<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Afry</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Afry"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Afry"/>
		<updated>2026-05-22T14:52:11Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_6&amp;diff=105268</id>
		<title>Global Industry Committee - Application 6</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_6&amp;diff=105268"/>
				<updated>2011-02-16T19:57:08Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Nishi Kumar&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP CBT Project lead and part of OWASP Global Education Committee&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Industry Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Giorgio Fedon&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Owasp Italy TD&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Nishi is a talented professional with specific knowledge about large corporates needs for Appsec&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Keith Turpin&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Project Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|  Nishi represents a large financial sector service and technology provider. She brings extensive industry knowledge and represents a customer set that can directly benefit from OWASP projects. As a industry partner she brings a user based view that will help provide a useful perspective to the committee. Combine this with her excellent technical knowledge as a system architect and she will be an asset as a committee member. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Alexander Fry&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| GIC Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| In addition to the other stellar recommendations for Nishi; she works hard, does good work, and completes projects. In the GIC, we have a large number of projects to complete and I know Nishi's contributions will be appreciated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|  &lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=101041</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=101041"/>
				<updated>2011-01-19T19:23:39Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liaisons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Board Member Representative: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Matt Tesauro &lt;br /&gt;
| matt.tesauro 'at' owasp dot org &lt;br /&gt;
| USA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Secretary: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| [[User:Sarah_Baso |Sarah Baso]]&lt;br /&gt;
| sarah.baso 'at' owasp dot org &lt;br /&gt;
| USA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format =&lt;br /&gt;
&lt;br /&gt;
See below...&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
* 16 Dec 2010&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| DoJ Secure Coding Guide&lt;br /&gt;
| ?&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response&lt;br /&gt;
| ??&lt;br /&gt;
|-&lt;br /&gt;
| NIST SP 800-137&lt;br /&gt;
| 15 Mar 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-137 DRAFT Information Security Continuous Monitoring for Federal Information Systems and Organizations&amp;quot;&lt;br /&gt;
| ??&lt;br /&gt;
|-&lt;br /&gt;
| Scholarship for AppSecUSA Attendance of women &lt;br /&gt;
| On-going&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| Raise funds and create model for funds disbursement&lt;br /&gt;
| LA/YP&lt;br /&gt;
|-&lt;br /&gt;
| ISC(2)Presentation at OWASP Summit 2011 &lt;br /&gt;
| 8 Feb 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Dr. Vehbi Tasar, CISSP, CSSLP Director of Professional Programs Development ISC (2), Speaking on ISC(2)credentials: CSSLP and ASAB&lt;br /&gt;
| LA/YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:FTC Protecting Consumer Privacy|FTC Protecting Consumer Privacy in an Era of Rapid Change]]&lt;br /&gt;
| 31 Jan 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response to &amp;quot;FTC Protecting Consumer Privacy in an Era of Rapid Change - A framework for businesses and policymakers&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| National Board of Information Security Examiners&lt;br /&gt;
| Ongoing&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| Invite and coordinate OWASP contributions to NBISE&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Top 10 Presentation&lt;br /&gt;
| 2/18/11 or 2/25/11&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| OWASP Presentation Royal Holloway, University of London presentation&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| New IETF Web Security working group / W3C Web Application Security Working Group&lt;br /&gt;
| Ongoing&lt;br /&gt;
| All Members&lt;br /&gt;
| New&lt;br /&gt;
| Invite and coordinate OWASP contributions on this IETF/W3C Group&lt;br /&gt;
| YP/CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Mobile_Security_Project Kickoff OWASP Mobile Security Project]&lt;br /&gt;
| 2011 Summit&lt;br /&gt;
| Projects&lt;br /&gt;
| New&lt;br /&gt;
| Provide GIC oversight to Mobile Security Project&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.cio.gov/pages.cfm/page/Federal-Risk-and-Authorization-Management-Program-FedRAMP FedRAMP]&lt;br /&gt;
| 17 Jan 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| In progress&lt;br /&gt;
| Provide response to FedRAMP certification and accreditation process&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://hacking-lab.com/ Hacking Lab]&lt;br /&gt;
| 14 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| Matt Tesauro has been working with Hacking Lab previously and brought it to the GIC&lt;br /&gt;
| MAT/YP&lt;br /&gt;
|-&lt;br /&gt;
| Leeds Chapter Leader Presentation&lt;br /&gt;
| 13 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| LA is gathering OWASP overview and project information for OWASP Leeds presentation needs.&lt;br /&gt;
| LA&lt;br /&gt;
|-&lt;br /&gt;
| &amp;quot;Configure SSL&amp;quot; Campaign&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Paper write-up&lt;br /&gt;
| New&lt;br /&gt;
| Alexis FitzGerald's idea&lt;br /&gt;
| AFG&lt;br /&gt;
|-&lt;br /&gt;
| [Testimonials]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| Obtain further testimonials for wiki page&lt;br /&gt;
