Oldest pages
Jump to navigation
Jump to search
Showing below up to 500 results in range #501 to #1,000.
- Service Level Management: (15:44, 20 March 2007)
- Capacity Management: (15:46, 20 March 2007)
- Availability Management: (15:48, 20 March 2007)
- Service Desk Management: (16:15, 20 March 2007)
- Problem Management: (16:20, 20 March 2007)
- Release Management: (16:42, 20 March 2007)
- Change Management: (16:23, 21 March 2007)
- Confidentiality (15:05, 22 March 2007)
- Service Level Agreement (16:06, 22 March 2007)
- Key Performance Indicator (16:48, 22 March 2007)
- Information Security Management System (17:09, 22 March 2007)
- DS5.1: (17:12, 22 March 2007)
- Financial Management: (10:12, 23 March 2007)
- Configuration Management: (15:09, 23 March 2007)
- Configuration Mangement: (16:12, 23 March 2007)
- Research (00:00, 26 March 2007)
- ISO/IEC 17799 (16:57, 26 March 2007)
- Availability (17:23, 26 March 2007)
- User’s Security Handbook -- RFC 2504 February 1999 (14:38, 3 April 2007)
- American Bar Association Digital Signature Guidelines (15:18, 3 April 2007)
- 3 (15:23, 3 April 2007)
- 4 (15:24, 3 April 2007)
- 5 (15:25, 3 April 2007)
- 6 (15:26, 3 April 2007)
- 7 (15:26, 3 April 2007)
- 8 (15:27, 3 April 2007)
- 9 (15:28, 3 April 2007)
- 25 (15:47, 3 April 2007)
- 26 (15:47, 3 April 2007)
- 27 (15:48, 3 April 2007)
- 28 (15:49, 3 April 2007)
- 29 (15:50, 3 April 2007)
- 30 (15:50, 3 April 2007)
- 31 (15:51, 3 April 2007)
- 32 (15:52, 3 April 2007)
- 33 (15:52, 3 April 2007)
- 34 (15:53, 3 April 2007)
- 35 (15:53, 3 April 2007)
- Web Application Auditing: (13:41, 4 April 2007)
- Information Technology Auditor's Glossary: (13:08, 9 April 2007)
- PO2.3: (16:53, 9 April 2007)
- DS5.5: (16:57, 9 April 2007)
- PCI: (17:00, 9 April 2007)
- SOX.2.0.25: (17:03, 9 April 2007)
- SOX.2.7.11: (17:05, 9 April 2007)
- Access Control: (02:00, 10 April 2007)
- Personnel Security: (12:54, 10 April 2007)
- Enterprise Open-Source Policy Sample: (12:58, 10 April 2007)
- Insurance: (13:30, 10 April 2007)
- Information Security booklet (13:31, 10 April 2007)
- Physical and Environmental Protection (14:22, 10 April 2007)
- Malicious Code Prevention (17:25, 10 April 2007)
- Data Security (18:20, 10 April 2007)
- Security Audit Procedures (14:40, 11 April 2007)
- Audit Guidance Examination Procedures (17:53, 11 April 2007)
- ME2.6: (17:55, 13 April 2007)
- Risk Analysis (18:32, 13 April 2007)
- Audit Booklet (14:37, 16 April 2007)
- Quality assurance (18:59, 17 April 2007)
- AI2.8: (19:02, 17 April 2007)
- PO4.7: (19:03, 17 April 2007)
- AI7.7: (19:05, 17 April 2007)
- Software Configuration Management (19:07, 17 April 2007)
- Service Provider Oversight (19:14, 17 April 2007)
- Risk mitigation (19:15, 17 April 2007)
- Bank Secrecy Act: (14:57, 20 April 2007)
- Requests (16:10, 20 April 2007)
- Best Practices Research Reports: (16:22, 23 April 2007)
- Presentations: (12:45, 25 April 2007)
- References: (12:47, 25 April 2007)
- PO1.2: (16:55, 25 April 2007)
- Business-IT Alignment (17:07, 25 April 2007)
- PO1.1: (17:21, 25 April 2007)
- PO3.3: (17:49, 25 April 2007)
- DS2.1: (18:00, 25 April 2007)
- PO7.4: (18:05, 25 April 2007)
- DS4.2: (18:10, 25 April 2007)
- DS4.3: (18:16, 25 April 2007)
- DS4.5: (18:21, 25 April 2007)
- DS4.6: (18:35, 25 April 2007)
- Business Impact Analysis (18:45, 25 April 2007)
- Development and Acquisition Booklet (22:41, 25 April 2007)
- Management Booklet (18:03, 27 April 2007)
- E-Banking Booklet (10:04, 28 April 2007)
- Continuity Management: (13:24, 30 April 2007)
