Pages with the most revisions
Jump to navigation
Jump to search
Showing below up to 500 results in range #551 to #1,050.
- Sample Vulnerability Management Standard: (2 revisions)
- Sarbanes-Oxley (2 revisions)
- Sarbanes-Oxley Policy Samples: (2 revisions)
- Spam (2 revisions)
- The Copyright Act (2 revisions)
- The HIPAA Security and the Risk Dilemma: (2 revisions)
- The Stored Communications Act (2 revisions)
- USAM 9-7.200 (2 revisions)
- USC 18 1030 (2 revisions)
- USC 2701 (2 revisions)
- Uniform Computer Information Transactions Act (2 revisions)
- 25 (1 revision)
- 26 (1 revision)
- 27 (1 revision)
- 28 (1 revision)
- 29 (1 revision)
- 3 (1 revision)
- 3.2.2.3: Mainframe (1 revision)
- 30 (1 revision)
- 31 (1 revision)
- 31 CFR 1010.340 (1 revision)
- 31 CFR 10331 (1 revision)
- 31 CFR 501.601 (1 revision)
- 31 USC 5321 (1 revision)
- 32 (1 revision)
- 33 (1 revision)
- 34 (1 revision)
- 35 (1 revision)
- 4 (1 revision)
- 42 USC 4212 f 10 (1 revision)
- 44 USC 3502 (1 revision)
- 44 USC 3531 (1 revision)
- 44 USC 3532 (1 revision)
- 44 USC 3533 (1 revision)
- 44 USC 3534 (1 revision)
- 44 USC 3535 (1 revision)
- 44 USC 3536 (1 revision)
- 44 USC 3537 (1 revision)
- 44 USC 3538 (1 revision)
- 44 USC 3541 (1 revision)
- 44 USC 3543 (1 revision)
- 44 USC 3544 (1 revision)
- 44 USC 3545 (1 revision)
- 44 USC 3546 (1 revision)
- 44 USC 3547 (1 revision)
- 44 USC 3548 (1 revision)
- 44 USC 3549 (1 revision)
- 5 (1 revision)
- 6 (1 revision)
- 7 (1 revision)
- 8 (1 revision)
- 9 (1 revision)
- AI1.3: (1 revision)
- AI1.4: (1 revision)
- AI1: (1 revision)
- AI2: (1 revision)
- AI3: (1 revision)
- AI4.1: (1 revision)
- AI4.3: (1 revision)
- AI4.4: (1 revision)
- AI4: (1 revision)
- AI5.2: (1 revision)
- AI5.5: (1 revision)
- AI5.6: (1 revision)
- AI5: (1 revision)
- AI6: (1 revision)
- AI7.10: (1 revision)
- AI7.11: (1 revision)
- AI7.1: (1 revision)
- AI7.2: (1 revision)
- AI7.4: (1 revision)
- AI7.8: (1 revision)
- AI7.9: (1 revision)
- AI7: (1 revision)
- AS8015 (1 revision)
- A Project Management Approach to eDiscovery (1 revision)
- Accountant witnesses (1 revision)
- Activities involving access devices and equipment (1 revision)
- Admission of evidence (1 revision)
- Advising client of attorney-client privilege (1 revision)
- Alibi (1 revision)
- Alibi witnesses (1 revision)
- Alteration (1 revision)
- American Bar Association Digital Signature Guidelines (1 revision)
- Anonymity (1 revision)
- Appearance of defendant before the grand jury (1 revision)
- Applicability of common-law sanctions (1 revision)
- Application of forensics to computers (1 revision)
- Arraignment; Pleas; Continuance of Case in general (1 revision)
- Asset Classification and Control: (1 revision)
- Authority (1 revision)
- Availability Management: (1 revision)
- Avoiding generalization based on appearance (1 revision)
- Awareness Articles and Information: (1 revision)
- BS 25999 (1 revision)
- BS 7799 (1 revision)
- Best Practices Security Incident Response Program: (1 revision)
- Business Impact Analysis (1 revision)
- COBIT and COSO Framework Process Overview: (1 revision)
- Capacity Management: (1 revision)
- Child pornography legislation (1 revision)
- Children's Internet Protection Act (CIPA) (1 revision)
- Children's Online Protection Act (COPA) (1 revision)
- Civil consequences of plea or finding of guilt (1 revision)
- Civil remedies (1 revision)
- Click Wrap Licenses (1 revision)
- Client Interview and Planning; Evaluating the Case in general (1 revision)
