INFORMATION

Site Map - Government

Trick and Treat

- Privacy, security, and hypocrisy.

Laptop Lessons Learned?

- After a spate of well-publicized thefts of government laptops earlier this year, Clay Johnson III, deputy director for management with the Office of Management and Budget, sent a memorandum to department heads urging them to take action to safeguard information properly.

DID YOU KNOW THAT?

- Detonators, rocket motors, and bulk explosive powders were among at least 410 items that Sandia National Laboratories could not account for when audited by the U.S. Department of Energy’s Office of Inspector General. Auditors found other problems with explosives handling and processing at both Sandia and Los Alamos National Laboratories, but Lawrence Livermore National Laboratory was hailed for its “robust program” for explosives handling and processing.@  Read the audit report  at SM Online.

Will You Flood?

- ASIS headquarters is at low to moderate risk for flooding. But the risk surges just a few blocks to the east, closer to the Potomac River. Want to assess the flood risk to your current or prospective sites? Check out the government’s Flood-Smart site (through SM Online), which also offers other flood-related resources for businesses and homes.

Check Fraud

- The FBI gives tips for how governmental agencies and organizations can avoid a check fraud scam that targets expired checks.

Explosives

- DOE audit reports that two out of three defense labs are not maintaining controls over nonnuclear explosives.

Business News

- Dispatches from the corporate front, and a preview of educational sessions in San Diego this month.

A Site To See

- It’s estimated that millions of Americans each year suffer identity theft. The Federal Trade Commission (FTC) has set up a Web site to help deter, detect, and defend against identity theft. The site contains a number of educational resources, including a 10-minute educational video that provides an overview of the problem, a PowerPoint presentation, and several PDF publications.  

Quick Bytes: Data breach advice

- Not long after a data breach involving the Department of Veterans Affairs, David M. Walker, Comptroller General of the United States and head of the Government Accountability Office, gave testimony to a House committee on steps that can be taken to reduce the likelihood of personal data being stolen. The first is to conduct a privacy-impact assessment before deploying new systems; Walker noted that agencies do not always do this. He also recommended limiting the collection of personal information, and limiting the time that such information is retained. @ "Privacy: Preventing and Responding to Improper Disclosures of Personal Information is available at SM Online.

Screening Exports

- Spotting suspicious conduct by air travelers, limiting sensitive exports, and speaking with California’s homeland security direc

Data breach advice

- Not long after a data breach involving the Department of Veterans Affairs, David M. Walker, Comptroller General of the United States and head of the Government Accountability Office, gave testimony to a House committee on steps that can be taken to reduce the likelihood of personal data being stolen. The first is to conduct a privacy-impact assessment before deploying new systems; Walker noted that agencies do not always do this. He also recommended limiting the collection of personal information, and limiting the time that such information is retained. @ Privacy: Preventing and Responding to Improper Disclosures of Personal Information is available at SM Online.

Counterfeit Drugs

- The FDA has announced new steps to strengthen existing protections against the growing problem of counterfeit drugs.

Holding the Line

- The border between the United States and Mexico represents 2,000 miles of opportunity for drug smugglers, criminals, and potential terrorists who want to enter the country. For the agencies charged with protecting that border, it is an endless challenge.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.