L2D132
(1.3) | L3T26 (46%): Information privacy (21%), General Data Protection Regulation (14%), Privacy (12%)
L3T33 (20%): Information technology (33%), Computing (31%), Information security (21%)
| L1D354
(1.7) | L3T26 (30%): Information privacy (15%), General Data Protection Regulation (12%), Personal data (8%)
L3T15 (25%): European Union (13%), European Data Protection Supervisor (8%), European Parliament (8%), European Commission (7%), Policy (6%)
| - AMENDMENTS 300 - 499 - Draft report European data governance (Data Governance Act) (1970) (1970) [+]
- AMENDMENTS 300 - 499 - Draft report European data governance (Data Governance Act) (1970) (1970) [+]
- Reforming the data protection package. (2013) (2013) [+]
- EU Privacy seals project: Inventory and analysis of privacy certification schemes (2013) (2013) [+]
- EU privacy seals project : inventory and analysis of privacy certification schemes. (2013) (2013) [+]
- Enabling Humanitarian Use of Mobile Phone Data (2014) (2014) [+]
- On cloud computing, Europe is down but not out (2014) (2014) [+]
- Daten und Persönlichkeitsschutz (2015) (2015) [+]
- Zollkodex-Durchführungsverordnung (Zollkodex-DVO) (2015) (2015) [+]
- FOI release: software contracts for Wilton Park (2016) (2016) [+]
- The big data dilemma: Government Response to the Committee ’s Fourth Report of Session 2015 – 16 (2016) (2016) [+]
- Rfa Dsg (2016) (2016) [+]
- Policy and Procedure on Open l) ata (2016) (2016) [+]
- Open data privacy: a risk-benefit, process-oriented approach to sharing and protecting municipal data (2017) (2017) [+]
- Guidelines on the protection of individuals with regard to the processing of personal data in a world of Big Data (2017) (2017) [+]
- Handbook on Data Protection in Humanitarian Action (2017) (2017) [+]
- Privitar proof of concept (2017) (2017) [+]
- Data governance: landscape review (2017) (2017) [+]
- „Eigentumsordnung“ für Mobilitätsdaten? - Eine Studie aus technischer, ökonomischer und rechtlicher Perspektive (2017) (2017) [+]
- Dr. Amen Ra Mashariki, Chief Analytics Officer Testimony Before Nyc Taxi And Limousine Commission Board Of Commissioners Thursday, January 5, 2017 (2017) (2017) [+]
- 17 / En Wp 248 (2017) (2017) [+]
- Digitalisierung und Beschäftigtendatenschutz (2017) (2017) [+]
- Modernizing the Way States Collect and Store Data (2018) (2018) [+]
- Ethics and data protection (2018) (2018) [+]
- The Impact of the EU’s New Data Protection Regulation on AI (2018) (2018) [+]
- GUIDE TO DATA SHARING (2018) (2018) [+]
- Draft Statistics Statement of Principles and Draft Code of Practice on changes to data systems (2018) (2018) [+]
- Data management and use: Governance in the 21st century - a British Academy and Royal Society project (2018) (2018) [+]
- Data Ethics Principles (2018) (2018) [+]
- TAN Tech Brief (2018) (2018) [+]
- Data protection: toolkit for schools (2018) (2018) [+]
- For business leaders, #GDPR compliance can be opportunity for sustained growth, competitive edge – Accenture report. (2018) (2018) [+]
- Annual report 2017 : executive summary. (2018) (2018) [+]
- Data Protection Impact Assessment (DPIA) template (2019) (2019) [+]
- Blockchain and the General Data Protection Regulation (2019) (2019) [+]
- Championing Data Protection and Privacy (2019) (2019) [+]
- Technology Services Board Quarterly Meeting (2019) (2019) [+]
- Consumer IoT: Trust by Design - Guidelines and Checklists (2019) (2019) [+]
- Federated Data Systems: Balancing Innovation and Trust in the Use of Sensitive Data (2019) (2019) [+]
- Report by Michael McLoughlin, Big Data: The Digital Revolution and its Impact on Society (2019) (2019) [+]
- Round-Table Discussion : Use of Technology in Official Statistics : Ethical Considerations : Economic and Social Commission for Western Asia (ESCWA), Statistical Committee, Thirteenth Session, Beirut, 29-30 January 2019 (2019) (2019) [+]
- Publishing detailed datasets in Immigration statistics (2019) (2019) [+]
- Commissiebrief over Aanbeveling Europees uitwisselingsformaat elektronisch patiëntendossier (2019) (2019) [+]
- Rechtliche Herausforderungen bei Smart Services (2019) (2019) [+]
- Blockchain and the general data protection regulation : Can distributed ledgers be squared with European data protection law? (2019) (2019) [+]
- Open Data in Deutschland und Europa (2020) (2020) [+]
- Open data and privacy. (2020) (2020) [+]
- Distributed ledger technologies and blockchain : research and technology monitoring report : key findings. (2020) (2020) [+]
- EDPS public paper on outcome of own-initiative investigation into EU institutionsâ use of Microsoft products and services. (2020) (2020) [+]
- AMENDMENTS 1 - 105 - Draft opinion A European strategy for data (2020) (2020) [+]
- Guidelines for public administrations on location privacy (2020) (2020) [+]
- Guidelines for public administrations on location privacy : European Union location framework. (2020) (2020) [+]
- Texas Privacy Protection Advisory Council (2020) (2020) [+]
- Protecting Privacy in Data Releases (2020) (2020) [+]
- Building trust in digital government (2020) (2020) [+]
- Pandemic, privacy and protection of personal information (2020) (2020) [+]
- Onderzoeksrapport: Toepassing van de Personal Health Train in de zorg (2020) (2020) [+]
- The protection of personal data in health information systems- principles and processes for public health (2021) (2021) [+]
- Achieving Privacy : Costs of Compliance and Enforcement of Data Protection Regulation (2021) (2021) [+]
- Praxishilfe zum Datenschutz in Reallaboren (2021) (2021) [+]
- JOINT OPINION ON THE PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL ON EUROPEAN DATA GOVERNANCE (DATA GOVERNANCE ACT) (2021) (2021) [+]
- Mapping Data Governance Legal Frameworks Around the World : Findings from the Global Data Regulation Diagnostic (2021) (2021) [+]
|
L1D355
(1.7) | L3T26 (30%): Information privacy (15%), General Data Protection Regulation (12%), Personal data (8%)
L3T15 (25%): European Union (13%), European Data Protection Supervisor (8%), European Parliament (8%), European Commission (7%), Policy (6%)
| - Department of Homeland Security Privacy Impact Assessment Future Attribute Screening Technology Project (2008) (2008) [+]
- Certification schemes for cloud computing : final report. (2014) (2014) [+]
- Security and resilience in eHealth : security challenges and risks. (2015) (2015) [+]
- Hackers, phishers, and disappearing thumb drives: Lessons learned from major health care data breaches (2016) (2016) [+]
- Data pseudonymisation review (2016) (2016) [+]
- The Privacy, Confidentiality and Security Assessment Tool â User manual (2016) (2016) [+]
