Property | Value |
rdfs:label | |
is dcterms:subject of | - The Evolving Privacy Landscape: 30 Years after the OECD Privacy Guidelines
- Online Interest-Based Advertising Accountability Program
- Privacy Impact Assessment for the Use of Unidirectional Social Media Applications Communications and Outreach
- Information Sharing Environment: Better Road Map Needed to Guide Implementation and Investments
- Working Group 2A Cyber Security Best Practices Final Report
- Cyber Security - A new national programme
- Holiday Traveling with Personal Internet-Enabled Devices
- Regulatory Recommendations for Data Safety, Data Handling and Data Protection
- Federal Cloud Computing Strategy
- Cybersecurity Legislative Proposal (Fact Sheet)
- NIST Special Publication 800-137
- Social Media: Federal Agencies Need Policies and Procedures for Managing and Protecting Information They Access and Disseminate
- Berglund v. Industrial Technology Institute
- CRS Reports - 2011
- Cyber Security and the UK's Critical National Infrastructure
- Improving our Nation's Cybersecurity Through the Public-Private Partnership
- Executive Order 13563
- January 11, 2011 Advisory Opinion on the Issue of Cloud Computing and Deemed Exports
- Protecting Personal Information: A Guide for Business
- Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
- Examining the Cyber Threat to Critical Infrastructure and the American Economy
- Identifying Hoaxes and Urban Legends
- Digital Signage Privacy Standards
- Guide to Developing a Cyber Security and Risk Mitigation Plan
- ISO/IEC 27005:2011
- Medical Devices; Medical Device Data Systems; Final Rule
- Supplement to Authentication in an Internet Banking Environment
- Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective
- Bittersweet Cookies: Some Security and Privacy Considerations
- Cyber Warfare
- RFC 6272: Internet Protocols for the Smart Grid
- NIST Special Publication 500-292
- OMB Memorandum M-11-29
- Audit Report, Federal Energy Regulatory Commission’s Monitoring of Power Grid Cyber Security
- Spanish Security Strategy
- Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise
- Pulte Homes v. Laborers' International Union
- Cyber Infrastructure Protection
- Technology for the Olympics
- Data Center Consolidation: Agencies Need to Complete Inventories and Plans to Achieve Expected Savings
- National Strategy for Electronics Stewardship
- US-UK Cyber Communique
- Centre for Internet Law and Policy at Strathclyde
- Executive Order 13589
- High Level Meeting on the Internet Economy: Generating Innovation and Growth
- Terrorism Information Sharing and the Nationwide Suspicious Activity Report Initiative: Background and Issues for Congress
- Wireless Technology Prospects and Policy Options
- The Internet of Things-Concept and Problem Statement
- Whether Proposals by Illinois and New York to Use the Internet and Out-of-state Transaction Processors to Sell Lottery Tickets to In-state Adults Violate the Wire Act
- The UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World
- NISTIR 7751
- Recommendation of the Council on Principles for Internet Policy Making
- Quadrennial Technology Review
- Biometrics and Security
- A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future
- Department of Defense Strategy for Operating in Cyberspace
- DHS Science and Technology Directorate Strategic Plan 2011
- Metadata: A Backdoor Into Organization
- Security Guidance for Critical Areas of Focus in Cloud Computing
- Oracle America, Inc. v. Google
- Defense Biometrics: DOD Can Better Conform to Standards and Share Biometric Information with Federal Agencies
- FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management
- Executive Order 13587
- The UK Approach to Unmanned Aircraft Systems
- OMB Memorandum M-11-24
- The Protection of Children Online: Risks Faced by Children Online and Policies to Protect Them
- IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud
- Botnets: Measurement, Detection, Disinfection and Defence
- Understanding Hidden Threats: Rootkits and Botnets
- Inman v. Technicolor USA
- Open Government Partnership: National Action Plan
- OMB Memorandum M-11-27
- Action Plan for Critical Infrastructure
- U.S. National Intelligence: An Overview 2011
- M-Government: Mobile Technologies for Responsive Governments and Connected Societies
- State Internet Information Office
- Cyber Dawn: Libya
- Cyber Crime-A Growing Challenge for Governments
- Wi-Fi Positioning Systems: Beware of Unintended Consequences
- Softech Worldwide v. Internet Technology Broadcasting
- Big Data Interagency Working Group
- Righthaven v. Jama
- Green Paper: Towards an integrated European market for card, internet and mobile payments
- Federal Health Information Technology Strategic Plan 2011–2015
- Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities
- Internet Freedom Fellows
- Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems
- Cyber Security in the UK
- UK Cyber Security Strategy: Protecting and Promoting the UK in a Digital World
- Cookies: Leaving a Trail on the Web
- National Defense Authorization Act for FY 2012
- National Broadband Map
- Department's Management of Cloud Computing Services
- Senior Information Sharing and Safeguarding Steering Committee
- Cybersecurity, Innovation, and the Internet Economy
