SlideShare a Scribd company logo
1 of 14
Download to read offline
WHITE PAPER




              Important Issues for Federal Agencies
               to Consider When Using Social Media
                       and Unified Communications
ON                                                An Osterman Research White Paper
                                                                        Published February 2012

                                                                                  SPONSORED BY




                 sponsored by
          SPON




                   sponsored by
                                                                                  Osterman Research, Inc.
                                                P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
                                  Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
                                                         www.ostermanresearch.com • twitter.com/mosterman
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications




Why You Should Read This White Paper
FEDERAL AGENCIES ARE AT RISK
A July 2007 United States Government Accountability Office (GAO) reporti found that
almost all of the 24 major US federal agencies had significant information security
control vulnerabilities, most notably focused on access control, continuity of operations
and configuration management. The report found that these security holes could put at
risk, among other items, federal payments and collections, critical defense and
emergency services operations, sensitive taxpayer data and Social Security records, and
agency missions of various types.

The US Federal government is the United States’ largest single employer, employing
2.15 million people in 2010, or 1.6% of the US workforceii. Information security is of
vital importance to the Federal government, partly because of the very large amount of
sensitive data that the US government has under its control. For example, the US
government maintains tax records on most individuals living in the United States, it
maintains health records for tens of millions of Americans, and it maintains a variety of
other types of protected information.

DATA BREACHES ARE NOT UNCOMMON IN THE FEDERAL GOVERNMENT
Not surprisingly, there have been a sizable number of data breaches that have occurred
within the US government, some recent examples of which are shown below:

•   In late October 2010, the General Services Administration (GSA) announced that six
    weeks earlier an employee of the GSA emailed the names and Social Security
    numbers of all 12,000+ staff members at the GSA to a personal email addressiii.

•   A report in January 2011 showed that a client computer at the Veteran’s Affairs
    Medical Center in White River Junction, VT, allowed individuals to anonymously log
    onto a network, giving them access to sensitive patient informationiv.

•   The Orthopedics department of a Veteran’s Affairs facility in Chicago, IL, used
    Yahoo! to track patient scheduling, including the names, dates and types of surgery
    performed on 878 patients. This began in July 2007 and was shut down only in late
    November 2010v.

•   A report in December 2010 showed that a subcontractor for the Social Security
    Administration Office of Temporary Disability Assistance in New York, NY, accessed
    and stored roughly 15,000 Social Security numbers, including (possibly) the
    addresses, telephone numbers and birthdates of these individualsvi.

•   In June 2010, a partial search of the National Highway Traffic Safety Administration’s
    public complaint database revealed the names, addresses, birthdates, vehicle
    identification numbers and driver’s license numbers in up to 792,000 complaint
    cases.

As a result of the growing potential for data breaches, the increasing number of
information tools and assets maintained by the Federal government, as well as a general

©2012 Osterman Research, Inc.                                                                      1
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



recognition that information security is critically important from a national security
perspective, the US government has been ratcheting up its information security posture
over the past decade. For example, the US government spent roughly $68 billion on
information technology and $6.2 billion on information security in 2008 alonevii. These
figures are expected to increase significantly over the next several years.

ABOUT THIS WHITE PAPER
This white paper sets out to do the following:

•   Discuss some of the technologies in use by the US Federal government

•   Offer an overview of some of the variety of regulations imposed upon Federal
    agencies

•   Offer advice on what Federal agencies should do to mitigate the risks created by use
    of established and new communications technologies

This white paper also discusses the sponsor of this white paper, Actiance, and its
offerings that specifically address the security and compliance issues addressed in this
document.



Communications Practices in the Federal Government
GROWING ADOPTION OF UNIFIED COMMUNICATIONS
Both voicemail integration and enterprise instant messaging hold the promise of
speeding up processes and streamlining communication between people in many
industries, particularly in the Federal government, given its size and the scope of the
services it offers. Voicemail integration with email inboxes means that end users can
get their voicemail from wherever they receive their email, thus eliminating voice
messages as a separate and siloed repository. Enterprise instant messaging, when
combined with presence, gives a clear indication of when people are available for
interaction, irrespective of their location or time zone. This is particularly important for
government agencies that are often distributed nationally or internationally with
sometimes hundreds of field offices that must share information and work jointly on
projects.

There are myriad problems associated with managing email systems; real-time
communications systems, such as instant messaging; as well as unified communications,
social networking, and the like. As shown in the following table from an Osterman
Research survey conducted in 2010, organizations face a variety of problems in this
regard.




©2012 Osterman Research, Inc.                                                                      2
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



Top Ten Security Concerns
% Responding a Serious or Very Serious Concerns

           Problem                                                                %
           Malware being introduced from employees’ Web surfing                  56%
           Phishing attacks                                                      42%
           Data loss from employees sending confidential info via email          41%
           Malware being introduced from employees’ home computers               40%
           Virus/worm/malware infections                                         38%
           Users complaining about mailbox quotas                                36%
           Breaches of sensitive customer data                                   35%
           Malware being introduced from employees’ personal Webmail             34%
           Spam – the amount that your organization receives                     34%
           Breaches of sensitive internal data                                   34%



Skype is another important service that is finding more users, including those in
government. For example, as of mid-2010, there were 560 million total Skype
accountsviii.

SOCIAL NETWORKING TOOLS ARE BECOMING IMPORTANT
Social networking tools are exploding in popularity. Consider the following:

•   Facebook had 153.9 million unique visitors in December 2010 in the United States
    alone, an increase of 38% from December 2009ix. December 2010 also saw 26.6
    million US visitors and 23.6 million visitors to Twitter, representing increases of 30%
    and 18%, respectively, compared to a year earlier.

•   Further, the penetration of social media sites continues to increase. For example,
    while the number of unique visitors to Facebook increased by 38% during the year
    ended December 2010, total minutes spent on the site increased by 79%x.

Many Federal agencies are significant users of social networking tools. A growing
number of Federal agencies have a social networking presence, including the Federal
Emergency Management Agency (FEMA), the Centers for Disease Control (CDC), the
Department of Homeland Security (DHS), the Environmental Protection Agency (EPA),
the National Aeronautics and Space Administration (NASA), the National Science
Foundation (NSF), and many others. For example, the Veteran’s Administration uses
social media to develop a consistent voice for its practice and policies and also to obtain
feedback on its performancexi; FEMA will be expanding its use of social media in order to
better respond to disastersxii.

Some Federal government social networking accounts are among the top sites followed:
the NASA Twitter account, for example, has more than 800,000 followers as of February
2010 and ranks 429th out of the millions of accounts on Twitter. The CDC uses social
media for distributing information on a variety of health issues and has more than
95,000 followers on Twitter and more than 78,000 “likes” on Facebook. FEMA uses
Twitter and Facebook to distribute information on emergency situations and
preparedness activities with more than 30,000 followers on Twitter.


©2012 Osterman Research, Inc.                                                                      3
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications




The Growing Risk of Non-Compliance
REGULATIONS GOVERNING USE OF COMMUNICATIONS TOOLS
There are a variety of Federal government regulations and recommendations that focus
on the use of communications tools and the output generated by them. Among the
more important of these regulations are the following:

•   Federal Information Security Management Act of 2002 (FISMA)
    FISMA is a far-reaching law that requires every agency within the United States
    Federal government to develop and manage an information security plan for every
    information asset it owns, as well as those that support its operations. A key part of
    FISMA is the requirement for an annual review by CIOs, inspectors general and
    others, and a submission of this audit to the Office of Management and Budget
    (OMB). OMB, in turn, prepares a report on information technology compliance for
    submission to Congress.

