►
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
Hello,
frank
well
done,
and
jonathan,
hey
jonathan,
welcome.
Everyone
meeting
call
to
order
any
public
comment
before
we
get
started.
A
I
hearing
none
we
tonight
we
jamie
is
is
here
from
dts
and
she
really
wants
to
use
the
commission
as
a
sounding
board,
as
she
said,
as
we
were
just
chatting
before,
the
meeting
started
that
she
really
knew
that
we
were
thinking
about
some
of
the
privacy
issues,
and
so
she
just
wanted
to
share
some
of
their
thinking,
and
this
is
the
first
privacy
policy
right
jamie.
There
isn't
one
be
quote-unquote
a
current
one
right.
This
one
is
the
is
the
brand
new
so.
B
A
Great
great
okay
well
without
further
ado,
because
certainly
you're
welcome
to
stay
the
whole
time
jamie,
but
we
and
and
richard
I
know
you're
on
so
welcome
and
but
one.
C
A
Oh
our
pleasure
so
over
to
you
jamie.
B
We
all
we
would
be
the
pros
at
not
starting
to
talk
under
mute
anyway.
For
those
I
haven't
met
and,
as
mary
said,
I'm
jamie
lee's.
I
work
for
jack
and
richard
and
the
county's
technology
services
department,
as
our
first
chief
data
officer,
and
that
has
been
an
amazing
experience
embracing
many
things,
including
now
privacy,
and
so
this
is
an
area
where
I
have
learned
a
great
deal
from
my
colleagues
from
other
jurisdictions
and
I'm
now
looking
to
get
some
input
from
your
perspective.
B
B
Do
these
sound
familiar
and
resonate
with
you,
or
are
we
missing
some
things
or
does
it
you
know?
Do
they
raise
some?
We
talked
earlier
before
the
meeting
started
about
being
wary
of
technology.
Are
we
hitting
that,
so
let
me
get
to
next
slide
there
we
go
so
the
reason
we
are
talking
about
this
two
themes
are
driving
the
development
of
this
work.
First,
we've
been
handling
personal
information
for
years
as
being
an
operational
necessity.
This
is
we
in
some
cases.
We
need
this
information
in
order
to
do
the
business
of
government.
B
What
is
changing
and
what
makes
this
inherently
risky
is
the
new
technologies
out
there
that
are
collecting
data
at
an
extraordinary
rate
and
doing
so
digitally,
which
exposes
us
to
cyber
security
risk
in
particular,
so
that
is
sort
of
the
operational
aspect
of
it.
The
other
aspect
is
what
brian
was
referring
to
the
engagement
piece
in
order
for
our
services
to
work
for
you,
you
need
to
trust
us,
so
transparency
and
responsible
handling
are
key
to
making
sure
we're
doing
what
you're
expecting
us
to
do
in
an
area.
D
B
Thank
you.
I
appreciate
it.
It's
a
it's
an
odd
view
on
my
laptop,
where
I
can't
see
anybody,
I'm
just
looking
at
my
slides.
So
it's
all
right.
It's
a
weird
thing
to
just
be
looking
at
the
blank
screen,
so
so
the
privacy
principles
we're
going
to
talk
about
should
be
reflecting
what
you
expect
of
us
of
your
government
and
then
the
policy
is
filling
in
the
specific
gaps
where
federal
and
state
regulations
are
undefined.
B
B
One
of
the
first
tasks
we
did
was
to
look
at
a
high
level.
What
information
are
we
collecting
across
the
different
departments?
And
we've
broken
this
out
into
two
categories-
information
that
you
affirmatively
provide
to
us
and
information
that
we
collect
automatically
from
you.
So
I've
got
some
visuals
here,
but
I'm
going
to
go
into
a
little
more
detail
in
the
next
screens.
B
So
some
of
the
information
that
you
provide
to
us
affirmatively
is
things
like
contact
information.
Your
name
address
phone
number
email
when
you're
requesting
a
location,
specific
service,
or
you
want
to
return
reply.
Those
would
be
some
examples
of
why
we
would
need
it
other
times
we
would
be
collecting
bank
account
or
credit
card
information
when
you're
initiating
a
financial
transaction.
B
In
some
cases
we
need
biographical
information,
demographic
information,
age,
gender,
language
income.
When
we
need
that
information
in
order
to
qualify
you
for
a
service
and
last
identification,
information
driver's
license
numbers
social
security
numbers,
any
sort
of
unique
id
when
we
are
specifically
needing
to
verify
your
identity.
B
The
so
this
is
not
a
comprehensive
list,
as
you
can
imagine,
but
it
is
to
give
you
a
sense
of
what
we're
talking
about
the
before
I
move
on
from
this.
B
We
want
to
know
who
is
using
or
who
is
not
using
a
service,
in
which
case
we
would
let
you
know
that
that
information
is
optional
to
provide,
and
you
would
not
see
any
degradation
of
service
or
anything
back
to
your
service.
If
you
chose
not
to
provide
it,
then
the
second
category
is
information.
We
automatically
collect
and
receive
from
you.
B
So
there's
one
more
area
of
information
collection
that
the
policy
addresses
and
that's
information
that
we
get
from
third
party
contractors,
people
with
whom
we
do
business
to
support
our
government
operations.
So,
for
example,
when
you
pay
a
bill
online,
that
is
through
a
third-party
service,
and
you
know
we
get
them
payment,
but
you're
using
a
third-party
service.
B
We
do
use
tools
across
the
county
for
monitoring
security,
monitoring,
forms
and
surveys,
web
traffic
monitoring,
and
these
are
key
to
efficiency
and
focusing
on
our
core
business
and
supporting
the
companies
that
have
tools
that
make
this
these
operations
smoother.
Some
of
the
challenges
in
this
area
is
that
these
vendors
have
their
own
privacy
policies
and
we
don't
necessarily
have
input
into
that
policy,
especially
as
we
are
starting
our
program
now.
B
B
We
developed
four
guiding
principles.
These
again
are
all
based
on
managing
a
trust
relationship
with
the
public.
So
it's
particularly
here
that
we
are
aspiring.
This
is
where
we
want
to
be.
This
is
what
the
organization
we
think
we
should
be
regarding
personal
information,
so
I'm
briefly
going
to
walk
through
those.
I
welcome
any
questions
and
reactions.
B
The
first
one
we've
already
mentioned
minimum
necessary.
We
only
want
to
collect
personal
information
that
we
have
to
have.
If
we
don't
have
the
information,
it
does
not
pose
a
cyber
security
risk,
it
does
not
pose
a
trust
risk,
so
let's
be
thoughtful
in
what
we
collect
and
why
the
next
one
is
quality.
B
If
we
are
going
to
go
to
the
effort
of
asking
for
your
personal
information-
and
you
are
going
to
entrust
it
with
us-
we
want
to
make
sure
that
we
have
methodology
that
allows
it
to
be
accurate
so
that
when
we
use
it
for
these
purposes,
we
are
hitting
the
right
things.
We
are
learning
what
we're
supposed
to
learn
from
the
personal
information
and
offering
the
kinds
of
services
you
would
expect
the
next
one
is
transparency.
B
This
is
a
key
piece
to
the
puzzle.
It's
not
about
what
we
do.
It's
about
communicating
what
we
do.
Why
are
we
collecting
it?
What
are
we
doing
with
it?
Who
will
see
it
all
of
those
things
and
communicating
that
information
out
to
you
you're,
going
to
hear
a
little
bit
more
about
how
we
would
propose
to
do
that?
Next
stewardship
is
the
final
principle
and
that's
our
operational
commitment.
We
make
sure
we
secure
and
protect-
and
this
is
a
big
job
as
as
richard
and
jack
and
fairfax
public
schools
can
attest.
