{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "topics",
    "type" : "list",
    "title" : "Privacy |Digital.gov",
    "description": "Privacy",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/",
    "count" : "31","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/topics/privacy/index.json",
    "section" : "topics",
    
    
    "items" : [{"title" :"FedRAMP governance","deck" : "The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities.","summary" : "The Federal Risk and Authorization Management Program (FedRAMP) has recently updated its governance structure to better serve its customers. Learn about their recently-formed FedRAMP Board, composed of federal executives; the FedRAMP Technical Advisory Group (TAG), composed of technology experts; and updates made to the Federal Security Cloud Advisory Committee (FSCAC). These groups collectively aim to strengthen and expand FedRAMP’s cloud service capabilities.","date" : "2024-06-04T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "analytics" : "Analytics",
            "best-practices" : "Best practices",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "governance" : "Governance",
            "privacy" : "Privacy",
            "public-policy" : "Public policy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2024-06-11-fedramp-governance.md",
      
      "filepath" :"news/2024/06/2024-06-11-fedramp-governance.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/06/2024-06-11-fedramp-governance.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/06/2024-06-11-fedramp-governance.md","source" : "fedramp","source_url" : "https://www.fedramp.gov/2024-06-04-fedramp-governance/","weight" : "1","slug" : "fedramp-governance","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/06/04/fedramp-governance/"
    },{"title" :"Reconsidering the consent form: the least user-friendly aspect of UX research","deck" : "The Open Data, Design, and Development (ODDD) team has replaced signed consent forms with a more accessible user research agreement process, offering multiple opt-in points. This ensures informed consent and participant autonomy. Explore why and how the ODDD team implemented this comprehensive participant consent process in their user research.","summary" : "The Open Data, Design, and Development (ODDD) team has replaced signed consent forms with a more accessible user research agreement process, offering multiple opt-in points. This ensures informed consent and participant autonomy. Explore why and how the ODDD team implemented this comprehensive participant consent process in their user research.","date" : "2024-04-03T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "best-practices" : "Best practices",
            "communication" : "Communication",
            "human-centered-design" : "Human-centered design",
            "open-source" : "Open source",
            "plain-language" : "Plain language",
            "privacy" : "Privacy",
            "records-management" : "Records management",
            "research" : "Research"
            },"branch" : "bc-archive-content-3",
      "filename" :"2024-04-04-reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research.md",
      
      "filepath" :"news/2024/04/2024-04-04-reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/04/2024-04-04-reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/04/2024-04-04-reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research.md","source" : "doi-revenuedata","source_url" : "https://blog-nrrd.doi.gov/user-research-consent/","weight" : "1","slug" : "reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/04/03/reconsidering-the-consent-form-the-least-user-friendly-aspect-of-ux-research/"
    },{"title" :"Balancing priorities and values","deck" : "A U.S. Digital Corps Fellow’s perspective on speed of government","summary" : "This article summarizes four priorities and values that simply take time: consideration of the public’s time, privacy, accessibility and equity, and scope.","date" : "2024-02-08T19:07:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kira-tebbe" : "Kira Tebbe"},"topics" : {
        
            "accessibility" : "Accessibility",
            "privacy" : "Privacy",
            "research" : "Research"
            },"primary_image" : { "uid" : "harmony-balance-concept-cagkansayin-istock-getty-images-1790837452", "alt" :
  "Abstract 3-D render of four white balls and levels to convey balance.", "width" :
  "1200", "height" :
  "630", "credit" :
  "", "caption" :
  "Cagkansayin/iStock via Getty Images", "format" :
  "jpg" },"branch" : "bc-archive-content-3",
      "filename" :"2024-02-09-balancing-priorities-and-values.md",
      
