- IVI
- IWF
- IWS
- Ibero-American Data Protection Network
- Iceland the e-Nation: Icelandic Government Policy on the Information Society 2008–2012
- Icon
- Idaho National Laboratory
- Idea
- Idea-expression dichotomy
- IdeaScale
- Identifiability
- Identifiable
- Identifiable form
- Identifiable person
- Identification
- Identification and Authentication
- Identification card
- Identification disclosure risk
- Identification document
- Identification rate
- Identification system
- Identification tool
- Identified
- Identified information
- Identified visitor
- Identifier
- Identifier broadcasting
- Identifier format
- Identifying Computer Data Bases To Aid Congressional Oversight on the Needs of Older Americans
- Identifying Hoaxes and Urban Legends
- Identifying information
- Identifying material
- Identity
- Identity, Credential, and Access Management
- Identity-Based Key Management
- Identity-Related Crime: A Threat Assessment
- Identity-based access control
- Identity-based authentication
- Identity-based encryption
- Identity-based encryption system
- Identity-based security policy
- Identity-related crime
- Identity Cards Programme Team
- Identity Credential and Access Management Subcommittee
- Identity Crisis ... What to Do If Your Identity is Stolen
- Identity Ecosystem
- Identity Ecosystem Framework
- Identity Ecosystem Steering Group
- Identity Federation Framework
- Identity Issues Task Force
- Identity Protection Personal Identification Number
- Identity Protection and Management Senior Coordinating Group
- Identity Shield
- Identity Theft: Does Risk Vary with Demographics?
- Identity Theft: Innovative Solutions for an Evolving Problem
- Identity Theft: Total Extent of Refund Fraud Using Stolen Identities is Unknown
- Identity Theft: Trends and Issues
- Identity Theft Advisory Council
- Identity Theft Assistance Center
- Identity Theft Data Clearinghouse
- Identity Theft Enforcement Interagency Working Group
- Identity Theft Enforcement and Protection Act
- Identity Theft Enforcement and Restitution Act of 2008
- Identity Theft Passport
- Identity Theft Penalty Enhancement Act of 2004
- Identity Theft Resource Center
- Identity Theft Services: Services Offer Some Benefits but Are Limited in Preventing Fraud
- Identity Theft Technology Council
- Identity Theft and Assumption Deterrence Act of 1998
- Identity Theft and Pretext Calling
- Identity and Access Management for Electric Utilities
- Identity and access management
- Identity assurance
- Identity authentication
- Identity binding
- Identity broker
- Identity card
- Identity claim
- Identity confidentiality
- Identity credential
- Identity crime
- Identity domain
- Identity federation
- Identity fraud
- Identity governance
- Identity history data
- Identity in the Age of Cloud Computing: The Next-generation Internet's Impact on Business, Governance and Social Interaction
- Identity information
- Identity intelligence
- Identity management
- Identity management system
- Identity medium
- Identity of Things
- Identity proofing
- Identity provider
- Identity registration
- Identity security
- Identity service provider
- Identity superiority
- Identity theft
- Identity theft insurance
- Identity theft service
- Identity verification
- Identity vetting
- Identitytheft.gov
- Identrus
- IeRoadmap
- If It's in the Cloud, Get It on Paper: Cloud Computing Contract Issues
- If You See Something, Say Something
- Ignalina nuclear power plant
- Illegal
- Illegal Gambling Business Act
- Illegal and Harmful Content on the Internet
- Illegal and Harmful Use of the Internet: First Report of the Working Group
- Illicit international gambling
- Illicit transshipment
- Illinois Tool Works v. Independent Ink
- Illusory promise
- Illustrative evidence
- ImOn v. ImaginOn
- Image
- ImageNet Large Scale Visual Recognition Challenge
- Image Online Design v. CORE Associates
- Image acquisition
- Image archive
- Image authentication
- Image capture
- Image compression
- Image data
- Image enhancement
- Image exchange
- Image manipulation
- Image mining
- Image processing
- Image recognition
- Image search
- Image search engine
- Image sensor
- Image tagging
- Imagery
- Imagery-derived product
- Imagery exploitation
- Imagery for the Nation
- Imagery intelligence
- Imagery management
- Imagery support requirement
- Imaging
- Imaging device
- Imaging system
- Imagining the Internet Center
- Imitation game
- Imitative communications deception
- Imitative electromagnetic deception
- Immediate Opportunities for Strengthening the Nation's Cybersecurity
- Immediate message
- Immersion
- Immersive technology
- Immigration and Asylum Fingerprint System
