Property | Value |
rdfs:label | |
is dcterms:subject of | - Tech City UK
- Informing Federal Smart Grid Policy: The Communications Requirements of Electric Utilities
- National Strategy for Child Exploitation Prevention and Interdiction
- Trademark Technical and Conforming Amendment Act of 2010
- On Cyber Warfare
- Advertise.com v. AOL Advertising
- Cyber War and Competition in the China-U.S. Relationship
- Information Security: National Archives and Records Administration Needs to Implement Key Program Elements and Controls
- U.S. v. American Society of Composers, Authors & Publishers
- Mobile Internet Content Coalition
- GRS 24
- The National Security Strategy: A Strong Britain in an Age of Uncertainty
- Improving State Voter Registration Databases
- U.S. v. Ahrndt
- Critical Code: Software Producibility for Defense
- Information Security: Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing
- Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
- F.B.T. Productions v. Aftermath Records
- Roger Cleveland Golf v. Prince
- Privacy Impact Assessment Guide
- Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance
- Potential Impacts on Communications from IPv4 Exhaustion & IPv6 Transition
- Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
- NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0
- Europe 2020 Strategy
- Communications Requirements of Smart Grid Technologies
- Cyberspace Operations Concept Capability Plan 2016-2028
- Social Media, Web-Based Interactive Technologies, and the Paperwork Reduction Act
- Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
- Web Accessibility National Transition Strategy
- Prosecuting Computer Crimes
- Quadrennial Homeland Security Review Report: A Strategic Framework for a Secure Homeland
- I2010: A European Information Society for Growth and Employment
- Bottom-Up Review
- U.S. Cyber Command Concept of Operations
- Satellite Television Extension and Localism Act of 2010
- Federal Enterprise Architecture Security and Privacy Profile
- Australian Government's Critical Infrastructure Resilience Strategy
- The Evolution of News and the Internet
- The Americans with Disabilities Act: Application to the Internet
- Cyber Europe 2010
- Fair Use in the U.S. Economy: Economic Contribution of Industries Relying on Fair Use
- OMB Memorandum M-11-06
- Design Furnishings v. Zen Path
- Virtual Social Media Working Group
- Project Status Reporting and Enterprise Architecture Reporting
- Centre for Information and Innovation Law
- 2009 Data Mining Report
- Order Instituting Rulemaking on the Commission's Own Motion to Establish Consumer Rights and Consumer Protection Rules Applicable to All Telecommunications Utilities
- OECD Privacy Guidelines: Thirty Years in the Public Sector
- Best Practices for Seizing Electronic Evidence
- The CIS Security Metrics
- Guide for Applying the Risk Management Framework to Federal Information Systems
- Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk
- Online Risk and Safety in the Digital Economy
- Data Access and Privacy Issues Related to Smart Grid Technologies
- European Cybercrime Task Force
- Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
- Explore the Reliability and Resiliency of Commercial Broadband Communications Networks
- Canada's Cyber Security Strategy
- Information Quality Program Guide
- Draft Topics for Consideration in a Comprehensive Study on the Impact of and Response to Cybercrime
- Department of Homeland Security: Assessments of Selected Complex Acquisitions
- Identity-Related Crime: A Threat Assessment
- Elsevier v. UnitedHealth Group
- Visa Int'l v. JSL
- The Smart Grid Collaborative Report to the Michigan Public Service Commission
- Executive Order 13549
- International Cyber Incidents: Legal Considerations
- Cybersecurity Progress after President Obama's Address
- Homeland Security: Better Use of Terrorist Watchlist Information and Improvements in Deployment of Passenger Checkpoint Technologies Could Further Strengthen Security
- Congress as a Consumer of Intelligence Information
- Intermediary Liability: Protecting Internet Platforms for Expression and Innovation
- Cloud Computing: Storm Warning for Privacy?
