Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search

Showing results 21 - 30 of 1534688 documents for online pujcky ernoice Navtivte web na WWWLOAN24HXYZ pujcky online Nov Jin online nebankovn rychl pujcky ihned Hoice nebankovn pujcky online esk Velenice pujcka na smenku cesky tesin pujky ped vplatou ihned na et pujcka jihlavsko pujcka hotove rymarov provident pjka s regresem pujcka online ihned bez registru Jlov pjky ihned do 5000 pjky online ihned na et credito online pujcka ihned na cet Svtl nad Szavou nebankovni pujcky praha kobylisy
Relevance
Date
  1. Discussion Draft: Privacy Act White Paper

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-SEPTEMBER-2005-MEETING/documents/Privacy-White-Paper-rev091205.pdf
    DISCUSSION DRAFT Privacy Act White Paper Summary: This paper raises the question of whether the current legal and policy framework governing the information practices of Federal agencies are adequate to protect the privacy of individuals about whom the Federal government maintains or uses personal information. It postulates that laws and policies have not kept pace with changes in technology and information and handling processes and suggests the need for an open dialogue on what changes in law and policy are needed and how best to make those changes. The paper was prepared as a basis for a discussion by the Information Security and Privacy Advisory Board The issues: 1. Is there a need to reopen the current legal and policy framework for managing information about individuals? 2. What role, if any, can the ISPAB play? Can we partner with others? Background: The Privacy...
  2. Information Systems Security (ISS) Line of Business (LOB)

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-SEPTEMBER-2005-MEETING/documents/ISPAB-iss-lob-JSindelar.pdf
    1 Information Systems Security (ISS) Line of Business (LOB) John Sindelar General Services Administration Information Security and Privacy Advisory Board Quarterly Meeting September 14, 2005 2 Federal Information Systems Security Vision and Goals Vision: The Federal Government’s information system security program enables agencies’ mission objectives through comprehensive and consistently implemented set of risk-based, cost-effective controls and measures that adequately protect information contained in Federal Government information systems. Goals • Define and manage the federal government information security risk profiles • Support performance of the federal government’s mission through improved information sharing • Establish a mechanism to acquire, distribute and support information security solutions • Attract and retain a workforce capable of leading the confi...
  3. NIST Industrial Control System Security Activities

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-SEPTEMBER-2005-MEETING/documents/ISPAB-KStouffer.pdf
    Intelligent Systems Division Manufacturing Engineering Laboratory NIST Industrial Control System Security Activities Keith Stouffer National Institute of Standards and Technology Information Security and Privacy Advisory Board (ISPAB) Meeting Doubletree Hotel, Rockville, MD September 14, 2005 Industrial Control System Security • The (US) National Plan for Information Systems Protection and the recently released GAO-04-354 cite industrial control systems as critical points of vulnerability in America's utilities and industrial infrastructure... “…Successful attacks on control systems could have devastating consequences, such as endangering public health and safety.” Electric power — Water — Oil & Gas Chemicals — Pharmaceuticals Mining, Minerals & Metals Pulp & Paper — Food & Beverage Consumer Products Discrete Manufacturing (automotive, aerospac...
  4. Conceptual Proposal for a Joint Inquiry and Recommendations on a 21st Century Framework for Revisions to the Privacy Act of 1974 and Other Federal Privacy Statutes

    https://csrc.nist.gov/CSRC/media/Events/ISPAB-SEPTEMBER-2005-MEETING/documents/Proposal-ISPAB_DHS-Privacy-Workplan-090905.pdf
    Conceptual Proposal for a Joint Inquiry and Recommendations on a 21st Century Framework for Revisions to the Privacy Act of 1974 and Other Federal Privacy Statutes This short paper outlines a conceptual proposal for a joint inquiry and recommendations on a 21st century framework for revisions to the Privacy Act of 1974 and related Federal privacy statutes to be undertaken by the Information Security and Privacy Advisory Board (ISPAB) and the Department of Homeland Security Data Privacy and Integrity Advisory Committee. Background The Information Security and Privacy Advisory Board (ISPAB) is a federal advisory committee originally established by the Computer Security Act of 1987 (P.L. 100-35) as amended by the Federal Information Security Management Act of 2002 (P.L. 107-347) and managed by NIST. The membership of the Board consists of twelve members and a Chairperson. The Board meet...
  5. https://www.nist.gov/system/files/documents/2017/09/27/ncstac_september_28_meeting_agenda_final_1.pdf

    https://www.nist.gov/system/files/documents/2017/09/27/ncstac_september_28_meeting_agenda_final_1.pdf
    NATIONAL CONSTRUCTION SAFETY TEAM ADVISORY COMMITTEE (NCSTAC) MEETING 28 September 2017 THE PORTRAIT ROOM, ADMINISTRATION BUILDING 101 NATIONAL INSTITUTE OF STANDARDS & TECHNOLOGY (NIST) 100 BUREAU DRIVE, GAITHERSBURG, MD 20899 AGENDA MEETING GOALS: • Review NIST’s response to the Committee’s 2016 annual report recommendations, • review update on the progress of the implementation of NIST Joplin tornado investigation’s recommendations, • review update on the Disaster and Failure Studies program, • and provide recommendations to NIST that will better prepare the readiness of future National Construction Safety Teams to carry out effective and impactful disaster and failure investigations. Thursday, 28 September Time Topic Discussion Leader Opening Remarks 8:30 – 8:35 am Call to Order Roll Call Safety Briefing Judith Mitrani-Reiser Director...
  6. Diffusion data need for Heat Treating Industries

