- European Working Party on Information Technology Crime
- European X-Ray Observation Satellite
- Europeana
- Europena
- Europol
- Eurotech v. Cosmos European Travels
- Evaluated Products List
- Evaluated data
- Evaluation
- Evaluation of Latent Fingerprint Technologies
- Event
- Event data recorder
- Event flow analysis
- Event logging
- Event tree
- Everflux
- Every-citizen interface
- Every Soldier is a Sensor
- Everything over IP
- Everything somewhere
- Evidence
- Evidence (Australia)
- Evidence Extraction and Link Discovery
- Evidence preservation
- Evidentiary privilege
- Evil twin
- Evil twin attack
- Evolution-data optimized
- Evolution of a Prototype Financial Privacy Notice: A Report on the Form Development Project
- Evolution of the Web Versus the Internet
- Evolutionary Program Strategies
- Evolved packet core
- Evolving Technologies Change the Nature of Internet Use
- Evolving the High Performance Computing and Communications Initiative to Support the Nation's Information Infrastructure
- Ex ante disclosure
- Ex ante negotiation
- Ex officio
- Ex parte
- Ex parte Egan
- Ex parte Jackson
- Ex parte King & Barton
- ExaFLOPS
- Exabyte
- Exaflood
- Examination
- Examination Parity and Year 2000 Readiness for Financial Institutions Act
- Examining the Cyber Threat to Critical Infrastructure and the American Economy
- Examining the President’s Proposed National Data Breach Notification Standard Against Existing Legislation
- Examples of Location Based Services Privacy Policies
- Exascale
- Exascale computing system
- Exascale science
- Exceeds authorized access
- Exception report
- Exceptional
- Exceptional access
- Exceptions and Limitations to Copyright
- Excessive bail
- Exchange
- Exchange Carrier Standards Association
- Exchange Network Facilities for Interstate Access
- Exchange rates
- Exchanger
- Excluded Parties List System
- Exclusion
- Exclusion area
- Exclusion order
- Exclusionary rule
- Exclusive
- Exclusive dealing
- Exclusive distribution
- Exclusive jurisdiction
- Exclusive license
- Exclusive licensee
- Exclusive remedy
- Exclusive rights
- Exclusive territory
- Exculpatory clause
- Exculpatory evidence
- Executable
- Executable code
- Executable file
- Executable source lines of code
- Execute
- Execution information
- Executive Agent
- Executive Branch
- Executive Council on Information Management and Technology
- Executive Council on Integrity and Efficiency
- Executive Guide: Information Security Management: Learning from Leading Organizations
- Executive Guide to Computer Security
- Executive Office of the President
- Executive Office of the President: Procedures for Acquiring Access to and Safeguarding Intelligence Information
- Executive Order
- Executive Order 10110
- Executive Order 10450
- Executive Order 10656
- Executive Order 10938
- Executive Order 10995
- Executive Order 11191
- Executive Order 11215
- Executive Order 11460
- Executive Order 11556
- Executive Order 11652
- Executive Order 11717
- Executive Order 11905
- Executive Order 11984
- Executive Order 12046
- Executive Order 12065
- Executive Order 12131
- Executive Order 12139
- Executive Order 12291
- Executive Order 12331
- Executive Order 12333
- Executive Order 12334
- Executive Order 12356
- Executive Order 12382
- Executive Order 12472
- Executive Order 12537
- Executive Order 12829
- Executive Order 12845
- Executive Order 12863
- Executive Order 12864
- Executive Order 12866
- Executive Order 12881
- Executive Order 12882
- Executive Order 12885
- Executive Order 12906
- Executive Order 12931
- Executive Order 12949
- Executive Order 12951
- Executive Order 12958
- Executive Order 12968
- Executive Order 12977
- Executive Order 12979
- Executive Order 12999
- Executive Order 13010
- Executive Order 13011
- Executive Order 13026
- Executive Order 13035
- Executive Order 13070
- Executive Order 13073
- Executive Order 13103
- Executive Order 13127
- Executive Order 13133
- Executive Order 13142
- Executive Order 13181
- Executive Order 13218
- Executive Order 13226
- Executive Order 13228
- Executive Order 13231
- Executive Order 13283
- Executive Order 13284
- Executive Order 13286
- Executive Order 13292
- Executive Order 13311
- Executive Order 13335
- Executive Order 13349
- Executive Order 13353
- Executive Order 13354
- Executive Order 13355
- Executive Order 13356
- Executive Order 13381
- Executive Order 13388
- Executive Order 13392
- Executive Order 13402
- Executive Order 13407
- Executive Order 13423
- Executive Order 13462
- Executive Order 13467
- Executive Order 13470
- Executive Order 13475
- Executive Order 13497
- Executive Order 13514
- Executive Order 13526
- Executive Order 13539
- Executive Order 13549
- Executive Order 13556
- Executive Order 13558
- Executive Order 13563
- Executive Order 13565
- Executive Order 13571
- Executive Order 13576
- Executive Order 13584
- Executive Order 13587
