Limitations on Liability Infographic

NASCIO’s 2004 publication NASCIO on Unlimited Liability – Gaining Traction on the Road to “Win-Win” recommended changes to the state IT procurement policy regarding limitations on liability, and research from 2010 and 2012 show subtle changes have occurred in the states. This infographic indicates which states have limitations on liability in statute, which states have none, and which states are able to negotiate limitations on a case by case basis, and compares the current situation to previous NASCIO research.

Download

Hawaii Integrated Information Sharing and the Open Justice Broker Consortium

Join us to learn how the state of Hawaii has partnered with state and local government to share justice information using NIEM, and the Global Reference Architecture (GRA).

The presentation will focus on the Hawaii Integrated Justice Information Sharing (HIJIS) program, the state of Maine Incident Reporting Service, and the Open Justice Broker Consortium (OJBC).  The HIJIS program involves Hawaii’s state, county, and federal justice and related non-justice agencies for timely sharing of justice-related information.  The state of Maine has also joined the consortium as a contributing partner.  The OJBC is a consortium of state and local justice information sharing partnerships that is developing and supporting an open source, standards-based platform to enable information sharing services for HIJIS and its other member jurisdictions.  More information on the OJBC and how to join as a partner is provided at www.ojbc.org.

Host:
Eric Sweden,
Program Director, Enterprise Architecture & Governance
NASCIO

Presenters:
Clay A. Sato
Data Processing Systems Manager
Hawaii Criminal Justice Data Center
Department of the Attorney General

Glenda Winn
Systems Analyst
Office of Information Technology
Maine State Police

Scott Came
Deputy Executive Directo

Files:

Download Presentation

 

Download Audio

NASCIO Call-to-Action: The Necessity for Maturing Identity and Access Management in State Government

As state leaders act to streamline services, consolidate IT infrastructure and perform more efficiently, trusted digital identities and their authentication becomes a critical enabler with the digital ecosystem. All levels of government and the private sector, are confronted by this challenge and are working together to create common policy, guidelines, standards, and responsibilities to protect cyber assets and ensure appropriate mechanisms are in place for a coordinated identity ecosystem. This guidance presents the value proposition along with key factors for establishing an enterprise-wide approach to identity management.

 

Download

What Makes Collaborative Initiatives Work?

Collaboration is a major part of the solution to sustaining and thriving government organizations and services. But it has to be done correctly so it is effective, can sustain through the life of the initiative’s intent, and can adapt with changing environmental circumstances. No matter what service area, mode of delivery, management area, or technology, collaborative arrangements should be considered as an alternative that may deliver the most effective outcomes.

NASCIO is actively investigating existing collaboratives in order to promote collaborative arrangements across government and to uncover operating discipline and best practices that make for successful collaboratives. These best practices support strategy, governance, program and project management, organization, operations and effective application of technology.Collectively these best practices are imbedded in the enterprise architecture of successful collaboratives.

 

Download

NASCIO Cyber Security Awareness Resource Guide

For the 2012 observance of National Cyber Security Awareness Month, NASCIO has updated its Resource Guide for State Cyber Security Awareness, Education, and Training Initiatives. The guide includes new information from our state members, who provided examples of state awareness programs and initiatives. This is an additional resource of best-practice information, together with an interactive state map to allow users to drilldown to the actual resources that states have developed or are using to promote cyber awareness. It includes contact information for the CISO, hyperlinks to state security and security awareness pages, and information describing cyber security awareness, training, and education initiatives.

The Resource Guide is a work-in-progress that should provide a valuable reference resource for Cyber Security Awareness Month, as well as the ongoing planning of security awareness and training efforts state programs may undertake thereafter.

 

Download

State CIO Top Ten Policy and Technology Priorities for 2013

Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The top ten priorities are identified and used as input to NASCIO’s programs, planning for conference sessions, and publications.

Download

2012 Deloitte-NASCIO Cybersecurity Study – State Governments at Risk: A Call for Collaboration and Compliance

This study reports findings and analysis of a comprehensive survey of State Chief Information Security Officers conducted by NASCIO in partnership with Deloitte in July and August of 2012. Both a repeat and extension of a Deloitte-NASCIO survey originally conducted in 2010, it documents the relative strengths and weaknesses of the security programs that protect state governments’ vital systems and data. The study identifies areas of concern expressed by state CISOs, and provides a call to action for state CIOs and policy officials on the critical need to support and enhance cybersecurity programs.

Download

The State Identity Credential and Access Management Guidance and Roadmap (SICAM)

The State Identity and Credential Access Management (SICAM) Guidance and Roadmap outline a strategic vision for state-based identity, credential, and access management efforts, and emphasizes the importance of implementing the SICAM architecture and services in support of the challenges associated with trust, interoperability, security, and process improvement. States can, and should, provide a secure, auditable environment for the processing and exchange of information across the entire spectrum of state business. This guidance promotes an enterprise approach and it is essential that state governments take the initiative to ensure the integrity of the data entrusted to them and provide a high level of security and privacy to citizens, customers, and partners.

 

Download

Why Should Government Join Up? Why now? What do we gain?

Maintaining and increasing government service delivery in the current economic circumstances is nearing the impossible. What is the answer? Part of the answer is the formation of collaborative relationships across agencies and jurisdictions to share and in some circumstances consolidate investments. State and local governments can not afford to go it alone. Through collaborative governance structures, jurisdictions can pool funding, increase buying power, remove or reduce redundant investments in technology and actually make significant gains in the quality of service.

 

Download