- Client interview checklist (1 revision)
- Clinger-Cohen-Act (1 revision)
- Collecting or securing payment of fee (1 revision)
- Communications Decency Act - Obscene Materials (1 revision)
- Computer (1 revision)
- Computer Crime Statues by State (1 revision)
- Computer Security Act 1987 (1 revision)
- Computer hardware (1 revision)
- Computer pornography (1 revision)
- Computer program (1 revision)
- Computer services (1 revision)
- Computer software (1 revision)
- Conferring with arrested client (1 revision)
- Conferring with probation officer (1 revision)
- Confidentiality (1 revision)
- Considerations as to arranging for surrender of defendant (1 revision)
- Content And Speech Regulation (1 revision)
- Copyright (1 revision)
- Copyright Fair Use (1 revision)
- Copyright Infringement Issues (1 revision)
- Copyright Non-Preemptable Common Law Claims (1 revision)
- Copyright Rights Acquisition (1 revision)
- Copyright Trespass to Chattels (1 revision)
- Copyright in General (1 revision)
- Credit card fraud (1 revision)
- Cross-examination of prosecution witnesses (1 revision)
- Cross-examination of prosecution witnesses for the Prosecution (1 revision)
- DITSCAP (1 revision)
- DS1.2: (1 revision)
- DS10.3: (1 revision)
- DS10.4: (1 revision)
- DS10: (1 revision)
- DS11.1: (1 revision)
- DS11: (1 revision)
- DS12.1: (1 revision)
- DS12.4: (1 revision)
- DS12: (1 revision)
- DS13.2: (1 revision)
- DS13.3: (1 revision)
- DS13.4: (1 revision)
- DS13.5: (1 revision)
- DS13: (1 revision)
- DS3.1: (1 revision)
- DS3.2: (1 revision)
- DS3.3: (1 revision)
- DS3.5: (1 revision)
- DS4.7: (1 revision)
- DS4.8: (1 revision)
- DS5.11: (1 revision)
- DS5.4: (1 revision)
- DS5.6: (1 revision)
- DS5.7: (1 revision)
- DS5.8: (1 revision)
- DS6: (1 revision)
- DS7: (1 revision)
- DS8: (1 revision)
- DS9: (1 revision)
- Damage to computer or component (1 revision)
- Data; intellectual property (1 revision)
- Data Privacy Laws and Regulations (1 revision)
- Data Terminology (1 revision)
- Dealing with difficult technical information (1 revision)
- Dealing with pretrial publicity (1 revision)
- Dealing with reluctant witnesses (1 revision)
- Deciding on the plea (1 revision)
- Defamation (1 revision)
- Defamation In Cyberspace (1 revision)
- Defamation in General (1 revision)
- Defendant as a witness (1 revision)
- Defense Summation in general (1 revision)
- Defense discovery options (1 revision)
- Defense motion to dismiss charges (1 revision)
- Demurrer to complaint; pleas (1 revision)
- Determining Defenses in general (1 revision)
- Determining client's ability to pay fee (1 revision)
- Determining factors (1 revision)
- Determining the plea (1 revision)
- Difficulties in the admissibility of evidence (1 revision)
- Direct Mail Sales On The Web (1 revision)
- Directive 95/46/EC (1 revision)
- Discrediting expert witnesses (1 revision)
- Discrediting expert witnesses—Illustrative cross-examination of systems analyst (1 revision)
- Drafting instructions to jury—Alteration with intent to injure or defraud (1 revision)
- Drafting instructions to jury—Computer damage (1 revision)
- Drafting instructions to jury—Computer theft—access (1 revision)
- Drafting instructions to jury—Taking, transferring, concealing, or retaining (1 revision)
- Drafting instructions to jury—key terms (1 revision)
- Economic Espionage Act of 1996 (1 revision)
- Electronic Communications Privacy Act (1 revision)
