- DSP
- DSPT International v. Nahum
- DSS
- DSpace
- DT
- DTA
- DTC
- DTM
- DTMF
- DTS
- DTV receiver
- DUV
- DVD
- DVD+R
- DVD+RW
- DVD-R
- DVD-RAM
- DVD-ROM
- DVD-RW
- DVDCCA
- DVD Copy Control Ass'n v. Bunner
- DVD Copy Control Association
- DVD player
- DVD screener
- DVD writer
- DVI
- DX
- D Block
- D channel
- DaVinci Technology v. Rubino
- DaaS
- Daemon
- Daily intelligence summary
- DaimlerChrysler v. The Net
- Daisy chain
- Dallal v. NY Times
- Damage assessment
- Damage evaluation
- Damage limitations clause
- Damage to the national security
- Damages
- DameWare Development v. Northern Software
- Dangerous assumption
- Dangling threat
- Dangling vulnerability
- Danish Agency for Science, Technology and Innovation
- Danish Defense Intelligence Service
- Danish Forum for IT Law
- Danish Ministry of Science, Innovation and Higher Education
- Danish e-Government Interoperability Framework
- Dann v. Johnston
- Dansk Dataforening
- Dark-side hacker
- Dark Web
- Dark Web (CRS Report)
- Dark Web Project
- Dark archive
- Dark data
- Dark fiber
- Dark pattern
- Dark site
- Dark wallet
- Darknet
- Dashboard
- Dastar v. Twentieth Century Fox Film
- Data
- Data-Center-as-a-Service
- Data-above-voice
- Data-at-rest
- Data-capturing device
- Data-carrying device
- Data-center-as-a-service
- Data-centric
- Data-dependent protection
- Data-driven AI system
- Data-driven attack
- Data-flow diagram
- Data-in-motion
- Data-level parallelism
- Data-over-voice
- Data-related emanations
- Data-under-voice
- Data.gov
- Data.gov.sg
- Data.gov/Education
- Data.gov Concept of Operations
- Data61
- DataLossDB
- DataONE
- Data & Society Research Institute
- Data Access and Privacy Issues Related to Smart Grid Technologies
- Data Acquisition Telecommand and Tracking Station
- Data Act: Initial Observations on Technical Implementation
- Data Act 1973
- Data Aggregation Working Group
- Data Analysis and Research for Trade Transparency System
- Data Architecture Subcommittee
- Data Breach Notification-A Guide to Handling Personal Information Security Breaches
- Data Breach Report 2012
- Data Breach Response: A Guide for Business
- Data Breach Response Checklist
- Data Breaches: Range of Consumer Risks Highlights Limitations of Identity Theft Services
- Data Brokers: A Call for Transparency and Accountability
- Data Brokers: Background and Industry Overview
- Data Brokers and the Federal Government: A New Front in the Battle for Privacy Opens
- Data Cash Systems v. JS&A Group
- Data Center Assignments and Consolidation
- Data Center Consolidation: Agencies Making Progress, but Planned Savings Goals Need to Be Established
- Data Center Consolidation: Agencies Making Progress on Efforts, but Inventories and Plans Need to Be Completed
- Data Center Consolidation: Agencies Need to Complete Inventories and Plans to Achieve Expected Savings
- Data Center Consolidation Task Force
- Data Center Infrastructure Efficiency
- Data Concepts v. Digital Consulting
- Data Conservancy
- Data De-identification: An Overview of Basic Terms
- Data East USA v. EPYX
- Data Encryption Algorithm
- Data Encryption Standard
- Data Flows, Online Privacy, and Trade Policy
- Data Format Standards for Civilian Remote Sensing Satellites
- Data General v. Digital Computer Controls
- Data General v. Grumman Systems Support
- Data Inspection Board
- Data Integration and Collection Environment
- Data Integration and Visualization System
- Data Integrity, Privacy, and Interoperability Advisory Committee
- Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events
- Data Integrity Board
- Data Interchange Standards Association
- Data Item Description
- Data Link Control
- Data Link Layer
- Data Loading and Analysis System
- Data Management: DOD Should Redirect Its Efforts To Automate Technical Data Repositories
- Data Management Association
- Data Management Platform
- Data Management and Use: Governance in the 21st Century
- Data Manipulation Language
- Data Mining: DHS Needs to Improve Executive Oversight of Systems Supporting Counterterrorism
- Data Mining: Early Attention to Privacy in Developing a Key DHS Program Could Reduce Risks
- Data Mining: Federal Efforts Cover a Wide Range of Uses
- Data Mining Report: DHS Privacy Office Response to House Report 108-774
- Data Mining and Homeland Security: An Overview
- Data Over Cable Service Interface Specification
- Data Performance Plan System
- Data Preservation Alliance for the Social Sciences
- Data Privacy Pathfinder initiative
- Data Privacy and Integrity Advisory Committee
- Data Privacy and Integrity Advisory Committee Recommendations Paper 2013-01