| CW/SD&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industry Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW/AF&lt;br /&gt;
|-&lt;br /&gt;
| CRESTCON&lt;br /&gt;
| 14 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| YP is attending CRESTCON in Royal Holloway, Surrey, UK&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.techexecnetworks.com/event_2010.12.01.asp T.E.N./Fortify Software Security Assurance Summit] &lt;br /&gt;
| 1 Dec 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss quick wins and high impact software assurance activities using the OWASP SAMM model as reference and cite other OWASP projects as resources. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=101040</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=101040"/>
				<updated>2011-01-19T19:21:14Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Completed Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liaisons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Board Member Representative: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Matt Tesauro &lt;br /&gt;
| matt.tesauro 'at' owasp dot org &lt;br /&gt;
| USA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Secretary: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| [[User:Sarah_Baso |Sarah Baso]]&lt;br /&gt;
| sarah.baso 'at' owasp dot org &lt;br /&gt;
| USA&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format =&lt;br /&gt;
&lt;br /&gt;
See below...&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
* 16 Dec 2010&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| DoJ Secure Coding Guide&lt;br /&gt;
| ?&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response&lt;br /&gt;
| ??&lt;br /&gt;
|-&lt;br /&gt;
| NIST SP 800-137&lt;br /&gt;
| 15 Mar 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-137 DRAFT Information Security Continuous Monitoring for Federal Information Systems and Organizations&amp;quot;&lt;br /&gt;
| ??&lt;br /&gt;
|-&lt;br /&gt;
| Scholarship for AppSecUSA Attendance of women &lt;br /&gt;
| On-going&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| Raise funds and create model for funds disbursement&lt;br /&gt;
| LA/YP&lt;br /&gt;
|-&lt;br /&gt;
| ISC(2)Presentation at OWASP Summit 2011 &lt;br /&gt;
| 8 Feb 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Dr. Vehbi Tasar, CISSP, CSSLP Director of Professional Programs Development ISC (2), Speaking on ISC(2)credentials: CSSLP and ASAB&lt;br /&gt;
| LA/YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:FTC Protecting Consumer Privacy|FTC Protecting Consumer Privacy in an Era of Rapid Change]]&lt;br /&gt;
| 31 Jan 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| New&lt;br /&gt;
| Provide response to &amp;quot;FTC Protecting Consumer Privacy in an Era of Rapid Change - A framework for businesses and policymakers&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| National Board of Information Security Examiners&lt;br /&gt;
| Ongoing&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| Invite and coordinate OWASP contributions to NBISE&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Top 10 Presentation&lt;br /&gt;
| 2/18/11 or 2/25/11&lt;br /&gt;
| Outreach&lt;br /&gt;
| New&lt;br /&gt;
| OWASP Presentation Royal Holloway, University of London presentation&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| New IETF Web Security working group / W3C Web Application Security Working Group&lt;br /&gt;
| Ongoing&lt;br /&gt;
| All Members&lt;br /&gt;
| New&lt;br /&gt;
| Invite and coordinate OWASP contributions on this IETF/W3C Group&lt;br /&gt;
| YP/CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Mobile_Security_Project Kickoff OWASP Mobile Security Project]&lt;br /&gt;
| 2011 Summit&lt;br /&gt;
| Projects&lt;br /&gt;
| New&lt;br /&gt;
| Provide GIC oversight to Mobile Security Project&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.cio.gov/pages.cfm/page/Federal-Risk-and-Authorization-Management-Program-FedRAMP FedRAMP]&lt;br /&gt;
| 17 Jan 2011&lt;br /&gt;
| Standards&lt;br /&gt;
| In progress&lt;br /&gt;
| Provide response to FedRAMP certification and accreditation process&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://hacking-lab.com/ Hacking Lab]&lt;br /&gt;
| 14 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| Matt Tesauro has been working with Hacking Lab previously and brought it to the GIC&lt;br /&gt;
| MAT/YP&lt;br /&gt;
|-&lt;br /&gt;
| Leeds Chapter Leader Presentation&lt;br /&gt;
| 13 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| LA is gathering OWASP overview and project information for OWASP Leeds presentation needs.&lt;br /&gt;
| LA&lt;br /&gt;
|-&lt;br /&gt;
| &amp;quot;Configure SSL&amp;quot; Campaign&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Paper write-up&lt;br /&gt;
| New&lt;br /&gt;
| Alexis FitzGerald's idea&lt;br /&gt;
| AFG&lt;br /&gt;
|-&lt;br /&gt;
| [Testimonials]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In progress&lt;br /&gt;
| Obtain further testimonials for wiki page&lt;br /&gt;
| CW/SD&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industry Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW/AF&lt;br /&gt;
|-&lt;br /&gt;
| CRESTCON&lt;br /&gt;
| 14 Dec 2011&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| YP is attending CRESTCON in Royal Holloway, Surrey, UK&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.techexecnetworks.com/event_2010.12.01.asp T.E.N./Fortify Software Security Assurance Summit] &lt;br /&gt;
| 1 Dec 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss quick wins and high impact software assurance activities using the OWASP SAMM model as reference and cite other OWASP projects as resources. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94687</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94687"/>
				<updated>2010-12-02T17:18:26Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Completed Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format =&lt;br /&gt;
&lt;br /&gt;
Date of last update:&lt;br /&gt;
Updated by:&lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month&lt;br /&gt;
* &lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
Planned for Next Month&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
Issues/Risks/Challenges&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.techexecnetworks.com/event_2010.12.01.asp T.E.N./Fortify Software Security Assurance Summit] &lt;br /&gt;
