<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SIIA Digital Discourse&#187; Policy &#8211; Cybersecurity</title>
	<atom:link href="http://www.siia.net/blog/index.php/category/public-policy/cybersecurity-public-policy/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.siia.net/blog</link>
	<description>SIIA Blog</description>
	<lastBuildDate>Wed, 02 Oct 2013 20:37:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.4.2</generator>
		<item>
		<title>SIIA Supports the Cybersecurity Act of 2013 (S. 1353)</title>
		<link>http://www.siia.net/blog/index.php/2013/07/siia-supports-the-cybersecurity-act-of-2013-s-1353/</link>
		<comments>http://www.siia.net/blog/index.php/2013/07/siia-supports-the-cybersecurity-act-of-2013-s-1353/#comments</comments>
		<pubDate>Tue, 30 Jul 2013 17:24:44 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=13658</guid>
		<description><![CDATA[Today I wrote on behalf of SIIA to express support for the Cybersecurity Act of 2013 (S. 1353). SIIA is dedicated to maintaining and expanding the partnership between the private sector and the government to address our collective cyber security challenges, and we believe S. 1353 will help accomplish this objective. Today’s cyber threats are [...]]]></description>
			<content:encoded><![CDATA[<p>Today I wrote on behalf of SIIA to express support for the Cybersecurity Act of 2013 (S. 1353). SIIA is dedicated to maintaining and expanding the partnership between the private sector and the government to address our collective cyber security challenges, and we believe S. 1353 will help accomplish this objective.</p>
<p>Today’s cyber threats are more sophisticated and targeted than ever and are growing at an unprecedented rate. Cybercrime perpetrators have evolved from simple, low-budget hackers into cutting-edge state-sponsored threats, or well-financed criminal operations that contribute to a multi-million dollar cybercrime industry.</p>
<p>A critical cybersecurity priority for SIIA is to preserve IT innovation and technology neutrality. Additionally, SIIA has worked closely with the National Institute of Standards and Technology’s (NIST) across a wide range of initiatives to facilitate and support the development of voluntary, industry-led standards, and we believe NIST has a critical function to play in leading this effort in the development of cybersecurity standards and best practices for critical infrastructure. And SIIA is strongly supportive of efforts to enhance cybersecurity research and development, and to improve the cyber workforce and enhance education and public awareness of cybersecurity.</p>
<p>SIIA supports S. 1353 because it would accomplish these critical objectives for protecting the Nation from cyber threats.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA. Follow the SIIA Software team on twitter at <a href="http://www.twitter.com/siiasoftware">@SIIASoftware</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/07/siia-supports-the-cybersecurity-act-of-2013-s-1353/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Now is Not the Time to Weaken the Nation’s Cybercrime Laws</title>
		<link>http://www.siia.net/blog/index.php/2013/06/now-is-not-the-time-to-weaken-the-nations-cybercrime-laws/</link>
		<comments>http://www.siia.net/blog/index.php/2013/06/now-is-not-the-time-to-weaken-the-nations-cybercrime-laws/#comments</comments>
		<pubDate>Thu, 20 Jun 2013 18:13:58 +0000</pubDate>
		<dc:creator>David LeDuc</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[Policy - Intellectual Property]]></category>
		<category><![CDATA[CFAA]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[intellectual property]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=12667</guid>
		<description><![CDATA[Today, legislation is being introduced in the House and Senate that would weaken the Computer Fraud and Abuse Act (CFAA), a long standing law that is critical to software and digital content companies to protect their networks and the intellectual property in their products and services.  The intent of the proposal is to reign in [...]]]></description>
			<content:encoded><![CDATA[<p>Today, legislation is being <a href="http://www.wired.com/opinion/2013/06/aarons-law-is-finally-here/">introduced in the House and Senate</a> that would weaken the Computer Fraud and Abuse Act (CFAA), a long standing law that is critical to software and digital content companies to protect their networks and the intellectual property in their products and services.  The intent of the proposal is to reign in the possibly overzealous use of this statute by U.S. prosecutors in some recent cases, including the case that led to the tragic suicide of Aaron Swartz.  While the bill is well intended and seeks to address real concerns, the proper fix is to clarify the prosecutorial guidelines, not a wholesale rewriting and weakening of the underlying statute.</p>
<p>U.S. companies and law enforcement agencies use the CFAA as the primary Federal anti-hacking law to protect billions of dollars of research and development that is under constant threat from hackers, organized criminal syndicates, and theft from competitors and foreign governments.  Other statutes are difficult to enforce and simply do not provide the same level of legal protection.</p>
<p>The weakening of the statute is especially problematic at this point because of the uptick in attacks on computer systems of U.S. corporations with the aim of stealing valuable intellectual property.  In fact, Booz Allen Hamilton recently provided a <a href="http://www.boozallen.com/media/file/Cyber-Espionage-Brochure.pdf">report revealing that “corporate IP is under constant assault</a>.” Achieving substantial international consensus and coordination to fight this has become a matter of significant U.S. diplomacy.  Why at this crucial point would Congress want to cut back on the legal weapons we use to combat this plague?</p>
<p>Of course, there are <a href="http://wilmerhale.com/pages/publicationsandnewsdetail.aspx?NewsPubId=91348">different court interpretations of the statute</a>. The ninth district reads it one way; the fourth district reads it another way.  Sooner or later, the different judicial outcomes will have to be sorted out by the Supreme Court, but none of the court decisions gut the statute in the way that the bill introduced today would.</p>
<p>The better way forward for Congress is to wait for this Supreme Court clarification and then see if further legislative revisions are necessary.  In the meantime, the Justice Department can address any concerns about prosecutorial overreach through improved guidelines.  But wholesale weakening of the Act takes U.S. cybercrime policy in the opposite direction, as it gives the green light to criminal at a time when we should be united in the stand against international computer crimes.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/atrticles_images/david.jpg" alt="" width="100" align="left" /> <em>David LeDuc is Senior Director, Public Policy at SIIA. He focuses on e-commerce, privacy, cyber security, cloud computing, open standards, e-government and information policy. Follow the SIIA public policy team on Twitter at <a href="http://www.twitter.com/siiapubpolicy">@SIIAPubPolicy</a>. </em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/06/now-is-not-the-time-to-weaken-the-nations-cybercrime-laws/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Responds to RFI on Acquisition Provisions in Cybersecurity Executive Order</title>
		<link>http://www.siia.net/blog/index.php/2013/05/siia-responds-to-rfi-on-acquisition-provisions-in-cybersecurity-executive-order/</link>
		<comments>http://www.siia.net/blog/index.php/2013/05/siia-responds-to-rfi-on-acquisition-provisions-in-cybersecurity-executive-order/#comments</comments>
		<pubDate>Tue, 21 May 2013 19:32:46 +0000</pubDate>
		<dc:creator>Mike Hettinger</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[PSIG]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[executive order]]></category>
		<category><![CDATA[RFI]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=12093</guid>
		<description><![CDATA[Earlier this week SIIA submitted comments in response to the proposed implementation of Section 8(e) of Executive Order 13636 &#8211; Improving Critical Infrastructure Protection, issued on February 12, 2013.  We greatly appreciate the opportunity to provide formal comments to GSA and DOD on this critical section of the Executive Order. SIIA shares the overall goals [...]]]></description>
			<content:encoded><![CDATA[<p>Earlier this week SIIA submitted <a href="https://www.siia.net/index.php?option=com_docman&amp;task=doc_download&amp;gid=4292&amp;Itemid=318">comments</a> in response to the proposed implementation of Section 8(e) of Executive Order 13636 &#8211; Improving Critical Infrastructure Protection, issued on February 12, 2013.  We greatly appreciate the opportunity to provide formal comments to GSA and DOD on this critical section of the Executive Order.</p>
<p>SIIA shares the overall goals of the Administration in developing a cybersecurity framework that improves our ability to protect government information and critical infrastructure from cyber-attacks.  In fact, many SIIA members provide products and services that protect businesses, consumers and public sector entities from cyber-attacks, viruses and a wide-range of online security threats.  As a result of this experience, these members have a critical voice in the debate on the implementation of Section 8(e) of the Executive Order.  While we recognize the importance of the overall goals of the Executive Order we have some significant concerns regarding the potential effects of its implementation as proposed in the RFI.</p>
