Government Information

Earl Gregg Swem Library

Strategy for Countering Violent Extremism

Categories: Crime/Justice,Federal State Relations,Homeland Security,Privacy,Terrorism

https://www.dhs.gov/sites/default/files/publications/16_1028_S1_CVE_strategy.pdf

Calls for linking federal and local efforts in opposing violent extremism around four major goals.  From the Department of Homeland Security

 

Protecting Personal Information: A Guide for Business

Categories: Business/Economics,Consumer Info/Protection,Privacy,Telecommunications/Internet

https://www.ftc.gov/system/files/documents/plain-language/pdf-0136_proteting-personal-information.pdf

A guide for businesses on how to secure personal information of customers.  Presents 5 key principles for a sound data security plan.  From the Federal Trade Commission

Chairman Wheeler’s Proposal to Promote Fairness, Competition, and Investment in the Business Data Services Market

Categories: Antitrust/Monopoly,Laws/Regulations,Privacy,Telecommunications/Internet

http://transition.fcc.gov/Daily_Releases/Daily_Business/2016/db1007/DOC-341659A1.pdf

Proposal that would promote competition in the telecommunications industry by revising regulatory environment.  Calls for lowering price caps and changing policies on sharing of sensitive customer data by telecom companies.  Represents a revision of an earlier proposal.  From the Federal Communications Commission

 

The OPM Data Breach: How the Government Jeopardized Our National Security for More Than a Generation

Categories: Govt Personnel,Govt/Business Scandals,Headlines,Homeland Security,Privacy,Telecommunications/Internet

https://oversight.house.gov/wp-content/uploads/2016/09/The-OPM-Data-Breach-How-the-Government-Jeopardized-Our-National-Security-for-More-than-a-Generation.pdf

Committee staff report on the hacking of Office of Personnel Management data bases by foreign sources in 2015.  The report blames the agency for failing to heed repeated warnings about inadequate security and for misleading the public on the extent of the damage.  From the House Committee on Government Oversight and Reform

 

Joint Doctrine Note 2-16: Identity Activities

Categories: Defense/Military,Homeland Security,Privacy,Terrorism

http://fas.org/irp/doddir/dod/jdn2_16.pdf

Attempts to provide guidance for military authorities to plan, execute, and assess identity activities, described as establishing and characterizing the identity of persons of interest, known adversaries, and others who contribute to the rise of anonymous, dispersed, and concealed threats.  From the Defense Department, posted by the Federation of American Scientists

 

Regulation of Drones

http://www.loc.gov/law/help/regulation-of-drones/regulation-of-drones.pdf

Surveys the rules that apply to the operation of civilian drones in thirteen countries and the European Union including concerns about public safety, privacy, and national security. From the Law Library of Congress

 

Privacy Act of 1974 : Implementation [and The Next Generation Identification System]

Categories: Crime/Justice,Headlines,Homeland Security,Laws/Regulations,Privacy,Science/Technology

https://www.govinfo.gov/content/pkg/FR-2016-05-05/pdf/2016-10119.pdf

Notice of proposed rulemaking that seeks to exempt the FBI’s Next Generation Identification System from provisions of the Privacy Act.  The action would screen a national database of fingerprints and biometric identifiers from lawsuits based on Privacy Act violations.  From the Federal Register and the Government Publishing Office’s GovInfo system.

 

The U.S. Intelligence Community: Selected Cross-Cutting Issues

Categories: Govt Finance,Govt Secrecy,Privacy,Spying/Intelligence

http://www.fas.org/sgp/crs/intel/R44455.pdf

Focuses on management issues that affect the Intelligence Community’s ability to counter pervasive and emerging threats.  Describes 8 issues of importance including a policy of continuous evaluation as a substitute for polygraph tests to monitor employee behavior and reliability.  From the Congressional Research Service, posted by the Federation of American Scientists

 

Next Page »