- White House Fact Sheet: Cybersecurity Legislative Proposal
- Octopus Conference 2011
- Ardis Health, LLC v. Nankivell
- Executive Order 13584
- Best Practices for Mobile Applications Developers
- Telecommunications: Enhanced Data Collection and Analysis Could Inform FCC's Efforts to Complete the Digital Transition of Low-Power Television Stations and Reallocate Spectrum
- Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace
- State v. Simmons
- Security Authorization of Information Systems in Cloud Computing Environments
- Cloud Computing Security Considerations
- Terrain intelligence
- Administration's White Paper on Intellectual Property Enforcement Legislative Recommendations
- Responding to the Greater Tohoku Disaster: The Role of the Internet and Cloud Computing in Economic Recovery and Renewal
- NICE Cybersecurity Workforce Framework
- Guide to Cloud Computing for Policy Makers
- Information Technology: DHS Needs to Improve Its Independent Acquisition Reviews
- Department of Defense Cyberspace Policy Report
- Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization
- Spectrum for the Next Generation of Wireless
- National Cyber Response Centre
- A Strategy for American Innovation: Driving Towards Sustainable Growth and Quality Jobs
- Defense Acquisition: DOD Should Clarify Requirements for Assessing and Documenting Technical-Data Needs
- Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management
- Working Towards Rules for Governing Cyber Conflict: Rendering the Geneva and Hague Conventions in Cyberspace
- European Banking Authority
- Geospatial Information and Geographic Information Systems (GIS): An Overview for Congress
- Unmanned Ground Systems Roadmap
- CSI Computer Crime and Security Survey 2010/2011
- IT Dashboard: Accuracy Has Improved, and Additional Efforts Are Under Way to Better Inform Decision Making
- Assessment of Demand Response and Advanced Metering
- Information Security: Federal Deposit Insurance Corporation Has Made Progress, but Further Actions Are Needed to Protect Financial Data
- Reducing Systemic Cybersecurity Risk
- European Union-United States Trade Principles for Information and Communication Technology Services
- Fink v. Time Warner Cable
- FBI's Ability to Address the National Security Cyber Intrusion Threat
- Recommendations of the House Republican Cybersecurity Task Force
- Landsat and the Data Continuity Mission
- OMB Memorandum M-11-11
- Space Acquisitions: DOD Delivering New Generations of Satellites, but Space System Acquisition Challenges Remain
- In the Matter of Facebook, Inc.
- Mission Critical: A Public-Private Strategy for Effective Cybersecurity
- EU Intelligence Analysis Centre
- GSA Electronic Messaging and Related Services
- Cybersecurity Coordination Group
- Achievements and Next Steps: Towards Global Cyber-Security
- CF Disclosure Guidance: Topic No. 2, on Cybersecurity
- Resilience of the Internet Interconnection Ecosystem
- OECD Council Recommendation on Principles for Internet Policy Making
- Accelerating Technology Transfer and Commercialization of Federal Research in Support of High-Growth Businesses
- Privacy Act Amendment Requests
- The Future of Computing Performance: Game Over or Next Level?
- Executive Order 13565
- China's Cyber Power and America's National Security
- Challenging Security Requirements for US Government Cloud Computing Adoption
- Understanding Mobile Apps
- Controlled Unclassified Information (CUI) Office Notice 2011-01: Initial Implementation Guidance for Executive Order 13556
- New Zealand Information Security Manual
- In the Matter of Chitika, Inc.
- Acquisition Policy for Defense Business Systems
- Johnson v. Arlotta
- Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
- OMB Memorandum M-11-15
- NIST Special Publication 500-293
- CF Disclosure Guidance: Topic No. 2
- National Cyber Security Programme
- Personal ID Verification: Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
- National Strategy for Critical Infrastructure
- Broadband Loan and Grant Programs in the USDA’s Rural Utilities Service
- Federal Engagement in Standards Activities to Address National Priorities: Background and Proposed Policy Recommendations
- The Strategic Program for Governance Technological Modernization
- Big Data: The Next Frontier for Innovation, Competition, and Productivity
- Electronic Government: Performance Measures for Projects Aimed at Promoting Innovation and Transparency Can Be Improved
- DoD Instruction 4120.24
- CF Disclosure Guidance: Topic No. 2 (Cybersecurity)
- NATO Policy on Cyber Defence
- Information Sharing: Progress Made and Challenges Remaining in Sharing Terrorism-Related Information
- E-Filing Tax Returns: Penalty Authority and Digitizing More Paper Return Data Could Increase Benefits
- Presidential Policy Directive 8
- Cyber Crime Executive Briefing
- Using Caution with USB Drives
- The Federal Bureau of Investigation and Terrorism Investigations
- Law Enforcement Use of Global Positioning (GPS) Devices to Monitor Motor Vehicles: Fourth Amendment Considerations
- Silk Road
- Deauville G8 Declaration: Renewed Commitment for Freedom and Democracy
- Connecting with Confidence, Optimising Australia's Digital Future
- Communiqué on Principles for Internet Policy-Making
- The Future of Computing: Game Over or Next Level?