      "filepath" :"news/2024/02/2024-02-09-balancing-priorities-and-values.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2024/02/2024-02-09-balancing-priorities-and-values.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2024/02/2024-02-09-balancing-priorities-and-values.md","weight" : "1","slug" : "balancing-priorities-and-values","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2024/02/08/balancing-priorities-and-values/"
    },{"title" :"An introduction to privacy","deck" : "Understand privacy requirements for agency websites","summary" : "Introductory guidance on implementing privacy protections for users of federal websites.","date" : "2023-12-08T06:46:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"rflagg" : "Rachel Flagg"},"topics" : {
        
            "analytics" : "Analytics",
            "privacy" : "Privacy",
            "trust" : "Trust",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"an-introduction-to-privacy.md",
      
      "filepath" :"resources/an-introduction-to-privacy.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/an-introduction-to-privacy.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/an-introduction-to-privacy.md","weight" : "1","slug" : "an-introduction-to-privacy","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/an-introduction-to-privacy/"
    },{"title" :"Why the American People Deserve a Digital Government","deck" : "OMB released new policy guidance for government that includes a variety of actions and standards to help federal agencies design, develop, and deliver modern websites and digital services. Memo M-23-22, Delivering a Digital-First Public Experience, will make it seamless for the public to obtain government information and services online, and help agencies fully implement the 21st Century Integrated Digital Experience Act (21st Century IDEA).","summary" : "OMB recently released new policy guidance for government that includes a variety of actions and standards to help federal agencies design, develop, and deliver modern websites and digital services. Memo M-23-22, Delivering a Digital-First Public Experience, will make it seamless for the public to obtain government information and services online, and help agencies fully implement the 21st Century Integrated Digital Experience Act (21st Century IDEA).","date" : "2023-09-22T13:26:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "best-practices" : "Best practices",
            "budgeting-and-performance" : "Budgeting and performance",
            "communication" : "Communication",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "design" : "Design",
            "digital-service-delivery" : "Digital service delivery",
            "governance" : "Governance",
            "human-centered-design" : "Human-centered design",
            "mobile" : "Mobile",
            "multilingual" : "Multilingual",
            "plain-language" : "Plain language",
            "privacy" : "Privacy",
            "public-policy" : "Public policy",
            "search" : "Search",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "social-media" : "Social media",
            "trust" : "Trust",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      
      "filepath" :"news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2023/09/2023-09-25-why-the-american-people-deserve-a-digital-government.md","source" : "whitehouse","source_url" : "https://www.whitehouse.gov/omb/briefing-room/2023/09/22/why-the-american-people-deserve-a-digital-government/","weight" : "1","slug" : "why-the-american-people-deserve-a-digital-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2023/09/22/why-the-american-people-deserve-a-digital-government/"
    },{"kicker" : "Identity, Credential, and Access Management","title" :"The Privileged Identity Playbook Guides Management of Privileged User Accounts","deck" : "Securing and Protecting Federal Information Systems","summary" : "The Privileged Identity Playbook is a practical guide to help federal agencies implement and manage a privileged user management function as part of an overall agency ICAM program.","date" : "2022-11-10T10:28:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kenneth-myers" : "Kenneth Myers"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"primary_image" : { "uid" : "cyber-security-and-privacy-golden-sikorka-istock-getty-images-1358866874", "alt" :
  "Illustrated graphic with a cyber security and privacy theme features a laptop, cell phone, password field, security lock, key, cloud, and other elements.", "width" :
  "1200", "height" :
  "628", "credit" :
  "", "caption" :
  "Golden Sikorka, iStock, Getty Images", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      
      "filepath" :"news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2022/11/2022-11-10-the-privileged-identity-playbook-guides-management-of-privileged-user-accounts.md","weight" : "1","slug" : "the-privileged-identity-playbook-guides-management-of-privileged-user-accounts","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2022/11/10/the-privileged-identity-playbook-guides-management-of-privileged-user-accounts/"
    },{"kicker" : "Robotic Process Automation","title" :"5 Tips for Implementing Citizen Development in Your RPA Program","deck" : "Guidance and best practices for federal robotic process automation programs looking to operationalize citizen developers","summary" : "The Robotic Process Automation (RPA) Community of Practice highlights five key points for implementing RPA citizen developers, as shared by federal subject matter experts James Gregory (General Services Administration), Frank Wood (Defense Logistics Agency), and Russ Kuehn (Social Security Administration) during their recent webinars with the Federal RPA Community of Practice.","date" : "2021-08-16T13:44:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"james-gregory" : "James Gregory"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "emerging-tech" : "Emerging tech",
            "privacy" : "Privacy",
            "robotic-process-automation" : "Robotic process automation"
            },"primary_image" : { "uid" : "andrey-suslov-shutterstock-1199480788", "alt" :
  "Conceptual graphics of web technology shows a collage of small tech icons and a laptop, smartphone and tablet, in varying shades of red and blue on a gradient blue background.", "width" :
  "5000", "height" :
  "2944", "credit" :
  "", "caption" :
  "Andrey Suslov, Shutterstock", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2021-08-13-5-tips-for-implementing-citizen-development-in-your-rpa-program.md",
      