- Privacy by design in big data : an overview of privacy enhancing technologies in the era of big data analytics. (2016) (2016) [+]
- Privacy and security in personal data clouds : final report. (2017) (2017) [+]
- The Social Benefits of Blockchain for Health Data: Securing Patient Privacy and Control (2017) (2017) [+]
- Big data : too big to ignore for Latin America and the Caribbean / (2017) (2017) [+]
- Scanned Image (2018) (2018) [+]
- Security News Digest May 8th, 2018 (2018) (2018) [+]
- ICT security certification opportunities in the healthcare sector. (2018) (2018) [+]
- A New Technology May Revolutionize Privacy-Preserving Data Analysis: Secure Multi-Party Computation (2018) (2018) [+]
- NNIP's Resource Guide to Data Governance and Security (2018) (2018) [+]
- July is“ Security while you travel ” Month (2018) (2018) [+]
- Examining the current data security and breach notification regulatory regime : hearing before the Subcommittee on Financial Institutions and Consumer Credit of the Committee on Financial Services, U.S. House of Representatives, One Hundred Fifteenth Congress, second session, February 14, 2018. (2018) (2018) [+]
- Security of patients' hospital data (2019) (2019) [+]
- Procurement guidelines for cybersecurity in hospitals : good practices for the security of healthcare services. (2020) (2020) [+]
- Glossary of Terms (2020) (2020) [+]
- Regulating digital health (2020) (2020) [+]
- Cloud security for healthcare services. (2021) (2021) [+]
- Big Data and B2B platforms : the next big opportunity for Europe : executive summary. (2021) (2021) [+]
|
L1D356
(1.7) | L3T26 (30%): Information privacy (15%), General Data Protection Regulation (12%), Personal data (8%)
L3T15 (25%): European Union (13%), European Data Protection Supervisor (8%), European Parliament (8%), European Commission (7%), Policy (6%)
| - Freedom in Europe : securing our technological future. (2010) (2010) [+]
- Commission Staff Working Document. E-commerce Action Plan 2012-2015. State of play 2013. (2013) (2013) [+]
- Annual report 2012. (2013) (2013) [+]
- Commitments Made at the Hearing of Andrus Ansip - Commissioner-Designate (2014) (2014) [+]
- EDPS newsletter. No. 43, October 2014. (2014) (2014) [+]
- EU Institutions Need Stronger Frameworks for Information Security and Data Protection (2014) (2014) [+]
- Communication de la Commission au Parlement européen, au Conseil, au Comité économique et social européen et au Comité des régions - Vers une économie de la donnée prospère (2014) (2014) [+]
- Commitments made at the hearing of Andrus Ansip, Vice-President for the Digital Single Market. (2015) (2015) [+]
- A balanced set of rules to benefit the European digital economy - Message on the general data protection regulation in view of the trilogue discussions - Letter from Markus J. Beyrer to Commission Vera Jourova (2015) (2015) [+]
- Interactive EU Mapping: Overview of Internal Market and Consumer Protection Related Legislation - Digital Single Market and e-Commerce (2015) (2015) [+]
- Bericht der 67. Europaministerkonferenz 29 ./ 30. Januar 2015 (2015) (2015) [+]
- Interactive EU mapping - overview of IMCO related legislation : digital single market and e-commerce. (2015) (2015) [+]
- EDPS newsletter. No. 44, February 2015. (2015) (2015) [+]
- Annual report 2014 : executive summary. (2015) (2015) [+]
- Annual report 2014. (2015) (2015) [+]
- EDPS newsletter. No. 49, October 2016. (2016) (2016) [+]
- eGovernment Action Plan 2016-2020 (2016) (2016) [+]
- Annual report 2015. (2016) (2016) [+]
- EDPS newsletter. No. 50, December 2016. (2016) (2016) [+]
- Valto: EU-tietosuojan kokonaisuudistus (2016) (2016) [+]
- 3570 Transport, Telecommunications and Energy (2017) (2017) [+]
- E-ID-Gesetz - Stellungnahmen des Vernehmlassungsverfahrens: weitere Stellungnahmen (2017) (2017) [+]
- Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a framework for the free flow of non-personal data in the European Union (2017) (2017) [+]
- Review of the ePrivacy Directive (2017) (2017) [+]
- The proposal for a free flow of data regulation - a BusinessEurope position paper (2017) (2017) [+]
- EU-wide digital once-only principle for citizens and businesses : policy options and their impacts : final report. (2017) (2017) [+]
- ANNEXES to the Proposal for a Directive of the European Parliament and of the Council on the interoperability of electronic road toll systems and facilitating cross-border exchange of information on the failure to pay road fees in the Union (recast) (2017) (2017) [+]
- Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on a framework for the free flow of non-personal data in the European Union (2017) (2017) [+]
- Tallinn Declaration on eGovernment (2017) (2017) [+]
- Annual report 2016. (2017) (2017) [+]
- E-ID-Gesetz - Stellungnahmen des Vernehmlassungsverfahrens: weitere Stellungnahmen (2017) (2017) [+]
- Study on the evaluation of the European Union Agency for Network and Information Security : final report. (2017) (2017) [+]
- Free flow of non-personal data in the European Union (2018) (2018) [+]
- Annual report 2017. (2018) (2018) [+]
- Public Security Exception in the Area of non-personal Data in the European Union (2018) (2018) [+]
- Auswirkungen der EU-Strategie für einen digitalen Binnenmarkt auf die Schweiz (2018) (2018) [+]
- Recommendations on European data protection certification : (2018) (2018) [+]
- Proposal for a Directive on the Use of Digital Tools and Processes in Company Law (2018) (2018) [+]
- Digital revolution : mini-conference and Tech Corner on the European Parliament Open Days 2016. (2018) (2018) [+]
- Annual report 2018. (2019) (2019) [+]
- Annual report 2018. (2019) (2019) [+]
- Securing America’s Elections (2019) (2019) [+]
- Data protection certification mechanisms : study on Articles 42 and 43 of the Regulation (EU) 2016/679 : final report. (2019) (2019) [+]
- COMMISSION STAFF WORKING DOCUMENT Review of the Common Information Sharing Environment (CISE) for the maritime domain: 2014 - 2019 (2019) (2019) [+]
- Guidance on the free flow of non-personal data (2019) (2019) [+]
- Annual report 2018 : executive summary. (2019) (2019) [+]
- COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Guidance on the Regulation on a framework for the free flow of non-personal data in the European Union (2019) (2019) [+]
- Contributing to Growth: European Digital Single - Market Delivering improved rights for citizens and businesses (2019) (2019) [+]
- 2019-2023 Action Plan for European e-Justice - Adoption by Council (6 December 2018) (2019) (2019) [+]
- Proposal for a Directive of the European Parliament and of the Council on the interoperability of electronic road toll systems and facilitating cross-border exchange of information on the failure to pay road fees in the Union (recast) (Text with EEA relevance) Revised presentation of the four-column document (2019) (2019) [+]
- OUTCOME OF THE COUNCIL MEETING 3696 TRANSPORT, TELECOMMUNICATIONS AND ENERGY TRANSPORT AND TELECOMMUNICATIONS (2019) (2019) [+]
- Leading by example : EDPS 2015 - 2019. (2019) (2019) [+]
- Guidance on the free flow of non-personal data (2019) (2019) [+]
- Annual activity report 2019. (2020) (2020) [+]
- NOTICE TO MEMBERS Petition No 0850/2019 by Miguel Angel Alvarez Cabrerizo (Spanish) on uniform information on public transport services available across the EU (2020) (2020) [+]
- Annual report 2019 : executive summary. (2020) (2020) [+]
- Kamerbrief over verslag van de informele Telecomraad 5 mei 2020 (2020) (2020) [+]
- Contribution to growth : European digital single market : delivering improved rights to European citizens and businesses. (2020) (2020) [+]
- Kamerbrief met het verslag van de informele Telecomraad 5 mei 2020 (2020) (2020) [+]
- Who is who : European Forum of Official Gazettes. July 2020. (2020) (2020) [+]
- Annual report 2019. (2020) (2020) [+]
- DRAFT REPORT on discharge in respect of the implementation of the general budget of the European Union for the financial year 2019, Section IX – European Data Protection Supervisor (2020) (2020) [+]
- Public security exception in the area of non-personal data in the European Union. (2020) (2020) [+]
- FORMAL COMMENTS ON THE PROPOSAL FOR A REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL ON SERIOUS CROSS-BORDER THREATS TO HEALTH AND REPEALING DECISION NO 1082/2013/EU (2021) (2021) [+]
- REPORT on discharge in respect of the implementation of the general budget of the European Union for the financial year 2019, Section IX – European Data Protection Supervisor (2021) (2021) [+]
- 1. European Parliament decision of 28 April 2021 on discharge in respect of the implementation of the general budget of the European Union for the financial year 2019, Section IX – European Data Protection Supervisor (2020/2148(DEC)) (2021) (2021) [+]
- Implementation of the Regulation (EU) 2018/1807 on a Framework for the Free Flow of Non-Personal Data in the European Union (2021) (2021) [+]
- Kamerbrief over Geannoteerde agenda formele Telecomraad 4 juni 2021 (2021) (2021) [+]
- Kamerbrief Geannoteerde agenda formele Telecomraad 4 juni 2021 (2021) (2021) [+]
- Valto: Nationell riskbedömning av penningtvätt och finansiering av terrorism 2021 (2021) (2021) [+]
- Regulating Personal Data : Data Models and Digital Services Trade (2021) (2021) [+]
- The Digital Services Act and the Digital Markets Act (2021) (2021) [+]
- REPORT on discharge in respect of the implementation of the general budget of the European Union for the financial year 2019, Section IX – European Data Protection Supervisor (2021) (2021) [+]
|
L1D357
(1.7) | L3T26 (30%): Information privacy (15%), General Data Protection Regulation (12%), Personal data (8%)
L3T15 (25%): European Union (13%), European Data Protection Supervisor (8%), European Parliament (8%), European Commission (7%), Policy (6%)
| - Valto: eHealth Roadmap – Finland (2007) (2007) [+]
- Situating Anonymization Within a Privacy Risk Model (2013) (2013) [+]
- Security of eGovernment Systems (2013) (2013) [+]
- Security of eGovernment Systems (2013) (2013) [+]
- Veiligheid van systemen voor de digitale overheid (2013) (2013) [+]
- Security of eGovernment systems : final report. (2013) (2013) [+]
- eHealth European Interoperability Framework : vision on eHealth EIF. (2013) (2013) [+]
- Security of eGovernment systems : conference report. (2013) (2013) [+]
- Key Insights: Expert Views on Threats to the Internet (2014) (2014) [+]
- Considerations and guidance for countries adopting national health identifiers (2014) (2014) [+]
- Référentiel de bonnes pratiques sur les applications et les objets connectés en santé (mobile Health ou mHealth) (2016) (2016) [+]
- Good practice guidelines on health apps and smart devices (mobile health or mhealth) (2016) (2016) [+]
- Patients Could Help Improve Record Matching (2018) (2018) [+]
- Guidance and gaps analysis for European standardisation : privacy standards in thec information security context. (2019) (2019) [+]
- What Comparative Information is Needed for the EHR Reporting Program? (2020) (2020) [+]
- Blockchain In California : A Roadmap (2020) (2020) [+]
- The Interoperability Challenge of the COVID-19 Return-to-Work App Ecosystem (2020) (2020) [+]
- Dealing with data privacy and security to support agricultural R&D: Technical practices and operating procedures for responsible agroinformatics data management. (2020) (2020) [+]
|
L2D133
(1.8) | L3T24 (55%): Authentication (14%), Security technology (8%)
| L1D358
(2.0) | L3T24 (54%): Authentication (8%), Security technology (5%), Access control (4%), Security engineering (4%), Password (4%)
| - Changing perceptions of biometric technologies (1970) (1970) [+]
- Assessing Biometrics and Privacy and Touching Big Brother (1996) (1996) [+]
- Video Analytics technology : the foundations, market analysis and demonstrations / by Dmitry O. Gorodnichy ... [et al.]. (2002) (2002) [+]
- Impact of demographic factors on performance of biometric systems / John W. M. Campbell, Bion Biometrics Inc. (2002) (2002) [+]
- Biometrische Identifikationssysteme (2002) (2002) [+]
- Information Security: Key Considerations Related to Federal Implementation of Radio Frequency Identification Technology (2005) (2005) [+]
- United Kingdom Identity Cards and Social Exclusion (2005) (2005) [+]
- Information Security: Radio Frequency Identification Technology in the Federal Government (2005) (2005) [+]
- Report on the civil registry in the Republic of Azerbaijan (2006) (2006) [+]
- Innovation by Policy: A Study of the Electronic Passport (2007) (2007) [+]
- Large-scale Biometrics Deployment in Europe: Identifying Challenges and Threats (2008) (2008) [+]
- Future Issue: Biometrics (2009) (2009) [+]
- Glosario para registros civiles e identificación (2010) (2010) [+]
- Civil Registration and Identification Glossary (2010) (2010) [+]
- Biometrics Standards Requirements for US-VISIT (2010) (2010) [+]
- Identity Verification Project (T-Channel) (2011) (2011) [+]
- Workshop on emerging surveillance capabilities & requirements : JRC Ispra, Italy, 5 – 6 July 2011. (2011) (2011) [+]
- Workshop on Emerging Surveillance Capabilities & Requirements (2011) (2011) [+]
