Confidential communications -- United States
Label
Confidential communications -- United States
Name
Confidential communications
Sub focus
Actions
Incoming Resources
- Subject of28
- Acquisition management, contractor access to confidential data
- Review of four FISA applications and other aspects of the FBI's Crossfire Hurricane investigation
- Oversight of the Federal Bureau of Investigation, hearing before the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, second session, September 17, 2008
- Family matters, secrecy and disclosure in the history of adoption, E. Wayne Carp
- Report by the Office of the Inspector General of the Department of Justice on the Federal Bureau of Investigation's use of exigent letters and other informal requests for telephone records, hearing before the Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the Committee on the Judiciary, House of Representatives, One Hundred Eleventh Congress, second session, April 14, 2010
- DHS Privacy Office needs to improve oversight of department-wide activities, programs, and initiatives, Office of Inspector General
- A review of the Federal Bureau of Investigation's use of exigent letters and other informal requests for telephone records
- Does executive privilege apply to the communications of a President-elect?, Todd Garvey
- Presidential claims of executive privilege, history, law, practice, and recent developments, Todd Garvey
- A review of the Federal Bureau of Investigation's use of national security letters, assessment of progress in implementing recommendations and examination of use in 2007 through 2009
- Expunging juvenile records, misconceptions, collateral consequences, and emerging practices, Andrea R. Coleman
- Wireless Privacy Enhancement Act of 1999, report (to accompany H.R. 514) (including cost estimate of the Congressional Budget Office)
- Providing for the consideration of H.R. 514, the Wireless Privacy Enhancement Act of 1999, report (to accompany H. Res. 77)
- New directions from the field, victims' rights and services for the 21st century : news media community
- National Change of Address Program, audit report, Office of the Inspector General, United States Postal Service
- Transportation Security Administration's processes for designating and releasing sensitive security information
- Providing for the consideration of H.R. 438, the Wireless Communications and Public Safety Act of 1999, report (to accompany H. Res. 76)
- Confidentiality Opportunities for Peer Support Counseling Act
- Know the risk, raise your shield, campaign materials
- Protecting mobile privacy, your smartphones, tablets, cell phones and your privacy : hearing before the Subcommittee on Privacy, Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, May 10, 2011
- National security letters, proposed amendments in the 111th Congress, Charles Doyle
- A methodology for evaluating alternative technical and information management approaches to privacy requirements, Robert C. Goldstein
- Oversight of the Federal Bureau of Investigation, hearing before the Committee on the Judiciary, United States Senate, One Hundred Tenth Congress, first session, March 27, 2007
- Disclosure Avoidance for the 2020 Census, an introduction
- Welfare reform and substance abuse treatment confidentiality, general guidance for reconciling need to know and privacy
- National Security Letters Reform Act of 2007, hearing before the Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the Committee on the Judiciary, House of Representatives, One Hundred Tenth Congress, second session, on H.R. 3189, April 15, 2008
- Effective Assistance of Counsel in the Digital Era Act, report (to accompany H.R 5546)
- Citizen Empowerment Act, report together with minority views (to accompany H.R. 2711) (including cost estimate of the Congressional Budget Office)
Outgoing Resources
- Focus1
- Sub focus1