Articles and events specifically related to the year 2007.
All items (210)
2
A
-
A Pan-Canadian Strategy for Identity Management and Authentication
-
AALL, National Security Letters
-
Acceptable Identification of Goods and Services Manual
-
Air Force Intelligence, Surveillance and Reconnaissance Agency
-
America COMPETES Act of 2007
-
Antitrust Enforcement and Intellectual Property Rights: Promoting Innovation and Competition
-
AR 25-2
-
AR 25-400-2
-
AR 381-10
-
Australia's National Broadband Strategy
-
Availability and Robustness of Electronic Communications Infrastructures
B
C
-
California Privacy and Security Advisory Board
-
CCTV: Developing Privacy Best Practices
-
Chronopolis
-
Civilian Board of Contact Appeals
-
Coalition Against Domain Name Abuse
-
Commissioner for Information Technology
-
Common Look and Feel for the Internet
-
Commonwealth Scientific and Industrial Research Organisation v. Buffalo Technology
-
Congress and the Internet: Highlights
-
Convention on the Protection of Children against Sexual Exploitation and Sexual Abuse
-
Critical Infrastructure Protection: Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain
-
CRS Reports - 2007
-
Cyber Security Combined Glossary Project
-
Cybercrime: Public and Private Entities Face Challenges in Addressing Cyber Threats
- Cyberinfrastructure Vision for the 21st Century Discovery
-
Cybersecurity Guide for Developing Countries
D
-
DA Memo 25-51
-
Data Mining: Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks
-
Data Privacy Pathfinder initiative
-
Data Protection Act 2003
-
Data Security Breaches: Context and Incident Summaries
-
Department for Innovation, Universities and Skills
-
Department of Defense’s Defense Industrial Base Cyber Security/Information Assurance Program
-
DHS Privacy Office: Progress Made but Challenges Remain in Notifying and Reporting to the Public
-
DHS Privacy Policy Regarding Collection, Use, Retention, and Dissemination of Information on Non-U.S. Persons
-
DHS Privacy Technology Implementation Guide
-
DHS Science and Technology Strategic Plan
-
DHS, Privacy Impact Assessments Official Guidance
-
Digital Media Law Project
-
DoD CIO Net Centric Data Strategy
-
Doe v. MySpace
-
Doe v. SexSearch.com
-
DON Open Source Software Guidance
-
Douglas v. U.S. Dist. Court
E
-
E-Content initiative
-
E-Government Interoperability: Guide
-
E-Government Interoperability: Overview
-
Electronic Business and Emerging Issues
-
Electronic Waste
-
Energy Independence and Security Act of 2007
-
Engaging Privacy and Information Technology in a Digital Age
-
Enhanced Protections for Uses of Health Data: A Stewardship Framework for ‘Secondary Uses’ of Electronically Collected and Transmitted Health Data
-
Estonia cyberattack
-
European Framework for Safer Mobile Use by Younger Teenagers and Children
-
European Interoperability Framework
-
European Research Cluster on the Internet of Things
F
-
Family Online Safety Institute
-
FDIC’s Supervisory Policy on Identity Theft
-
Federal Agencies Digitization Guidelines Initiative
-
Federal Agency Data Mining Reporting Act of 2007
-
Federal Desktop Core Configuration
-
Federal Smart Grid Task Force
-
Final Report and Recommendations by the Council
-
Final Report: Task Force to Study Electronic Health Records
-
FM 2-91.6
-
Fraud Act 2006
-
Freecycle Network v. Oey
-
FTC v. AdultFriendFinder
-
Future directions in technology-enabled crime: 2007-09
G
-
GAO Reports - 2007
-
Geospatial Intelligence Support to Joint Operations
-
Geospatial Multistate Archive and Preservation Partnership
-
Global Intellectual Property Center
-
Glut: Mastering Information Through The Ages
-
Greenberg v. National Geographic Society
-
Greer v. 1-800-Flowers.com
-
Guichard v. Universal City Studios
H
I
-
ICD 701 - Security Policy Directive for Unauthorized Disclosures of Classified Information
-
Identity Theft: Innovative Solutions for an Evolving Problem
-
Implementing Recommendations of the 9/11 Commission Act of 2007
-
Implementing the Children's Online Privacy Protection Act
- Improving Consumer Mortgage Disclosures: An Empirical Assessment of Current and Prototype Disclosure Forms
-
In re Reed Elsevier Properties
-
In re Zango
-
Information Operations, Electronic Warfare, and Cyberwar: Capabilities and Related Policy Issues
-
Innovate UK
-
Intelligence Community Policy Memorandum 2007-200-2
-
International Actions against Cybercrime: Networking Legal Systems in the Networked Crime Scene
-
Internet Archive v. Shell
-
Internet Governance Forum (IGF): The First Two Years
-
Internet Security Glossary
-
Internet: An Overview of Key Technology Policy Issues Affecting Its Use and Growth
-
Interpretative Guidelines on Electronic Commerce and Information Property Trading
-
