Search results

Jump to: navigation, search
  • ...ta. But it goes further, putting in place sound information management and privacy practices that enhance the development and protection of the business’ br ...loud_Computing#Introduction Bruening] [http://cyber.law.harvard.edu/lawlab/Privacy%2C_Security_Issues_Raised_by_Cloud_Computing#Accountability_as_a_Possible_W
    118 KB (17,506 words) - 12:40, 20 May 2010
  • practices that would strengthen TCG-compliant systems, including privacy preserving Expertise Required: Defense Policy/Procurement - Low
    16 KB (2,381 words) - 15:04, 30 July 2010
  • * Issues: [[Attribution]]; [[Metrics]]; [[Privacy]]; [[Public-Private Cooperation]] [[Keyword_Index_and_Glossary_of_Core_Ideas#Privacy_Law | Privacy Law]]
    25 KB (3,492 words) - 15:09, 30 July 2010
  • keywords = {trust security privacy e-commerce}, organization = {Program on Humanitarian Policy and Conflict
    6 KB (760 words) - 15:39, 6 August 2012
  • ...tives]]; [[Information Sharing/Disclosure]]; [[Insurance]]; [[Metrics]]; [[Privacy]]; [[Risk Management and Investment]] ...eer systems, the optimal balance of effort by programmers and testers, why privacy gets eroded, and the politics of digital rights management.
    4 KB (622 words) - 15:53, 19 August 2010
  • ...s cyber infrastructure, the White House Office of Science and Technology Policy (OSTP) and the agencies of the Federal Networking and Information Technolog ...strategy that addresses privacy and civil liberties interests, leveraging privacy-enhancing technologies for the Nation.
    16 KB (2,445 words) - 10:59, 9 September 2010
  • Executive Office of the President of The U.S. ''Cyberspace Policy Review. Assuring a Trusted and Resilient Information and Communications Inf ...and free trade while also promoting safety, security, civil liberties, and privacy rights. It is the fundamental responsibility of our government to address s
    14 KB (1,996 words) - 15:40, 9 August 2010
  • [[Keyword_Index_and_Glossary_of_Core_Ideas#Privacy_Law | Privacy Law]], (2) decisions and actions must respect privacy and civil liberties,
    11 KB (1,568 words) - 16:11, 23 July 2010
  • * Issues: [[Metrics]]; [[Risk Management and Investment]]; [[Privacy]]; [[Usability/Human Factors]] [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]],
    9 KB (1,493 words) - 09:16, 8 October 2010
  • ...f this work is Internet security professionals, information technologists, policy makers, data stewards, e-commerce providers, consumer protection advocates, ...tion in a particular problem domain should be able to support the range of privacy policies relevant to that domain.<br /><br />
    20 KB (2,989 words) - 15:41, 20 August 2010
  • ...security is underpinned by the collective efforts of the military, foreign policy establishment, and intelligence community in the defense of our airspace an * Safeguard privacy and constitutional freedoms.
    9 KB (1,211 words) - 15:12, 30 July 2010
  • ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]], [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]],
    3 KB (429 words) - 17:17, 29 June 2010
  • ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]], [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]],
    7 KB (966 words) - 16:49, 19 August 2010
  • ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]], [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]],
    7 KB (1,013 words) - 16:46, 19 August 2010
  • ...ing process can be managed. This includes topics ranging from cryptography policy, through the interaction of information security with economics, to what we ...c infrastructure (cash machines and other bank systems), endanger personal privacy (medical record systems), undermine the viability of whole business sectors
    11 KB (1,594 words) - 11:03, 10 August 2010
  • Nearly fifty technology and policy experts in security, privacy and networking met November 16-19, 2003, at Airlie House in Northern Virgin ...seful, but individuals should make individual choices about their personal privacy and the technology should support those choices.
    13 KB (1,945 words) - 16:12, 23 July 2010
  • [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]], ...risks, decision-making behaviors, and metrics for evaluating business and policy options.
    20 KB (2,849 words) - 12:40, 10 August 2010
  • ...ues: [[Economics of Cybersecurity]]; [[Information Sharing/Disclosure]]; [[Privacy]]; [[Risk Management and Investment]] ...ding in vulnerability credits, the economics of disclosure and the cost of privacy.
    3 KB (350 words) - 15:48, 29 July 2010
  • ===Communications Privacy Law=== ...tates, the [http://www.usiia.org/legis/ecpa.html Electronic Communications Privacy Act (ECPA]) protects electronic communications while in transit and prohibi
    80 KB (10,917 words) - 15:43, 7 August 2012
  • ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]], Expertise Required: Technology - Low; Policy - Low
    3 KB (446 words) - 15:43, 10 August 2010
  • Administration issued its 60-day review of cybersecurity policy, declaring that U.S. information in cybersecurity policy.
    10 KB (1,356 words) - 11:09, 17 June 2010
  • ...of Cybersecurity]]; [[Incentives]]; [[Information Sharing/Disclosure]]; [[Privacy]] ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]],
    16 KB (2,399 words) - 17:04, 25 June 2010
  • ...dex_and_Glossary_of_Core_Ideas#Communications_Privacy_Law | Communications Privacy Law]], [[Keyword_Index_and_Glossary_of_Core_Ideas#Disclosure_Policy | Disclosure Policy]],
    7 KB (986 words) - 15:39, 7 August 2012

View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)