A
Jackie,
I
think,
you're
on
mute.
She
put
it
in
the
chat
as
well
I'll
and
then
she
can
follow
up.
She
said
she'd
like
to
know
how
law
enforcement
collected
information
is
categorized
an
example,
the
body
cams
traffic
cams,
the
privacy
issues
in
in
that
category.
How
would
you.
B
So
I
don't
think
that
the
principles
are
categories,
but
the
technologies
would
each
be
looked
at
individually.
That's
one
of
the
you're
asking
a
huge
and
big
and
important
question.
The
overall
policy
says
here's
the
guard
rails
that
we're
looking
to
follow,
and
then
we
are
going
to
have
to
have
very
specific
examination
of
a
particular
technology
or
practice
or
method.
So,
in
the
case
of
body,
worn
cameras,
I
know
public
safety
is
already
well
into.
B
What
are
we
collecting?
How
are
we
using
it
and
and
looking
to
communicate
that
out
with
the
public
and
in
coordination
with
this
privacy
discussion?
So
if
you're
picturing,
what
is
being
worn
as
a
camera,
then
information,
that's
being
collected
is
being
automatically
collected,
you're,
not
providing
it
right,
so
it
would
fall
into
that
automatically
collected
category.
A
B
Commitment
is
fall
under
the
stewardship
principle,
but
the
actual
retention
would
be
based
on
law,
so
the
virginia
records
act.
If
it
specifies
the
type
of
information
it
is,
we
would
follow
it
to
that.
If
it
does
not,
we
would
keep
it
as
short.
The
aim
the
aspirational
goal
in
these
principles
would
be
to
keep
it
as
short
a
time
as
we
needed
to
use
it
and
then
dispose
of
it
carefully
to
make
sure
it's
not
at
risk
of
being
captured
during
the
disposal
process.
B
Exactly
so
the
next
thing-
and
maybe
this
is
a
good
segue
to
the
next
slide.
The
policy
is
the.
How
do
we
do
this,
and
these
questions
are
we're
committing
to
address
them
in
the
policy
document
and
the
means
by
which
we're
doing
that
situationally
is
through
something
we're
calling
a
privacy
impact
assessment.
B
B
So
you
don't
have
to
find
privacy
on
every
page
that
you
go
to
or
every
digital
service
that
you
interact
with,
or
even
when
you're
filling
out
a
paper
form
or
calling
somebody
or
participating
in
social
media,
the
privacy
arlington
va.us
website.
We
would
propose
to
be
the
one
stop.
It
would
have
this
policy,
the
county-wide
one,
but
also
body-worn
cameras,
video
departmental
specific
things
like
how
libraries
handles
the
information
that
they
have
about
who
has
borrowed
what
these
cut.
B
Okay,
so
other
things
that
would
be
on
this
website.
We
mentioned
the
policy
already.
We
would
have
these
department,
specific
policies
and
technology,
specific
policies,
the
privacy
impact
assessment
reports
and
then
also,
as
we
mentioned
before,
any
third-party
policies
that
people
should
be
aware
of.
There
will
also
be
the
ability
to
interact
with
us.
Ask
the
questions,
so
this
presentation
wouldn't
be
the
only
time
you
would
have
a
chance
to
do
that.
B
So
I
want
to
move
on
a
little
bit
to
when
we
do
share
this
information
in
some
cases,
as
I
think
you
have
already
interacted
with
in
in
this
itac
environment.
You
know
about
these.
Maybe
they
are
familiar
in
some
cases
we
are
required
to
share
information.
B
Public
records
are
defined,
so
certain
things
are
considered
a
public
record
and
must
be
shared
upon
request
or
are
proactively
shared.
The
virginia
freedom
of
information
act,
so
foia
requests.
B
If
it
is
not
specifically
exempted,
it
can
be
requested
and
again
might
be
proactively
published
if
it
is
not
exempt
and,
of
course,
lawful,
court
orders
such
as
subpoenas,
so
by
default
we
are
not
just
an
open
organization
where
every
department
can
see
everybody
else's
information,
including
law
enforcement.
They
would
still
be
required
to
have
a
subpoena
to
get
information
that
they
didn't
collect
as
well.
B
On
the
flip
side
of
that
coin
is
information
we're
never
going
to
share.
So
if
it
is
regulated
by
law
such
as
the
health
records
law
hipaa,
then
we
are
not
going
to
share
it.
There
are
other
protected
groups
that
have
specific
law
around
them,
such
as
children
or
victims
of
domestic
and
sexual
violence.
In
these
cases,
we
will
always
when
this
information
needs
to
be
collected,
we
will
always
aggregate
it
up
to
a
level
that
does
not
allow
for
personal
identification
and
then
there's
the
middle
ground
situational
information
sharing.
B
Some
reasons
for
this
would
be
regional
partnerships,
so
we
have
a
public
safety
and
emergency
response
network
a
go
to
somebody
911
alexandria
and
vice
versa,
and
we
have
a
council
of
governments
that
is
a
regional
organization.
In
order
to
handle
situations
that
are
regional
in
nature.
We
might
share
our
information
there.
We
partner
with
university
research
labs,
for
example.
B
A
E
This
is
david
husband.
I
wanted
to
say
that
first
of
all,
this
all
sounds
wonderful.
As
you
know,
I'm
a
big
advocate
of
the
county
taking
privacy
seriously,
and
this
all
sounds
good.
Two
two
questions,
one
of
which
is
easy.
Have
what
did
we
share
the
draft
policy?
Did
you
share
the
draft
policy
with
us
and
I'm
just
not
seeing
it
or
not
yet.
B
B
E
I
do
I
like
to
read
along
I
like
to
read
ahead.
I
like
to
read
behind
and
then
the
second
thing
is
all
this
stuff
sounds
really
good
sounds
like
you
guys
are
following
some
of
the
best
practices
best
principles.
It's
a
lot
of
work
is
what
it
sounds
like.
How
are
you
gonna
like
actually
get
all
these
data
sharing
agreements
together
list
all
the
privacy
policies
like?
What's
your
staff
and
your
timeline.
B
B
It's
clear
that,
in
order
to
have
a
privacy
program,
we
need
to
resource
it
that
has
not
prevented
us
over
the
last
year
and
a
half,
though,
from
making
incremental
progress,
drafting
a
policy
drafting
the
principles,
doing
a
high
level
inventory,
developing
the
privacy
impact
assessment,
driving
an
internal
work
plan
and
proposing
to
do
this
work
situationally
project-based,
so
we're
still
learning
and
growing
and
getting
feedback
from
folks.
Like
you
to
say,
if
there
are
lessons
learned
in
best
practices,
let's
be
informed
with
them.
B
B
It
is,
it
is
the
it
came
out
at
the
perfect
time
for
us,
and
so
it
has
given
us
a
work
plan
and
a
series
of
recommendations
to
put
forward
to
the
county
manager
to
consider
you
know,
how
do
we
do
this?
When
do
we
do
this,
and
you
know
how
do
we
become
a
privacy,
informed
organization,
okay,.
G
Yes,
you
could,
you
say
some
more
about
the
high
level
inventory.
One
of
the
issues,
of
course,
that
we've
had
on
systems
in
general
is
that
we
don't
have
a
an
inventory
of
all
of
the
I.t
systems
that
we
have
because
they're
so
decentralized.
G
G
B
B
So
what
we
have
done,
I
would
consider-
and
when
I
said
high
level,
I
would
also
add
more
informal,
so
it
is
not
in
a
system
we
have
not
invested
in
software
or
developed
a
solution
to
collect
this.
What
we
did
was
came
up
with
an
interview
and
we
met
with
representatives
in
every
county
department
who
reached
out
to
their
people,
and
we
said
what
s?
