- Bank Secrecy Act Advisory Group
- Bank Secrecy Act of 1970
- Bank Use of Foreign-Based Third-Party Service Providers
- Bank account
- Bank for International Settlements
- Bank secrecy information
- Bankcard
- Bankcard company
- Banking Industry Technology Secretariat
- Banking Securely Online
- Banking and finance
- Bankruptcy
- Bankruptcy clause
- Bankwire
- Banner
- Banner ad
- Banner grabbing
- Banner view
- Bar-Ayal v. Time Warner Cable
- Bar chart
- Bar code
- Bar code font
- Bar code printer
- Bar code verifier
- Bar coding
- Barcelona.com v. Excelentisimo Ayuntamiento De Barcelona
- Barcode of Life Initiative
- Barcode reader
- Bare metal virtualization
- Bargain Bid v. uBid
- Barnard v. Compugraphic
- Barnes v. Yahoo!
- Barnett v. Network Solutions
- Barometric sensor
- Barrage jamming
- Barratry
- Barrier
- Barrier to entry
- Barter transaction
- Bartering
- Bartnicki v. Vopper
- Bartsch v. MGM
- Base64
- Base Information Transport Infrastructure Wireless
- Base information infrastructure
- Base map
- Base standard
- Base station
- Base transceiver station
- Base unit
- Baseband
- Basel II
- Baseline
- Baseline Capabilities for State and Major Urban Area Fusion Centers
- Baseline architecture
- Baseline capabiliity
- Baseline configuration
- Baseline intelligence capabilities
- Baseline schedule
- Baseline security
- Baseline security requirement
- Baselining
- Basic Auth
- Basic Center of Operations
- Basic Exchange Telecommunications Radio System
- Basic Image Interchange Format
- Basic Safeguarding of Contractor Information Systems
- Basic Safeguarding of Contractor Information Systems (Proposed Rule)
- Basic authentication
- Basic cable service
- Basic intelligence
- Basic registration
- Basic research
- Basic scientific research
- Basic service
- Basic testing
- Basque Cybersecurity Centre
- Bass
- Bastion host
- Batch
- Batch computer
- Batch processing
- Batch programming
- Batching
- Bathymetry
- Battery
- Battery-Assisted Passive Tag
- Battery backup
- Battery charger
- Battery electric vehicle
- Battle box
- Battlefield Automation: Army Needs to Determine Command and Control Priorities and Costs
- Battlefield Awareness and Data Dissemination
- Battlefield Exploitation and Target Acquisition
- Battlefield Extraction-Assist Robot
- Battlefield Information Collection and Exploitation System
- Battlefield TECHINT
- Battlefield Video Teleconferencing
- Battlefield operating system
- Battlefield surveillance
- Battlefield surveillance brigade
- Battlespace
- Battlespace Preparation Autonomous Undersea Vehicle
- Battlespace awareness
- Battlespace spectrum management
- Batzel v. Smith
- Baud
- Baud rate
- Baudot Code
- Bavaro Palace v. Vacation Tours
- Bay State Savings Bank v. BayState Financial Services
- Bayer Healthcare v. Nagrom
- Bayer v. Custom School Frames
- Bayes' theorem
- Bayesian (decision) analysis
- Bayh-Dole Patent and Trademark Amendments Act of 1980
- Bayh-Doyle Act
- Baylor University v. International Star
- BeCommerce
- BeSTGRID
- Beachfront spectrum
- Beacon
- Beacon tag
- Beaconry
- Beagle
- Beam
- Bear Stearns v. Lavalle
- Bearer Independent Call Control
- Bearer services
- Beats per minute
- Beauregard claim
- Bebo
- Becoming v. Avon
- Beeper
- Beethoven.com v. Librarian of Congress
- Behavior
- Behavior blocker
- Behavior monitoring
- Behavior monitoring signature
- Behavioral analytics
- Behavioral biometric
- Behavioral biometric characteristic
- Behavioral biometric patterns
- Behavioral data
- Behavioral effect
- Behavioral information
- Behavioral information security
- Behavioral outcome
- Behavioral privacy
- Behavioral retargeting
- Behavioral surveillance
- Behavioral targeter
- Behavioral targeting
- BeiDou
- Beijing University of Posts and Telecommunications
- Being Fluent with Information Technology
- Belgian Telecommunications Users Group
- Bell-La Padula model
- Bell Communications Research
- Bell Labs
- Bell Operating Company
- Bellagio v. Denhammer
- Bellwether trial
- Below-the-line costs
- Below the fold
- Ben Ezra, Weinstein & Co. v. AOL
- Benchmark
- Benchmark test
- Benchmarking
- Benchmarking: Costly and Difficult, but Often Necessary When Buying Computer Equipment or Services
- Benchmarking E-government: A Global Perspective
- Beneficiary
- Beneficiary and Earnings Data Exchange
- Benefit
- Benefit fraud
- Benefit of the bargain
- Benefits and Risks of Free Email Services
- Benefits of BCC
- Benelux
- Benign
- Benign bot
- Benign environment
- Bennett v. Hosting.com
- Bensusan v. King
- Bent pipe
- Berger v. N.Y.
