230 likes | 393 Views
Adobe Solutions for Government Information Assurance to Protect PII for Employees and Veteran. Bobby Caudill Solution Architect, Global Government August 2008. Personally Identifiable Information. Federal Laws. Privacy Act of 2005 Information Protection and Security Act
E N D
Adobe Solutions for GovernmentInformation Assurance to Protect PII for Employees and Veteran Bobby Caudill Solution Architect, Global Government August 2008
Federal Laws • Privacy Act of 2005 • Information Protection and Security Act • Identity Theft Prevention Act of 2005 • Online Privacy Protection Act of 2005 • Consumer Privacy Protection Act of 2005 • Anti-phishing Act of 2005 • Social Security Number Protection Act of 2005 • Wireless 411 Privacy Act • US 'Safe Harbor' Rules (EU Harmonisation) • Title 18 of the United States Code, section 1028d(7)
OMB M-06-16 Protection of Sensitive Agency Information • Encrypt all data on mobile computers/devices which carry agency data unless the data is determined to be non-sensitive, in writing, by your Deputy Secretary or an individual he/she may designate in writing; • Allow remote access only with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access; • Use a “time-out” function for remote access and mobile devices requiring user re-authentication after 30 minutes inactivity; and • Log all computer-readable data extracts from databases holding sensitive information and verify each extract including sensitive data has been erased within 90 days or its use is still required.
GAO-08-343 Protection of Sensitive Agency Information • Encrypt all data on mobile computers/devices which carry agency data unless the data is determined to be non-sensitive, in writing, by your Deputy Secretary or an individual he/she may designate in writing 22 agencies had developed policies • Allow remote access only with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access 14 agencies had developed policies • Use a “time-out” function for remote access and mobile devices requiring user re-authentication after 30 minutes inactivity 15 agencies had developed policies • Log all computer-readable data extracts from databases holding sensitive information and verify each extract including sensitive data has been erased within 90 days or its use is still required 11 agencies had developed policies
en·gage to induce to participate Engagement
The Engagement Challenges Ease of use Trust Outdated Mismatched expectations Effective follow up Speed of change 7
Core Applications The Engagement Gap Citizens ERP CRM Financial HRM Citizen Portals Self-Enrollment LOB Tax Filing Permits & Licenses Other Agencies Suppliers Emergency Response Grants Public Safety Compliance Reporting HR/Recruiting
Engagement Building Blocks Adobe Reader® Adobe Flash® Adobe AIR™ HTML Intuitive Data Capture Secure Info Sharing Collaboration & Training Guided Experiences Dynamic Document Gen Rich Internet Apps
93% PCs 99% PCs Adobe client software is deployed globally, today. 900 millionPCs and devices ✓ Cross Platform Hardware / Browser
Engagement Building Blocks Intuitive Data Capture Adobe Reader® Adobe Flash® Adobe AIR™ HTML Intuitive Data Capture Secure Info Sharing Collaboration & Training Guided Experiences Dynamic Document Gen Rich Internet Apps
Data Capture:Spectrum Paper Form Basic eForm Interactive eForm Dynamic eForm Form Guide Dynamic Collection Data Capture Guided Experiences Print & Fill Print & Read Fill & Print Text Fields Fill, Sign, Submit Typed Fields Validations 2D bar codes Digital Signatures Store, Process Pre-populate Document Routing Rights management XML Form Fragments 1 2 3 4 5 Intelligence
PDF – It’s more than a pretty picture CRM ERP Digital IDs Digital to Paper
Secure Info Sharing Engagement Building Blocks Adobe Reader® Adobe Flash® Adobe AIR™ HTML Intuitive Data Capture Secure Info Sharing Collaboration & Training Guided Experiences Dynamic Document Gen Rich Internet Apps
Freedom of Information Act – Redaction • Redact at an XML level • Redact in batch using “patterns” 16
The Last Line of Defense Network Perimeter Managed Environment (CMS, ERP)
Document Security Information • Risks • Confidentiality and Control • Reliability • Repudiation Integrated Risk Mitigation Certification Decision Accountability Rights Management • Acceptable Approvals • Legally Binding Agreements • Dynamic Control • Persistent Protection • Authentic Documents • Verifiable Transactions
Collaboration & Training Engagement Building Blocks Adobe Reader® Adobe Flash® Adobe AIR™ HTML Intuitive Data Capture Secure Info Sharing Collaboration & Training Guided Experiences Dynamic Document Gen Rich Internet Apps
Blended Solutions Blended Solutions Maximize Productivity To One (Asynchronous) • eLearning • On-Demand Presentations • Public Service Announcements Together (Synchronous) • Web Conference • Tele-work • Virtual Classroom To One (Asynchronous) • eLearning • On-Demand Presentations • Public Service Announcements Together (Synchronous) • Web Conference • Tele-work • Virtual Classroom Collaborate, Present and Train Online – Live and On-Demand
Bringing It all Together Secure Information Sharing Intuitive Data Capture Collaboration and Training • Rights Management • Certified Documents • Accountable Decisions • Doc Generation • Process Automation • Synchronous Collaboration • Asynchronous Collaboration • Shared Desktop • Information Visualization • Presence & Awareness • Shared Reviews • Personalized Experiences • Familiar Metaphor • Online/Offline • Reader Enabled • Geospatially Enabled + + =Synergy