- Biometrics at the frontiers : assessing the impact on society (for the European Parliament Committee on Citizens' Freedoms and Rights, Justice and Home Affairs (LIBE)). (2011) (2011) [+]
- BCLC Voluntary Self Exclusion Program Program Review Report (2011) (2011) [+]
- The Evolution of India’s UID Program: Lessons Learned and Implications for Other Developing Countries (2012) (2012) [+]
- Enhancing migration data management in Lesotho: Assessment and recommendations - (2013) (2013) [+]
- Optionen der Schweiz für die Errichtung eines Programms für registrierte Reisende (2013) (2013) [+]
- Identification for Development: The Biometrics Revolution - Working Paper 315 (2013) (2013) [+]
- Biometrics deployment study : identifying challenges and threats facing large-scale biometrics deployment in Europe: final report. (2014) (2014) [+]
- Fingerprint identification technology for its implementation in the Schengen Information System II (SIS-II). (2015) (2015) [+]
- Summary of the activities of the ERNCIP Applied Biometrics for security of CI Thematic Group (2015) (2015) [+]
- Shaping the Strategic Landscape on Technology for the National Security Enterprise (2015) (2015) [+]
- Biometrics in large-scale IT : recent trends, current performance capabilities, recommendations for the near future. (2015) (2015) [+]
- The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers - Task 2 (2015) (2015) [+]
- Experiences from large scale testing of systems using biometric technologies (2015) (2015) [+]
- Summary of the activities of the ERNCIP applied biometrics for security of CI thematic group. (2015) (2015) [+]
- House of Commons Science and Technology Committee (2015) (2015) [+]
- Summary of Applied Biometrics TG Activities: October 2015 to August 2016: ERNCIP Thematic Group Applied Biometrics for the Security of Critical Infrastructures (2016) (2016) [+]
- Video surveillance standardisation activities, process and roadmap: ERNCIP Thematic Group Video Surveillance for Security of Critical Infrastructure (2016) (2016) [+]
- Smart borders pilot project : report on the technical conclusions of the pilot. Volume 1. (2016) (2016) [+]
- Identification for Development : Cote d’Ivoire (2016) (2016) [+]
- Namibia Identity Management : System Analysis (2016) (2016) [+]
- Replacing Something Bad With Something Worse: Why Biometric Authentication Will Be So Creepy (2016) (2016) [+]
- Diccionario para registros civiles e identificación (2016) (2016) [+]
- Dictionary for Civil Registration and Identification (2016) (2016) [+]
- Summary of Applied Biometrics TG Activities : October 2015 to August 2016. (2016) (2016) [+]
- Dictionary for Civil Registration and Identification (2016) (2016) [+]
- Identification for Development : Morocco (2016) (2016) [+]
- Smart borders pilot project : technical report annexes. Volume 2. (2016) (2016) [+]
- Identification for Development : Guinea (2016) (2016) [+]
- Use and acceptance of biometric technologies among victims of identity crime and misuse in Australia (2016) (2016) [+]
- Identification for Development : Kenya (2016) (2016) [+]
- Diccionario para registros civiles e identificación (2016) (2016) [+]
- “Law Enforcement’s Use of Facial Recognition Technology” (2017) (2017) [+]
- Guía de aplicación de la norma técnica de interoperabilidad de política de firma y sello electrónicos y certificados de la administración (2017) (2017) [+]
- City of Seattle (2017) (2017) [+]
- Video surveillance standardisation activities, process and roadmap : ERNCIP thematic group video surveillance for security of critical infrastructure. (2017) (2017) [+]
- Los datos masivos (Big Data) (2018) (2018) [+]
- Machine Readable Travel Documents (2018) (2018) [+]
- Machine Readable Travel Documents (2018) (2018) [+]
- Introducing Biometric Technology in Elections (2018) (2018) [+]
- Industrial Revolution ” (2018) (2018) [+]
- AnnexD – Proposed Amendment to Guidelines to MAS 3001 (2018) (2018) [+]
- Biometrics: a guide (2018) (2018) [+]
- Review of national identity programs (2019) (2019) [+]
- Technical and operational issues associated with early warning zones for critical infrastructure : ERNCIP thematic group on early warning zones. (2019) (2019) [+]
- Technology Landscape for Digital Identification (2019) (2019) [+]
- Facial Recognition Technology (Part II): Ensuring Transparency in Government Use (2019) (2019) [+]
- Facial Recognition Technology (Part II): Ensuring Transparency in Government Use (2019) (2019) [+]
- Facial Recognition Technology (Part II): Ensuring Transparency in Government Use (2019) (2019) [+]
- Identification for Development Country Diagnostic : Rwanda (2019) (2019) [+]
- Technical and Operational Issues Associated with Early Warning Zones for Critical Infrastructure (2019) (2019) [+]
- Use and acceptance of biometric technologies in 2017 (2019) (2019) [+]
- “Facial Recognition Technology (Part III): Ensuring Commercial Transparency & Accuracy” (2020) (2020) [+]
- C190014 - UK Science, Research and Technology Capability and Influence in Global Disease Outbreaks (2020) (2020) [+]
- Biometric Data Privacy in the Digital Age (2020) (2020) [+]
- IMANI: Why CSOs Oppose the New Biometric Voter System: The Full Story (2020) (2020) [+]
- White paper: A Framework for Responsible Limits on Facial Recognition Use Case: Flow Management (2020) (2020) [+]
- Blockchain et identification numérique.fr (2021) (2021) [+]
- Answer for question E-005925/20 (2021) (2021) [+]
|
L1D359
(2.0) | L3T24 (54%): Authentication (8%), Security technology (5%), Access control (4%), Security engineering (4%), Password (4%)
| - Vulnerability Disclosure Framework, Final Report and Recommendations By The Council (2005) (2005) [+]
- Information Security: Federal Reserve Needs to Address Treasury Auction Systems (2006) (2006) [+]
- Electronic Government: Agencies Face Challenges in Implementing New Federal Employee Identification Standard (2006) (2006) [+]
- Information Security: Sustained Management Commitment and Oversight Are Vital to Resolving Long-standing Weaknesses at the Department of Veterans Affairs (2007) (2007) [+]
- Privacy Impact Assessment for the (2007) (2007) [+]
- Privacy Impact Assessment for the Unified Financial Management System (2008) (2008) [+]
- Department of Homeland Security Privacy Impact Assessment Core Accounting Suite (2009) (2009) [+]
- Information Security: National Archives and Records Administration Needs to Implement Key Program Elements and Controls (2010) (2010) [+]
- Policy Project Template (2011) (2011) [+]
- Influences on the Adoption of Multifactor Authentication (2011) (2011) [+]
- Banca d'Italia - Il Cloud Computing nel sistema finanziario. Standard, regolamentazione e controlli (2012) (2012) [+]
- Information Security: Actions Needed by Census Bureau to Address Weaknesses (2013) (2013) [+]
- Recommendations for "payment account access" services : draft document for public consultation. (2013) (2013) [+]
- NIMS Information Security Threat Methodology (2013) (2013) [+]
- Monetary Authority of Singapore (2013) (2013) [+]
- RESPONSE 38e (2013) (2013) [+]
- Information security : FDIC made progress in securing key financial systems, but weaknesses remain : report to the chairman, Federal Deposit Insurance Corporation. (2014) (2014) [+]
- Report of the Group on Enabling PKI in Payment System Applications (2014) (2014) [+]
- Report of the Group on Enabling PKI in Payment System Applications (2014) (2014) [+]
- Information Security: IRS Needs to Address Control Weaknesses That Place Financial and Taxpayer Data at Risk (2014) (2014) [+]
- Federal (and Mutual Aid) Emergency Response Official (F/ERO) Credentialing and Validation (2014) (2014) [+]
- New Smart Energy Code content (Stage 3) (2014) (2014) [+]
- FY 2013 HSGP Supplemental Resource: Federal (and Mutual Aid) Emergency Response Official (F/ERO) Credentialing and Validation (2014) (2014) [+]
- Information Security: FDIC Made Progress in Securing Key Financial Systems, but Weaknesses Remain (2014) (2014) [+]
- Information Security: SEC Needs to Improve Controls over Financial Systems and Data (2014) (2014) [+]
- Georgia Enterprise PSGs Organized by NIST Control Families (2014) (2014) [+]
- Guide for the assessment of direct debit schemes against the oversight standards : November 2014. (2015) (2015) [+]
- Start with security : a guide for business : lessons learned from FTC cases. (2015) (2015) [+]
- Information Security: IRS Needs to Continue Improving Controls over Financial and Taxpayer Data (2015) (2015) [+]
- Information Security: FAA Needs to Address Weaknesses in Air Traffic Control Systems (2015) (2015) [+]
- Guide for the assessment of credit transfer schemes against the oversight standards : November 2014. (2015) (2015) [+]
- S.Hrg. 114-78 — GETTING IT RIGHT ON DATA SECURITY AND BREACH NOTIFICATION LEGISLATION IN THE 114TH CONGRESS (2015) (2015) [+]
- Small business, big threat : protecting small businesses from cyber attacks : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Fourteenth Congress, first session, hearing held April 22, 2015. (2015) (2015) [+]
- HISO 10029:2015 Health Information Security Framework (2015) (2015) [+]
- Vulnerability Disclosure Framework, Final Report and Recommendations By The Council (2015) (2015) [+]
- Guide for the assessment of card payment schemes against the oversight standards : February 2015. (2015) (2015) [+]
- Security Control Standards Catalog V1.2 (2016) (2016) [+]
- Information Security: IRS Needs to Further Improve Controls over Financial and Taxpayer Data (2016) (2016) [+]
- Information Security: FDIC Implemented Controls over Financial Systems, but Further Improvements are Needed (2016) (2016) [+]
- Information Security: FDA Needs to Rectify Control Weaknesses That Place Industry and Public Health Data at Risk (2016) (2016) [+]
- Healthcare.gov: Actions Needed to Enhance Information Security and Privacy Controls (2016) (2016) [+]
- Financial systems controls report: 2015–16 (2016) (2016) [+]
- Information Security: Control Deficiencies Continue to Limit IRS's Effectiveness in Protecting Sensitive Financial and Taxpayer Data (2017) (2017) [+]
- Recommendations for QTSPs based on standards : technical guidelines on trust services. (2017) (2017) [+]
- “Implementation and Cybersecurity Protocols of the Consolidated Audit Trail” (2017) (2017) [+]
- Information security, FDIC needs to improve controls over financial systems and information : report to the Chairman, Federal Deposit Insurance Corporation. (2017) (2017) [+]
- Distributed ledger technology & cybersecurity : improving information security in the financial sector. (2017) (2017) [+]
- Cyber Security and Social Media (2017) (2017) [+]
- Information Security: FDIC Needs to Improve Controls over Financial Systems and Information (2017) (2017) [+]
- Digital Identity: A Case for Specialists (2018) (2018) [+]
- Information Systems Audit Report 2018 (2018) (2018) [+]
- DWP procurement: security policies and standards (2018) (2018) [+]
- DWP procurement: security policies and standards (2018) (2018) [+]
- Public Security Ministry Aligns With Chinese Data Protection Regime in Draft Rules (2018) (2018) [+]
- Premarket Submissions: Management of Cybersecurity in Medical Devices (2018) (2018) [+]
- “CDM: Government Perspectives on Security and Modernization.” (2018) (2018) [+]
- HHS Information Security Controls Feb. 9, 2018 (2018) (2018) [+]
- European Cybersecurity Centres of Expertise Map - Definitions and Taxonomy (2018) (2018) [+]
- “CDM: Government Perspectives on Security and Modernization” (2018) (2018) [+]
- European cybersecurity centres of expertise map : definitions and taxonomy. (2018) (2018) [+]
- Government Security Classifications (2018) (2018) [+]
- Improving the Use of Digital Payments in Humanitarian Response (2018) (2018) [+]
- Achieving Cyber Resilience in the Automotive Industry (2018) (2018) [+]
- S.B. 1910 85R Cybersecurity Report (2018) (2018) [+]
- Information Security: IRS Needs to Rectify Control Deficiencies That Limit Its Effectiveness in Protecting Sensitive Financial and Taxpayer Data (2018) (2018) [+]
- Financial Sector Cybersecurity Requirements in the Asia-Pacific Region (2019) (2019) [+]
- Management Report: Improvements Are Needed to Enhance the Internal Revenue Service's Information System Security Controls (2019) (2019) [+]
- ANNEX to the Commission Delegated Regulation supplementing Directive 2010/40/EU of the European Parliament and of the Council with regard to the deployment and operational use of cooperative intelligent transport systems (2019) (2019) [+]
- Cyber resilience of government business enterprises and corporate Commonwealth entities (2019) (2019) [+]
- Task Force on Artificial Intelligence: The Future of Identity in Financial Services: Threats, Challenges, and Opportunities (2019) (2019) [+]
- Certification schemes for cloud computing : final report. (2019) (2019) [+]
- State of Maryland Information Technology Security Manual (2019) (2019) [+]
- The Cyber / Physical Security Framework (Draft) (2019) (2019) [+]
- DECISION (2019) (2019) [+]
- Microsoft Word - Responses to Feedback Received to Draft Notice on Cyber Hygiene (6 August).docx (2019) (2019) [+]
- Towards a cyber-security roadmap for digital payments | ORF (2019) (2019) [+]