What
do
you
know
that
you
collect
in
the
way
of
personal
information?
B
How
is
it
categorized
who
has
who
manages
access?
Does
it
have
a
retention
schedule?
So
we
asked
a
fairly
lengthy
interview
and
then
we
compiled
that
organizationally
to
get
a
picture
of
what
we're
talking
about
here.
How
much?
How
many
departments
you
know
are
there
challenges
records
retention
is
a
challenge
you
know
when:
how
long
do
we
keep
it?
B
So
it
was
really
for
the
purpose
of
informing
the
principles
and
an
internal
work
plan,
but
one
of
the
recommendations
is
an
actual
inventory
so
to
catalog
that
personal
information
that
we
have
the
risks
associated
with
it
and
such
as
you
said
that
is
an
enormous
undertaking
and,
as
david
made
a
point
that
that
would
have
to
be
resourced
in
order
to
be
done,
so
we
just
have
to
see
where
it
fits
in
it.
It
remains
a
challenge,
just
as
it
does
with
apps.
B
G
Do
of
your
your
say,
any
kind
of
a
rough
you
know
spreadsheet
rather
than
database,
but
you
know
a
rough
indicator
of
what
how
what
some
of
the
answers
are
to
your
categories
of
questions
like
what
you
know
where
data
is
stored
and
how
long
it's
stored
and
who
you
know
how
it
what
the
security
issues
are
for
protecting
it,
those
kinds
of
things:
do
you
get
from
your
interviews?
Did
you
get
a
good
sense
of
what
the
key
challenges
are.
B
I
mean
I
I'd
like
to
think
so
that
I,
what
I
know
is
there's
plenty.
We
don't
know
you
know
one
representative
or
even
the
three
or
so
that
we
have
from
our
environmental
services
department,
isn't
going
to
cover
1100
people's
work.
You
know
it's
just.
There
will
be
surprises
for
sure
what
I
feel
was
given
the
level
of
effort
and
staff
commitment
that
we
were
able
to
dedicate.
B
A
Out
of
my
could
someone
mute
thank
you
mike
you're
next.
H
All
right
so
jamie,
this
is
a
subject
of
great
interest
to
me.
Glad
to
have
you
here.
I
took
the
time
at
the
beginning
of
this
pandemic
when
we
all
thought
it
was
going
to
be
about
eight
weeks
long
or
maybe
12.,
to
write
down
a
lot
of
thoughts
about
privacy,
protection
at
the
county
government
level
and
about
the
public
trust
dimensions
of
this.
So
I
just
want
to
recommend
that
to
you
as
something
to
look
at
much
of
what
you
said
is
sort
of
along
the
same
lines.
H
But
two
quick
points
I'd
like
to
raise-
and
one
is,
I
assume
what
you're
saying
is
that
what
privacy
policies
and
practices
exist
were
shaped
to
avoid
violating
federal
or
state
law,
which
of
course,
is
necessary.
But
in
my
judgment
it's
not
nearly
sufficient
because
the
federal
regime
is
so
incomplete,
and
so
I
would.
I
would
ask
the
local
government
to
take
a
position.
That's
a
little
more
like
like
a
consumer
protection
position
regarding
its
citizenship
and
the
folks
who
are
conducting
business
in
the
county
and
I'd
say
most
particularly.
H
I
don't
doubt
that
commercial
providers
have
their
own
privacy
policies,
but
they
do
not
get
to
subject
arlington
and
arlington
citizens
to
them
of
their
own
volition.
I
mean
arlington
could
say
we're
seeking
a
service
provider
for
this
information
technology
support
service,
and
we
will
only
consider
bids
that
have
certain
privacy
provisions
in
them.
So
so
I
thought
it
sounded
to
me
like
we
had
that
a
little
backwards.
H
You
know
what
I
mean
that
we
don't
need
to
contort
ourselves
to
fit
into
the
the
sometimes
less
than
balanced
privacy
policies
that
exist
with
commercial
software
products
and
service
providers
and
and
just
to
say,
the
last
piece
on
that
any
any
strategy,
that's
primarily
about
legal
risk
minimization,
I
would
say,
is
necessary,
but
far
from
complete,
you
know
we
don't
want
to
just
avoid
being
in
the
wrong
end
of
a
lawsuit.
B
I
mike
I
thank
you
for
those
comments.
I
think
they
they
really
strike.
What
a
lot
of
people
that
were
in
this
internal
data
steering
group
were
saying
as
well.
The
law
is
as
far
as
we
have
gone,
because,
of
course
we
have
to
you
know
we
to
jackie's
point.
We
didn't
find
huge
smoking
guns
where
we're
just
sitting
with
data
out
on
tables
or
anything
like
that,
it's
much
more
subtle
than
that.
B
It's
a
cultural
shift
that
speaks
to
the
ambiguity
of
the
law,
there's
simply
not
enough
law
to
match
all
of
the
stuff
we're
collecting.
B
B
That
is
a
starting
point.
We
will
have
to
refine
it
over
time,
but
I
think
we
need
that
position
and
with
the
commercial
providers
with
whom
we
do
business
again.
I
think
before
this
was
a
thing
you
were
sort
of
captive.
If
you
wanted
to
do
business,
you
you
took
that
now
we
can
be
more
proactive
to
say
what
are
you
collecting?
Do
you
even
need
to
collect
all
of
this
information?
B
Do
you
need
to
keep
it
after
you've
processed
the
transaction?
We
have
the
ability
to
wield
more
influence
in
those
discussions,
but
that's
more
of
a
day
forward
approach.
We're
still
going
to
have
to
look
at
our
current
environment
and
figure
out
what
options
we
have
to
address
squeaky
wheels,
bad
policies,
things
that
that
don't
seem
in
alignment
with
our
own
principles.
A
And
jamie
you've
of
course
generated
comments
in
the
chat
and
then
martha.
Martha
has
a
question
as
well.
I
think
the
first
david's
question
was:
who
are
you
benchmarking
against.
B
They
just
have
a
lot
of
great
tools
and
are
super
good
partners
in
sharing,
but
I
meet
almost,
I
think,
monthly,
pretty
regularly
with
the
future
of
privacy
forums,
civil
civic
data,
privacy
leaders
and
so
I'm
hearing
from
all
over
the
country,
individual
best
practices
along
the
way
and
people's
journeys.
So
there's
a
lot
people
who
are
not
as
far
along
as
we
are
or
jurisdictions,
who
are
way
further
along
so.
B
B
J
Right,
martha
hi,
I
had
a
business
license
in
arlington
for
40
years
or
more,
and
it
was
clear
to
me
after
the
first
few
years
that
they
were
capturing
and
selling
my
data,
so
I
would
get
and
no
one
was
denying
it.
So
I
want
to
know,
are
you
still
capturing
and
selling
data.
B
I
have
not
so
back
to
jackie's,
you
know
who
did
you
talk
to
my
conversations
thus
far
have
been
limited
to
arlington,
county
government
and
not
elected
official
offices.
B
B
So
I
would
ask
if
martha,
if
you
would
look
at
the
county's
open
data
portal
and
see
what's
there,
because
every
individual
business,
it's
not
aggregated
every
individual
business
license,
is
published
and
updated
regularly.
A
And
then
jamie
denise
had
a
question
in
denise.
If
this
isn't,
if
you
want
to
add,
will
the
plan
be
sent
out
to
itech
in
addition
to
nist,
you
know
for
for
review
once
you
once
you
have.
C
Do
you
want
to
take
that
one
yeah?
So
actually
I
mean
one
of
the
things
that
once
you
get
through
yourself
in
a
conversation
which
is
these
are
really
helpful
comments,
I'm
very
interested
in
your
feedback
that
you're
providing
right
now
we
also
do
want
to
talk
about
what
would
the
engagement
process
look
like
for
the
broader
community?
