Home » post » Federal Document Authentication–What level is appropriate?

Our mission

Free Government Information (FGI) is a place for initiating dialogue and building consensus among the various players (libraries, government agencies, non-profit organizations, researchers, journalists, etc.) who have a stake in the preservation of and perpetual free access to government information. FGI promotes free government information through collaboration, education, advocacy and research.

Federal Document Authentication–What level is appropriate?

As I am sure you know, we at GPO have been talking with the library community for several years now about our authentication efforts. This year, we were able to move beyond the discussion phase and implement authentication technology into some of our top GPO Access applications. In early 2008, we integrated an Automated PDF Signing system into our GPO Access workflows, and we successfully released the digitally signed and certified FY 09 Budget of the United States and 110th Congress Public and Private Laws documents on GPO Access. Digitally signing these publications was just the stepping stone for implementing our authentication initiative. Upon approval from publishing agencies, all publications ingested into the Federal Digital System (FDsys) will be digitally signed and certified in the future.

In addition, we will implement authentication technology at the granular level. Granular content, as described in relation to the FDsys, is content that is broken into smaller content units such as chapters, parts, or sections. Our next challenge is to identify at what level of granularity content should be authenticated and digitally certified for each content format. I am very interested in feedback on your thoughts on the level of granularity GPO should authenticate content to share with the team developing FDsys. I am also interested in learning more about your opinions and expectations for the future in relation to GPO’s authentication initiative. For more background on our authentication initiative, please visit http://www.gpoaccess.gov/authentication/.

CC BY-NC-SA 4.0 This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.


Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Archives