- "Black Boxes" in Passenger Vehicles: Policy Issues
- "Build Security In"
- "Central Hudson" test
- "Drive-by" ransomware
- "Essential facilities" doctrine
- "Last Mile" Bandwidth Availability Task Force Report
- "Miller" test
- "Natural expansion" doctrine
- "Open Government Data" movement
- "Red button" interactive TV
- "Right to Information" movement
- "Roth" standard
- "Sensitive But Unclassified" and Other Federal Security Controls on Scientific and Technical Information: History and Current Controversy
- "Sneak and peek" warrant
- "Spam": An Overview of Issues Concerning Commercial Electronic Mail
- "Special needs" doctrine
- "The Progress of Science and Useful Arts": Why Copyright Today Threatens Intellectual Freedom
- "To Promote the Progress of . . . Useful Arts" In the Age of Exploding Technology
- "Zero day" strategy
- ''Terry'' stop
- (First) Report of the Acting General Counsel Concerning Social Media Cases
- (P)
- (Second) Report of the Acting General Counsel Concerning Social Media Cases
- (Third) Report of the Acting General Counsel Concerning Social Media Cases
- -aaS
- .COM file
- .ad
- .ae
- .aero
- .af
- .ag
- .ai
- .aif
- .al
- .am
- .an
- .ao
- .aq
- .ar
- .arpa
- .as
- .asia
- .at
- .au
- .au Domain Administration
- .aw
- .ax
- .az
- .bin
- .biz
- .bmp
- .cat
- .com
- .com Disclosures: How to Make Effective Disclosures in Digital Advertising
- .coop
- .doc
- .edu
- .ee
- .eu
- .exe
- .gm
- .gn
- .gov
- .gov Domain Name Registration Service
- .gov Reform Task Force
- .gov reform effort
- .gp
- .gq
- .gr
- .gs
- .gt
- .gu
- .gw
- .gy
- .hk
- .hm
- .hn
- .hr
- .ht
- .info
- .int
- .jobs
- .jpg
- .kr
- .mil
- .mobi
- .mov
- .mpg
- .museum
- .name
- .net
- .nz
- .om
- .org
- .pa
- .pe
- .pf
- .pg
- .ph
- .pk
- .pro
- .tar file
- .tel
- .travel
- .txt
- .us
- .wav
- .xls
- .xxx
- .zip
- 1-24/7
- 1-800 Contacts v. WhenU.com
- 1000BASE–T
- 100BASE–TX
- 100 Days to Y2K: A Resource Guide for Small Organizations
- 1080i
- 1080p
- 10BASE–T
- 10BaseT
- 10 Steps to Cybersecurity
- 10 Steps to a Privacy and Civil Liberties Policy
- 128-bit encryption
- 168 world
- 17 U.S.C. § 117
- 18F
- 1909 Copyright Act
- 1912 Townsend Amendment
- 1952 Nondramatic Literary Works Amendment
- 1976 Copyright Act
- 1989 NIST/NSA Memorandum of Understanding
- 1990 Department of Defense (DOD) Authorization Act
- 1995 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1996 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1996 Telecommunications Act
- 1997 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1998 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1998 Ottawa Taxation Framework Condition
- 1998 Wireless Telegraphy Act
- 1999 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1G
- 1mage Software v. Reynolds & Reynolds
- 1st Information Operations Command (Land)
- 2-D barcode
- 2-factor authentication
- 2.5G
- 2000 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2001 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2002 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2003 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2004 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2005 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2005 Global E-Government Readiness Report: From E-Government to E-Inclusion
- 2006 e-Government Strategy, Responsive Government: A New Service Agenda
- 2007 Annual Report to Congress on Foreign Economic Collection and Industrial Espionage
- 2007 Data Mining Report: DHS Privacy Office Response to House Report 109-699
- 2007 Stocktake of Electronic Commerce Activities in APEC
- 2008 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2009 Data Mining Report
- 2009 IC Legal Reference Book
- 2010 Data Mining Report
- 2010 Global E-Government Survey: Leveraging E-government at a Time of Financial and Economic Crisis
- 2010 Joint Strategic Plan on Intellectual Property Enforcement
- 2010 National Security Strategy
- 2011 Cyber Coalition Exercise
- 2011 Legislation Related to "Sexting"
- 2011 National Network of Fusion Centers: Final Report
- 2011 Nationwide Cyber Security Review
- 2012-2017 Defense Intelligence Agency Strategy
- 2012 Data Mining Report
- 2012 Global E-Government Survey: E-Government for the People
- 2012 National Defense Authorization Act
- 2012 Strategic Plan
- 2013 Annual Report to Congress
- 2013 Data Breach Investigations Report
- 2013 Data Mining Report
- 2013 Freedom of Information Act Report
- 2013 Joint Strategic Plan on Intellectual Property Enforcement
