- Project MINARET
- Project Management Life Cycle
- Project Matrix
- Project Maven
- Project Open Data
- Project Runeberg
- Project SafeBid
- Project Safe Childhood Initiative
- Project Status Reporting and Enterprise Architecture Reporting
- Project Whirlwind
- Project Xanadu
- Project champion
- Project coordination
- Project management
- Project monitoring and control
- Project on Cybercrime — Final Report (September 2006-February 2009)
- Project on Emerging Nanotechnologies
- Project team
- Project team leader
- Project to Improve the ADP System Analysis and Computer Programming Capability of the Federal Government
- Projected threat
- Projection
- Promatek v. Equitrac
- Prominently disclosed
- Promiscuous mode
- Promise and Problems of E-Democracy: Challenges of Online Citizen Engagement
- Promissory estoppel
- Promoting Confidence in Electronic Commerce: Legal Issues on International Use of Electronic Authentication and Signature Methods
- Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems
- Promoting Global Internet Freedom: Policy and Technology
- Promoting Health/Protecting Privacy: A Primer
- Promoting Innovation and Economic Security through Broadband Technology
- Promoting Private Sector Cybersecurity Information Sharing
- Promoting Public Safety, Privacy, and the Rule of Law Around the World: The Purpose and Impact of the CLOUD Act
- Promotion of Activities Relating to Combating Cybercrime, Including Technical Assistance and Capacity-building
- Promotion of FDA-Regulated Medical Products Using the Internet and Social Media Tools
- Promotion of FDA-Regulated Medical Products on the Internet
- Promotional
- Pron
- Proof of concept
- Proof of correctness
- Proof of possession protocol
- Propaganda
- Propagate
- Propagation
- Proper party
- Property damage
- Property data
- Property manager
- Property tax
- Proportionality principle
- Proposal
- Proposal for a Directive of the European Parliament and of the Council concerning measures to ensure a high common level of network and information security across the Union
- Proposal for a Directive of the European Parliament and of the Council on Attacks Against Information Systems
- Proposal for a Directive of the European Parliament and of the Council on copyright in the Digital Single Market
- Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data
- Proposal for a Directive on a Common Regulatory Framework for Electronic Communications Networks and Services
- Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data
- Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation)
- Proposal to Transition the Stewardship of the Internet Assigned Numbers Authority (IANA) Functions
- Proposed Guidance for Firms Outsourcing to the ‘Cloud’ and Other Third-party IT Services
- Proposed Guidance on the Computer Matching and Privacy Protection Amendments of 1990
- Proposed Regulatory Framework for Modifications to Artificial Intelligence/Machine Learning (AI/ML)-Based Software as a Medical Device (SaMD)
- Proposed Revision of the Policy on Web Tracking Technologies for Federal Web Sites
- Proposed Security Assessment & Authorization for U.S. Government Cloud Computing
- Proprietary
- Proprietary business information
- Proprietary content
- Proprietary information
- Proprietary operating system vendor
- Proprietary privacy
- Proprietary protocol
- Proprietary rights
- Proprietary software model
- Proprietary specification
- Proprietary standard
- Proprietary technology
- Proprietary technology and economic information
- Proprietary technology data
- Proprietary viewer
- Prosecuting Computer Crimes
- Prosecuting Intellectual Property Crimes
- Prosecution
- Prosecution history
- Prosecution laches
- Prosecutor
- Prospect information
- Protect
- Protect America Act of 2007
- Protected Critical Infrastructure Information Program
- Protected Critical Infrastructure Information Program Procedures Manual
- Protected Cyber Asset
- Protected Network Services List
- Protected as restricted data
- Protected computer
- Protected critical infrastructure information
- Protected distribution system
- Protected frequencies
- Protected health information
- Protected information
- Protected speech
- Protected system
- Protected work
- Protecting Aggregated Data
- Protecting America's Freedom in the Information Age
- Protecting Australian Families Online Direction No. 2 of 2007
- Protecting Children in the 21st Century Act
- Protecting Children’s Privacy Under COPPA: A Survey on Compliance
- Protecting Classified Information and the Rights of Criminal Defendants: The Classified Information Procedures Act
- Protecting Consumer Information: Can Data Breaches Be Prevented?
