Government Technology

Bozeman, Mont., Rescinds Password Requirement for Job Applicants



June 21, 2009 By

When Bozeman, Mont., officials announced that government job applicants must surrender their login and password to their social networking sites such as MySpace and Facebook, bloggers and media said the city was violating privacy and officials were "out of their minds." On Friday the city released a statement rescinding the order, saying: "The extent of our request for a candidate's password, user name, or other Internet information appears to have exceeded that which is acceptable to our community." The city has terminated the practice until a more comprehensive evaluation of the practice can be conducted.

In 2007 Bozeman and neighboring Missoula were found to be high in identity fraud activity.


| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Better security. Better government.
Powering security at all levels of government with simpler, more connected IT.
Cybersecurity in an "All-IP World" Are You Prepared?
In a recent survey conducted by Public CIO, over 125 respondents shared how they protect their environments from cyber threats and the challenges they see in an all-IP world. Read how your cybersecurity strategies and attitudes compare with your peers.
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
View All

Featured Papers