Ideas for the Mobility Strategy

Apps are easy… enterprise strategy, not so much

Government enterprise-wide mobile strategy cannot be limited to simply purchasing mobile devices. Agencies and departments need to recognize the need to establish short- and long-term plans and strategies for mobile deployment and mobile application development. Without a strategy for effectively using mobile in the federal space, mobile application and device deployment will be inefficient and costly.

Submitted by

Voting

25 votes
Active

Ideas for the Mobility Strategy

Update/develop government-wide mobility policies

Develop government-wide (vs agency-specific) policies, guidance, metrics, and tools to support and accelerate mobility adoption (one privacy policy, one accessibility policy, etc.).

Submitted by

Voting

17 votes
Active

Ideas for the Mobility Strategy

Strong Authentication!

Begin with a focus for updating guidance (e.g. FIPS-201, NIST SP800-53) to call out for the use of strong authentication credentials (PIV, PIV-I, CAC) with mobile devices. Yes, the idea of attaching an additional device/sled to a mobile device in order to swipe,store, or scan your PIV/CAC card sounds cumbersome. But there is no reason why mobile devices can't be tapped to enable technologies such as cert-cloning/biometrics ...more »

Submitted by

Voting

3 votes
Active

Ideas for the Mobility Strategy

Mobility Strategy means getting ready to Loose Control ...

Armed with powerful mobile devices, consumers and employees have become the force behind a wireless wave of change. Whether they are seeking where their tax refund is, looking for discounted prices, discussing/following/liking an idea or person, these mobile end-users are growing impatient with enterprises that are still trying to control behavior and the sharing of information. Enterprises that fail to learn how to give ...more »

Submitted by

Voting

2 votes
Active

Ideas for the Mobility Strategy

No Mention of IT, Information Assurance (IA) or Cybersecurity???

Wow ... what a great start! Kudos to All those involved in this challenging endeavour... As I was reviewing the DRAFT strategy, I found it really surprising with all the issues of BYOD, Privacy, Data @ Rest, DataNTransit and DataNUse that there is no mention of IT, IA or Cybersecurity? Are you going to place the security topics under the GOVERNANCE Core Objective? Or maybe you are considering that all .gov & .mil ...more »

Submitted by

Voting

4 votes
Active

Ideas for the Mobility Strategy

Begin with Government Specific Requirements

Too often government strategic plans neglect legislative and regulatory requirements imposed on the agencies. Rightly the focus is on opportunities to modernize and participate in new models technical transformations can offer. For the Federal Mobility Strategy to be successful, it must be implementable without unduly exposing agencies to legal and administrative risks. Legal and regulatory requirements for security, ...more »

Submitted by

Voting

7 votes
Active

Ideas for the Mobility Strategy

Digital Privacy Laws/Bill of Rights

Before any major initiative can even be discussed, the US government MUST pass laws to protect online speech at the same levels of offline speech. This must include, but not be limited to: - Warrants to access GPS signals - Bans on data mining of personal data (including anonymized approaches) - Bans on roving wiretaps - Bans against Deep Packet Inspection - Strict limitations on acceptable uses of cookies - 4th amendment ...more »

Submitted by

Voting

4 votes
Active

Ideas for the Mobility Strategy

Develop prototype mobile application for use in health reform

With implementation of the Affordable Care Act (ACA) in 2014, all consumers will be able to enroll in health coverage and apply for subsidies online. CMS will be issuing a prototype online application for use in states and should develop it in a manner that supports multiple platforms, including mobile. The effort should be supported by development of federal standards and protocols to ensure privacy, data security, ...more »

Submitted by

Voting

0 votes
Active