Difference between revisions of "ComputerPolicy.com"

(Page Updated by AboutUsBot)
 
(Update contact information from Whois)
 

(One intermediate revision by one other user not shown)



Line 20: Line 20:
 
[http://www.computerpolicy.com/aboutthe.htm read more]
 
[http://www.computerpolicy.com/aboutthe.htm read more]
  
 +
==Contact==
 +
{{WhoisProxyRegistration}}
 
==Additional Information==
 
==Additional Information==
  
Line 38: Line 40:
 
</WikiPages>
 
</WikiPages>
  
[[Category:Computers]]
+
 
[[Category:Security]]
+
__NOTOC__
[[Category:Policy]]
+
[[Category:Computer Misuse]]
[[Category:Companies]]
+
[[Category:Computer Policies]]
 
[[Category:Computer Policy]]
 
[[Category:Computer Policy]]
[[Category:Computer Policies]]
+
[[Category:Computer Use Policy]]
 +
[[Category:Data Security]]
 +
[[Category:Information Security]]
 +
[[Category:Internet Policies]]
 
[[Category:Internet Policy]]
 
[[Category:Internet Policy]]
[[Category:Internet Policies]]
 
 
[[Category:Internet Use Policy]]
 
[[Category:Internet Use Policy]]
[[Category:Computer Use Policy]]
 
[[Category:Policies For Computer Usage]]
 
[[Category:Computer Misuse]]
 
[[Category:Abuse Of Computers]]
 
[[Category:Information Security]]
 
[[Category:Data Security]]
 
 
[[Category:Trade Secret]]
 
[[Category:Trade Secret]]
[[Category:Trade Secrets]]
+
[[Category:Computer_Misuse]]
[[Category:Information Technology]]
+
[[Category:Computer_Policies]]
[[Category:Internet Access Policy]]
+
[[Category:Computer_Policy]]
 
+
[[Category:Computer_Use_Policy]]
__NOTOC__
+
[[Category:Data_Security]]
 
+
[[Category:Information_Security]]
 +
[[Category:Internet_Policies]]
 +
[[Category:Internet_Policy]]
 +
[[Category:Internet_Use_Policy]]
 +
[[Category:Trade_Secret]]

Latest revision as of 06:40, 29 December 2007

Title

computer policy, computer use policy, internet policy, internet policies

Description

About The Policy Guide Author

D. Douglas Rehman is the President of Rehman Technology Services, Inc. (RTSI). The company specializes in the forensic examination of computer data. This process can reveal what a computer has been used for, attempts to conceal or destroy evidence, attempts to fabricate evidence, what web sites have been visited, what email has been sent or received, what files were uploaded or downloaded, and when files were last accessed. RTSI also provides Data and Information Security consulting services, electronic countermeasures sweeps, and investigative services.

Mr. Rehman spent thirteen years in law enforcement as a Florida Department of Law Enforcement (FDLE) Special Agent and as an Illinois State Police (ISP) Inspector. Throughout his career, Mr. Rehman was involved in the technical aspects of law enforcement, including forensic computer analysis, seizure of computer data, computer crime investigation, design and installation of covert audio and video surveillance devices, court ordered wire tapping, radio communications, and electronic countermeasures.

Mr. Rehman pioneered the proactive investigation of pedophiles via computer. He has spent more than 2000 undercover hours online posing as child victims and adult pedophiles, resulting in more than 75 prosecutions nationwide. He was a founding member of the FBI’s Operation Innocent Images and has regularly instructed at the FBI Academy. Mr. Rehman has instructed hundreds of law enforcement officers and regularly consults with federal, state and local agencies nationwide on topics ranging from computer crimes to computer forensics and child exploitation. He regularly consults with United States Attorney's Offices and State Prosecutors in computer related prosecutions. Mr. Rehman has been accepted in state and federal courts as an expert witness in the following areas: computers (PC and Mac); computer forensics; digital imaging, the Internet; America Online; electronic surveillance; and child exploitation.

read more

Contact

Whois information is public, but in response to some people wanting to keep their contact information private, many domain name Registrars offer a "privacy" or "proxy" service to mask the domain name owner. This domain is most likely using a proxy service.

Additional Information

Related Domains



Retrieved from "http://aboutus.com/index.php?title=ComputerPolicy.com&oldid=13441178"