- Calculating robustness for boundary controls.: D97-3/80-32-2018E-PDF Publications - Canada.ca (2019) (2019) [+]
- 9 Bills on Telecommunications and Technology Legislation (2019) (2019) [+]
- Stock taking of security requirements set by different legal frameworks on OES and DSPS : the NISD and GPR case. (2019) (2019) [+]
- House Hearing, 116th Congress — THE FUTURE OF IDENTITY IN FINANCIAL SERVICES: THREATS, CHALLENGES, AND OPPORTUNITIES (2019) (2019) [+]
- Digital Identity (2020) (2020) [+]
- Insert title here (2020) (2020) [+]
- Information Security Policy Framework (2020) (2020) [+]
- Cyber risk management for ports : guidelines for cyber security in the maritime sector. (2020) (2020) [+]
- Cyber security considerations for consumers of managed services.: D97-4/50-030-2020E-PDF Publications - Canada.ca (2020) (2020) [+]
- Digital Identity (2020) (2020) [+]
- Sino-German White Paper on Functional Safety for Industrie 4.0 and Intelligent Manufacturing (2020) (2020) [+]
|
L2D134
(1.7) | L3T17 (61%): United States Department of Homeland Security (19%), Federal Information Security Management Act of 2002 (11%)
| L1D360
(1.9) | L3T17 (58%): United States Department of Homeland Security (9%), Federal Information Security Management Act of 2002 (5%), Privacy Act of 1974 (5%)
| - House Hearing, 111th Congress — CYBERSECURITY ACTIVITIES AT NIST'S INFORMATION TECHNOLOGY LABORATORY (2009) (2009) [+]
- House Hearing, 112th Congress — PROTECTING INFORMATION IN THE DIGITAL AGE: FEDERAL CYBERSECURITY RESEARCH AND DEVELOPMENT EFFORTS (2011) (2011) [+]
- Updating U.S. Federal Cybersecurity Policy and Guidance (2012) (2012) [+]
- Information Technology: DHS Needs to Enhance Management of Cost and Schedule for Major Investments (2012) (2012) [+]
- S.Hrg. 113-285 — THE PARTNERSHIP BETWEEN NIST AND THE PRIVATE SECTOR: IMPROVING CYBERSECURITY (2013) (2013) [+]
- Securing Cyberspace Through Public-Private Partnerships (2013) (2013) [+]
- S.Hrg. 113-241 — CYBERSECURITY: PREPARING FOR AND RESPONDING TO THE ENDURING THREAT (2013) (2013) [+]
- A Congressional Guide: Seven Steps to U.S. Security, Prosperity, and Freedom in Cyberspace (2013) (2013) [+]
- ANALYSIS: Private Sector is Best-Positioned to Lead Cybersecurity Policy (2013) (2013) [+]
- S.Hrg. 113-285 — THE PARTNERSHIP BETWEEN NIST AND THE PRIVATE SECTOR: IMPROVING CYBERSECURITY (2013) (2013) [+]
- S.Hrg. 114-236 — CONFRONTING THE CHALLENGE OF CYBERSECURITY (2015) (2015) [+]
- The expanding cyber threat : hearing before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, One Hundred Fourteenth Congress, first session, January 27, 2015. (2015) (2015) [+]
- Enhancing cybersecurity of third-party contractors and vendors : hearing before the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fourteenth Congress, first session, April 22, 2015. (2015) (2015) [+]
- Austin Fire Department (2015) (2015) [+]
- Cybersecurity (2015) (2015) [+]
- House Hearing, 114th Congress — THE EXPANDING CYBER THREAT (2015) (2015) [+]
- Cybersecurity Issues and Challenges: In Brief (2016) (2016) [+]
- Cybersecurity : preparing for and responding to the enduring threat : hearing before the Committee on Appropriations, United States Senate, One Hundred Thirteenth Congress, first session : special hearing, June 12, 2013, Washington, DC. (2016) (2016) [+]
- Confronting the challenge of cybersecurity : field hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, first session, September 3, 2015. (2016) (2016) [+]
- CO16138 | Threats of Driverless Vehicles: Leveraging New Technologies for Solutions (2016) (2016) [+]
- “Oversight of IT and Cybersecurity at the Department of Veterans Affairs” (2017) (2017) [+]
- House Hearing, 115th Congress — PROTECTING SMALL BUSINESSES FROM CYBER ATTACKS: THE CYBERSECURITY INSURANCE OPTION (2017) (2017) [+]
- Bolstering the government’s cybersecurity : lessons learned from WannaCry : joint hearing before the Subcommittee on Oversight & Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, June 15, 2017. (2017) (2017) [+]
- Cybersecurity Issues and Challenges (2017) (2017) [+]
- Cyber Threat Data Sharing Needs Refinement (2017) (2017) [+]
- Cyber Threat Data Sharing Needs Refinement (2017) (2017) [+]
- General information (2017) (2017) [+]
- Cybersecurity, actions needed to strengthen U.S. capabilities : testimony before the Subcommittee on Research and Technology, Committee on Science, Space, and Technology, House of Representatives / (2017) (2017) [+]
- Cybersecurity: Actions Needed to Strengthen U.S. Capabilities (2017) (2017) [+]
- “How Effective is the Science and Technology Directorate?: Stakeholder Perspectives” (2017) (2017) [+]
- Strengthening U.S. Cybersecurity Capabilities (2017) (2017) [+]
- NIAC Work Stream #2 Cyber Scoping Study Working Group - February 16, 2017 (2017) (2017) [+]
- Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure (Draft) (2017) (2017) [+]
- House Hearing, 115th Congress — OVERSIGHT OF IT AND CYBERSECURITY AT THE DEPARTMENT OF VETERANS AFFAIRS (2017) (2017) [+]
- Examining Physical Security and Cybersecurity at Our Nation’s Ports (2017) (2017) [+]
- Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure (2017) (2017) [+]
- Bolstering the government’s cybersecurity : assessing the risk of Kaspersky lab products to the federal government : hearing before the Subcommittee on Oversight, Committee on Science, Space, and Technology, House of Representatives, one Hundred Fifteenth Congress, first session, October 25, 2017. (2018) (2018) [+]
- Improving Cyber Resilience for Software Companies (2018) (2018) [+]
- Federal government and small businesses : promoting greater information sharing for stronger cybersecurity : hearing before the Committee on Small Business, United States House of Representatives, One Hundred Fifteenth Congress, first session, hearing held November 15, 2017. (2018) (2018) [+]
- CDM, government perspectives on security and modernization : joint hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives and the Subcommittee on Information Technology of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 20, (2018) (2018) [+]
- CDM, the future of federal cybersecurity : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, January 17, 2018. (2018) (2018) [+]
- Examining DHS’s cybersecurity mission : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, first session, October 3, 2017. (2018) (2018) [+]
- State of play : federal IT in 2018 : joint hearing before the Subcommittee on Information Technology and the Subcommittee on Government Operations of the Committee on Oversight and Government Reform, House of Representatives, One Hundred Fifteenth Congress, second session, March 14, 2018. (2018) (2018) [+]
