Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . . . embo ...
    695 bytes (105 words) - 12:39, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (976 words) - 14:17, 1 May 2010
  • :'''(1)''' promulgating information security standards under section 11331 of titl :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this sub-chapter ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''(1)''' minimize the paperwork burden for individuals, small businesses, educat ::'''(B)''' security of information, including section 11332 of title 40 [1] ; and<br> ...
    3 KB (414 words) - 10:37, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • (a)(1) A domestic financial institution or nonfinancial trade or business, and a ...to not less than 2 times the amount of the transaction, but not more than $1,000,000, on any financial institution or agency that violates any provision ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • 1. '''Confidentiality''' Image:Information Classification Standard(1).png|Information Classification Standard page two of eight. ...
    5 KB (583 words) - 17:44, 23 January 2014
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:33, 1 June 2010
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:36, 1 June 2010
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding ...e of the computer and the value of such use is not more than $5,000 in any 1-year period;<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • :'''(1)''' provide timely technical assistance to operators of agency information ...
    1 KB (196 words) - 19:07, 3 June 2010
View ( | ) (20 | 50 | 100 | 250 | 500)