- 1-24/7
- 1-800 Contacts v. WhenU.com
- 1000BASE–T
- 100BASE–TX
- 100 Days to Y2K: A Resource Guide for Small Organizations
- 1080i
- 1080p
- 10BASE–T
- 10BaseT
- 10 Steps to Cybersecurity
- 10 Steps to a Privacy and Civil Liberties Policy
- 128-bit encryption
- 168 world
- 17 U.S.C. § 117
- 18F
- 1909 Copyright Act
- 1912 Townsend Amendment
- 1952 Nondramatic Literary Works Amendment
- 1976 Copyright Act
- 1989 NIST/NSA Memorandum of Understanding
- 1990 Department of Defense (DOD) Authorization Act
- 1995 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1996 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1996 Telecommunications Act
- 1997 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1998 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1998 Ottawa Taxation Framework Condition
- 1998 Wireless Telegraphy Act
- 1999 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 1G
- 1mage Software v. Reynolds & Reynolds
- 1st Information Operations Command (Land)
- 2-D barcode
- 2-factor authentication
- 2.5G
- 2000 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2001 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2002 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2003 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2004 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2005 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2005 Global E-Government Readiness Report: From E-Government to E-Inclusion
- 2006 e-Government Strategy, Responsive Government: A New Service Agenda
- 2007 Annual Report to Congress on Foreign Economic Collection and Industrial Espionage
- 2007 Data Mining Report: DHS Privacy Office Response to House Report 109-699
- 2007 Stocktake of Electronic Commerce Activities in APEC
- 2008 Annual Report to Congress on Foreign Economic and Industrial Espionage
- 2009 Data Mining Report
- 2009 IC Legal Reference Book
- 2010 Data Mining Report
- 2010 Global E-Government Survey: Leveraging E-government at a Time of Financial and Economic Crisis
- 2010 Joint Strategic Plan on Intellectual Property Enforcement
- 2010 National Security Strategy
- 2011 Cyber Coalition Exercise
- 2011 Legislation Related to "Sexting"
- 2011 National Network of Fusion Centers: Final Report
- 2011 Nationwide Cyber Security Review
- 2012-2017 Defense Intelligence Agency Strategy
- 2012 Data Mining Report
- 2012 Global E-Government Survey: E-Government for the People
- 2012 National Defense Authorization Act
- 2012 Strategic Plan
- 2013 Annual Report to Congress
- 2013 Data Breach Investigations Report
- 2013 Data Mining Report
- 2013 Freedom of Information Act Report
- 2013 Joint Strategic Plan on Intellectual Property Enforcement
- 2014 Chief FOIA Officer Report
- 2014 Data Breach Investigations Report
- 2014 Global Threat Intel Report
- 2014 National Agenda for Digital Stewardship
- 2014 Open Government Plan
- 2014 Report to Congress 22014 Annual Report to Congress
- 2015 Data Breach Investigations Report
- 2015 National Security Strategy
- 2015 Protected Health Information Data Breach Report
- 2016 Internet Crime Report
- 2016 Internet Organised Crime Threat Assessment (IOCTA)
- 2017 Internet Organised Crime Threat Assessment (IOCTA)
- 2019 Revised Patent Subject Matter Eligibility Guidance
- 2020 Census: Census Bureau Can Improve Use of Leading Practices When Choosing Address and Mapping Sources
- 2020 Census: Prioritized Information Technology Research and Testing Is Needed for Census Design Decisions
- 2020 Census Data Products: Data Needs and Privacy Considerations
- 20YY: Preparing for War in the Robotic Age
- 20 Critical Security Controls for Effective Cyber Defense: Consensus Audit Guidelines
- 21 Steps to Improve Cyber Security of SCADA Networks
- 21st Century Crime: How Malicious Artificial Intelligence Will Impact Homeland Security
- 21st Century Cures Act
- 21st Century Cures Act: Interoperability, Information Blocking, and the ONC Health IT Certification Program
- 21st Century Department of Justice Appropriations Authorization Act
- 21st Century Nanotechnology Research and Development Act of 2003
- 24/7
- 24/7/365
- 24/7 Incident Handling Center
- 24 Hour Fitness v. 24/7 Tribeca Fitness
- 24 Hour Log
- 24x7
- 25 Point Implementation Plan to Reform Federal Information Technology Management
- 2600
- 2703(d) order
- 28 CFR, Part 23
- 28 Code of Federal Regulations Part 23
- 2D image
- 2G
- 3-D printer
- 3-D printing
