Property | Value |
rdfs:label | |
is dcterms:subject of | - Department of Homeland Security's Federal Information Sharing Environment Privacy and Civil Liberties Protection Policy
- Cloud Industry Forum
- The Freedom of Information Act (FOIA)
- The Utility Spectrum Crisis: A Critical Need to Enable Smart Grids
- Cincom Systems v. Novelis
- Cybersecurity: Continued Efforts Are Needed to Protect Information Systems From Evolving Threats
- Social Media Advertising Consortium
- National Cybersecurity Strategy: Key Improvements are Needed to Strengthen the Nation's Posture
- High-level Smart Grid Consumer-to-Utility Privacy Impact Assessment Report
- A National Plan for Migrating to IP-Enabled 9-1-1 Systems
- Smart Grid Interoperability Panel
- Blockowicz v. Williams
- Autodesk v. Dassault Systemes
- The Transmission Smart Grid Imperative
- Cyber Security and Politically, Socially and Religiously Motivated Cyber Attacks
- Seized Assets and Case Tracking System; Final Rule for Privacy Act Exemptions
- Federal Information Security Issues
- NIST Special Publication 800-41
- A Roadmap for Cybersecurity Research
- In re 1800Mattress.com
- Rescuecom v. Google
- Information Technology Incident Management Plan
- Comprehensive National Cybersecurity Initiative
- Sedersten v. Taylor
- Opinion 5/2009 on Online Social Networking
- Understanding Digital Signatures
- State v. Corwin
- In re Bilski
- Innovation and Business Strategy: Why Canada Falls Short
- HITECH Act
- Proposed Revision of the Policy on Web Tracking Technologies for Federal Web Sites
- Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities
- NSTAC: Enhancing National Security and Emergency Preparedness Through Communications
- Smart Grids Task Force
- Critical Infrastructure Protection: Current Cyber Sector-Specific Planning Approach Needs Reassessment
- National Strategy for Critical Infrastructure Protection
- Harris v. Blockbuster
- National Intelligence Strategy
- National Cybersecurity Strategy: Key Improvements are Needed to Strengthen the Nation’s Posture
- Technology for the Olympics
- Australian Government Cyber Security Strategy
- Global Inter-Cloud Technology Forum
- Too Much Media, LLC v. Hale
- Prime contract
- Van Alsytne v. Electronic Scriptorium
- Benefits of BCC
- NIST Special Publication 800-53
- A Strategy for ICT R&D and Innovation in Europe: Raising the Game
- National Broadband Network
- National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency
- Australia in the Digital Economy, Report 2: Online Participation
- Terrorists and the Internet
- Information Security: Securities and Exchange Commission Needs to Consistently Implement Effective Controls
- World Wide Web Foundation
- OMB Memorandum M-09-32
- Executive Order 13526
- CBS Interactive v. NFL
- Assessing the Impacts of Changes in the Information Technology R&D Ecosystem: Retaining Leadership in an Increasingly Global Environment
- Security Guidance for Critical Areas of Focus in Cloud Computing
- Board on Global Science and Technology
- Promotion of FDA-Regulated Medical Products Using the Internet and Social Media Tools
- U.S. Public Diplomacy: Background and Current Issues
- Cyber Security Coordination Task Group
- German Broadband Strategy
- FMI 6-02.40
- National Cyber Leap Year
- National E-Health Strategy
- Information Technology: Social Security Administration's Data Exchanges Support Current Programs, but Better Planning Is Needed to Meet Future Demands
- Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Information Sharing Initiatives
- GAO Reports - 2009
- ACPO e-crime Strategy
- National Government Information Sharing Strategy
- Cloud Computing Information Assurance Framework
- Recommendation on e-Democracy
- E-IRG Report on Data Management
- Access (organization)
- Don’t Forget The Cyber!
