recommended reading

Agencies seek more guidance on mobile technology


Government agencies want more guidance on how to safely and smartly adopt new mobile technology programs, such as bring-your-own-device plans, an interagency group of chief information officers said Wednesday.

Without more central guidance on security, policy and legal considerations, agencies adopting BYOD policies, building internal app stores and launching other mobile projects may waste money and take on unnecessary risks, according to the report from the Federal CIO Council.

Agencies are also hampered by the lack of governmentwide contract vehicles for many mobile devices, the report said.

The report recommended that officials:

  • Develop more complex standards for how government information should be handled on smartphones and tablets.
  • Create a governmentwide team to evaluate the legal, technical and privacy implications of federal employees using non-government provided mobile devices.
  • Create either agency-wide or governmentwide guidance for procuring mobile devices.
  • Continue working on guidance to ensure government information is sufficiently encrypted on mobile devices and that the people using those devices are sufficiently authenticated.  

OMB and the CIO Council will work toward fulfilling some of these recommendations in the coming months, the report said.

The report is part of the federal digital strategy released by U.S. Chief Information Officer Steven VanRoekel in May. In addition to making mobile adoption more flexible, that document advocated helping agencies buy mobile technology in a cheaper and more efficient way and making more information available to the public online and on mobile devices.

The study was partly based on interviews with technology and procurement officials across government.

“All but one of the agencies and sub-organizations interviewed have expanded or are planning to expand user options for mobile technologies beyond current implementations of laptops and mobile devices,” the report said, “often including newer models of smartphones and tablet computing devices.”

(Image via bloomua/

Threatwatch Alert

Network intrusion / Stolen credentials

85M User Accounts Compromised from Video-sharing Site Dailymotion

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.