Warning: Parameter 1 to Language::getMagic() expected to be a reference, value given in /home/govitwik/public_html/w/includes/StubObject.php on line 58
Government IT Policy - GovITwiki

Government IT Policy

From GovITwiki

Jump to: navigation, search

For government information technology systems, policy can be described as a deliberate plan of action used to guide decisions and promote a rational outcome whenever decisions need to be made. Policy can be as basic as a set of rules for how information is treated and processed within a single department, or as broad as a government-wide executive order. It can include things like privacy policies, parliamentary rules of order, compliance with certain rules for how It systems are built, who is allowed to connet, how configuration is managed, and more.

Some policies are enforced by mapping every asset on network to uncover policy weaknesses and risk patterns. This may provide views into hardware inventory, asset mapping, software settings, and more. One goal of IT policies is to manage both known and unknown assets and to implement security technology to eliminate risk.

But policy covers a wide range of issues.


Official Government IT Policy Directives

At the government-wide level, the Following Documents arelisted by the Office of Management and Budget (OMB) as the Official Federal Government IT Policy Directives.

IT Policy - News and Positions From Influence Groups

Other aspects of Government IT Policy

  • e-Government, per the E-Government Act of 2002 (Public Law 107-347, 116 Statute 2899), that promotes the use of the Internet and information technology to make government information and services more accessible to citizens and to promote interagency collaboration. E-government is one of the facets of the President’s Management Agenda (PMA) that OMB uses to assess all Federal Agencies; see [1]. E-gov is the umbrella under which OMB rates Federal agencies on a variety of information policies, including Homeland Security Presidential Directive 12 (HSPD-12), Federal Information Security Management Act (FISMA), Capital Planning and Investment (CPIC), privacy, and more; see [2].
  • Privacy, as noted above, is part of e-government. The Privacy Act of 1974 (5 U.S.C. § 552a) defines how records with data about individuals shall be managed. See [3]. The Computer Matching and Privacy Protection Act of 1988, P.L. 100–503, amended the Privacy Act of 1974 to include provisions related to records used in automated matching programs. See [4].
  • Section 508, the 1998 Amendment to Section 508 of the Rehabilitation Act (29 U.S.C. 794d), as amended by the Workforce Investment Act of 1998 (P.L. 105-220), August 7, 1998. It focuses on the accessibility of electronic and information technology by populations with disabilities. It has associated standards and a Federal Acquisition Regulations (FAR) rule (see [5]).
  • The Clinger-Cohen Act of 1996 is a Federal law that combined the Information Technology Management Reform Act of 1996 and the Federal Acquisition Reform Act (FARA) of 1996. The intent of Clinger-Cohen is to improve the efficiency and quality in how the Federal Government procures and manages IT resources. See


  • The Paperwork Reduction Act of 1995, as amended (44 U.S.C. 3501 et seq.) is a Federal law that intends to minimize the paperwork burden of the public in dealing with the Federal government. It seeks to improve the quality of government information and increase the efficiency and reduce the costs of how the government manages and disseminates information.

IT Policy News

Personal tools