- Immigration and Customs Enforcement
- Immigration and Naturalization Service Data Management Improvement Act of 2000
- Immigration data
- Immortal
- Immunity
- Immunomedics v. Doe
- Immutable audit log
- Impact
- Impact Assessment Accompanying the document Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
- Impact Assessment on the Cross Border Online Access to Orphan Works
- Impact Assessment supporting the Commission Recommendation on the digitisation and online accessibility of cultural material and digital preservation
- Impact assessment
- Impact level
- Impact value
- Impacts of Video Games
- Impairment
- Impartial
- Impersonate
- Impersonation
- Implant
- Implement
- Implementation Guidance for Title V of the E-Government Act, Confidential Information Protection and Statistical Efficiency Act of 2002
- Implementation Guidelines for the Principles on Freedom of Expression and Privacy
- Implementation of Bank Secrecy Act's Reporting Requirements
- Implementation of Commission Recommendation on the digitisation and online accessibility of cultural material and digital preservation
- Implementation of the Executive Order (E.O. 13526)
- Implementation of the Government Paperwork Elimination Act
- Implementation of the Privacy Act of 1974, Supplemental Guidance
- Implementation of the Privacy Act of 1974: Supplemental Guidance
- Implementation of the Telecommunications Act of 1996: Telecommunications Carriers’ Use of Customer Proprietary Network Information and Other Customer Information
- Implementation phase
- Implementation plan
- Implementation profile
- Implementer
- Implementing Instruction For Information Warfare/Command And Control Warfare (IW/C2W)
- Implementing Privacy Policy in Justice Information Sharing
- Implementing Recommendations of the 9/11 Commission Act of 2007
- Implementing Strategic Sourcing
- Implementing Trusted Geolocation Services in the Cloud
- Implementing a Trusted Information Sharing Environment Implementing an Information Sharing Environment
- Implementing the Children's Online Privacy Protection Act
- Implementing the OECD "Privacy Guidelines" in the Electronic Environment: Focus on the Internet
- Implications of Artificial Intelligence for Cybersecurity
- Implications of Electronic Mail and Message Systems for the U.S. Postal Service
- Implications of Electronic Mail for the Postal Service's Work Force
- Implications of Electronic Mail for the Postal Service’s Work Force
- Implications of Recent Web Technologies for NARA Web Guidance
- Implicit
- Implicit consent
- Implicit georeferencing
- Implied-in-fact contract
- Implied authority
- Implied consent
- Implied contract
- Implied covenant of good faith and fair dealing
- Implied license
- Implied warranties
- Implied warranty of fitness for a particular purpose
- Implied warranty of merchantability
- Implied warranty of title
- Import
- Import Alerts Tracking System
- Import duty
- Import quota
- Importation
- Importer
- Importing
- Impossibility
- Imposter
- Imposter base rate
- Impostor
- Impoundment
- Impression
- Imprint
- Improper authentication
- Improper means
- Improper usage
- Improved-definition television
- Improved FedCIRC Incident Reporting System
- Improved data modem
- Improvement
- Improvement patent
- Improvements Needed in Managing Automated Decisionmaking by Computers Throughout the Federal Government
- Improvements Needed in the Tennessee Valley Authority's Management and Use of Its Automatic Data Processing Resources
- Improving Access to and Confidentiality of Research Data: Report of a Workshop
- Improving COBOL Applications Can Recover Significant Computer Resources
- Improving Canada's Digital Advantage Strategies for Sustainable Prosperity
- Improving Consumer Mortgage Disclosures: An Empirical Assessment of Current and Prototype Disclosure Forms
- Improving Cybersecurity
- Improving Cybersecurity Protections in Federal Acquisitions
- Improving Cybersecurity and Resilience through Acquisition
- Improving Declassification
- Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery
- Improving Our Ability to Fight Cybercrime: Oversight of the National Infrastructure Protection Center
- Improving Rights-of-Way Management Across Federal Lands: A Roadmap for Greater Broadband Deployment
- Improving State Voter Registration Databases
- Improving our Nation's Cybersecurity Through the Public-Private Partnership
- Improving our Nation's Cybersecurity through the Public‐Private Partnership: A White Paper
- Improving the Security of Consumer Financial Transactions
- Impulsive emanation
- Imputability
- Imputation
- Imputed knowledge
Advertisement
34,539
pages
Local Sitemap
Advertisement