Bush signs VA bill that guards sensitive data

President Bush signed into law a $3.2 billion bill that will improve veterans' benefits, health care, the security of their sensitive data and, when it occurs, its response to a comprehensive breach.

The Veterans Benefits, Health Care and Information Technology Act of 2006, S. 3421, directs the Veterans Affairs Department to notify veterans promptly in the case of a data breach and to provide fraud alerts, data breach analysis, reports to Congress, credit monitoring and identity theft insurance. The bill also supports an Information Security Education Assistance program, an incentive to give VA the ability to recruit personnel with the IT skills necessary to meet department requirements.

The legislation is the result of the theft in May of a VA laptop that contained the personal information of millions of veterans. It was the government's largest data security breach.

The bill's provisions follow on VA's decision to completely centralize its IT environment, including enforcement of data security.

"Nearly a decade of committee oversight, including 16 hearings, is paying off with secretary Nicholson's commendable decision to centralize the management of VA's information technology and security systems," said Rep. Steve Buyer (R-Ind.), outgoing chairman of the House Veterans Affairs Committee, who introduced the original legislation to strengthen VA security.

The VA bill also boosts funds for more clinicians treating veterans for post traumatic stress disorder as they return from the wars in Afghanistan and Iraq, construction of health care facilities and expansion of tele-health initiatives for rural veterans. It establishes an Office of Rural Health.

In another IT security-related bill that the president signed Friday, the Undertaking Spam, Spyware and Fraud Enforcement with Enforcers beyond Borders Act of 2006 or the U.S. SAFE WEB Act of 2006, S. 1608, authorizes the Federal Trade Commission to assist and share information with foreign law enforcement agencies. It provides for procedures for confidentiality and delayed notification when requesting information about suspected perpetrators of fraud and protection to organizations for delivering information.

Mary Mosquera is a staff writer for Washington Technology's affiliate publication, Government Computer News.

About the Author

Mary Mosquera is a reporter for Federal Computer Week.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Our databases track awards back to 2013. Read More

  • Navigating the trends and issues of 2016 Nick Wakeman

    In our latest WT Insider Report, we pull together our best advice, insights and reporting on the trends and issues that will shape the market in 2016 and beyond. Read More

contracts DB

Washington Technology Daily

Sign up for our newsletter.

I agree to this site's Privacy Policy.