Kevin McDonald, iPads force their way into corporate IT
Today’s WhatIs.com Word of the Day is ITAR and EAR compliance.
“On the HIPAA side and in ITAR, [customers] were booting iPhones,” McDonald said. “We’re removing them in favor of the Blackberry.” (ITAR refers to the U.S. State Department’s International Traffic in Arms Regulations, which outlaw the export of critical technologies that could be used against the U.S.)
“You can’t centrally manage them or control the apps,” McDonald said. “You can’t remote-delete with any assurance. And in an environment where you absolutely must prove where the data goes and where it’s stored, if it’s encrypted, you cannot do that with an iPhone or iPad.”
In short, the strength of the iPad and iPhone — the availability of thousands of apps — is also their weakness when it comes to security. To be fair, Google’s Android phones fall into the same trap, McDonald said.
Linda Tucci, FAQ: An introduction to the ISO 31000 risk management standard
Today’s WhatIs.com Word of the Day is non-governmental organization.]]>
Melissa Hathaway, Government Must Keep Pace with Cybersecurity Threats
Today’s WhatIs.com Word of the Day is Cybersecurity Enhancement Act 2009. Melissa Hathaway does an excellent job summarizing all the cybersecurity legislation efforts currently in place.]]>
Jeremy Woolfe, EU Transparency Directive Seeks to Reshape Reporting
Today’s WhatIs.com Word of the Day is EU Transparency Directive.]]>
Vivek Kundra, Gov 2.0 Summit
Today’s WhatIs.com Word of the Day is Open Government Directive.
Guest blogger: Crystal Bedell
Open Government Directive provides requirements for the online publication of government data. U.S. executive departments and federal agencies are required to release public information online in machine-readable, open formats, thereby exposing their operations to the public. They are also required to integrate public participation in the policy-making process.
The Office of Management and Budget issued the Open Government Directive and its instructions in 2009 by order of President Barack Obama. The Open Government Directive’s goal is to promote transparency, participation, and collaboration between the federal government and the public. The transparency that comes with online disclosure is intended to promote accountability and enable public participation in the policy-making process.
To comply with the mandate, agencies had to identify “high-value information” that was already available online, identify “high-value information” that was not online but would be, and establish a timeline for that data’s publication. There has been some confusion, however, as to what data constitutes high value. The Open Government Directive definition of high-value information is very broad, including data that can “increase agency accountability and responsiveness; improve public knowledge of the agency and its operations; further the core mission of the agency; create economic opportunity; or respond to need and demand as identified through public consultation.”
In addition to publishing public data, each agency must publish an /Open page on its Web site (e.g., www.justice.gov/open) that discloses the agency’s efforts in regards to the initiative and engages the public, looking for help and feedback on its processes.
Vivek Kundra, Failure to produce results puts IT projects on the chopping block
Government 2.0 could just be called Government BPM but it’s not as sexy or glittery in a headline. Also, Government BPM sounds kind of medical…blood pressure management? Although in a real sense, that’s exactly what it is. Getting information to flow throughout the government in a healthy, manageable way. The technology is just a means to an end. It also sounds a little like bowel movement though, and that’s not good. Better stick with Government 2.0 and leave everyone trying to guess what exactly it is.
The TechStat initiative brings OMB officials and agency leaders together for in-person meetings to review IT Dashboard results and feedback from citizens. After a TechStat session, OMB takes action on underperforming projects by canceling, halting or overhauling them.
I wonder if there’s any authority behind TechStat. Need to find out. Can they pull the plug on funding? Or is it just a PR move to keep citizens happy and scare IT project managers into getting their act together or pulling the plug themselves?]]>
Michael Cobb, Is security improved when the number of Internet gateways is reduced?
Today’s WhatIs.com Word of the Day is Trusted Internet Connections. The United States government would like to limit the number of public Internet connection points to 50, with each Agency having approximately two gateways.]]>
Robert Jamison, as quoted in Analysis: Einstein and U.S. cybersecurity
Today’s WhatIs.com Word of the Day is EINSTEIN.]]>
Here are their 8 Principles for Gov 2.0
– All public data are made available. Public data are not data
that are subject to valid privacy, security or privilege
– Data are collected at the source, with the finest possible
level of granularity, not in aggregate or modified forms.
– Data are made available as quickly as necessary to preserve
the value of the data
– Data are available to the widest range of users for the
widest range of purposes.
• Machine Processable
– Data are reasonably structured to allow automated processing.
–Data are available for anyone, with no requirement of
–Data are available in a format over which no entity has exclusive
–Data are not subject to any copyright, patent, trademark, or
trade secret regulation. Reasonable privacy, security and privilege
restrictions may be allowed.
e.Republic posts speaker slides from their conferences after the event is over. I think the slides provide an interesting peak behind the curtain.
GTC Southwest: The Texas Digital Government Summit 2010
California CIO Academy 2010