Search results
Jump to navigation
Jump to search
- ...ade Law (UNCITRAL), 29th Sess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirem ...1 KB (161 words) - 12:29, 16 October 2014
- {| id="table1" width="100%" border="1" | 1.0 ...12 KB (1,720 words) - 14:10, 1 May 2010
- ...nuary). Authentication: A pillar of information assurance. SC Magazine, 21(1), 55. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 1 .../www.e-publishing.af.mil/shared/media/epubs/AFI33-203V1.pdf AFI 33-203 Vol 1], Emission Security (Soon to be AFSSI 7700) ...7 KB (983 words) - 10:41, 15 April 2012
- ...5(a)(3)(A), (4)(A), 7(g)(1), 5 U.S.C.A. §§ 7704(a)(3)(A), (4)(A), 7706(g)(1). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2 ...e sender's domain name. CAN-SPAM Act, §§ 5(a)(1, 6), 15 U.S.C.A. § 7704(a)(1, 6). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir ...8 KB (1,176 words) - 10:17, 5 May 2011
- Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. ...2 KB (230 words) - 19:16, 14 January 2014
- ### SHA-1 with 128-bit or 160 bit key Image:Encryption Standard(1).png|Encryption Standard page two of eight ...4 KB (558 words) - 15:12, 21 January 2014
- ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945). ...1 KB (184 words) - 18:49, 10 April 2011
- Computer Crime Prevention Law — Ill. Rev. Stat., ch. 38, §§ 16D-1 to -7<br> Ind. Code § 35-43-1-4<br> ...9 KB (1,358 words) - 22:11, 5 September 2011
- {| id="table1" width="100%" border="1" | 1.0 ...11 KB (1,433 words) - 14:11, 1 May 2010
- {| id="table1" width="100%" border="1" | 1.0 ...8 KB (1,068 words) - 17:23, 16 October 2009
- ...e under these three statutes. This manual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters Chapter 1 explains the restrictions that the Fourth Amendment places on the warrantle ...11 KB (1,632 words) - 12:36, 5 August 2011
- Image:Asset Information Labeling Standard(1).png|Asset Information Labeling Standard page two of six. ...2 KB (258 words) - 16:26, 24 September 2014
- ...54 FR 13864, April 6, 1989; 56 FR 13754, April 4, 1991; 58 FR 17084, April 1, 1993; 59 FR 40204, Aug. 5, 1994; 73 FR 44599, July 30, 2008; 74 FR 36094, ...1 KB (152 words) - 12:28, 16 October 2014
- ...vice organization's controls over a minimum six month period (e.g. January 1, 2012 to June 30, 2012). The contents of each type of report is described i {| id="table1" width="100%" border="1" ...10 KB (1,457 words) - 21:20, 21 August 2012
- ...B), with respect to information technology in the Federal Government, to: (1) exercise capital planning control; (2) promote the improvement of the acqu * '''(Sec. 5113)''' Requires the OMB Director to: (1) encourage performance- and results-based management in fulfilling his resp ...10 KB (1,502 words) - 19:27, 4 April 2010
- ...ed online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements. Image:Availability Protection Standard(1).png|Availability Protection Standard page two of eight. ...5 KB (646 words) - 21:03, 15 January 2014
- Image:Employee Ongoing Security Awareness Standard(1).png|Employee Ongoing Security Awareness Standard page two of five. ...2 KB (275 words) - 17:10, 23 January 2014
- (1) Any person subject to the act and this part shall retain evidence of compl ...1 KB (194 words) - 12:27, 16 October 2014
- {| id="table1" width="100%" border="1" | 1.0 ...12 KB (1,711 words) - 14:16, 1 May 2010
- {| id="table1" width="100%" border="1" | 1.0 ...14 KB (1,956 words) - 14:16, 1 May 2010