- Preserving Our Digital Heritage: The National Digital Information Infrastructure and Preservation Program 2010 Report
- FISM 11-01
- TechFreedom
- Face Facts: A Forum on Facial Recognition Technology
- Agreement Between the United States of America and the European Union on the Use and Transfer of Passenger Name Records to the United States Department of Homeland Security
- Wolk v. Kodak Imaging Network
- Cyber-bullying and Online Grooming: Helping to Protect Against the Risks
- GAO Reports - 2011
- United States v. W3 Innovations
- Framework & Guidelines for Use of Social Media for Government Organisations
- Models To Advance Voluntary Corporate Notification to Consumers Regarding the Illicit Use of Computer Equipment by Botnets and Related Malware
- In the Matter of ScanScout, Inc.
- Spyware: Background and Policy Issues for Congress
- Sony PlayStation Network Compromise
- .gov reform effort
- Classification taxonomy
- Legislation Related to the Uniform Electronic Legal Material Act (UELMA)
- Cyber Security Strategy for Germany
- Legal Issues in Mass Digitization: A Preliminary Analysis and Discussion Document
- U.S. v. Nosal
- Communications Security Monitoring (AR 380-53)
- 2011 Cyber Coalition Exercise
- Civil Liberties and Privacy Guidance for Intelligence Community Professionals: Properly Obtaining and Using Publicly Available Information
- Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure
- ISO/IEC 27034-1:2011
- Task Force on Smart Disclosure: Information and Efficiency in Consumer Markets
- 2010 Data Mining Report
- Complete Cybersecurity Proposal
- OECD Guide to Measuring the Information Society 2011
- The Future of the Electric Grid
- DOD Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance Activities
- Sitton v. Print Direction
- Information Technology: OMB Needs to Improve Its Guidance on IT Investments
- Privacy Policy and Compliance
- Recording Everything: Digital Storage as an Enabler of Authoritarian Governments
- Open Data Mini Case Studies
- Data Sharing Code of Practice
- Executive Order 13571
- Villanova v. Innovative Investigations
- DHS Directive 047-01
- Cloud Computing Strategic Direction Paper
- National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy
- Information Needs of Communities
- (First) Report of the Acting General Counsel Concerning Social Media Cases
- NIST Special Publication 800-147
- Guide for Reducing Data Center Physical Infrastructure Energy Consumption in Federal Data Centers
- Worldwide Threat Assessment of the U.S. Intelligence Community
- Making it in Miniature - Nanotechnology, UK Science and its Applications
- Health.data.gov
- Practical Guide to Cloud Computing
- Declaration on Open and Transparent Government
- Cybersecurity Two Years Later
- Staying Safe on Social Network Sites
- Security of Information Technology
- 40 Years of Experience with the Fair Credit Reporting Act: An FTC Staff Report with Summary of Interpretations
- Freedom Online Coalition
- FTC v. Frostwire LLC
- Internet as a Catalyst for Change: Access, Development, Freedoms and Innovations
- Foreign Spies Stealing US Economic Secrets in Cyberspace
- The Cost of Cyber Crime
- Section 302 Report
- Terrorist Use of the Internet: Information Operations in Cyberspace
- Digital Nation: Expanding Internet Usage
- ISO/IEC 27035:2011
- Osama Bin Laden–themed Phishing Attempts
- National Science and Technology Council Committee on Technology
- Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements
- Guidance on Managing Mixed-Media Files
- Office of Privacy, Government Liaison and Disclosure
- Government ICT Strategy
- Policy Review Checklist
- DHS Sensitive Systems Policy Directive 4300A
- Performance.gov
- PhoneDog v. Kravitz
- International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
- Security of services
- NIST Special Publication 800-125
- Eysoldt v. Proscan Imaging
- Terms & Definitions of Interest for DoD Counterintelligence Professionals
- Countering the Use of the Internet for Terrorist Purposes: Legal and Technical Aspects
- Smart Grids: From Innovation to Deployment
- DHS Privacy Office 2011 Annual Report to Congress
- Social Media and Disasters: Current Uses, Future Options, and Policy Considerations
- FTC Offers Tips on Wise Use of Wi-Fi Networks
- Open Government Declaration
- CEO Coalition
- Information Technology: Critical Factors Underlying Successful Major Acquisitions
- Roles & Responsibilities for Shared IT Services
- IStrategy
- Harris v. comScore
- A Strategy for American Innovation: Securing Our Economic Growth and Prosperity
- Confidentiality of Individually-Identifiable Health Information
- The Smart Grid and Cybersecurity: Regulatory Policy and Issues
- NIST Special Publication 800-30, Rev. 1
- Information Technology: Investment Oversight and Management Have Improved but Continued Attention Is Needed
- Cloud Computing, Front and Center
- Animators at Law v. Capital Legal Solutions
- NASS Business Identity Theft Task Force
- CF Disclosure Guidance: Topic No. 2-Cybersecurity
- National Digital Economy Strategy
- Digital Opportunity: A Review of Intellectual Property and Growth
- Association for Information Media & Equipment v. Regents of the University of California
- Review of the Cybercrime Legislation Amendment Bill 2011
- America COMPETES Act of 2007
- NIST Special Publication 500-291
|