Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News

      eGov Challenges Tech

      Written by

      John Taschek
      Published April 8, 2002
      Share
      Facebook
      Twitter
      Linkedin

        eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

        The U.S. Government is going electronic but may be setting policy ahead of available technology. A series of initiatives, most of them passed during the Clinton administration, mandates that government agencies—and the hundreds of organizations that work with them—jump into the 21st century. However, many vendors—big and small—fall short in supplying products and services that will comply with the governments demands.

        The umbrella term for these sweeping electronic initiatives is eGov (www.egov.gov). Within eGov are specific acts and regulations that include the Government Paper Elimination Act of 1999, the eGovernment Act of 2001, the Electronic Signatures in Global and National Commerce Act of 2000, and the Information Technology Management Reform Act of 1996.

        The goal of these acts, most of which come under the jurisdiction of the White House Office of Management and Budget, is to make all relevant government resources available electronically to all citizens, including the disabled. These rules are currently limited to putting government forms on Web sites but will eventually include everything up to and including electronic voting.

        This is a noble cause, but the acts have very specific and, in some cases, stringent and contradictory technology criteria. For example, the regulations for defense IT procurement may prevent the purchase of new technology that has added security features without eliminating older technology that does not have any of the new security controls.

        In short, these acts have the potential to shape the future U.S. tech industry. Below, eWeek Labs examines how three of the eGov policies will affect technology vendors and the IT buyers of that technology.

        NSTISSP No. 11

        The single government policy with perhaps the most potential to shake up the technology industry is the National Information Assurance Acquisition Policy, or NSTISSP No. 11.

        The policy has its roots in a 1990 National Security Directive that led to the creation of the National Security Telecommunications and Information Systems Security Committee, which in turn produced the policy—the “P” in NSTISSP—in January 2000.

        At its most basic level, NSTISSP No. 11 is intended to help the U.S. Department of Defense move from government off-the-shelf software to commercial off-the-shelf software without compromising security. To do this, the government—and, in particular, the National Security Agency—had to produce a series of assurances that showed commercial packages performed as advertised and were at least as secure as those developed internally by the government.

        Although the government has always asked for some of these assurances, it wasnt until January of last year, when the government gave preference to products that achieved an appropriate assurance level, that they actually affected software vendors. Until that time, the Defense Department had only marginally enforced the policy and had granted waivers to software vendors participating in defense contract bidding.

        Beginning this July, however, the policy is mandated, and several sources said the NSA will not be granting waivers. Government-contracted vendors that dont comply will not be allowed to bid on defense contracts. (Its important to note that this policy applies to new products and does not mandate replacing older products.)

        NSTISSP No. 11 has its origins in the old “rainbow” security classifications, known as the red book and orange book security evaluation criteria.

        The rainbow scale was replaced in 1999 by Common Criteria, which replaces the rainbow-class levels with evaluation assurance levels ranging from EAL0 (inadequate assurance) to EAL7 (verified, designed and tested). These levels more or less correspond to the previous rainbow levels, but Common Criteria is far more complex and takes into account newer architectures, such as the Internet.

        Common Criteria is so complex, in fact, that it can take more than a year for a vendor to go through NISTs evaluation process. It took Oracle Corp., for example, two years and more than $1 million to get an earlier version of its flagship database certified, according to Mary Ann Davidson, Oracles chief of security, in Redwood Shores, Calif.

        The impact of this mandate could be huge, especially when considering how few evaluations have been done to date. IBM, for example, does not have any of its databases evaluated. (For a list of products currently being evaluated, see niap.nist.gov/cc-scheme/InEvaluation.html.)

        In addition to the time it takes to evaluate a product, cost may inhibit or even prohibit companies from participating. Smaller database companies, for example, may be shut out of government contracts because they cant afford to get their systems certified.

        It also appears that open-source products cannot be evaluated according to the guidelines, which are specific to a released commercial product. A Linux distributor could potentially freeze a distribution of Linux for the government, but if the distribution changed in any way, the software would be considered modified and would not pass the evaluation.

        Theres a certain irony in this: Windows NT, for example, has a rainbow book C2 rating and can be used by the Defense Department, even though Microsoft Corp. began development before the Internet was opened to the public. Meanwhile, Windows XP and most distributions of Linux are inherently more secure than NT but havent passed the evaluation. They therefore are not “acceptable” products.

        Section 508

        While NSTISSP No. 11 is clearly defined and has broad industry support (mandated support, that is), Section 508 covers so much ground that it may be impossible for the government to adopt its provisions to the letter of the law.

        Section 508 was born out of the Rehabilitation Act of 1973, which mandated that government agencies and academic institutions not discriminate against those with disabilities. The act eventually led to the sweeping Americans with Disabilities Act of 1990, which broadened protection to workers at any public place. Section 508 requires that all IT products be usable and accessible to the disabled. The law was slated to take effect in August 2000, but the deadline was extended to June of last year.

        “All IT products” is a pretty broad category—too broad, perhaps, covering everything from Web sites to fax machines to printers and copiers used by the federal government and its contractors. Its not completely clear if the law covers routers, switches and other networking infrastructure gear, nor does it include provisions for extending the dates for compliance if accessibility compromises security.

        Vendors including Microsoft, Oracle, Cardiff Software Inc. and Macromedia Inc. agree that the main goal of Section 508 is admirable, not to mention an excellent business opportunity: Fifty-four million Americans—or about one-fifth of the population—are disabled. In fact, some have hinted that Section 508 might spur a spending and development effort like we saw with Y2K.

        Others agree that Section 508 is admirable but consider it impractical. Avi Hoffer, CEO of Metastorm Inc., in Severna Park, Md., a company focused on the eGov market, said that at some point it will be less costly “to send the disabled home and pay them rather than to bring all IT products into compliance” to the full extent of the law.

