First Take

September 2006
Bank Technology News;Sep2006 Supplement, Vol. 19, p9
Trade Publication
The article reports developments related to computer industry in the U.S. Banking regulators have proposed rules about identity theft. The Office of Management and Budget has issued a memorandum to federal chief information officers demanding that any security incident that involves personally identifiable information must be reported to the U.S. Computer Emergency Readiness Team.


Related Articles

  • OMB Provides New Guidance for Agencies Buying Tools to Counter Identity Theft. Clark, Charles S. // Government Executive;7/5/2016, p1 

    The article focuses on a guidance issued by the U.S. Office of Management and Budget (OMB) to counter identity and data theft in government departments.

  • Tackling Identity Theft. Emigh, Jacqueline // Government Security;Aug/Sep2007, Vol. 6 Issue 4, p6 

    The article discusses an initiative from the U.S. Office of Management and Budget (OMB), under the direction of the White House, which creates agency-specific notification policies for breaches of information security. The initiative is designed to combat identity theft. For compliance, agencies...

  • Untangling ID-Theft Networks. Kite, Shane // Bank Technology News;Sep2006 Supplement, Vol. 19, p8 

    The article reports on the creation of the Regional Identity Theft Network (RITNET), an identity-theft and information-sharing hub for law enforcement in the U.S. RITNET is an electronic database that local, state, and federal investigators can report and access to consolidate casework,...

  • ID-Theft Fears Keep Clients Off the Web. Sowerby, Joe // Bank Technology News;Apr2008, Vol. 21 Issue 4, p46 

    The article discusses the need for financial institutions to adopt approaches to new and emerging online security threats and viruses in the U.S. Financial groups have agreed to find solutions to illegal online activity by educating their consumers on the threats posed by unrecognized electronic...

  • Agencies Take Steps to Safeguard Data.  // Information Management Journal;Sep/Oct2007, Vol. 41 Issue 5, p20 

    The article reports that all U.S. federal agencies have been ordered by the U.S. Office of Management and Budget (OMB) to eliminate the unnecessary collection and use of Social Security numbers by 2009. The order highlights the efforts to provide security measures to combat data breaches and...

  • Internet Privacy: Agencies' Efforts to Implement OMB's Privacy Policy: GGD-00-191. Brostek, Michael // GAO Reports;9/5/2000, p1 

    By issuing its 1999 guidance, the Office of Management and Budget (OMB) took an important step in bringing the federal government's protection of an individual's privacy in line with current technological advancements by providing guidance to agencies for addressing the collection of on-line...

  • Internet Privacy: Implementation of Federal Guidance for Agency Use of Cookies: GAO-01-424.  // GAO Reports;4/27/2001, p1 

    Federal agencies are using Internet "cookies" to enable electronic transactions and track visitors on their websites. Cookies are text files that have unique identifiers and are used to store and retrieve information that allow websites to recognize returning users, track on-line purchases, or...

  • Agencies Make Progress in Implementation of Requirements, but Significant Weaknesses Persist.  // GAO Reports;5/19/2009, preceding p1 

    The article presents a study by the U.S. Government Accountability Office on the security in federal agencies' computer systems. With the growing aggression in computer crimes, the Federal Information Security Management Act was passed by the U.S. Congress. Revision in the Office of Management...

  • Monumental MISSION. April, Carolyn; Fonseca, Brian // InfoWorld;9/9/2002, Vol. 24 Issue 36, p52 

    Discusses the responsibility of chief technical officers (CTO) to bureaucracy in order to reinvent federal systems and the definition of a secure enterprise since the September 11, 2001 terror attacks. Information on U.S. cybersecurity policy efforts and the protection of critical...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics