Articles and events specifically related to the year 2010.
Trending pages
All items (300)
2
A
-
A Bill of Privacy Rights for Social Network Users
-
A Digital Agenda for Europe: EC Communication
-
A Good Decade for Cybercrime
-
A Strong Britain in an Age of Uncertainty: The National Security Strategy
-
Achte/Neunte Boll Kino Beteiligungs Gmbh & Co. v. Does 1-4,577
-
Admongo
-
Advanced Extremely High Frequency satellite
-
Advertise.com v. AOL Advertising
-
Agard v. Hill
-
An Examination of Children's Privacy: New Technology and the Children's Online Privacy Protection Act
-
Audiovisual Media Services Directive
-
Australian Government's Critical Infrastructure Resilience Strategy
-
Australian Information Commissioner Act 2010
B
- Best Practices for Seizing Electronic Evidence
-
Best Practices: Elements of a Federal Privacy Program
-
Best Practices: Recommended Code of Conduct for Consumer Tracking Research
-
Biosurveillance: Efforts to Develop a National Biosurveillance Capability Need a National Strategy and a Designated Leader
-
Body of European Regulators for Electronic Communications
-
Boring v. Google
-
Bottom-Up Review
C
-
California Broadband Council
-
Canada's Cyber Security Strategy
-
Canada's Cyber Security Strategy: For a Stronger and More Prosperous Canada
-
Canada-United States Action Plan for Critical Infrastructure
-
Canada’s Cyber Security Strategy
-
Centre for Information and Innovation Law
-
Certified in Risk and Information Systems Control
-
City of Ontario v. Quon
-
Clear v. Superior Court
-
Cloud Computing: Storm Warning for Privacy?
-
Cloud First
-
Comcast v. FCC
-
Commercial Data Privacy and Innovation in the Internet Economy: A Dynamic Policy Framework
-
Communications Requirements of Smart Grid Technologies
-
Comparative Review of State IT Procurement Practices
-
Congress as a Consumer of Intelligence Information
-
Connecting America: The National Broadband Plan
-
Copier Data Security: A Guide for Businesses
-
Creating a Digital Smithsonian
-
Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures
-
Crispin v. Christian Audigier, Inc.
-
Critical Code: Software Producibility for Defense
-
CRS Reports - 2010
-
Cyber Crime Strategy
-
Cyber Europe 2010
-
Cyber Operations Virtual Environment
-
Cyber War and Competition in the China-U.S. Relationship
-
Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws
-
Cybersecurity Game-change Research & Development Recommendations
-
Cybersecurity Progress after President Obama's Address
-
Cybersecurity/Information Assurance Workforce Management, Oversight and Compliance
- Cyberspace Operations Concept Capability Plan 2016-2028
-
Cyberspace Operations: Air Force Doctrine Document 3-12
-
Cyberspace Policy: Executive Branch Is Making Progress Implementing 2009 Policy Review Recommendations, but Sustained Leadership Is Needed
-
Cyberspace: United States Faces Challenges in Addressing Global Cybersecurity and Governance
D
-
Data Access and Privacy Issues Related to Smart Grid Technologies
-
Data Center Assignments and Consolidation
-
Data Protection in the European Union: The Role of National Data Protection Authorities (Strengthening the Fundamental Rights Architecture in the EU II)
-
Declaration of Open Government
-
Defending a New Domain
-
Department of Homeland Security: Assessments of Selected Complex Acquisitions
-
Design Furnishings v. Zen Path
- Designing a Digital Future: Federally Funded Research and Development in Networking and Information Technology
-
DHS FOIA Office Procedures and Standards for Effectively Implementing Section (a)(2)(D) of the FOIA "Frequently Requested 5 Documents" Procedures
-
DHS Management Directive 102-01
- DHS Risk Lexicon
-
Digital Agenda 2015
-
Digital Agenda for Europe
-
Digital Forensics and Born-Digital Content in Cultural Heritage Collections
-
Digital Public Library of America
-
Directive on Privacy Impact Assessment
-
DoD Biometrics Task Force
-
DoD Instruction S-5240.23
-
Dodd-Frank Act
-
DOJ, Privacy Impact Assessments Official Guidance
-
Draft Topics for Consideration in a Comprehensive Study on the Impact of and Response to Cybercrime
-
DSPT International v. Nahum
E
-
Economic Cooperation Framework Agreement
-
EEI Principles for Cybersecurity and Critical Infrastructure Protection
-
Elsevier v. UnitedHealth Group
-
Enterprise Architecture Standards and Procedures
-
EU Science and Technology Funding
-
Europe 2020 Strategy
-
European Cybercrime Task Force
-
Executive Order 13539
-
Executive Order 13549
-
Executive Order 13556
-
Executive Orders: Issuance and Revocation
-
Expert Group on Security and Resilience of Communications Networks and Information Systems for Smart Grids
-
Explore the Reliability and Resiliency of Commercial Broadband Communications Networks
-
Export Controls: Agency Actions and Proposed Reform Initiatives May Address Previously Identified Weaknesses, but Challenges Remain
F
-
F.B.T. Productions v. Aftermath Records
-
Fair Use in the U.S. Economy: Economic Contribution of Industries Relying on Fair Use
- Federal Data Center Consolidation Initiative
-
Federal Enterprise Architecture Security and Privacy Profile
-
FreecycleSunnvale v. The Freecycle Network
-
Fuentes v. Mega Media Holdings
-
Fusion Center Guidelines: Law Enforcement Intelligence, Public Safety, and the Private Sector
G
-
GAO Reports - 2010
-
GAO Review of the Department of Homeland Security's Certification of the Secure Flight Program—Cost and Schedule Estimates
-
Global Governance 2025: At a Critical Juncture
-
Global Positioning System: Challenges in Sustaining and Upgrading Capabilities Persist
-
Good Practice Guidance for the Moderation of Interactive Services for Children
-
Good Practice Guidance for the Providers of Social Networking Guidance and Other User Interactive Services
-
Google Buzz
-
Google-AdMob Merger
-
Government Response to the Report of the Government 2.0 Taskforce
-
GPRA Modernization Act of 2010
-
GRS 24
-
Guidance Concerning the Use of E-mail Archiving Applications to Store E-mail
-
Guidance on Managing Records in Cloud Computing Environments
-
Guide for Applying the Risk Management Framework to Federal Information Systems
-
Guide for Assessing the Security Controls in Federal Information Systems and Organizations
H
-
Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime
-
Health Breach Notification Rule
-
Homeland Security: Better Use of Terrorist Watchlist Information and Improvements in Deployment of Passenger Checkpoint Technologies Could Further Strengthen Security
- How Will Journalism Survive the Internet Age?
