Search results

Jump to navigation Jump to search
View ( | next 50) (20 | 50 | 100 | 250 | 500)
  • ...to IT security risk management and may be found here: Risky Business: [[IT Security Risk Management Demystified]] ...] risk assessments should cover all IT risk management functions including security, outsourcing, and business continuity. Senior management should ensure IT-r ...
    43 KB (6,368 words) - 11:22, 4 July 2015
  • ...music, paintings and sculptures, films and technology-based works such as computer programs and electronic databases. In most European languages other than En ...sound, text and images in a digital format, which is made accessible by a computer program, embodies an original expression of authorship sufficient to justif ...
    46 KB (7,265 words) - 12:09, 2 May 2010
  • .... Bush on December 16, 2003, establishes the United States' first national standards for the sending of commercial e-mail and requires the Federal Trade Commiss * national security messages. ...
    26 KB (4,026 words) - 12:15, 5 May 2011
  • ...display paging devices or fax machines, but also includes electronic mail, computer transmissions, and, in some cases, satellite transmissions. It does not inc ...establish probable cause be qualified according to the "Aguilar-Spinelli" standards (Aguilar v. Texas, 378 U.S. 108 (1964) and Spinelli v. United States, 393 U ...
    29 KB (4,458 words) - 12:24, 16 October 2014
  • ...or the occupant’s permission or knowledge; the expanded use of [[National Security Letters]], which allows the [[Federal Bureau of Investigation]] (FBI) to se .../cgi-bin/bdquery/z?d108:H.R.3171: H.R. 3171], [[THOMAS]]</ref> and the ''[[Security and Freedom Ensured Act]]'' (SAFE),<ref name="SAFE-THOMAS"> ...
    142 KB (21,198 words) - 10:23, 23 August 2011
  • ...om using search warrants to obtain computers or electronic media. A sample computer search warrant appears in Appendix F. ...strategy should be chosen after considering the many possible roles of the computer in the offense: ...
    138 KB (21,660 words) - 13:18, 5 August 2011
  • ...tors must consider two issues when asking whether a government search of a computer requires a warrant. First, does the search violate a reasonable expectation ...ohibits law enforcement from accessing and viewing information stored in a computer if it would be prohibited from opening a closed container and examining its ...
    154 KB (23,956 words) - 13:16, 5 August 2011
View ( | next 50) (20 | 50 | 100 | 250 | 500)