    https://www.nist.gov/system/files/documents/mml/msed/thermodynamics_kinetics/Diffusion-data-need-for-Heat-Treating-Industries-1.pdf
    10th NIST diffusion Workshop, May 3-4, Gaithersburg, MD Diffusion data need for Heat Treating Industries Mohammed Maniruzzaman, PhD Research & Adv. Engineering Caterpillar Inc. Prof. John Morral Materials Science & Engineering Ohio State University 10th NIST diffusion Workshop, May 3-4, Gaithersburg, MD Heat treatment processes Direct Hardening Surface Hardening 10th NIST diffusion Workshop, May 3-4, Gaithersburg, MD Tools used by the heat- treaters 10th NIST diffusion Workshop, May 3-4, Gaithersburg, MD Phase diagram Source: Flake C. Campbell, Elements of Metallurgy and Engineering Alloys, ASM International, Jun 30, 2008 10th NIST diffusion Workshop, May 3-4, Gaithersburg, MD Isothermal transformation diagram Source: Flake C. Campbell, Elements of Metallurgy and Engineering Alloys, ASM International, Jun 30, 2008 10th NIST diff...
  7. Privileged Account Management for the Financial Services Sector

    https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-pam-nist-sp1800-18a-draft.pdf
    NIST SPECIAL PUBLICATION 1800-18A Privileged Account Management for the Financial Services Sector Volume A: Executive Summary Karen Waltermire National Cybersecurity Center of Excellence Information Technology Laboratory Tom Conroy Marisa Harriston Chinedum Irrechukwu Navaneeth Krishnan James Memole-Doodson Benjamin Nkrumah Harry Perper Susan Prince Devin Wynne The MITRE Corporation McLean, VA September 2018 DRAFT This publication is available free of charge from: https://www.nccoe.nist.gov/projects/use-cases/privileged-account-management DRAFT NIST SP 1800-18A: Privileged Account Management for the Financial Services Sector 1 Executive Summary 1 ▪ Privileged accounts are used to access and manage an organization’s information assets and 2 systems. Often described as the “keys to the kingdom,” these accounts are use...
  8. Summary of the Results of Phase I ELFT Testing - 24 September 2007

    https://www.nist.gov/system/files/documents/2016/12/19/phase1_aggregate.pdf
    Summary of the Results of Phase I ELFT Testing 24 September 2007 Evaluat on of Latent F ngerpr nt Technology (ELFT is a NIST project for evaluating automated one-to-many latent fingerprint search technology. ELFT was planned as a multi-phased project. Phase I was designed as a “proof of concept” test for one-to- many automated latent searches. Software was submitted to NIST for testing in the form of Software Development K ts, or SDKs. These were installed and run on NIST computers, using NIST data. Additional information on ELFT and Phase I may be...
  9. Stature Estimation

    https://www.nist.gov/system/files/documents/2018/03/13/swganth_stature_estimation.pdf
    Page 1 of 4 Scientific Working Group for Forensic Anthropology (SWGANTH) Stature Estimation Issue date: 08/02/2012 Revision: 1 Stature Estimation 1.0 Principle, Spirit and Intent Stature estimation is one of several biological parameters that may be usefully compared with antemortem records to include or exclude possible identifications of missing persons. Stature estimation is made possible by the relationship of skeletal dimensions with living height. Skeletal remains will be analyzed in a reliable and systematic manner for the purpose of estimating stature using appropriate techniques and the stature estimation process documented. 2.0 Purpose and Scope These guidelines outline recommended approaches for estimating adult stature from skeletal elements or mostly skeletonized remains. Practitioners of forensic anthropology should implement thes...
  10. Don-Bradshaw-Chris-Walton-Bridging Non-ISSI LMR and LTE Mission Critical Push-To-Talk-FINAL

    https://www.nist.gov/system/files/documents/2019/11/01/bridging_non-issi_lmr_and_lte_mission_critical_push-to-talk_.pdf
    Non-ISSI LMR to LTE MCPTT Don Bradshaw, PSCR // Chris Walton, PSCR 1 #PSCR2019 2 DISCLAIMER Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. *Please note, unless mentioned in reference to a NIST Publication, all information and data presented is preliminary/in-progress and subject to change Executive Summary • Status of LMR to LTE Capabilities and Development • The Missing Combination • PSCR’s LMR to LTE Strategy • Recognized Challenges • Current Research Project • Success 3 Status of LMR to LTE Capa...
Showing results 21 - 30 of 1534688 documents for online pujcky ernoice Navtivte web na WWWLOAN24HXYZ pujcky online Nov Jin online nebankovn rychl pujcky ihned Hoice nebankovn pujcky online esk Velenice pujcka na smenku cesky tesin pujky ped vplatou ihned na et pujcka jihlavsko pujcka hotove rymarov provident pjka s regresem pujcka online ihned bez registru Jlov pjky ihned do 5000 pjky online ihned na et credito online pujcka ihned na cet Svtl nad Szavou nebankovni pujcky praha kobylisy