Privacy

What we can learn from IBM's social media policy

IBM could teach government agencies and other contractors about managing Facebook and Twitter.

Denied! Event with White House leader closed to press

The Obama administration's cybersecurity leader delivered a speech to a trade group, and reporters were not welcome. We don't get it.

Denied! Event with White House leader closed to press

The Obama administration's cybersecurity leader delivered a speech to a trade group, and reporters were not welcome. We don't get it.

Equifax targets federal market with new strategy

Equifax, known primarily as a credit reporting company, has launched a new strategy that targets agencies and systems integrators that will need its fiscal and identity management services.

DARPA lays out bedrock R&D privacy principles

Some folks at DARPA have come up with a set of privacy principles that offer some hope that privacy could become a part of fundamental technology R&D, writes blogger Brian Robinson.

Should being a fed be a round-the-clock job?

Federal employees might take off their badges when they get home, but they never stop being federal employees, even on Facebook, one reader writes.

When it comes to government data gathering, public trust is hard to come by

The public doesn't trust government to protect Americans' information, and laws reflect that mind-set, blogger Matthew Weigelt writes.

Managing strong passwords: You got a better idea?

The best tip for creating -- and remembering without writing down -- strong passwords wins a prize.

Personal data of reservists, veterans at risk in recent thefts

In separate incidents, thieves stole laptop computers containing personal information on reservists and veterans.

US, Russia kick off talks on IT

Officials from the United States and Russia meet this week on a range of information technology-related topics.

E-verify should be part of broader immigration reform efforts, panel says

A panel of experts recommends improving the E-Verify electronic employment verification system to reduce false reports and to use it in immigration reform efforts.

Who is sending mysterious laptops to governors?

The FBI is investigating unsolicited laptop computers sent to several governors’ offices.

DOD rethinks social-media access

None

Ban on peer-to-peer software for contractors, government in the works

A House committee chairman who has jurisdiction over some government operations plans to introduce a bill designed to ban the use of peer-to-peer software on government and contractor networks.

Real lD vs. PASS ID turns on technology debate

Backers of a new driver's license security program say the current Real ID program's costly IT requirements are unnecessary and won't work for states.

Readers blast DHS effort to harvest personal information

Washington Technology received a number of trenchant comments about staff writer Alice Lipowicz's July 1 Web story “DHS requires more personal information from employees, contractors.”

DHS requires more personal information from employees, contractors

DHS says it is expanding the types of personal information it will collect on employees and contractors who require long-term access.