International Association of Chiefs of Police (IACP), Thursday, January 31, 2013
The International Association of Chiefs of Police (IACP) announced results of an IACP / SafeGov / Ponemon Institute survey of IACP member agencies. The survey examined how local and state law enforcement officials view the potential of cloud computing in the law enforcement environment and their plans for the future. A total of 272 agencies responded to the survey, and nearly three-quarters (71 percent) of the respondents were the chief executives of their agencies.
International Association of Chiefs of Police (IACP) and SafeGov.org Provide Law Enforcement Industry Clear Path Forward for Cloud Computing
, Wednesday, January 30, 2013
IACP and SafeGov.org survey finds that cloud computing within law enforcement is on the rise, but clear standards are needed to ensure law enforcement data remains secure.
Joseph Marks, NextGov, Tuesday, January 29, 2013
The Labor Department will pay a vendor up to $50 million to move its employees and contractors to a cloud-based Microsoft email system, according to an award notice.
Monday, January 28, 2013
In celebration of Data Privacy Day, SafeGov is releasing this "Cloud Computing for Education" video for educational institution leaders. This video provides guidance on selecting cloud service providers with an emphasis on data protection and security recommendations.
Marc Rotenberg and Khaliah Barnes, Educause Review, Monday, January 28, 2013
From test-performance scores to student financial data to statewide longitudinal data systems, there has been a dramatic increase in the collection of students' sensitive information over the last decade. Both the U.S. Congress and the presidential administrations have touted the amassing of student data as beneficial and necessary to a successful education system. However, the increase in the collection of student data has led to a marked decrease in student data protection. Changes to student privacy regulations and government programs such as the Education Data Initiative underscore the need for meaningful oversight for the protection of student data.
Rutrell Yasin, Government Computer News, Friday, January 25, 2013
The use of cloud computing in some form is inevitable in police technology. But like many professions, law enforcement executives have particular concerns about using cloud technology, ranging from the risk that unauthorized persons could steal sensitive information to concerns about the costs of technology migration.
Joseph Goedert, HealthData Management, Wednesday, January 23, 2013
Provisions of the new HIPAA privacy and security rules could change the regulatory landscape for the cloud computing industry, says Robert Belfort, a partner in the health care practice at law firm Manatt, Phelps & Phillips.
Tuesday, January 22, 2013
The new HIPAA-HITECH regulation is here. Officially titled “Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules,” this new regulation modifies HIPAA in accordance with the changes mandated by the HITECH Act of 2009. After years of waiting and many false alarms that the regulation was going to be released imminently, prompting joking references to Samuel Beckett’s play Waiting for Godot, HHS unleashed 563 pages upon the world. According to Office for Civil Rights (OCR) director Leon Rodriguez, the rule “marks the most sweeping changes to the HIPAA Privacy and Security Rules since they were first implemented.” I agree with his dramatic characterization of the regulation, for it makes some very big changes and very important ones too.
Lord Reid, The Times, Monday, January 21, 2013
The Government’s transition to cloud computing services is vital. It is also vital to do it right. Recently, some have bemoaned the slow pace with which the Government’s “Cloud First” policy is being implemented. To be sure, any unnecessary delay is regrettable.
Thursday, January 17, 2013
Recently, Microsoft’s Digital Crimes Unit discovered the botnet Nitol – Chinese malware embedded in more than 4,000 computers purchased by consumers from U.S. retailers. The malware equipped hackers with the ability to remotely turn on the machines; record users by hacking microphones and webcams; and log all keystrokes, including passwords and banking information. This breach shows us just how vulnerable our supply chains really are. The ease by which cyber thieves are attacking trusted U.S. providers is sobering.