| 1 Dec 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss quick wins and high impact software assurance activities using the OWASP SAMM model as reference and cite other OWASP projects as resources. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94685</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94685"/>
				<updated>2010-12-02T17:17:06Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
= Monthly Report Format =&lt;br /&gt;
&lt;br /&gt;
Date of last update:&lt;br /&gt;
Updated by:&lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month&lt;br /&gt;
* &lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
Planned for Next Month&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
Issues/Risks/Challenges&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94488</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94488"/>
				<updated>2010-12-01T02:07:38Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
== Monthly Report  ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 31 October 2010 Updated by: CW &lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month &lt;br /&gt;
&lt;br /&gt;
*Response submitted to UK Office of Fair Trading consultation &lt;br /&gt;
*Began work on response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Began work on response to ICO Data Sharing CoP &lt;br /&gt;
*Some further follow-up work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc) &lt;br /&gt;
*Committee plan for OWASP Summit 2011 submitted&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Yiannis Pavlosoglou takes over GIC chair from 1 Nov 2010 &lt;br /&gt;
*Submit response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Submit response ICO Data Sharing CoP &lt;br /&gt;
*Meeting with (ISC)^2 &lt;br /&gt;
*Respond to IETF enquiry &lt;br /&gt;
*Follow up outreach efforts&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009) &lt;br /&gt;
&lt;br /&gt;
*Budget: nil (nil) &lt;br /&gt;
*Actual: nil (nil) &lt;br /&gt;
*OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 Appsec DC 2010] &lt;br /&gt;
| 8-11 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.techexecnetworks.com/event_2010.12.01.asp Software Security Assurance Summit] &lt;br /&gt;
| 1 Dec 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Discuss quick win and high impact software assurance activities using the OWASP SAMM model as reference and cite other OWASP projects as resources. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94473</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94473"/>
				<updated>2010-11-30T23:52:04Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Completed Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
== Monthly Report  ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 31 October 2010 Updated by: CW &lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month &lt;br /&gt;
&lt;br /&gt;
*Response submitted to UK Office of Fair Trading consultation &lt;br /&gt;
*Began work on response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Began work on response to ICO Data Sharing CoP &lt;br /&gt;
*Some further follow-up work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc) &lt;br /&gt;
*Committee plan for OWASP Summit 2011 submitted&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Yiannis Pavlosoglou takes over GIC chair from 1 Nov 2010 &lt;br /&gt;
*Submit response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Submit response ICO Data Sharing CoP &lt;br /&gt;
*Meeting with (ISC)^2 &lt;br /&gt;
*Respond to IETF enquiry &lt;br /&gt;
*Follow up outreach efforts&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009) &lt;br /&gt;
&lt;br /&gt;
*Budget: nil (nil) &lt;br /&gt;
*Actual: nil (nil) &lt;br /&gt;
*OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 Appsec DC 2010] &lt;br /&gt;
| 8-11 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 30 Nov 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94472</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94472"/>
				<updated>2010-11-30T23:51:33Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Completed Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
== Monthly Report  ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 31 October 2010 Updated by: CW &lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month &lt;br /&gt;
&lt;br /&gt;
*Response submitted to UK Office of Fair Trading consultation &lt;br /&gt;
*Began work on response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Began work on response to ICO Data Sharing CoP &lt;br /&gt;
*Some further follow-up work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc) &lt;br /&gt;
*Committee plan for OWASP Summit 2011 submitted&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Yiannis Pavlosoglou takes over GIC chair from 1 Nov 2010 &lt;br /&gt;
*Submit response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Submit response ICO Data Sharing CoP &lt;br /&gt;
*Meeting with (ISC)^2 &lt;br /&gt;
*Respond to IETF enquiry &lt;br /&gt;
*Follow up outreach efforts&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009) &lt;br /&gt;
&lt;br /&gt;
*Budget: nil (nil) &lt;br /&gt;
*Actual: nil (nil) &lt;br /&gt;
*OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 Appsec DC 2010] &lt;br /&gt;
| 8-11 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]] &lt;br /&gt;
| 24 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot; &lt;br /&gt;
| AF/LA&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94471</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=94471"/>
				<updated>2010-11-30T23:50:48Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement  ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Committee Plan  ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri &lt;br /&gt;
| lorna.alamri 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair (from Nov 2010) is Yiannis Pavlosoglou. Previous chairs: &lt;br /&gt;
&lt;br /&gt;
*Colin Watson (Nov 2009 to Oct 2010)&lt;br /&gt;
&lt;br /&gt;
== Monthly Report  ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 31 October 2010 Updated by: CW &lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month &lt;br /&gt;
&lt;br /&gt;
*Response submitted to UK Office of Fair Trading consultation &lt;br /&gt;