- Report on the APEC-OECD Joint Symposium on Initiatives among Member Economies Promoting Safer Internet Environment for Children
- Federal Regulators Issue Final Model Privacy Notice Form
- NIST Special Publication 800-122
- Legal Issues Relating to the Testing, Use, and Deployment of an Intrusion-Detection System to Protect Unclassified Computer Networks in the Executive Branch
- Cross-Border Privacy Enforcement Arrangement
- Using Instant Messaging and Chat Rooms Safely
- Presidential Policy Directive 1
- Breach Notification for Unsecured Protected Health Information Interim Final Rule
- The International Forum on the Creative Economy
- General Information Technology Access Account Records Systems
- European Interoperability Framework for European Public Services
- Understanding Cybercrime: A Guide for Developing Countries
- National Declassification Center
- Library and Information Science Research Coalition
- Via Viente Taiwan v. UPS
- Information Sharing at the National Operations Center
- Hines v. Overstock.com
- OMB Memorandum M-09-12
- Atlantic Recording Corporation v. Project Playlist
- Strategy for Securing Control Systems
- Webcaster Settlement Act of 2009
- High Value Data Sharing Protocol
- Committee on National Security Systems Instruction 1253
- Commission Staff Working Document: Report on Cross-border E-commerce in the EU
- Bitcoin
- API 1164 Pipeline SCADA Security, Version 2
- SB 17 (Padilla)
- Developments in Internet Filtering Technologies and Other Measures for Promoting Online Safety
- National Security Threats in Cyberspace
- Cyberpower and National Security
- Fiscal Year 2008 Report to Congress on Implementation of The Federal Information Security Management Act of 2002
- Body of European Regulators for Electronic Communications
- IT Dashboard
- Common Cyber Security Vulnerabilities Observed in DHS Industrial Control Systems Assessments
- Arizona Geographic Information Council
- Transparency and Open Government
- Cyber Security Strategy of the United Kingdom: Safety, security and resilience in cyber space
- Flores-Figueroa v. U.S.
- Pre-accessioning Permanent Electronic Records
- Nebula
- U.S. v. Drew
- In the Crossfire: Critical Infrastructure in the Age of Cyberwar
- The Changing Geospatial Landscape
- Bing
- DHS Privacy Office Handbook
- Applied Research and Methods: Assessing the Reliability of Computer-Processed Data
- American Recovery and Reinvestment Act of 2009
- Privacy Impact Assessments-A Guide for the Victorian Public Sector
- Zango v. Kaspersky Lab
- The Army Capstone Concept
- Piracy of Digital Content
- Cyber Security Strategy
- Broadband Canada-Connecting Rural Canadians
- Boring v. Google
- National Cybersecurity and Communications Integration Center
- Interactive Media Entertainment v. Wingate
- Cyber IN-Security: Strengthening the Federal Cybersecurity Workforce
- European Reference Network for Critical Infrastructure Protection
- Barnes v. Yahoo!
- Nation At Risk: Policy Makers Need Better Information to Protect the Country
- Smart Grid System Report
- The Development Dimension, Internet Access for Development
- MGive Foundation
- Facial Identification Scientific Working Group
- Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
- Cloud Computing: Benefits, Risks, and Recommendations for Information Security
- January 13, 2009 Advisory Opinion on the Application of EAR to Grid and Cloud Computing Services
- Information Policy and E-Governance in the Australian Government: Report
- FY2009–2034 Unmanned Systems Integrated Roadmap
- Octopus Interface Conference 2009
- Biosurveillance: Developing a Collaboration Strategy Is Essential to Fostering Interagency Data and Resource Sharing
- Establishment of a Subordinate Unified U.S. Cyber Command
- Protecting Europe From Large Scale Cyber-attacks and Cyber-disruptions: Enhancing Preparedness, Security and Resilience
- Open Government Directive
- Guidelines for Policy Makers of Child Online Protection
- Cybersecurity Collaboration Report: Strengthening Government and Private Sector Collaboration Through a Cyber Incident Detection, Prevention, Mitigation, and Response Capability
- U.S. v. Weaver
- Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation
- Australia in the Digital Economy, Report 1: Trust and Confidence
- Evidence (Australia)
- Understanding Denial-of-Service Attacks
- Federal Advisory Committees: An Overview
- Final Report of the Defense Science Board Task Force on Department of Defense Policies and Procedures for the Acquisition of Information Technology
- CyberScope
- OECD Conference on Empowering E-Consumers: Strengthening Consumer Protection in the Internet Economy
- Online Trust Alliance
- Finding Relief for Privacy Infringements in the New World
- Guide to Conducting Privacy Impact Assessments for State, Local, and Tribal Justice Entities
- Independent Newspapers v. Brodie
- Harnessing the Power of Digital Data for Science and Society
- How Will Journalism Survive the Internet Age?
