Articles and events specifically related to the year 2011.
Trending pages
-
National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy -
Protecting Personal Information: A Guide for Business -
Face Facts: A Forum on Facial Recognition Technology -
Federal Cloud Computing Strategy
All items (344)
2
A
- A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future
-
A Strategy for American Innovation: Driving Towards Sustainable Growth and Quality Jobs
-
A Strategy for American Innovation: Securing Our Economic Growth and Prosperity
-
Accelerating Technology Transfer and Commercialization of Federal Research in Support of High-Growth Businesses
-
Achievements and Next Steps: Towards Global Cyber-Security
-
Acquiring and Enforcing the Government's Rights in Technical Data and Computer Software Under Department of Defense Contracts
-
Acquisition Policy for Defense Business Systems
-
Action Plan for Critical Infrastructure
-
Administration's White Paper on Intellectual Property Enforcement Legislative Recommendations
-
Agencies Need Coordinated Guidance on Incorporating Telework into Emergency and Continuity Planning
-
Agreement Between the United States of America and the European Union on the Use and Transfer of Passenger Name Records to the United States Department of Homeland Security
-
America COMPETES Act of 2007
-
America's Cyber Future: Security and Prosperity in the Information Age
-
Analysis of Cyber Security Aspects in the Maritime Sector
-
Animators at Law v. Capital Legal Solutions
-
Ardis Health, LLC v. Nankivell
-
Assessment of Demand Response and Advanced Metering
-
Association for Information Media & Equipment v. Regents of the University of California
-
Audit Report, Federal Energy Regulatory Commission’s Monitoring of Power Grid Cyber Security
-
Avoiding the Pitfalls of Online Trading
B
-
Berglund v. Industrial Technology Institute
-
Best Practices for Mobile Applications Developers
-
Big Data Interagency Working Group
-
Big Data: The Next Frontier for Innovation, Competition, and Productivity
-
Biometrics and Security
-
Bittersweet Cookies: Some Security and Privacy Considerations
- Blueprint for a Secure Cyber Future: The Cybersecurity Strategy for the Homeland Security Enterprise
-
Botnets: Measurement, Detection, Disinfection and Defence
C
-
Capitals in the Clouds - The Case for Cloud Computing in State Government Part I: Definitions and Principles
-
Capitals in the Clouds - The Case for Cloud Computing in State Government Part II: Challenges and Opportunities to Get Your Data Right
-
Centre for Internet Law and Policy at Strathclyde
-
CEO Coalition
-
CF Disclosure Guidance: Topic No. 2
-
CF Disclosure Guidance: Topic No. 2 (Cybersecurity)
-
CF Disclosure Guidance: Topic No. 2 - Cybersecurity
-
CF Disclosure Guidance: Topic No. 2, on Cybersecurity
-
CF Disclosure Guidance: Topic No. 2-Cybersecurity
-
Challenging Security Requirements for US Government Cloud Computing Adoption
-
China's Cyber Power and America's National Security
-
Civil Liberties and Privacy Guidance for Intelligence Community Professionals: Properly Obtaining and Using Publicly Available Information
-
Classification taxonomy
-
Cloud Computing Scoping Subcommittee
-
Cloud Computing Security Considerations
-
Cloud Computing Strategic Direction Paper
-
Cloud Computing, Front and Center
-
Combating Child Pornography: Steps Are Needed to Ensure That Tips to Law Enforcement Are Useful and Forensic Examinations Are Cost Effective
-
Communications Security Monitoring (AR 380-53)
-
Communiqué on Principles for Internet Policy-Making
-
Complete Cybersecurity Proposal
-
Confidentiality of Individually-Identifiable Health Information
-
Connecting with Confidence, Optimising Australia's Digital Future
-
Controlled Unclassified Information (CUI) Office Notice 2011-01: Initial Implementation Guidance for Executive Order 13556
-
Cookies: Leaving a Trail on the Web
-
Countering the Use of the Internet for Terrorist Purposes: Legal and Technical Aspects
-
