Computer security -- Law and legislation -- United States
Resource Information
The concept Computer security -- Law and legislation -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
The Resource
Computer security -- Law and legislation -- United States
Resource Information
The concept Computer security -- Law and legislation -- United States represents the subject, aboutness, idea or notion of resources found in Biddle Law Library - University of Pennsylvania Law School.
- Label
- Computer security -- Law and legislation -- United States
- Authority link
- http://id.loc.gov/authorities/subjects/sh2009121191
39 Items that share the Concept Computer security -- Law and legislation -- United States
Context
Context of Computer security -- Law and legislation -- United StatesSubject of
No resources found
No enriched resources found
- An Act to Amend Chapter 35 of Title 44, United States Code, to Provide for Reform to Federal Information Security
- An Act to Provide for an Ongoing, Voluntary Public-Private Partnership to Improve Cybersecurity, and to Strengthen Cybersecurity Research and Development, Workforce Development and Education, and Public Awareness and Preparedness, and for Other Purposes
- Better On-line Ticket Sales Act of 2016 : report (to accompany H.R. 5104) (including cost estimate of the Congressional Budget Office)
- Cybersecurity Enhancement Act of 2011 : report (to accompany H.R. 2096) (including cost estimate of the Congressional Sales Office)
- Cybersecurity Enhancement Act of 2013 : report (to accompany H.R. 756) (including cost estimate of the Congressional Budget Office)
- Cybersecurity Information Sharing Act of 2015 : report together with additional views (to accompany S. 754)
- Cybersecurity and privacy law in a nutshell
- Cybersecurity for the home and office : the lawyer's guide to taking charge of your own information security
- DHS Cyber Incident Response Teams Act of 2018 : report (to accompany H.R. 5074) (including cost estimate of the Congressional Budget Office)
- DHS Cyber Incident Response Teams Act of 2018 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3309, to authorize cyber incident response teams at the Department of Homeland Security, and for other purposes
- Data breach and encryption handbook
- Department of Homeland Security Cybersecurity Strategy Act of 2015 : report (to accompany H.R. 3510) (including cost estimate of the Congressional Budget Office)
- Examining the Better Online Ticket Sales Act of 2016 : hearing before the Subcommittee on Consumer Protection, Product Safety, Insurance, and Data Security of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Fourteenth Congress, second session, September 13, 2016
- Federal Acquisition Supply Chain Security Act of 2018 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 3085, to establish a Federal Acquisition Security Council and to provide executive agencies with authorities relating to mitigating supply chain risks in the procurement of information technology, and for other purposes
- H.R. 285 : Department of Homeland Security Cybersecurity Enhancement Act of 2005 : hearing before the Subcommittee on Economic Security, Infrastructure Protection, and Cybersecurity of the Committee on Homeland Security, House of Representatives, One Hundred Ninth Congress, first session, April 20, 2005
- Harboring data : information security, law, and the corporation
- Improving Small Business Cyber Security Act of 2016 : report (to accompany H.R. 5064)
- Information overload : the law of surveillance, privacy and big data discovery
- Information privacy fundamentals for librarians and information professionals
- Internet Spyware (I-SPY) Prevention Act of 2007, and the Securing Aircraft Cockpits Against Lasers Act of 2007 : hearing before the Subcommittee on Crime, Terrorism, and Homeland Security of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, first session, on H.R. 1525 and H.R. 1615, May 1, 2007
- Making Available Information Now to Strengthen Trust and Resilience and Enhance Enterprise Technology Cybersecurity Act of 2017 : report of the Committee on Commerce, Science, and Transportation on S. 770
- NIST Cybersecurity Framework, Assessment, and Auditing Act of 2017 : report together with minority views (to accompany H.R. 1224) (including cost estimate of the Congressional Budget Office)
- National Cybersecurity Preparedness Consortium Act of 2017 : report of the Committee on Homeland Security and Governmental Affairs, United States Senate, to accompany S. 594, to authorize the Secretary of Homeland Security to work with cybersecurity consortia for training, and for other purposes
- National Cybersecurity Protection Advancement Act of 2015 : report together with additional views (to accompany H.R. 1731) (including cost estimate of the Congressional Budget Office)
- Oversight of the Cybersecurity Act of 2015 : hearing before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies of the Committee on Homeland Security, House of Representatives, One Hundred Fourteenth Congress, second session, June 15, 2016
- Privacy, security and information management : an overview
- Proskauer on privacy : a guide to privacy and data security law in the information age
- Proskauer on privacy : a guide to privacy and data security law in the information age
- Proskauer on privacy : a guide to privacy and data security law in the information age
- SBA Cyber Awareness Act : report (to accompany H.R. 2331) (including cost estimate of the Congressional Budget Office)
- STB Information Security Improvement Act : report of the Committee on Commerce, Science, and Transportation on S. 2844
- Small Business Advanced Cybersecurity Enhancements Act of 2017 : report (to accompany H.R. 4668)
- Small Business Development Center Cyber Training Act of 2019 : report (to accompany H.R. 1649) (including cost estimate of the Congressional Budget Office)
- Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2015 : report (to accompany H.R. 3878) (including cost estimate of the Congressional Budget Office)
- Strengthening Cybersecurity Information Sharing and Coordination in Our Ports Act of 2017 : report (to accompany H.R. 3101) (including cost estimate of the Congressional Budget Office)
- Support for Rapid Innovation Act of 2016 : report (to accompany H.R. 5388)
- The Cambridge handbook of surveillance law
- What are the elements of sound data breach legislation? : hearing before the Subcommittee on Commerce, Manufacturing, and Trade of the Committee on Energy and Commerce, House of Representatives, One Hundred Fourteenth Congress, first session, January 27, 2015
- What every librarian should know about electronic privacy
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/ZlOjA3b0BLY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/ZlOjA3b0BLY/">Computer security -- Law and legislation -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer security -- Law and legislation -- United States
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.law.upenn.edu/resource/ZlOjA3b0BLY/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.law.upenn.edu/resource/ZlOjA3b0BLY/">Computer security -- Law and legislation -- United States</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.law.upenn.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.law.upenn.edu/">Biddle Law Library - University of Pennsylvania Law School</a></span></span></span></span></div>