        Hoffer, who supports the goals of Section 508, said that its a “quagmire” because government agencies have no compliance officers or independent validating organization and that even the General Services Administration Web site (www.gsa.gov) is not compliant. Hoffer predicted that the government will overlook compliance issues and then pass a new law thats more achievable.

        Section 508 deals with the acquisition of new technology, but billions of dollars have already been spent to modify existing sites. Vendors have focused mostly on altering site design so that screen readers can better interpret Web pages. Meanwhile, Xerox Corp., a company with massive government contracts, is focusing energy on the document management and copy machine market.

        Sun Microsystems Inc. is leveraging the open-source GNOME (GNU Network Object Model Environment) desktop to deal with Section 508 accessibility laws. GNOME 2.0 now includes the Gnopernicus screen reader and GOK—the Gnome on-screen keyboard that allows Sun to come into compliance without doing massive amounts of development work. Meanwhile, Sun has developed the Java Access Bridge, which allows Java applications to interact with Microsoft Windows accessibility features.

        According to John Leahy, Sun federal chief of staff in Vienna, Va., Sun will not stop at mere compliance. Sun is “looking beyond the requirement” and pushing into alternative interfaces, Leahy said. “Theres got to be more than one way of doing things,” he said.

        Cardiff, a major player in the forms processing area, has equipped its design products with facilities for connecting screen readers, screen magnifiers, on-screen keyboards and text-to-speech converters. The company also makes those technologies available to Adobe Systems Inc.s Acrobat, a de facto government standard. However, until Version 5.0, the Acrobat format did not lend itself to Section 508 compliance.

        Meanwhile, the World Wide Web Consortium is working on its own Web Accessibility Initiative (www.w3.org/WAI/about.html), which follows the work done on Section 508 and applies to the international community.

        HIPAA

        One eGov act that has already made a huge impact is the Health Insurance Portability and Accountability Act of 1996, better known as HIPAA. HIPAA targets the health care and insurance industries and, at the highest level, attempts to ensure that personal data remains private.

        HIPAA can be thought of as having two components. The first is the framework that ties together health care entities to reduce costs and the complexities of administering health care policies. This traditionally has been done through a series of electronic data interchange schemata, but HIPAA is moving to a more open XML framework.

        Microsoft, for example, has released BizTalk Accelerator for HIPAA, a set of XML definitions that targets the health care industry. The main selling point of BizTalk for HIPAA is rapid compliance with HIPAA regulations, which is mandated by next April.

        The other component of HIPAA is privacy. In this regard, HIPAA does not call for specific new technology but rather takes a common-sense approach and relies on human compliance.

        For example, most health care records are paper-based and have minimal security or privacy associated with them. Any person wandering around a hospital can pick up privileged information, make copies of it or even destroy it. HIPAA focuses on ensuring that private data remains private and secure and that an audit trail is created by the health facility.

        Doing this requires more than technology. John Jones, general manager of Xerox Health Care, said Xerox is focusing, for example, on re-engineering the paper process and bringing human components into conformance.

        Of course, the human element will take far longer to come into compliance than any technology will. The government will probably have to extend the compliance dates or at least overlook compliance violations for some time.

        eWeek Labs Director John Taschek is at john_taschek@ziffdavis.com.

        Links to other stories in this package
        eGov Prompts Ambitious Agency Efforts
        Grappling With Compliance
        Additional eGov Web Resources

        John Taschek
        John Taschek
        As the director of eWEEK Labs, John manages a staff that tests and analyzes a wide range of corporate technology products. He has been instrumental in expanding eWEEK Labs' analyses into actual user environments, and has continually engineered the Labs for accurate portrayal of true enterprise infrastructures. John also writes eWEEK's 'Wide Angle' column, which challenges readers interested in enterprise products and strategies to reconsider old assumptions and think about existing IT problems in new ways. Prior to his tenure at eWEEK, which started in 1994, Taschek headed up the performance testing lab at PC/Computing magazine (now called Smart Business). Taschek got his start in IT in Washington D.C., holding various technical positions at the National Alliance of Business and the Department of Housing and Urban Development. There, he and his colleagues assisted the government office with integrating the Windows desktop operating system with HUD's legacy mainframe and mid-range servers.

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        Get the Free Newsletter!

        Subscribe to Daily Tech Insider for top news, trends & analysis

        MOST POPULAR ARTICLES

        Artificial Intelligence

        9 Best AI 3D Generators You Need...

        Sam Rinko - June 25, 2024 0
        AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
        Read more
        Cloud

        RingCentral Expands Its Collaboration Platform

        Zeus Kerravala - November 22, 2023 0
        RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
        Read more
        Artificial Intelligence

        8 Best AI Data Analytics Software &...

        Aminu Abdullahi - January 18, 2024 0
        Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
        Read more
        Latest News

        Zeus Kerravala on Networking: Multicloud, 5G, and...

        James Maguire - December 16, 2022 0
        I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
        Read more
        Video

        Datadog President Amit Agarwal on Trends in...

        James Maguire - November 11, 2022 0
        I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
        Read more
        Logo

        eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

        Facebook
        Linkedin
        RSS
        Twitter
        Youtube

        Advertisers

        Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

        Advertise with Us

        Menu

        • About eWeek
        • Subscribe to our Newsletter
        • Latest News

        Our Brands

        • Privacy Policy
        • Terms
        • About
        • Contact
        • Advertise
        • Sitemap
        • California – Do Not Sell My Information

        Property of TechnologyAdvice.
        © 2024 TechnologyAdvice. All Rights Reserved

        Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

        ×