enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Information technology law - Wikipedia

    en.wikipedia.org/wiki/Information_technology_law

    Information technology law (IT law), also known as information, communication and technology law (ICT law) or cyberlaw, concerns the juridical regulation of information technology, its possibilities and the consequences of its use, including computing, software coding, artificial intelligence, the internet and virtual worlds. The ICT field of ...

  3. Information Technology Act, 2000 - Wikipedia

    en.wikipedia.org/wiki/Information_Technology_Act...

    The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce .

  4. Federal Information Technology Acquisition Reform Act

    en.wikipedia.org/wiki/Federal_Information...

    The Federal Information Technology Acquisition Reform Act made changes to the ways the U.S. federal government buys and manages computer technology. [1] It became law as a part of the National Defense Authorization Act for Fiscal Year 2015 (Title VIII, Subtitle D, H.R. 3979.

  5. Information Technology Management Reform Act of 1996

    en.wikipedia.org/wiki/Information_Technology...

    The Information Technology Management Reform Act of 1996 is a United States federal law, designed to improve the way the federal government acquires, uses and disposes information technology (IT). It was passed as Division E of the National Defense Authorization Act for Fiscal Year 1996 .

  6. Cyber-security regulation - Wikipedia

    en.wikipedia.org/wiki/Cyber-security_regulation

    A cybersecurity regulation comprises directives that safeguard information technology and computer systems with the purpose of forcing companies and organizations to protect their systems and information from cyberattacks like viruses, worms, Trojan horses, phishing, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control ...

  7. Federal Information Security Management Act of 2002

    en.wikipedia.org/wiki/Federal_Information...

    The Federal Information Security Management Act of 2002 (FISMA, 44 U.S.C. § 3541, et seq.) is a United States federal law enacted in 2002 as Title III of the E-Government Act of 2002 (Pub. L. 107–347 (text), 116 Stat. 2899).

  8. US state laws and policies for ICT accessibility - Wikipedia

    en.wikipedia.org/wiki/US_state_laws_and_policies...

    Many individual states within the US have accessibility policies for Information and Communications Technology (ICT). These policies often include references to national or international standards. These policies often include references to national or international standards.

  9. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    (a) Whoever— (1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data ...