Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • ...e under these three statutes. This manual reflects that division: Chapters 1 and 2 address the Fourth Amendment law of search and seizure, and Chapters Chapter 1 explains the restrictions that the Fourth Amendment places on the warrantle ...
    11 KB (1,632 words) - 12:36, 5 August 2011
  • Image:Asset Information Labeling Standard(1).png|Asset Information Labeling Standard page two of six. ...
    2 KB (258 words) - 16:26, 24 September 2014
  • ...54 FR 13864, April 6, 1989; 56 FR 13754, April 4, 1991; 58 FR 17084, April 1, 1993; 59 FR 40204, Aug. 5, 1994; 73 FR 44599, July 30, 2008; 74 FR 36094, ...
    1 KB (152 words) - 12:28, 16 October 2014
  • ...vice organization's controls over a minimum six month period (e.g. January 1, 2012 to June 30, 2012). The contents of each type of report is described i {| id="table1" width="100%" border="1" ...
    10 KB (1,457 words) - 21:20, 21 August 2012
  • ...B), with respect to information technology in the Federal Government, to: (1) exercise capital planning control; (2) promote the improvement of the acqu * '''(Sec. 5113)''' Requires the OMB Director to: (1) encourage performance- and results-based management in fulfilling his resp ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...ed online for a minimum of thirty (30) days and retained for at least one (1) year and in accordance with legal and regulatory requirements. Image:Availability Protection Standard(1).png|Availability Protection Standard page two of eight. ...
    5 KB (646 words) - 21:03, 15 January 2014
  • Image:Employee Ongoing Security Awareness Standard(1).png|Employee Ongoing Security Awareness Standard page two of five. ...
    2 KB (275 words) - 17:10, 23 January 2014
  • (1) Any person subject to the act and this part shall retain evidence of compl ...
    1 KB (194 words) - 12:27, 16 October 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    12 KB (1,711 words) - 14:16, 1 May 2010
  • {| id="table1" width="100%" border="1" | 1.0 ...
    14 KB (1,956 words) - 14:16, 1 May 2010
  • ...orgery possible. The Guidelines seek to address this problem in two ways, (1) by requiring a subscriber, who holds the private key, to use a degree of c ...
    2 KB (244 words) - 12:37, 16 October 2014
  • 47 U.S.C. § 230(c)(1), and that: Immunity under Section 230 requires that: (1) the defendant is a provider or user of an interactive computer service; (2 ...
    6 KB (919 words) - 14:33, 10 April 2011
  • Image:Asset Identification and Classification Standard(1).png|Asset Identification and Classification Standard page two of six. ...
    2 KB (295 words) - 15:20, 13 January 2014
  • ...rk owner may bring a cause of action against a domain name registrant who (1) has a bad faith intent to profit from the mark and (2) registers, traffics ...at the first two prongs of Mayflower's ACPA claim were easily met because (1) their registered trademark was distinctive and (2) Defendant’s “mayflowerv ...
    10 KB (1,540 words) - 12:16, 21 March 2011
  • '''(1)''' the term '''agency''' means any executive department, military departme ...l not include a collection of information described under section 3518 (c)(1);<br> ...
    5 KB (795 words) - 00:35, 1 June 2010
  • Image:Information Security Program Charter(1).png|Asset Identification and Classification Standard page two of five. ...
    2 KB (316 words) - 15:19, 13 January 2014
  • (1) The purpose of section 552 of title 5, United States Code, popularly known ::(1) foster democracy by ensuring public access to agency records and informati ...
    18 KB (2,889 words) - 10:47, 22 May 2010
  • ::''(1) accurately reflects the information set forth in the record after it was f :''(1) discussed situations where "...contract may be formed by the interaction o ...
    9 KB (1,499 words) - 11:31, 30 October 2011
  • {| id="table1" width="100%" border="1" | 1.0 ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...ion while it is in electronic storage in such system.” 18 U.S.C. § 2701(a)(1)-(2). However, it does not apply to an "electronic communication [that] is ...nic storage by that service,” with limited exceptions. 18 U.S.C. § 2702(a)(1). ...
    11 KB (1,707 words) - 20:01, 13 April 2011
  • ...te a claim for misappropriation of trade secrets, a party must show that: (1) the information incorporates a trade secret; (2) the party took reasonable ...pattern, compilation, program, device, method, technique or process that: (1) derives independent economic value, actual or potential, from not being ge ...
    7 KB (1,065 words) - 16:48, 13 April 2011
  • ### Passwords must contain at least one (1) alphabetic and one (1) non-alphabetic character. Image:Access Control Standard(1).png|Access Control Standard page two of eleven. ...
    8 KB (1,182 words) - 19:41, 15 January 2014
  • ...eported immediately to Infrastructure Services and Information Security at 1-888-896-7580 and provide relevant information including name, employee numb Image:Anti-Virus Standard(1).png|Anti-Virus Standard page two of eight. ...
    5 KB (765 words) - 20:00, 15 January 2014
  • :'''(1)''' The term '''information security''' means protecting information and in ...
    2 KB (327 words) - 00:58, 1 June 2010
  • Image:Threat Assessment and Monitoring Standard(1).png|Threat Assessment and Monitoring Standard page two of six. ...
    3 KB (365 words) - 19:25, 14 January 2014
  • {| id="table1" width="100%" border="1" | 1.0 ...
    9 KB (1,430 words) - 14:56, 28 August 2009
  • :'''(1)''' the term '''information security''' means protecting information and in ...