- Nemet v. Consumeraffairs.com
- U.S. Cyber Command
- The National Security Strategy of the United Kingdom: Security for the Next Generation
- Sedgwick Claims Management Services v. Delsman
- National Fusion Center Association
- Hernandez v. Hillsides
- TC 2-33.4
- Protection of Digital Computer and Communication Systems and Network
- Protected Critical Infrastructure Information Program Procedures Manual
- Cloud Computing Security Risk Assessment
- Ministerial Declaration on eGovernment
- OMB Memorandum M-09-29
- Virtual Criminology Report 2009; Virtually Here: The Age of Cyber Warfare
- Cloud Computing Risk Assessment
- Advertising Industry in the Digital Age
- A Strategic Framework for the National Spatial Data Infrastructure
- CRS Reports - 2009
- Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
- Major v. McCallister
- State v. Wolfe
- Executive Order 13497
- Fiscal Year 2009 Report to Congress on Implementation of The Federal Information Security Management Act of 2002
- NSTAC Report to the President on Identity Management Strategy
- Self-Regulatory Principles for Online Behavioral Advertising
- Memorandum on Transparency and Open Government
- Virtual Worlds and Kids: Mapping the Risks
- Online Identity Theft
- Cybersecurity: Continued Federal Efforts Are Needed to Protect Critical Systems and Information
- Engage: Getting on with Government 2.0
- NSTAC Report to the President on Commercial Satellite Communications Mission Assurance
- U.S. Cybersecurity Coordinator
- Establishment of a Statewide Enterprise Architecture and the Associated Policy and Process
- Securing the Information Highway: How to Enhance the United States' Electronic Defenses
- Child exploitation (Australia)
- Legal Analysis of a Single Market for the Information Society
- Role of Digital Identity Management in the Internet Economy: A Primer for Policy Makers
- ICT Customisation and Bespoken Development Policy
- California Project Management Methodology and Other Associated Information
- Child pornography sentencing in NSW
- Intelligent Transport Systems
- Graphics, Animation and New Media Canada Network
- Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program
- Cloud Computing Program Management Office
- Net Cetera: Chatting With Kids About Being Online
- EYouGuide
- Noonan v. Staples
- Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches
- Dos and Don'ts of Data Breach and Information Security Policy
- Cybercrime: An Annotated Bibliography of Select Foreign-Language Academic Literature
- New Media and the Air Force
- Internet Governance: Creating Opportunities for All
- IT Sector Baseline Risk Assessment
- FFIEC Guidance Addressing Risk Management of Remote Deposit Capture Activities
- Technology Transfer: Use of Federally Funded Research and Development
- Critical Infrastructure Resilience: Final Report and Recommendations
- Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations
- Directive on Privacy and Electronic Communications
- Canadian Digital Media Network
- Citizen Lab
- Army Forces Cyber Command
- AIO/CIO Reporting
- Guidelines for Secure Use of Social Media by Federal Departments and Agencies
- AVnu Alliance
- Choosing and Protecting Passwords
- In the Matter of Preserving the Open Internet, Broadband Industry Practices
- Coach v. Asia Pacific Trading
|