When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Vulnerabilities Equities Process - Wikipedia

    en.wikipedia.org/wiki/Vulnerabilities_Equities...

    The Vulnerabilities Equities Process (VEP) is a process used by the U.S. federal government to determine on a case-by-case basis how it should treat zero-day computer security vulnerabilities: whether to disclose them to the public to help improve general computer security, or to keep them secret for offensive use against the government's adversaries.

  3. Clery Act - Wikipedia

    en.wikipedia.org/wiki/Clery_Act

    The Jeanne Clery Campus Safety Act (formerly the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act), signed in 1990, is a federal statute codified at , with implementing regulations in the U.S. Code of Federal Regulations at 34 CFR 668.46.

  4. Sensitive security information - Wikipedia

    en.wikipedia.org/wiki/Sensitive_Security_Information

    The cover sheet used for Sensitive Security Information.. Sensitive security information (SSI) is a category of United States sensitive but unclassified information obtained or developed in the conduct of security activities, the public disclosure of which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential information, or be detrimental to ...

  5. Informational self-determination - Wikipedia

    en.wikipedia.org/wiki/Informational_self...

    The term informational self-determination was first used in the context of a German constitutional ruling relating to personal information collected during the 1983 census. The German term is informationelle Selbstbestimmung. It is formally defined as "the authority of the individual to decide himself, on the basis of the idea of self ...

  6. Biden administration issues privacy rule protecting abortion

    www.aol.com/news/biden-administration-issues...

    President Joe Biden's administration issued a final rule on Monday aimed at strengthening privacy protections for women seeking abortions by banning the disclosure of protected health information ...

  7. Digital self-determination - Wikipedia

    en.wikipedia.org/wiki/Digital_self-determination

    Digital self-determination is a multidisciplinary concept derived from the legal concept of self-determination and applied to the digital sphere, to address the unique challenges to individual and collective agency and autonomy arising with increasing digitalization of many aspects of society and daily life.

  8. Communication privacy management theory - Wikipedia

    en.wikipedia.org/wiki/Communication_privacy...

    Communication privacy management (CPM), originally known as communication boundary management, is a systematic research theory developed by Sandra Petronio in 1991. CPM theory aims to develop an evidence-based understanding of the way people make decisions about revealing and concealing private information.

  9. Reasonable expectation of privacy (United States) - Wikipedia

    en.wikipedia.org/wiki/Reasonable_expectation_of...

    [6] [2] Other examples include: pen registers that record the numbers dialed from particular telephones; [7] conversations with others, though there could be a Sixth Amendment violation if the police send an individual to question a defendant who has already been formally charged; [8] a person's physical characteristics, such as voice or ...