    Key components of FISMA include the ability for information systems used by the
    Federal government to meet minimum security standards, a system security plan
    that must be periodically reviewed and updated, and continuous monitoring of key
    information system components. Important publications that are relevant to all
    Federal agencies include Special Publication 800-53 (Recommended Security
    Controls for Federal Information Systems) and Federal Information Processing
    Standards Publication 200 (Minimum Security Requirements for Federal Information
    and Information Systems).

•   National Industrial Security Operating Manual (NISPOM)
    NISPOM was issued as part of the National Industrial Security Program (NISP) to
    codify the “requirements, restrictions, and other safeguards to prevent unauthorized
    disclosure of classified information” by the Federal government. NISPOM is focused
    on the Executive Branch of the US government and its agencies and focuses on how
    information is disclosed to its contractors. Focus areas of NISPOM include Restricted
    Data, Formerly Restricted Data, sources of intelligence and the methods used to
    obtain this information, Special Access Program (SAP) information, and Sensitive
    Compartmented (SC) Information. Management of NISP is the responsibility of the
    National Security Council. A key part of NISPOM is Chapter 8, Information System
    Security.

•   Director of Central Intelligence Directive 6/3
    This directive created the US government’s security policies and procedures for
    managing classified intelligence information in government-operated information
    systems, specifically those systems that manage SAP and SC information as noted
    above. This directive encompasses any information system that involves the
    management, transmission, storage, interchange or other processing of both voice
    and data information. As such, it applies to virtually any type of information system
    that might be operated by the Federal government that is focused on SAP or SC
    information.




©2012 Osterman Research, Inc.                                                                      4
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



•   National Archives and Records Administration (NARA)
    NARA is the official archivist of the US Federal government. As such, it has been
    given the responsibility to archive all official records of legislation, executive orders,
    Federal regulations and other content. NARA has been among the more proactive of
    the US Federal agencies in terms of how it uses social networking and social media
    technologies. For example, in 2009, the US National Archives launched a channel on
    YouTube to make archived content of public interest more accessible, and it
    launched a Flickr account to share US government-archived photographs with the
    public.

•   National Institute of Standards and Technology (NIST)
    This agency provides guidance to federal agencies for information systems and
    security policies and procedures, offers technical assistance regarding compliance
    with various standards, and it develops standards for information categorization.

•   Other regulations, committees, etc.
    Other regulations focused on Federal information security include:

    o   National Security Directive 42 – established what is now known as the
        Committee on National Security Systems, an interagency organization focused on
        providing guidance for system security to executive-branch agencies. The
        committee is represented by several Cabinet-level departments.

    o   Public Law 107-347 – established the position of Federal Chief Information
        Officer within the OMB to oversee the management of electronic systems in use
        by the Federal government.

    o   Directive-Type Memorandum (DTM) 09-026– focuses on a range of social
        media, including wikis, blogs, social networks, and other Internet-based
        capabilities. The DTM imposes restrictions on the use of social media, including
        requirements for disclaimers when personal opinions are expressed, imposition of
        records management policies on posted content, and limitations on personal use
        of these tools.

    o   Clinger-Cohen Act – enacted in 1996, this Act focuses on improving the
        efficiency of the manner in which the Federal government procures and manages
        its IT resources. While not focused on security issues per se, the Act does focus
        on information architectures that could have an impact on Federal information
        security.

    o   Information Security and Identity Management Committee – offers a
        forum to support the Federal CIO Council on matters related to identity
        management and information security issues.

PROPOSED REGULATIONS
•   Secure Federal File Sharing Act (H.R. 4098)
    This Act would require the Director of the OMB to work with the Federal Chief
    Information Officers Council to issue guidelines on the use of peer-to-peer (P2P) file-


©2012 Osterman Research, Inc.                                                                      5
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



    sharing programs. This Act contains several provisions, including a) an approval
    process for P2P file-sharing programs that are necessary for use by Federal
    agencies, b) prohibition on the use of unauthorized programs by government
    employees or its contractors, and c) management of P2P file-sharing programs by
    government employees and contractors on their home computers when used in
    telecommuting situations.

•   United States Information and Communications Enhancement Act of 2009
    (S. 921)
    This bill would amend Chapter 35 of Title 44 of the United States Code to improve
    the US Federal government’s awareness of information security policies, practices
    and procedures. Specifically, the bill would eliminate subchapters II and III from
    Chapter 35 and replace it with text that focuses on the importance of information
    security and a recognition that security focuses on any information system, including
    telecommunications systems, among many other provisions. This bill would
    establish the National Office for Cyberspace.

•   Protection of privacy and security for commercial data brokers’
    information (S. 1490)
    This proposed bill would enhance the punishment for identity theft. Specifically, this
    bill would impose a fine and/or prison sentence for up to five years on anyone who
    has an obligation to report a security breach and fails to do so.

OTHER IMPORTANT CONSIDERATIONS
•   GAO Report on Social Media
    In June 2011, the General Accounting Office (GAO) published Social Media: Federal
    Agencies Need Policies and Procedures for Managing and Protecting Information
    They Access and Disseminatexiii. This report, in response to a request from members
    of Congress, set out to accomplish two goals: a) study how federal agencies are
    using commercial social media services, and b) determine the extent of these
    agencies’ policies and procedures for managing social media use.

    The performance audit that was conducted between July 2010 and June 2011,
    results of which were published in this report, discussed the key challenges that
    federal agencies face in managing social media use, including fulfilling their records
    management obligations and the security threats they face when using social media.
    Moreover, the report provides a set of high-level recommendations for specific
    government agencies in the context of their social media use.

•   Guidelines for Secure Use of Social Media by Federal Departments and
    Agencies
    This documentxiv, released in September 2009, discusses the risks that government
    agencies face from the use of social media, Web tools, and other capabilities. It also
    offers recommendations about how to mitigate these risks, including the creation
    and enforcement of policies focused on appropriate use of communications tools,
    acquisition controls that will help agencies to determine the specific types of tools
    and capabilities that should be implemented, the training that employees should



©2012 Osterman Research, Inc.                                                                      6
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



    undergo, and the network- and host-level controls that should be implemented to
    protect against attacks.

•   Intelligence Community Directive Number 503
    This documentxv establishes “Intelligence Community policy for information
    technology systems security risk management, certification and accreditation.” This
    document focuses on a strategic and holistic process for managing risk among
    interconnected systems used primarily in the defense and intelligence communities.

•   Office of Management and Budget Circular A-123
    This memorandumxvi, published in late 2004, focuses on internal management
    controls in Federal agencies necessitated by the passing of the Sarbanes-Oxley
    (SOX) Act of 2002. In essence, it defines the federal version of SOX.



What You Must Do to Mitigate the Risks
There are several issues that any government agency must address with respect to
managing their employees’ and others’ use of instant messaging, social networking and
other tools. We have developed six basic points that every decision maker should
seriously consider as they attempt to minimize the risks that their agency faces from
unfettered use of these tools, while at the same time maximizing the value they can
derive from them.

