WELCOME TO THE CONTINUITY CENTRAL ARCHIVE SITE

Please note that this is a page from a previous version of Continuity Central and is no longer being updated.

To see the latest business continuity news, jobs and information click here.

Business continuity information

US Commerce Department proposes new policy framework to help protect companies where the Internet is business-critical

The US Department of Commerce has released a report that proposes voluntary codes of conduct to strengthen the cybersecurity of companies that increasingly rely on the Internet to do business, but are not part of the critical infrastructure sector.

The report, ‘Cybersecurity, Innovation and the Internet Economy’, focuses on the ‘Internet and Information Innovation Sector’ (I3S) – these are businesses that range from small and medium enterprises and bricks-and-mortar firms with online services, to social networking sites and Internet-only business, to cloud computing firms that are increasingly subject to cyber attacks.

"Our economy depends on the ability of companies to provide trusted, secure services online. As new cybersecurity threats evolve, it's critical that we develop policies that better protect businesses and their customers to ensure the Internet remains an engine for economic growth," said Commerce Secretary Gary Locke. "By increasing the adoption of standards and best practices, we are working with the private sector to promote innovation and business growth, while at the same time better protecting companies and consumers from hackers and cyber theft."

The report, developed by the Department's Internet Policy Task Force, makes a number of specific recommendations for reducing I3S vulnerabilities:

  • Establish nationally recognized but voluntary codes of conduct to minimize cybersecurity vulnerabilities. For example, the report recommends that businesses employ present-day best practices, such as automated security, to combat cybersecurity threats and that they implement the Domain Name System Security (DNSSEC) protocol extensions on the domains that host key Web sites. DNSSEC provides a way to ensure that users are validly delivered to the web addresses they request and are not hijacked.

  • Developing incentives to combat cybersecurity threats. The report also recommends exploring and identifying incentives that could include reducing ‘cyberinsurance’ premiums for companies that adopt best practices and openly share details about cyberattacks for the benefit of other businesses.

  • Improve public understanding of cybersecurity vulnerabilities through education and research. Programs like the National Initiative for Cybersecurity Education should target awareness and training to the I3S and develop methods for cost/benefit analyses for cybersecurity expenditures.

  • Enhance international collaboration on cybersecurity best practices to support expanded global markets for US products. This should include enhanced sharing of research and development goals, standards, and policies that support innovation and economic growth.

This report follows a series of recent Internet security policy recommendations made by the Obama administration. In April, the Administration released the National Strategy for Trusted Identities in Cyberspace, which seeks to better protect consumers from fraud and identity theft. Last month, the Administration proposed legislation to require companies providing critical infrastructure services, such as the financial and energy sectors, to implement stronger cybersecurity practices (fact sheet). In addition, the Administration recently released a strategy for managing international issues in cyberspace.

The Commerce Department launched the Internet Policy Task Force in April 2010 to identify and address the Internet's most pressing policy issues and to recommend new policies. The Task Force was directed to look at establishing practices, norms and ground rules that promote innovative uses of information in four key areas where the Internet must address significant challenges: enhancing Internet privacy; improving cybersecurity; protecting intellectual property and encouraging the global free flow of information.

The full report, including questions seeking additional stakeholder input, can be found here (PDF).

•Date: 15th June 2011 • Region: US •Type: Article • Topic: ISM

Business Continuity Newsletter Sign up for Continuity Briefing, our weekly roundup of business continuity news. For news as it happens, subscribe to Continuity Central on Twitter.
   

How to advertise How to advertise on Continuity Central.

To submit news stories to Continuity Central, e-mail the editor.

Want an RSS newsfeed for your website? Click here