POLICY ISSUES

USACM Expresses Concerns Over Support For Scientific And Technical Conferences
Part of the response to the reported excesses in conference spending involving the General Services Administration has been to restrict conference and travel spending across the government. Several pieces of legislation are working through Congress to implement such restrictions.
...Read More
USACM Makes Recommendations On Continuity Of E-Government
One of the consequences of the recent East Coast storm was that several cloud computing services were knocked off line for several hours. As government services and information make greater use of the web and cloud services, interruptions to those services will have a greater imp
...Read More
The House Will Engage With Cybersecurity Legislation This Week
While Congress has tried to pass major cybersecurity legislation for the last few years, this week marks what could be a major step forward in finally getting a bill to the President’s desk. The House leadership has scheduled four cybersecurity bills for votes on Thursday a
...Read More
USACM Offers Recommendations On Data Privacy Codes of Conduct
Part of the Obama Administration’s proposed online privacy initiative involves consumer data privacy codes of conduct. These codes would be developed through a multi-stakeholder process, and the National Telecommunications and Information Administration (NTIA) is responsibl
...Read More
Judea Pearl is the 2011 A.M. Turing Award Recipient
The Association for Computing Machinery has awarded the 2011 A.M. Turing Award, considered the equivalent of a Nobel Prize in Computing, to Judea Pearl, a Professor of Computer Science at the University of California, Los Angeles. Pearl is recognized for his work in transforming
...Read More
USACM Comments on the Menlo Report
On Monday USACM submitted comments to the Department of Homeland Security (DHS) on the Menlo Report, which was issued in September 2011. The goal of the report was to extend ethical guidelines for research involving human subjects to computer and information security research. It
...Read More