CONTROL USE OF UNAUTHORIZED TOOLS
An Osterman Research report published in August 2010 found that only 34% of IT
decision makers consider Twitter to be a legitimate tool for use in a business context,
but 50% allow it to be used in their organizations. We found a similar pattern for a
variety of other tools, as shown in the following figure.




©2012 Osterman Research, Inc.                                                                      7
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



IT Views on Legitimacy of Various Applications




As demonstrated in the figure above, IT departments allow far more use of
communications and information tools than they consider to be legitimate, resulting in
the potential for serious risk if the content from unauthorized use of these tools is not
logged or otherwise managed properly. It is imperative that financial services firms
implement capabilities that can control use of communications and information tools so
that only authorized users can use specific tools.

Underscoring the severity of the problem is a February 2011 Osterman Research
surveyxvii of mid-sized and large organizations in multiple industries that found that
relatively few organizations have implemented policies focused on social media and
other tools. For example, the survey found that only 18% of organizations have a
detailed and thorough policy focused on employees’ use of Twitter and Facebook, while
only 15% of organizations have such a policy focused on the use of LinkedIn.

LOG ALL CONTENT, INCLUDING POSTS TO SOCIAL NETWORKING
SITES
It is absolutely vital to log all content sent through instant messaging clients, unified
communications systems, social networking tools and websites, even if the use of these
tools is unofficial and not sanctioned formally by either the IT department or an
agency’s senior management. A failure to log traffic sent to or received from any
communications or information venue can result in serious consequences with auditors
and others.

©2012 Osterman Research, Inc.                                                                      8
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



For example, an employee of a Federal agency could offer his or her opinion on a
pending case via Twitter, perhaps inadvertently, and thereby reveal sensitive
information that had not yet been made public. To help manage the use of these tools,
the content posted or received from any social networking, instant messaging, or other
tool must be logged so that an agency can a) monitor these communications for policy
enforcement purposes, and b) correct errant employee behavior, if only after the fact.
However, some tools, such as Twitter, do not offer logging capabilities.

BLOCK THREATS
The threat landscape is becoming significantly more serious on several fronts:

•   Social engineering techniques can fool even very experienced users. For example, a
    Twitter account that becomes infected by a worm can result in tweets sent to
    hundreds or thousands of individuals. If any of these recipients clicks on the link
    that could be sent by the compromised account, tens of thousands of users could
    end up being infected.

•   Because the Web and Web 2.0 applications are generally less well-defended than
    email systems and because many government users install consumer-oriented Web
    2.0 applications on their work or home computers, the Web is a more fertile field for
    hackers and other criminals.

•   Spearfishing, whaling and phishing attacks are becoming more common and more
    numerous. Some government agencies have been successfully breached via these
    attacks.

There is a broad range of threats that can be distributed through social networking,
instant messaging, unified communications, and other tools. For example, an Osterman
Research survey published in August 2010 found that in 12% of organizations, malware
had successfully infiltrated the corporate network through Web 2.0 applications during
the one-year period ended Spring 2010. Sixty-two percent of organizations had
experienced malware infiltration through the Web – often through Web 2.0 applications
like Twitter – during the same period.

The key, then, is to monitor the use of all communications venues and block threats
from being propagated throughout the network while allowing legitimate traffic to be
passed through unencumbered.

PREVENT DATA LEAKAGE
One of the most important capabilities that any agency must enable is the monitoring
and prevention of the leakage of sensitive, confidential, or other information that could
be damaging to the owner of that information. This might include any information that
is overtly sensitive, such as taxpayer information or the healthcare records of Medicare
patients. However, it can also include seemingly innocuous posts to Twitter or other
social networking sites that recipients could piece together to gather intelligence about
an investigation or corporate audit. The bottom line here is that sensitive information of
any kind sent through any communications or information channel must be protected.



©2012 Osterman Research, Inc.                                                                      9
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



ARCHIVE CONTENT
Another critical component of any information management strategy is the ability to
archive all content sent or received regardless of the tools that are used to send it. This
obviously includes emails, instant messages and other electronic content. The need to
archive is driven in no small part by Federal Freedom of Information Act (FOIA)
requirements that demand the preservation of content.

INTEGRATE WITH EXISTING ARCHIVING SYSTEMS
Closely related to the point above is that it is imperative not only to archive content for
any communications or information system, but also to integrate this archived content
with existing archiving tools in the organization. Because Federal agencies must archive
content for FOIA compliance, among other reasons, it is clearly a best practice to
integrate other content archives into the primary archive already being used. This can
save significant amounts of time when searching for content and can ensure a common
interface is used to search for and access content, regardless of its source.



Summary
Federal agencies must manage content in a manner that is consistent with the growing
number of Federal regulations focused on information security and content retention.
This includes the traditional content medium of paper, of course, but more recently,
content sent electronically through email and instant messages. However, as modes of
communications evolve and new technologies are introduced, users in Federal agencies
have been presented with a growing array of new communications alternatives,
including unified communications systems that can store voice content as easily as they
can retain emails or instant messaging conversations; social networking tools like
Twitter, Facebook or LinkedIn; or telephony alternatives like Skype that combine voice
and instant messaging capabilities.

While the regulation of these new forms of communication has not always kept pace
with their use, there are a variety of reasons for agencies to embrace use of these new
technologies in order to reduce costs and provide better customer service. At the same
time, however, there are a number of best practices that any Federal agency should
follow to ensure that it will be compliant with current and anticipated regulations and
that it will minimize the risks associated with use of these tools.



Vantage
Vantage is the de facto platform for granular security and policy controls for real-time
communications – providing management for the broadest set of applications and
modalities, including Microsoft Lync, public instant messaging platforms such as
Windows Live Messenger and Skype, Web conferencing, and industry-focused networks
like Thomson Reuters Messenger, Bloomberg, and YellowJacket.




©2012 Osterman Research, Inc.                                                                     10
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications




Unified Security Gateway
Actiance Unified Security Gateway (USG) complements Vantage by blocking the use of
other applications that bypass corporate security policies and introduce additional risk to
the organization. USG provides granular control of Web 2.0 applications, monitoring,
securing, and recording content to reduce outbound data leaks and to enable
compliance with industry regulations, legal discovery requirements, and corporate policy
standards. USG also logs social media conversations in compliance with the strictest
requirements for record-keeping and tamper-proof data auditing for customers in highly
regulated industries such as financial services, insurance, energy, education, and
healthcare.



Insight
Actiance Insight interfaces with USG and Vantage to provide enterprise data
visualization of user behavior, browsing patterns, and Web application usage trends.
Ideal for managing enterprise networks which encompass multiple locations, the
dynamic, multi-dimensional graphical interface provided by Actiance Insight provides
complete visibility into Internet and real-time application usage that has not previously
been possible with legacy reporting applications for Web security and data compliance.



Socialite
Socialite is Actiance’s security, management, and compliance solution for Social
Networks, providing granular control of Facebook, LinkedIn, and Twitter. It not only
controls access to 180 different features across social networks, but Socialite can also
moderate, manage, and archive any social media traffic routed through the solution,
which can either be on-premise or hosted.




