Aliya Sternstein, Nextgov, Thursday, August 29, 2013
The Obama administration has released a draft of computer security protocols for companies that operate key systems, such as chemical plants and the electric grid. The document admittedly does not address privacy issues.
Daniel J. Solove and Woodrow Hartzog, Thursday, August 29, 2013
One of the great ironies about information privacy law is that the primary regulation of privacy in the United States has barely been studied in a scholarly way. Since the late 1990s, the Federal Trade Commission (FTC) has been enforcing companies’ privacy policies through its authority to police unfair and deceptive trade practices. Despite more than fifteen years of FTC enforcement, there is no meaningful body of judicial decisions to show for it. The cases have nearly all resulted in settlement agreements. Nevertheless, companies look to these agreements to guide their privacy practices. Thus, in practice, FTC privacy jurisprudence has become the broadest and most influential regulating force on information privacy in the United States – more so than nearly any privacy statute and any common law tort.
Christopher Wolf, IAPP Privacy Perspectives, Thursday, August 29, 2013
Next month, FTC Commissioner Julie Brill and Danny Sepulveda, Deputy Assistant Secretary of State, will travel to Brussels to discuss privacy with EU officials. Later in the month, Poland will host the 35th Conference of Data Protection of Data Protection and Privacy Commissioners, a meeting that will be attended by privacy officials and stakeholders from around the world. Both gatherings provide an opportunity to declare a cease fire in the war of words—a war in which most of the “incoming” has originated on the European side of the Atlantic in the wake of the Snowden NSA revelations, and a war that threatens progress in international cooperation on privacy.
Rutrell Yasin, Government Computer News, Thursday, August 29, 2013
Akamai has been granted provisional approval to offer cloud services under the Federal Risk and Authorization Management Program (FedRAMP) cloud security program, becoming the first provider of its kind to achieve the highest security level under the program, according to company officials.
Dave Anderson, InformationWeek Government, Thursday, August 29, 2013
In Gartner's latest quarterly PC sales analysis, it's hard to miss the enormous shift away from desktop and laptop PCs toward tablets and smartphones. Worldwide PC shipments in the second quarter were down 10.9% from the year before, marking the fifth consecutive quarter of falling sales. U.S. government agencies are following this trend and, in some cases, even leading it.
The Chertoff Group
Wednesday, August 28, 2013
In late May the Department of Justice announced a large scale money-laundering indictment against Liberty Reserve. The indictment, which was unsealed on May 28, charges the seven principal employees, as well as Liberty Reserve itself, with money laundering and operating an unlicensed money transmitting business, and seeks $25 million in damages. The charges were leveled using a provision of the Patriot Act, since Liberty Reserve was not an American company. The accused could face up to 30 years in prison.
Kenneth Corbin, CIO, Wednesday, August 28, 2013
As the federal government warms to the idea of allowing employees to use their own mobile devices for work and develops new device management policies, agency CIOs and others will still have to grapple with the challenges associated with application security, experts warn.
Patience Wait, InformationWeek Government, Wednesday, August 28, 2013
The Defense Advanced Research Projects Agency is testing new software-based approaches to create cloud-like computing networks on the battlefield, using the power of smartphones and radios. The lessons DARPA learns are expected to be useful not only to U.S. troops in remote locations, but also to first responders when traditional communications infrastructure fails or is unavailable.