- Microsoft SQL Database Asset Protection Standards: (13:53, 14 May 2007)
- DB2 Database Asset Protection Standards: (14:43, 15 May 2007)
- MySQL Database Asset Protection Standards: (17:59, 18 May 2007)
- Organizing Information Security: (12:49, 22 May 2007)
- Human Resources Security: (14:04, 22 May 2007)
- Information Systems Acquisition, Development and Maintenance: (14:05, 22 May 2007)
- Security Policy: (13:25, 23 May 2007)
- Asset Management: (13:29, 23 May 2007)
- Communications and Operations Management: (13:51, 23 May 2007)
- Incident Management: (16:40, 23 May 2007)
- Compliance: (12:41, 25 May 2007)
- Business Continuity Planning Booklet (13:42, 30 May 2007)
- Business Continuity Management: (00:17, 1 June 2007)
- Security through obscurity (14:44, 14 June 2007)
- Russian copulation (15:35, 14 June 2007)
- Plaintext (15:52, 14 June 2007)
- RED/BLACK concept (16:06, 14 June 2007)
- Cleartext (16:40, 14 June 2007)
- Padding (cryptography) (16:42, 14 June 2007)
- Hardening (18:26, 14 June 2007)
- Privilege (computer science) (18:37, 14 June 2007)
- Security by design (18:39, 14 June 2007)
- Zero-day exploit (19:02, 14 June 2007)
- Monitor and Evaluate: (19:06, 14 June 2007)
- Planning and Organization: (19:07, 14 June 2007)
- Acquisition and Implementation: (19:07, 14 June 2007)
- Delivery and Support: (19:08, 14 June 2007)
- Physical and Environmental Security: (19:28, 14 June 2007)
- PO4.11: (19:45, 14 June 2007)
- AI1.2: (23:52, 14 June 2007)
- AI4.2: (23:55, 14 June 2007)
- Organizational Security: (12:40, 15 June 2007)
- HIPAA Standard References: (13:15, 15 June 2007)
- Health Insurance Portability and Accountability: (13:17, 15 June 2007)
- Information Security Audit (16:52, 15 June 2007)
- GLBA: (17:02, 15 June 2007)
- FFIEC: (17:47, 15 June 2007)
- Sample Misuse Reporting Standard: (12:22, 19 July 2007)
- Oracle Database Asset Protection Standards: (16:20, 15 November 2007)
- Risk assessment (16:03, 22 December 2007)
- The HIPAA Security and the Risk Dilemma: (20:24, 27 February 2008)
- Implementation (14:51, 29 February 2008)
- AES (11:41, 28 March 2008)
- Cryptography (11:44, 28 March 2008)
- Database Application Best Practice Configuration Samples: (11:45, 28 March 2008)
- Encryption (11:46, 28 March 2008)
- PCI-4.1.1: (11:48, 28 March 2008)
- DS11.2: (11:49, 28 March 2008)
- DS11.3: (11:50, 28 March 2008)
- PCI 3: (11:52, 28 March 2008)
- PCI-3.4 (11:53, 28 March 2008)
- Forensic Education Resources: (16:12, 20 October 2008)
- Horsewiki/horsewiki/index.php (11:55, 17 November 2008)
- Horsewiki/index.php (10:30, 21 November 2008)
- Current events (11:17, 30 November 2008)
- In general (03:10, 17 February 2009)
- Purpose of computer crime laws (14:48, 17 February 2009)
- Applicability of common-law sanctions (14:51, 17 February 2009)
- Procedure; generally (14:51, 17 February 2009)
- Venue (14:54, 17 February 2009)
- In general; intangible nature of assets (03:33, 18 February 2009)
- Alteration (03:34, 18 February 2009)
- Computer (03:35, 18 February 2009)
- Computer network (03:37, 18 February 2009)
- Computer hardware (03:38, 18 February 2009)
- Computer software (03:38, 18 February 2009)
- Computer program (03:40, 18 February 2009)
- Computer services (03:40, 18 February 2009)
- Data; intellectual property (03:42, 18 February 2009)
- Financial instrument (03:43, 18 February 2009)
- Intent—knowledge (03:45, 18 February 2009)
- Intent—Purpose (03:46, 18 February 2009)
- Intent—Malice (03:47, 18 February 2009)
- Intent—Authorization (03:48, 18 February 2009)
- Recklessness (03:48, 18 February 2009)