©2012 Osterman Research, Inc.                                                                     11
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications




About Actiance, Inc.
Actiance enables the safe and productive use of unified communications, collaboration,
and Web 2.0, including blogs and social networking sites. Formerly FaceTime
Communications, Actiance’s award-winning platforms are used by 9 of the top 10 US
banks and more than 1,600 organizations globally for the security, management, and
compliance of unified communications, Web 2.0, and social media channels. Actiance
supports all leading social networks, unified communications providers, and IM
platforms, including Facebook, LinkedIn, Twitter, AOL, Google, Yahoo!, Skype, Microsoft,
IBM, and Cisco.

Actiance, Inc.
1301 Shoreway
Suite 275
Belmont, CA 94002
USA

Toll-free: +1 888 349 3223
Phone: +1 650 631 6300
Fax: +1 650 598 2820
info@actiance.com
www.actiance.com

For Web and Unified Communications security news, follow Actiance on Twitter,
http://www.twitter.com/actiance




©2012 Osterman Research, Inc.                                                                     12
Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications



© 2012 Osterman Research, Inc. All rights reserved.

No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission
of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without
prior written authorization of Osterman Research, Inc.

Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this
document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance
with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive
order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent
legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty
regarding the completeness or accuracy of the information contained in this document.

THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND.          ALL EXPRESS OR IMPLIED
REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE
DETERMINED TO BE ILLEGAL.




i
        http://www.gao.gov/new.items/d07837.pdf
ii
        http://www.bls.gov/news.release/empsit.nr0.htm
iii
        http://www.nytimes.com/2010/11/07/us/07breach.html
iv
        Source: PHIPrivacy.net
v
        Source: PHIPrivacy.net
vi
        Source: DataBreaches.net
vii
        Source: FY 2008 Report to Congress on Implementation of The Federal Information Security Management
        Act of 2002
viii
        http://online.wsj.com/article/SB10001424052748703293204576106132286203062.html
ix
        U.S. Digital Year in Review 2010, comScore
x
        U.S. Digital Year in Review 2010, comScore
xi
        http://fcw.com/articles/2011/02/14/feat-citizen-outreach-social-media.aspx
xii
        http://www.dailyfinance.com/story/taxes/can-twitter-help-fema-respond-to-disasters/19807666/
xiii
        http://www.gao.gov/new.items/d11605.pdf
xiv
        http://www.cio.gov/Documents/Guidelines_for_Secure_Use_Social_Media_v01-0.pdf
xv
        http://www.dni.gov/electronic_reading_room/ICD_503.pdf
xvi
        http://www.whitehouse.gov/omb/circulars_a123_rev/
xvii
        Messaging Policy Market Trends 2010-2013, Osterman Research, Inc.




©2012 Osterman Research, Inc.                                                                                         13

More Related Content

What's hot

More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...victor Nduna
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionalsVadim Dryganov
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1James Williams
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachIJECEIAES
 
Profit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictProfit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictaditi agarwal
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Phil Cryer
 
Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Universidade Federal do Paraná
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
Concepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New ZealandConcepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New ZealandMarcelo Gomes Freire
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaPatrick McCormick
 
FUTURISTIC TECHNOLOGIES
FUTURISTIC TECHNOLOGIESFUTURISTIC TECHNOLOGIES
FUTURISTIC TECHNOLOGIESChuck Brooks
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paperMonica Chan
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_vMei Wang
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...ijtsrd
 
Transforming government through e-democracy
Transforming government through e-democracyTransforming government through e-democracy
Transforming government through e-democracyPropylon
 

What's hot (20)

More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...More connected, more extended, more content, more risks Mobile device explosi...
More connected, more extended, more content, more risks Mobile device explosi...
 
"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals"Digital.Report+" - expert magazine for ICT policy professionals
"Digital.Report+" - expert magazine for ICT policy professionals
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1Privacy and Access to Information Law - Lecture 1
Privacy and Access to Information Law - Lecture 1
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
Profit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflictProfit or people! new facebook papers reveal a deep internal conflict
Profit or people! new facebook papers reveal a deep internal conflict
 
Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)Online privacy concerns (and what we can do about it)
Online privacy concerns (and what we can do about it)
 
Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...Congressmen in the age of social network sites: Brazilian representatives and...
Congressmen in the age of social network sites: Brazilian representatives and...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
Gibson final
Gibson  finalGibson  final
Gibson final
 
Concepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New ZealandConcepts of privacy in Japan and New Zealand
Concepts of privacy in Japan and New Zealand
 
Student Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agendaStudent Data and Its Discontents: How FUD undermined an education reform agenda
Student Data and Its Discontents: How FUD undermined an education reform agenda
 
Reading Log
Reading Log Reading Log
Reading Log
 
FUTURISTIC TECHNOLOGIES
FUTURISTIC TECHNOLOGIESFUTURISTIC TECHNOLOGIES
FUTURISTIC TECHNOLOGIES
 
China's Internet policy_ Final paper
China's Internet policy_ Final paperChina's Internet policy_ Final paper
China's Internet policy_ Final paper
 
Right Forgotten_v
Right Forgotten_vRight Forgotten_v
Right Forgotten_v
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
 
Transforming government through e-democracy
Transforming government through e-democracyTransforming government through e-democracy
Transforming government through e-democracy
 
Adler nurani
Adler nurani Adler nurani
Adler nurani
 

Viewers also liked

inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitCarahsoft
 
Federal Government Information Goes Social? Inspiration from Change.gov
Federal Government Information Goes Social?  Inspiration from Change.govFederal Government Information Goes Social?  Inspiration from Change.gov
Federal Government Information Goes Social? Inspiration from Change.govKim Schultz
 
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...Social Media Best Practices for Non-Profit & Public Sector Organizations - p...
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...Wild Apricot
 
Social Media Public Sector Overview
Social Media Public Sector OverviewSocial Media Public Sector Overview
Social Media Public Sector OverviewClearedJobs.Net
 
Public Sector Social Media Presentation
Public Sector Social Media PresentationPublic Sector Social Media Presentation
Public Sector Social Media PresentationEoin Kennedy
 
Elearning summit feb_2012
Elearning summit feb_2012Elearning summit feb_2012
Elearning summit feb_2012Mike KEPPELL
 
JavaScript Code Kata Workshop – JavaScript Conference 2012 – OPITZ CONSULTIN...
JavaScript Code Kata Workshop –  JavaScript Conference 2012 – OPITZ CONSULTIN...JavaScript Code Kata Workshop –  JavaScript Conference 2012 – OPITZ CONSULTIN...
JavaScript Code Kata Workshop – JavaScript Conference 2012 – OPITZ CONSULTIN...OPITZ CONSULTING Deutschland
 
H4 par3 de_talrijkste_diersoort
H4 par3 de_talrijkste_diersoortH4 par3 de_talrijkste_diersoort
H4 par3 de_talrijkste_diersoortjvmensch
 
很少見過的奇異花卉
很少見過的奇異花卉很少見過的奇異花卉
很少見過的奇異花卉Hsueh-Cheng Lin
 
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.Practica 1 inf 3 parcial 1 saraemma izchel morales molina.
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.HikariAmaki17
 
المجال الكهربى
المجال الكهربىالمجال الكهربى
المجال الكهربىShiam Mohammad
 
M116
M116M116
M116m116
 
Nuno tasso de figueiredo network assessment
Nuno tasso de figueiredo network assessmentNuno tasso de figueiredo network assessment
Nuno tasso de figueiredo network assessmentNuno Tasso de Figueiredo
 
Chiang mai spanish powerpoint
Chiang mai spanish powerpointChiang mai spanish powerpoint
Chiang mai spanish powerpointsamgp918
 

Viewers also liked (19)

inTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media SummitinTTENSITY Federal Social Media Summit
inTTENSITY Federal Social Media Summit
 
Federal Government Information Goes Social? Inspiration from Change.gov
Federal Government Information Goes Social?  Inspiration from Change.govFederal Government Information Goes Social?  Inspiration from Change.gov
Federal Government Information Goes Social? Inspiration from Change.gov
 
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...Social Media Best Practices for Non-Profit & Public Sector Organizations - p...
Social Media Best Practices for Non-Profit & Public Sector Organizations - p...
 