<p>Most notably, we have an overarching concern that the RFI itself does not accurately reflect the carefully crafted definition of “critical infrastructure” reflected in the Executive Order.  Instead the RFI appears to sweep all IT companies or their customers into the same regulatory basket as the most critical systems.  This distinction is crucial as not all systems and assets should be required to comply with this level of regulation.</p>
<p>In addition, SIIA expressed concerns in our comments about how the development of a broad cybersecurity framework, an ongoing process at NIST, may impact sector-specific guidance such as what is proposed here for government contractor / acquisition sector.  As a result, we have requested that the implementation of Section 8(e) be delayed until NIST cybersecurity framework has been fully developed.</p>
<p>Furthermore, we support the “common criteria” as a globally recognized, effective solution to a rapidly changing IT marketplace, we caution the Administration to avoid  establishing any new, overly prescriptive supply chain or software assurance scheme that would establish the Government as a leader in the process of developing technology or the would create a US centric standard, as this would conflict with the proven security regime that has long been the foundation of our national security strategy.</p>
<p>We also point out concerns about how that which is proposed in this Executive Order may impact the consistent, accepted, risk-based government cybersecurity requirements contained in FISMA.  Beyond its impact on FISMA, the Executive Order may also overlap with and be redundant to the FedRAMP program, potentially subjecting any Internet-enabled computing services utilized by the government to new baseline security assessments, on top of the existing FISMA and FedRAMP requirements. Not only would this practice be costly, slow, and inefficient, but it could lead to new technology-specific overlays for services that are already being utilized and assessed by the federal government in a technologically-neutral way.</p>
<p>Lastly, we highlight our concerns regarding the potential effect of the rules proposed as a result of the Executive Order on the other major cyber-related requirements, both current and proposed, including those found in the FAR, the DFARS, FISMA and the last two National Defense Authorization Acts.</p>
<hr />
<p><img style="padding: 5px;" src="http://www.siia.net/images/stories/atrticles_images/michaelhettinger_web.jpg" alt="" width="100" align="left" /> <em>Michael Hettinger is VP for the <a href="http://www.siia.net/index.php?option=com_content&amp;view=article&amp;id=967:siia-public-sector-innovation-group-where-innovation-meets-government&amp;catid=344:public-sector-innovation-group&amp;Itemid=1013">Public Sector Innovation Group</a> (PSIG) at SIIA. Follow his PSIG tweets at <a href="http://www.twitter.com/siiapsig">@SIIAPSIG</a>. Sign up for the Public Sector Innovation Roundup <a href="https://www.siia.net/index.php?option=com_content&amp;view=article&amp;id=1105:public-sector-innovation-roundup&amp;catid=344:public-sector-innovation-group&amp;Itemid=1148"> email newsletter</a> for weekly updates.<br />
</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/05/siia-responds-to-rfi-on-acquisition-provisions-in-cybersecurity-executive-order/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Hails House Passage of Cybersecurity Legislation, Urges Senate to Act</title>
		<link>http://www.siia.net/blog/index.php/2013/04/siia-hails-house-passage-of-cybersecurity-legislation-urges-senate-to-act/</link>
		<comments>http://www.siia.net/blog/index.php/2013/04/siia-hails-house-passage-of-cybersecurity-legislation-urges-senate-to-act/#comments</comments>
		<pubDate>Thu, 18 Apr 2013 15:52:43 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Anti-Piracy]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=11262</guid>
		<description><![CDATA[SIIA commends today’s House passage of the Cybersecurity Intelligence Sharing and Protection Act (CISPA, H.R. 624) and three other critical cybersecurity bills passed earlier in the week. Following the House passage of this legislation, I issued the following statement: Early detection and notification of cybersecurity threats is the most critical component of preventing and mitigating [...]]]></description>
			<content:encoded><![CDATA[<p>SIIA commends today’s House passage of the Cybersecurity Intelligence Sharing and Protection Act (CISPA, H.R. 624) and three other critical cybersecurity bills passed earlier in the week. Following the House passage of this legislation, I issued the following statement:</p>
<blockquote><p>Early detection and notification of cybersecurity threats is the most critical component of preventing and mitigating attacks as well as increasing security across the board. SIIA supports CISPA because it would provide the critical necessary framework for early detection and notification of cybersecurity threats.  Today, the House clearly recognized this vital need, and as cybersecurity threats and damage continue to grow, it is essential that the Senate move quickly to approve these bills.</p>
