Issues
Library
CyberSecure.US Library
Government Authentication
Personal Identity
Federal Standards
Governance
R&D
Resources
Legislation & Policy
View and Submit Comments
Government Authentication (Top of page)
eAuthentication Homepage
OMB Memo: E-Authentication Guidance for All Agencies (M-04-04)
NSA Common Criteria Evaluation and Validation Scheme
NIST Draft Special Publication 800-52, Guidelines on the Selection and Use of Transport Layer Security
National Information Assurance Partnership (NIAP)
Computer Security Act of 1987 (40 USC 1441)
Biometric-Based Technologies (OECD Report)
The Biometrics Consortium
Personal Identity (Top of page)
Homeland Security Presidential Directive 12 (HSPD-12) Policy for a Common Identification Standard for Federal Employees and Contractors
Federal Information Processing Standard 201 (FIPS 201) Personal Identity Verification for Federal Employees and Contractors
NIST 2nd Draft Special Publication 800-73 Interfaces for Personal Identity Verification
NIST Draft Special Publication 800-76, Biometric Data Specification for Personal Identity Verification
Federal Trade Commission -ID Theft Home Page
FTC Identity Theft Complaint Form
Department of Justice Identity Theft and Fraud
Department of Defense Directive 1000.25 DoD Personal Identity Protection (PIP) Program
Federal Reserve Bank of Boston Identity Theft
National Cyber Security Progress Report
Progress and Freedom Foundation Privacy and the Market for Personal Information: Should Congress Regulate?
Smart Card Alliance
OECD Information Security and Privacy webpage (e-commerce)
Public Key Infrastructure
PKI Resources
NIST PKI Program
DoD PKI Resources
Dartmouth College PKI Lab
Electronic Privacy Information Center Privacy Tools
Federal Standards (Top of page)
National Health Information Network
Executive Order 13335 - Incentives for the Use of Health Information Technology and Establishing the Position of the National Health Information Technology Coordinator
HHS Health IT Strategic Framework
HHS Development and Adoption of a National Health Information Network: Request for Information (Federal Register notice)
HHS Office of the National Coordinator for Health Information Technology
ISO TC 215 Working Group 4: Health Informatics Security (Documents)
Governance (Top of page)
UN/International Telecommunication Union: World Summit of Information Society (WSIS)
World Summit of Information Society: Working Group on Internet Governance (WGIS)
UN/International Telecommunication Union: Internet Governance Resources
United Nations Information and Communications Technologies (UN ICT) Task Force
US Senate Committee on Commerce, Science and Transportation Hearing on ICANN Oversight and Security of Internet Root Servers and the Domain Name System (DNS)
Progress and Freedom Foundation New Domain Name Services: Should ICANN or Competition Govern?
ICANNfocus Archives
R&D (Top of page)
Presidents Information Technology Advisory Committee, Subcommittee on Cyber Security: Update (discusses need for more R&D)
Presidents FY 06 Budget Department of Homeland Security
Homeland Security Budget Request Overview
House Committee on Science An Overview of the Federal R&D Budget for FY 06
NSF Cyber Trust Grants Program
Cyber Security R&D Center
Resources (Top of page)
OATH Initiative for Open Authentication
Liberty Alliance Project
Electronic Authentication Partnership
Anti-Phishing Working Group
FTC SPAM Page
FTC E-mail Authentication Summit
National Academy of Sciences Trust In Cyberspace
Legislation (Top of page)
National Technology Transfer and Advancement Act of 1995
Homeland Security Act of 2002
E-Government Act of 2002
Cyber Security Research and Development Act
Federal Information Security Management Act of 2002
CAN-SPAM Act of 2003
Proposed Legislation: 109th Congress
SPY ACT (H.R. 29)
Online Privacy Protection Act of 2005 (H.R. 84)
Identity Theft Prevention Act of 2005 (H.R. 220)
Department of Homeland Security Cybersecurity Enhancement Act of 2005 (H.R. 285)
REAL ID Act of 2005
Internet Spyware (I-SPY) Prevention Act of 2005 (H.R. 744)
Notification of Risk to Personal Data Act (S. 115)
Privacy Act of 2005 (S. 116)
Anti-phishing Act of 2005 (S. 472)
Information Protection and Security Act (S.500)
Information Protection and Security Act (H.R. 1080)
Executive Orders
Executive Order 13231 - Critical Infrastructure Protection in the Information Age
Executive Order 13284 - Amendment of Executive Orders, and Other Actions, in Connection With the Establishment of the Department of Homeland Security
Executive Order 13286 -Amendment of Executive Orders, and Other Actions, in Connection With the Transfer of Certain Functions to the Secretary of Homeland Security
Executive Order 13316 - Continuance of Certain Federal Advisory Committees
Homeland Security Presidential Directives
Homeland Security Presidential Directive 7 (HSPD-7) Critical Infrastructure Identification, Prioritization, and Protection
Presidential Plans
The National Strategy to Secure Cyberspace
Interim National Infrastructure Protection Plan
OMB Memoranda
Reducing Redundant IT Infrastructure to Homeland Security (M-02-12)
E-Authentication Guidance for All Agencies (M-04-04)
Development of Homeland Security Presidential Directive (HSPD) - 7 Critical Infrastructure Protection Plans to Protect Federal Critical Infrastructures and Key Resources (M-04-15)
FY 2004 Reporting Instructions for the Federal Information Security Management Act (M-04-25)
Section E: FY 2004 FISMA Reporting Template
Electronic Signatures: How to Mitigate the Risk of Commercial Managed Services (M-05-05)
Other White House Documents
Presidents Information Technology Advisory Committee, Subcommittee on Cyber Security: Update
OMB Circular A-119 Federal Participation in the Development and Use of Voluntary Consensus Standards and in Conformity Assessment Activities (w/ transmittal memorandum)
Federal Information Processing Standards Publications
Department of Defense
Rainbow Series Library
Congressional Research Service
Creating A National Framework for Cybersecurity
Organisation for Economic Co-operation and Development
OECD Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security
Biometric-Based Technologies
OECD Culture of Security website
(Top of page)