This
is
a
federal
agency
they're
not
going
to
comment
on
our
local
policy.
C
I
doubt
it,
but
if
someone
wants
to
send
it
to
them
sure,
and
but
I
tack-
absolutely
odac,
but
really
want
to
open
it
up,
and
we
want
to
figure
out
what's
the
best
way
to
do
that
thinking,
maybe
sometime
in
the
summer
early
summer,
taking
all
this
feedback
cleaning
it
up
a
bit
getting
getting
out
of
draft,
so
I'd
be.
If
let's,
let's
see,
if
there's
any
more
substantive
comments,
and
then
we
can
shift
to
that
conversation,
I'd
love
your
thoughts
on
that
great
great.
K
Yeah
I
would
like
to
first
associate
with
many
of
the
comments
that
have
already
been
said
in
terms
of
driving
us
forward
beyond
what
the
law
requires.
You
know
the
electronic
frontier
foundation
talks
about
how
you
can't
trust,
no
one,
but
you
need
to
pick
who
to
trust
with
your
data
and
for
many
many
aspects
of
life.
Arlington
county
citizens
have
absolutely
no
choice
but
to
trust
the
county
government,
and
so
I
think
the
level
of
care
and
protection
you
take
with
our
data
needs
to
reflect
that
lack
of
choice.
K
K
If
you
are
collecting
data
and
if
we
can
trust
you
to
only
use
it
for
appropriate
purposes,
not
lose
it
not
not
leak
it
then
I
would
be
comfortable
with
more
retention
and
more
uses
if
the
performance
of
the
services
that
the
county
offered
to
me
were
able
to
be
better
right.
K
That
requires
a
great,
as
you
have
put
great
deal
of
trust,
that
you
are
in
fact
protecting
the
data
effectively,
not
using
it
for
inappropriate
purposes,
monitoring
the
internal
users
of
that
data
to
make
sure
they
are.
You
know
individually,
not
going
outside
the
rules
and
breaking
the
policy
that
sort
of
insider
threat
type
situation,
but
I
just
wanted
to
make
that
performance
point,
because
I
think
it's
one
that's
often
lost
when
we're
focused
so
much
on
the
importance
of
privacy.
C
So,
john
thanks
for
bringing
that
up,
I
mean
I
think
there
are
some
departments
that
really
are
evidence-based.
Data
driven
in
their
service
delivery,
more
than
others,
and
I
think
you
know
we
are
trying
to
understand
how
to
use
the
use
data
in
a
way.
That
does
that.
So
I
really
appreciate
that
comment.
So
thank
you.
B
Agree,
john,
that
is,
is
a
helpful
perspective.
I
am
looking
also
to
set
up
a
fledgling
data
analytics
shop.
You
know
I'm
the
chief
data
officer,
so
there's
an
inherent
you
know
crunch.
How
do
you
leverage
the
data,
but
you
do
so
ethically
and
I
think
it's
clear
it
can
be
done.
It's
not
that
hard.
It's
not
whether
you
do
it.
It's
how
you
do
it
and
having
these
guard
rails
frees
me
up
to
say
partner
department.
I
don't
want
that
data.
B
You
have
to
roll
that
up
higher
because,
even
though
I'm
trying
to
help
you,
I
don't
need
to
know
that
it
was
john
or
it
was
jamie.
Who
did
this?
I
just
need
to
know
a
person
did
this,
and
so
that's
part
of
the
the
cultural
shift,
the
data
literacy
conversation
that
includes
a
lot
of
training,
not
just
in
the
tools
but
in
the
information
that's
being
handled.
K
Yeah
and
then
finally,
I
want
to
foot
stomp
mike's
point
earlier
about
contracts
and
buying.
There
should
be
absolutely
no
contract.
That's
left
for
any
sort
of
service
that
does
not
absolutely
require
the
vendor
to
live
by
our
rules.
Regarding
data
and
privacy,
the
we
can.
We
can
influence
the
availability
of
commercial
services
that
respect
people's
privacy
by
buying
them
with
our
tax
dollars,
and
that
makes
privacy
easier
for
everybody,
who's
operating
in
the
commercial
space
and
and
throwing
in
with
the
state.
I
Sure
hi
jamie,
my
name
is
joshua
farah,
I'm
a
member
of
this
committee
and
presidential
innovation,
fellow
detailed
to
the
u.s
department
of
veterans
affairs,
I'm
an
engineer,
a
data
engineer,
and
so
I
actually
design
and
build
data
systems
for
collecting
operational
data
and
cultural
data
from
a
workforce
and
operations
data
from
a
business
organization.
I
You
know
a
large
organization,
the
department
of
veterans
affairs,
so
my
question
is:
how
do
you,
how
are
you
thinking
about
approaching
less
from
the
privacy
perspective,
but
more
from
the
operational
perspective?
How
are
you
approaching
the
the
problem
of
data
interoperability
and
breaking
down
the
silos
between
departments
to
ensure
that
the
data
that
you're
collecting
is
able
to
be
used
in
such
a
way
as
you're
able
to
create
data
products
from
disparate
sources,
recognizing
that
different
systems
use
different
identifiers?
I
Different
systems
have
different
ways
of
referring
to
the
same
thing,
and
are
you
taking
an
approach
that
maybe
it
makes
sense
to
create
a
canonical
system
of
record
for
entity
identifiers
or
some
other
approach?
I'd
just
like
to
hear
you
talk
a
little
bit
more
about
how
you
think
about
data
interoperability.
B
B
I
think
the
topic
is
a
little
bigger
than
I
can
cover
in
this
space,
but
I
would
say
what
we
do
now
getting
back
to
jackie's
point
of
trying
to
get
an
application
inventory
and
a
privacy
inventory
having
all
of
the
county's
data
be
interoperable
and
documented,
and
maybe
in
a
data,
warehouse
or
similar
is
a
big
reach
and
what
we
tend
to
do.
The
approach
that
I
am
supportive
of
right
now
is
situational
drive.
B
Have
it
be
business
need
driven
when
we
need
to
connect
several
systems
to
achieve
a
performance
goal
or
a
programmatic
goal
to
understand
who
we're
serving
and
who
we're
not.
Then
we
do
that.
Situationally-
and
we
have
some
great
spaces
to
do
that-
that
our
technology
services
department
provides
other
than
that
trying
to
connect
for
the
sake
of
it
is
something
we
just
don't
have
a
lot
of
bandwidth
for
it's
not
that
it's
not
valuable
and
wouldn't
be
informative.
I
No,
of
course
I
I
agree
that
that
should
be
your
approach,
that
you
should
limit
what
you're
doing
in
terms
of
improving
interoperability
to
the
problems
that
are
at
hand.
What
I
would
recommend
is,
if
you
get
to
the
point
where
you
have
to
think
about
data
interoperability,
don't
forget
this
commission?
Yes,
I've.
I
I've
done
a
lot
of
work
to
develop
data
standards
for
interoperable
data
in
post-secondary
education
and
now
we're
trying
to
build
analytics
for
the
federal
government,
and
I
think
a
local
government
is
very
similar
where
we
want
to
be
developing
a
essentially
a
set
of
machinery
for
the
measurement
of
government
operations.
I
Data
open
data
is
interesting,
but
open
data
is
only
interesting
to
the
extent
that
it
informs
citizens
about
things
that
they
care
about,
and
I
think
when
we
think
about
operational
data,
we
have
the
ability
to
do
that,
but
in
order
to
get
good
metrics
from
government
systems
around
operations,
it
you
get
into
this
interesting
puzzle
of
interoperability
and-
and
that
has
a
very
obvious-
and
I
think,
interesting
relationship
with
privacy.
But
anyway
I
won't.
