Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information (Google eBook)

Front Cover
DIANE Publishing, Dec 1, 1993 - 185 pages
0 Reviews
Examines Federal policies directed at protecting information, particularly in electronic communications systems. Examines the vulnerability of communications and computer systems, and the trends in technology for safeguarding information in these systems. Addresses important trends taking place in the private sector. Charts and tables.
  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

XIV
23
XV
24
XVI
27
XVII
28
XVIII
29
XIX
37
XX
38
XXI
39
LII
101
LIII
106
LIV
110
LV
117
LVI
123
LVII
127
LVIII
131
LIX
135

XXII
41
XXIII
42
XXIV
44
XXVI
51
XXVII
54
XXIX
59
XXX
61
XXXI
63
XXXII
68
XXXIII
69
XXXIV
71
XXXV
72
XXXVI
73
XXXVII
77
XXXVIII
83
XL
86
XLII
88
XLIII
89
XLV
90
XLVIII
95
XLIX
98
L
100
LXII
136
LXIII
137
LXIV
139
LXV
140
LXVI
141
LXVII
143
LXVIII
145
LXIX
146
LXX
147
LXXI
151
LXXII
152
LXXIV
153
LXXVI
155
LXXVII
156
LXXIX
158
LXXX
160
LXXXI
163
LXXXII
165
LXXXV
168
LXXXVI
174
LXXXVIII
182
LXXXIX
183

Common terms and phrases

Popular passages

Page 141 - Restricted Data' means all data concerning (1) design, manufacture, or utilization of atomic weapons; (2) the production of special nuclear material; or (3) the use of special nuclear material in the production of energy, but shall not include data declassified or removed from the Restricted Data category pursuant to section 142.
Page 139 - Cabinet, in the order in which the executive departments were established: (1) Secretary of State, (2) Secretary of the Treasury, (3) Secretary of Defense...
Page iii - HR 32, before the Subcommittee on Civil and Constitutional Rights of the House Committee on the Judiciary, 94th Cong., 2d Sess.
Page 166 - ... information, as well as the privacy or confidentiality of personal or commercial proprietary information provided to the US Government by its citizens. SECTION III - APPLICABILITY This policy applies to all Federal Executive Branch Departments and Agencies, and entities, including their contractors, which electronically transfer, store, process, or communicate sensitive, but unclassified information. SECTION IV - RESPONSIBILITIES This policy assigns to the heads of Federal Government Departments...
Page 143 - It is the policy of this Administration that, to the maximum extent possible, the products of fundamental research remain unrestricted. It is also the policy of this Administration that, where the national security requires control, the mechanism for control of information generated during federallyfunded fundamental research in science, technology and engineering at colleges, universities and laboratories is classification.
Page 147 - Before the Subcommittee on Science, Research, and Technology and the Subcommittee on Transportation, Aviation, and Materials of the House Committee on Science, Space, and Technology, 100th Cong., 1 st sess.
Page 85 - Trusted Computer System - A system that employs sufficient hardware and software integrity measures to allow its use for processing simultaneously a range of sensitive or classified information.
Page 166 - Sensitive but unclassified information is information the disclosure, loss, misuse, alteration or destruction of which could adversely affect national security or other federal government interests. National security interests are those unclassified matters that relate to the national defense or the foreign relations of the US Government. Other government interests are those related, but not limited to the wide range of government or government-derived economic, human, financial, industrial, agricultural,...
Page 147 - Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive order or an Act of Congress to be kept secret in the interest of national defense or foreign policy; and (5) the term "Federal agency...
Page 143 - No restrictions may be placed upon the conduct or reporting of federally funded fundamental research that has not received national security classification, except as provided in applicable US statutes.

Bibliographic information