    3 KB (368 words) - 00:50, 1 June 2010
  • '''1.''' Applicability of Federal Rules of Criminal Procedure<br> ...
    2 KB (360 words) - 12:30, 16 October 2014
  • Image:Information Systems and Technology Security Policy(1).png|Information Systems and Technology Security Policy page two of six. ...
    4 KB (465 words) - 15:46, 13 January 2014
  • Image:Asset Management Standard(1).png|Asset Management Standard page two of six. ...
    3 KB (389 words) - 17:40, 14 January 2014
  • Image:Security Awareness Standard(1).png|Security Awareness Standard page two of five. ...
    3 KB (418 words) - 19:53, 14 January 2014
  • Image:Acceptable Use Standard(1).png|Acceptable Use Standard page two of six. ...
    3 KB (464 words) - 17:48, 14 January 2014
  • : '''1.''' Such subpoena is authorized by law and there is reason to believe that ...
    3 KB (452 words) - 12:29, 16 October 2014
  • ...communications unless a statutory exception applies. See 18 U.S.C. § 2511(1). In general, these prohibitions bars third parties (including the governme ...ement to intercept communications for up to thirty days. 18 U.S.C. §§ 2516(1), 2518(5). 18 U.S.C. §§ 2516-2518 imposes several formidable requirements t ...
    9 KB (1,342 words) - 18:26, 13 April 2011
  • U.S. Copyright laws are enacted pursuant to Article 1, Section 8 of the U.S. Constitution, which provides that “[t]he Congress sh ...t required under U.S. law, although copies of works published before March 1, 1989, must bear the notice or risk loss of copyright protection. The notic ...
    14 KB (2,130 words) - 06:38, 11 April 2011
  • Image:End User Computing and Technology Policy(1).png|End User Computing and Technology Policy page two of six. ...
    4 KB (507 words) - 14:58, 21 January 2014
  • [[AI1:| '''1 Identify Automated Solutions''']]<br> [[AI1.1:| 1.1 Definition and Maintenance of Business Functional and Technical Requirement ...
    3 KB (341 words) - 19:07, 14 June 2007
  • Image:Auditing Standard(1).png|Auditing Standard page two of seven. ...
    3 KB (444 words) - 20:12, 15 January 2014
  • ...tion. The court also held that the Communications Decency Act (see Chapter 1 (B)(3) above) would not shield ISPs from secondary liability for their user ...classic or nominative, applies when an allegedly infringing term is used (1) not as a trademark, but (2) fairly and in good faith (3) to describe the g ...
    8 KB (1,249 words) - 10:18, 13 April 2011
  • (1) The inappropriate use of “frames” and linking; ...ar website. See Complaint, Carstens v. Bonzi Software, Inc., No. 02-207199-1 (Wash. Sup. Ct. 2003) (suit filed against defendant for allegedly using ban ...
    16 KB (2,394 words) - 13:40, 26 April 2011
  • ...f’d, 526 U.S. 1061 (1999), the court upheld the validity of Section 223(a)(1)(A)(ii) of the CDA, which makes it a crime to transmit an “indecent” comput ...
    3 KB (402 words) - 18:54, 10 April 2011
  • # Lubin v. Agora, Inc., 389 Md. 1, 22, 882 A.2d 833, 846 (2005) (denying enforcement of subpoenas that would ...an anonymous internet speaker's identity, the requesting party must show: (1) the speaker has been given adequate notice and a reasonable opportunity to ...
    15 KB (2,359 words) - 19:34, 10 April 2011
  • ...bure v. Lacambre, Tribunal de Grande Instance de Paris, Ref. 55181/98, No. 1/JP (Fr. June 9, 1998). Under French law, an Internet service provider is re ...Designtechnica Corp. and Google UK and Google Inc., [2009] EWHC 1765 (QB)=[1]. The UK High Court ruled that Google was not a publisher of defamatory sta ...
    6 KB (895 words) - 14:52, 10 April 2011
  • :Section 101(c)(1)(C) states that the consumer also ''"consent electronically, in a manner th ...
    3 KB (456 words) - 11:26, 30 October 2011
  • [[ISO 20000]] defines the objective of ''Change management'' (part 1, 9.2) as:<br> ...
    4 KB (523 words) - 10:24, 23 April 2010
  • {| id="table1" width="100%" border="1" {| id="table1" width="100%" border="1" ...
    8 KB (1,123 words) - 16:01, 2 August 2009
  • ...ng. Tim O'Shea and Jared Strauss took responsibility for revising Chapters 1 and 5, Josh Goldfoot for revising Chapter 2, Michelle Kane for revising Cha ...
    3 KB (438 words) - 12:32, 5 August 2011
  • Volume 1, Governance Documentation and Information Technology Security Policies Demy ...ty-Evaluation/dp/1468063871/ref=sr_1_1?s=books&ie=UTF8&qid=1330543900&sr=1-1 Governance Documentation and Information Technology Security Policies Demys ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • * [[Media:NISTSP800-37.pdf | NIST Special Publication 800-37 Revision 1]], Guide for Security Authorization of Federal Information Systems: A Secur * [[Media:NISTSP800-60.pdf | NIST Special Publication 800-60]], Revision 1, Guide for Mapping Types of Information and Information Systems to Security ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • Prison Planet.com August 1, 2013 Every thing the elite do is designed to stunt human kind, what type o ...
    3 KB (411 words) - 12:27, 16 October 2014
View ( | ) (20 | 50 | 100 | 250 | 500)