Social Media Public Sector Overview
Social Media Public Sector OverviewSocial Media Public Sector Overview
Social Media Public Sector Overview
 
Public Sector Social Media Presentation
Public Sector Social Media PresentationPublic Sector Social Media Presentation
Public Sector Social Media Presentation
 
Elearning summit feb_2012
Elearning summit feb_2012Elearning summit feb_2012
Elearning summit feb_2012
 
JavaScript Code Kata Workshop – JavaScript Conference 2012 – OPITZ CONSULTIN...
JavaScript Code Kata Workshop –  JavaScript Conference 2012 – OPITZ CONSULTIN...JavaScript Code Kata Workshop –  JavaScript Conference 2012 – OPITZ CONSULTIN...
JavaScript Code Kata Workshop – JavaScript Conference 2012 – OPITZ CONSULTIN...
 
רובוטים בחלל - 1רובוכיף
רובוטים בחלל - 1רובוכיף רובוטים בחלל - 1רובוכיף
רובוטים בחלל - 1רובוכיף
 
H4 par3 de_talrijkste_diersoort
H4 par3 de_talrijkste_diersoortH4 par3 de_talrijkste_diersoort
H4 par3 de_talrijkste_diersoort
 
Elaboramos papel reciclado
Elaboramos papel recicladoElaboramos papel reciclado
Elaboramos papel reciclado
 
很少見過的奇異花卉
很少見過的奇異花卉很少見過的奇異花卉
很少見過的奇異花卉
 
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.Practica 1 inf 3 parcial 1 saraemma izchel morales molina.
Practica 1 inf 3 parcial 1 saraemma izchel morales molina.
 
المجال الكهربى
المجال الكهربىالمجال الكهربى
المجال الكهربى
 
M116
M116M116
M116
 
Nuno tasso de figueiredo network assessment
Nuno tasso de figueiredo network assessmentNuno tasso de figueiredo network assessment
Nuno tasso de figueiredo network assessment
 
By dagmara
By dagmaraBy dagmara
By dagmara
 
Behavior Intervention Strategies
Behavior Intervention StrategiesBehavior Intervention Strategies
Behavior Intervention Strategies
 
South Sudan flyer
South Sudan flyerSouth Sudan flyer
South Sudan flyer
 
Chiang mai spanish powerpoint
Chiang mai spanish powerpointChiang mai spanish powerpoint
Chiang mai spanish powerpoint
 

Similar to Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-dataNumaan Huq
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7
 
Copy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyCopy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyMicah Altman
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms Actiance, Inc.
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentAkshay Ajgaonkar
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05Daniel Kapellmann Zafra
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateFabio Chiusi
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...jsnyder40
 
NASCIO Social Media Survey and Report
NASCIO Social Media Survey and ReportNASCIO Social Media Survey and Report
NASCIO Social Media Survey and ReportGovLoop
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Three content trends in reputation management
Three content trends in reputation managementThree content trends in reputation management
Three content trends in reputation managementMichael White
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts arearchiejones4
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALJoseph White MPA CPM
 
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...The University of Texas (UTRGV)
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
 
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...FCN White Paper: Advancing Federal Government Communications: The Case for Pr...
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...Federal Communicators Network
 

Similar to Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications (20)

wp-follow-the-data
wp-follow-the-datawp-follow-the-data
wp-follow-the-data
 
Rapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government SectorRapid7 Report: Data Breaches in the Government Sector
Rapid7 Report: Data Breaches in the Government Sector
 
Copy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and PrivacyCopy of OSTP RFI on Big Data and Privacy
Copy of OSTP RFI on Big Data and Privacy
 
The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms The impact of new communication tools for financial services firms
The impact of new communication tools for financial services firms
 
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk AssessmentUW - IMT 552-JPMorgan Chase & Co. Risk Assessment
UW - IMT 552-JPMorgan Chase & Co. Risk Assessment
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
CORPORATE ESPIONAGE "How Really Safe Are Your Secrets" presented by Argus Int...
 
NASCIO Social Media Survey and Report
NASCIO Social Media Survey and ReportNASCIO Social Media Survey and Report
NASCIO Social Media Survey and Report
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Three content trends in reputation management
Three content trends in reputation managementThree content trends in reputation management
Three content trends in reputation management
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Data Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINALData Breach Research Plan 72415 FINAL
Data Breach Research Plan 72415 FINAL
 
An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...An Executive Summary: Social Media and Information and Communications Technol...
An Executive Summary: Social Media and Information and Communications Technol...
 
Social Media and Information and Communications Technology (ICT)
Social Media and Information and Communications Technology (ICT)Social Media and Information and Communications Technology (ICT)
Social Media and Information and Communications Technology (ICT)
 
iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?iStart feature: Protect and serve how safe is your personal data?
iStart feature: Protect and serve how safe is your personal data?
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...FCN White Paper: Advancing Federal Government Communications: The Case for Pr...
FCN White Paper: Advancing Federal Government Communications: The Case for Pr...
 

More from Osterman Research, Inc.

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsOsterman Research, Inc.
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...Osterman Research, Inc.
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Osterman Research, Inc.
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveOsterman Research, Inc.
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Osterman Research, Inc.
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsOsterman Research, Inc.
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Osterman Research, Inc.
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaOsterman Research, Inc.
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?Osterman Research, Inc.
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Osterman Research, Inc.
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsOsterman Research, Inc.
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Osterman Research, Inc.
 
Making File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureMaking File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureOsterman Research, Inc.
 

