
Document 01
This document presents information on phone intercept, encryption, and privacy technologies and methods circa 1944.

Document 02
This report assesses the privacy impact of an exercise demonstrating the EINSTEIN program which involved personally identifiable information.

Document 03
This report assesses the privacy impact of the Malware Lab Network which involves personally identifiable information.

Document 04
This document lays a framework for the privacy rights of consumers when participating in internet commerce.

Document 05
This report assesses the privacy impact of the Enhanced Cybersecurity Services program which involves personally identifiable information.

Document 06
This document catalogs security and privacy controls for Federal systems and provides a methodology for choosing the most appropriate controls for the needs of an organization.

Document 07
This document provides guidance for the use and sharing of information obtained as a result of the 2015 Cybersecurity Information Sharing Act.

Document 08
This study examines the information security of the Healthcare.gov data hub.

Document 09
This study examines the information security compliance and privacy measures of the Department of Homeland Security Office of Intelligence and Analysis.

Document 10
This document voices security and privacy concerns related to vehicle to vehicle and vehicle to infrastructure communication technology in automobiles.

Document 11
This document provides guidance and priorities for Federal information system modernization efforts.

Document 12
This release announces the completion of an IG report on cyber threat information sharing which finds remaining challenges related to database integration, participation, quality control, and data fields.