- 3-D scanner
- 3-factor authentication
- 3.5D
- 321 Studios v. MGM Studios
- 35 U.S.C. 102
- 35 U.S.C. 112
- 3D Printing: Opportunities, Challenges, and Policy Implications of Additive Manufacturing
- 3D Printing: Overview, Impacts, and the Federal Role
- 3D graphics
- 3D model
- 3D modelling
- 3D scan
- 3G
- 3Vs
- 3rd Generation Partnership Project
- 3rd Generation Partnership Project 2
- 404 error
- 406 MHz emergency beacon
- 40 Years of Experience with the Fair Credit Reporting Act: An FTC Staff Report with Summary of Interpretations
- 411 services
- 4G
- 4chan
- 50-Cent Party
- 511 Traveler Information Services
- 555-1212.com v. Communication House
- 5G
- 5G Wireless: Capabilities and Challenges for an Evolving Network
- 6LoWPAN
- 702 Target
- 7 Steps to a Privacy, Civil Rights, and Civil Liberties Policy
- 7th Framework Programme
- 8(a) Streamlined Technology Acquisition Resources for Services
- 800-JR-Cigar v. Goto.Com
- 802.11 network
- 802.11 standard
- 9-1-1 DDoS: Threat, Analysis and Mitigation
- 9-1-1 Legislation Tracking Database
- 9-1-1 system
- 9/11 Commission
- 9/11 Commission Recommendations: A Civil Liberties Oversight Board
- 911 Governing Authority
- 911 emergency call system
- 911 system
- 9 Elements of an Information Quality Program
- @
- A&A
- A&H Sportswear v. Victoria’s Secret
- A&M Records v. Napster
- A-GPS
- A-Space
- A-list blogger
- A.B.C. Carpet v. Naeini
- A.V. by Versace v. Gianni Versace
- A/D
- A/D converter
- A1 Mortgage v. A1 Mortgage & Financial Services
- A2A
- AAA
- AAC
- AAF
- AAG
- AALL, National Security Letters
- AALP
- AAS
- ABA
- ABA Digital Signature Guidelines
- ABA Privacy & Computer Crime Committee
- ABC
- ABCC
- ABCCC
- ABI
- ABIS
- ABKCO Music v. Stellar Records
- AC
- ACA
- ACCS
- ACCS-wide common information exchange
- ACD
- ACE
- ACH Network
- ACH fraud
- ACI
- ACID test
- ACIP
- ACIS
- ACL
- ACLU v. Gonzales
- ACM
- ACMA Annual Reports on Online Risk and Safety in the Digital Economy
- ACMS
- ACM U.S. Public Policy Committee
- ACM US Public Policy Council
- ACN
- ACP
- ACPO e-Crime Strategy
- ACS
- ACS:Law
- ACSC
- ACSC 2015 Threat Report
- ACSI 33
- ACT
- ACTA
- ACTS
- ACT The App Association
- AD/SAT v. Associated Press
- ADA
- ADAPSO
- ADC
- ADI
- ADLP
- ADMA
- ADN
- ADNI
- ADP, IRM & Telecommunications
- ADP 2-0
- ADP Acquisitions: Patent Automation Encountering Major Planning and Procurement Problems
- ADP Acquisitions: SSA Should Limit ADP Procurements Until Further Testing Is Performed
- ADP Equipment: Buying Through GSA’s Office of Technology Plus Stores
- ADP Equipment: Revised GSA Strategy for Microcomputer Purchases Can Improve Competition
- ADP System Security Officer
- ADP equipment
- ADP security officer
- ADP security planner
- ADP system
- ADR
- ADRP 2-0
- ADS
- AEA
- AES
- AETHER
- AF
- AFC
- AFCEA International
- AFIPS
- AFIS
- AFK
- AFP
- AFRICOM
- AGI
- AGIC
- AGNOSC
- AGing Integrated Database
- AHIC
- AHS
- AI
- AI, Robots, and Swarms, Issues, Questions, and Recommended Studies
- AIA
- AIC
- AID
- AIF
- AIFF
- AIFS
- AIM
- AIMP
- AIMS
- AIN
- AIO/CIO Reporting
- AIP
- AIPA
- AIRS
- AIS
- AISB
- AIT
- AI Council
- AI Group of Experts (OECD)
- AI Now Institute
- AI Risk Management Framework
- AI Sector Deal
- AI actor
- AI and Control of Covid-19 Coronavirus
- AI assistant
- AI in the UK: ready, willing and able?
- AI knowledge
- AI practitioner
- AI system
- AI system lifecycle
- AI technologies
- AI winter
- AJAX
- ALC
- ALERT
- ALGOL
- ALI
- ALIA
- ALMAWEB
- ALOHAnet
- ALPR
- ALliance for the Information Society
- AM
- AM/FM streaming
- AM/FM webcaster
- AMA
- AMBER alert
- AMC-R 10-101
- AMC-R 381-1
- AMC Suppl 1 to AR 381-1
- AMDS
- AMIA
- AMIPCI
- AMIS
- AMI Enterprise Task Force
- AMI Security Task Force
- AMI communications network
- AMI head end
- AML/CFT
- AMP
- AMPAS v. NSI
- AMPS
- AMS
- AM broadcast
- AM broadcaster
- AM broadcasting
- AND
- AND logic
- ANI
- ANI system
- ANS
- ANSI/ISA-62443-2-1 (99.02.01)-2009
- ANSI/ISA-62443-3-3 (99.03.03)-2013
- ANSI/NBS-ICST 1-1986
- ANSI/NIST-ITL
- ANSI ASC X12
- ANSI Homeland Defense and Security Standardization Collaborative
- ANSI X9.31-1998
- ANSI X9.62-2005
- ANSI X9.84-2010
- ANSI standards
- AO
- AOL v. AOL.org
- AOL v. AT&T
- AOL v. IMS
- AOL v. LCGM
- AOL v. Pasieka
- AOL v. Prime Data Systems
- AOL v. St. Paul Mercury Insurance
- AP
- APA
- APAC
- APB
Advertisement
34,538
pages
Local Sitemap
Advertisement