- Berglund v. Industrial Technology Institute
- Berkeley Center for Law and Technology
- Berkeley Digital Library Copyright Project
- Berkeley Internet Name Domain
- Berkeley Open Infrastructure for Network Computing
- Berkeley Software Distribution
- Berkeley Systems v. Delrina
- Berkman Klein Center for Internet & Society
- Berne Convention Implementation Act of 1988
- Berne Convention for the Protection of Literary and Artistic Works
- Berne Convention work
- Bernina v. Fashion Fabrics
- Bernstein v. Dept. of Justice
- Bespoke
- Bespoke solution
- Best Practice Examples Under the OECD Guidelines on Consumer Protection in the Context of E-commerce
- Best Practice Guidelines for Producing High Quality Mobile Applications
- Best Practices: Elements of a Federal Privacy Program
- Best Practices: Online Subscription Upselling
- Best Practices: Recommended Code of Conduct for Consumer Tracking Research
- Best Practices and Guidelines for Ad Networks to Address Piracy and Counterfeiting
- Best Practices and Guidelines for Location-Based Services
- Best Practices and Guidelines for Location Based Services
- Best Practices for Business: Protecting Personal Information and Fighting Fraud with the Red Flags Rule
- Best Practices for Consumer Wearables & Wellness Apps & Devices
- Best Practices for Data Destruction
- Best Practices for Government to Enhance the Security of National Critical Infrastructures
- Best Practices for Health Privacy
- Best Practices for Keeping Your Home Network Secure
- Best Practices for Law Enforcement Interaction With Victim-companies During a Cybercrime Investigation
- Best Practices for Mobile Application Developers
- Best Practices for Mobile Applications Developers
- Best Practices for National Cyber Security: Building a National Computer Security Incident Management Capability, Version 2.0
- Best Practices for Negotiating Cloud-Based Software Contracts
- Best Practices for Seizing Electronic Evidence
- Best Practices for Victim Response and Reporting of Cyber Incidents
- Best Practices platform
- Best Practices to Address Online and Mobile Threats
- Best Principles for Health Privacy
- Best Vacuum v. Ian Design
- Best Western Int’l v. Doe
- Best and final offer
- Best commercial practice
- Best current practices
- Best edition
- Best efforts
- Best efforts clause
- Best evidence rule
- Best judgment standard
- Best mode
- Best practices
- Best value
- Beta culture
- Beta release
- Beta site
- Beta testing
- Beta version
- Better Business Bureau
- Better Ways To Provide for Use of Agricultural Information
- Between line entry
- Between merchants
- Beussink v. Woodland School District
- Beyond Silk Road: Potential Risks, Threats, and Promises of Virtual Currencies
- Beyond Spectre: Confronting New Technical and Policy Challenges: Proceedings of a Workshop
- Beyond Speculation: Automated Vehicles and Public Policy
- Beyond Voice: Mapping the Mobile Marketplace
- Beyond a reasonable doubt
- Beyond visual line-of-sight operation
- Bfdi
- Bias
- Bibbero Systems v. Colwell Systems
- Bible
- Bibliographic Retrieval Services
- Bibliographic citation
- Bibliographic data
- Bibliographic information
- Bibliography
- Bibliometric data
- Bid
- BidZirk v. Smith
- Bid defect
- Bid evaluation
- Bid rigging
- Bid shielding
- Bid siphoning
- Bidder
- Bidirectional
- Bidirectional Health Information Exchange
- Bidirectional authentication
- Bidirectional communication
- Biennial Privacy Act and Computer Matching Report
- Bifurcation
- Big Brother
- Big Data, Artificial Intelligence, Machine Learning and Data Protection
- Big Data: A Report On Algorithmic Systems, Opportunity, and Civil Rights
- Big Data: A Tool for Inclusion or Exclusion?: Understanding the Issues
- Big Data: A Tool for Inclusion or Exclusion? (Workshop)
- Big Data: Big Today, Normal Tomorrow
- Big Data: Seizing Opportunities, Preserving Values
- Big Data: Seizing Opportunities, Preserving Values: Interim Progress Report
- Big Data: The Next Frontier for Innovation, Competition, and Productivity
- Big Data Challenges and Advanced Computing Solutions
- Big Data Interagency Working Group
- Big Data Means Big Opportunities and Big Challenges: Promoting Financial Inclusion and Consumer Protection in the “Big Data” Financial Era
- Big Data Privacy Workshop Advancing the State of the Art in Technology and Practice
Advertisement
34,539
pages
Local Sitemap
Advertisement