<p>CISPA creates the necessary flexibility for businesses to share security information without fear of legal or regulatory liability. Specifically, CISPA would protect companies and organizations that share threat and vulnerability information with the government from legal liability and the risk of lawsuits, while also providing a critical exemption from antitrust laws that currently discourage information exchanges between private companies.</p></blockquote>
<p>Additionally, SIIA applauds House passage of three other key cybersecurity measures to reform federal information security management and enhance cybersecurity R&amp;D. These measures include:</p>
<ul>
<li>Federal Information Security Amendments Act (H.R. 1163)</li>
<li>Cybersecurity Enhancement Act (H.R. 756)</li>
<li>Advancing America&#8217;s Networking and Information Technology Research and Development Act (H.R. 967)</li>
</ul>
<p>With cyber threats more sophisticated and targeted than ever, now is the time to act on critical cybersecurity legislative priorities. We urge the Senate to move with all deliberate speed to consider these key measures and advance the Nation’s cybersecurity readiness.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA. Follow the SIIA Software team on twitter at <a href="http://www.twitter.com/siiasoftware">@SIIASoftware</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/04/siia-hails-house-passage-of-cybersecurity-legislation-urges-senate-to-act/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Calls for Support for Cybersecurity Legislation</title>
		<link>http://www.siia.net/blog/index.php/2013/04/siia-calls-for-support-for-cybersecurity-legislation/</link>
		<comments>http://www.siia.net/blog/index.php/2013/04/siia-calls-for-support-for-cybersecurity-legislation/#comments</comments>
		<pubDate>Mon, 08 Apr 2013 15:45:56 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Anti-Piracy]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[Policy - Intellectual Property]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=11063</guid>
		<description><![CDATA[SIIA called on congressional leaders today to enact legislation that would help the government detect cybersecurity threats.  In a letter sent today, SIIA thanked Reps. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) for their bipartisan leadership with regard to the Cyber Intelligence Sharing and Protection Act (CISPA), and urged members of the House Select Intelligence [...]]]></description>
			<content:encoded><![CDATA[<p>SIIA called on congressional leaders today to enact legislation that would help the government detect cybersecurity threats.  In <a href="http://siia.net/index.php?option=com_docman&amp;task=doc_download&amp;gid=4079&amp;Itemid=318">a letter</a> sent today, SIIA thanked Reps. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) for their bipartisan leadership with regard to the Cyber Intelligence Sharing and Protection Act (CISPA), and urged members of the House Select Intelligence Committee to support this legislation.  In the letter, I commented:</p>
<blockquote><p>Early detection and notification of cybersecurity threats is the most critical component of preventing and mitigating attacks &#8211; increasing security across the board. SIIA supports CISPA because it would provide the critical necessary framework for early detection and notification of cybersecurity threats.  Specifically, CISPA would provide needed legal certainty that threat and vulnerability information voluntarily shared with the government would be provided safe harbor against the risk of lawsuits, and it would also provide a critical exemption from antitrust laws that currently discourage information exchanges between private companies.</p></blockquote>
<p>&nbsp;</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA. Follow the SIIA Software team on twitter at <a href="http://www.twitter.com/siiasoftware">@SIIASoftware</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/04/siia-calls-for-support-for-cybersecurity-legislation/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Joins other Trade Groups in Supporting Cyber Legislation Introduced Today</title>
		<link>http://www.siia.net/blog/index.php/2013/02/siia-joins-other-trade-groups-in-supporting-cyber-legislation-introduced-today/</link>
		<comments>http://www.siia.net/blog/index.php/2013/02/siia-joins-other-trade-groups-in-supporting-cyber-legislation-introduced-today/#comments</comments>
		<pubDate>Wed, 13 Feb 2013 19:40:41 +0000</pubDate>
		<dc:creator>Mark MacCarthy</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[CISPA]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=10211</guid>
