Welcome to the Jungle: The State Privacy Implications of Spam, Phishing and Spyware

This brief explores the privacy implications for state government created by the threats of spam, phishing and spyware and potential ways of preventing and mitigating this triple threat to state IT systems.



The Real Phantom Menace: Spyware and its State Implications

This brief addresses the security, privacy, citizen trust and business process-related implications of spyware and other forms of malware for state government IT systems and suggests some potential technical, legal and awareness-raising solutions for the menace of malware.



Who Are You? I Really Wanna Know: E-Authentication and its Privacy Implications

This brief explores the business drivers behind e-authentication and the privacy implications that states and others should consider in pursuing e-authentication efforts.



Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet Access

Bowling for Broadband: The Role of the State CIO in Promoting High-Speed Internet Access.



Think Before You Dig: The Privacy Implications of Data Mining & Aggregation

This brief examines the business benefits and privacy issues related to government’s use of data-mining technologies. It also takes a look at high-profile government data-mining programs and suggests ways to infuse privacy protections and transparency into government’s use of data-mining technologies.



Walking the Road to the Win-Win: NASCIO Procurement Subcommittee’s Recommendations on Liability Limitations for State IT Contracting

These recommendations are intended to elucidate the various state and vendor interests that are involved in negotiating liability limitations and to help states and vendors negotiate better IT contract liability limitations that are “win-win” for both sides.



Wireless in the Workplace: A Guide for Government Enterprises

The use of wireless technology in our personal lives has become almost commonplace with the proliferation of cell phones, personal digital assistants and wireless PC modems. Our demand for anytime, anywhere communications and access to information is quickly spreading to the workplace. Wireless local area networks (WLANs) and Wi-Fi “hot spots” are sprouting up everywhere, yet many individuals and organizations fail to fully understand the security risks of this inherently open technology and expose their systems unnecessarily. 

This publication is intended to help government enterprises make informed decisions about wireless technology and guide IT professionals through the opportunities and challenges of working in the wireless world. It highlights key issues such as:

  • wireless applications & uses
  • wireless technology options
  • wireless standards
  • wireless security
  • wireless network management & performance
  • wireless installation & maintenance



HAVA (the Help America Vote Act 2002)—A Briefing Paper

This briefing paper provides an overview of the Help America Vote Act of 2002 (HAVA) and explores its IT-related challenges as well as NASCIO’s role in helping states to implement the Act. 



Information Privacy: A Spotlight on Key Issues

NASCIO is pleased to announce the release of its newest publication, Information Privacy: A Spotlight on Key Issues. This publication, produced by the Privacy committee, serves as a resource for states developing privacy policies that protect citizen information and are compliant with federal and state legal requirements. This publication highlights key issues in the following areas of privacy: Children’s Information, Drivers’ Information, Health Information, Financial Information, Education Information, Social Security Numbers, Homeland Security-Related Information, Website Privacy Policies, and Government Data Matching Activities and Agreements.

In addition, the publication includes state examples for many of these areas of information privacy, an overview of recent privacy events at the federal level and a glossary of privacy related terms.