      "filepath" :"news/2021/08/2021-08-13-5-tips-for-implementing-citizen-development-in-your-rpa-program.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/08/2021-08-13-5-tips-for-implementing-citizen-development-in-your-rpa-program.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/08/2021-08-13-5-tips-for-implementing-citizen-development-in-your-rpa-program.md","weight" : "1","slug" : "5-tips-for-implementing-citizen-development-in-your-rpa-program","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/08/16/5-tips-for-implementing-citizen-development-in-your-rpa-program/"
    },{"kicker" : "Privacy","title" :"Security is Everyone's Responsibility: Delivering Secure, Usable Login for Government","deck" : "How login.gov incorporated human centered design and continuous discovery into their product development process to improve the user experience.","summary" : "How login.gov incorporated human centered design and continuous discovery into their product development process to improve the user experience.","date" : "2021-03-02T10:28:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"julia-solorzano" : "Julia Solórzano"},"topics" : {
        
            "design" : "Design",
            "human-centered-design" : "Human-centered design",
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "login-gov-launch", "alt" :
  "", "width" :
  "600", "height" :
  "400", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      
      "filepath" :"news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2021/03/2021-03-02-security-is-everyones-job-delivering-secure-usable-login-for-government.md","weight" : "1","slug" : "security-is-everyones-job-delivering-secure-usable-login-for-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2021/03/02/security-is-everyones-job-delivering-secure-usable-login-for-government/"
    },{"title" :"A Dashboard for Privacy Offices","deck" : "<strong>A Dashboard for Privacy Offices</strong>—Through work funded by 10x, a team from 18F investigated how technology can help busy privacy offices manage your PII, and make their work more accessible and understandable for the public.","summary" : "Through work funded by 10x, a team from 18F investigated how technology can help busy privacy offices manage your PII, and make their work more accessible and understandable for the public.","date" : "2020-12-15T00:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","topics" : {
        
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-12-19-a-dashboard-for-privacy-offices.md",
      
      "filepath" :"news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2020/12/2020-12-19-a-dashboard-for-privacy-offices.md","source" : "18f","source_url" : "https://18f.gsa.gov/2020/12/15/a-dashboard-for-privacy-offices/","weight" : "1","slug" : "a-dashboard-for-privacy-offices","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2020/12/15/a-dashboard-for-privacy-offices/"
    },{"title" :"Privacy-Preserving Collaboration Using Cryptography","summary" : "In conjunction with her May 2020 presentation, Dr. Emily Shen outlines her work on Secure multi-party computation (MPC), a type of cryptography that allows parties to jointly analyze their data without disclosing it.","date" : "2020-09-29T13:53:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dr-emily-shen" : "Dr. Emily Shen"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"privacy-preserving-collaboration-using-cryptography.md",
      
