DoD Cyber Info Sharing Raises Privacy, Liability, Fairness Questions

Gormisky, Liz
November 2013
Defense Daily;11/8/2013, Vol. 260 Issue 28, p5
Market Research Report
This article reports that the Defense Industrial Base Voluntary Cyber Security and Information Assurance program of the U.S. Department of Defense (DOD) has raised concerns over liability protections and fairness. The voluntary program will ask contractors to share threat risks so that they can be distributed to the DOD and other contractors in the defense community. It is not a mandated program and will not be subject to congressional oversight.


Related Articles

  • Kendall: Better Buying Power 3.0 Would Promote Value over Cost, Incentivize Innovation. Eckstein, Megan // Defense Daily;8/8/2014, p5 

    The article focuses on a statement issued by Frank Kendall, undersecretary of Defense for Acquisition, Technology and Logistics in the U.S. Department of Defense, that the Better Buying Power (BBP) 3.0 initiative would promote value over cost and expand incentives for innovation in the defense...

  • Pentagon Contract Spending Swings Make Cutting Harder. Fabey, Michael // Aerospace Daily & Defense Report;5/13/2015, Vol. 252 Issue 31, p7 

    The article focuses on the difficulty of the Department of Defense (DoD) to implement budget cuts due to its contracts with government agencies and seesawing budget and spending trends in the U.S. It outlines the agency's various contract obligations, making it hard to make budget cuts compared...

  • OUR Chat WITH Anita Bales, DIRECTOR, DEFENSE CONTRACT AUDIT AGENCY.  // Contract Management;Jun2015, Vol. 55 Issue 6, p44 

    An interview with Anita Bales, director of the U.S. Department of Defense's Defense Contract Audit Agency (DCAA), is presented. Topics discussed include the roles DCAA plays in the defense acquisition network, the upcoming initiatives for DCAA and its workforce, and the impact of budget...

  • DEFENSE WATCH.  // Defense Daily;5/11/2012, Vol. 254 Issue 30, p5 

    The article presents several news briefs related to the defense industry of the U.S. The U.S. Defense Department awarded SGI a 27.8 million dollars contract to provide its ICE X high-performance computing system. The Internet Crime Complaint Center (IC3) released its 2011 Internet Crime Report....

  • Pentagon To Reassert Role Over Industry Research. Bruno, Michael // Aerospace Daily & Defense Report;4/10/2015, Vol. 252 Issue 8, p1 

    The article discusses United States defense contractor need to notify and seek the endorsement of a Defense Department official regarding some of their self-funded research efforts. Topics include independent research and development (IRAD) projects by which the Pentagon seeks to reassert...

  • Pentagon Sharing More Cyber-Security Intelligence With Industries. Prince, Brian // eWeek;5/11/2012, p5 

    The article reports on the expansion of the Defense Base Cyber Security/Information Assurance Program (DIB CS/IA) to all eligible companies through the partnership of U.S. Department of Homeland Security (DHS) and U.S. Department of Defense on May 11, 2012. It mentions that the program aims for...

  • A Disruptive Game Changer to Achieve DoD Austerity. O'Neill, Don // Defense AT&L;May/Jun2012, Vol. 41 Issue 3, p30 

    The article looks into the challenge aimed at improving the software engineering function and defense contract support in services acquisition initiatives of the U.S. Department of Defense (DoD) in compliance with the Capability Maturity Model Integration (CMMI). It provides an overview of the...

  • INDUSTRY INSIGHT. Signorelli, Mark // Army AL&T Magazine;Jan-Mar2015, p148 

    The article looks at how the U.S. Army and the Department of Defense (DOD) can preserve essential capabilities for the warfighter. Topics discussed include the rise and decline of the Mine Resistant Ambush protected (MRAP) vehicle production at the BAE Systems facility in York, Pennsylvania and...

  • Cybersecurity Challenges for Program Managers. Mills, Steve; Goldsmith, Rob // Defense AT&L;Sep/Oct2014, Vol. 43 Issue 5, p41 

    The article discusses how cybersecurity threats in the acquisition programs of the U.S. Department of Defense (DoD) can be addressed. It cites factors that must be considered when establishing a holistic approach to achieve effective cybersecurity including information assurance and analysis on...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics