Telephone companies will retain the records, but will have to ensure a "usable format" for the National Security Agency.
Leaders need to understand their responsibilities for achieving sound information security and managing IT-related security risks.
Although the measure stands little chance of becoming law, it provides a rhetorical launching pad for Democrats who accuse the GOP of demonizing federal workers.
The next step in making the most of cloud services is establishing effective acquisition strategies for federal agencies.
Delays could hurt the Joint Strike Fighter's capabilities even as the planes enter the Air Force, Navy and Marine Corps fleets.
Network functions virtualization promises to save time and money by running components such as firewalls and intrusion detection as virtual machines.
The Automated Commercial Environment is set to be fully in place by the end of 2016 and will replace CBP’s legacy import/export data systems.
The IRS has its own IT office dedicated to compliance, but wants help dealing with a flurry of new releases due by 2016.
Trying to determine when spy agencies are required to dispose of data is something of a mystery, even to them.
An audit ripped the U.S. Attorneys’ office for failing to secure laptops and tablets holding sensitive information.
8609 Westwood Center Drive, Suite 500Vienna, VA 22182-2215 703-876-5100
© 1996-2013 1105 Media, Inc. All Rights Reserved. This copy is for your personal, non-commercial use only.To order presentation-ready copies for distribution to colleagues, clients or customers, visit: www.1105Reprints.com