enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Computer Security Act of 1987 - Wikipedia

    en.wikipedia.org/wiki/Computer_Security_Act_of_1987

    The Computer Security Act of 1987, Public Law No. 100-235 (H.R. 145), (Jan. 8, 1988), is a United States federal law enacted in 1987. It is intended to improve the security and privacy of sensitive information in federal computer systems and to establish minimally acceptable security practices for such systems.

  3. F. Lynn McNulty - Wikipedia

    en.wikipedia.org/wiki/F._Lynn_McNulty

    According to SCMagazine.com’s Robert Bigman, McNulty’s contributions to cybersecurity are “woven into the DNA of almost every government information security policy and program,” and his security initiatives became a model within the federal government and served as the basis for The Computer Security Act of 1987.

  4. OMB Circular A-130 - Wikipedia

    en.wikipedia.org/wiki/OMB_Circular_A-130

    the Computer Security Act of 1987 (Pub. L. 100–235) the Budget and Accounting Act, as amended [31 U.S.C. Chapter 11] the Government Performance and Results Act of 1993(GPRA) the Office of Federal Procurement Policy Act (41 U.S.C. Chapter 7) the Government Paperwork Elimination Act of 1998 (Pub. L. 105–277, Title XVII) Executive Orders:

  5. Computer Fraud and Abuse Act - Wikipedia

    en.wikipedia.org/wiki/Computer_Fraud_and_Abuse_Act

    The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. [1] Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire ...

  6. 100th United States Congress - Wikipedia

    en.wikipedia.org/wiki/100th_United_States_Congress

    2nd: January 25, 1988 – October 22, 1988. The 100th United States Congress was a meeting of the legislative branch of the United States federal government, composed of the United States Senate and the United States House of Representatives. It met in Washington, D.C., from January 3, 1987, to January 3, 1989, during the last two years of ...

  7. Information privacy law - Wikipedia

    en.wikipedia.org/wiki/Information_privacy_law

    Information privacy law. Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored ...

  8. Capstone (cryptography) - Wikipedia

    en.wikipedia.org/wiki/Capstone_(cryptography)

    Capstone is a United States government long-term project to develop cryptography standards for public and government use. Capstone was authorized by the Computer Security Act of 1987, [1] driven by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA); the project began in 1993.

  9. Category:United States federal computing legislation - Wikipedia

    en.wikipedia.org/wiki/Category:United_States...

    Computer Fraud and Abuse Act; Computer Security Act of 1987; D. Deleting Online Predators Act of 2006; ... Federal Information Security Modernization Act of 2014; G.