classification System
- Air Force Supplement to the Department of Defense Dictionary of Military and Associated Terms
- JOBS Act
- Investment Adviser Use of Social Media
- A Coherent Framework for Building Trust in the Digital Single Market for E-commerce and Online Services
- Text and Multimedia Messaging: Issues for Congress
- Society of the Holy Transfiguration Monestary v. Gregory
- Worldwide Threat Assessment of the U.S. Intelligence Community
- Pitale v. Holestine
- 2012 Strategic Plan
- Hidden Arena: Cyber Competition and Conflict in Indo-Pacific Asia
- Copyright and the Digital Economy
- Mobility Capability Package
- The New Global Ecosystem in Advanced Computing: Implications for U.S. Competitiveness and National Security
- California Reader Privacy Act
- Study on Data Collection and Storage in the EU
- A Global Reality: Governmental Access to Data in the Cloud
- Defense Sexual Assault Incident Database
- DOD Instruction 5200.44
- OneM2M
- Export Controls: Proposed Reforms Create Opportunities to Address Enforcement Challenges
- Federal Statistical System: Agencies Can Make Greater Use of Existing Data, but Continued Progress Is Needed on Access and Quality Issues
- Smart Meter Data: Privacy and Cybersecurity
- Unmanned Aircraft Systems Integration Office
- NIST Special Publication 800-165
- Release and Transfer of USG Cryptologic NSS Technical Security Material, Information, and Techniques to Foreign Governments
- Privacy Compliance Review of the EINSTEIN Program
- Open Access to Scientific Information
- Computer Security Incident Handling Guide
- Electronic Government Act: Agencies Have Implemented Most Provisions, but Key Areas of Attention Remain
- Cyberinfrastructure for 21st Century Science and Engineering: Advanced Computing Infrastructure Vision and Strategic Plan
- Rethinking Personal Data: Strengthening Trust
- Open Source and Open Standards
- Resolution Directing Use of Compulsory Process to Collect Information Regarding Data Brokers
- Digitizing Public Sector Services: Norwegian eGovernment Program
- National Cyber Security Framework Manual
- Mobile App Advertising Guidelines
- Health IT and Patient Safety: Building Safer Systems for Better Care
- Information Warfare Monitor
- Data Breach Notification-A Guide to Handling Personal Information Security Breaches
- Three Myths about Copyright Law and Where to Start to Fix it
- Whitaker v. HealthNet of CA
- The Big Picture: Comprehensive Online Data Collection
- Fact Sheet-Unmanned Aircraft Systems (UAS)
- Information Security: IRS Needs to Further Enhance Internal Control over Financial Reporting and Taxpayer Data
- FTC Seeks Comments on Additional Proposed Revisions to Children's Online Privacy Protection Rule
- Developing State Solutions to Business Identity Theft: Assistance, Prevention and Detection Efforts by Secretary of State Offices
- Information Technology Reform: Progress Made; More Needs to Be Done to Complete Actions and Measure Results
- Losing Humanity: The Case Against Killer Robots
- Pipeline Cybersecurity: Federal Policy
- Bilateral Discussions on Cooperation in Cybersecurity
- Towards a European Strategy for the Development of Civil Applications of Remotely Piloted Aircraft Systems (RPAS)
- Cybersecurity for State Regulators
- Technology and Innovation Futures
- FISM 12-02
- Issues and Challenges for Federal Geospatial Information
- CSC Monitoring Compliance Handbook
- U.S. Anti-Bot Code of Conduct (ABCs) for Internet Service Providers (ISPs)
- Funding Emergency Communications: Technology and Policy Considerations
- Privacy: An Overview of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
- Location-Based Services: An Overview of Opportunities and Other Considerations
- Recommended Guidelines for the Use of Unmanned Aircraft
- National Strategy for Biosurveillance
- OECD Recommendation on the Protection of Children Online
- Staff Working Paper: Online Gambling in the Internal Market
- DoD Manual 5200.01
- Supervision of Technology Service Providers and Outsourcing Technology Services
- ICC Policy Statement on the Freedom of Expression and the Free Flow of Information on the Internet
- Marketing Your Mobile App: Get it Right From the Start
- Resolution on the promotion, protection and enjoyment of human rights on the Internet
- ICD 700 - Protection of National Intelligence
- OMB Memorandum M-12-18
- Overview of the Internet of Things
|