		<description><![CDATA[Today, SIIA joined with other leading trade associations in support of the Cyber Intelligence Sharing and Protection Act (CISPA), bipartisan cybersecurity legislation introduced today by Reps. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) to enhance sharing of cyber threat information between the public and private sectors.  Early detection and notification of cybersecurity threats is the [...]]]></description>
			<content:encoded><![CDATA[<p>Today, SIIA joined with other leading trade associations in <a href="https://www.siia.net/index.php?option=com_docman&#038;task=doc_download&#038;gid=3960&#038;Itemid=318">support</a> of the Cyber Intelligence Sharing and Protection Act (CISPA), bipartisan cybersecurity legislation introduced today by Reps. Mike Rogers (R-MI) and Dutch Ruppersberger (D-MD) to enhance sharing of cyber threat information between the public and private sectors.  Early detection and notification of cybersecurity threats is the most critical component of preventing and mitigating cyber-attacks. CISPA would establish a framework that enables the public and private sectors to work together in sharing information on known threats and vulnerabilities, and enactment of this legislation would increase security across the board.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/atrticles_images/10301_6_34507_photo.jpg" alt="" width="100" align="left" /> <em>Mark MacCarthy, Vice President, Public Policy at SIIA, directs SIIA’s public policy initiatives in the areas of intellectual property enforcement, information privacy, cybersecurity, cloud computing and the promotion of educational technology. Follow the SIIA Public Policy team on Twitter at <a href="http://www.twitter.com/siiapolicy">@SIIAPolicy</a></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/02/siia-joins-other-trade-groups-in-supporting-cyber-legislation-introduced-today/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Applauds Cybersecurity Commitment Announced in Tonight&#8217;s State of the Union Address</title>
		<link>http://www.siia.net/blog/index.php/2013/02/siia-applauds-cybersecurity-commitment-announced-in-tonights-state-of-the-union-address/</link>
		<comments>http://www.siia.net/blog/index.php/2013/02/siia-applauds-cybersecurity-commitment-announced-in-tonights-state-of-the-union-address/#comments</comments>
		<pubDate>Wed, 13 Feb 2013 03:45:12 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Government]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[executive order]]></category>
		<category><![CDATA[Obama]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=10203</guid>
		<description><![CDATA[SIIA congratulates President Obama and his Administration for making cybersecurity a priority. We appreciate the President’s efforts to seek broad input in crafting the Executive Order signed today. We are particularly pleased that the Executive Order excludes commercial information technology products and consumer information technology services from the definition of ‘critical infrastructure at greatest risk.’ [...]]]></description>
			<content:encoded><![CDATA[<p>SIIA congratulates President Obama and his Administration for making cybersecurity a priority. We appreciate the President’s efforts to seek broad input in crafting the Executive Order signed today. We are particularly pleased that the Executive Order excludes commercial information technology products and consumer information technology services from the definition of ‘critical infrastructure at greatest risk.’ The Administration is clearly seeking to advance American innovation with this effort, however, the way in which the Order is implemented will be critical in determining its success or failure.</p>
<p>As we work with the Administration on implementation, a priority for our industry will be to avoid rigid regulations that impede the innovation that is essential for effective cybersecurity.</p>
<p>A regulatory approach seeking to cover a broad, rapidly-evolving cross-section of industry would have the unintended consequence of slowing technological innovation and limiting our collective cybersecurity preparedness. Therefore, it is essential that the Administration work with industry to implement the Executive Order in a way that retains necessary flexibility. Technological innovation must be allowed keep up with rapid developments pertaining to both cybersecurity threats and protections.</p>
<p>To that end, we look forward to continuing to work closely with the Administration and congressional leaders to implement this policy.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA. Follow the SIIA Policy team on Twitter at <a href="http://www.twitter.com/siiapolicy">@SIIAPolicy</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/02/siia-applauds-cybersecurity-commitment-announced-in-tonights-state-of-the-union-address/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Says Proposed EU Cybersecurity Strategy is too Prescriptive and Overly Broad</title>
		<link>http://www.siia.net/blog/index.php/2013/02/siia-says-proposed-eu-cybersecurity-strategy-is-too-prescriptive-and-overly-broad/</link>
