In a preliminary assessment (.pdf) submitted as prepared testimony to a May 21 House Homeland Security subcommittee hearing , the GAO says DHS has taken steps to improve data sharing among various systems. But because the changes are so recent, GAO says it can't yet assess their effectiveness, and auditors note that DHS has about 1 million arrival records in ADIS without a corresponding departure records.
The Defense Department is moving forward with plans to acquire a commercial EHR solution. "There are good reasons for VA to have selected its legacy system," wrote Defense Secretary Chuck Hagel in a May 21 memo. "However, many of these reasons do not apply to DoD."
Thursday, May 23 marks the one-year anniversary of the Obama administration's unveiling of the Digital Government Strategy , and with that milestone comes an array of deliverables that are due under the strategy. FierceGovernmentIT has compiled an at-a-glance scorecard to assess what's complete, what's missing and to what degree things changed since the plan rolled out last May.
A federal judge in Arizona says the FBI can use evidence collected by a device that masquerades as a cellular base tower, triggering an automatic register response from nearby devices and routing communications from those devices through it.
During a May 15 press briefing, Federal Chief Information Officer Steven VanRoekel acknowledged there could be downstream infrastructure costs associated with successful data liberation. These costs will be dealt with on an individual basis, said VanRoekel.
Beyond asking agencies to guard against the release of data with personally-identifiable information, the Open Data Policy published by the White House May 9 directs agencies to account for the "mosaic effect" of data aggregation. The mosaic effect occurs when information alone is not identifiable but when coupled with other available information poses a privacy or security risk.
Along with its Open Data Policy , the White House unveiled May 9 Project Open Data , a GitHub-hosted tool kit it hopes will be the living, breathing implementation arm of its policy. The online repository provides tools for coders to adopt the policy within agencies' 6-month timeline.
The Federal Emergency Management Agency initially believed it possessed 430 unauthorized information technology systems after declaring a 2 week amnesty in March 2012 for their owners to come forward and report them. Before the amnesty, FEMA has 74 systems with an authorization to operate, 46 of which had undergone a privacy threshold analysis.
Under the new policy, agencies must build and modernize information systems in a way that "maximizes interoperability and information accessibility, maintains internal and external data asset inventories, enhances information safeguards, and clarifies information management responsibilities," says the memo.
Justice Department documents obtained through the Freedom of Information Act suggest that some U.S. attorneys may continue to authorize law enforcement access of opened emails less than 180 days old without first obtaining a warrant, says the American Civil Liberties Union.