      "filepath" :"resources/privacy-preserving-collaboration-using-cryptography.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/privacy-preserving-collaboration-using-cryptography.md","weight" : "1","slug" : "privacy-preserving-collaboration-using-cryptography","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/privacy-preserving-collaboration-using-cryptography/"
    },{"kicker" : "Communities of Practice","title" :"Join the Web Managers","deck" : "Share and learn with web and digital services practitioners.","summary" : "Create a better online experience for the public alongside government web content managers.","date" : "2013-11-21T02:31:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"toni-bonitto" : "Toni Bonitto","tori-garten" : "Tori Garten","beth-martin" : "Beth Martin","ruxi-giura" : "Ruxi Giura"},"topics" : {
        
            "accessibility" : "Accessibility",
            "analytics" : "Analytics",
            "communication" : "Communication",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "design" : "Design",
            "digital-service-delivery" : "Digital service delivery",
            "governance" : "Governance",
            "human-centered-design" : "Human-centered design",
            "information-architecture" : "Information architecture",
            "mobile" : "Mobile",
            "multilingual" : "Multilingual",
            "multimedia" : "Multimedia",
            "plain-language" : "Plain language",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "public-policy" : "Public policy",
            "search-engine-optimization" : "Search engine optimization",
            "security" : "Security",
            "social-media" : "Social media",
            "usability" : "Usability",
            "user-experience" : "User experience"
            },"primary_image" : { "uid" : "communities-card-web-mgrs", "alt" :
  "", "width" :
  "2501", "height" :
  "1307", "credit" :
  "", "caption" :
  "", "format" :
  "png" },"branch" : "bc-archive-content-3",
      "filename" :"web-managers-forum.md",
      
      "filepath" :"communities/web-managers-forum.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/communities/web-managers-forum.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/communities/web-managers-forum.md","weight" : "2","aliases" : {"0" : "/communities/web-managers-forum/","1" : "/communities/web-managers-forum/web-content-managers-listserv/"},"slug" : "web-content-managers","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/communities/web-content-managers/"
    },{"title" :" Dr. Emily Shen on Secure Multi-Party Computation","deck" : "This talk will describe how organizations can collaborate in a privacy-preserving manner using a cryptographic technology called secure multi-party computation.","summary" : "Learn how organizations can securely collaborate using cryptographic technologies.","date" : "2020-05-05T15:00:00-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"dr-emily-shen" : "Dr. Emily Shen"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2020-05-05-dr-emily-shen-on-secure.md",
      
      "filepath" :"events/2020/05/2020-05-05-dr-emily-shen-on-secure.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/events/2020/05/2020-05-05-dr-emily-shen-on-secure.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/events/2020/05/2020-05-05-dr-emily-shen-on-secure.md","slug" : "dr-emily-shen-on-secure","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/event/2020/05/05/dr-emily-shen-on-secure/"
    },{"title" :"Laying the Foundation for a More Secure, Modern Government","summary" : "Summary: Building on efforts to boost Federal cybersecurity &amp; as part of National Cybersecurity Awareness Month, today we’re releasing a proposed guidance to modernize Federal IT. America’s spirit of ingenuity and entrepreneurship created the world’s most innovative economy and keeps us dominant in today’s digital age. Indeed, in 1985 about 2,000 people used the Internet;","date" : "2016-10-28T03:00:16-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tony-scott" : "Tony Scott"},"topics" : {
        