- High-risk series: urgent actions are needed to address cybersecurity challenges facing the nation : testimony before the Subcommittees on Government Operations and Information Technology, Committee on Oversight and Government Reform, House of Representatives (2018) (2018) [+]
- House Hearing, 115th Congress — CDM, THE FUTURE OF FEDERAL CYBERSECURITY (2018) (2018) [+]
- Innovation at TSA : examining threat mitigation through technology acquisitions reform : hearing before the Subcommittee on Transportation and Protective Security of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, January 18, 2018. (2018) (2018) [+]
- Bolstering the government’s cybersecurity : assessing the risk of Kaspersky lab products to the federal government : hearing before the Subcommittee on Oversight & Committee on Science, Space, and Technology, House of Representatives, One Hundred Fifteenth Congress, first session, October 25, 2017. (2018) (2018) [+]
- House Hearing, 115th Congress — [H.A.S.C. No. 115-95] Cyber Operations Today: Preparing for 21st Century Challenges In An Information-Enabled Society (2018) (2018) [+]
- “GAO High Risk Focus: Cybersecurity” (2018) (2018) [+]
- High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation (2018) (2018) [+]
- House Hearing, 115th Congress — ASSESSING THE STATE OF FEDERAL CYBERSECURITY RISK DETERMINATION (2018) (2018) [+]
- House Hearing, 115th Congress — INNOVATION AT TSA: EXAMINING THREAT MITIGATION THROUGH TECHNOLOGY ACQUISTIONS REFORM (2018) (2018) [+]
- DOE Modernization: Legislation Addressing Cybersecurity and Emergency Response (2018) (2018) [+]
- High-Risk Series: Urgent Actions Are Needed to Address Cybersecurity Challenges Facing the Nation (2018) (2018) [+]
- "Innovation at TSA: Examining Threat Mitigation Through Technology Acquisitions Reform." (2018) (2018) [+]
- “CDM, the Future of Federal Cybersecurity?” (2018) (2018) [+]
- Assessing Continuous Evaluation Approaches for Insider Threats (2019) (2019) [+]
- Securing U.S. surface transportation from cyber attacks : joint hearing before the Subcommittee on Transportation and Maritime Security and the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation, House of Representatives, One Hundred Sixteenth Congress, first session, February 26, 2019. (2019) (2019) [+]
- By Other Means Part II: U.S. Priorities in the Gray Zone (2019) (2019) [+]
- DOE modernization : the Office of Cybersecurity, Energy Security, and Emergency Response : hearing before the Subcommittee on Energy of the Committee on Energy and Commerce, House of Representatives, One Hundred Fifteenth Congress, second session, September 27, 2018. (2019) (2019) [+]
- Resourcing DHS’s cybersecurity and innovation missions : a review of the fiscal year 2020 budget request for the Cybersecurity and Infrastructure Security Agency and the Science and Technology Directorate : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Innovation of the Committee on Homeland Security, House of Representatives, One Hundred Sixteenth Congress (2019) (2019) [+]
- Cyber crime : an existential threat to small business : hearing before the Committee on Small Business and Entrepreneurship, United States Senate, One Hundred Sixteenth Congress, first session, March 13, 2019. (2019) (2019) [+]
- S.Hrg. 116-47 — CYBER CRIME: AN EXISTENTIAL THREAT TO SMALL BUSINESS (2019) (2019) [+]
- S.Hrg. 116-260 — THE CYBERSECURITY RESPONSIBILITIES OF THE DEFENSE INDUSTRIAL BASE (2019) (2019) [+]
- Cyber operations today : preparing for 21st century challenges in an information-enabled society : Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, second session, hearing held April 11, 2018. (2019) (2019) [+]
- Cyber-watch: competere e difendersi nell'arena digitale globale (2019) (2019) [+]
- Assessing the state of federal cybersecurity risk determination : hearing before the Subcommittee on Cybersecurity and Infrastructure Protection of the Committee on Homeland Security, House of Representatives, One Hundred Fifteenth Congress, second session, July 25, 2018. (2019) (2019) [+]
- Artificial intelligence can protect all companies in the energy transition from cyberattacks (2020) (2020) [+]
- Cybersecurity: Clarity of Leadership Urgently Needed to Fully Implement the National Strategy (2020) (2020) [+]
- Five big questions as America votes: Cybersecurity (2020) (2020) [+]
- Homeland Security Commission Annual Report 2019 (2020) (2020) [+]
- Presentation Title IT Strategy Board (2020) (2020) [+]
- Internet of Things: Information on Use by Federal Agencies (2020) (2020) [+]
- The Committee will consider the following: 1.H.R. 4774, Internet of Things Cybersecurity Training for Federal Employees Act; 2.H.R. 5901, the Technology Modernization Centers of Excellence Program; 3.H.R. 7496, COVID PREPARE Act; 4.H.R. 4382, the Integrity Committee Transparency Act; 5.H.R. 7107, Plum Act; 6.H.R. 7340, Chai Suthammanont Remembrance Act; 7.H.R. 7548, PPE Buy America Act; 8.H.R. 7936, Federal Employee Access to Information Act; 9.H.R. 8109, Nonpartisan Postmaster General Act; 10.H.R. ____, GAO Report Elimination Act; and 11.Several postal naming measures. (2020) (2020) [+]
- The cybersecurity responsibilities of the defense industrial base : hearing before the Subcommittee on Cybersecurity of the Committee on Armed Services, United States Senate, One Hundred Sixteenth Congress, first session, March 26, 2019. (2020) (2020) [+]
- Resiliency of military installations to emerging threats : joint hearing before the Subcommittee on Intelligence and Emerging Threats and Capabilities meeting jointly with Subcommittee on Readiness of the Committee on Armed Services, House of Representatives, One Hundred Sixteenth Congress, first session : hearing held October 16, 2019. (2020) (2020) [+]
- House Hearing, 116th Congress — RESOURCING DHS'S CYBERSECURITY AND INNOVATION MISSIONS: A REVIEW OF THE FISCAL YEAR 2021 BUDGET REQUEST FOR THE CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY AND THE SCIENCE AND TECHNOLOGY DIRECTORATE (2020) (2020) [+]
- Ataques cibernéticos aumentam durante pandemia da COVID-19 (2020) (2020) [+]
- FOI responses released by MOD: week commencing 25 May 2020 (2020) (2020) [+]
- Role of systems in capturing vital data for civil registration, identification, and health surveillance amid the COVID-19 pandemic : a good practice example from Rwanda (2021) (2021) [+]
- FY 2022 Budget Hearing for Government Accountability Office and House Officers (2021) (2021) [+]
|
L1D361