More from Osterman Research, Inc. (20)

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive Migrations
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
Best Practices for File Sharing
Best Practices for File SharingBest Practices for File Sharing
Best Practices for File Sharing
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less Expensive
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
Putting IT Back in Control of BYOD
Putting IT Back in Control of BYODPutting IT Back in Control of BYOD
Putting IT Back in Control of BYOD
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
 
Key Issues in eDiscovery
Key Issues in eDiscoveryKey Issues in eDiscovery
Key Issues in eDiscovery
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social Media
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
Making File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More SecureMaking File Transfer Easier, Compliant and More Secure
Making File Transfer Easier, Compliant and More Secure
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications

  • 1. WHITE PAPER Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications ON An Osterman Research White Paper Published February 2012 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications Why You Should Read This White Paper FEDERAL AGENCIES ARE AT RISK A July 2007 United States Government Accountability Office (GAO) reporti found that almost all of the 24 major US federal agencies had significant information security control vulnerabilities, most notably focused on access control, continuity of operations and configuration management. The report found that these security holes could put at risk, among other items, federal payments and collections, critical defense and emergency services operations, sensitive taxpayer data and Social Security records, and agency missions of various types. The US Federal government is the United States’ largest single employer, employing 2.15 million people in 2010, or 1.6% of the US workforceii. Information security is of vital importance to the Federal government, partly because of the very large amount of sensitive data that the US government has under its control. For example, the US government maintains tax records on most individuals living in the United States, it maintains health records for tens of millions of Americans, and it maintains a variety of other types of protected information. DATA BREACHES ARE NOT UNCOMMON IN THE FEDERAL GOVERNMENT Not surprisingly, there have been a sizable number of data breaches that have occurred within the US government, some recent examples of which are shown below: • In late October 2010, the General Services Administration (GSA) announced that six weeks earlier an employee of the GSA emailed the names and Social Security numbers of all 12,000+ staff members at the GSA to a personal email addressiii. • A report in January 2011 showed that a client computer at the Veteran’s Affairs Medical Center in White River Junction, VT, allowed individuals to anonymously log onto a network, giving them access to sensitive patient informationiv. • The Orthopedics department of a Veteran’s Affairs facility in Chicago, IL, used Yahoo! to track patient scheduling, including the names, dates and types of surgery performed on 878 patients. This began in July 2007 and was shut down only in late November 2010v. • A report in December 2010 showed that a subcontractor for the Social Security Administration Office of Temporary Disability Assistance in New York, NY, accessed and stored roughly 15,000 Social Security numbers, including (possibly) the addresses, telephone numbers and birthdates of these individualsvi. • In June 2010, a partial search of the National Highway Traffic Safety Administration’s public complaint database revealed the names, addresses, birthdates, vehicle identification numbers and driver’s license numbers in up to 792,000 complaint cases. As a result of the growing potential for data breaches, the increasing number of information tools and assets maintained by the Federal government, as well as a general ©2012 Osterman Research, Inc. 1
  • 3. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications recognition that information security is critically important from a national security perspective, the US government has been ratcheting up its information security posture over the past decade. For example, the US government spent roughly $68 billion on information technology and $6.2 billion on information security in 2008 alonevii. These figures are expected to increase significantly over the next several years. ABOUT THIS WHITE PAPER This white paper sets out to do the following: • Discuss some of the technologies in use by the US Federal government • Offer an overview of some of the variety of regulations imposed upon Federal agencies • Offer advice on what Federal agencies should do to mitigate the risks created by use of established and new communications technologies This white paper also discusses the sponsor of this white paper, Actiance, and its offerings that specifically address the security and compliance issues addressed in this document. Communications Practices in the Federal Government GROWING ADOPTION OF UNIFIED COMMUNICATIONS Both voicemail integration and enterprise instant messaging hold the promise of speeding up processes and streamlining communication between people in many industries, particularly in the Federal government, given its size and the scope of the services it offers. Voicemail integration with email inboxes means that end users can get their voicemail from wherever they receive their email, thus eliminating voice messages as a separate and siloed repository. Enterprise instant messaging, when combined with presence, gives a clear indication of when people are available for interaction, irrespective of their location or time zone. This is particularly important for government agencies that are often distributed nationally or internationally with sometimes hundreds of field offices that must share information and work jointly on projects. There are myriad problems associated with managing email systems; real-time communications systems, such as instant messaging; as well as unified communications, social networking, and the like. As shown in the following table from an Osterman Research survey conducted in 2010, organizations face a variety of problems in this regard. ©2012 Osterman Research, Inc. 2
  • 4. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications Top Ten Security Concerns % Responding a Serious or Very Serious Concerns Problem % Malware being introduced from employees’ Web surfing 56% Phishing attacks 42% Data loss from employees sending confidential info via email 41% Malware being introduced from employees’ home computers 40% Virus/worm/malware infections 38% Users complaining about mailbox quotas 36% Breaches of sensitive customer data 35% Malware being introduced from employees’ personal Webmail 34% Spam – the amount that your organization receives 34% Breaches of sensitive internal data 34% Skype is another important service that is finding more users, including those in government. For example, as of mid-2010, there were 560 million total Skype accountsviii. SOCIAL NETWORKING TOOLS ARE BECOMING IMPORTANT Social networking tools are exploding in popularity. Consider the following: • Facebook had 153.9 million unique visitors in December 2010 in the United States alone, an increase of 38% from December 2009ix. December 2010 also saw 26.6 million US visitors and 23.6 million visitors to Twitter, representing increases of 30% and 18%, respectively, compared to a year earlier. • Further, the penetration of social media sites continues to increase. For example, while the number of unique visitors to Facebook increased by 38% during the year ended December 2010, total minutes spent on the site increased by 79%x. Many Federal agencies are significant users of social networking tools. A growing number of Federal agencies have a social networking presence, including the Federal Emergency Management Agency (FEMA), the Centers for Disease Control (CDC), the Department of Homeland Security (DHS), the Environmental Protection Agency (EPA), the National Aeronautics and Space Administration (NASA), the National Science Foundation (NSF), and many others. For example, the Veteran’s Administration uses social media to develop a consistent voice for its practice and policies and also to obtain feedback on its performancexi; FEMA will be expanding its use of social media in order to better respond to disastersxii. Some Federal government social networking accounts are among the top sites followed: the NASA Twitter account, for example, has more than 800,000 followers as of February 2010 and ranks 429th out of the millions of accounts on Twitter. The CDC uses social media for distributing information on a variety of health issues and has more than 95,000 followers on Twitter and more than 78,000 “likes” on Facebook. FEMA uses Twitter and Facebook to distribute information on emergency situations and preparedness activities with more than 30,000 followers on Twitter. ©2012 Osterman Research, Inc. 3
