Articles and events specifically related to the year 2014.
All items (225)
2
A
-
A "Kill Chain" Analysis of the 2013 Target Data Breach
-
A Call for Action for Online Piracy and Counterfeiting Legislation
-
A Criticism of the Current Security, Privacy and Accountability Issues in Electronic Health Records
-
A Guide to Your Rights
-
A Section White Paper: A Call for Action for Online Piracy and Counterfeiting Legislation
-
Adopted Regulations for Testing of Autonomous Vehicles by Manufacturers
-
Air Force Instruction 10-1701
-
An Empirical Analysis of the Value of Information Sharing in the Market for Online Content
-
An Ethical Framework for Facial Recognition
-
Annual Assessment of the Internal Revenue Service Information Technology Program
-
Application of FinCEN's Regulations to Virtual Currency Software Development and Certain Investment Activity
-
Artificial Intelligence and Life in 2030: One Hundred Year Study on Artificial Intelligence
-
At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues
-
Australian Cyber Security Centre
-
Authors Guild v. Google (Google II)
-
Authors Guild v. HathiTrust
-
Autonomous Car Policy Report
-
Autonomous Vehicle Technology: A Guide for Policymakers
-
Aviation Support Request for National Air Security Office Intelligence, Surveillance, and Reconnaissance (ISR) and Aviation Support
B
-
Best Practices for Data Destruction
-
Big Data and Innovation, Setting The Record Straight: De-identification Does Work
-
Big Data and Privacy: A Technological Perspective
-
Big Data Means Big Opportunities and Big Challenges: Promoting Financial Inclusion and Consumer Protection in the “Big Data” Financial Era
-
Big Data Privacy Workshop Advancing the State of the Art in Technology and Practice
- Big Data: A Tool for Inclusion or Exclusion? (Workshop)
- Big Data: Seizing Opportunities, Preserving Values
-
Border Patrol Agent Pay Reform Act of 2014
-
Building Privacy Into Mobile Location Analytics (MLA) Through Privacy by Design
-
BuySecure Initiative
C
-
Capitals in the Clouds Part VI: Cloud Procurement: From Solicitation to Signing
-
China and International Law in Cyberspace
-
Cloud Computing Policy
-
Cloud Computing: Additional Opportunities and Savings Need to Be Pursued
-
Cloud Computing: The Concept, Impacts and the Role of Government Policy
-
Cloud Service Level Agreement Standardisation Guidelines
-
CNSSI No. 1253
-
Conducting Privacy Impact Assessments Code of Practice
-
Considerations for firms thinking of using third-party technology (off-the-shelf) banking solutions
-
Consumer Generated and Controlled Health Data
-
Consumer Guide to Protecting Privacy Online
-
Consumer Privacy Protection Principles: Privacy Principles for Vehicle Technologies and Services
-
Consumers and Mobile Financial Services 2014
-
Content of Premarket Submissions for Management of Cybersecurity in Medical Devices
-
Creative Content UK
-
Critical Infrastructure Cyber Community Voluntary Program
-
Critical Infrastructure Protection: DHS Action Needed to Enhance Integration and Coordination of Vulnerability Assessment Efforts
-
CRS Reports - 2014
-
CryptoWall
-
CTB-Locker
-
Cyber Defence in the EU: Preparing for Cyber Warfare?