		<comments>http://www.siia.net/blog/index.php/2013/02/siia-says-proposed-eu-cybersecurity-strategy-is-too-prescriptive-and-overly-broad/#comments</comments>
		<pubDate>Thu, 07 Feb 2013 16:32:42 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=10167</guid>
		<description><![CDATA[In reaction to today’s European Union cybersecurity announcement, SIIA is concerned that the new strategy is too broad in the scope of industries to be covered and will threaten innovation. In response, I issued the following statement: SIIA commends the European Commission for conducting a thoughtful, comprehensive review of network and information security across the [...]]]></description>
			<content:encoded><![CDATA[<p>In reaction to today’s European Union cybersecurity announcement, SIIA is concerned that the new strategy is too broad in the scope of industries to be covered and will threaten innovation. In response, I issued the following statement:</p>
<blockquote><p>SIIA commends the European Commission for conducting a thoughtful, comprehensive review of network and information security across the European Union. There is a critical need to focus on the best cybersecurity practices that will help protect governments, businesses and citizens around the world from increasingly sophisticated cyber-attacks.</p>
<p>However, we are concerned about the scope of the Commission’s regulatory approach.  It is overly broad, too prescriptive and threatens to suppress the very innovation that will help businesses, governments and citizens anticipate and address changing cybersecurity threats.</p>
<p>The proposal’s cybersecurity performance requirements will likely lead to technical mandates and rigid regulatory standards and reporting obligations.  Its scope goes well beyond critical infrastructure, where the harms from cyber-attacks are the greatest.  In doing so, it threatens to engulf a broad range of other industries, thereby wasting scarce security resources on areas where the dangers are not urgent.</p>
<p>Today’s cyber threats are global and ever-changing – rigid, far-reaching regulations will almost certainly do more harm than good.  SIIA supports policies that provide the necessary flexibility to keep up with rapid technological developments pertaining to both threats and protections.  SIIA and its member companies look forward to working with the Commission as it considers this proposal and possible amendments.</p></blockquote>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA. Follow the SIIA Policy team on Twitter at <a href="http://www.twitter.com/siiapolicy">@SIIAPolicy</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/02/siia-says-proposed-eu-cybersecurity-strategy-is-too-prescriptive-and-overly-broad/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>SIIA Announces Commitment to Data-Driven Innovation as a Top Policy Priority in 2013</title>
		<link>http://www.siia.net/blog/index.php/2013/01/siia-announces-commitment-to-data-driven-innovation-as-a-top-policy-priority-in-2013/</link>
		<comments>http://www.siia.net/blog/index.php/2013/01/siia-announces-commitment-to-data-driven-innovation-as-a-top-policy-priority-in-2013/#comments</comments>
		<pubDate>Thu, 17 Jan 2013 14:34:35 +0000</pubDate>
		<dc:creator>Ken Wasch</dc:creator>
				<category><![CDATA[Content]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cloud Computing]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[Policy - Intellectual Property]]></category>
		<category><![CDATA[Policy - Privacy]]></category>
		<category><![CDATA[PSIG]]></category>
		<category><![CDATA[Public Sector Innovation Summit]]></category>
		<category><![CDATA[SIIA News]]></category>
		<category><![CDATA[Software]]></category>
		<category><![CDATA[Software Events]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=9693</guid>
		<description><![CDATA[The SIIA Government Affairs Council met Wednesday to outline the organization’s policy priorities for 2013.  In addition to identifying the specific initiatives it will pursue in the year ahead, SIIA and its member companies expressed a commitment to making data-driven innovation a top policy priority in the year ahead.  The SIIA Government Affairs Council includes: [...]]]></description>
			<content:encoded><![CDATA[<p>The SIIA Government Affairs Council met Wednesday to outline the organization’s policy priorities for 2013.  In addition to identifying the specific initiatives it will pursue in the year ahead, SIIA and its member companies expressed a commitment to making data-driven innovation a top policy priority in the year ahead.  The SIIA Government Affairs Council includes: Reed Elsevier, IBM, Adobe, Cengage, Dow Jones, Intuit,  Kaplan, Kiplinger, Google, McGraw Hill Education, McGraw Hill Financial, Oracle, Pearson, Red Hat, SAS, and Thomson Reuters.</p>