I
won't
dwell
on.
B
B
B
A
Okay,
so
jackie
and
then
mike,
and
then
we
need
to
move
to
engagement,
because
we
have
a
lot
more
on
the
agenda
and
I
want
to
make
sure
that
we
we
we
move,
move
along.
Okay,
so
jackie
you're
next
and
then
mike.
G
G
Thank
you.
You
jamie
just
said
something
that
you
know
peaked
by
my
interest,
and
I
guess
I
want
to
give
a
caution.
G
You
said
we
don't
have
the
need
to
track
people
across
our
systems,
but
in
fact
we
have
a
very
large
case
management
requirement
and
one
of
the
things
that's
happening
from
trying
to
do
a
better
job
of
integrating
across
law
enforcement,
mental
health
and
and
justice
is
in
fact,
better
case
management
across
these
multiple
departments
and
systems
where
what
they're
managing
is
personal,
very
specific
personal
data
and
trying
to
keep
it
in
real
time.
So,
for
example,
I
was
listening
to
a
committee
reviewing
of
all
of
those
groups
talking
about.
G
You
know
that
they're
losing
people
between
probation
and
a
follow-up,
and
these
other
things
where
people
were
pleading
with
each
other
to
give
them
a
call
when
this
happens.
This
is
the
kind
of
thing
that
has
to
be
it.
There
has
to
be
a
systematic
data
solution
to
how
these
how
these
the
important
case
management
actions
are
passed
from
one
department
to
the
next
and
returned
and
and
visible,
but
it
it
is
certainly
a
very
big
challenge
for
privacy,
and
so
I
I
think
that's
one
where
we
need
to
recognize
that.
G
Indeed
we
do
have
systems
that
intentionally
track
people
throughout
the
entire
system
and
because
we
lack
interoperability.
Some
of
those
systems
aren't
working
right
now,
so
we
need
to
get
more
interoperability,
but
we
need
to
do
it
in
a
strategic
way
so
that
we're
thinking
about
the
privacy
implications
as
we
do
that.
B
I
misspoke
I
or
or
rather
didn't,
speak
well
enough.
What
I
meant
is
because
you
have
a
case
in
human
services,
doesn't
mean.
I
need
to
know
that
you
have
a
library
card
and
I
don't
need
to
know
that
you
have
a
business
license
and
I
you
know
there
are
disparate
systems
that
we
don't
need
to
connect
for
the
purpose
of
connecting-
and
I
agree,
100
with
your
case
management
model
and
think
it
would
also
extend
regionally
into
the
state.
B
I
I
If
we
wanted
to
think
about
government
in
terms
of
its
ability
to
provide
services
to
an
individual,
but
there's
obviously
a
great
need
to
very
seriously
consider
how
to
regulate
that
data
such
that
or
the
usage
such
that
it
is
only
used
to
provide
services
without
providing
the
the
state
too
much
power
to
over
criminalize,
potentially
or
or
find
ways
to
otherwise
harm
an
individual
right,
because
our
goal
is
to
protect
individuals
from
the
state,
not
necessarily
to
advance
the
interests
of
the
state
at
the
expense
of
individual
freedom.
H
Yeah,
I
just
wanted
to
mention
that,
although
I
know
the
task,
as
defined
here
is
a
very
broad
gauge,
county-wide
privacy
policy,
apparently
the
first
of
its
kind.
That
might
take
a
long
time
to
put
in
place,
but
we
recently,
particularly
with
john
burke's
attention,
brought
some
george
and
some
johns
hopkins
university
thoughts
about
contract
tasting
in
the
pandemic
environment,
and
so
I
think,
during
that
period
of
time,
whatever
the
gestation
is,
we
want
to
not
fail
to
take
advantage
of
what
is
urgent
and
what
is
rich
with
privacy
questions
and
so
right.
H
Now,
there's
a
lot
more
contract
tracing
going
on
in
arlington.
There's
a
lot
more
technology
offerings
you
know
being
made
in
that
space
and
although
it
might
feel
like
jumping
the
gun,
a
little
I'll
bet,
we
could
get
a
lot
smarter
trying
to
do
the
privacy
side
of
contract
tracing
well
fast,
even
if
it's
out
ahead
of
the
county-wide
policy,
just
because
it's
so
rich
with
challenges
around
privacy.
H
B
I
can
see
that
at
all
exactly
thank
you
all
so
much
for
your
attention
and
your
feedback.
It
is
incredibly
helpful
and
really
nice
to
speak
to
this
group.
I
appreciate
it.
A
C
I
think
you
know
just
a
really
quick
round.
Robin
would
be
great
just
thoughts
about
this
is
you
saw,
you
know,
generate
a
lot
of
conversation
here.
There's
it's
a
big
conversation
to
have
with
the
community.
How
do
we
do
that
in
a
way
that
can't
remember
who
said
it,
but
the
trust
with
and
and
maintain
trust
in
the
conversation
without
getting
people's
kind
of
all
anxious
immediately
so
big
brother
yeah.
C
F
Do
that
I
don't
have
a
solution
to
this,
but
I
do
think
because
there
are
so
many
moving
parts
to
this
and
it's
obvious
that
full
implementation
is
going
to
take
a
long
time.
We
need
to
find
some
way
to
make
some
periodic
reports
to
the
citizens
and
I'm
wondering
if
you
agree
with
that
in
principle:
regular
reports
of
implementation,
progress.
C
Well,
certainly,
I
do
agree
with
that.
I
think
we
want
to
try
to
move
the
actual
content
of
the
policy
forward
for
public
feedback,
and
so
you
know
how
do
we
do
that?
I
think
we
could.
What
I'm?
What
I
hear
you
saying
is:
maybe
we
take
pieces
of
what
jamie
has
shared
tonight
about
the
progress
and
how
we've
gotten
there
with
feedback
to
date.
A
Yeah-
and
I
think
denise
mentioned,
of
course,
civic
associations-
burnham,
that's
a
good
good.
Conduit
john,
has
a
comment
and
then
I'll
make
one
go
ahead.
John.
C
That's
really
helpful,
so
building
on
fills
and
expanding.
I
love
the
campaign
aspect
to
it
and
laying
out
that.
So
thank
you.
You
did
use
some
framing
about
the
question.
Where
are
we
getting
it
right?
Did
you
say.
K
Yeah,
I
think
if,
if
you
take
the,
what
do
you
want
out
of
us
approach?
Most
people
are
gonna,
draw
blank
they're
going
to
be
like?
Oh,
I
don't
know
privacy
right,
because
most
people
are
not
thinking
about
this
issue
deeply
on
a
regular
basis.
If
they're,
not
a
technology
person
they're
not
involved
in
in
securing
data
on
a
regular
basis,.
A
And
then
bernie
you've
seen
the
convenience
privacy
security.
You
can
only
pick
two.
You
know
it's
a
it's
a
triangle
that
we
talk
about
right.
So
that's
the
other
thing
I
think
in
terms
of
having
the
public
understand
that
there
are
trade-offs
right
that
this.
There
is
not
one
answer
that
there's
a
trade-off
between
those
three
that
are
constantly
moving
and
it's
important
for
the
arlington
values
to
make
those
decisions
where
those
some
of
those
lines
are
because
the
lines.
C
C
One
it's
convenience
convenience.
Thank
you.
G
I
have
a
suggestion.
There
are
also
some
hot
topics
that
are
coming
up.
I
mean
this.
This
topic
has
been
a
hot
topic
for
a
while,
but
since
the
issue
of
data
and
privacy
is
one
of
the
significant
issues
in
the
whole
police
practices
group
review
and
it
will
come
up
in
recommendations
and
discussions,
I
think
you
need
to
be
thinking
about
how
you
work
with
that
group
and
which
is
you
know,
the
manager's
group,
but
how
you
take
what
you've
presented
to
us
and
help
that
frame.