-
Cyber Risks: The Growing Threat
-
Cyber-Risk Oversight
-
Cybersecurity and the Smarter Grid
-
Cybersecurity Enhancement Act of 2014
-
Cybersecurity in the Golden State
-
Cybersecurity Procurement Language for Energy Delivery Systems
-
Cybersecurity Roundtable
-
Cybersecurity Workforce Assessment Act
-
Cyberspace 2025: Today's Decisions, Tomorrow's Terrain
-
Cyberspace Administration of China
D
-
Data & Society Research Institute
-
Data Brokers: A Call for Transparency and Accountability
-
Data Privacy and Integrity Advisory Committee Recommendations Paper 2014-01
-
Data Transparency: Oversight Needed to Address Underreporting and Inconsistencies on Federal Award Website
-
Denison v. Larkin
-
DHS Intelligence Analysis: Additional Actions Needed to Address Analytic Priorities and Workforce Challenges
-
Digital Accountability and Transparency Act
-
Digital Arabic Content National Strategy
-
Digital Peepholes, Remote Activation of Webcams: Technology, Law, and Policy
-
Disclosure of Employee Information Under TUPE
-
DoD Instruction 8500.01
-
DoD Instruction 8510.01
-
DOJ Order 0601
E
-
Egyptian Government Cloud Strategy
-
Electronic Health Records: VA and DOD Need to Support Cost and Schedule Claims, Develop Interoperability Plans, and Improve Collaboration
-
Emerging and Readily Available Technologies and National Security-A Framework for Addressing Ethical, Legal, and Societal Issues
-
Emerging Cyber Threats Report 2014
-
Energy Sector Cybersecurity Framework Implementation Guidance
-
EU Data Protection Law: A "Right to be Forgotten"?
-
Explanatory Report to the Council of Europe Convention on Cybercrime
-
Exposing the Cybersecurity Cracks Part 2: Roadblocks, Refresh and Raising the Human Security IQ
F
-
FAA Faces Significant Barriers to Safely Integrate Unmanned Aircraft Systems into the National Airspace System
-
Factsheet on the 'Right to be Forgotten' ruling
-
Federal Information Technology Acquisition Reform Act
-
Final Report on Remediation of Server-Based DDoS Attacks
-
Fiscal Year 2014-2015 Guidance on Improving Federal Information Security and Privacy Management Practices
-
Formal Opinion Interim No. 12-0006
-
Fox News Network v. TVEyes
-
Framework for Improving Critical Infrastructure Cybersecurity
-
Freedom of Information Act and 2014 Sunshine Week
-
FTC v. T-Mobile
G
-
GAO Reports - 2014
-
Global Commission on Internet Governance
-
Global Cybercrime: The Interplay of Politics and Law
-
Guidance for Industry: Internet/Social Media Platforms with Character Space Limitations-Presenting Risk and Benefit Information for Prescription Drugs and Medical Devices
-
Guidance Regarding Cyberspace Roles, Responsibilities, Functions, and Governance Within the DoD
-
Guide to Human Rights for Internet Users
-
Guide to Undertaking Privacy Impact Assessments
-
Guidelines on Regulating Robotics
H
-
Hackers Wanted: An Examination of the Cybersecurity Labor Market
-
Handbook on European data protection law
-
High-Risk Security Vulnerabilities Identified During Reviews of Information Technology General Controls at State Medicaid Agencies
-
How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts
-
How Google Fights Piracy
I
-
IEEE P2413
-
Improving the Security of Consumer Financial Transactions
-
Industrial Internet Consortium
-
Information and Communications in Japan 2014
-
Information Security: IRS Needs to Address Control Weaknesses That Place Financial and Taxpayer Data at Risk
-
Information Society Code
-
Information Supplement: Third-Party Security Assurance
-
Information Technology: Leveraging Best Practices and Reform Initiatives Can Help Defense Manage Major Investments
-
Initiative for ICT International Competitiveness Enhancement and International Expansion
-
Inquiry Into Cyber Intrusions Affecting U.S. Transportation Command Contractors
-
Intake and Charging Policy for Computer Crime Matters
-
Interested Parties Advancing Copyright
-
Internet Domain Names: Background and Policy Issues
-
Internet Pharmacies: Most Rogue Sites Operate from Abroad, and Many Sell Counterfeit Drugs
-
ISOO 2013 Annual Report to the President
-
IT Risks
-
ITI Recommendations to the Department of Homeland Security Regarding its Work Developing a Voluntary Program Under Executive Order 13636, "Improving Critical Infrastructure Cybersecurity"
K
L
M
-
Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices
-
Making Privacy Practices Public
-
Maritime Critical Infrastructure Protection: DHS Needs to Better Address Port Cybersecurity
-
Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
-
Mauritius Declaration on the Internet of Things
-
Measures of Effectiveness for the Information Age Army
-
Medicaid: Use of Claims Data for Analysis of Provider Payment Rates
-
Metadata and Privacy: A Technical and Legal Overview
-
Multi-State Internet Gaming Agreement
N
-
NASA: Assessments of Selected Large-Scale Projects
-
National Cybersecurity Protection Act of 2014
-
National FOSS Strategy
-
National Space Security Policy
-
NCTC Compliance Incident Procedures Regarding Data Handling
-
Net Losses: Estimating the Global Cost of Cybercrime
-
NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 3.0
-
NIST Roadmap for Improving Critical Infrastructure Cybersecurity
-
NIST Special Publication 1176
-
NIST Special Publication 800-101, Rev. 1
-
NIST Special Publication 800-162
-
NIST Special Publication 800-168
- NIST Special Publication 800-176
-
Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality
- NSTAC Report to the President on the Internet of Things
-
Nuclear Command, Control, and Communications: Review of DOD's Current Modernization Efforts
O
-
OMB Memorandum M-15-01
-
Online Copyright Infringement Discussion Paper
-
Opinion 04/2014 on surveillance of electronic communications for intelligence and national security purposes
-
Opinion 05/2014 on Anonymisation Techniques
-
Opinion 8/2014 on Recent Developments on the Internet of Things
-
Overview of NCTC's Data Access as Authorized by the 2012 Attorney General Guidelines
-
Overview of the Baseline Safeguard Protections Under NCTC’s 2012 Attorney General Guidelines
P
-
Pan-American Governmental Access to Data in the Cloud
-
Personally Controlled Electronic Health Records Act 2012
-
Pervasive Attack: A Threat Model and Problem Statement
-
Plain English ISO IEC 27000 2012 Information Security Definitions
-
Preliminary Examination Instructions in view of the Supreme Court Decision in Alice Corporation Ply. Ltd. v. CLS Bank International, et al.
-
Presidential Policy Directive 28: Signals Intelligence Activities
-
Privacy Best Practice Recommendations for Commercial Biometric Use
-
Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices
R
-
Reducing Mobile Phone Theft and Improving Security,
-
Report on Cyber Security in the Banking Sector
- Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court
-
Rethinking Personal Data: A New Lens for Strengthening Trust
-
Rethinking the Dynamics of the RFP Process for Improved IT Procurement
-
Revenue and Customs Brief 9 (2014): Bitcoin and other Cryptocurrencies
-
Riley v. California
-
Risk and Responsibility in a Hyperconnected World
-
Risks to Consumers Posed by Virtual Currencies
S
-
Safeguarding the Personal Information of All People: A Status Report on the Development and Implementation Procedures Under Presidential Policy Directive PPD-28
-
Sharing Cyberthreat Information Under 18 USC § 2702(a)(3)
-
Social Responsibility Strategy
-
Software Licenses: DOD's Plan to Collect Inventory Data Meets Statutory Requirements
-
Standardisation in the Field of Electronic Identities and Trust Service Providers
-
Statistical Transparency Report Regarding Use of National Security Authorities: Annual Statistics for Calendar Year 2013
-
Strategies to Mitigate Targeted Cyber Intrusions
-
Swatch Group Management Services v. Bloomberg L.P.
T
-
Tactile Internet
-
Tax Information Security Guidelines For Federal, State and Local Agencies: Safeguards for Protecting Federal Tax Returns and Return Information
-
Technology Transfer: Federal Laboratory Consortium Should Increase Communication with Potential Customers to Improve Initiatives
-
Telecommunications: Projects and Policies Related to Deploying Broadband in Unserved and Underserved Areas
-
Ten Strategies of a World-Class Cybersecurity Operations Center
-
Terrorist Identities Datamart Environment (TIDE) Fact Sheet
-
The Case for a Federal Robotics Commission
-
The Connected Car and Privacy: Navigating New Data Issues
-
The Cost of NSA Surveillance
- The Department of Energy's Management of Cloud Computing Activities: Audit Report
-
The Economics of Digital Currencies