- Intent—Knowledge (03:50, 18 February 2009)
- Federal Laws in general (10:53, 18 February 2009)
- Activities involving access devices and equipment (10:54, 18 February 2009)
- Communications Decency Act (10:56, 18 February 2009)
- Child pornography legislation (11:00, 18 February 2009)
- The Copyright Act (11:04, 18 February 2009)
- National Stolen Property Act (11:06, 18 February 2009)
- Electronic Communications Privacy Act (11:09, 18 February 2009)
- Economic Espionage Act of 1996 (11:10, 18 February 2009)
- Miscellaneous federal laws (11:15, 18 February 2009)
- State Laws in general (11:45, 18 February 2009)
- Illegal gains (11:51, 18 February 2009)
- Physical taking offenses (12:04, 18 February 2009)
- Use of computer services; larceny (12:07, 18 February 2009)
- Taking of information (12:09, 18 February 2009)
- State consumer protection laws (12:10, 18 February 2009)
- Possession of hardware designed for illegal purpose (12:11, 18 February 2009)
- Damage to computer or component (12:14, 18 February 2009)
- Personal harm (12:15, 18 February 2009)
- Violation of privacy (12:17, 18 February 2009)
- Trespass (12:30, 18 February 2009)
- Facilitating crime (12:31, 18 February 2009)
- Computer pornography (12:33, 18 February 2009)
- Federal Child pornography legislation (12:35, 18 February 2009)
- State Child pornography legislation (12:38, 18 February 2009)
- State Child protection legislation; solicitation and importuning (12:42, 18 February 2009)
- Trade secret statutes (12:44, 18 February 2009)
- Miscellaneous laws (12:48, 18 February 2009)
- Punishments and Penalties in general (12:50, 18 February 2009)
- Determining factors (12:52, 18 February 2009)
- Civil remedies (12:53, 18 February 2009)
- Admission of evidence (12:54, 18 February 2009)
- Loss valuation (12:55, 18 February 2009)
- Meeting and gaining rapport with the defendant (16:12, 18 February 2009)
- Restricting interrogation of defendant (16:13, 18 February 2009)
- Dealing with pretrial publicity (16:14, 18 February 2009)
- Initial pre-arrest client interview (16:15, 18 February 2009)
- Conferring with arrested client (16:16, 18 February 2009)
- Initial conference with defendant; information checklist (16:17, 18 February 2009)
- Considerations as to arranging for surrender of defendant (16:18, 18 February 2009)
- Obtaining defendant's release on bail (16:19, 18 February 2009)
- Illustrative form; order fixing bail (16:24, 18 February 2009)
- Release on own recognizance (16:26, 18 February 2009)
- Release on own recognizance—Questions checklist (16:27, 18 February 2009)
- Illustrative form—defendant's agreement to appear (17:43, 18 February 2009)
- Illustrative form—Order for release on own recognizance (17:46, 18 February 2009)
- Client Interview and Planning; Evaluating the Case in general (17:47, 18 February 2009)
- Generalized Intentional Torts (16:31, 21 February 2009)
- Generalized Negligence Torts (16:32, 21 February 2009)
- Generalized Strict Liability Torts (16:33, 21 February 2009)
- Generalized Defamation Torts (16:34, 21 February 2009)
- Generalized Tort Remedies (16:35, 21 February 2009)
- Dealing with difficult technical information (13:18, 22 February 2009)
- Tape recording initial client interview (13:19, 22 February 2009)
- Advising client of attorney-client privilege (13:20, 22 February 2009)
- Putting client at ease (13:21, 22 February 2009)
- Evaluating defendant's version of facts (13:23, 22 February 2009)
- Evaluating defendant's attitude toward computer victim (13:25, 22 February 2009)
- Evaluating defendant as a witness (13:26, 22 February 2009)
