August 2012

Collaborative and Cross-Cutting Approaches to Cybersecurity

As I reach the end of my first two months as Cybersecurity Coordinator, I wanted to highlight a few of the Administration’s recent accomplishments working in partnership with the private sector, and also preview some of our future activities. Some of the Government’s cybersecurity activities are already high-profile, like the recent National Level Exercise or our push for comprehensive cybersecurity legislation, but there is also substantial activity occurring outside of the spotlight. Both are needed if we are going to address the serious threats we face in cyberspace and capitalize on the exceptional opportunities cyberspace presents for governments, individuals, and U.S. businesses.

Let me highlight a few recent initiatives where voluntary, cooperative actions are helping to improve the nation’s overall cybersecurity:

  • The Defense Industrial Base (DIB) Cybersecurity/Information Assurance (CS/IA) program helps companies protect critical information related to Department of Defense programs and missions. The government shares cybersecurity threat and mitigation information with DIB companies, and in turn, DIB companies can report known intrusions.
  • The National Strategy for Trusted Identities in Cyberspace (NSTIC) seeks an "Identity Ecosystem" where individuals will soon be able to choose from a variety of more secure, convenient and privacy-enhancing technologies in lieu of passwords when they log in to different websites. The initial meeting of the Identity Ecosystem Steering Group, the private sector-led body that will help develop Ecosystem standards and policies, is happening next week.
  • The Electric Sector Cybersecurity Capability Maturity Model helps firms in the electric sector evaluate and strengthen their cybersecurity capabilities; it also enables the prioritization of network protection investments. This White House-initiated effort, led by the Department of Energy and in coordination with Department of Homeland Security, provides valuable insights to inform investment planning, research and development, and public-private partnership efforts in the electric sector.
  • In End-User Cybersecurity Protection, the government is participating in four linked initiatives across the IT industry, law enforcement, the financial sector, and government to counter the threat of malicious software – known as ‘bots.’ This voluntary, public-private effort ties together the capabilities of different sectors to identify compromised computers and help their owners fix them.

Sen DeMint accuses Amazon of lobbying for online tax to cripple competitors

Sen Jim DeMint (R-SC) blasted a bill that would allow states to tax online purchases and accused Amazon of lobbying for the bill to hurt its online competitors.

Under current law, states can only collect sales taxes from retailers that have a physical presence in their state. People who order items online from another state are supposed to declare the purchase on their tax forms, but few do. Amazon reportedly has plans to dramatically expand its number of physical distribution centers to allow for same-delivery. The physical centers would make Amazon subject to taxes in many states under current law anyway. "Now that you're going to have to pay taxes in all of these states where you have a physical presence, you want to come back and tax these other companies that don't," Sen DeMint said at hearing of the Senate Commerce Committee. Paul Misener, Amazon's vice president for global public policy, said the company supports the bill to establish a single national framework for collecting sales taxes, instead of a patchwork of state laws. He argued that Amazon has long supported a national solution for taxing online purchases.

A Homework Assignment for Privacy Stakeholders

The National Telecommunications and Information Administration has posted the lists of discussion elements raised by stakeholders at the last meeting, as well as feedback from the non-binding polling that occurred. The NTIA encourages stakeholders to use the time between meetings to continue working on these issues with likeminded colleagues or in cross-cutting groups.

The NTIA hopes that all stakeholders will work together to refine the substantive elements of a potential code and to develop concrete proposals for how to structure the process. Some stakeholders have already established a public, archived mailing list to discuss the process. The NTIA did not create the mailing list. The list is not sponsored or operated by NTIA. Instead, it was created and is operated by stakeholders. The mailing list demonstrates the high level of stakeholder engagement and highlights the value of the stakeholder-driven process.

5 sites that use data science to help you predict the President

Big data and data science have already proven their worth in the worlds of online advertising and marketing, and now they’re being turned to elections. Here are five sites to follow if you want to impress your peers with data-driven insights on who’ll win in November. FiveThirtyEight; InTrade; The Signal; PoliticIt; and Twitter Political Index.

Two Decades of the Olympics, Two Big Lessons About the Media

At the end of each Games, the International Olympic Committee issues a media report, detailing how the two weeks of sporting events have been covered. Here are two lessons from the last two decades' worth of those reports, focused on the Summer Games.

  1. There's much more coverage of the Games, overall, than there used to be. Between the 1992 Games and the 2008 Games, the number of hours of total coverage produced about the Olympics anywhere on the planet tripled. And it grew most steeply in between the 2000 and 2004 Games.
  2. The sheer impact of the global web is a fairly recent development.

Multistakeholder Meetings to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency

National Telecommunications and Information Administration
December 18, 2012
1:00 to 5:00 p.m., Eastern Daylight Time
http://www.ntia.doc.gov/files/ntia/publications/fr_privacy_meetings_noti...

Part of a series of NTIA-convened multistakeholder discussions concerning mobile application transparency.

