• Congress, Want Jobs? Pass More Tax Extensions

    Bret Wincup photo
    Today, a House subcommittee is examining the value of tax extenders.  The tech sector is strongly supporting three key provisions that have major benefits for job creation and economic strength in the U.S.:  the research-and-development tax credit, the CFC look-through exception, and the active finance exception.  ITI submitted testimony for the hearing.  Here are some of the key points:   On the urgency [...]
    Share this post on:
    Continue reading
  • The White House Has It Wrong on Cybersecurity

    Tom Gavin, ITI photo
    Last night, the White House issued its Statement of Administration Policy (SAP) on H.R. 3523, the Cyber Intelligence Sharing and Protection Act, commonly called CISPA.  Unfortunately, the SAP does not reflect the changes that the bill’s authors – Republican Representative Mike Rogers of Michigan and Democratic Representative Dutch Ruppersberger of Maryland – had agreed to include after long and productive [...]
    Share this post on:
    Continue reading
  • Fact Check: Playing to Fears on Cybersecurity

    Tom Gavin, Vice President of External Affairs photo
    There is a last-minute effort to derail the bipartisan Cyber Intelligence Sharing and Protection Act (CISPA) by playing on people’s fears and stretching facts to the point of breaking.  The latest example comes from a blast email from the Electronic Frontier Foundation (EFF) urging people to call House members in opposition to the bipartisan cybersecurity bill.  This is from EFF’s suggested script [...]
    Share this post on:
    Continue reading
  • The Four House Cybersecurity Bills

    Nilmini Gunaratne Rubin photo
    ITI supports the four cybersecurity bills being voted on by the House of Representatives on Thursday, April 26th, because they help improve our personal security.  As we rely more on our computers, smart phones, and tablets for work, entertainment, banking, shopping and communicating, new breeds of cybercriminals, hacktivists, and rogue nations have become as adept at exploiting the vulnerabilities [...]
    Share this post on:
    Continue reading
  • Cybersecurity and You

    Meghan Fletcher photo
    We rely on our computers, smart phones, and tablets for everything from entertainment to balancing our checkbook. From our fleeting interests to our bank accounts, our lives are on our hard drives and in the cloud.  But new breeds of cybercriminals, hacktivists, and rogue nations have become as adept at exploiting the vulnerabilities of our digital world as our customers have become at taking advantage [...]
    Share this post on:
    Continue reading
  • Finding Common Ground on Privacy Protections in Cybersecurity

    Dean C. Garfield photo
    There has been a lot of focus in the cybersecurity debate about the cyber threat information sharing approach in the bipartisan Rogers-Ruppersberger bill and concerns about the privacy protections in the legislation.  That’s why ITI and a number of our member companies have been talking at length with the Center for Democracy and Technology (CDT) to try to find common ground that addresses privacy [...]
    Share this post on:
    Continue reading
  • America’s Space Shuttles: Models of Innovation

    Tom Gavin, Vice President of External Affairs photo
    photo by: NASA / Rebecca Roth Today, people along America’s east coast stood on rooftops, looked out windows, and followed online as the Space Shuttle Discovery flew from the Kennedy Space Center to its final home at the Smithsonian Institution’s Udvar-Hazy Center.  Here at ITI, we trekked to the roof for a moment’s glimpse of the shuttle as it passed over the National Mall.  The space shuttles – and [...]
    Share this post on:
    Continue reading
  • Regular Americans Deserve Better Cybersecurity

    Tom Gavin, Vice President of External Affairs photo
    New data that CDW released today bear out what ITI and the tech sector have been saying for a long time:  the American people deserve a cybersecurity defense that protects them much more effectively from cybercrime.   CDW asked IT security experts what they considered to be the most likely target of a cyber intrusion, and the answer was overwhelming.  Nearly 70 percent responded that personally identifiable [...]
    Share this post on:
    Continue reading
  • Cybersecurity = Personal Security

    Tom Gavin, Vice President of External Affairs photo
    Cybersecurity is taking center stage on Capitol Hill.  There are several bills expected to move through committee in the House this week, and there will continue to be a lot of attention paid to the idea of an enhanced cybersecurity threat information sharing system.  ITI is firmly behind a strengthened information sharing defense that protects people’s security while it also safeguards privacy.   [...]
    Share this post on:
    Continue reading
  • U.S. tax code a punch card in Pentium-chip world

    Dean C. Garfield photo
    The following op-ed appeared today in the McClatchy Tribune.   The recent trend of positive job numbers - while good - do not alter the fact that the U.S. tax code is an albatross weighing down our nation’s economy. The code is a case example of outdated punch-card policies having a punitive impact in a Pentium-chip world. To achieve our economic potential and ensure that our children are more prosperous [...]
    Share this post on:
    Continue reading