Critical Infrastructure Protection: Cybersecurity Guidance Is Available, but More Can Be Done to Promote Its Use
-
CRS Reports - 2011
-
CSI Computer Crime and Security Survey 2010/2011
-
Cyber Atlantic 2011
-
Cyber Crime Executive Briefing
-
Cyber Crime-A Growing Challenge for Governments
-
Cyber Dawn: Libya
- Cyber Infrastructure Protection
-
Cyber Security - A new national programme
-
Cyber Security and the UK's Critical National Infrastructure
-
Cyber Security in the UK
-
Cyber Security Strategy for Germany
-
Cyber Warfare
-
Cyber-bullying and Online Grooming: Helping to Protect Against the Risks
-
Cybersecurity and Cyberwarfare. Preliminary Assessment of National Doctrine and Organization
-
Cybersecurity Coordination Group
-
Cybersecurity Legislative Proposal (Fact Sheet)
- Cybersecurity Two Years Later
-
Cybersecurity, Innovation, and the Internet Economy
-
Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure
-
Cybersecurity: Continued Attention Needed to Protect Our Nation's Critical Infrastructure and Federal Information Systems
D
-
Data Center Consolidation: Agencies Need to Complete Inventories and Plans to Achieve Expected Savings
-
Data Security: Top Threats to Data Protection
-
Data Sharing Code of Practice
-
Deauville G8 Declaration: Renewed Commitment for Freedom and Democracy
-
Declaration on Open and Transparent Government
-
Defense Acquisition: DOD Should Clarify Requirements for Assessing and Documenting Technical-Data Needs
-
Defense Biometrics: DOD Can Better Conform to Standards and Share Biometric Information with Federal Agencies
-
Defense Department Cyber Efforts: DOD Faces Challenges In Its Cyber Activities
-
Defense Department Cyber Efforts: More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities
-
Department of Defense Cyberspace Policy Report
- Department of Defense Strategy for Operating in Cyberspace
-
Department's Management of Cloud Computing Services
-
DHS Directive 047-01
-
DHS Privacy Office 2011 Annual Report to Congress
- DHS Science and Technology Directorate Strategic Plan 2011
-
DHS Sensitive Systems Policy Directive 4300A
-
Digital Nation: Expanding Internet Usage
-
Digital Opportunity: A Review of Intellectual Property and Growth
-
Digital Signage Privacy Standards
-
Direct Marketing Association v. Huber
-
DOD Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance Activities
- DoD Information Enterprise Strategic Plan 2010-2012
-
DoD Instruction 4120.24
E
-
E-Filing Tax Returns: Penalty Authority and Digitizing More Paper Return Data Could Increase Benefits
-
Electronic Government: Performance Measures for Projects Aimed at Promoting Innovation and Transparency Can Be Improved
-
Electronic Prescribing: CMS Should Address Inconsistencies in Its Two Incentive Programs That Encourage the Use of Health Information Technology
-
Electronic Records Archive: National Archives Needs to Strengthen Its Capacity to Use Earned Value Techniques to Manage and Oversee Development
-
Elsevier v. Chitika
-
Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action
-
EU Intelligence Analysis Centre
-
European Banking Authority
-
European Union-United States Trade Principles for Information and Communication Technology Services
-
Examining the Cyber Threat to Critical Infrastructure and the American Economy
-
Executive Order 13563
-
Executive Order 13565
-
Executive Order 13571
-
Executive Order 13576
-
Executive Order 13584
-
Executive Order 13587
-
Executive Order 13589
-
Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
-
Eysoldt v. Proscan Imaging
F
- Face Facts: A Forum on Facial Recognition Technology
-
FBI's Ability to Address the National Security Cyber Intrusion Threat
-
Federal Chief Information Officers: Opportunities Exist to Improve Role in Information Technology Management
- Federal Cloud Computing Strategy
-
Federal Engagement in Standards Activities to Address National Priorities: Background and Proposed Policy Recommendations
- Federal Health Information Technology Strategic Plan 2011–2015
-
Fink v. Time Warner Cable
-
