DHS, IG spar about social media policy

computer and network

Department of Homeland Security privacy officials told the DHS inspector general that they were working to ensure privacy and appropriate use of social media among its components and employees, but efforts to impose blanket Web. 2.0 use policies across its sprawling operations would be counterproductive.

The September IG report that included the privacy officials' assessment concluded that DHS hasn't adequately implemented rules for social media use across its component agencies.

Although the agency and its components have moved to manage the use of Web 2.0 technologies across operations ranging from investigations to public outreach, the IG said it still needs centralized oversight and management to make sure its employees use those capabilities appropriately.


Read the IG report.

DHS is using Twitter, Facebook, blog sites and YouTube to engage the public and increase its profile, as well as for investigative work. That dichotomy, said a response from DHS Acting Privacy Officer Jonathan Cantor, makes imposing blanket recommendations for Web 2.0 services.

Cantor also argued that establishing a forum for department-wide collaboration and discussions on the use of social media tools would be counterproductive because DHS's myriad component agencies do so many different things.

"DHS's seven operational components, while serving the DHS mission at large, have vast and diverse responsibilities, priorities, and missions," he said. "For this reason, it is difficult to put seven operational components under the same umbrella for the use of Web 2.0 technology and to expect that component uses will be the same across the board."

Social media, he said, is used "for three very distinct purposes -- public affairs, situational awareness, and operational use -- a generic forum for all social media practitioners fails to recognize the very different missions, needs, and operations of DHS's diverse components and missions."

In the report, the IG recommended DHS communicate formal processes that employees should use to get access to social media; set up a list of approved social media accounts used throughout the department; complete a department-wide social media policy outlining legal, privacy and information security guidelines for approved uses; make sure component agencies implement social media policies; and establish an intra-agency forum to make decisions on the use of social media tools.

Cantor maintained that DHS already has overarching social media standards that component agencies use for operational purposes while incorporating privacy protections. He said the agency "strongly disagrees" with the report's contention that component agencies don't have adequate guideline or policies to prevent unauthorized or inappropriate uses of technologies by employees.

He said the department has done extensive work to comply with a Privacy Office policy for department-wide operational use of social media created in 2012. Cantor said that policy, DHS Directive 110-01, provides standards for DHS components to use social media for operational purposes while incorporating privacy protections. Cantor also said DHS had conducted three privacy impact assessments on how the department uses social media, including one for the use of social media for situational awareness by the National Operations Center (NOC). Additionally, said Cantor, the privacy office has conducted five privacy compliance reviews that concluded the center's use of social media was appropriate.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at or follow him on Twitter at @MRockwell4.

The Fed 100

Read the profiles of all this year's winners.


  • Shutterstock image (by wk1003mike): cloud system fracture.

    Does the IRS have a cloud strategy?

    Congress and watchdog agencies have dinged the IRS for lacking an enterprise cloud strategy seven years after it became the official policy of the U.S. government.

  • Shutterstock image: illuminated connections between devices.

    Who won what in EIS

    The General Services Administration posted detailed data on how the $50 billion Enterprise Infrastructure Solutions contract might be divvied up.

  • Wikimedia Image: U.S. Cyber Command logo.

    Trump elevates CyberCom to combatant command status

    The White House announced a long-planned move to elevate Cyber Command to the status of a full combatant command.

  • Photo credit: John Roman Images /

    Verizon plans FirstNet rival

    Verizon says it will carve a dedicated network out of its extensive national 4G LTE network for first responders, in competition with FirstNet.

  • AI concept art

    Can AI tools replace feds?

    The Heritage Foundation is recommending that hundreds of thousands of federal jobs be replaced by automation as part of a larger government reorganization strategy.

  • DOD Common Access Cards

    DOD pushes toward CAC replacement

    Defense officials hope the Common Access Card's days are numbered as they continue to test new identity management solutions.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group