Search for: "Center for Information Technology Policy" Results 2501 - 2520 of 5,254
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
23 Aug 2013, 2:18 pm by Mark M. Jaycox
Recently, he signed an amicus brief in a case against the NSA spying by the Electronic Privacy Information Center arguing that the NSA’s telephony metadata program is illegal under Section 215 of the PATRIOT Act. [read post]
28 Aug 2024, 9:58 am by Angelina Kushnarova
A network device manages session policies by receiving a request to establish a session management (SM) policy. [read post]
21 Feb 2023, 4:07 am by Josh Richman
  DEJI BRYCE OLUKOTUN Right now my focus is a little bit more broad and it's informed by a fellowship at the Center for Science and Imagination at, um, Arizona State. [read post]
16 Dec 2013, 9:01 pm by Anita Ramasastry
Student Data in the Clouds In a recent study by the Fordham Law School Center for Information Policy, Privacy and Cloud Computing in Public Schools, researchers found that as public schools adopt cloud-based services and technology-based learning systems, they tend to transfer “increasing quantities” of student information to third-party vendors without proper privacy protections. [read post]
31 Dec 2018, 6:00 am by Joseph J. Lazzarotti and Maya Atrakchi
In October, in honor of National Cybersecurity Awareness Month, the OCR together with the Office of the National Coordinator for Health Information Technology jointly launched an updated HIPAA Security Risk Assessment (SRA) Tool to help covered entities and business associates comply with the HIPAA Security Rule. [read post]
29 Feb 2012, 7:40 am by Allison Walton
Additionally, as part of the Federal Data Center Consolidation Initiative, agencies are looking to eliminate 800 data centers. [read post]
16 Nov 2008, 4:43 pm
Adobe may not have access to or control over features that a third party may use, and the information practices of third party websites are not covered by the Adobe Online Privacy Policy. [read post]
8 Oct 2017, 9:30 pm by Sarah Kramer
Mikhail, a professor at Georgetown University Law Center, emphasized that “information-processing devices,” which include human brains and computers, all function similarly when making decisions, at least at a certain level of abstraction. [read post]
16 Nov 2008, 4:43 pm
Adobe may not have access to or control over features that a third party may use, and the information practices of third party websites are not covered by the Adobe Online Privacy Policy. [read post]
5 Apr 2020, 12:00 am by INFORRM
Freedom of Expression and Information in the Time of Globalization: Foundational Course  Columbia Global Freedom of Expression via edX Technology has shaped, reshaped, and radically transformed the production and distribution of information, profoundly impacting whole societies and greatly influencing, if not defining, information and communication. [read post]
7 Jun 2012, 8:58 am by Raffaela Wakeman
He writes: Congress must reassert its constitutional authority and conduct proper oversight of government’s “counterterrorism” policies regardless of the technology being used. [read post]
2 Jun 2008, 6:23 am
"A great way to use technology is to give people power over information," West said. [read post]
1 Mar 2010, 12:27 pm by Rebecca Tushnet
American University Washington College of Law’s Program on Information Justice and Intellectual Property, Women and the Law Program, and Journal of Gender, Social Policy & the Lawpresent IP/Gender: Mapping the Connections Gender and Invention Friday, April 16, 2010 9:00 am – 5:00 pm Washington College of Law, Room 100 4801 Massachusetts Avenue, N.W., Washington, DC 20016 Registration: www.wcl.american.edu/secle/registration Webcast:… [read post]
14 Aug 2009, 11:07 am
The plug-in was released by Princeton’s Center for Information Technology Policy, coded by Harlan Yu and Tim Lee, under the direction of noted computer science professor Ed Felten. [read post]
23 May 2023, 2:57 pm by centerforartlaw
Additionally, fashion model, Bella Hadid, took center stage in the collection’s advertisements, further amplifying the buzz surrounding the collaboration. [read post]
5 Dec 2018, 7:27 am by Lynn Sessions and Alexandra Royal
Specifically, the team includes representatives from the following HHS agencies: Office of Audit Services, Cybersecurity and Information Technology Audit Division. [read post]
The following five categories of cyber violence will be subject to heavier penalties: Abuse targeting minors and disabled persons; Cyber abuse from coordinated groups, termed “water armies” and “thugs”; Sex-related fabrications that infringe on the personal dignity of others; The use of “deep synthesis” technology to release illegal or false information, which violates public policy doctrine and ethics; and Abuse initiated and organized… [read post]
15 Sep 2021, 9:52 am by Cynthia Marcotte Stamer
For specific information about the these or other legal, management or public policy developments, please contact the author Cynthia Marcotte Stamer via e-mail or via telephone at (214) 452 -8297. [read post]