<p>A key theme unifying the work of SIIA on behalf of its members is an increased focus on advancing the effective collection and positive use of data. It is essential that public policy recognizes that innovation and business strategies are increasingly driven by data. Importantly, data-driven innovation not only holds the promise of advancing economic opportunity and jobs, but of providing tremendous consumer and societal benefits.</p>
<p>With so much at stake, SIIA is committed to actively promoting the economic and social value of data-driven innovation. Our efforts will involve direct outreach to legislators, along with a White Paper that includes recommendations for policymakers and governments. Our goal is to make certain that public policy helps enable the tremendous societal and economic benefits of data-driven innovation.</p>
<p>With members in both technology and information services, SIIA is uniquely positioned to highlight and address the public policy issues that arise from the increased salience of data-driven innovation. We began to focus more strongly on this issue in 2012, and it will be an even more important part of our work in 2013.</p>
<p>SIIA also announced its general tech policy priorities for 2013, along with policy priorities in the areas of: intellectual property; public sector IT, and; education technology.<span id="more-9693"></span></p>
<p><strong>Technology Policy Priorities</strong></p>
<ul>
<li>Promote and enable the economic and social value of data-driven innovation, including through a White Paper with recommendations for policymakers and governments.</li>
<li>Actively support voluntary, enforceable codes of conduct to provide enhanced data privacy protections, and oppose legislative and regulatory proposals that lack the flexibility to accommodate rapid technological innovation.</li>
<li>Promote policies around the world that facilitate cross-border data flows, and develop interoperable legal frameworks that help to advance global implementation of cloud computing.</li>
<li>Promote critical cybersecurity policies, in the U.S. and around the world, that will help the public and private sectors work together to more effectively mitigate this threat, without stifling innovation.</li>
</ul>
<p><strong>Intellectual Property Priorities</strong></p>
<ul>
<li>Protect the economic interests and creative rights of software and content publishers by responding as appropriate to the Supreme Court opinion in Kirtsaeng v. John Wiley &amp; Sons Inc. and any other cases, policies or legislation relating to the copyright law’s first sale exception/exhaustion principle that may unduly limit their ability to license and control the distribution of their software and content products</li>
<li>Encourage economic growth and innovation by working for further reform of the patent system to address the ongoing problem of patent trolls, including measures to restrict asymmetric discovery burdens.</li>
<li>Monitor the ICANN’s domain name expansion process with the goal of enhancing and strengthening online transparency and accountability by working to ensure that domain name and IP address Whois databases remain publicly accessible, accurate, and reliable, as key tools to combat online infringement of copyrights and trademarks, and other fraudulent or criminal acts online.</li>
<li>Actively monitor for, and act upon as necessary, hearings, legislative or regulatory copyright reform proposals in the United States and abroad, such as issues relating to orphan works, library exceptions and piracy, to ensure that they advance and do not adversely affect the copyright interests of SIIA members.</li>
<li>Oppose changes to the CFAA that would unduly limit the ability of SIIA members to deter and prevent unauthorized access – and access that exceeds authorized access to databases, subscription services and cloud services.</li>
<li>Ensure that any international treaty relating to copyright exceptions for the blind and visually impaired that may be adopted by WIPO includes adequate safeguards to protect the copyright interests of SIIA’s publishers.</li>
</ul>
<p><strong>Public Sector IT Priorities</strong></p>
<ul>
<li>Encourage Administration IT initiatives for federal agencies to be more open, transparent and efficient, delivering better services to citizens, while reducing the overall cost of government. Information Technology has and will continue to play a role in the Federal government’s effort to deliver better services to citizens, while reducing the overall cost of government.</li>
<li>Support a continuation of the effort to move agencies to cloud, consolidate the existing data center infrastructure and better leverage government data.</li>
<li>Advocate for key administration initiatives that support the overall mission of the SIIA Public Sector Innovation Group including: Cloud First, Big Data, Data Center Consolidation, Digital Government/Mobile, and FedRAMP.</li>
<li>Support reasonable reform of the Federal acquisition process, which needs to change to keep pace with the rapid pace of technology.</li>