- Best Practices: Recommended Code of Conduct for Consumer Tracking Research
- Power Management and Shutdown
- Securing the Protection of our Enduring and Established Constitutional Heritage Act
- MacNeil v. Trambert
- Biosurveillance: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader
- Dodd-Frank Act
- National Broadband Strategy for 2010
- In re Anonymous Online Speakers
- US Department of Commerce and International Privacy Activities: Indifference and Neglect
- Sustainable Economics for a Digital Planet: Ensuring Long-Term Access to Digital Information
- The Economic and Social Role of Internet Intermediaries
- DoD Biometrics Task Force
- Information Technology Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan
- A Bill of Privacy Rights for Social Network Users
- Cyber Operations Virtual Environment
- Top Threats to Cloud Computing
- The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability
- Good Practice Guidance for the Moderation of Interactive Services for Children
- Next Generation Electronic Commerce Promotion Council of Japan
- The Financial Management of Cyber Risk: An Implementation Framework for CFOs
- Report of Study Group on Revitalization Policies of Data Centers in the Cloud Computing Age
- EU Science and Technology Funding
- GAO Reports - 2010
- Patient Protection and Affordable Care Act of 2010
- Canada-United States Action Plan for Critical Infrastructure
- Joint Terminology for Cyberspace Operations
- Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing
- Milo v. Martin
- Internet Community & Entertainment Corp. v. Washington State Gambling Comm'n
- Sandals Resorts v. Google
- Smart Grid Data: Must There Be Conflict Between Energy Management and Consumer Privacy?
- Information Collection Under the Paperwork Reduction Act
- National Digital Stewardship Alliance
- Security Reporting Scorecards
- OMB Memorandum M-10-25
- Privacy, Civil Rights, and Civil Liberties Compliance Verification for the Intelligence Enterprise
- 25 Point Implementation Plan to Reform Federal Information Technology Management
- Body of European Regulators for Electronic Communications
- Executive Order 13556
- Global Governance 2025: At a Critical Juncture
- Toyota Motor Sales, U.S.A. v. Tabari
- Information Security: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats
- Opinion 2/2010 on Online Behavioural Advertising
- Fuentes v. Mega Media Holdings
- Government Response to the Report of the Government 2.0 Taskforce
- Executive Order 13539
- Productivity and Innovation Credit (PIC) Scheme (2010)
- Protecting Europe Against Large-scale Cyber-attacks
- Crispin v. Christian Audigier, Inc.
- Advanced Extremely High Frequency satellite
- TechStat session
- Guidance on Managing Records in Cloud Computing Environments
- Connecting America: The National Broadband Plan
- Location-Based Services: Time for a Privacy Check-In
- Information Quality Self-Assessment Tool
- DHS FOIA Office Procedures and Standards for Effectively Implementing Section (a)(2)(D) of the FOIA "Frequently Requested 5 Documents" Procedures
- Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers
- Telecommunications Legislation Amendment (Competition and Consumer Safeguards) Act 2010
- EEI Principles for Cybersecurity and Critical Infrastructure Protection
- Peer-to-Peer File Sharing: A Guide for Business
- Incentives and Challenges for Cyber Security Information Sharing
- Kentucky v. Interactive Media Entertainment
- Memorandum on Disclosure and Simplification as Regulatory Tools
- The Reliability of Global Undersea Communications Cable Infrastructure
- Creating a Digital Smithsonian
- Declaration of Open Government
- 9 Elements of an Information Quality Program
- Audiovisual Media Services Directive
- A Strong Britain in an Age of Uncertainty: The National Security Strategy
- OMB Memorandum M-10-15
- Security Guideline for the Electricity Sector: Identifying Critical Cyber Assets
- The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Bases on Spam Data
- NIST Special Publication 800-130
- Cybersecurity Game-change Research & Development Recommendations
- Supplemental Report on Aggressive Sales Tactics on the Internet
- Information Management: Challenges in Federal Agencies' Use of Web 2.0 Technologies
- CRS Reports - 2010
- Penguin Group v. American Buddha
- In re eBay
- The Future of Cloud Computing: Opportunities for European Cloud Computing Beyond 2010
- Protecting Portable Devices: Data Security
- Boring v. Google
- In re Facebook PPC Advertising Litigation
- Australian Information Commissioner Act 2010
- FreecycleSunnvale v. The Freecycle Network
- Louis Vuitton Matellier v. Akanoc Solutions Inc.