            "best-practices" : "Best practices",
            "budgeting-and-performance" : "Budgeting and performance",
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "content-strategy" : "Content strategy",
            "governance" : "Governance",
            "innovation" : "Innovation",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      
      "filepath" :"news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/10/2016-10-28-laying-the-foundation-for-a-more-secure-modern-government.md","slug" : "laying-the-foundation-for-a-more-secure-modern-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/10/28/laying-the-foundation-for-a-more-secure-modern-government/"
    },{"title" :"The Data Briefing: Help Predict the Future of Federal Government Data","summary" : "In December, I plan to write two postings detailing a scenario analysis for the next ten years of the Federal government’s data technologies. Governments are on the cusp of amazing technological advances propelled by artificial intelligence, blockchain technologies, and the Internet of Things. Also, governments will face new challenges such as the recent global cyber","date" : "2016-10-26T13:00:55-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "analytics" : "Analytics",
            "artificial intelligence" : "Artificial intelligence",
            "best-practices" : "Best practices",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "emerging-tech" : "Emerging tech",
            "innovation" : "Innovation",
            "mobile" : "Mobile",
            "multimedia" : "Multimedia",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "research" : "Research",
            "security" : "Security",
            "social-media" : "Social media",
            "software-engineering" : "Software engineering",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      
      "filepath" :"news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/10/2016-10-26-the-data-briefing-help-predict-the-future-of-federal-government-data.md","slug" : "the-data-briefing-help-predict-the-future-of-federal-government-data","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/10/26/the-data-briefing-help-predict-the-future-of-federal-government-data/"
    },{"title" :"No Longer an Idea of the Future, Artificial Intelligence Is Here and You Are Probably Already Using It","summary" : "It might surprise some of you to know that artificial intelligence (AI) is already in use and a routine part of our daily lives, but we leverage this technology when we use our smartphones or other devices to ask Apple’s Siri, Microsoft’s Cortana, Google Now, or Amazon’s Alexa a question to get the facts or data we","date" : "2016-09-15T11:00:12-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"christen-geiler" : "Christen Geiler"},"topics" : {
        
            "analytics" : "Analytics",
            "artificial-intelligence" : "Artificial intelligence",
            "content-strategy" : "Content strategy",
            "customer-experience" : "Customer experience",
            "innovation" : "Innovation",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "research" : "Research",
            "security" : "Security",
            "software-engineering" : "Software engineering",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      
      "filepath" :"news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/09/2016-09-15-no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it.md","slug" : "no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/09/15/no-longer-an-idea-of-the-future-artificial-intelligence-is-here-and-you-are-probably-already-using-it/"
    },{"title" :"Managing Federal Information as a Strategic Resource","summary" : "Summary: Today, OMB is releasing an update to Circular A-130, the Federal Government’s governing document for the management of Federal information resources. Today the Office of Management and Budget (OMB) is releasing an update to the Federal Government’s governing document for the management of Federal information resources: Circular A-130, Managing Information as a Strategic Resource.","date" : "2016-07-27T15:00:01-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tony-scott" : "Tony Scott","howard-shelanski" : "Howard Shelanski","anne-rung" : "Anne Rung","marc-groman" : "Marc Groman"},"topics" : {
        
            "acquisition" : "Acquisition",
            "content-strategy" : "Content strategy",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      
      "filepath" :"news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/07/2016-07-27-managing-federal-information-as-a-strategic-resource.md","slug" : "managing-federal-information-as-a-strategic-resource","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/07/27/managing-federal-information-as-a-strategic-resource/"
    },{"title" :"Trends on Tuesday: Key Trends for Government from Mary Meeker’s 2016 Internet Trends","summary" : "Internet strategist Mary Meeker delivered her 2016 Internet Trends report this month, and there are several key takeaways for government agencies to consider and continue tracking as our connected world continues to evolve: Mobile phone adoption and Internet growth is meeting saturation. Incremental global growth will continue (especially in India, which she called out for","date" : "2016-06-21T12:00:54-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"wsullivan" : "Will Sullivan"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      
      "filepath" :"news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/06/2016-06-21-trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends.md","slug" : "trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/06/21/trends-on-tuesday-key-trends-for-government-from-mary-meekers-2016-internet-trends/"
    },{"title" :"The Data Briefing: The Challenge of Opening up Federal Government Algorithms","summary" : "Algorithms are becoming more important as the amount of data grows, and the complexity of government and business processes grows. Put simply, an algorithm is just a set of steps for solving a problem. If you shop online, use an online social network or a mobile app to plan your route, then you are using","date" : "2016-02-24T10:00:39-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bbrantley" : "Bill Brantley"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "open-data" : "Open data",
            "open-government" : "Open government",
            "privacy" : "Privacy",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2016-02-24-the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms.md",
      