- Data Privacy and Integrity Advisory Committee Recommendations Paper 2014-01
- Data Privacy and the Smart Grid: A Voluntary Code of Conduct
- Data Processing: SBA Needs To Strengthen Management of Its Computer Systems
- Data Processing Management Association
- Data Processing Services v. L.H. Smith Oil
- Data Protection: Redress Mechanisms and Their Use
- Data Protection (Amendment) Act 2003
- Data Protection Act, 1988 (Ireland)
- Data Protection Act 1984
- Data Protection Act 1998
- Data Protection Act 2003
- Data Protection Act 2004
- Data Protection Council
- Data Protection and Medical Research
- Data Protection and Privacy Law: An Introduction
- Data Protection in the European Union: The Role of National Data Protection Authorities (Strengthening the Fundamental Rights Architecture in the EU II)
- Data Quality: IRS' Actions To Improve the Accuracy of Non-Wage Income Data Are Vital
- Data Quality Principle
- Data Reference Model
- Data Retention Directive
- Data Retention and Investigatory Powers Act 2014
- Data Security: Federal and State Laws
- Data Security: Top Threats to Data Protection
- Data Security Breach Notification Laws
- Data Security Breaches: Context and Incident Summaries
- Data Security Council of India
- Data Security Law
- Data Sharing Code of Practice
- Data Sharing Principles
- Data Sharing and Security Framework
- Data Storage-as-a-Service
- Data Transparency: Oversight Needed to Address Underreporting and Inconsistencies on Federal Award Website
- Data Universal Numbering System
- Data access
- Data accuracy
- Data acquisition
- Data action
- Data actions
- Data administration
- Data administrator
- Data analysis
- Data analytics
- Data and Analysis Center for Software
- Data anonymization
- Data as a Service
- Data asset
- Data attribute
- Data author
- Data bank
- Data bit
- Data block
- Data breach
- Data breach analysis
- Data breach notification
- Data breach notification laws
- Data broker
- Data call
- Data capture
- Data carrier
- Data center
- Data center scientist
- Data circuit
- Data classification program
- Data cleansing
- Data code
- Data collection
- Data collection instrument
- Data collection tool
- Data collections universe
- Data collector
- Data commons
- Data communication
- Data communication equipment
- Data communications
- Data communications port
- Data communications protocol
- Data compaction
- Data component
- Data compression
- Data compression context
- Data compression facility
- Data confidentiality service
- Data consistency
- Data contamination
- Data continuity
- Data controller
- Data conversion
- Data conversion plan
- Data correlation
- Data corruption
- Data creep
- Data curation
- Data custodian
- Data deduplication
- Data deluge
- Data desert
- Data destruction
- Data device
- Data dictionary
- Data diddling
- Data disc
- Data disclosure
- Data disposal laws
- Data distillation
- Data dump
- Data element
- Data element abbreviation
- Data element access service
- Data element access services
- Data element definition
- Data element indexing
- Data element name
- Data element source
- Data element tag
- Data enclave
- Data encryption key
- Data entry
- Data entry field
- Data exchange
- Data exchange standards
- Data extraction
- Data feed
- Data field
- Data file
- Data flow
- Data flow analysis
- Data format
- Data fragmentation
- Data furnace
- Data furnisher
- Data fusion
- Data generation
- Data glove
- Data governance
- Data grabber
- Data granularity
- Data grooming
- Data handling
- Data harmonization
- Data historian
- Data hosting
- Data in processing
- Data in transit
- Data in use
- Data inconsistency
- Data independence
- Data injection
- Data integration
- Data integrity
- Data integrity service
- Data intelligence
- Data intelligibility
- Data interoperability
- Data interpretation
- Data intervenability
- Data item
- Data item abbreviation
- Data item definition
- Data item name
- Data key
- Data lake
- Data leakage
- Data life cycle
- Data lifecycle
- Data limitation
- Data lineage
- Data link
- Data link interface
- Data linkage
- Data linking
- Data liquidity
- Data location
- Data loss
- Data loss prevention
- Data management
- Data management system
- Data manager
- Data manipulation
- Data map
- Data mapping
- Data marketplace
- Data mart
- Data message
- Data migration
- Data minimization
- Data mining
- Data mirroring
- Data model
- Data modeling
- Data monetization
- Data network
- Data object
- Data on Security of Automated Information Systems that Process Information Related to the National Security Interest
- Data organization
- Data origin authentication
- Data owner
Advertisement
34,539
pages
Local Sitemap
Advertisement