States Run on IT

NASCIO and its Corporate Leadership Council collaborated to create “States Run on IT”.

A fresh look at the computing environment and technical infrastructure will help state government better serve 21st century citizens. Citizens demand mobile, responsive, and technology-enabled government services that are delivered as conveniently as online banking or shopping. The most effective and efficient businesses work at the speed of information and the best governments should too. Does yours?

This document is intended to start a dialogue.

  • Use it to introduce the topic to newly elected or appointed officials.
  • Leave it as a take away when you meet with IT funding decision makers.
  • Use it to help us carry a consistent message to public sector leaders.

 

Download

Security at the Edge — Protecting Mobile Computing Devices

The business of government is increasingly conducted or supported by mobile computing devices as states adopt these tools to un-tether traditional office workers from their desks or employ them for a wide variety of purposes in the field. Use of mobile devices is so widespread that it is difficult to imagine how state governments can operate without them, given their increased computing power and the ease with which they may be integrated with state networks and databases via the Internet. At the same time, however, mobile devices are unusually vulnerable to loss, theft, mis-use, or misconfiguration, which can and does lead to the loss of sensitive data. Security at the Edge highlights the risks associated with uncontrolled use of mobile devices, and targets the standards and procedural controls that allow state CIOs to better secure them.

 

Download

Data Governance Part III: Frameworks – Structure for Organizing Complexity

This issue brief presents the concept of frameworks that describes what constitutes a data governance program, with a focus on frameworks from the Data Management Association (DAMA), the Data Governance Institute (DGI), and IBM. Use of frameworks can assist state government in planning and executing on an effective data governance initiative. They assist in achieving completeness in a program. In any subject or discipline frameworks and maturity models assist in describing the scope – both breadth and depth – of an initiative. This holds true as well for data, information and knowledge management.

 

Download

Profiles of Progress 3: State Health IT Initiatives

The passage of the American Recovery and Reinvestment Act (ARRA), which allocated billions of dollars to flow into health IT initiatives across the country, has ushered forth a new era for health IT. This is an unprecedented moment for healthcare stakeholders and government, at all levels, to invest significant resources toward health IT and health information exchange initiatives. This compendium, “Profiles of Progress 3: State Health IT Initiatives,” is a product of NASCIO’s Health IT Working Group. It provides a state-by-state “snapshot” of progress that each state has made toward developing and implementing health information exchange and other health IT initiatives. It specifically examines the role of the state CIO in these efforts, and also includes an overview of the implications for health IT since the passage of the ARRA.

 

Download

Data Governance Part II: Maturity Models – A Path to Progress

Data governance maturity models provide a foundational reference for understanding data governance and for understanding the journey that must be anticipated and planned for achieving effective governance of data, information and knowledge assets. This report continues to build on the concepts presented in Data Governance Part I. It presents a portfolio of data governance maturity models.

Download

Desperately Seeking Security Frameworks – A Roadmap for State CIOs

State CIOs, chief security officers, and the IT security professionals who work with them face a challenging and sometimes confusing array of security frameworks – these may be pushed down by Federal agencies, issued by national or international standards bodies, promoted by industry as best practice, or in some instances, be written into law or federal regulation. Desperately Seeking Security Frameworks provides an overview of the primary security standards, regulations, and laws that impact state IT security programs, highlights how states have used the frameworks to shape their security architectures, policies, standards, and controls, and identifies the key issues for CIOs as they establish and maintain IT security programs.

 

Download

Digital States at Risk!: Modernizing Legacy Systems

A product of NASCIO’s Legacy Systems & Modernization Working Group, this report is based on the findings of its 2008 national survey of state CIOs. The report provides an assessment of states’ primary points-of-concern as they relate to legacy system modernization and provides insight into strategies, options and approaches states are considering as they move towards a modern IT enterprise environment.

 

Download

State CIO Top Ten Policy and Technology Priorities for 2009

Each year NASCIO conducts a survey of the state CIOs to identify and prioritize the top policy and technology issues facing state government. The CIOs top ten priorities are identified and used as input to NASCIO’s programs, planning for conference sessions, and publications.

Download

Innovative Funding for State IT: Models, Trends, and Perspectives

Based on a survey of the states, this report examines the use of innovative, alternative and financing funding models for technology projects that enable states to deliver savings, and improve IT services to citizens. The results update NASCIO’s 2003 report on innovative funding, “Innovative Funding for Innovative State IT: New Trends and Approaches for State IT Funding,” and provide state CIOs with information and insights for the facilitation of innovative funding initiatives in their own states. A product of NASCIO’s 2008 Innovative Funding for State IT Working Group, this report was developed based on results from an all states survey of state CIOs; thirty-one states responded concerning their IT funding initiatives.

 

Download

Protecting the Realm: Confronting the Realities of State Data at Risk

This brief underlines the criticality of managing states’ digital assets and identifies key, high-level elements for establishing better data security programs within states. The brief covers data ownership and governance issues, recommends grounding data protection efforts in states’ enterprise architecture frameworks, and outlines nine primary elements that a comprehensive data protection program must incorporate or address. It describes data classification frameworks that have been developed in both state and federal agencies, and includes summaries of operational data classification and security initiatives in the states of Ohio, Arkansas, and Iowa.

 

Download