- Client interview checklist (13:29, 22 February 2009)
- Obtaining information about alleged codefendants; checklist (13:30, 22 February 2009)
- Fees and Costs in general (13:31, 22 February 2009)
- Determining client's ability to pay fee (13:33, 22 February 2009)
- Factors affecting amount of fee (13:34, 22 February 2009)
- Informing client of special costs (13:39, 22 February 2009)
- Collecting or securing payment of fee (13:40, 22 February 2009)
- Proceedings Before Grand Jury in general (13:41, 22 February 2009)
- Appearance of defendant before the grand jury (13:42, 22 February 2009)
- Evidence presented to the grand jury (13:43, 22 February 2009)
- Separate trial (13:44, 22 February 2009)
- Proceedings by Way of Preliminary Hearing in general (13:45, 22 February 2009)
- Exclusion of witnesses and the press during testimony (13:46, 22 February 2009)
- Prosecution's need to prove elements of crime (13:47, 22 February 2009)
- Cross-examination of prosecution witnesses (13:48, 22 February 2009)
- Factors determining extent of cross-examination (13:49, 22 February 2009)
- Objecting to computer-generated evidence (13:50, 22 February 2009)
- Presentation of the defense case (13:51, 22 February 2009)
- Defense motion to dismiss charges (13:51, 22 February 2009)
- Motion to reduce charge (13:52, 22 February 2009)
- Arraignment; Pleas; Continuance of Case in general (13:53, 22 February 2009)
- Demurrer to complaint; pleas (13:54, 22 February 2009)
- Waiver or assertion of right to speedy trial (13:56, 22 February 2009)
- Preliminary Matters in general (15:05, 22 February 2009)
- Use of discovery (15:06, 22 February 2009)
- Use of private investigators (15:16, 22 February 2009)
- Use of computer security consultants, EDP auditors, and computer professionals (15:17, 22 February 2009)
- Use of independent laboratory tests (15:20, 22 February 2009)
- Application of forensics to computers (15:25, 22 February 2009)
- In general; locating witnesses (15:26, 22 February 2009)
- Interviewing witnesses (15:27, 22 February 2009)
- Dealing with reluctant witnesses (15:28, 22 February 2009)
- Law enforcement witnesses (15:29, 22 February 2009)
- Examining Police Reports, Records, and Photographs in general (15:29, 22 February 2009)
- Police reports of the computer crime (15:30, 22 February 2009)
- Fingerprints and handwriting (15:31, 22 February 2009)
- Investigating the Scene of Crime in general (15:32, 22 February 2009)
- Reconstructing the crime (15:33, 22 February 2009)
- Use of photographs and motion pictures (15:34, 22 February 2009)
- Discovery in general (15:37, 22 February 2009)
- Subjects of discovery; checklist (15:41, 22 February 2009)
- Defense discovery options (15:43, 22 February 2009)
- In general; obtaining lesser charge (17:48, 22 February 2009)
- Plea bargain checklist (17:50, 22 February 2009)
- Uncertainty as to applicability of the law (17:50, 22 February 2009)
- Difficulties in the admissibility of evidence (17:52, 22 February 2009)
- Uncertainty as to effect of case on a jury (17:52, 22 February 2009)
- Likelihood of light sentencing; equities favoring defendant (17:53, 22 February 2009)
- Lack of consensus about sentencing white-collar criminals (17:53, 22 February 2009)
- The possibility of restitution (17:54, 22 February 2009)
- Timing of plea bargain request (17:55, 22 February 2009)
- Plea bargain issues (17:55, 22 February 2009)
- Determining the plea (17:57, 22 February 2009)
- Persuading defendant to accept plea bargain (17:57, 22 February 2009)
- Deciding on the plea (17:58, 22 February 2009)