<li>Intervene to support member interest in the legislative consideration of the proposal by Chairman Daryl Issa to reform federal IT acquisition, which will serve as a basis for a broader discussion around the need to improve IT acquisition to keep pace with technology in 2013.</li>
</ul>
<p><strong>Ed Tech Priorities</strong></p>
<ul>
<li>Seek increased investment in education technology and its integration into teaching and learning, including to personalize learning for each student.</li>
<li>Reform outdated regulations in favor of 21st Century e-learning policies, especially the shift from seat-time to anytime, everywhere competency-based learning.</li>
<li>Support education technology research and development through government-industry partnership, not government competition with the private sector.</li>
<li>Support the value of the for-profit sector in providing education products and services to public schools, agencies and institutions.</li>
<li>Encourage targeted STEM education, training and other workforce development policies to meet the economy’s needs for a skilled high-tech workforce.</li>
<li>Actively translate public policies, programs and regulations into actionable market intelligence for SIIA members.</li>
</ul>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/staff/wasch_tn.jpg" alt="Ken Wasch" width="100" align="left" /><em>Ken Wasch is President of SIIA.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2013/01/siia-announces-commitment-to-data-driven-innovation-as-a-top-policy-priority-in-2013/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Maintain Cybersecurity Spending</title>
		<link>http://www.siia.net/blog/index.php/2012/10/maintain-cybersecurity-spending/</link>
		<comments>http://www.siia.net/blog/index.php/2012/10/maintain-cybersecurity-spending/#comments</comments>
		<pubDate>Tue, 02 Oct 2012 20:08:08 +0000</pubDate>
		<dc:creator>Mark MacCarthy</dc:creator>
				<category><![CDATA[Policy]]></category>
		<category><![CDATA[Policy - Cybersecurity]]></category>
		<category><![CDATA[cybersecurity]]></category>

		<guid isPermaLink="false">http://www.siia.net/blog/?p=8836</guid>
		<description><![CDATA[A recent article in Politico warned that cybersecurity could be a casualty of a sequester ax.  The problem is that without a change in course, the federal budget is headed for a uniform across the board reduction and that would include the multiple programs that carry out our nation’s responsibilities for protecting federal networks, staving [...]]]></description>
			<content:encoded><![CDATA[<p>A recent <a href="http://www.politico.com/news/stories/0912/81827.html">article</a> in Politico warned that cybersecurity could be a casualty of a sequester ax.  The problem is that without a change in course, the federal budget is headed for a uniform across the board reduction and that would include the multiple programs that carry out our nation’s responsibilities for protecting federal networks, staving off foreign cyber attacks and researching new technologies. As Politico put it: “Many of those initiatives would be hit hard by deep cuts beginning in 2013 unless Congress pushes back the target date for its legally mandated cuts, exempts some categories of spending or does away entirely with its fallback, deficit-reduction plans.”</p>
<p>And then the <a href="http://www.reuters.com/article/2012/10/01/net-us-usa-whitehouse-cybersecurity-idUSBRE89016O20121001">news hit</a> that the White House itself had been the target of a cyber attack. Fortunately, this time, no classified systems were compromised and no data was extracted.  This time.</p>
<p>It is not often that events illustrate so vividly the risks to the nation in continuing an unacceptable compromise policy.  No one really wants a sequester, and no one really wants the consequences that would flow from one. Policymakers need to do what it takes to avoid it.</p>
<p>But failing that, the Administration should find a way to prioritize cyber security spending.  Congress did not agree on all aspects of the stalled cybersecurity legislation, but they did agree that more Federal funding for cyber security programs and research was an urgent national priority. Sequester planning should maintain that priority.</p>
<hr />
<p><img style="padding: 5px;" src="http://siia.net/images/stories/atrticles_images/10301_6_34507_photo.jpg" alt="" width="100" align="left" /> <em>Mark MacCarthy, Vice President, Public Policy at SIIA, directs SIIA’s public policy initiatives in the areas of intellectual property enforcement, information privacy, cybersecurity, cloud computing and the promotion of educational technology. Follow the SIIA Public Policy team on Twitter at <a href="http://www.twitter.com/siiapolicy">@SIIAPolicy</a></em></p>
]]></content:encoded>
			<wfw:commentRss>http://www.siia.net/blog/index.php/2012/10/maintain-cybersecurity-spending/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>