Analysis: Government Data Security Guidelines Could Lack Teeth - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Analysis: Government Data Security Guidelines Could Lack Teeth

Federal agencies have until Aug. 7 to comply with new security "recommendations" following the VA laptop theft, although there's no indication of repercussions for noncompliance.

After a stolen laptop containing personal data on 26.5 million veterans was returned to an FBI office last week, the bureau declared that the laptop's database appeared intact and unaccessed. It's a lucky break for the Veterans Affairs Department., but it doesn't erase the fact that federal agencies have been front and center in several embarrassing data breaches in recent months.

The federal government is taking smart steps to improve data security in agencies with new recommendations--though with no mention of requirements and an Aug. 7 deadline that will be tough to meet.

In a June 23 memo to department heads, Clay Johnson, deputy director for management at the White House Office of Management and Budget, recommended that agencies encrypt data on laptop or handheld computers unless it's classified as nonsensitive; implement two-factor authentication--a password plus a physical device such as a key card--for remote data access; require users accessing systems remotely or wirelessly to reauthenticate after 30 minutes of inactivity; and track data extraction from federal databases.

InformationWeek Download

Most departments already have such measures in place, Johnson said in his memo, and the OMB will work on getting laggards in compliance "to ensure we are properly safeguarding the information the American taxpayer has entrusted to us." He set a deadline of 45 days, yet the memo doesn't mention what would happen if the recommendations aren't followed.

Attached to the memo is a checklist for protecting personal data accessed remotely or taken off-site, provided by the National Institute of Standards and Technology, an agency within the U.S. Commerce Department's Technology Administration that establishes government technology standards.

This high-level push, as well as several congressional hearings on data security, comes after a spate of laptop losses, thefts, and other break-ins. In addition to the laptop stolen from a VA employee's home, a laptop containing personal data was lost by an Internal Revenue Service employee, two more were reported stolen by the Federal Trade Commission, an Agriculture Department network break-in resulted in the theft of Social Security numbers and other personal data, and the Navy discovered Social Security numbers and personal data for 28,000 sailors and family members on a civilian Web site. All those incidents took place within the last two months.

Missed Opportunity?
Businesses also have struggled with data breaches in the past two years, including the February 2005 theft of 145,000 records from data provider ChoicePoint. Companies have to comply with state laws that dictate when customers must be notified that their personal identification data has been lost or stolen. The federal government now has the chance to go beyond after-the-fact requirements and take a hard line internally with its agencies. The OMB's recommendations "are in accordance with the strongest ones coming through to the private sector," says Pete Lindstrom, research director with Spire Security.

The government could lose that opportunity unless it holds firm to those requirements and the deadline to meet them. The nine-page checklist from the National Institute of Standards and Technology could prove difficult for some agencies to meet by Aug. 7, since it could take 45 days just for an agency to identify sensitive data and where it resides. Encryption, in particular, is difficult for agencies to quickly implement.

Enforcement isn't the only obstacle. While the government's recommendations for data protection make sense, it needs to choose the same approach as businesses--take a broad view of security and not reactively hone in on the specific area of data loss pertaining to stolen laptops and computing equipment. If their IT systems and data are to be truly protected from both carelessness and outright attacks, businesses and the government have to identify the next big security threat, or at least cover their bases in anticipation of what's to come.

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
10 Ways to Transition Traditional IT Talent to Cloud Talent
Lisa Morgan, Freelance Writer,  11/23/2020
What Comes Next for the COVID-19 Computing Consortium
Joao-Pierre S. Ruth, Senior Writer,  11/24/2020
Top 10 Data and Analytics Trends for 2021
Jessica Davis, Senior Editor, Enterprise Apps,  11/13/2020
Register for InformationWeek Newsletters
Current Issue
Why Chatbots Are So Popular Right Now
In this IT Trend Report, you will learn more about why chatbots are gaining traction within businesses, particularly while a pandemic is impacting the world.
White Papers
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Sponsored Video
Flash Poll