Search for: "State v. Nist" Results 81 - 100 of 107
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
9 Jun 2021, 8:28 am
It would also allow diplomats and Taiwanese military to display their flag and wear their uniforms while in the United States on official businesses. [read post]
17 Feb 2015, 4:17 am by Kevin LaCroix
’”[v] Proper planning includes incident response and information management business continuity planning, which are mission-critical. [read post]
4 Oct 2016, 4:00 am by Ken Chasse
The admissibility of (acceptance of) such evidence in, R. v. [read post]
26 Jan 2022, 5:01 am by Bill Baer, Stephanie Pell
  Judge Yvonne Gonzalez Rogers, for example, recently ruled in the Epic v. [read post]
10 Nov 2010, 3:33 am
eDiscovery News Context for Considering Discovery A Revised Version of My Alternative EDRM Model - http://tinyurl.com/2c8kzbe A State Court Judge’s View on e-Discovery (Part One) - http://tinyurl.com/23cmd2v Ahhh– We have to Review the Text Messages for Mr. [read post]
19 Jan 2022, 10:09 am by Alvaro Marañon
  This memorandum establishes and clarifies additional authority and responsibilities of the Director of the National Security Agency (NSA) in connection with the National Manager responsibilities for NSS assigned to the Director of the NSA by National Security Directive 42 of July 5, 1990 (National Policy for the Security of National Security Telecommunications and Information Systems) (NSD-42), Executive Order 12333 of December 4, 1981, as amended (United States Intelligence… [read post]
19 Jan 2022, 10:09 am by Alvaro Marañon
  This memorandum establishes and clarifies additional authority and responsibilities of the Director of the National Security Agency (NSA) in connection with the National Manager responsibilities for NSS assigned to the Director of the NSA by National Security Directive 42 of July 5, 1990 (National Policy for the Security of National Security Telecommunications and Information Systems) (NSD-42), Executive Order 12333 of December 4, 1981, as amended (United States Intelligence… [read post]
6 Aug 2015, 6:21 pm by Kevin LaCroix
These include digital forensic preservation and investigation, notification of a broad range of third parties and other constituencies,[1] fulfillment of state and federal compliance obligations, potential litigation, engagement with law enforcement, the provision of credit monitoring, crisis management, a communications plan – and the list goes on. [read post]
8 Oct 2020, 1:09 pm by Shannon Hill
A similar method is used by the National Security Agency (NSA), which works cooperatively with the National Institutes of Standards and Technology (NIST) to develop “protection profiles” for certain types of mobile phones and other communication tools. [read post]
8 Nov 2013, 1:19 pm by Monique Altheim
My blog for @CenDemTech about why this is v. worrisome. https://www.cdt.org/blogs/gs-hans/0611overbroad-subpoena-airbnb-user-data-smacks-general-warrant … “Does the U.S. [read post]
27 Jan 2012, 1:30 am by Monique Altheim
Reding's press conf. on EU #Dataprotection Reform package livestreamed today at 12pm GMT+1 here: ow.ly/8F0S6 #privacy #CPDP2012 # Watch Vivian Reding's Press Conference at the European Commission live here as I will try to live stream it at… http://t.co/whmihIQV # Megaupload takedown reminds us why website terms and conditions can be important http://t.co/LxaQfRc9 # V. [read post]
29 Jul 2014, 3:37 am by Kevin LaCroix
Respondents to the 2014 Global State of Information Security® Survey reported a 25% increase in detected security incidents over 2012 and a 45% increase compared to 2011. [read post]
26 Oct 2011, 6:26 am by Rob Robinson
(Part 1) http://bit.ly/vZBx4k (Tom Mighell) A Proposal for Preservation Rule Amendments - http://bit.ly/nQ7Jzq (William Wallace Belt) A World of Copyright Confusion on the Web - http://bit.ly/qpGVEW (Craig Smith) ABA Formal Opinion 11-460 is at Odds With Stengart v. [read post]
30 Mar 2016, 4:00 am by Ken Chasse
Stinchcombe 1991 CanLII 45 (SCC); and, R. v. [read post]
  However, the commentary in the Proposed Rule states that this threshold question is effectively tied to the sector descriptions in the critical infrastructure Sector-Specific Plans (“SSPs”) that were developed pursuant to PPD-21. [read post]
28 May 2015, 4:00 am by Ken Chasse
Department of Commerce’s National Institute of Standards and Technology (NIST) concluded that, “software errors cost the U.S. economy $59.5 billion annually. [read post]