govloop logo link to homepage

  • Training
  • Resources
  • Video
  • NextGen
  • Blog
    • Community Posts
    • Career
      • Human Resources
      • Leadership
      • Policy
      • Professional Development
      • Project Management
    • Communications
      • Citizen Engagement
      • Digital Government
      • Social Media
    • Tech
      • Acquisition
      • Analytics
      • Artificial Intelligence
      • Big Data
      • CIO Conversations
      • Cloud
      • Cybersecurity
      • Emerging Tech
      • GIS
      • IT Modernization
      • Mobile
      • Open Data
    • State and Local
  • About Us
    • Partner With GovLoop
  • Register
  • Log In

Tech

Wash on Authentication as a User-Centric Activity

Rob Richards September 21, 2010

Mike Wash, Chief Information Officer of the U.S. Government Printing Office (GPO), has posted Authentication Is a User-Centric Activity, on his blog, The WashBoard.

Mr. Wash’s post identifies key issues respecting the authentication of digital government information — including U.S. federal legal information — and discusses GPO’s approach to authentication.

For other recent discussion of authentication of digital legal information, please see Sean McGrath’s post, Pssst…there is no such thing as an authentic/original/official/master electronic legal text, and Jason Eiseman’s VoxPopuLII post, Time to Turn the Page on Print Legal Information.

HT @propylonsean.

Tags: Authentication of digital legal documents, Authentication of digital legal information, Authentication of electronic legal documents, Authentication of electronic legal information, Digital legal publishing, FDsys, GPO, Jason Eiseman, jobs, Legal publishing, Mike Wash, Sean McGrath, U.S. GPO

Related Content

  • Agency Building with Money Shaking Out of It

    Take a Bite Out of Waste, Fraud and Abuse

  • Cybersecurity

    Best Practices in Zero-Trust Architecture

  • Chatbot

    What You Need to Know About Bots and CX

Leave a Comment

Leave a comment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Recent Articles on GovLoop

  • Take a Bite Out of Waste, Fraud and Abuse
  • Best Practices in Zero-Trust Architecture
  • How to Handle Fire Drills
  • July Online Training Opportunities
  • How to Minimize the Risk on the Road to AI
  • 5 Easy Ways to Practice Mindfulness at Work
  • Get Better Public Input During Policymaking
  • Cloud Security: Complex Threats, Clear Solutions
  • How to Secure an Agency’s Many Mobile Devices
  • Jump on June’s Online Training Opportunities  

Previous

The Federal Coach: Gen X And The Long Leadership Wait

Next

Getting Government Right Behind the Firewall

govloop grey logo link to homepage

© 2025 GovLoop

  • Help
  • Privacy Policy
  • Terms of Service
  • Sitemap
  • Do Not Sell My Personal Information
Cookie Preferences
Hi there! Thanks for spending time with GovLoop today. We want to let you know that we use cookies on this website to help improve your experience. Please let us know if you consent to cookies before continuing on the website.
Manage Settings.
x

Notifications