      "filepath" :"news/2016/02/2016-02-24-the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2016/02/2016-02-24-the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2016/02/2016-02-24-the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms.md","slug" : "the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2016/02/24/the-data-briefing-the-challenge-of-opening-up-federal-government-algorithms/"
    },{"title" :"Guidance for Implementing the Privacy Provisions of the E–Government Act of 2002 (M-03–22)","summary" : "This guidance provides information to agencies on implementing the privacy provisions of the E-Government Act of 2002. It addresses privacy protections when Americans interact with their government.","date" : "2015-12-01T09:39:40-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"apiazza" : "Alycia Piazza"},"topics" : {
        
            "privacy" : "Privacy",
            "public-policy" : "Public policy"
            },"branch" : "bc-archive-content-3",
      "filename" :"guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22.md",
      
      "filepath" :"resources/guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22.md","slug" : "guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/guidance-for-implementing-the-privacy-provisions-of-the-e-government-act-of-2002-m-03-22/"
    },{"title" :"DigitalGov Summit Recap: Building Privacy \u0026 Identity Management in the Open","summary" : "How can government protect citizens while delivering the services they demand in the modern age? This was a theme of the panel discussion on privacy and identity management at the 2015 DigitalGov Citizen Services Summit.","date" : "2015-08-28T10:00:32-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"andreanocesigritz" : "Andrea Sigritz"},"topics" : {
        
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      
      "filepath" :"news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/08/2015-08-28-digitalgov-summit-recap-building-privacy-identity-management-in-the-open.md","slug" : "digitalgov-summit-recap-building-privacy-identity-management-in-the-open","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/08/28/digitalgov-summit-recap-building-privacy-identity-management-in-the-open/"
    },{"title" :"DigitalGov Citizen Services Summit: Reflections from Our Livestream Host, and Full Recording Now Available!","summary" : "The second annual DigitalGov Citizen Services Summit was held at GSA headquarters in Washington, DC on May 21, 2015.","date" : "2015-06-12T13:30:22-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"bernetta-reese" : "Bernetta Reese"},"topics" : {
        
            "analytics" : "Analytics",
            "customer-experience" : "Customer experience",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-06-12-digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available.md",
      
      "filepath" :"news/2015/06/2015-06-12-digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/06/2015-06-12-digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/06/2015-06-12-digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available.md","slug" : "digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/06/12/digitalgov-citizen-services-summit-reflections-from-our-livestream-host-and-full-recording-now-available/"
    },{"title" :"HTTP vs HTTPS: Is it Time For a Change?","summary" : "Data. Security. Privacy. These are the cornerstones of many discussions concerning technology. The security of citizen information when interacting with the federal government will be increasingly important as we progress into the future. A few agencies have begun to use Hyper Text Transfer Protocol Secure (HTTPS) in lieu of the standard HTTP. For these agencies,","date" : "2015-03-25T10:00:43-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kdaniel" : "Kendrick Daniel"},"topics" : {
        
            "analytics" : "Analytics",
            "open-data" : "Open data",
            "privacy" : "Privacy",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      
      "filepath" :"news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-25-http-vs-https-is-it-time-for-a-change.md","slug" : "http-vs-https-is-it-time-for-a-change","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/25/http-vs-https-is-it-time-for-a-change/"
    },{"title" :"Trends on Tuesday: Big Data Equals Big Challenges","summary" : "According to an article from Readwrite, the amount of money going to big data projects is steadily increasing despite widespread failure to achieve many results. For big data-related projects in global organizations, a total of $31 billion was spent in 2013 and that amount is expected to top $114 billion by 2018. The recognition that","date" : "2015-03-24T13:59:04-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"kdaniel" : "Kendrick Daniel"},"topics" : {
        