- DoD Instruction S-5240.23
- Cyberspace: United States Faces Challenges in Addressing Global Cybersecurity and Governance
- Recommendation on Regulated Access to Next Generation Access Networks (NGA)
- Enterprise Architecture Standards and Procedures
- Workman Securities v. Phillip Roy Financial Services
- Octopus Interface Conference 2010
- Youth Safety on a Living Internet: Report of the Online Safety and Technology Working Group
- Resolution Regarding Cybersecurity
- Scenarios for a National Broadband Policy
- Toward Better Usability, Security, and Privacy of Information Technology: Report of a Workshop
- Smart Cloud Study Group Final Report — Smart Cloud Strategy
- Privacy Impact Assessment for the Malware Lab Network
- Telework Enhancement Act of 2010
- DHS Risk Lexicon
- Defending a New Domain
- Guide for Assessing the Security Controls in Federal Information Systems and Organizations
- Open Government Plan
- OpenStack
- Cyber Crime Strategy
- Information Sharing: DHS Could Better Define How It Plans to Meet Its State and Local Mission and Improve Performance Accountability
- Maxon v. Ottawa Publishing
- Expert Group on Security and Resilience of Communications Networks and Information Systems for Smart Grids
- Reed Elsevier v. Muchnick
- Spectrum Management for Science in the 21st Century
- U.S. v. Bynum
- Guidance Concerning the Use of E-mail Archiving Applications to Store E-mail
- GPRA Modernization Act of 2010
- Social media
- The European eGovernment Action Plan 2011-2015
- LightSquared
- White Paper on Computer Network Security & Privacy Protection
- Joint Publication 6-0
- DOJ, Privacy Impact Assessments Official Guidance
- Realizing the Full Potential of Health Information Technology to Improve Healthcare for Americans: The Path Forward
- Canada's Cyber Security Strategy: For a Stronger and More Prosperous Canada
- Overview of the Privacy Act of 1974
- Digital Forensics and Born-Digital Content in Cultural Heritage Collections
- Principles for Cyber Security and Critical Infrastructure Protection
- Policy on Wireless Communications: Protecting National Security Information
- Twenty-First Century Communications and Video Accessibility Act of 2010
- The State of Recorded Sound Preservation in the United States: A National Legacy at Risk in the Digital Age
- Information Security Council of India
- Health Breach Notification Rule
- An Examination of Children's Privacy: New Technology and the Children's Online Privacy Protection Act
- Young v. Facebook
- How Will Journalism Survive the Internet Age?
- State of Public Sector Cloud Computing
- Shadows in the Cloud: Investigating Cyber Espionage 2.0
- Economic Cooperation Framework Agreement
- Digital Agenda 2015
- Youth Safety on a Living Internet
- GAO Review of the Department of Homeland Security's Certification of the Secure Flight Program—Cost and Schedule Estimates
- MDY Industries v. Blizzard Entertainment
- Interagency Task Force on Electronic Stewardship
- DSPT International v. Nahum
- Potential Policy Recommendations to Support the Reinvention of Journalism
- Clear v. Superior Court
- Agard v. Hill
- A Digital Agenda for Europe: EC Communication
- OMB Memorandum M-11-02
- Executive Orders: Issuance and Revocation
- U.S. v. Warshak
- NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses
- Oversight for Cybersecurity Activities
- OMB Memorandum M-10-28
- National Cyber Incident Response Plan
- Internet Governance in an Age of Cyber Insecurity
- 2010 Joint Strategic Plan on Intellectual Property Enforcement
- Unleashing the Wireless Broadband Revolution
- Miller v. Mitchell
- Google Buzz
- Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework
- Righthaven v. Realty One Group
- 2010 National Security Strategy
- Global Positioning System: Challenges in Sustaining and Upgrading Capabilities Persist
- Satellite Television Extension Act of 2010
- National Framework for Strategic Communication
- Export Controls: Agency Actions and Proposed Reform Initiatives May Address Previously Identified Weaknesses, but Challenges Remain
- Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity
- Melton v. Boustred
- NIST Special Publication 800-34
- Online As Soon As It Happens
- Subcommittee on Smart Grid
- Mobile Anesthesiologists Chicago v. Anesthesia Associates of Houston
- U.S. v. Little
- Technology and Innovation Futures
- Certified in Risk and Information Systems Control
- Reducing Over-Classification Act
- Office Depot v. Zuccarini
- Intellectual Property: Observations on Efforts to Quantify the Economic Effects of Counterfeit and Pirated Goods
- Admongo
- A Good Decade for Cybercrime
- Letter Report for the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
- Copier Data Security: A Guide for Businesses
- Memorandum of Agreement to Enhance Coordination to Secure America's Cyber Networks
- Recognizing Fake Antiviruses
- Google-AdMob Merger
- Cyberspace Operations: Air Force Doctrine Document 3-12
- Digital Agenda for Europe
- Information Sharing: Federal Agencies Are Helping Fusion Centers Build and Sustain Capabilities and Protect Privacy, but Could Better Measure Results
- The European e-Government Action Plan 2011-2015
- Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
- Digital Public Library of America
|