G
You
know
how
those
are
how
those
issues
are
presented
in
that
context,
because
if
you
take
an
issue,
that's
as
highly
sensitive
as
law
enforcement
and
that
discussion
kicks
off
before
people
have
the
background
and
the
knowledge
that
you're
working
on
all
of
this,
it
will
go
in
a
different
direction
than
if
you
could
frame
that
discussion
as
part
of
what
you're
proactively
working
on
it's
already.
G
C
H
And
I'll
try
to
be
concise.
I
do
think
there's
great
danger
in
going
out
for
public
engagement
on
the
subject
of
privacy
alone,
mostly
kind
of
kill
the
messenger
risk,
because
many
people
don't
think
much
about
this
and
if
you're
the
person
who
causes
them
to
think
about
it,
they
can
associate
it
with
you
in
a
way.
That's
not
helpful,
especially
if
you're
an
elected
official,
but
I
would
say
we
always
want
to
count.
H
I
mean
cage
it
or
frame
it,
and
information
technology
offers
lots
of
opportunities
for
the
local
government
to
further
its
mission
and
in
pursuing
those
advantages
we
need
to
be
careful
that
we
don't
hit
these
pitfalls.
You
know
so
I
wouldn't
try
to
sell
privacy
in
isolation.
H
H
That,
from
a
citizen
point
of
view,
doesn't
seem
like
that.
Much
of
an
improvement
to
me.
If
you
didn't
want
this
happening
and
you
didn't
want
it
happening
bad
enough-
that
you
restricted
governments
from
collections
and
usages
of
this
type,
but
you
didn't
extend
it
to
the
private
sector
so
that
now
government
organizations
simply
purchase
the
information
that
there
by
law
prohibited
from
collecting
and
holding
that.
That
is
not
a
victory
that
that
is
not
consistent
with
the
principles
that
were
laid
out.
H
You
know
back
in
the
70s
around
this,
so
I
think
I
think
you
need
to
frame
it
in
what's
good
about
it
and
how
this
has
to
be
one
of
the
risks
that
managed
in
pursuing
that,
but
also
be
very
attentive
to
the
fact
that
the
private
sector
is
I'll
bet
you
there
are
people
who
would
want
to
do
services
for
the
federal
I
mean
for
the
county
government
in
exchange
for
the
data
alone
and
no
cash
payment
right,
and
so
it's
a
new
world
and
you've
got
to
think
like
that.
Now.
J
Well,
some
of
this
data
is
going
to
be
temporary,
I'm
thinking
of
the
last
election.
I
did
you
get
a
ballot.
Have
you
already
voted?
Are
you
dead?
You
know
stuff
like
that.
I
think
is
going
to
be
requested.
J
B
J
Yeah
arlington
alert
is
an
example
of
it
in
a
way
because,
that's
that's
you
know,
there's
a
tornado.
B
C
Temporal
and
the
elections
office
I
mean
there,
they
have
a
ton
of
rules
around
that
that
are
completely.
I
haven't
tried
to
figure
out,
but
I
know
that
it's
indeed,
we
have
taken
a
whole
lot
of
time.
Thank
you
and
thanks
to
all
of
you
for
your
great
work
for
the
county,
for
your
just
active
participation,
and
I
hope
you
all
have
a
great
holiday.
A
A
A
Oh
great,
thank
you
thanks.
So
much
well,
david
hurley.
We
wanted
to
make
you
wanted
to
make
sure
that
you
had
you
briefed
us
on
something,
so
you
wanted
to
make
an
announcement
and
I'll
I'll
I'll
sneak
that
in
before
we
look
at
the
meeting
minutes.
Okay,.
M
Excellent,
thank
you
very
much
mary,
just
a
real,
quick
thing.
If
you
haven't
noticed
that
on
the
public
website,
we
posted
a
feedback
forum
about
the
redesign
that
we're
going
to
be
doing
well,
we
actually
have
started
it's
your
opportunity
to
provide
your
feedback.
I
know
we've
spoken
this
over
the
last
god
year
and
a
half
plus
now,
but
it's
now
upon
us.
So
it's
now
is
the
chance
to
have
your
feedback
recorded.
So
I
would
encourage
you
to
go
out
there.
It's
right
on
the
banner.
M
That's
right
on
the
top
of
the
screen.
Click
on
that!
It's
kind
of
you
walk
you
through
a
multi-step
thing.
I
think
we've
gotten
about
125
plus
entries
already
we
launched
it
last
friday,
so
that's
actually
pretty
good,
but
all
you
know
all
this
feedback
is
being
kind
of
pulled
together.
Speaking
of
data,
we're
pulling
all
that
data
together
and
taking
a
look
at
it
and
trying
to
incorporate
that
into
the
new
website
that
will
be
coming
next
year.
So
please
fill
out
your
feedback.
Thank
you.
A
Well
done,
thank
you.
Thank
you.
David
now
wanted
meeting
minutes
and
once
again
thank
you,
angela,
the
angel
who
does
our
meeting
minutes
we're
so
happy
because
you
don't
know
how
many
times
we
had
to
share
doing
it.
So
thank
you.
Thank
you.
So
much
for
doing
that.
Any
any
adjustments,
any
comments
edits
to
the
to
the
november
minutes.
A
Frank,
frank,
you're,
on
mute,
frank,
frank,
frank,
you're,
on
mute.
We
can't
hear
you,
I
think,
you're
talking,
wait,
wait,
wait,
wait,
frank!
F
A
He's
not
talking
to
us,
maybe
he's
not
talking
to
us,
maybe
not
okay,
we'll
move
forward.
Then,
if
he's
not
talking
to
us,
okay,
any
any
other
anything
anything
from
the
minutes.
A
F
A
Okay
eyes:
have
it
great
good
got
through
that
I'd
like
to
welcome
cody
who's,
a
guest
tonight
he's
looking
at
joining
this
mary
mary
band,
putting
in
an
application
so
cody
thanks
for
thanks
for
stopping
by,
and
we
think
you're
you're
getting
a
good
flavor
about.
A
N
Of
course,
thank
you,
mary
and
thank
you
everyone
for
having
me
it's
been
exciting.
I
was
very
pleased
to
see
everyone
discussing
privacy
and
privacy
principles,
so
that
was
good,
a
good
way
to
be
welcomed
to
the
committee,
I'm
currently
a
policy
counsel
with
the
center
for
democracy
and
technology.
I
work
with
the
student
privacy
project
there
so
focusing
on
education,
privacy,
data
and
education
and
the
ways
that
various
adjacent
areas
such
as
the
homework
app,
can
impact
student
privacy.
N
Prior
to
my
time
at
cdt,
I
was
with
the
federal
communications
commission.
I
was
a
attorney
advisor
in
the
wire
line,
competition
bureau.
At
the
time
I
was
in
the
pricing
policy
division,
which
is
a
very
small
division
that
works
on
the
old
tariffing
system
for
legacy
landline
telephones.
So
I
cover.
D
N
A
Great
thanks
so
much
cody
and
welcome.
I
just
want
to
give
you
all
a
couple
of
updates,
because
we
did
get
some
feedback
from
some
of
the
things
we've
been
doing
so,
but
first
I
just
want
to
give
a
shout
out
to
mike
and
frank
they
came.
They
found
some
articles
that
I'll
share
with
you.
Frank's
found
quite
a
few
articles
about
alexandria's
broadband.
A
The
I
also
want
to
let
you
know
I
I
played.
I
was
part
of
a
focus
group
for
police,
the
police
chief.
You
know
they're
putting
together
kind
of
the
quality
list.