- Electronic Surveillance in Communications Networks (1 revision)
- Electronic data interchange (1 revision)
- Eliciting promise to require independent conviction by each juror (1 revision)
- Entrapment (1 revision)
- Evaluating defendant's attitude toward computer victim (1 revision)
- Evaluating defendant's version of facts (1 revision)
- Evaluating defendant as a witness (1 revision)
- Evidence (1 revision)
- Evidence presented to the grand jury (1 revision)
- Examining Police Reports, Records, and Photographs in general (1 revision)
- Exclusion of witnesses and the press during testimony (1 revision)
- Experts (1 revision)
- FN57 (1 revision)
- FN58 (1 revision)
- FN59 (1 revision)
- FN60 (1 revision)
- FN61 (1 revision)
- FN62 (1 revision)
- FN63 (1 revision)
- FN64 (1 revision)
- FN65 (1 revision)
- FN66 (1 revision)
- FN67 (1 revision)
- FN68 (1 revision)
- FN70 (1 revision)
- FN71 (1 revision)
- FN72 (1 revision)
- FN73 (1 revision)
- FN74 (1 revision)
- FN75 (1 revision)
- FN76 (1 revision)
- FN77 (1 revision)
- FN78 (1 revision)
- FN79 (1 revision)
- FN80 (1 revision)
- FN81 (1 revision)
- FN82 (1 revision)
- FN83 (1 revision)
- FN84 (1 revision)
- FN85 (1 revision)
- FN86 (1 revision)
- FN87 (1 revision)
- FN88 (1 revision)
- FN89 (1 revision)
- FN90 (1 revision)
- FN91 (1 revision)
- FN92 (1 revision)
- FN93 (1 revision)
- FN94 (1 revision)
- FN95 (1 revision)
- FN96 (1 revision)
- FN97 (1 revision)
- FN98 (1 revision)
- FN99 (1 revision)
- Facilitating crime (1 revision)
- Factors affecting amount of fee (1 revision)
- Factors determining extent of cross-examination (1 revision)
- Fair Credit Reporting Act (1 revision)
- Federal Child pornography legislation (1 revision)
- Fees and Costs in general (1 revision)
- Fifth Amendment (1 revision)
- Financial instrument (1 revision)
- Fingerprints and handwriting (1 revision)
- First Amendment (1 revision)
- Florida DOI: (1 revision)
- Foreign Privacy Laws vs. U.S. Discovery Obligations (1 revision)
- Former jeopardy (1 revision)
- Fraud (1 revision)
- Generalized Defamation Torts (1 revision)
- Generalized Intentional Torts (1 revision)
- Generalized Negligence Torts (1 revision)
- Generalized Strict Liability Torts (1 revision)
- Generalized Tort Remedies (1 revision)
- Generalized Torts Outline (1 revision)
- Georgia DOI: (1 revision)
- Getting it Right in Records Management (1 revision)
- Government Agency Regulation (1 revision)
- HIPAA Standard References: (1 revision)
- HITECH (1 revision)
- Hardening (1 revision)
- How Many Pages in a Gigabyte? (1 revision)
- Human Resources Security: (1 revision)
- ISO/IEC 38500 (1 revision)
- Identity (1 revision)
- Illegal gains (1 revision)
- Illustrative form; order fixing bail (1 revision)
- Illustrative form—Order for release on own recognizance (1 revision)
- Illustrative form—defendant's agreement to appear (1 revision)
- Illustrative summation (1 revision)
- Impeaching witnesses granted immunity; minors (1 revision)
- Impossibility (1 revision)
- In general (1 revision)
- In general; burden of proof (1 revision)
- In general; intangible nature of assets (1 revision)
- In general; locating witnesses (1 revision)
- In general; obtaining lesser charge (1 revision)
- In general; timing the appearance of defense witnesses (1 revision)
- Information Security Standards Sources: (1 revision)
- Information Technology Auditor's Glossary: (1 revision)
- Informing client of special costs (1 revision)