- Determining Defenses in general (17:59, 22 February 2009)
- Notice of defenses (18:00, 22 February 2009)
- Identity (18:04, 22 February 2009)
- Alibi (18:20, 22 February 2009)
- Intent (18:22, 22 February 2009)
- Authority (18:23, 22 February 2009)
- Entrapment (18:25, 22 February 2009)
- Statute of limitations (18:26, 22 February 2009)
- Preemption (18:33, 22 February 2009)
- Former jeopardy (18:35, 22 February 2009)
- Impossibility (18:36, 22 February 2009)
- Insanity (18:37, 22 February 2009)
- Motion to dismiss charge (18:38, 22 February 2009)
- Motion to suppress illegally obtained evidence; checklist (18:43, 22 February 2009)
- Outline of issues involving search and seizure—Pursuant to warrant (18:50, 22 February 2009)
- Outline of issues involving search and seizure—Not pursuant to warrant (18:54, 22 February 2009)
- Outline of issues involving search and seizure—First Amendment issues (18:55, 22 February 2009)
- Outline of issues involving search and seizure—The computer user's expectation of privacy (18:58, 22 February 2009)
- Motion challenging the admissibility of computer-generated evidence (19:06, 22 February 2009)
- Motion for change of venue (19:07, 22 February 2009)
- Motion for change of venue—Based on publicity (19:13, 22 February 2009)
- Motion for a continuance (19:14, 22 February 2009)
- Motion to limit trial publicity (19:15, 22 February 2009)
- Trial brief (19:16, 22 February 2009)
- Witness preparation—in general (19:17, 22 February 2009)
- Witness preparation—Expert witnesses (19:18, 22 February 2009)
- Preliminary Tactics in general (19:20, 22 February 2009)
- Seating arrangement in courtroom (19:21, 22 February 2009)
- Introductory remarks to veniremen (19:21, 22 February 2009)
- Selecting the Jury in general (19:22, 22 February 2009)
- Observing jury reaction to questioning by prosecutor (19:23, 22 February 2009)
- Avoiding generalization based on appearance (19:24, 22 February 2009)
- Eliciting promise to require independent conviction by each juror (19:24, 22 February 2009)
- Jurors' views toward computers (19:28, 22 February 2009)
- Presence and effect of pretrial publicity (19:29, 22 February 2009)
- Voir-dire questions checklist (19:36, 22 February 2009)
- Motion to furnish daily transcript (19:36, 22 February 2009)
- Motion to exclude nontestifying witnesses from courtroom (19:37, 22 February 2009)
- Motion for mistrial (19:38, 22 February 2009)
- Motion in limine (19:43, 22 February 2009)
- Motion to suppress illegally obtained evidence (19:47, 22 February 2009)
- Motion to suppress confession (20:01, 22 February 2009)
- Motion challenging method of choosing jury (20:02, 22 February 2009)
- Motion to exclude computer-generated evidence (20:06, 22 February 2009)
- Motion to exclude computer-generated evidence—Best evidence rule (20:07, 22 February 2009)
- Motion to exclude computer-generated evidence—Hearsay rule (20:08, 22 February 2009)
- Motion to exclude computer-generated evidence—Laying business record exception foundation (20:10, 22 February 2009)
- Other motions (20:12, 22 February 2009)
- Opening Statements in general (20:13, 22 February 2009)
- Opening statement for prosecution (20:14, 22 February 2009)
- Opening statement for defense (20:15, 22 February 2009)
- In general; burden of proof (20:17, 22 February 2009)
- Proving computer theft (20:20, 22 February 2009)
- Proving computer damage (20:22, 22 February 2009)
- Proving computer trespass (20:24, 22 February 2009)
- Proving invasion of privacy (20:26, 22 February 2009)