What
would
the
ideal
candidate
look
like,
and
there
was
some
really
good
discussion
about
what
this
police
chief,
what
the
qualities
and
behavior?
So
I
was
real
glad
to
participate
and
glad
that
we
could
play
a
role.
A
I
also
the
legislative
priorities
that
we
put
together
and
sent
to
the
board
in
early
november
right
around
november,
2nd
they
actually
adopted
one
of
them.
The
digital
equity
one
is
part
of
the
legislative
agenda,
it's
under
education
and
general
government
section
and
what
it
was
was
you
remember.
We
said
that
there
needed
to
be
the
affordability.
A
It
wasn't
access
as
much
for
us
in
arlington,
but
it
needed
to
be
affordable,
and
so
that
is
part
of
arlington's
state
legislative
priorities.
So
just
wanted
you
to
know
that
that
that
was
really
really
helpful
and
they
adopted
our
our
recommendation
in
principle,
and
then
we
had
also
brought
up
digital
records
management.
John,
you
were
asking
around
that
question.
A
The
arlington
county
police
department
has
already
engaged
in
this
to
some
degree
and
there's
concern
that
the
library
of
virginia
isn't
the
right
place
and
might
not
be
the
right
agency
to
do
this.
But
we'll
follow
up
and
have
arlington
county
police
department
come
back.
You
know
the
right
people
to.
Let
us
know
about
that.
Update
john,
because
that's
something
that
we
want
to
you
know
want
to
see,
and
then
mike
you
were
talking
about.
A
The
reasonable
telephone
fees
are
for
families
who
are
calling
people
who
are
incarcerated,
they're
handling
that
directly
with
the
sheriff's
office
and
also
there's
a
bill
by
delicate
hope.
A
That's
addressing
this
matter,
so
we
we
just
need
to
keep.
We
just
need
to
keep
track
of
that
and
and
see
where
that
is
also
you'll.
You
all
remember
that
that
mike
presented
the
the
what
we
call
the
12th
element
for
the
master
plan
strategic
plan
for
arlington.
A
The
board
is
going
to
look
at
that
next
week
when
they
talk
about
their
organizational,
how
they
want
to
move
forward.
So
it's
going
to
consider
it
as
part
of
their
2021
organizational
deliberations
that
the
digital
planning
be
added,
so
obviously
we'll
keep
track
of
that,
but
that
that
got
introduced
because
of
the
work
all
of
you
did
and
then
tech
privacy,
which
of
course,
is
something
that
we've
talked
a
lot
about.
But
we
did
get
feedback.
A
You
know
we
sent
the
the
letter
to
the
county
board
around,
particularly
with
john's
john's
initiative,
particularly
around
the
principles
guiding
that
and
dr
vargassi
who's.
The
medical
officer-
and
I
hope,
I'm
pronouncing
his
name
correctly-
was
familiar
with
what
principles
we
we
suggested,
but
he
didn't
see
any
governance
issues
and
felt
that
the
board
needed
to
address
so
we're
going
to
go
back
around
and
talk
about
that.
A
The
final
one
is
around
budget
because
we
wanted
to
get
some
feedback
around
budget
christian
dorsey
in
particular,
said
one
of
his
key
budget
priorities
for
fy
22
was
to
ensure
that
our
cyber
investment
nets
are
sufficient
to
guard
against
sufficient
risk
right.
So
that's
something
he
wanted
this
commission
to
make
sure
and
look
at
as
as
we
look
at
the
the
budget
preparations
and,
of
course,
that's
something
that
we
just
wanted
to
briefly
touch
on.
Obviously
we'll
do
more
in
january,
but
to
prepare
for
that
budget.
Discussion
and
david.
A
Do
you
have
david
and
jack?
Do
you
want
to
give
any?
I
think
you
all
have
been
asked
to
do
a
a
reduction
in
budget,
and
it
looks
like
it's
what
we
call
the
salami
approach.
It's
just
everybody
has
to
take
x
percent
cut.
Is
that
do
you
want
to
just
give
us
some
an
update
on
where,
where
we
are,
what
guidance
you're
receiving
right
now.
D
Yeah,
let
me
take
the
lead,
yeah
cuts
and
we
have
to
take
a
six
percent
cut,
which
is
equivalent
to
1.5
million
dollars
in
our
budget
and
it's
a
challenge
because
it's
across
the
board
every
department
is
having
to
do
the
same
thing.
But,
as
you
know,
it's
we're
a
different
department
than
we
were
pretty
much
the
things
we're
working
on
we're
in
different
lines
of
business,
and
I
have
the
opinion.
D
I
think
the
manager's
wallet
and
this
error
in
right
now,
investments
were
made
in
march
may
not
be
necessarily
investments
we
need
to
make
in.
In
january
and
february
of
this
year
coming
forth,
I
mean
this
is
a
long
haul,
we're
in
and
we've
become
more
virtual
as
a
county
and
we're
in
different
line,
different
lines
of
business.
D
That
david's
been
taking
a
lead
on
whether
it
be
courts
or
be
involved
in
the
schools
where
I'm
and
I'm
with
the
schools
we're
racing
right
now,
as
you
may
know,
I
may
not
know
we'll
talk
about
it
in
the
next
meeting
to
implement
enhanced
access
for
students
who
may
not
have
access
to
the
internet,
and
we've
got
a
time.
We've
got
a
shot
clock
of
december
24th
and
I
have
to
tell
you
I
can't
I
can't
be
as
proud
of
my
staff.
D
D
My
staff
are
full
out
both
on
working
with
the
schools,
both
in
the
on
the
columbia
pike
area,
to
provide
for
that
access
and
and
in
the
gates
of
boston
and
other
areas
where
there's
really
deficient
internet
access
and
see
these
folks,
working
as
they
are,
is
really
you
as
a
county.
I
think
we
all
should
be
proud
of
the
work
they're
doing,
but
so
going
forward.
D
What
do
we
do,
and
so
this
discussions
we
talked
about
with
jamie
data
security
there
as
much
as
we
try
to
keep
our
focus
on
doing
the
important
thing
of
moving
the
county
forward
for
the
future.
We
have
these
incursions
to
take.
This
noise
takes
place,
as
we
had
last
weekend
with
the
significant
incursion
at
the
federal
level
right,
the
russian
interaction,
and
we
have
to
turn
our
attention
to
those
types
of
things.
So
the
proposed
cuts.
D
They
will
significantly
reduce
our
ability
to
continue
doing
our
work,
but
again
I
think
the
manager
is
looking
at
it
from
the
perspective
of
you
know:
where
do
we
do
investments?
Where
do
we
make
investments
going
forward?
So
you
have
to
be
the
firm
defined
right
now
with
december,
we'll
probably
talk
in
a
later
scenario
in
terms
of
making
the
budget
possible
budget
available
for
public
review,
but
your
support
has
always
been
there
and
we
can
use
it
again
going
in
the
future.
So
thank
you.
K
Yeah
jack,
when,
when
we
first
reconvened-
and
you
briefed
us
about
the
work
that
you
guys
had
done
with
the
department
of
health
in
terms
of
automating,
their
contact
tracing
operation
and
really
spinning
up
the
velocity
at
which
they
were
able
to
execute
that
you
said
this
is
a
great
example
of
digital
transformation
and
I
would
say
from
a
budget
standpoint.
K
Cyber
security
is
an
easy
talking
point,
but
digital
transformation
is
where
the
government
needs
to
go
and
if
we're
cutting
our
investments
in
that
that's
problematic
for
us
long
term.
So
I
I'd
love
to
hear
about
what
investments
and
what
priorities
we
have
in
that
space,
so
that
we
can
advocate
on
your
behalf
that
they
are
strategically
important
in
good
times
and
in
bad.