- Protecting Consumer Privacy in an Era of Rapid Change: A Proposed Framework for Businesses and Policymakers
- Protecting Consumer Privacy in an Era of Rapid Change: Recommendations for Business and Policy Makers
- Protecting Consumers & Promoting Innovation Online: A Call for Baseline Privacy Legislation
- Protecting Consumers Online
- Protecting Consumers from Cyberfraud
- Protecting Consumers in the Next Tech-ade
- Protecting Data Privacy in Health Services Research
- Protecting Europe Against Large-scale Cyber-attacks
- Protecting Europe From Large Scale Cyber-attacks and Cyber-disruptions: Enhancing Preparedness, Security and Resilience
- Protecting Europe from Large Scale Cyber-attacks and Disruptions: Enhancing Preparedness, Security and Resilience
- Protecting Government Information: Independent Review of Government Information Assurance
- Protecting Individual Privacy in the Struggle Against Terrorists: A Framework for Program Assessment
- Protecting Innovation Through Trade Secrets and Patents-Determinants for European Union Firms
- Protecting Kids' Privacy Online: Reviewing the COPPA Rule
- Protecting Mobile Privacy: Your Smartphones, Tablets, Cell Phones and Your Privacy
- Protecting Networks via Automated Defense of Cyber Systems
- Protecting Personal Information: A Guide for Business
- Protecting Portable Devices: Data Security
- Protecting Portable Devices: Physical Security
- Protecting Privacy From Aerial Surveillance: Recommendations for Government Use of Drone Aircraft
- Protecting Privacy in Computerized Medical Information
- Protecting Privacy on the Internet: A Summary of Legislative Proposals
- Protecting Sensitive Compartmented Information within Information Systems
- Protecting Student Privacy While Using Online Educational Services: Model Terms of Service
- Protecting Student Privacy While Using Online Educational Services: Requirements and Best Practices
- Protecting Systems Task Force Report on Enhancing the Nation's Network Security Efforts
- Protecting Your Privacy
- Protecting Youths in an Online World
- Protecting our Information Systems
- Protecting the Security of Education Records
- Protecting the United States Advantage in Artificial Intelligence and Related Critical Technologies
- Protection
- Protection from Harrassment Act 1997
- Protection level
- Protection of "Critical Infrastructure" and the Role of Investment Policies Relating To National Security
- Protection of Children's Privacy on the World Wide Web
- Protection of Children Act 1978
- Protection of Children Online: Federal and State Laws Addressing Cyberstalking, Cyberharassment, and Cyberbullying
- Protection of Children from Sexual Predators Act of 1998
- Protection of Classified Information by Congress: Practices and Proposals
- Protection of Digital Computer and Communication Systems and Network
- Protection of Digital Computer and Communications Systems and Networks
- Protection of Freedoms Act 2012: Draft statutory guidance on the making or renewing of national security determinations allowing the retention of biometric data
- Protection of Human Subjects
- Protection of Information Systems Outside the Continental United States (OCONUS)
- Protection of Privacy and Access to Individual Records Under the Privacy Act of 1974
- Protection of Pupil Rights Amendment
- Protection of Workers' Personal Data
- Protection of minors
- Protection philosophy
- Protection profile
- Protection schema
- Protective Security Advisor
- Protective Security Advisor Program
- Protective Security Manual
- Protective Security Policy Framework
- Protective intelligence
- Protective order
- Protective packaging
- Protective technologies
- Protest
- Protocol
- Protocol analyzer
- Protocol data unit
- Protocol entity
- Protocol exploitation
- Protocol interaction
- Protocol of intelligence collection
- Protocol run
- Protocol specification
- Protocol stack
- Protocol suite
- Protocol transparency
- Prototype
- Prototyping
- Provable prime
- Provenance
- Provenance information
- Providence Washington Insurance v. Volpy & Koenig
- Provider of electronic communications to the public
- Provider of physical transport
- Provisional Checklist for Software Conversion Projects
- Provisional patent application
- Provisional security impact level
- Provisioned IT service
- Provisioning
- Provisions on Protection of Personal Information of Telecommunications and Internet Users
- Provisions on the Governance of the Online Information Content Ecosystem
- Proximate cause
- Proximity
- Proximity card
- Proximity detector
- Proximity payment
- Proximity sensing
- Proximity token
- Proxy
- Proxy agent
- Proxy attack
- Proxy server
- Proxy service
- Prurient
- Prurient interest
- Pseudo-flaw
- Pseudo-transparency
- Pseudo Automatic Number Identification
- Pseudocode
- Pseudoflaw
- Pseudonym
- Pseudonymisation
- Pseudonymity
- Pseudonymization
- Pseudonymized data
- Pseudonymous data
- Pseudonymous remailer
- Pseudonymous work
- Pseudorandom
- Pseudorandom number generator
- Psychographic data
- Psychological consequence
- Psychological effect
- Psychological media
- Psychological operations
- Psychological warfare
- PubSubHubbub
- Public
- Public-Private Sector Intelligence Coordination
- Public-private partnership
- Public/private authentication key pair
- Public/private key establishment pair
- Public/private partnership
- Public/private signature key pair
- Public Broadcasting Service
- Public Cloud Service Agreements: What to Expect and What to Negotiate
- Public Company Accounting Oversight Board
- Public Cryptography Study Group
- Public Domain Images
- Public Domain Review
- Public Health Informatics Institute
- Public Health Informatics and Technology Program Office
- Public Health Information Network
- Public Health Information Network Messaging System
- Public Health Information Rapid Exchange
- Public Health Security and Bioterrorism Preparedness and Response Act of 2002
- Public Intelligence
- Public Interest Declassification Act of 2000
- Public Interest Declassification Board
- Public Interest Declassification Board Reauthorization Act of 2012
- Public Interest Registry
- Public Internet Registry
- Public Key Cryptography Standard
- Public Key Infrastructure (PKI) Guidelines: Guidelines for Schemes to Issue Certificates Capable of Being Used in Cross-Jurisdiction eCommerce
- Public Knowledge
- Public Land Survey System
- Public Media 2.0
- Public Notice
- Public Order Act 1986
- Public Participation Project
- Public Relations Society of America v. Road Runner High Speed Online
- Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps
- Public Response to Alerts and Warnings on Mobile Devices: Summary of a Workshop on Current Knowledge and Research Gaps
- Public Safety & Homeland Security Bureau
- Public Safety Communications Research program
- Public Safety Communications Standards Program
- Public Safety Radio Communications Project
- Public Safety Spectrum Trust
- Public Safety Spectrum Trust Corporation
- Public Safety Wireless Advisory Committee
- Public Safety Wireless Network
- Public Safety and Emergency Preparedness Canada
- Public Sector Information: A Key Resource for Europe
- Public Sector Innovation and e-Government
- Public Sector Modernisation: Open Government
- Public Sector Transparency Board
- Public Service Co. v. Nexus Energy Software
- Public Service Wireless Advisory Committee
- Public Source Information Program
- Public Switched Network
- Public Switched Network Best Practices Security Primer
- Public Switched Network Security Assessment Guidelines
Advertisement
34,539
pages
Local Sitemap
Advertisement