- Executive Order 13589
- Executive Order 13616
- Executive Order 13618
- Executive Order 13636: Improving Critical Infrastructure Cybersecurity
- Executive Order 13636: Improving Critical Infrastructure Cybersecurity Incentives Study Analytic Report
- Executive Order 13636: Privacy and Civil Liberties Assessment Report
- Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing
- Executive Order 13694: Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities
- Executive Order 13702
- Executive Order 13718
- Executive Order 13741
- Executive Order 13757
- Executive Order 13800
- Executive Order 13833
- Executive Order 13859
- Executive Order 13873
- Executive Order 13920
- Executive Order 13960
- Executive Order 8381
- Executive Order 9608
- Executive Order B-34-15
- Executive Orders: Issuance and Revocation
- Executive Summary for Justice Decision Makers: Privacy, Civil Rights, and Civil Liberties Program Development
- Executive agency
- Executive state
- Executive summary
- Executory contract
- Exemplar
- Exemption 3 statute
- Exfiltration
- Exhaustion doctrine
- Exhibit
- Exhibit 300
- Exhibit 53
- Exigent circumstances
- Existing data study
- Exit Interview
- Exit relay
- Exoskeleton
- Exotic Pest Information Collection and Analysis program
- Expanding Access to Research Data: Reconciling Risks and Opportunities
- Expectation damages
- Expected results
- Expeditionary intelligence
- Expenditure
- Expense
- Experimental data
- Experimental development
- Experimental use
- Experimental use defense
- Experimental use doctrine
- Expert
- Expert Group on Cloud Computing Contract
- Expert Group on Security and Resilience of Communications Networks and Information Systems for Smart Grids
- Expert Working Group for Human Factors in Handwriting Examination
- Expert opinion testimony
- Expert system
- Expert testimony
- Expert witness
- Expertise
- Expertise sharing
- Expiration
- Expired information
- Explainable artificial intelligence
- Explanatory Memorandum to the Proposal for a Council Directive on rental right, lending right, and on certain rights related to copyright
- Explanatory Memorandum to the Proposal for a Directive of the European Parliament and of the Council on measures and procedures to ensure the enforcement of intellectual property rights
- Explanatory Memorandum to the Proposal for a European Parliament and Council Directive on Harmonisation of Certain Aspects of Copyright and Related Rights in the Information Society
- Explanatory Report to the Additional Protocol to the Convention on Cybercrime, concerning the criminalisation of acts of a racist and xenophobic nature committed through computer systems
- Explanatory Report to the Council of Europe Convention on Cybercrime
- Explicability
- Explicit
- Explicit consent
- Explicit content
- Explicit georeferencing
- Explicit knowledge
- Exploit
- Exploit code
- Exploit kit
- Exploit tools
- Exploitable channel
- Exploitation
- Exploratory Workshop on the Social Impacts of Robotics: Summary and Issues
- Explore.Zip worm
- Explore the Reliability and Resiliency of Commercial Broadband Communications Networks
- Exploring Cloud Incidents
- Exploring Collaborations to Harness Objects with a Digital Environment for Preservation
- Exploring Encryption and Potential Mechanisms for Authorized Government Access to Plaintext: Proceedings of a Workshop
- Exploring Privacy: A Roundtable Series
- Exploring Privacy and Data Security Costs-A Summary of a Workshop
- Exploring Special Purpose National Bank Charters for Fintech Companies
- Exploring the Digital Nation: America's Emerging Online Experience
- Explosive detection system
- Explosives trace detection
- Exponential growth
- Exponential technologies
- Export
- Export-controlled information
- Export Administration Act of 1979
- Export Administration Regulations
- Export Control Automated Support System
- Export Control Classification Number
- Export Control of High Performance Computing: Analysis and Alternative Strategies
- Export Controls: Agencies Should Assess Vulnerabilities and Improve Guidance for Protecting Export-Controlled Information at Companies
- Export Controls: Agency Actions and Proposed Reform Initiatives May Address Previously Identified Weaknesses, but Challenges Remain
- Export Controls: Proposed Reforms Create Opportunities to Address Enforcement Challenges
- Export Controls: Sale of Telecommunications Equipment to China
- Export Controls: System for Controlling Exports of High Performance Computing is Ineffective
- Export Enforcement Coordination Center
- Export Promotion: Status of Commerce’s Worldwide Automated Commercial Information Management System
- Export Promotion Data System
- Export control document
- Export control laws
- Export control violations
- Export controlled information
- Export controls
- Export license
Advertisement
34,539
pages
Local Sitemap
Advertisement