Policy Soup: Dealing with the aftermath of a New Cybersecurity Policy

computer science

Description

Policy Soup: Dealing with the aftermath of a New Cybersecurity Policy

  1. How can the local government officials convince residents that this "invasion of privacy" (collection of personal information during account registration) is necessary and for their benefits?
  2. Should the local government suspend implementation of the new policy for 90 days (180 days?) to allow members of the public to comment on the new policy? Why or Why not?

Actions for 'Policy Soup: Dealing with the aftermath of a New Cybersecurity Policy'

Must post first.SubscribeHide Description

Prepare a 5 to 7 paragraph "Expert Opinion" for local government officials. This document should briefly present a strategy for communicating with residents about a new "cybersecurity" policy that places access restrictions upon the local government's online services website.

Background: Due to increased hacking attempts against the Service Request system, the local government adopted the new policy without allowing time for public comment. There has been a significant amount of backlash including a protest by sports coaches and youth group leaders who were unable to file reservation requests for ball fields and meeting rooms in local Parks & Recreation facilities.

The newly adopted "cybersecurity" policy requires two-factor authentication (login/password, PIN) in order to gain access to online services. The registration form requires name, address, cell phone number, email address, date of birth, and the last four digits of the individual's social security number. The PIN is sent to the cell phone number (text message) or email address each time an individual attempts to logon to the Service Request system. If the PIN is not entered correctly, the logon will fail and access to services will be denied.

Your "Expert Opinion" (document) should address the following issues:

Post your briefing statement as a response to this message (do not use an attachment). To get you started, use this link for an example of city privacy rights: https://www.google.com/search?q=city+government+services+invasion+of+privacy

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.


Related Questions in computer science category