- 2014 Chief FOIA Officer Report
- 2014 Data Breach Investigations Report
- 2014 Global Threat Intel Report
- 2014 National Agenda for Digital Stewardship
- 2014 Open Government Plan
- 2014 Report to Congress 22014 Annual Report to Congress
- 2015 Data Breach Investigations Report
- 2015 National Security Strategy
- 2015 Protected Health Information Data Breach Report
- 2016 Internet Crime Report
- 2016 Internet Organised Crime Threat Assessment (IOCTA)
- 2017 Internet Organised Crime Threat Assessment (IOCTA)
- 2019 Revised Patent Subject Matter Eligibility Guidance
- 2020 Census: Census Bureau Can Improve Use of Leading Practices When Choosing Address and Mapping Sources
- 2020 Census: Prioritized Information Technology Research and Testing Is Needed for Census Design Decisions
- 2020 Census Data Products: Data Needs and Privacy Considerations
- 20YY: Preparing for War in the Robotic Age
- 20 Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines
- 21 Steps to Improve Cyber Security of SCADA Networks
- 21st Century Crime: How Malicious Artificial Intelligence Will Impact Homeland Security
- 21st Century Cures Act
- 21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program
- 21st Century Department of Justice Appropriations Authorization Act
- 21st Century Nanotechnology Research and Development Act of 2003
- 24/7
- 24/7/365
- 24/7 Incident Handling Center
- 24 Hour Fitness v. 24/7 Tribeca Fitness
- 24 Hour Log
- 24x7
- 25 Point Implementation Plan to Reform Federal Information Technology Management
- 2600
- 2703(d) order
- 28 CFR, Part 23
- 28 Code of Federal Regulations Part 23
- 2D image
- 2G
- 3-D printer
- 3-D printing
- 3-D scanner
- 3-factor authentication
- 3.5D
- 321 Studios v. MGM Studios
- 35 U.S.C. 102
- 35 U.S.C. 112
- 3D Printing: Opportunities, Challenges, and Policy Implications of Additive Manufacturing
- 3D Printing: Overview, Impacts, and the Federal Role
- 3D graphics
- 3D model
- 3D modelling
- 3D scan
- 3G
- 3Vs
- 3rd Generation Partnership Project
- 3rd Generation Partnership Project 2
- 404 error
- 406 MHz emergency beacon
- 40 Years of Experience with the Fair Credit Reporting Act: An FTC Staff Report with Summary of Interpretations
- 411 services
- 4G
- 4chan
- 50-Cent Party
- 511 Traveler Information Services
- 555-1212.com v. Communication House
- 5G
- 5G Wireless: Capabilities and Challenges for an Evolving Network
- 6LoWPAN
- 702 Target
- 7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
- 7th Framework Programme
- 8(a) Streamlined Technology Acquisition Resources for Services
- 800-JR-Cigar v. Goto.Com
- 802.11 network
- 802.11 standard
- 9-1-1 DDoS: Threat, Analysis and Mitigation
- 9-1-1 Legislation Tracking Database
- 9-1-1 system
- 9/11 Commission
- 9/11 Commission Recommendations: A Civil Liberties Oversight Board
- 911 Governing Authority
- 911 emergency call system
- 911 system
- 9 Elements of an Information Quality Program
- @
- A&A
- A&H Sportswear v. Victoria’s Secret
- A&M Records v. Napster
- A-GPS
- A-Space
- A-list blogger
- A.B.C. Carpet v. Naeini
- A.V. by Versace v. Gianni Versace
- A/D
- A/D converter
- A1 Mortgage v. A1 Mortgage & Financial Services
- A2A
- AAA
- AAC
- AAF
- AAG
- AALL, National Security Letters
- AALP
- AAS
- ABA
- ABA Digital Signature Guidelines
- ABA Privacy & Computer Crime Committee
- ABC
- ABCC
- ABCCC
- ABI
- ABIS
- ABKCO Music v. Stellar Records
- AC
- ACA
- ACCS
- ACCS-wide common information exchange
- ACD
- ACE
- ACH Network
- ACH fraud
- ACI
- ACID test
- ACIP
- ACIS
- ACL
- ACLU v. Gonzales
- ACM
- ACMA Annual Reports on Online Risk and Safety in the Digital Economy
- ACMS
- ACM U.S. Public Policy Committee
- ACM US Public Policy Council
- ACN
- ACP
- ACPO e-Crime Strategy
- ACS
- ACS:Law
- ACSC
- ACSC 2015 Threat Report
- ACSI 33
- ACT
- ACTA
- ACTS
- ACT The App Association
- AD/SAT v. Associated Press
- ADA
- ADAPSO
- ADC
- ADI
- ADLP
- ADMA
- ADN
- ADNI
- ADP, IRM & Telecommunications
- ADP 2-0
- ADP Acquisitions: Patent Automation Encountering Major Planning and Procurement Problems
- ADP Acquisitions: SSA Should Limit ADP Procurements Until Further Testing Is Performed
- ADP Equipment: Buying Through GSA’s Office of Technology Plus Stores
- ADP Equipment: Revised GSA Strategy for Microcomputer Purchases Can Improve Competition
- ADP System Security Officer
- ADP equipment
- ADP security officer
- ADP security planner
- ADP system
- ADR
- ADRP 2-0
- ADS
- AEA
- AES
34,538
pages