1:00 p.m. Welcome

1:10 p.m. Facilitated Discussion: Topics Raised by Application Developers Alliance, et al. Discussion Draft
• Should the term “stored images (such as files or images)” be revised and/or more precisely defined? (10 minutes)
• Should the term “persistent identifiers” be revised and/or more precisely defined? (10 minutes)
• Is the language in Section I best treated as part of a code of conduct or as a separate “principles document?” (10 minutes)
• Should Section III require that apps disclose “how consumers may request deletion of data collected by the app” if such deletion is available? Or should

Section III require that such deletion be available? (5 minutes)
• Should short form notices include disclosure that an app collects “time of data collection?” (5 minutes)
• Should short form notices include disclosure that an app collects “patterns of app usage?” (5 minutes)
• Should the term “financial information” be revised and/or more precisely defined? (10 minutes)
• Should the term “health, medical, or therapy information” be revised and/or more precisely defined? (10 minutes)
• Should the term “other developers or networks” be revised and/or more precisely defined? (5 minutes)
• Should short form notices include disclosure of third-party data sharing with affiliated businesses? (15 minutes)
• Should short form notices include disclosure that an app shares data with “data brokers?” If so, should the term “data brokers” be revised and/or more precisely defined? (15 minutes)

2:50 p.m. Break

3:10 p.m. Facilitated Discussion: Short Form Notices
http://j.mp/privacydashboard, Association for Competitive Technology
• Draft Short Notice Screens, Application Developers Alliance, et al.

4:20 p.m. Procedural Issues (role of academics, next steps, proposed agenda items for January 2013 meeting)

4:50 p.m. Farewell



Multistakeholder Meetings to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency

National Telecommunications and Information Administration
November 30, 2012
1:00 p.m. – 5:00 p.m., Eastern Daylight Time
http://www.ntia.doc.gov/files/ntia/publications/fr_privacy_meetings_noti...
See agenda: http://www.ntia.doc.gov/files/ntia/publications/agenda_11-30-12.pdf

Part of a series of NTIA-convened multistakeholder discussions concerning mobile application transparency.

Meeting Goals: Present Stakeholder Work Since November 7, 2012 Meeting, Revise Discussion Draft

1:00 p.m. Welcome

1:05 p.m. Presentation: Policy Design and Mobile Notice, Travis Pinnick, User Experience Designer, TRUSTe
• Background: Designing Effective Policies, Travis Pinnick

1:35 p.m. Presentation: Data Elements, Association for Competitive Technology

1:55 p.m. Presentation: Draft Short Notice Screens and Related Materials, Tim Sparapani, Applications Developers Alliance (document to be circulated prior to November 30, 2012)

2:15 p.m. Presentation: Consumer Federation of America 11/20/12 Discussion Draft, Consumer Federation of America

2:35 p.m. Presentation: Updated Discussion Draft, Stu Ingis and Jim Halpert (document to be circulated prior to November 30, 2012)

2:55 p.m. Break

3:25 p.m. Facilitated Discussion
• How should the Updated Discussion Draft be revised?

4:50 p.m. Next Steps and Farewell



Multistakeholder Meetings to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency

National Telecommunications and Information Administration
November 7, 2012
11:00 a.m. to 3:00 p.m., Eastern Daylight Time
http://www.ntia.doc.gov/files/ntia/publications/fr_privacy_meetings_noti...

Part of a series of NTIA-convened multistakeholder discussions concerning mobile application transparency.

Agenda

Meeting Goal: Present Breakout Groups’ Recommendations, Revise Discussion Draft, and Set Goals and Milestones

11:00 a.m. Welcome

11:05 a.m. Presentation of Recommendations: Breakout Group #1 (Data Elements and Functionality) (5 minutes)

11:10 a.m. Facilitated Discussion
• Additions or Changes to Data Elements Lists
• ACT
• TRUSTe
• Next Steps (Goals and Timeframe) Regarding Functionality Question

11:45 a.m. Presentation of Recommendations: Breakout Group #2 (Short Form Notices)
(5 minutes)

11:50 a.m. Facilitated Discussion
• How might short form notices be treated in a code of conduct?
• Where might language regarding short form notices be incorporated into the 10/16/12 Discussion Draft?
• Next Steps (Goals and Timeframe) Regarding Short Form Notices

12:30 p.m. Break

1:00 p.m. Facilitated Discussion
• How should the 10/16/12 Discussion Draft be revised?

2:50 p.m. Next Steps and Farewell



Multistakeholder Meetings to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency

National Telecommunications and Information Administration
October 10, 2012
9:30 a.m. to 4:00 p.m., Eastern Daylight Time
http://www.ntia.doc.gov/files/ntia/publications/fr_privacy_meetings_noti...

Part of a series of NTIA-convened multistakeholder discussions concerning mobile application transparency.



THIS MEETING HAS BEEN CANCELED

Multistakeholder Meetings to Develop Consumer Data Privacy Code of Conduct Concerning Mobile Application Transparency

National Telecommunications and Information Administration
September 19, 2012
9:30 a.m. to 4:00 p.m., Eastern Daylight Time
http://www.ntia.doc.gov/files/ntia/publications/fr_privacy_meetings_noti...

Part of a series of NTIA-convened multistakeholder discussions concerning mobile application transparency.

THIS MEETING HAS BEEN CANCELED