- Using electronically obtained evidence (20:27, 22 February 2009)
- The Defense of a Computer Crime Case (20:29, 22 February 2009)
- Cross-examination of prosecution witnesses for the Prosecution (20:30, 22 February 2009)
- Witnesses testifying as to documents (20:31, 22 February 2009)
- Law enforcement witnesses for the Prosecution (20:38, 22 February 2009)
- Accountant witnesses (20:39, 22 February 2009)
- Impeaching witnesses granted immunity; minors (20:39, 22 February 2009)
- Discrediting expert witnesses (20:40, 22 February 2009)
- Discrediting expert witnesses—Illustrative cross-examination of systems analyst (20:53, 22 February 2009)
- In general; timing the appearance of defense witnesses (20:54, 22 February 2009)
- Defendant as a witness (20:58, 22 February 2009)
- Other defense witnesses; alleged codefendants (20:58, 22 February 2009)
- Alibi witnesses (20:59, 22 February 2009)
- Character witnesses (21:00, 22 February 2009)
- Minors as defense witnesses (21:00, 22 February 2009)
- Experts (21:02, 22 February 2009)
- Defense Summation in general (21:03, 22 February 2009)
- Illustrative summation (21:04, 22 February 2009)
- Drafting instructions to jury—key terms (21:08, 22 February 2009)
- Drafting instructions to jury—Computer damage (21:17, 22 February 2009)
- Drafting instructions to jury—Alteration with intent to injure or defraud (21:29, 22 February 2009)
- Drafting instructions to jury—Computer theft—access (21:35, 22 February 2009)
- Drafting instructions to jury—Taking, transferring, concealing, or retaining (21:36, 22 February 2009)
- Proceedings After Trial in general (21:37, 22 February 2009)
- Conferring with probation officer (21:39, 22 February 2009)
- Sentencing hearing—illustrative argument and response (21:45, 22 February 2009)
- Return of exhibits (21:46, 22 February 2009)
- Civil consequences of plea or finding of guilt (21:48, 22 February 2009)
- FN57 (10:29, 25 February 2009)
- FN58 (10:31, 25 February 2009)
- FN59 (10:33, 25 February 2009)
- FN60 (10:35, 25 February 2009)
- FN61 (10:37, 25 February 2009)
- FN62 (10:39, 25 February 2009)
- FN63 (10:41, 25 February 2009)
- FN64 (10:43, 25 February 2009)
- FN65 (10:45, 25 February 2009)
- FN66 (10:47, 25 February 2009)
- FN67 (10:48, 25 February 2009)
- FN68 (10:50, 25 February 2009)
- FN70 (10:53, 25 February 2009)
- FN71 (10:56, 25 February 2009)
- FN72 (10:57, 25 February 2009)
- FN73 (10:46, 26 February 2009)
- FN74 (10:49, 26 February 2009)
- FN75 (11:02, 26 February 2009)
- FN76 (11:05, 26 February 2009)
- FN77 (11:06, 26 February 2009)
- FN78 (11:09, 26 February 2009)
- FN79 (11:11, 26 February 2009)
- FN80 (11:12, 26 February 2009)
- Security Management: (14:10, 27 February 2009)
- FN81 (12:09, 28 February 2009)
- FN82 (12:11, 28 February 2009)
- FN34 (12:13, 28 February 2009)
- FN84 (12:15, 28 February 2009)
- FN36 (12:17, 28 February 2009)
- FN37 (12:19, 28 February 2009)
- FN87 (12:21, 28 February 2009)
- FN88 (12:22, 28 February 2009)
- FN89 (12:24, 28 February 2009)
- FN90 (12:25, 28 February 2009)
- FN91 (12:27, 28 February 2009)
- FN92 (12:29, 28 February 2009)
- FN93 (12:31, 28 February 2009)
- FN94 (12:32, 28 February 2009)
- FN95 (12:33, 28 February 2009)
- FN96 (12:35, 28 February 2009)
- FN97 (12:36, 28 February 2009)
- FN98 (12:38, 28 February 2009)
- FN99 (12:43, 28 February 2009)
- FN1 (16:47, 1 March 2009)
- FN2 (16:49, 1 March 2009)
- FN3 (16:51, 1 March 2009)
- FN4 (16:52, 1 March 2009)
- FN5 (16:53, 1 March 2009)
- FN6 (16:55, 1 March 2009)
- FN7 (16:59, 1 March 2009)
- FN8 (17:00, 1 March 2009)
- FN9 (17:02, 1 March 2009)