  • 5. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications The Growing Risk of Non-Compliance REGULATIONS GOVERNING USE OF COMMUNICATIONS TOOLS There are a variety of Federal government regulations and recommendations that focus on the use of communications tools and the output generated by them. Among the more important of these regulations are the following: • Federal Information Security Management Act of 2002 (FISMA) FISMA is a far-reaching law that requires every agency within the United States Federal government to develop and manage an information security plan for every information asset it owns, as well as those that support its operations. A key part of FISMA is the requirement for an annual review by CIOs, inspectors general and others, and a submission of this audit to the Office of Management and Budget (OMB). OMB, in turn, prepares a report on information technology compliance for submission to Congress. Key components of FISMA include the ability for information systems used by the Federal government to meet minimum security standards, a system security plan that must be periodically reviewed and updated, and continuous monitoring of key information system components. Important publications that are relevant to all Federal agencies include Special Publication 800-53 (Recommended Security Controls for Federal Information Systems) and Federal Information Processing Standards Publication 200 (Minimum Security Requirements for Federal Information and Information Systems). • National Industrial Security Operating Manual (NISPOM) NISPOM was issued as part of the National Industrial Security Program (NISP) to codify the “requirements, restrictions, and other safeguards to prevent unauthorized disclosure of classified information” by the Federal government. NISPOM is focused on the Executive Branch of the US government and its agencies and focuses on how information is disclosed to its contractors. Focus areas of NISPOM include Restricted Data, Formerly Restricted Data, sources of intelligence and the methods used to obtain this information, Special Access Program (SAP) information, and Sensitive Compartmented (SC) Information. Management of NISP is the responsibility of the National Security Council. A key part of NISPOM is Chapter 8, Information System Security. • Director of Central Intelligence Directive 6/3 This directive created the US government’s security policies and procedures for managing classified intelligence information in government-operated information systems, specifically those systems that manage SAP and SC information as noted above. This directive encompasses any information system that involves the management, transmission, storage, interchange or other processing of both voice and data information. As such, it applies to virtually any type of information system that might be operated by the Federal government that is focused on SAP or SC information. ©2012 Osterman Research, Inc. 4
  • 6. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications • National Archives and Records Administration (NARA) NARA is the official archivist of the US Federal government. As such, it has been given the responsibility to archive all official records of legislation, executive orders, Federal regulations and other content. NARA has been among the more proactive of the US Federal agencies in terms of how it uses social networking and social media technologies. For example, in 2009, the US National Archives launched a channel on YouTube to make archived content of public interest more accessible, and it launched a Flickr account to share US government-archived photographs with the public. • National Institute of Standards and Technology (NIST) This agency provides guidance to federal agencies for information systems and security policies and procedures, offers technical assistance regarding compliance with various standards, and it develops standards for information categorization. • Other regulations, committees, etc. Other regulations focused on Federal information security include: o National Security Directive 42 – established what is now known as the Committee on National Security Systems, an interagency organization focused on providing guidance for system security to executive-branch agencies. The committee is represented by several Cabinet-level departments. o Public Law 107-347 – established the position of Federal Chief Information Officer within the OMB to oversee the management of electronic systems in use by the Federal government. o Directive-Type Memorandum (DTM) 09-026– focuses on a range of social media, including wikis, blogs, social networks, and other Internet-based capabilities. The DTM imposes restrictions on the use of social media, including requirements for disclaimers when personal opinions are expressed, imposition of records management policies on posted content, and limitations on personal use of these tools. o Clinger-Cohen Act – enacted in 1996, this Act focuses on improving the efficiency of the manner in which the Federal government procures and manages its IT resources. While not focused on security issues per se, the Act does focus on information architectures that could have an impact on Federal information security. o Information Security and Identity Management Committee – offers a forum to support the Federal CIO Council on matters related to identity management and information security issues. PROPOSED REGULATIONS • Secure Federal File Sharing Act (H.R. 4098) This Act would require the Director of the OMB to work with the Federal Chief Information Officers Council to issue guidelines on the use of peer-to-peer (P2P) file- ©2012 Osterman Research, Inc. 5
  • 7. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications sharing programs. This Act contains several provisions, including a) an approval process for P2P file-sharing programs that are necessary for use by Federal agencies, b) prohibition on the use of unauthorized programs by government employees or its contractors, and c) management of P2P file-sharing programs by government employees and contractors on their home computers when used in telecommuting situations. • United States Information and Communications Enhancement Act of 2009 (S. 921) This bill would amend Chapter 35 of Title 44 of the United States Code to improve the US Federal government’s awareness of information security policies, practices and procedures. Specifically, the bill would eliminate subchapters II and III from Chapter 35 and replace it with text that focuses on the importance of information security and a recognition that security focuses on any information system, including telecommunications systems, among many other provisions. This bill would establish the National Office for Cyberspace. • Protection of privacy and security for commercial data brokers’ information (S. 1490) This proposed bill would enhance the punishment for identity theft. Specifically, this bill would impose a fine and/or prison sentence for up to five years on anyone who has an obligation to report a security breach and fails to do so. OTHER IMPORTANT CONSIDERATIONS • GAO Report on Social Media In June 2011, the General Accounting Office (GAO) published Social Media: Federal Agencies Need Policies and Procedures for Managing and Protecting Information They Access and Disseminatexiii. This report, in response to a request from members of Congress, set out to accomplish two goals: a) study how federal agencies are using commercial social media services, and b) determine the extent of these agencies’ policies and procedures for managing social media use. The performance audit that was conducted between July 2010 and June 2011, results of which were published in this report, discussed the key challenges that federal agencies face in managing social media use, including fulfilling their records management obligations and the security threats they face when using social media. Moreover, the report provides a set of high-level recommendations for specific government agencies in the context of their social media use. • Guidelines for Secure Use of Social Media by Federal Departments and Agencies This documentxiv, released in September 2009, discusses the risks that government agencies face from the use of social media, Web tools, and other capabilities. It also offers recommendations about how to mitigate these risks, including the creation and enforcement of policies focused on appropriate use of communications tools, acquisition controls that will help agencies to determine the specific types of tools and capabilities that should be implemented, the training that employees should ©2012 Osterman Research, Inc. 6
  • 8. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications undergo, and the network- and host-level controls that should be implemented to protect against attacks. • Intelligence Community Directive Number 503 This documentxv establishes “Intelligence Community policy for information technology systems security risk management, certification and accreditation.” This document focuses on a strategic and holistic process for managing risk among interconnected systems used primarily in the defense and intelligence communities. • Office of Management and Budget Circular A-123 This memorandumxvi, published in late 2004, focuses on internal management controls in Federal agencies necessitated by the passing of the Sarbanes-Oxley (SOX) Act of 2002. In essence, it defines the federal version of SOX. What You Must Do to Mitigate the Risks There are several issues that any government agency must address with respect to managing their employees’ and others’ use of instant messaging, social networking and other tools. We have developed six basic points that every decision maker should seriously consider as they attempt to minimize the risks that their agency faces from unfettered use of these tools, while at the same time maximizing the value they can derive from them. CONTROL USE OF UNAUTHORIZED TOOLS An Osterman Research report published in August 2010 found that only 34% of IT decision makers consider Twitter to be a legitimate tool for use in a business context, but 50% allow it to be used in their organizations. We found a similar pattern for a variety of other tools, as shown in the following figure. ©2012 Osterman Research, Inc. 7
  • 9. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications IT Views on Legitimacy of Various Applications As demonstrated in the figure above, IT departments allow far more use of communications and information tools than they consider to be legitimate, resulting in the potential for serious risk if the content from unauthorized use of these tools is not logged or otherwise managed properly. It is imperative that financial services firms implement capabilities that can control use of communications and information tools so that only authorized users can use specific tools. Underscoring the severity of the problem is a February 2011 Osterman Research surveyxvii of mid-sized and large organizations in multiple industries that found that relatively few organizations have implemented policies focused on social media and other tools. For example, the survey found that only 18% of organizations have a detailed and thorough policy focused on employees’ use of Twitter and Facebook, while only 15% of organizations have such a policy focused on the use of LinkedIn. LOG ALL CONTENT, INCLUDING POSTS TO SOCIAL NETWORKING SITES It is absolutely vital to log all content sent through instant messaging clients, unified communications systems, social networking tools and websites, even if the use of these tools is unofficial and not sanctioned formally by either the IT department or an agency’s senior management. A failure to log traffic sent to or received from any communications or information venue can result in serious consequences with auditors and others. ©2012 Osterman Research, Inc. 8
