Search results

Jump to navigation Jump to search
  • ...CAP replaced the former process, known as '''DITSCAP''' ('''Department of Defense Information Technology Security Certification and Accreditation Process''') ...(AIS) that will maintain the [[Information Assurance]] (IA) posture of the Defense Information Infrastructure (DII) throughout the [[Systems Development Life ...
    2 KB (229 words) - 10:14, 15 April 2012
  • ...[[Cyber security certification|certification]] and [[accreditation]] (C&A) of a DoD IS that will maintain the [[information assurance]] (IA) posture thro DIACAP is the result of a [[NSA]] directed shift in underlying security paradigm and succeeds its p ...
    2 KB (322 words) - 10:16, 15 April 2012
  • ...in the executive branch of the Government (including the Executive Office of the President), or any independent regulatory agency, but does not include— ...District of Columbia and of the territories and possessions of the United States, and their various subdivisions; or ...
    5 KB (795 words) - 00:35, 1 June 2010
  • ...the same and fails to deliver it to the officer or employee of the United States entitled to receive it;<br> ...d issuer as defined in section 1602(n) of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • ...nacted a series of legislation to limit the distribution and accessibility of PII. ...dentity, clearly class as PII under the definition used by the U.S. Office of Management and Budget (described in detail below): ...
    12 KB (1,899 words) - 12:24, 12 November 2011
  • ...by the [[Identity Theft Enforcement and Restitution Act]]. Subsection (b) of the act punishes anyone who not just commits or attempts to commit an offen ...usively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or ...
    14 KB (2,101 words) - 11:35, 27 August 2011
  • ...court, including hearsay and the foundation to establish the authenticity of computer records. ...the term has the connotation of a positive declaration." See, e.g., United States v. Lewis, 902 F.2d 1176, 1179 (5th Cir. 1990); Lexington Ins. Co. v. W. Pen ...
    43 KB (6,432 words) - 13:22, 5 August 2011
  • ...ates Code]] to extend the reach of copyright, while limiting the liability of the Online service provider for [[copyright infringement]] by their users. ...ally requires separate legislation by or within each of the Union's member states.) ...
    26 KB (3,969 words) - 11:00, 30 October 2011
  • ...hile the CFAA is primarily a criminal law intended to reduce the instances of malicious interferences with computer systems and to address federal comput '''Types of Offenses (7 Prohibitions)''' ...
    53 KB (7,910 words) - 21:25, 13 April 2011
  • ...ular telephone to determine the suspect's approximate location at the time of a call. Agents may wish to wiretap a suspect's telephone or learn whom the ...al liability, and in the case of Title III, may also result in suppression of evidence. ...
    97 KB (14,928 words) - 13:21, 5 August 2011
  • ...[[George W. Bush|President George W. Bush]] on October 26, 2001. The title of the act is a ten letter acronym (USA PATRIOT) that stands for: ...g Appropriate Tools Required (to) Intercept (and) Obstruct Terrorism ''Act of 2001''.<ref>[[Public Law]] {{USPL|107|56}}</ref> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...mputer search warrant and affidavit. Section D addresses forensic analysis of the media. Section E discusses challenges to the search process. Finally, S ...search strategy should be chosen after considering the many possible roles of the computer in the offense: ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...vidence without a warrant. This chapter explains the constitutional limits of warrantless searches and seizures in cases involving computers. The Fourth Amendment states: ...
    154 KB (23,956 words) - 13:16, 5 August 2011