Administration Previews Optional Industry Cyber Standards

Aliya Sternstein, Nextgov,  Thursday, August 29, 2013

The Obama administration has released a draft of computer security protocols for companies that operate key systems, such as chemical plants and the electric grid. The document admittedly does not address privacy issues.

HHS pacing its move to the cloud

Jason Miller, Federal News Radio,  Thursday, August 29, 2013

The long-awaited solicitation to move the Department of Health and Human Services to the cloud for email is coming in the next month or two.

The FTC and the New Common Law of Privacy

Daniel J. Solove and Woodrow Hartzog,  Thursday, August 29, 2013

One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal Trade Commission (FTC) has been enforcing companies’ privacy policies through its authority to police unfair and deceptive trade practices. Despite more than fifteen years of FTC enforcement, there is no meaningful body of judicial decisions to show for it. The cases have nearly all resulted in settlement agreements. Nevertheless, companies look to these agreements to guide their privacy practices. Thus, in practice, FTC privacy jurisprudence has become the broadest and most influential regulating force on information privacy in the United States – more so than nearly any privacy statute and any common law tort.

The Brussels and Warsaw Privacy Peace Talks

Christopher Wolf, IAPP Privacy Perspectives,  Thursday, August 29, 2013

Next month, FTC Commissioner Julie Brill and Danny Sepulveda, Deputy Assistant Secretary of State, will travel to Brussels to discuss privacy with EU officials. Later in the month, Poland will host the 35th Conference of Data Protection of Data Protection and Privacy Commissioners, a meeting that will be attended by privacy officials and stakeholders from around the world. Both gatherings provide an opportunity to declare a cease fire in the war of words—a war in which most of the “incoming” has originated on the European side of the Atlantic in the wake of the Snowden NSA revelations, and a war that threatens progress in international cooperation on privacy.

Amazon Web Services improves GovCloud management

Mikael Ricknas, Computerworld,  Thursday, August 29, 2013

Users of Amazon Web Services' GovCloud can now take advantage of CloudFormation, which aims to make it easier to manage more complex environments.

Akamai global network receives FedRAMP security approval

Rutrell Yasin, Government Computer News,  Thursday, August 29, 2013

Akamai has been granted provisional approval to offer cloud services under the Federal Risk and Authorization Management Program (FedRAMP) cloud security program, becoming the first provider of its kind to achieve the highest security level under the program, according to company officials.

Secure Data, Not Devices

Dave Anderson, InformationWeek Government,  Thursday, August 29, 2013

In Gartner's latest quarterly PC sales analysis, it's hard to miss the enormous shift away from desktop and laptop PCs toward tablets and smartphones. Worldwide PC shipments in the second quarter were down 10.9% from the year before, marking the fifth consecutive quarter of falling sales. U.S. government agencies are following this trend and, in some cases, even leading it.

Liberty Reserve and the Cloud

Paul Rosenzweig by Paul Rosenzweig, The Chertoff Group
Wednesday, August 28, 2013

In late May the Department of Justice announced a large scale money-laundering indictment against Liberty Reserve. The indictment, which was unsealed on May 28, charges the seven principal employees, as well as Liberty Reserve itself, with money laundering and operating an unlicensed money transmitting business, and seeks $25 million in damages. The charges were leveled using a provision of the Patriot Act, since Liberty Reserve was not an American company. The accused could face up to 30 years in prison.

Federal CIOs Face BYOD, Mobile App Security Challenges

Kenneth Corbin, CIO,  Wednesday, August 28, 2013

As the federal government warms to the idea of allowing employees to use their own mobile devices for work and develops new device management policies, agency CIOs and others will still have to grapple with the challenges associated with application security, experts warn.

DARPA Creates Cloud Using Smartphones

Patience Wait, InformationWeek Government,  Wednesday, August 28, 2013

The Defense Advanced Research Projects Agency is testing new software-based approaches to create cloud-like computing networks on the battlefield, using the power of smartphones and radios. The lessons DARPA learns are expected to be useful not only to U.S. troops in remote locations, but also to first responders when traditional communications infrastructure fails or is unavailable.