            "analytics" : "Analytics",
            "emerging-tech" : "Emerging tech",
            "open-data" : "Open data",
            "privacy" : "Privacy"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-24-trends-on-tuesday-big-data-equals-big-challenges.md",
      
      "filepath" :"news/2015/03/2015-03-24-trends-on-tuesday-big-data-equals-big-challenges.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-24-trends-on-tuesday-big-data-equals-big-challenges.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-24-trends-on-tuesday-big-data-equals-big-challenges.md","slug" : "trends-on-tuesday-big-data-equals-big-challenges","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/24/trends-on-tuesday-big-data-equals-big-challenges/"
    },{"title" :"Enabling Trusted Digital Interactions Between People \u0026 Government","summary" : "Connect.Gov is a service that helps reduce agency investment and enables a secure, trusted, and inter-operable method for digital interactions between people and government.","date" : "2015-03-06T10:00:01-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jennifer-kerber" : "Jennifer Kerber","jonathan-prisby" : "Jonathan Prisby"},"topics" : {
        
            "cloud-and-infrastructure" : "Cloud and infrastructure",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security",
            "trust" : "Trust"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      
      "filepath" :"news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/03/2015-03-06-enabling-trusted-digital-interactions-between-people-government.md","slug" : "enabling-trusted-digital-interactions-between-people-government","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/03/06/enabling-trusted-digital-interactions-between-people-government/"
    },{"title" :"The Internet of Everything \u0026 Small Business Opportunities","summary" : "In 1995, the World Wide Web, which had been fairly niche up until then, attracted mainstream attention. What followed were 20 years of business and social innovations in how we humans chose to use the web at work, school, at home, and with our friends. The web and its “Web 2.0” successor allowed us to","date" : "2015-02-26T10:00:53-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"david-a-bray" : "David A. Bray","g-nagesh-rao" : "G. Nagesh Rao"},"topics" : {
        
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      
      "filepath" :"news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2015/02/2015-02-26-the-internet-of-everything-small-business-opportunities.md","slug" : "the-internet-of-everything-small-business-opportunities","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2015/02/26/the-internet-of-everything-small-business-opportunities/"
    },{"title" :"Trends on Tuesday: Half of Online Americans Don’t Know What a Privacy Policy Is","summary" : "Federal agencies are required by law to use privacy policies on their digital properties that explain how they use the data they collect about users and visitors. This ensures that these users and visitors know what the government is doing with their data.","date" : "2014-12-23T09:00:17-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jparcell" : "Jacob Parcell"},"topics" : {
        
            "emerging-tech" : "Emerging tech",
            "emerging-tech" : "Emerging tech",
            "mobile" : "Mobile",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management",
            "security" : "Security"
            },"branch" : "bc-archive-content-3",
      "filename" :"2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      
      "filepath" :"news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2014/12/2014-12-23-trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is.md","slug" : "trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2014/12/23/trends-on-tuesday-half-of-online-americans-dont-know-what-a-privacy-policy-is/"
    },{"title" :"Federal Contact Center Regulations \u0026 Directives","summary" : "Contact centers operated and managed by federal agencies have to follow certain laws, regulations, policies, and other directives. Unless specifically noted, contact centers operated and managed by states or local governments do not have to comply with these same requirements. Access for People with Disabilities (Section 508) Federal contact centers must comply with Section 508","date" : "2013-10-28T05:19:56-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tonya-beres" : "Tonya Beres"},"topics" : {
        
            "accessibility" : "Accessibility",
            "contact-centers" : "Contact centers",
            "privacy" : "Privacy",
            "product-and-project-management" : "Product and project management"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-10-28-federal-contact-center-regulations-and-directives.md",
      