  • 10. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications For example, an employee of a Federal agency could offer his or her opinion on a pending case via Twitter, perhaps inadvertently, and thereby reveal sensitive information that had not yet been made public. To help manage the use of these tools, the content posted or received from any social networking, instant messaging, or other tool must be logged so that an agency can a) monitor these communications for policy enforcement purposes, and b) correct errant employee behavior, if only after the fact. However, some tools, such as Twitter, do not offer logging capabilities. BLOCK THREATS The threat landscape is becoming significantly more serious on several fronts: • Social engineering techniques can fool even very experienced users. For example, a Twitter account that becomes infected by a worm can result in tweets sent to hundreds or thousands of individuals. If any of these recipients clicks on the link that could be sent by the compromised account, tens of thousands of users could end up being infected. • Because the Web and Web 2.0 applications are generally less well-defended than email systems and because many government users install consumer-oriented Web 2.0 applications on their work or home computers, the Web is a more fertile field for hackers and other criminals. • Spearfishing, whaling and phishing attacks are becoming more common and more numerous. Some government agencies have been successfully breached via these attacks. There is a broad range of threats that can be distributed through social networking, instant messaging, unified communications, and other tools. For example, an Osterman Research survey published in August 2010 found that in 12% of organizations, malware had successfully infiltrated the corporate network through Web 2.0 applications during the one-year period ended Spring 2010. Sixty-two percent of organizations had experienced malware infiltration through the Web – often through Web 2.0 applications like Twitter – during the same period. The key, then, is to monitor the use of all communications venues and block threats from being propagated throughout the network while allowing legitimate traffic to be passed through unencumbered. PREVENT DATA LEAKAGE One of the most important capabilities that any agency must enable is the monitoring and prevention of the leakage of sensitive, confidential, or other information that could be damaging to the owner of that information. This might include any information that is overtly sensitive, such as taxpayer information or the healthcare records of Medicare patients. However, it can also include seemingly innocuous posts to Twitter or other social networking sites that recipients could piece together to gather intelligence about an investigation or corporate audit. The bottom line here is that sensitive information of any kind sent through any communications or information channel must be protected. ©2012 Osterman Research, Inc. 9
  • 11. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications ARCHIVE CONTENT Another critical component of any information management strategy is the ability to archive all content sent or received regardless of the tools that are used to send it. This obviously includes emails, instant messages and other electronic content. The need to archive is driven in no small part by Federal Freedom of Information Act (FOIA) requirements that demand the preservation of content. INTEGRATE WITH EXISTING ARCHIVING SYSTEMS Closely related to the point above is that it is imperative not only to archive content for any communications or information system, but also to integrate this archived content with existing archiving tools in the organization. Because Federal agencies must archive content for FOIA compliance, among other reasons, it is clearly a best practice to integrate other content archives into the primary archive already being used. This can save significant amounts of time when searching for content and can ensure a common interface is used to search for and access content, regardless of its source. Summary Federal agencies must manage content in a manner that is consistent with the growing number of Federal regulations focused on information security and content retention. This includes the traditional content medium of paper, of course, but more recently, content sent electronically through email and instant messages. However, as modes of communications evolve and new technologies are introduced, users in Federal agencies have been presented with a growing array of new communications alternatives, including unified communications systems that can store voice content as easily as they can retain emails or instant messaging conversations; social networking tools like Twitter, Facebook or LinkedIn; or telephony alternatives like Skype that combine voice and instant messaging capabilities. While the regulation of these new forms of communication has not always kept pace with their use, there are a variety of reasons for agencies to embrace use of these new technologies in order to reduce costs and provide better customer service. At the same time, however, there are a number of best practices that any Federal agency should follow to ensure that it will be compliant with current and anticipated regulations and that it will minimize the risks associated with use of these tools. Vantage Vantage is the de facto platform for granular security and policy controls for real-time communications – providing management for the broadest set of applications and modalities, including Microsoft Lync, public instant messaging platforms such as Windows Live Messenger and Skype, Web conferencing, and industry-focused networks like Thomson Reuters Messenger, Bloomberg, and YellowJacket. ©2012 Osterman Research, Inc. 10
  • 12. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications Unified Security Gateway Actiance Unified Security Gateway (USG) complements Vantage by blocking the use of other applications that bypass corporate security policies and introduce additional risk to the organization. USG provides granular control of Web 2.0 applications, monitoring, securing, and recording content to reduce outbound data leaks and to enable compliance with industry regulations, legal discovery requirements, and corporate policy standards. USG also logs social media conversations in compliance with the strictest requirements for record-keeping and tamper-proof data auditing for customers in highly regulated industries such as financial services, insurance, energy, education, and healthcare. Insight Actiance Insight interfaces with USG and Vantage to provide enterprise data visualization of user behavior, browsing patterns, and Web application usage trends. Ideal for managing enterprise networks which encompass multiple locations, the dynamic, multi-dimensional graphical interface provided by Actiance Insight provides complete visibility into Internet and real-time application usage that has not previously been possible with legacy reporting applications for Web security and data compliance. Socialite Socialite is Actiance’s security, management, and compliance solution for Social Networks, providing granular control of Facebook, LinkedIn, and Twitter. It not only controls access to 180 different features across social networks, but Socialite can also moderate, manage, and archive any social media traffic routed through the solution, which can either be on-premise or hosted. ©2012 Osterman Research, Inc. 11
  • 13. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications About Actiance, Inc. Actiance enables the safe and productive use of unified communications, collaboration, and Web 2.0, including blogs and social networking sites. Formerly FaceTime Communications, Actiance’s award-winning platforms are used by 9 of the top 10 US banks and more than 1,600 organizations globally for the security, management, and compliance of unified communications, Web 2.0, and social media channels. Actiance supports all leading social networks, unified communications providers, and IM platforms, including Facebook, LinkedIn, Twitter, AOL, Google, Yahoo!, Skype, Microsoft, IBM, and Cisco. Actiance, Inc. 1301 Shoreway Suite 275 Belmont, CA 94002 USA Toll-free: +1 888 349 3223 Phone: +1 650 631 6300 Fax: +1 650 598 2820 info@actiance.com www.actiance.com For Web and Unified Communications security news, follow Actiance on Twitter, http://www.twitter.com/actiance ©2012 Osterman Research, Inc. 12
  • 14. Important Issues for Federal Agencies to Consider When Using Social Media and Unified Communications © 2012 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i http://www.gao.gov/new.items/d07837.pdf ii http://www.bls.gov/news.release/empsit.nr0.htm iii http://www.nytimes.com/2010/11/07/us/07breach.html iv Source: PHIPrivacy.net v Source: PHIPrivacy.net vi Source: DataBreaches.net vii Source: FY 2008 Report to Congress on Implementation of The Federal Information Security Management Act of 2002 viii http://online.wsj.com/article/SB10001424052748703293204576106132286203062.html ix U.S. Digital Year in Review 2010, comScore x U.S. Digital Year in Review 2010, comScore xi http://fcw.com/articles/2011/02/14/feat-citizen-outreach-social-media.aspx xii http://www.dailyfinance.com/story/taxes/can-twitter-help-fema-respond-to-disasters/19807666/ xiii http://www.gao.gov/new.items/d11605.pdf xiv http://www.cio.gov/Documents/Guidelines_for_Secure_Use_Social_Media_v01-0.pdf xv http://www.dni.gov/electronic_reading_room/ICD_503.pdf xvi http://www.whitehouse.gov/omb/circulars_a123_rev/ xvii Messaging Policy Market Trends 2010-2013, Osterman Research, Inc. ©2012 Osterman Research, Inc. 13