CSIA 360 A2.docx - University of Maryland Global Campus...

This preview shows page 1 - 4 out of 11 pages.

University of Maryland Global Campus(UMGC Summer 2021)Securing Digital Government.Noubiengang, Afombi BorisCyber Security in Government OrganizationsCSIA 6380ProfessorMc Clintock, DorothyDue on 06/08/2021
IntroductionThe information age has historically change human communication and continues to do so in2021 . From the way we send and receive messages, to the way we interact with the government,to the way crime is being investigated, our lives have been changed for the better by the Internetand the information age.The technological changes available to us today through the internethavemade the availability of information from personal,to public easier to access and morereadily available. These changes in information delivery and availability made the governmentrealize the need for some changes in the way it interacts with the public , hence the creation ofthe digital or E-government act of 2002 or public law 107-347. . Digital government ofelectronic government can be defined as the use of web-based internet applications and otherinformation technologies by the government, to enhance access and deliver government servicesand information to the public, other government agencies and the private sector.The act wasmeant “ To enhance the management and promotion of electronic government services andprocesses by establishing a Federal chief information Officer withing the office of, managementand Budget, andby establishing a broad framework of measures that require using internet-based information technology to enhance citizen access to government information and services,and for other purposes. ( govinfo December 2002).To ensure the privacy of personalinformation the E government under Section 208 requires “ privacy impact Assessments ( PIAs)from all federal agenciesthat procure or develop new information technology involving thecollection, maintenance, or dissemination of information in any identifiable form or that makessubstantial changes to existing information technology that manages information in identifiableform”. ( justice.gov February 2019).A PIA is an analysis of how information in identifiablefrom is collected, stored, protected, shared, and managed. A PIA is used to proof that system
owners and developers of government sites have incorporated privacy protections throughout thelife cycle of their systems. Some other policies and regulations of the E government act requiredof federal agenciesinclude the flowing.-The Office of management and budget electronic services shall be responsible formanagement and promotion of electronic government services by doing the following.A-Enhance access to and delivery of government information and services to the public,other agencies, and other government entities.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 11 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Information Security, Computer Security, Federal government of the United States

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture