Agencies encrypt less than third of laptops

Related Links

GAO report

Federal agencies are encrypting sensitive data on only 30 percent of their laptop PCs and other devices, leaving the rest vulnerable to data loss and unauthorized release, according to a new report from the Government Accountability Office.

Although federal law does not specifically address the use of encryption to protect data, the Office of Management and Budget issued a policy in 2006 recommending its use, and in 2007 OMB required agencies to use encryption on computers and devices that carry sensitive data.

Although encryption technologies are available, federal agencies are slow in adopting them, GAO reported.

“From July through September 2007, the major agencies collectively reported that they had not yet installed encryption technology to protect sensitive information on about 70 percent of their laptop computers and handheld devices,” the GAO report states.

Also, no agencies have developed comprehensive and documented plans to guide their encryption work, including installing and configuring the encryption software, developing policies and procedures for its use, and training users, the report states.

“As a result, federal information may remain at increased risk of unauthorized disclosure, loss, and modification,” GAO said. The report calls for OMB to clarify its policies on encryption and for agencies to improve their efforts.

House Homeland Security Committee Chairman Bennie Thompson (D-Miss.), who released the 74-page report July 28, said he was disappointed by the low rate of compliance.

“Encryption is not an option, it is a mandate. Unfortunately, I’m not surprised that despite mandates by OMB, the federal government is only 30 percent of the way there,” Thompson said. “This administration regularly falls short when it comes to addressing our information security weaknesses. Making the right investments in cybersecurity today will keep us from paying dearly in the long run.”

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group