TITLE

Epeat eco-benchmark covers more hardware

AUTHOR(S)
Cozier, Muriel
PUB. DATE
July 2006
SOURCE
ICIS Chemical Business;7/31/2006, Vol. 1 Issue 30, p36
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article focuses on Electronic Product Environmental Assessment Tool (Epeat), an easy-to-use tool that will help purchasers rank computer equipment, based on its environmental attributes, developed by the U.S. Environmental Protection Agency (EPA). The EPA said that Epeat was already referenced in some U.S.$32 billion worth of computer contracts, including those issued by the U.S. Department of Defence and Department of Homeland Security as well as hospitals and healthcare sites.
ACCESSION #
21958048

 

Related Articles

  • Government flunks IT security. Carlson, Caron // eWeek;3/20/2006, Vol. 23 Issue 12, p20 

    This article explains that the U.S. House Committee on Government Reform issued a report card on the information technology security of administrative agencies. A rating of F went to the agencies involved in counterterrorism efforts, the Department of Homeland Security and the Department of...

  • Pentagon, DHS Working Cybersecurity Pilot Program. Munoz, Carlo // Defense Daily;3/18/2011, Vol. 249 Issue 52, p2 

    The article offers information on the Cybersecurity Pilot Program being run by the U.S. Department of Defense (DoD) and the Department of Homeland Security (DHS). It is stated that DoD and DHS are working on a new joint effort to protect several defense industry networks from cyber crimes. Under...

  • Life and Death in the Cybersphere. Fulghum, David A. // Aviation Week & Space Technology;11/1/2010, Vol. 172 Issue 40, p64 

    The article focuses on the U.S. Defense Department's (DD) plans for organizing cyberspace operations and security. Deputy assistant defense secretary Robert Butler said that the DD strategy has five sections: Cyberspace as a separate operational domain with its own command, operational concepts...

  • What can we learn from the US government's embarrassing security failures?  // SC Magazine: For IT Security Professionals (UK Edition);Aug2007, p11 

    The article explores the lessons that Great Britain can derive from the computer security failures of the U.S. government. Some of the computer security failures of U.S. government agencies, include the breach of the Department of Defense's e-mail systems by a hacker in June 2007 and the...

  • Cyber Espionage and Insurance Coverage. Alessandro, Alba // Security: Solutions for Enterprise Security Leaders;Feb2014, Vol. 51 Issue 2, p42 

    The article focuses on the cyber-espionage and cyber crimes in U.S. It says that the U.S. Department of Defense has classified security networks were compromised by foreign cyber-espionage in 2008. It states that 150 computers in the U.S. Department of Homeland Security 's $1.75 billion computer...

  • Pentagon Expanding Program to Share Cyber-Security Intelligence With Private Sector.  // CIO Insight;5/14/2012, p1 

    The article reports on the expansion program of the U.S. Department of Defense (DoD) which can increase sharing of cyber-security intelligence with the private sector. The DoD is collaborating with the Department of Homeland Security (DHS) to improve network defenses. Deputy secretary of...

  • Recent Incidents Intensify Worries of Chinese Espionage in the United States. Weitz, Richard // World Politics Review (19446284);11/ 9/2007, p1 

    The article reports on recent incidents of computer hacking in the U.S. which intensify concerns on Chinese espionage in the country in 2007. It has been revealed that computer hackers based in China were able to penetrate U.S. computer networks, including those operated by the Departments of...

  • DHS, DoD Agree To Align Civil, Military Cyber Protection. Biesecker, Calvin // Defense Daily;10/14/2010, Vol. 248 Issue 9, p8 

    The article provides information on the announcement of joint operational coordination by the U.S. Department of Defense and the U.S. Department of Homeland Security for the nation's cyber security. It states the joint operation to encourage personnel sharing in the security missions, and define...

  • Taking The Lead. Sternstein, Aliya // Government Executive;Mar2012, Vol. 44 Issue 3, p45 

    The article discusses the change brought by technology in the working processes of the federal agencies focusing on the defense and security processes. It is stated that the Homeland Security Department (DHS) is taking over a Pentagon project which shared classified intelligence with military...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics