EFTA00261100Set 9
2006-05-16100p14,788w
Enforcement
Requests
MySpace is a free online social networking service that allows users to create their
own profile pages, which can include lists of their favorite musicians, books and
movies ... links to pages within and outside the
MySpace environment. The service also permits users to send and receive private
messages with other MySpace users, and to restrict the disclosure ... MySpace profile, but
which are not controlled by MySpace.
MySpace does not charge its users to set up their profiles or establish an account.
It does not require or accept
https://www.justice.gov/epstein/files/DataSet%209/EFTA00261100.pdf
EFTA00162778Set 9
2018-01-2311p5,469w
discovered a strain of malware in the wild which targets Mac OS X users. The malware,
dubbed MaMi, was first spotted by security researcher Patrick Wardle.
• The only indicator spotted ... criminals are using interest in the recent Meltdown and Spectre chip vulnerabilities to trick users
into downloading malware disguised as security patches, according to Malwarebytes.
• The SSL-enabled phishing site ... recently disclosed chip
flaws (Intel-AMD-SecurityPatch-10-1-v1.exe) but is in fact malware.
• "Upon running it, users will infect themselves with Smoke Loader, a piece of malware that can retrieve
additional payloads. Post
https://www.justice.gov/epstein/files/DataSet%209/EFTA00162778.pdf
EFTA00282486Set 9
2017-01-252p615w
knowledge of one or more of these
reasons, and a thorough understanding of your user.
User center design
Quite often in design we enter the process of concept development ... individual that will end up using what we design, otherwise know as the 'user', or 'user
group'. In product development, depending on the situation, your theoretical user
could either ... overall
market, or more general. It will be entirely up to you who your user is,as well as how
specifically you define your user. Regardless, you will need
https://www.justice.gov/epstein/files/DataSet%209/EFTA00282486.pdf
EFTA00796980Set 9
2015-01-0345p21,240w
phones, pagers, video equipment, and tape that are accessed directly or indirectly.
As a user, you are responsible for using these resources and services in an efficient, effective, ethical ... have no expectation of privacy in such communications.
The following guidelines apply to all users of computer and communication resources and services, wherever the
users are located. The term "users ... computer accounts are provided to assist employees in the performance of their
job. No user should have an expectation of privacy in anything created, sent, received or downloaded
https://www.justice.gov/epstein/files/DataSet%209/EFTA00796980.pdf
EFTA00141789Set 9
2018-09-0639p12,069w
CHVUPG-PNET2 NET31 POS
1) Enterprise software package major version upgrade for site,
users and channels from NET 3.0 to Net3 .1, NV-ENT-MJVUPG
-NET2X NET 3.1
4) VisionHub ... NET2X NET31 1.000000 EA 50.0000 50.00
ENTERPRISE SOFTWARE PACKAGE MAJOR VERSION
UPGRADE FOR SITE, USERS AND CHANNELS FROM NET 2.X
TO NET 3.1
0005 NWNVD0204 ... limited to:
1. Limiting access to DOI Information and Covered Information Systems to authorized users and to transactions and functions
that authorized users are permitted to exercise;
2. Providing security
https://www.justice.gov/epstein/files/DataSet%209/EFTA00141789.pdf
EFTA00125641Set 9
2018-09-2115p7,243w
NET2X NET31 1.000000 EA $0.0000 $0.00
ENTERPRISE SOFTWARE PACKAGE MAJOR VERSION
UPGRADE FOR SITE. USERS AND CHANNELS FROM NET 2.X
TO NET 3.1
0005 NV-NIVD5204 ... limited to:
1. Limiting access to DOJ Information and Covered Information Systems to authorized users and to transactions and functions
that authorized users are permitted to exercise;
2. Providing security ... including, but not limited to, recognizing and reporting potential indicators of insider
threats to users and managers of DOJ Information and Covered Information Systems;
3. Creating, protecting, and retaining Covered
https://www.justice.gov/epstein/files/DataSet%209/EFTA00125641.pdf