Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: privacy
While the threat of a Sept. 11-style attack may not be as great, terrorism, either of the lone-wolf or state-sponsored variety, still poses a threat to the U.S. Agencies are moving to protect themselves in areas such as cybersecurity.
The council issued a new Privacy Best Practices for Social Media guide highlighting issues agencies should consider when using these interactive tools.
A district court judge has put a hold on the section of the STOCK Act that requires 28,000 federal executives to publish their financial information online.
Mary Ellen Callahan plans to move back to the private sector to practice law after three years of service to the federal government. Callahan made rigorous privacy safeguards the norm during her time at DHS.
Several advocacy groups have raised major civil-liberties concerns about pending cybersecurity legislation, claiming the language may unfairly expose personal information and punish those who hide it.
In a letter to Office of Management and Budget Acting Director Jeff Zients, the two lawmakers say the Food and Drug Administration lawsuit raises broader questions about how other agencies monitor employee use of personal email. The House and Senate members want OMB to conduct a governmentwide analysis of these policies.
Lawmakers at odds over critical infrastructure protection provisions. Sen. McCain promised to introduce a new version of a comprehensive cyber bill to focus on collaboration and information sharing instead of regulation of critical infrastructures. Sens. Joseph Lieberman and Susan Collins refute the criticism, saying they've held 10 hearings, hundreds of meeting and pleaded with others in the Senate to offer comments.
Tags: technology , management , Joseph Lieberman , Susan Collins , John McCain , Tom Ridge , Janet Napolitano , DHS , Senate Homeland Security and Governmental Affairs Committee , cybersecurity , critical infrastructure , DoD , NSA , U.S. Chamber of Commerce , Jason Miller
DHS officials said they're only monitoring Twitter and Facebook to get situational awareness of the homeland security situation. Congress seems unconvinced. Privacy group wants lawmakers to take action to stop DHS.
Tags: Privacy Act , civil liberties , DHS , Congress , social media , information sharing , Patrick Meehan , Jackie Speier , Electronic Privacy Information Center , Mary Ellen Callahan , Jared Serbu , Web 2.0
Michael Reheuser is the director of the Defense Privacy and Civil Liberties Office, that oversees the Defense Department's compliance with the Privacy Act, which has been largely unchanged since 1974.