Sign In Subscribe
Hero Banner

|

☰
  • Home
  • News
    • Top Stories
    • US
    • World
    • Elections Polls
    • Business
    • Tech
    • The Media
    • Genz
    • Public Policy
    • AI News
  • Voices
    • Opinions
    • Proposals
    • Explainers
    • Influencers
    • Pundits
  • Multimedia
  • Get Involved
  • About
Donate
Home » Increasing Government Involvement in Technology
Proposals

Increasing Government Involvement in Technology

Alexis BerridgeBy Alexis BerridgeAugust 2, 2024Updated:December 2, 2025No Comments5 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
technology in the government
Share
Facebook Twitter LinkedIn Pinterest Email

Big Picture

Technology is as dangerous as it is necessary. Data leaks from organizations such as Solar Winds and, more recently, AT&T have made the need for defined security measures evident. American citizens’ data can be weaponized by foreign enemies and domestic criminals alike, yet the United States has minimal cybersecurity regulations. The Department of Defense (DoD) has requirements for contractors and subcontractors who provide technology to the government, but outside of this agency, little has been done.

Any type of regulation is slow going because of an ongoing debate between government agencies and private companies about who to hold responsible for data leaks and cybersecurity.

Those opposed to government involvement believe it will discourage technological innovation since technology producers fear the inability to shoulder the burden of any monetary cost that comes from meeting and keeping the requirements. If the U.S. imposes regulations, it risks declining as a technology powerhouse due to decreased efficacy.

Those in favor of regulation cite that car manufacturers are responsible for keeping their customers safe and technology producers should provide customers with similar protection.

Operative Definitions

  1. Sunset Law: A law that terminates after an appointed time unless further action is taken to extend it. A sunset law allows the government to reflect on a law’s success and decide if it’s appropriate to proceed or terminate it.
  2. Cybersecurity Maturity Model Certification (CMMC): A certification given to government contractors and subcontractors when they successfully meet and maintain the requirements of the enforcement program that protects sensitive information developed by the DoD.
  3. Social Engineering: The tactic of manipulating a targeted victim through deception or influence to gain control of their sensitive online information, whether that be a computer system or their financial information.

Important Facts and Statistics

  1. 45% of experts cited fear of cyber incidents as their top concern for business interruptions. The attacks included tactics like compromising passwords with each incident estimated to cost around $384,598 in 2019.
  2. According to a study conducted by Apple in 2023, the cost of cybercrime damage is projected to grow to $10.5 trillion by 2024.
  3. 98% of cyberattacks rely on social engineering.
  4. The FBI Internet Crime Report indicates that over 300,497 complaints were filed about phishing schemes in 2023.

5-Step Plan

  1. Establish a security expectation baseline

A security standard that is both effective and manageable must be implemented. The best course of action is to utilize the system already in place but modify it for nongovernmental companies. The Cybersecurity Maturity Model Certification (CMMC) has three levels of protection depending on what type of information a contractor is handling. For companies operating outside of the government sphere, level one, the minimal requirement, will suffice. The only difference required is that instead of protecting Federal Contract Information (FCI), the focus will shift to user information. 

2. Implement Subsidies

In order to incentivize producers to obtain a CMMC level, the government should implement subsidies in the form of a tax break.

3. Mandate information distribution

All technology-producing companies that sell to customers should be required to educate customers about the nuances of implementing two-factor authentication, changing passwords yearly, social engineering and general email phishing scams. The method of distributing this information is not fixed. Companies are not responsible for ensuring that customers follow the information, however, they are required to present it. Compliance will be monitored by a third-party government contractor. 

4. Create a Failure to Comply Penalty

It is important to impose a fitting punishment for failing to comply with the information distribution mandate. Should the third-party contractor find that an organization fails to comply, civil or criminal enforcement will be introduced.

5. Evaluate Competitive Technology Production.

A four-year sunset law will ensure that the policy is reviewed again. Implementing the law will allow the government to assess the mandate’s outcome and see if the minimal requirement needs to be raised, dropped or extended. The policy’s success will be measured against the most recent phishing scheme number available from the FBI’s Internet Crime Report this year. Following the end of the policy’s four-year period, the number must have dropped by 5% to be considered effective.

Why This Initiative Is Important

Allowing companies to create without production limitations is important to keep the U.S. technologically advanced. However, it is vital that users are informed about basic security measures and know how to protect themselves, mandating behavior and not technology. Additionally, incentivizing organizations to increase cybersecurity measures will raise the standard of cybersecurity on a national level.

Cybersecurity is a national threat actor, and regulation in this sector shouldn’t be overlooked in the wake of political unrest. The policy, with its expiration date, leaves room for improvement, which during current global unrest and Russia’s attacks, is crucial. Finally, the policy meets the operating goal, to maintain the U.S.’s goal to stay technologically competitive, and does not force organizations to comply with unrealistic or difficult standards.

Acknowledgment: The opinions expressed in this piece are those of the individual author.

Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleWhere Are You, Gen Z?
Next Article Gen Z, Climate Policy, and the Potential Presidential Nominee
Alexis Berridge
  • X (Twitter)
  • Instagram
  • LinkedIn

Hello, I'm Alexis Berridge, and I am a California State University, Long Beach Alumni. I majored in English Rhetoric and Composition and began my internship at Our National Conversation (ONC) as a Science, Environment and Technology Policy Writer in April 2024. My interests lie in science and environmental policy, and in today's world, technology frequently weaves itself into both policy areas. l spend most of my time researching current issues, watching films and reading romance novels.

Related Posts

The People v. Partisan Control

March 6, 2026

The Importance of Sleep for Teenagers

February 20, 2026

Affordable Medications for a Healthier America

December 9, 2025

The Dangers of Court Packing

December 9, 2025
Leave A Reply Cancel Reply

HOT TAKES

Pakistan’s Hypocrisy

March 6, 2026

The TikTok Power Grab

March 5, 2026

So Long, “ICE Barbie”

March 5, 2026

Leftists’ Selective Outrage Over Iran War

March 4, 2026
Connect with Us
  • Facebook
  • Twitter
  • Instagram
  • LinkedIn
Don't Miss
Culture

Political Humor Roundup: The First Week of March 2026

By Jason LunaMarch 6, 20260

1. Biden Asks Why Trump Didn’t Just Bomb Ayatollah In The Leg – The Babylon…

Kristi Noem Replaced as Head of Homeland Security

March 6, 2026

Pro-Palestinian Green Party Candidate’s Anti-Israel Agenda Fuels Senate Hearing Stunt

March 6, 2026

The Great MAGA Unraveling

March 6, 2026
Subscribe to ONC's Newsletter

Get the latest balanced blend of news, opinion and policy proposals from OUR NATIONAL CONVERSATION. Published weekly.

Our National Conversation

Less Hate. More Debate.

HOME NEWS VOICES MULTIMEDIA GET INVOLVED ABOUT
Donate