Investigations Involving the Internet and Computer Networks
-
IPhone
L
M
N
-
NASA Privacy Procedural Requirements
- National Computer Forensics Institute
- National Continuity Policy Implementation Plan
-
National Identity Security Strategy
-
National Intelligence Coordination Center
-
National Land Parcel Data: A Vision for the Future
-
National Military Strategy for Cyberspace Operations Implementation Plan
-
National Policy for Granting Access to U.S. Classified Cryptographic Information
-
National Preparedness Guidelines
- National Strategy for Homeland Security
- National Strategy for Information Sharing: Successes and Challenges in Improving Terrorism-Related Information Sharing
-
Netalert
-
Next Generation Telecoms Networks
-
NIAC Convergence of Physical and Cyber Technologies and Related Security Management Challenges Working Group, Final Report and Recommendations by the Council
-
Nike v. Nikepal
-
NIST Special Publication 500-271
-
NIST Special Publication 800-44
-
NIST Special Publication 800-95
-
NIST Special Publication 800-97
-
NIST Special Publication 800-98
-
Noonan v. Staples
- NSTAC Report to the President on International Communications
O
-
OECD-Canada Forum on the Participative Web: Strategies and Policies for the Future
-
Office of Management and Budget "Breach Notification Policy"
-
OMB Memorandum M-07-06
-
OMB Memorandum M-07-11
-
OMB Memorandum M-07-19
-
OMB Memorandum M-07-23
-
OMB Memorandum M-07-24
-
OMB Memorandum M-08-05
-
Online Behavioral Advertising: Moving the Discussion Forward to Possible Self-Regulatory Principles
-
OPEN Government Act of 2007
-
Opinion 4/2007 on the Concept of Personal Data
-
Optimum Technologies v. Henkel Consumer Adhesives
P
-
Participative Web and User-Created Content: Web 2.0, Wikis and Social Networking
-
Perfect 10 v. Amazon
-
Perfect 10 v. CCBill
-
Personal Information: Data Breaches Are Frequent, But Evidence of Resulting Identity Theft is Limited; However, the Full Extent is Unknown
-
Personal Internet Security
-
POST Internet Governance
-
Privacy Incident Handling Guidance
-
Privacy Policy Guidance Memorandum No. 2007-02: Use of Social Security Numbers at the Department of Homeland Security
-
Privacy Policy Regarding Collection, Use, Retention and Dissemination of Information on Non-U.S. Persons
-
Privacy Technology Implementation Guide
-
Privacy: Lessons Learned about Data Breach Notification
-
Protect America Act of 2007
-
Protecting Australian Families Online Direction No. 2 of 2007
R
-
Radio Spectrum Management
-
Recommendation for Key Management
-
Recommendation on Consumer Dispute Resolution and Redress
-
Recommendation on Cross-border Co-operation in the Enforcement of Laws Protecting Privacy
-
Red Flags Rule
-
Remedies Available to Victims of Identity Theft
-
Reminder - Ensuring Competition When Acquiring Information Technology and Using Common Security Configurations
-
Report of the Defense Science Board Task Force on Mission Impact of Foreign Influence on DOD Software
-
Reputation-based Systems: A Security Analysis
-
Review of Safeguarding Policies and Procedures for Personnel-Related Data
S
-
S&L Vitamins v. Australian Gold
-
Science, Technology and Innovation Council
-
SEC, Privacy Impact Assessment Guide
-
Security Issues and Recommendations for Online Social Networks
-
Security Technologies for Industrial Automation and Control Systems
-
Server test
-
Slip Showing? Federal Law Requires All Businesses to Truncate Credit Card Information on Receipts
-
Spam Summit: The Next Generation of Threats and Solutions
-
Spam Summit: The Next Generation of Threats and Solutions: A Staff Report by the Federal Trade Commission's Division of Marketing Practices
-
State v. Consumer Digital Services
-
State, Local, Tribal, and Territorial Government Coordinating Council
-
Study on the Economic Impact of the Electronic Commerce Directive, Final Report
-
Switzerland's e-Government Strategy
T
-
Tavory v. NTP
-
The Digital Dilemma: Strategic Issues in Archiving and Accessing Digital Motion Picture Materials
-
The Internal Revenue Service Is Not Adequately Protecting Taxpayer Data on Laptop Computers and Other Portable Electronic Media Devices
-
The Phishing Guide: Understanding & Preventing Phishing Attacks
-
The Rise of Collective Intelligence: Decentralized Co-Creation of Value as a New Paradigm of Commerce and Culture
-
The Transformation of Value Chains in the Canadian Arts and Cultural Industries
-
The U.S. Army Concept Capability Plan for Electromagnetic Spectrum Operations for the Future Modular Force 2015-2024
-
To Support the Information Commons: Principles for an Effective Information Commons
-
Toward a Safer and More Secure Cyberspace
-
Towards a general policy on the fight against cyber crime
-
Transformation and System Consolidation