ComputerWorld reports that Westchester County in New York is the first county in the nation to require all businesses with wireless networks that collect consumer related data to use “minimun security measures.” Continue Reading
ComputerWorld reports that Westchester County in New York is the first county in the nation to require all businesses with wireless networks that collect consumer related data to use “minimun security measures.” Continue Reading
Financial Management Systems: Lack of Disciplined Process Puts Effective Implementation of Treasury’s Governmentwide Financial Report System at Risk, Full-text GAO-06-413, Highlights, April 21, 2006. Continue Reading
ABA Journal: Understanding Search-Term Basics Ensures More Thorough E-Discovery Compliance Continue Reading
Federal Register: April 10, 2006 (Volume 71, Number 68)][Rules and Regulations][Page 18007-18008], National Archives and Records Administration (NARA), Final Rule: “The Information Security Oversight Office (ISOO), National Archives and Records Administration (NARA), is publishing this Directive pursuant to section 102(b)(1) of Executive Order 12829, as amended, relating to the National Industrial Security Program. This order… Continue Reading
FCW.com: Agencies risk unwitting release of sensitive information using popular office software: “The causes of much of the hidden data problem are users’ ignorance of how digital documents work and software companies’ tendency to give customers too much of what they want ease of use and flexibility.” Continue Reading
New York Times interview with DHS Director Michael Chertoff,by Deborah Solomon, April 2, 2006: Chertoff states, “I don’t use e-mail. One reason is when you write an e-mail, you have to be mindful of the fact that nothing ever disappears. It can be deleted, but it is still in the system somewhere…They can get me.… Continue Reading
Defense Critical Technologies, (151 pages, PDF), March 2006. This report is a product of the Defense Science Board (U.S.) and the Defence Scientific Advisory Council (UK). This report is unclassified. Continue Reading
ComputerWorld reports on enterprisewide search applications implemented by large corporations for a range of tasks, including competitive intelligence, e-discovery, and generating intranet content. Solutions such as FAST, Autonomy and Endeca index formats including text, audio and video. Continue Reading
Federal Bureau of Investigation: Weak Controls over Trilogy Project Led to Payment of Questionable Contractor Costs and Missing Assets, Full-text, GAO-06-306, and Highlights, February 28, 2006. “The Trilogy project–initiated in 2001–is the Federal Bureau of Investigation’s (FBI) largest information technology (IT) upgrade to date. While ultimately successful in providing updated IT infrastructure and systems, Trilogy… Continue Reading
FOIA Facts – Sunshine Week and Other Things, by Scott A. Hodes CongressLine by GalleryWatch.com – The Earmark – Part 2, by Paul Jenks E-Discovery Update – by Fios Inc. – Working With Obsolete Data, by Conrad J. Jacoby Continue Reading
Adobe whitepaper, Redaction of Confidential Information in a Document: “How to safely remove sensitive information from Microsoft Word documents and convert to PDF” Continue Reading
Follow-up to National Journal Article Claims Curtailed Gov’t Surveillance Program Still Active, from today’s New York Times, Taking Spying to Higher Level, Agencies Look for More Ways to Mine Data: “…by fundamentally changing the nature of surveillance, high-tech data mining raises privacy concerns that are only beginning to be debated widely. That is because to… Continue Reading