Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
20 Ergebnisse
Sortierung:
SSRN
SSRN
SSRN
SSRN
In: Defense, Security and Strategies
Intro -- FEDERAL CYBERSECURITY: LEGAL CONSIDERATIONSAND ASSESSMENTS -- FEDERAL CYBERSECURITY: LEGAL CONSIDERATIONS AND ASSESSMENTS -- CONTENTS -- PREFACE -- Chapter 1 CYBERSECURITY: SELECTED LEGAL ISSUES -- SUMMARY -- INTRODUCTION -- LEGAL ISSUES RELATED TO PROTECTINGCRITICAL INFRASTRUCTURE -- Deference to Agency Decisions -- Availability of Judicial Review -- Questions of Fact -- Interpretations of Law -- Liability Concerns -- Proprietary and Confidential Business Information -- Legislation in the 112th Congress -- H.R. 3674, the PRECISE Act of 2011 -- S. 2105, the Cybersecurity Act of 2012 -- LEGAL ISSUES RELATED TO THE PROTECTION OF FEDERAL NETWORKS -- EINSTEIN Overview -- EINSTEIN and the Fourth Amendment -- Monitoring Communications from Federal Employees -- Monitoring Communications from Private Personsto Federal Employees -- Alternative to Traditional Warrant Requirement -- Privacy and Civil Liberties Oversight -- Legislation in the 112th Congress -- S. 2105, the Cybersecurity Act of 2012 -- LEGAL ISSUES RELATED TO SHARING CYBERSECURITY THREAT INFORMATION -- Electronic Communications Privacy Act -- Antitrust Law -- Liability for Information Sharing -- Protection of Proprietary or Confidential Business Information -- Legislation in the 112th Congress -- H.R. 3523, the Cyber Intelligence Sharing and Protection Act of 2011, As Ordered Reported -- H.R. 3674, PRECISE Act -- S. 2102, the Cybersecurity Information Sharing Act of 2012 -- S. 2105, the Cybersecurity Act of 2012 -- S. 2151, the SECURE IT Act -- PREEMPTION -- End Notes -- Chapter 2 PRIVACY IMPACT ASSESSMENTEINSTEIN PROGRAM:COLLECTING, ANALYZING,AND SHARING COMPUTER SECURITY INFORMATION ACROSS THE FEDERALCIVILIAN GOVERNMENT -- EXECUTIVE SUMMARY -- THE EINSTEIN PROGRAM -- Introduction -- The Role of DHS and US-CERT -- The EINSTEIN Program -- OMB: SIX COMMONSECURITY WEAKNESSES
In: Darden Case No. UVA-F-1772
SSRN
SSRN
SSRN
SSRN
SSRN
In: Darden Case No. UVA-ENT-0063
SSRN
In: Darden Case No. UVA-OB-0855
SSRN
In: Darden Case No. UVA-F-1980
SSRN
SSRN
SSRN