(1.9) | L3T17 (58%): United States Department of Homeland Security (9%), Federal Information Security Management Act of 2002 (5%), Privacy Act of 1974 (5%)
| - Building an Effective, Sustainable Partnership Between the Government and the Private Sector: Markle Task Force on National Security in the Information Age (2003) (2003) [+]
- DATA MINING: CURRENT APPLICATIONS AND FUTURE POSSIBILITIES (2003) (2003) [+]
- Total Information Compliance: The TIA's Burden Under the Wyden Amendment (2003) (2003) [+]
- Data Mining: Agencies Have Taken Key Steps to Protect Privacy in Selected Efforts, but Significant Compliance Issues Remain (2005) (2005) [+]
- PERSONAL INFORMATION ACQUIRED BY THE GOVERNMENT FROM INFORMATION RESELLERS: IS THERE NEED FOR IMPROVEMENT? (2006) (2006) [+]
- Privacy: Preventing and Responding to Improper Disclosures of Personal Information (2006) (2006) [+]
- 2005 Privacy Data Mining Report (2006) (2006) [+]
- Personal Information: Agencies and Resellers Vary in Providing Privacy Protections (2006) (2006) [+]
- Privacy Impact Assessment (2006) (2006) [+]
- 2005 Privacy Data Mining Report (2006) (2006) [+]
- Personal Information: Agency and Reseller Adherence to Key Privacy Principles (2006) (2006) [+]
- Information Security: Leadership Needed to Address Weaknesses and Privacy Issues at Veterans Affairs (2006) (2006) [+]
- DHS Privacy Office: Progress Made but Challenges Remain in Notifying and Reporting to the Public (2007) (2007) [+]
- Data Mining: Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks (2007) (2007) [+]
- AN OVERVIEW OF ISSUES AND CHALLENGES FACING THE DEPARTMENT OF HOMELAND SECURITY (2007) (2007) [+]
- Department of Homeland Security Privacy Impact Assessment Biometric Storage System (2007) (2007) [+]
- Department of Homeland Security Privacy Impact Assessment Guidance May 2007 (2007) (2007) [+]
- 2007 Data Mining Report (2007) (2007) [+]
- Homeland Security: DHS Privacy Office Has Made Progress but Faces Continuing Challenges (2007) (2007) [+]
- Data Mining: Technology and Policy 2008 Report to Congress (2008) (2008) [+]
- Privacy: Congress Should Consider Alternatives for Strengthening Protection of Personally Identifiable Information (2008) (2008) [+]
- Privacy: Government Use of Data from Information Resellers Could Include Better Protections (2008) (2008) [+]
- S.Hrg. 110-1025 — PROTECTING PERSONAL INFORMATION: IS THE FEDERAL GOVERNMENT DOING ENOUGH? (2008) (2008) [+]
- Justice Security Tracking and Adjudication Record System (2008) (2008) [+]
- Privacy: Alternatives Exist for Enhancing Protection of Personally Identifiable Information (2008) (2008) [+]
- National Dialogue for the Quadrennial Homeland Security Review (2009) (2009) [+]
- DHS Privacy Office (2009) (2009) [+]
- DHS Privacy Office 2009 Data Mining Report to Congress, December 2009 (2009) (2009) [+]
- Privacy Impact Assessments (2010) (2010) [+]
- Department of Homeland Security Privacy Office Official Guidance for Privacy Impact Assessments (2010) (2010) [+]
- Department of Homeland Security Privacy Impact Assessment Iris and Face Technology Demonstration and Evaluation (2010) (2010) [+]
- 2010 Data Mining Report (2010) (2010) [+]
- 2010 Data Mining Report (2010) (2010) [+]
- Data Mining: DHS Needs to Improve Executive Oversight of Systems Supporting Counterterrorism (2011) (2011) [+]
- Privacy Impact Assessment for the Criminal Enforcement Tracking System (2011) (2011) [+]
- Privacy Impact Assessment for the Automated Case Management System (2011) (2011) [+]
- DHS Privacy Office 2011 Annual Report to Congress (2011) (2011) [+]
- Privacy Impact Assessment (2012) (2012) [+]
- DHS 2011 Data Mining Report to Congress (2012) (2012) [+]
- Privacy Impact Assessment for the Cerberus Pilot (2013) (2013) [+]
- AWLINDVSG purpswoyHY jo yuoursredaq (2013) (2013) [+]
- Privacy Impact Assessment Update for (2014) (2014) [+]
- Border Security: DHS Needs to Strengthen Its Efforts to Modernize Key Enforcement Systems (2014) (2014) [+]
- Subject Here (2014) (2014) [+]
- DHS 2013 Data Mining Report (2014) (2014) [+]
- DHS Data Framework Privacy Impact Assessment (2014) (2014) [+]
- SAS Predictive Modeling Environment (SAS PME) Privacy Impact Assessment (2014) (2014) [+]
- Department of Homeland Security Privacy Impact Assessement Update (2014) (2014) [+]
- DHS/ALL/PIA-051 DHS Data Framework - Interim Process to Address an Emergent Threat (2015) (2015) [+]
- DHS/ALL/PIA-051 DHS Data Framework - Interim Process to Address an Emergent Threat (2015) (2015) [+]
- DHS/ALL/PIA-046-3(b) Cerberus (2015) (2015) [+]
- DHS-ALL-PIA-046(b) DHS Data Framework (2015) (2015) [+]
- Letter Report Pursuant To Section 804 Of The Implementing Recommendations Of The 9 / 11 Commission Act Of 2007 (2015) (2015) [+]
- DHS/ALL/PIA-046-1(b) Neptune (2015) (2015) [+]
- DHS-ALL-PIA-052 DHS Insider Threat Program (2015) (2015) [+]
- DHS 2015 Data Mining Report (2016) (2016) [+]
- DHS/ALL/PIA-046(d) DHS Data Framework - Retention (2017) (2017) [+]
- DHS/CBP/PIA-006(e) Automated Targeting System (2017) (2017) [+]
- “Law Enforcement’s Use of Facial Recognition Technology” (2017) (2017) [+]
- DHS/ALL/PIA-046(e) DHS Data Framework - Unclassified Use (2017) (2017) [+]
- Face Recognition Technology: DOJ and FBI Need to Take Additional Actions to Ensure Privacy and Accuracy (2017) (2017) [+]
- Privacy Impact Assessment Update for the (2017) (2017) [+]
- “Empowering the Inspectors General” (2017) (2017) [+]
- DHS/CBP/PIA-006(e) Automated Targeting System (2018) (2018) [+]
- DHS/ICE/PIA-039(a) Acquisition and Use of License Plate Reader (LPR) Data from a Commercial Service (2018) (2018) [+]
- 2017 DHS Data Mining Report (2018) (2018) [+]
- DHS/USSS/PIA-024 Facial Recognition Pilot (2018) (2018) [+]
- Immigration Benefits: Additional Actions Needed to Address Fraud Risks in Program for Foreign National Victims of Domestic Abuse (2019) (2019) [+]
- Facial Recognition Technology (Part II): Ensuring Transparency in Government Use (2019) (2019) [+]
- Privacy impact assessment for the Department of Homeland Security (DHS) immigration-related information sharing with U.S. Census Bureau. (2019) (2019) [+]
- 2018 Data Mining Report to Congress (2019) (2019) [+]
- DHS Privacy Office 2019 Annual Report (2019) (2019) [+]
- ACLU v. DOJ- Exhibit P (2019) (2019) [+]
- Face Recognition Technology: DOJ and FBI Have Taken Some Actions in Response to GAO Recommendations to Ensure Privacy and Accuracy, But Additional Work Remains (2019) (2019) [+]
- U. S. Department of Justice FY 2020 PERFORMANCE BUDGET (2019) (2019) [+]
- DHS/CBP/PIA-006(e) Automated Targeting System (2020) (2020) [+]
|