Search for: "Center for Information Technology Policy" Results 2021 - 2040 of 5,254
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
5 Oct 2009, 11:50 am
The Center for Information Technology Policy at Princeton University does, too — it’s called FedThread and and they let you annotate individual notices with comments and questions. [read post]
11 Oct 2017, 6:04 am by Steve Surdu
In the not-too-distant past, cybersecurity often did not appear on a high-level organization chart or was buried under layers of  information technology leadership. [read post]
19 Jan 2022, 9:22 am by John Jascob
” According to Fink, this environment may cause employees to increasingly look to their employer for trustworthy information rather than to governments, media outlets, or nongovernmental organizations.To further advance the public’s understanding of stakeholder capitalism, Fink announced that Blackrock would create the Center for Stakeholder Capitalism. [read post]
22 Jan 2014, 10:38 am
Adoption of electronic health records will increase in 2014 and spur industry-wide change, according to Rainu Kaushal, chairwoman of the Department of Healthcare Policy and Research at Weill Cornell Medical College. [read post]
22 May 2022, 11:10 am
And that’s been what has informed this policy outcome. [read post]
26 Jan 2018, 5:00 am by Anonymous
Professor of Law, UC Davis Juniper Downs - Global Head of Policy, YouTube Min Jiang - Associate Professor of Communication, UNC Charlotte; Secretariat Member, Chinese Internet Research Conference Peter Stern - Policy Manager, Facebook Emma Llansó - Director, Free Expression Project, Center for Democracy & Technology Agenda: Sometimes, the most powerful forces shaping Internet content removal decisions don’t come from the law. [read post]
30 Oct 2014, 7:38 pm by Guest Blogger
Louis, Missouri recently underscored, greatly inform the kind of reception that they receive in their local communities. [read post]
5 Jan 2009, 10:58 am
 The web-blurb promises great things: "Prepared by and for policy-makers, leaders of public sector research establishments, technology transfer professionals, licensing executives, and scientists, this online resource offers up-to-date information and strategies for utilizing the power of both intellectual property and the public domain. [read post]
13 Dec 2022, 5:55 pm by Activism Intern
The Criminalization Chapter should be restricted to core cybercrimes–criminal offences in which information and communications technology (ICT) systems are the direct objects, as well as instruments, of the crimes; these crimes could not exist at all without the ICT systems. [read post]
22 Oct 2021, 9:03 pm by Soojin Jeong
Given public backlash to government drone policy, Jonathan P. [read post]
19 Mar 2021, 5:41 pm by INFORRM
After the riots at the US Capitol in January 2021, the web hosting service informed the social media platform that it had breached the service level agreement and acceptable use policy by not taking action against posts on the platform which incited violence. [read post]
17 Jan 2017, 10:37 am by Dave Maass and rainey Reitman
The bill would also require every state agency to review its confidentiality policies and only collect the bare minimum of information required to carry out its duties. [read post]
5 Oct 2010, 7:56 pm by Adam Thierer
Today it was my pleasure to take part in an Information Technology and Innovation Foundation discussion about Rob Atkinson’s interesting new white paper, “Who’s Who in Internet Politics: A Taxonomy of Information Technology Policy Perspectives . [read post]
14 Aug 2013, 4:00 am by Michael Erdle
The World Intellectual Property Organization (WIPO) Arbitration and Mediation Center provides a host of dispute resolution services, including domain name arbitration. [read post]
25 Oct 2017, 4:27 pm by John Chierichella and Townsend Bourne
If malicious software is discovered during review of a cyber incident, the contractor must supplement the cyber incident report with information about the malicious software (malware) and provide it to the “DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. [read post]
26 Oct 2017, 11:30 am by John Chierichella and Townsend Bourne
If malicious software is discovered during review of a cyber incident, the contractor must supplement the cyber incident report with information about the malicious software (malware) and provide it to the “DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. [read post]
7 May 2008, 10:00 pm
Previously he was Associate Director of the Center for Democracy & Technology. [read post]
31 May 2024, 6:29 am by INFORRM
 As Meta’s Oversight Board (OSB) reviews the moderation of posts that include the slogan “From the River to the Sea” on its platforms, the Future of Free Speech (FFS), Electronic Frontier Foundation (EFF), and Center for Democracy & Technology (CDT) submit public comments on the matter. [read post]