Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...signatures as sufficient for government contracts under 31 U.S.C. 1501(a)(1): "The electronic symbol proposed for use by certifying officers . . . embo ...
    695 bytes (105 words) - 12:39, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    7 KB (976 words) - 14:17, 1 May 2010
  • :'''(1)''' promulgating information security standards under section 11331 of titl :'''(8)''' reporting to Congress no later than March 1 of each year on agency compliance with the requirements of this sub-chapter ...
    3 KB (414 words) - 11:45, 4 June 2010
  • '''(1)''' minimize the paperwork burden for individuals, small businesses, educat ::'''(B)''' security of information, including section 11332 of title 40 [1] ; and<br> ...
    3 KB (414 words) - 10:37, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • (a)(1) A domestic financial institution or nonfinancial trade or business, and a ...to not less than 2 times the amount of the transaction, but not more than $1,000,000, on any financial institution or agency that violates any provision ...
    9 KB (1,369 words) - 23:09, 1 November 2012
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    851 bytes (128 words) - 21:01, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    10 KB (1,473 words) - 14:13, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • ...apter, section 11331 of title 40, or section 20 of the National Standards [1] and Technology Act (15 U.S.C. 278g–3) may be construed as affecting the au ...
    940 bytes (143 words) - 21:44, 1 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,149 words) - 14:09, 1 May 2010
  • :'''(1)''' be responsible for—<br> :'''(1)''' periodic assessments of the risk and magnitude of the harm that could r ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,122 words) - 14:12, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,684 words) - 14:14, 1 May 2010
  • 1. '''Confidentiality''' Image:Information Classification Standard(1).png|Information Classification Standard page two of eight. ...
    5 KB (583 words) - 17:44, 23 January 2014
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:33, 1 June 2010
  • '''(1)''' provide a comprehensive framework for ensuring the effectiveness of inf ...
    1 KB (192 words) - 10:36, 1 June 2010
  • :'''(1)''' having knowingly accessed a computer without authorization or exceeding ...e of the computer and the value of such use is not more than $5,000 in any 1-year period;<br> ...
    15 KB (2,463 words) - 11:31, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • :'''(1)''' provide timely technical assistance to operators of agency information ...
    1 KB (196 words) - 19:07, 3 June 2010
  • ...ade Law (UNCITRAL), 29th Sess., art. 7(1), at 3, U.N. Doc. A/CN.9/XXIX/CRP.1/Add.13 (1996) ("Where a law requires a signature of a person, that requirem ...
    1 KB (161 words) - 12:29, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,720 words) - 14:10, 1 May 2010
  • ...nuary). Authentication: A pillar of information assurance. SC Magazine, 21(1), 55. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 1 .../www.e-publishing.af.mil/shared/media/epubs/AFI33-203V1.pdf AFI 33-203 Vol 1], Emission Security (Soon to be AFSSI 7700) ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ...5(a)(3)(A), (4)(A), 7(g)(1), 5 U.S.C.A. §§ 7704(a)(3)(A), (4)(A), 7706(g)(1). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir. 2 ...e sender's domain name. CAN-SPAM Act, §§ 5(a)(1, 6), 15 U.S.C.A. § 7704(a)(1, 6). Omega World Travel, Inc. v. Mummagraphics, Inc., 469 F.3d 348 (4th Cir ...
    8 KB (1,176 words) - 10:17, 5 May 2011
  • Image:Vulnerability Assessment and Management Standard(1).png|Vulnerability Assessment and Management Standard page two of five. ...
    2 KB (230 words) - 19:16, 14 January 2014
  • ### SHA-1 with 128-bit or 160 bit key Image:Encryption Standard(1).png|Encryption Standard page two of eight ...
    4 KB (558 words) - 15:12, 21 January 2014
  • ...D.N.Y. 1943) (opinion of the court by Judge Learned Hand), aff'd, 326 U.S. 1 (1945). ...
    1 KB (184 words) - 18:49, 10 April 2011
  • Computer Crime Prevention Law — Ill. Rev. Stat., ch. 38, §§ 16D-1 to -7<br> Ind. Code § 35-43-1-4<br> ...
    9 KB (1,358 words) - 22:11, 5 September 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    11 KB (1,433 words) - 14:11, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    8 KB (1,068 words) - 17:23, 16 October 2009
  • ...e under these three statutes. This manual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters Chapter 1 explains the restrictions that the Fourth Amendment places on the warrantle ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • Image:Asset Information Labeling Standard(1).png|Asset Information Labeling Standard page two of six. ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...54 FR 13864, April 6, 1989; 56 FR 13754, April 4, 1991; 58 FR 17084, April 1, 1993; 59 FR 40204, Aug. 5, 1994; 73 FR 44599, July 30, 2008; 74 FR 36094, ...
    1 KB (152 words) - 12:28, 16 October 2014
  • ...vice organization's controls over a minimum six month period (e.g. January 1, 2012 to June 30, 2012). The contents of each type of report is described i {| id="table1" width="100%" border="1" ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...B), with respect to information technology in the Federal Government, to: (1) exercise capital planning control; (2) promote the improvement of the acqu * '''(Sec. 5113)''' Requires the OMB Director to: (1) encourage performance- and results-based management in fulfilling his resp ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ed online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements. Image:Availability Protection Standard(1).png|Availability Protection Standard page two of eight. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Image:Employee Ongoing Security Awareness Standard(1).png|Employee Ongoing Security Awareness Standard page two of five. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • (1) Any person subject to the act and this part shall retain evidence of compl ...
    1 KB (194 words) - 12:27, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...orgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of c ...
    2 KB (244 words) - 12:37, 16 October 2014
  • 47 U.S.C. § 230(c)(1), and that: Immunity under Section 230 requires that: (1) the defendant is a provider or user of an interactive computer service; (2 ...
    6 KB (919 words) - 14:33, 10 April 2011
  • Image:Asset Identification and Classification Standard(1).png|Asset Identification and Classification Standard page two of six. ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...rk owner may bring a cause of action against a domain name registrant who (1) has a bad faith intent to profit from the mark and (2) registers, traffics ...at the first two prongs of Mayflower's ACPA claim were easily met because (1) their registered trademark was distinctive and (2) Defendant’s “mayflowerv ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • '''(1)''' the term '''agency''' means any executive department, military departme ...l not include a collection of information described under section 3518 (c)(1);<br> ...
    5 KB (795 words) - 00:35, 1 June 2010
  • Image:Information Security Program Charter(1).png|Asset Identification and Classification Standard page two of five. ...
    2 KB (316 words) - 15:19, 13 January 2014
  • (1) The purpose of section 552 of title 5, United States Code, popularly known ::(1) foster democracy by ensuring public access to agency records and informati ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ::''(1) accurately reflects the information set forth in the record after it was f :''(1) discussed situations where "...contract may be formed by the interaction o ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ion while it is in electronic storage in such system.” 18 U.S.C. § 2701(a)(1)-(2). However, it does not apply to an "electronic communication [that] is ...nic storage by that service,” with limited exceptions. 18 U.S.C. § 2702(a)(1). ...
    11 KB (1,707 words) - 20:01, 13 April 2011
View ( | ) (20 | 50 | 100 | 250 | 500)