- Initial conference with defendant; information checklist (1 revision)
- Initial pre-arrest client interview (1 revision)
- Insanity (1 revision)
- Insurance: (1 revision)
- Intent (1 revision)
- Intent—Authorization (1 revision)
- Intent—Knowledge (1 revision)
- Intent—Malice (1 revision)
- Intent—Purpose (1 revision)
- International Content Regulation (1 revision)
- International Defamation Decisions (1 revision)
- Interviewing witnesses (1 revision)
- Introductory remarks to veniremen (1 revision)
- Investigating the Scene of Crime in general (1 revision)
- Judicial Decisions on CDA (1 revision)
- Jurors' views toward computers (1 revision)
- KY EXHIBIT C: (1 revision)
- KY MANAGEMENT CONTROL: (1 revision)
- Key Performance Indicator (1 revision)
- Key Privacy Cases (1 revision)
- Lack of consensus about sentencing white-collar criminals (1 revision)
- Law enforcement witnesses (1 revision)
- Law enforcement witnesses for the Prosecution (1 revision)
- Laws and Regulations: (1 revision)
- Legal Electronic Data Exchange Standard (1 revision)
- Liability For Trademark Infringement (1 revision)
- Likelihood of light sentencing; equities favoring defendant (1 revision)
- Loose Lips, Sink Ships: (1 revision)
- Loss valuation (1 revision)
- Louisiana DOI: (1 revision)
- ME1.1: (1 revision)
- ME1.3: (1 revision)
- ME1.5: (1 revision)
- ME1.6: (1 revision)
- ME1: (1 revision)
- ME2.2: (1 revision)
- ME2.7: (1 revision)
- ME2: (1 revision)
- ME3.1: (1 revision)
- ME3.2: (1 revision)
- ME3.3: (1 revision)
- ME3.4: (1 revision)
- ME3.5: (1 revision)
- ME3: (1 revision)
- ME4.1: (1 revision)
- ME4.2: (1 revision)
- ME4.4: (1 revision)
- ME4.5: (1 revision)
- ME4.6: (1 revision)
- ME4.7: (1 revision)
- ME4: (1 revision)
- Manage Document Metadata (1 revision)
- Management Booklet (1 revision)
- Marketing Issues (1 revision)
- Marketing Issues of Promotions (1 revision)
- Meeting and gaining rapport with the defendant (1 revision)
- Minors as defense witnesses (1 revision)
- Misappropriation (1 revision)
- Misappropriation Of Trade Secrets (1 revision)
- Miscellaneous laws (1 revision)
- Motion challenging method of choosing jury (1 revision)
- Motion challenging the admissibility of computer-generated evidence (1 revision)
- Motion for a continuance (1 revision)
- Motion for change of venue (1 revision)
- Motion for change of venue—Based on publicity (1 revision)
- Motion for mistrial (1 revision)
- Motion to dismiss charge (1 revision)
- Motion to exclude computer-generated evidence (1 revision)
- Motion to exclude computer-generated evidence—Best evidence rule (1 revision)
- Motion to exclude computer-generated evidence—Hearsay rule (1 revision)
- Motion to exclude computer-generated evidence—Laying business record exception foundation (1 revision)
- Motion to exclude nontestifying witnesses from courtroom (1 revision)
- Motion to furnish daily transcript (1 revision)
- Motion to limit trial publicity (1 revision)
- Motion to reduce charge (1 revision)
- Motion to suppress confession (1 revision)
- Motion to suppress illegally obtained evidence (1 revision)
- Motion to suppress illegally obtained evidence; checklist (1 revision)
- National Stolen Property Act (1 revision)
- Notice of defenses (1 revision)
- Objecting to computer-generated evidence (1 revision)
- Obscenity (1 revision)
- Observing jury reaction to questioning by prosecutor (1 revision)
- Obtaining defendant's release on bail (1 revision)