      "filepath" :"news/2013/10/2013-10-28-federal-contact-center-regulations-and-directives.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/10/2013-10-28-federal-contact-center-regulations-and-directives.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/10/2013-10-28-federal-contact-center-regulations-and-directives.md","slug" : "federal-contact-center-regulations-and-directives","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/10/28/federal-contact-center-regulations-and-directives/"
    },{"title" :"Tackling PII in Electronic Data","summary" : "As non-lawyers peering into the legal world, be advised this post is not official legal advice from the Office of General Counsel. These are our impressions and what we took away from the Legal Learning Series session Social Media – Privacy, Records and Litigation.","date" : "2013-09-23T18:11:36-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"tlowden" : "Tim Lowden"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "privacy" : "Privacy",
            "social-media" : "Social media"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-09-23-tackling-pii-in-electronic-data.md",
      
      "filepath" :"news/2013/09/2013-09-23-tackling-pii-in-electronic-data.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/09/2013-09-23-tackling-pii-in-electronic-data.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/09/2013-09-23-tackling-pii-in-electronic-data.md","slug" : "tackling-pii-in-electronic-data","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/09/23/tackling-pii-in-electronic-data/"
    },{"title" :"Privacy Policies, Terms of Service, and PIAs! Oh My!","summary" : "Guest post by Cheryl Hackley who works in the Office of Public Affairs at the Federal Trade Commission. From my early days of using email, sites like MySpace, and later getting my first smartphone, it was a common practice for me to","date" : "2013-09-20T11:48:52-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"cheryl-hackley" : "Cheryl Hackley"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "privacy" : "Privacy",
            "social-media" : "Social media",
            "terms-of-service" : "Terms of service"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-09-20-privacy-policies-terms-of-service-and-pias-oh-my.md",
      
      "filepath" :"news/2013/09/2013-09-20-privacy-policies-terms-of-service-and-pias-oh-my.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/09/2013-09-20-privacy-policies-terms-of-service-and-pias-oh-my.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/09/2013-09-20-privacy-policies-terms-of-service-and-pias-oh-my.md","slug" : "privacy-policies-terms-of-service-and-pias-oh-my","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/09/20/privacy-policies-terms-of-service-and-pias-oh-my/"
    },{"title" :"Mobile Product Security and Privacy Testing Resources","summary" : "Security testing is used to ensure that a mobile product does not pose a threat to agency IT systems and databases. In addition, privacy testing ensures that an app does not put the user’s personally identifiable information into a compromisable position. This article was developed as part of the Mobile Application Development Program. See our","date" : "2013-08-05T15:01:32-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jparcell" : "Jacob Parcell"},"topics" : {
        
            "content-strategy" : "Content strategy",
            "mobile" : "Mobile",
            "privacy" : "Privacy",
            "research" : "Research",
            "security" : "Security",
            "software-engineering" : "Software engineering"
            },"branch" : "bc-archive-content-3",
      "filename" :"2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      
      "filepath" :"news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2013/08/2013-08-05-mobile-product-security-and-privacy-testing-resources.md","slug" : "mobile-product-security-and-privacy-testing-resources","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2013/08/05/mobile-product-security-and-privacy-testing-resources/"
    },{"title" :"Government Video: Laws you need to follow","summary" : "Government videos need to follow two main laws: People with disabilities must be able to fully experience them, and  They must adhere to privacy laws 1. Making Video Accessible for People with Disabilities (Section 508) Federal employees are required by law (Section 508 of the Rehabilitation Act of 1973) to make the materials they create","date" : "2012-07-11T12:33:55-0500","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"jonathan-rubin" : "Jonathan Rubin"},"topics" : {
        
            "accessibility" : "Accessibility",
            "content-strategy" : "Content strategy",
            "multimedia" : "Multimedia",
            "privacy" : "Privacy"
            },"branch" : "bc-archive-content-3",
      "filename" :"2012-07-11-government-video-laws.md",
      
      "filepath" :"news/2012/07/2012-07-11-government-video-laws.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/news/2012/07/2012-07-11-government-video-laws.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/news/2012/07/2012-07-11-government-video-laws.md","slug" : "government-video-laws","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/2012/07/11/government-video-laws/"
    }]
}
