Site Map - Government

A Lack of Trust

- The plan, or rather the process, which would lead to the development of the plan for improving intelligence sharing, was mandated in the 2004 Intelligence Reform Act, and this official was charged with carrying it out. He explained that under this plan for the plan, his division had 90 days—which will just be ending as you read this—to map out what the existing information-sharing arrangement among government agencies and private industry entities looks like.

Clearing the Way for Government Contractors

- A provision in the Intelligence Reform and Terrorism Prevention Act of 2004, however, mandates that by the end of 2006 all clearance requests must be processed in 90 days.

Legal Issues

- A court rules that a business owner should have increased security because of gangs on his property. Plus, legislation on identity theft, aviation security, and discrimination.

European Islamic Policies Examined

- “Muslims are the largest religious minority in Europe, and Islam is the fastest growing religion,” says a new report by the Congressional Research Service (CRS). The report, Muslims in Europe: Integration Policies in Selected Countries, notes that understanding how best to integrate and engage these growing populations can help mitigate the risk of Islamic extremism finding a foothold. @ Go to SM Online to read more.

Identity Theft

- A new law (formerly H.B. 6191) in Rhode Island will require that any business that owns or licenses computerized, unencrypted information on customers implement and maintain reasonable security measures to protect information.

Aviation security.

- A bill (H.R. 4439) introduced by Rep. Dan Lungren (R-CA) would overhaul the Transportation Security Administration (TSA) to increase aviation security.

Border security.

- The House Judiciary Committee has approved a bill (H.R. 4437) that is designed to strengthen border security. The House of Representatives has agreed to consider the measure.

Radioactive Materials.

- The Nuclear Regulatory Commission (NRC) has received public comments on its proposed rule to track radioactive material within the United States. The system set out in the proposed rule would require those licensed to use this radioactive material to report the manufacture, transfer, receipt, or disposal of that material. To start the program, each licensee would be required to provide the government with its inventory of radioactive material and to assign a unique serial number to each item. The NRC received 33 comments to its proposed rule. @ To read all the comments, please visit Security Management Online.

Flu Preparedness

- Check out this checklist intended to help businesses prepare for the worst if a flu pandemic hits.

Clearing the Way for Government Contractors


European Islamic Policies Examined

- While “the vast majority of Muslims in Europe are not involved in radical activities,” according to the report, many Muslims in Europe are poor, unemployed, or imprisoned, which may lead to a sense of “cultural alienation and discrimination.” If these negative feelings are not given enough attention, Islamic militancy could be the unwitting result.

Security Experts Doing the Match


Identity theft

- Several bills that address identity theft are pending in the Senate. One bill (S. 1326), introduced by Sen. Jeff Sessions (R-AL), would require any person or agency that stores or controls sensitive personal information to protect that data from unauthorized access, destruction, use, modification, or disclosure. Another identity theft bill (S. 1408) is also pending in the Senate. S. 1408, which would set national standards requiring businesses to report data security breaches to customers, has been approved by the Senate Commerce, Science, and Transportation Committee. To advance, it must be taken up by the full Senate. A third bill (S. 1789), introduced by Sen. Arlen Specter (R-PA), would enhance penalties for those who use computers to commit identity theft crimes. It would also provide law enforcement officials with more money to investigate and prosecute identity theft.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.