« PreviousContinue »
S. HRG. 98-440
COMPUTER SECURITY IN THE FEDERAL GOVERN-
OVERSIGHT OF GOVERNMENT MANAGEMENT
OCTOBER 25 AND 26, 1983
Printed for the use of the Committee on Governmental Affairs
U.S. GOVERNMENT PRINTING OFFICE
Letter to Senator William S. Cohen from Robert P. Campbell, president,
OMB Circular No. A-71, "Responsibilities for the Administration and Man-
ment, U.S. Department of the Treasury, August 30, 1983..
COMPUTER SECURITY IN THE FEDERAL
TUESDAY, OCTOBER 25, 1983
SUBCOMMITTEE ON OVERSIGHT OF
COMMITTEE ON GOVERNMENTAL AFFAIRS,
The subcommittee met at 2:05 p.m., in room SD-342, Dirksen Senate Office Building, Hon. William S. Cohen (chairman of the subcommittee) presiding.
Present: Senators Cohen and Bingaman.
Staff present: Susan M. Collins, staff director; Mary B. Gerwin, counsel; Peggy W. McGaffigan, professional staff member; Winthrop S. Cashdollar, professional staff member; Frances C. deVergie, chief clerk; Rachel D. Harlan, assistant chief clerk; Linda J. Gustitus, minority staff director and chief counsel to the minority; and Claudette V. Humphreys, minority counsel.
OPENING STATEMENT OF SENATOR COHEN
Senator COHEN. The subcommittee will come to order.
Today, the Subcommittee on Oversight of Government Management begins 2 days of hearings on the adequacy of computer security within the Federal Government and in the private sector.
The increasing prominence of computers in both the private sector and the Government has raised serious ethical, legal, and administrative questions regarding their use and abuse.
This subcommittee has had a standing interest in issues pertaining to the role of computers in Government management and operations. Last December, I chaired hearings on the use of computer matching to detect waste, fraud, and abuse in Government programs. At those hearings, the subcommittee examined the implications of computer matching for the privacy rights of individuals.
Today and tomorrow, I hope to pursue the questions of what is being done and what remains to be done in order to protect the Government and private concerns from losses suffered through the abuse of their computer systems.
Reflection upon the pervasiveness of computers in our society and upon recent accounts of the abuse of these computers makes clear the imperative to attend to the security of these systems. The rapid evolution, diversification, and application of computers in business, banking, the Government, and the home have worked a