First Joint Russian-U.S. Report on Cyber Conflict
-
FISM 11-01
- Foreign Spies Stealing US Economic Secrets in Cyberspace
-
Framework & Guidelines for Use of Social Media for Government Organisations
-
Freedom of Connection, Freedom of Expression: The Changing Legal and Regulatory Ecology Shaping the Internet
-
Freedom Online Coalition
-
FTC Offers Tips on Wise Use of Wi-Fi Networks
-
FTC v. Cantkier
-
FTC v. Frostwire LLC
-
FY 2012 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management
G
-
GAO Reports - 2011
-
Geospatial Information and Geographic Information Systems (GIS): An Overview for Congress
-
Government ICT Strategy
-
Green Paper: Towards an integrated European market for card, internet and mobile payments
-
GSA Electronic Messaging and Related Services
-
Guidance on Managing Mixed-Media Files
-
Guide for Reducing Data Center Physical Infrastructure Energy Consumption in Federal Data Centers
-
Guide to Cloud Computing for Policy Makers
-
Guide to Developing a Cyber Security and Risk Mitigation Plan
H
I
-
Identifying Hoaxes and Urban Legends
-
Improving our Nation's Cybersecurity Through the Public-Private Partnership
-
In the Dark: Crucial Industries Confront Cyberattacks
-
In the Matter of Chitika, Inc.
-
In the Matter of Facebook, Inc.
-
In the Matter of ScanScout, Inc.
-
Information Needs of Communities
-
Information Publication Scheme
-
Information Security: Additional Guidance Needed to Address Cloud Computing Concerns
-
Information Security: Federal Deposit Insurance Corporation Has Made Progress, but Further Actions Are Needed to Protect Financial Data
-
Information Security: Weaknesses Continue Amid New Federal Efforts to Implement Requirements
-
Information Sharing Environment: Better Road Map Needed to Guide Implementation and Investments
-
Information Sharing: Progress Made and Challenges Remaining in Sharing Terrorism-Related Information
-
Information Technology: Critical Factors Underlying Successful Major Acquisitions
-
Information Technology: DHS Needs to Improve Its Independent Acquisition Reviews
-
Information Technology: Investment Oversight and Management Have Improved but Continued Attention Is Needed
-
Information Technology: OMB Needs to Improve Its Guidance on IT Investments
-
Inman v. Technicolor USA
-
Intelligent Transportation Systems Benefits, Costs, Deployment, and Lessons Learned Desk Reference
-
Interagency Telework Measurement Group
- International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World
-
Internet as a Catalyst for Change: Access, Development, Freedoms and Innovations
-
Internet Freedom Fellows
-
ISO/IEC 27005:2011
-
ISO/IEC 27034-1:2011
-
ISO/IEC 27035:2011
-
IStrategy
-
IT Control Objectives for Cloud Computing: Controls and Assurance in the Cloud
-
IT Dashboard: Accuracy Has Improved, and Additional Efforts Are Under Way to Better Inform Decision Making
J
L
-
Landsat and the Data Continuity Mission
-
Law Enforcement Use of Global Positioning (GPS) Devices to Monitor Motor Vehicles: Fourth Amendment Considerations
-
Legal Issues in Mass Digitization: A Preliminary Analysis and Discussion Document
-
Legislation Related to the Uniform Electronic Legal Material Act (UELMA)
-
List of Recent Web Accessibility-Related Litigation and Settlements
M
-
M-Government: Mobile Technologies for Responsive Governments and Connected Societies
-
Making it in Miniature - Nanotechnology, UK Science and its Applications
-
Managing Information Security Risk: Organization, Mission, and Information System View
-
Medical Devices; Medical Device Data Systems; Final Rule
-
Memorandum of Understanding (MoU) on Key Principles on the Digitisation and Making Available of Out-of-Commerce Works
-
Metadata: A Backdoor Into Organization
-
Mission Critical: A Public-Private Strategy for Effective Cybersecurity
-
Models for a Governance Structure for the National Strategy for Trusted Identities in Cyberspace
-
Models To Advance Voluntary Corporate Notification to Consumers Regarding the Illicit Use of Computer Equipment by Botnets and Related Malware