- Privacy and the National Information Infrastructure: Principles for Providing and Using Personal Information
- Privacy and the WHOIS database
- Privacy awareness campaign
- Privacy browsing mode
- Privacy by Design: Achieving the Gold Standard in Data Protection for the Smart Grid
- Privacy by Design and Smart Metering: Minimize Personal Information to Maintain Privacy
- Privacy by ReDesign: Building a Better Legacy
- Privacy by design
- Privacy compliance
- Privacy compromise
- Privacy control
- Privacy controls
- Privacy data
- Privacy disclosure
- Privacy enforcement authority
- Privacy engineering
- Privacy field
- Privacy footprint
- Privacy fundamentalist
- Privacy impact assessment
- Privacy in Cloud Computing
- Privacy in a Wireless World
- Privacy in the Clouds: Risks to Privacy and Confidentiality from Cloud Computing
- Privacy incident
- Privacy leakage
- Privacy management
- Privacy mode
- Privacy notice
- Privacy of Data from Event Data Recorders: State Statutes
- Privacy on the Go: Recommendations for the Mobile Ecosystem
- Privacy organizations
- Privacy policy
- Privacy policy generator
- Privacy pragmatist
- Privacy preserving data mining
- Privacy preserving data publishing
- Privacy protection
- Privacy protective behavior
- Privacy risk
- Privacy risk assessment tool
- Privacy seal program
- Privacy sensitive system
- Privacy settings
- Privacy standard
- Privacy statement
- Privacy system
- Privacy tipping points
- Privacy unconcerned
- Privacy‐enhancing technologies
- Privacy browsing mode
- Private-public key pair
- Private-sector standards
- Private Industry Notification
- Private Internet Exchange
- Private LOCKSS Network
- Private Lives and Public Policies: Confidentiality and Accessibility of Government Statistics
- Private browsing
- Private cloud
- Private content
- Private currency
- Private entity
- Private home viewing
- Private information
- Private information retrieval
- Private key
- Private key cryptography
- Private line service
- Private mobile radio
- Private network
- Private ordering
- Private peering
- Private peering point
- Private secret
- Private sector
- Private sector council
- Private standard-setting
- Privateering
- Privatizing
- Privilege
- Privilege-management infrastructure
- Privilege elevation
- Privilege escalation
- Privilege management
- Privileged
- Privileged access
- Privileged account
- Privileged command
- Privileged instructions
- Privileged process
- Privileged user
- Privity of contract
- Privy Council Office
- Pro-competitive
- ProCD v. Zeidenberg
- ProPublica
- Pro forma
- Pro hac vice
- Pro rata
- Pro se
- Proactive
- Proactive Network Operations
- Proactive Policy Measures by Internet Service Providers Against Botnets
- Proactive cyber defense
- Proactive network defense
- Probabilistic identifier
- Probability
- Probable
- Probable cause
- Probable prime
- Probation
- Probative
- Probative data
- Probative value
- Probe
- Problem Statement
- Problem profile
- Problematic data action
- Problems Associated With Computer Technology in Federal Programs and Private Industry
- Problems and Progress of the U.S. Army Materiel Command's Automated Data Processing Service Center Concept
- Procedural due process
- Procedural failure
- Procedural security
- Procedural unconscionability
- Procedure
- Procedures and Guidance; Implementation of the GPEA
- Procedures for the Review and Dissemination of CBP Information Containing ISR Data
- Proceedings: Technology and Governance in the 1990s. Papers Presented at the OTA 20th Anniversary Forum on Technology and Governance in the 1990s
- Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy
- Process
- Process Patent Amendments Act of 1988
- Process claim
- Process control
- Process control system
- Process controller
- Process dictionary
- Process e-commerce
- Process evaluation
- Process for Requesting Waivers for Continued Use of Unsupported COTS Software
- Process innovation
- Process metadata
- Process server
- Processing
- Processing, exploitation, and dissemination
- Processing, of or in relation to information or data
- Processing and exploitation
- Processing in a Collaborative Environment
- Processing of personal data
- Processing power
- Processing time
- Processing year
- Processor
- Processor register
- Processor serial number
- Processsing power
- Proclamation
- Procure
- Procure 2 Pay
- Procure Secure: A Guide to Monitoring of Security Service Levels in Cloud Contracts
- Procured product
- Procurement
- Procurement Directive 2004/18/EC
- Procurement Executive Council
- Procurement Round Table
- Procurement cost
- Procurement fraud
- Procurement system
- Procurement technical evaluation
- Procuring Contracting Officer
- Prodigy
- Producers Guild of America
- Product acceptance test
- Product activation
- Product baseline
- Product claim
- Product data management
- Product description
- Product endorsement
- Product innovation
- Product liability
- Product mark
- Product placement
- Product release
- Product security evaluation
- Product standard
- Production
- Production master file
- Production requirement
- Production standard
- Productivity
- Productivity and Innovation Credit (PIC) Scheme (2010)
- Productivity paradox
- Productivity software
- Products Liability and Driverless Cars: Issues and Guiding Principles for Legislation
- Profession
- Professional Audio/Video Schedule Contract
- Professional analog video cassette recorder
- Professional malpractice
- Professional model product
- Professionalizing the Nation's Cybersecurity Workforce?: Criteria for Decision-Making
- Professionalizing the Nation’s Cybersecurity Workforce? Criteria for Decision-Making
- Profile
- Profile-squatting
- Profile Publishing v. Musicmaker.com
- Profiling
- Profits
- Prognostics
- Program
- Program Against Digital Counterfeiting of Currency
- Program Executive Office Command Control Communications-Tactical
- Program Executive Office Enterprise Information Systems
- Program Executive Office Intelligence, Electronic Warfare and Sensors
- Program Management Office
- Program Manager
- Program Manager for the Information Sharing Environment
- Program analyzer
- Program description
- Program development process
- Program file
- Program infector
- Program library
- Program management
- Program of record
- Program on Information Resources Policy
- Program on Networked Governance
- Program optimizer
- Program policy
- Program records
- Program review
- Program statement
- Programmability
- Programmable
- Programmable automation
- Programmable communicating thermostat
- Programmable logic controller
- Programmable read-only memory
- Programme on information-secure electronic services
- Programmed
- Programmer
- Programming
- Programming Computation on Encrypted Data
- Programming language
- Programming model
- Programming tool
- Progress Report of the Department of Justice's Task Force on Intellectual Property
- Progress Report of the Department of Justice’s Task Force on Intellectual Property
- Progress Report on Implementing the Government Paperwork Elimination Act
- Progress Report on Implementing the Government Paperwork Elimination Act (2001)
- Progress Report on Implementing the Government Paperwork Elimination Act (2002)
- Progress Report on Implementing the Government Paperwork Elimination Act (2003)
- Progress and Challenges Faced in Strengthening Three Key Security Programs
- Progress and Freedom Foundation
- Progress and Research in Cybersecurity
- Progress payment
- Progressive encroachment
- Progressive scan
- Project
- Project 25
- Project FairWeb
- Project Grey Goose
- Project Gutenberg
- Project Life Cycle Framework
- Project Looking Forward - Sketching the Future of Copyright in a Network World
- Project Loon
- Project MAC
- Project MESA
- Project MINARET
- Project Management Life Cycle
- Project Matrix
- Project Maven
- Project Open Data
- Project Runeberg
Advertisement
34,539
pages
Local Sitemap
Advertisement