- FN10 (17:03, 1 March 2009)
- FN11 (17:04, 1 March 2009)
- FN12 (17:06, 1 March 2009)
- FN13 (17:08, 1 March 2009)
- FN14 (17:09, 1 March 2009)
- FN15 (17:10, 1 March 2009)
- FN16 (17:12, 1 March 2009)
- FN17 (17:13, 1 March 2009)
- FN18 (17:15, 1 March 2009)
- FN19 (17:16, 1 March 2009)
- FN20 (17:18, 1 March 2009)
- FN21 (12:38, 2 March 2009)
- FN22 (12:40, 2 March 2009)
- FN23 (12:42, 2 March 2009)
- FN24 (12:43, 2 March 2009)
- FN25 (12:44, 2 March 2009)
- FN26 (12:45, 2 March 2009)
- FN27 (12:47, 2 March 2009)
- FN28 (12:48, 2 March 2009)
- FN29 (12:50, 2 March 2009)
- FN30 (12:51, 2 March 2009)
- FN31 (11:03, 3 March 2009)
- FN32 (11:05, 3 March 2009)
- FN33 (11:06, 3 March 2009)
- FN35 (11:08, 3 March 2009)
- FN38 (11:18, 3 March 2009)
- FN39 (11:40, 3 March 2009)
- FN40 (11:42, 3 March 2009)
- FN41 (02:56, 5 March 2009)
- FN42 (02:57, 5 March 2009)
- FN43 (02:59, 5 March 2009)
- FN44 (03:00, 5 March 2009)
- FN45 (03:02, 5 March 2009)
- FN46 (03:03, 5 March 2009)
- FN47 (10:39, 5 March 2009)
- FN48 (10:44, 5 March 2009)
- FN49 (10:46, 5 March 2009)
- FN50 (10:47, 5 March 2009)
- FN51 (10:49, 5 March 2009)
- FN52 (10:51, 5 March 2009)
- FN53 (10:52, 5 March 2009)
- FN54 (10:53, 5 March 2009)
- FN55 (10:55, 5 March 2009)
- FN56 (10:57, 5 March 2009)
- FN69 (10:58, 5 March 2009)
- FN83 (10:58, 5 March 2009)
- FN85 (10:59, 5 March 2009)
- FN86 (11:00, 5 March 2009)
- Sovereignty (11:27, 5 March 2009)
- Libel (11:40, 5 March 2009)
- Sample Legal Hold Standards: (13:20, 9 March 2009)
- Sample Asset Protection Standard: (18:06, 15 March 2009)
- Generalized Contract Law Outline (09:26, 7 April 2009)
- Generalized Torts Outline (10:42, 7 April 2009)
- Awareness-training (20:07, 13 June 2009)
- Awareness Articles and Information: (20:12, 13 June 2009)
- Loose Lips, Sink Ships: (20:13, 13 June 2009)
- Integrity (20:33, 28 July 2009)
- Sample On Premise Wireless Access Technology Guideline (16:01, 2 August 2009)
- Infrastructure Best Practice Configuration Samples: (16:15, 2 August 2009)
- Burden of proof (10:18, 11 August 2009)
- Fifth Amendment (10:20, 11 August 2009)
- Social Computing Guidelines (14:56, 28 August 2009)
- Sample Electronic Fraud Prevention Guidelines: (16:53, 22 September 2009)
- Sample Asset Identification and Classification Policy: (17:23, 16 October 2009)
- Risk management (23:45, 10 March 2010)
- Getting it Right in Records Management (22:00, 15 March 2010)
- Why you need an intelligent file transfer solution. (22:16, 15 March 2010)
- Manage Document Metadata (22:52, 15 March 2010)
- A Project Management Approach to eDiscovery (10:44, 16 March 2010)
- Foreign Privacy Laws vs. U.S. Discovery Obligations (10:48, 16 March 2010)
- How Many Pages in a Gigabyte? (10:49, 16 March 2010)
- Information Risk Guide (10:57, 16 March 2010)
- Legal-Technology White Papers (11:06, 16 March 2010)
- Risk management plan (16:58, 28 March 2010)
- Clinger-Cohen-Act (19:27, 4 April 2010)
- Sarbanes-Oxley (14:31, 15 April 2010)
- Corporate Governance (15:20, 15 April 2010)
- FERPA (19:08, 19 April 2010)
- FISMA (19:19, 19 April 2010)
- AS8015 (16:22, 20 April 2010)
- Corporate governance (17:19, 20 April 2010)
- IT Change Management (10:24, 23 April 2010)
- Change control (14:15, 23 April 2010)
- Microsoft Operations Framework (14:19, 23 April 2010)
- ISO 20000 (14:25, 23 April 2010)
- USC 18 1030 (11:31, 1 May 2010)
- Sample Management Awareness Standard: (14:02, 1 May 2010)
- Sample Third Party Security Awareness Standard: (14:05, 1 May 2010)
- Sample Security Awareness Accessibility Standard: (14:07, 1 May 2010)