I
-
I2010: A European Information Society for Growth and Employment
-
ICT Strategy of the German Federal Government: Digital Germany 2015
-
Identity-Related Crime: A Threat Assessment
-
If It's in the Cloud, Get It on Paper: Cloud Computing Contract Issues
-
If You See Something, Say Something
-
Improving State Voter Registration Databases
-
In re Anonymous Online Speakers
-
In re eBay
-
In re Facebook PPC Advertising Litigation
-
Incentives and Challenges for Cyber Security Information Sharing
-
Information Collection Under the Paperwork Reduction Act
-
Information Management: Challenges in Federal Agencies' Use of Web 2.0 Technologies
- Information Quality Program Guide
- Information Quality Self-Assessment Tool
-
Information Security Council of India
-
Information Security: Continued Attention Is Needed to Protect Federal Information Systems from Evolving Threats
-
Information Security: Federal Agencies Have Taken Steps to Secure Wireless Networks, but Further Actions Can Mitigate Risk
-
Information Security: Federal Guidance Needed to Address Control Issues with Implementing Cloud Computing
-
Information Security: Federal Guidance Needed to Address Control Issues With Implementing Cloud Computing
-
Information Security: National Archives and Records Administration Needs to Implement Key Program Elements and Controls
-
Information Sharing: DHS Could Better Define How It Plans to Meet Its State and Local Mission and Improve Performance Accountability
-
Information Sharing: Federal Agencies Are Helping Fusion Centers Build and Sustain Capabilities and Protect Privacy, but Could Better Measure Results
- Information Technology Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan
-
Informing Federal Smart Grid Policy: The Communications Requirements of Electric Utilities
-
Intellectual Property: Observations on Efforts to Quantify the Economic Effects of Counterfeit and Pirated Goods
-
Interagency Task Force on Electronic Stewardship
-
Intermediary Liability: Protecting Internet Platforms for Expression and Innovation
-
International Cyber Incidents: Legal Considerations
-
Internet Community & Entertainment Corp. v. Washington State Gambling Comm'n
-
Internet Governance in an Age of Cyber Insecurity
-
Internet of Things-Architecture
L
M
-
MacNeil v. Trambert
-
Maxon v. Ottawa Publishing
-
MDY Industries v. Blizzard Entertainment
-
Melton v. Boustred
-
Memorandum for Chief Acquisition Officers and Chief Information Officers: Improving the Accessibility of Government Information
-
Memorandum of Agreement Between the Department of Homeland Security and the Department of Defense Regarding Cybersecurity
-
Memorandum of Agreement to Enhance Coordination to Secure America's Cyber Networks
-
Memorandum on Disclosure and Simplification as Regulatory Tools
-
Miller v. Mitchell
-
Milo v. Martin
-
Mobile Anesthesiologists Chicago v. Anesthesia Associates of Houston
-
Mobile Internet Content Coalition
-
Multi-State Information Sharing and Analysis Center
N
-
National Biosurveillance Strategy for Human Health
-
National Broadband Strategy for 2010
-
National Digital Stewardship Alliance
-
National Framework for Strategic Communication
-
National Strategy for Child Exploitation Prevention and Interdiction
-
Next Generation Electronic Commerce Promotion Council of Japan
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0
-
NIST Special Publication 800-130
-
NIST Special Publication 800-34
-
NISTIR 7653
-
Nondiscrimination on the Basis of Disability; Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations
-
NSTB Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses
O
-
Octopus Interface Conference 2010
-
OECD Privacy Guidelines: Thirty Years in the Public Sector
-
Office Depot v. Zuccarini
-
OMB Memorandum M-10-15
-
OMB Memorandum M-10-25
-
OMB Memorandum M-10-28
-
OMB Memorandum M-11-02
-
OMB Memorandum M-11-06
-
On Cyber Warfare
-
Online As Soon As It Happens
-
Online Risk and Safety in the Digital Economy
-
Open Government Plan
-
Open Source Software Policy
-
OpenStack
-
Opinion 2/2010 on Online Behavioural Advertising