- Obtaining information about alleged codefendants; checklist (1 revision)
- Online Auctions (1 revision)
- Opening Statements in general (1 revision)
- Opening statement for defense (1 revision)
- Opening statement for prosecution (1 revision)
- Organizing Information Security: (1 revision)
- Other defense witnesses; alleged codefendants (1 revision)
- Other motions (1 revision)
- Outline of issues involving search and seizure—First Amendment issues (1 revision)
- Outline of issues involving search and seizure—Not pursuant to warrant (1 revision)
- Outline of issues involving search and seizure—The computer user's expectation of privacy (1 revision)
- PCI-1.1: (1 revision)
- PCI-1.2 (1 revision)
- PCI-1.4.a: (1 revision)
- PCI-1.4.b: (1 revision)
- PCI-10.5.6: (1 revision)
- PCI-10.5.7: (1 revision)
- PCI-10.7: (1 revision)
- PCI-11.1: (1 revision)
- PCI-11.2: (1 revision)
- PCI-11.3: (1 revision)
- PCI-11.4: (1 revision)
- PCI-12.1.3: (1 revision)
- PCI-12.2: (1 revision)
- PCI-12.3.10: (1 revision)
- PCI-12.3.1: (1 revision)
- PCI-12.3.2: (1 revision)
- PCI-12.3.3: (1 revision)
- PCI-12.3.4: (1 revision)
- PCI-12.3.5: (1 revision)
- PCI-12.3.6: (1 revision)
- PCI-12.3.7: (1 revision)
- PCI-12.3.8: (1 revision)
- PCI-12.3.9: (1 revision)
- PCI-12.4: (1 revision)
- PCI-12.5.1: (1 revision)
- PCI-12.5.2: (1 revision)
- PCI-12.5.3: (1 revision)
- PCI-12.5.4: (1 revision)
- PCI-12.5.5: (1 revision)
- PCI-12.6.1: (1 revision)
- PCI-12.6.2: (1 revision)
- PCI-12.8.1: (1 revision)
- PCI-12.8.2: (1 revision)
- PCI-12.8.4: (1 revision)
- PCI-12.8.5: (1 revision)
- PCI-12.9.3: (1 revision)
- PCI-12.9.4: (1 revision)
- PCI-12.9.5: (1 revision)
- PCI-12.9.6: (1 revision)
- PCI-2.1.1: (1 revision)
- PCI-2.2.1: (1 revision)
- PCI-2.2.2: (1 revision)
- PCI-2.2.4: (1 revision)
- PCI-3.2.1: (1 revision)
- PCI-3.2.2: (1 revision)
- PCI-3.2.3: (1 revision)
- PCI-3.3 (1 revision)
- PCI-3.5.1: (1 revision)
- PCI-3.5.2: (1 revision)
- PCI-3.6.10: (1 revision)
- PCI-3.6.1: (1 revision)
- PCI-3.6.2: (1 revision)
- PCI-3.6.3: (1 revision)
- PCI-3.6.4: (1 revision)
- PCI-3.6.5: (1 revision)
- PCI-3.6.6: (1 revision)
- PCI-3.6.7: (1 revision)
- PCI-3.6.8: (1 revision)
- PCI-3.6.9: (1 revision)
- PCI-4.2: (1 revision)
- PCI-5.1: (1 revision)
- PCI-5.2: (1 revision)
- PCI-6.1.1: (1 revision)
- PCI-6.2: (1 revision)
- PCI-6.3.2: (1 revision)
- PCI-6.3.3: (1 revision)
- PCI-6.3.4: (1 revision)
- PCI-6.3.5: (1 revision)
- PCI-6.3.6: (1 revision)
- PCI-6.3.7: (1 revision)
- PCI-6.4.1: (1 revision)
- PCI-6.4.2: (1 revision)
- PCI-6.4.3: (1 revision)
- PCI-6.4.4: (1 revision)
- PCI-6.5.10: (1 revision)
- PCI-6.5.2: (1 revision)
- PCI-6.5.3: (1 revision)
- PCI-6.5.4: (1 revision)
- PCI-6.5.5: (1 revision)
- PCI-6.5.6: (1 revision)
- PCI-6.5.7: (1 revision)
- PCI-6.5.8: (1 revision)
- PCI-6.5.9: (1 revision)
- PCI-7.2: (1 revision)
- PCI-8.1: (1 revision)
- PCI-8.2: (1 revision)
- PCI-8.3: (1 revision)
- PCI-8.4: (1 revision)
- PCI-8.5.10: (1 revision)
- PCI-8.5.11: (1 revision)
- PCI-8.5.12: (1 revision)
- PCI-8.5.13: (1 revision)
- PCI-8.5.14: (1 revision)
- PCI-8.5.15: (1 revision)
- PCI-8.5.16: (1 revision)
- PCI-8.5.1: (1 revision)
- PCI-8.5.2: (1 revision)
- PCI-8.5.3: (1 revision)
- PCI-8.5.4: (1 revision)
- PCI-8.5.6: (1 revision)
- PCI-8.5.7: (1 revision)
- PCI-8.5.8: (1 revision)
- PCI-8.5.9: (1 revision)
- PCI-9.10.1: (1 revision)
- PCI-9.2: (1 revision)
- PCI-9.3.3: (1 revision)
- PCI-9.4: (1 revision)
- PCI-9.5: (1 revision)
- PCI-9.6: (1 revision)