D
Yeah,
I'm
totally
good
with
you
yeah,
that's
exactly
it,
but
again
it's
like
anything
there
are.
You
know
the
interest
of
one
of
the
investors
they
have
in
the
past,
and
it's
rightly
so,
but
you
know
it's
a
really
different
norm
right
now
and
so
we'll
see
how
it
falls
out.
So
thank
you,
though,.
H
H
D
Yeah,
I
know
you're
entirely
right,
I
mean
you
know,
there's
a
recent
occasion
that
took
place.
I
know
richard
can
talk
more
eloquently
I
can
on
this.
We
shouldn't
please
step
in
at
any
point
here
and
and
take
over,
but
this
is
the
last
thing
that
happened.
This
weekend's
a
nation-state
attack,
it's
less
likely
to
be
a
ransomware
attack
by
a
couple
hackers
who
want
to
get
money
out
of
a
government.
They
want
they're
in
for
the
long
term
and
they
want
to
achieve
some
other
things.
D
And
you
know,
as
you
know,
you
look
around
your
next
door.
D
Are
some
pretty
important
people
be
able
to
get
information
on
them
compromise?
You
know
their
activities
to
find
out
their
children
may
have
been
picked
up
on
a
drug
charge
or
had
done
something
he'd
done
something
wrong
in
finances
is
puts
them
at
risk,
and
so
we
have
to
be
really
careful
richard.
You
want
to
talk
a
little
bit
about
what
you
can,
because
I
know
you're
really
well
deep
in
it,
but
what
you've
been
getting
guidance
on.
L
Yeah
I
mean
we're
we're
getting
very
similar
guidance
to
what
you
are
seeing
leak
into
the
mainstream
press
at
this
moment,
we're
getting
a
little
bit
more
specific
detail
about
what
to
look
for
to
determine
how
wide
the
infection
was,
but
as
far
as
the
actual
impact
we're
seeing
very
similar
nation
state,
this
is
a
classic
espionage
play
and
you
know
the
net
was
cast
very
wide
and
caught
a
lot
more
organizations
than
I
think
the
intent
was,
but
I
don't
think
they're
unhappy
they
caught
as
many
organizations
as
they
did.
L
L
Yes,
this
is
a
little
bit
different,
though
this
is
a
supply
chain
attack,
and
so
we
trust
our
vendors
and
our
partners
to
provide
us
clean
code,
and
this
is
a
very
different
type
of
intrusion
for
those
of
us
in
the
networking
world.
This
is
as
if
a
product
like
a
microsoft
were
attacked.
It's
just
so
ubiquitous.
L
It
is
everywhere
and.
L
Okay,
so
anyways
this.
This
is
the
the
type
of
thing
we
are
worried
about
and
we
prepare
for
so
going
forward.
We
will
keep
an
eye
out
and
we'll
be
very
vigilant
about
what
we're
learning
from
our
federal
partners
and
our
industry
partners
and
we'll
be
looking
to
make
sure
arlington
is
safe
and
protected.
A
Great
thanks
thanks
very
much
richard
appreciate
it
given
given
our
time.
What
I
will
do
is
send
around
some
items
to
include
in
2020
commission
reports
just
to
get
you
all
started
and
then,
if
you
could
react
to
that,
that
would
be
good
frank.
I
I
don't
want
you
to
be
shortchanged.
I
know
you've
got
quite
a
few,
quite
a
few
pieces,
so
take
it
away.
I
A
A
I
A
A
There
aren't
many
people
who
get
who
get
all
that
tech
help.
I
mean
look
at
you
got
them.
P
A
P
Right
thanks
yeah.
Well,
that's
all!
That's
all!
That's
all
the
comment
was
I
had
given
her
my
comments
on
my
on
the
november
report
anyway.
So,
but
I,
following
up
on
the
november
report,
we
do
have
a
little
more
clarity
where
the
fcc
is
going
to
be
come
january.
20Th
fcc,
chairman
ig
pai,
has
announced
he
will
be
leaving
on
january
20th.
So
we
do
have
an
another
change
there
on
the
republican
side
mike
o'reilly
a
long
time.
P
Second
senor
in
seniority
on
the
on
the
republican
side
has
left
his
replacement
has
been
confirmed.
Nathan
symington-
and
this
was
all
related
to
that
section,
230
kerfuffle
that
I
had
mentioned
he
is
now
on.
I
think
we're
going
to
wind
up
with
a
2-2
deadlock,
basically
on
the
fcc
until
a
third
democratic
commissioner
can
be
confirmed,
and
typically
the
new
president
will
name
his
chair
and,
as
I
had
mentioned
previously,
the
most
likely
contenders
are
jessica
rosenwarsel.
P
Who
is
the
senior
democrat
on
the
fcc
mignon
clyburn,
who
is
on
the
fcc
review
team
daughter
of
jim
clyburn?
I
think
there's
speculation.
If
she
wants
it.
She's
got
a
good
chance
of
getting
it
and
then
a
third
you
know
contender
is
jeffrey
starts.
Who
is
the
other
democrat
on
the
fcc
currently
and
then
there's
the
fourth
possibility?
None
of
the
above,
so
we'll
stay
tuned
on
that
one.
P
I
really.
I
guess
one
of
our
issues
is
the
closing
the
affordability
gap
on
the
digital
divide,
and
we
expect
that
there
is
going
to
be
money
for
broadband
grants
on
that
issue
in
the
in
the
coveted
relief
bill.
We
know
that
rural
has
been
a
big
part
of
that
and
there's
been
a
lot
of
action
on
that
side,
but
we're
we're
seeing
some
activity
that
would
you
know,
give
the
fcc
greater
flexibility
to
use
e-rate
funding
outside
of
the
narrow
constraints
that
have
been
there
before.
P
So
hey
stay
tuned
on
that
one,
the
virginia
house
has
passed
hb
831
to
declare
that
it
is
the
policy
of
the
commonwealth
that
use
of
electric
and
communications
easements
to
provide
and
expand.
Broadband
is
in
the
public
interest.
Basically,
it's
similar
to
some
of
the
fcc
act
actions.
Basically,
it
is
looking
to
generally
encourage
broadband
deployment
and
attorney
general
herring.
P
Is
defending
that
that
bill
broadband
is
expected
to
be
part
of
the
infrastructure
and
stimulus
package
going
forward
in
this
president
elect
biden's
first
hundred
day
agenda
and
I
think
it's
an
area
where
there
is
likely
to
be
some
bipartisan
support.
There's
even
talk
about
bringing
back,
earmarks
wow.
P
The
alliance
for
telecommunications
industry
solutions,
addis
a
standards
organization
has
developed
recommendations
to
help
ensure
that
wireless
emergency
alerts
weas
reach
all,
and
only
those
in
the
affected
areas
during
emergencies.
Currently,
the
entire
area
must
be
covered
with
only
an
overshoot
of
one-tenth
of
a
mile.
Only
about
500
feet
is
what
the
the
current
standards
and
if
there
is
encouragement
to
basically
improve
upon
that.
So
that's
that's.
P
All
I've
got
for
now,
but
obviously
we're
in
a
period
of
great
flux,
and
I
think
we'll
hopefully
see
some
new
new
actions
come
january.
H
O
D
J
A
A
A
P
P
Oh
yeah
yeah,
yeah
yeah,
but
yeah.
So
how
many
more
meetings
you
have
tonight?
Two!
Oh,
that's
not
me.
P
P
And
I
think
we
will
have
to
get
with
angela
as
far
as
the
as
far
as
the
website,
because
I
don't
see
those
other
meetings
on
there
yeah.
She
said
that
we
had
the
video
you
know.
A
A
Good
all
right,
wait,
that's
another
good
and
it
looks
like
raj
will
come
as
well.
You
know
to
give
us
enough.