ACM Washington Update
February 9, 2015
Vol. 19, Issue 1
ACM Washington Update



ACM Washington Update recaps ACM’s initiatives in the U.S. technology policy arena monthly.  Please forward this newsletter to friends and colleagues in the computing community.  View more details on each item below, as well as on the blog. Follow USACM on Twitter and Facebook.

  • USACM issued a press statement on President Obama's comments on privacy and security in his State of the Union Address.
  • In his State of the Union address and remarks leading up to it, President Obama outlined several computing-related policy initiatives and legislative proposals.
  • The White House will hold a Summit on Cybersecurity and Consumer Protection on February 13 at Stanford University.
  • The National Institute of Standards and Technology and the Election Assistance Commission are co-sponsoring a symposium on voting systems technology.
  • The first round of comments has closed on proposed exemptions to the prohibitions against circumvention in the Digital Millennium Copyright Act.

to the top


Following President Obama's State of the Union address on January 20, USACM issued a press statement.
In the statement, USACM reiterated its belief that privacy is important and that we do not have to reduce it to enhance security. USACM's extensive experience shows that effective security can be achieved without sacrificing individual privacy. Both governments and businesses need to develop effective privacy and security policies to provide benefits to consumers and commercial interests alike.
The full statement is available online.

to the top


In his State of the Union address, and remarks leading up to it, President Obama outlined several computing-related policy initiatives and legislative proposals.
On January 12 the President spoke at the Federal Trade Commission. He announced three legislative proposals. The first called for a national data breach notification standard, where companies must notify affected consumers within 30 days of discovery of the breach. The second focused on student data privacy, and is modeled after a California law that limits the collection, sale and use of student information to educational purposes. The other legislative proposal would create a new Consumer Privacy Bill of Rights.
On January 13 the President spoke at the National Cybersecurity and Communications Integration Center of the Department of Homeland Security. His remarks focused on cybersecurity, announcing legislative proposals on cybersecurity information sharing, updating laws to help combat cyber crime, and Department of Energy grants for a cybersecurity education consortium. He also announced a summit on cybersecurity and consumer protection that will take place February 13 at Stanford University.
On January 14 the President announced new initiatives related to broadband Internet deployment. His remarks focused on lowering barriers that make it difficult for cities to develop their own broadband networks, and expanding grants, loans and existing partnerships that support broadband development and deployment. There will be a June 2015 summit on community broadband.
On January 16 the President met with Prime Minister David Cameron of the United Kingdom. The two leaders discussed cybersecurity and made a joint announcement on the two nations' latest cooperative efforts. The UK and US intelligence and law enforcement agencies will work together on cyber defense and cybersecurity information sharing in a new cybersecurity 'cell' where each country will have personnel in the other. The two countries will also work together on joint cybersecurity and information sharing exercises. They will also work together on a Fulbright cybersecurity award and a Cambridge (MIT) vs. (University of) Cambridge cybersecurity contest.

to the top


President Obama announced last month that the White House would host a Summit on Cybersecurity and Consmer Protection on February 13. It will take place on the Stanford campus, and include people from federal government agencies, law enforcement, technology companies, universities (faculty and students), and consumer and privacy advocacy organizations.
Topics to be addressed during panel sessions during the Summit include:
  • Public-Private Collaboration on Cybersecurity
  • Improving Cybersecurity Practices at Consumer-Oriented Businesses and Organizations
  • Promoting More Secure Payment Technologies
  • Cybersecurity Information Sharing
  • International Law Enforcement Cooperation on Cybersecurity
  • Improving Authentication: Moving Beyond the Password
  • Chief Security Officers' Perspectives: New Ideas on Technical Security

to the top


The Future of Voting Systems Technology Symposium II will take place February 9-10 at the Department of Commerce headquarters in Washington, D.C.
The symposium is co-sponsored by the National Institute of Standards and Technology (NIST) and the Election Assistance Commission (EAC). It follows the 2013 symposium hosted by NIST and the EAC at NIST's Gaithersburg, Maryland headquarters. Based on the draft agenda, the first day will focus on trends in voting systems, and will discuss human factors, security, voting standards and electronic pollbooks. Breakout sessions on the second day will focus on new technologies across several voting topics, including auditing, testing, usability, and accessibility.
All three of the current EAC Commissioners (Thomas Hicks, Matthew Masterson and Christy McCormick) are scheduled to attend, as is the Acting Director of NIST (Dr. Willie May). Tammy Patrick, senior adviser to the Democracy Project at the Bipartisan Policy Center, will give a keynote on the 9th.

to the top


February 6 was the closing date for the first round of public comments on 27 proposed exemptions to the prohibitions against circumvention under the Digital Millennium Copyright Act (DMCA). The first round was limited to supporters of the exemptions and neutral parties. The Copyright Office now will accept public comments from opponents until March 27. Reply comments will be due May 1.
This process takes place every three years. Exemptions are intended to be "narrow and focused" and are granted for limited time periods. Based on prior rulemakings, the final exemptions likely will be announced in September or October.
The 27 proposed classes of works (chart) would allow exemptions for education, derivative works of digital content, jailbreaking of wireless and mobile devices, security research, access to information in networked medical devices, use of non-manufacturer-approved feedstock in 3D printers, and use of abandoned video game software and music recording software.

to the top


About Washington Update -- ACM Washington Update is produced by the ACM Public Policy Office. It highlights activities of the ACM U.S. Public Policy Council (USACM) and the ACM Education Policy Committee (EPC), as well as other events in Washington that affect the computing community.

About USACM -- The ACM U.S. Public Policy Council (USACM) is the focal point for ACM's interactions with U.S. government organizations, the computing community, and the U.S. public in all matters of U.S. public policy related to information technology.

About EPC -- The ACM Education Policy Committee (EPC) engages policymakers and the public on public policy issues that relate to computer science and computing-related education, including the importance of high-quality education at all levels to the labor market and the economy.

Views expressed are not necessarily those of ACM. To send comments, please write to

To subscribe to ACM’s Washington Update newsletter, send an e-mail to with “subscribe WASHINGTON-UPDATE “First Name” “Last Name” (no quotes) in the body of the message.
To unsubscribe, simply include the “SIGNOFF WASHINGTON-UPDATE” command in an email to
As an alternative, enter your email address at: and we’ll remove you.
If in the future you’d like to re-subscribe, please enter your address at
You can also subscribe or unsubscribe by clicking the links on the right-hand column of the web edition of this newsletter.

to the top


Copyright © 2015, ACM, Inc.
All rights reserved



About ACM | About USACM | Contact us | Tech Policy Blog | ACM Membership | ACM Privacy Policy | ACM Code of Ethics

Copyright © 2015, ACM, Inc.