*Began work on response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Began work on response to ICO Data Sharing CoP &lt;br /&gt;
*Some further follow-up work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc) &lt;br /&gt;
*Committee plan for OWASP Summit 2011 submitted&lt;br /&gt;
&lt;br /&gt;
Planned for Next Month &lt;br /&gt;
&lt;br /&gt;
*Yiannis Pavlosoglou takes over GIC chair from 1 Nov 2010 &lt;br /&gt;
*Submit response to DOJ Nondiscimination on the Basis of Disability &lt;br /&gt;
*Submit response ICO Data Sharing CoP &lt;br /&gt;
*Meeting with (ISC)^2 &lt;br /&gt;
*Respond to IETF enquiry &lt;br /&gt;
*Follow up outreach efforts&lt;br /&gt;
&lt;br /&gt;
Issues/Risks/Challenges &lt;br /&gt;
&lt;br /&gt;
*Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009) &lt;br /&gt;
&lt;br /&gt;
*Budget: nil (nil) &lt;br /&gt;
*Actual: nil (nil) &lt;br /&gt;
*OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
== Getting Involved  ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC &lt;br /&gt;
**Dial in number: +1 866 534 4754 &lt;br /&gt;
**Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call]) &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute. &lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity  ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Reconnecting with past Industy Committee connections&lt;br /&gt;
| 1 Feb 2011&lt;br /&gt;
| Follow up&lt;br /&gt;
| In progress&lt;br /&gt;
| YP and LA to follow up with Industry Committee past contacts.&lt;br /&gt;
| YP/LA&lt;br /&gt;
|-&lt;br /&gt;
| (ISC)^2 Application Security Advisory Board (ASAB) &lt;br /&gt;
| 19 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In progress &lt;br /&gt;
| YP is now a member of the (ISC)^2 ASAB, with the first meeting to be held in FL on the above stated date. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]] &lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress &lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Present a talk about OWASP. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2010 Appsec DC 2010] &lt;br /&gt;
| 8-11 Nov 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group. &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG. Arranging a financial panel for AppSec in Washington, DC in November &lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together. Have had trouble getting through to them but have a good lead now. Updates soon&amp;amp;nbsp;:) &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable FCK__ShowTableBorders&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation|e-Consumer Protection Consultation]] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation]. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 8 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]/Cloud Security Alliance/etc joint initiative. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs. Outcome - no help required at present, but BusinessLink system to be disbanded. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp;amp; presentations online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online] &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps &lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]] &lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Liaise with the UK [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94470</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94470"/>
				<updated>2010-11-30T23:47:53Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submitted to http://www.regulations.gov; Comment Tracking Number: 80ba98d3&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Completed&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Submission Response ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94469</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94469"/>
				<updated>2010-11-30T23:46:12Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submitted to regulations.gov; Comment Tracking Number: 80ba98d3&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Completed&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Submission Response ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94468</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94468"/>
				<updated>2010-11-30T23:43:58Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Submission Response */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Submission Response ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94467</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94467"/>
				<updated>2010-11-30T23:43:36Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Final version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Submission Response ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94466</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94466"/>
				<updated>2010-11-30T23:29:42Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94288</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=94288"/>
				<updated>2010-11-29T16:45:20Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Final version */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
OWASP produces guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational, eGovernment, hospitality, recreational, services, transportation, legal, et alia) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92525</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92525"/>
				<updated>2010-11-08T22:40:17Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Draft Text version 2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
:One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
:OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
:Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
:OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92524</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92524"/>
				<updated>2010-11-08T22:38:32Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Draft Text version 2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
:*BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
:*W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:*input, storage and output of additional text&lt;br /&gt;
:*alternative forms of CATCHA&lt;br /&gt;
:*input, storage and output of additional files&lt;br /&gt;
:*third-party services&lt;br /&gt;
:*additional client-side scripting&lt;br /&gt;
:*flexible session timeouts&lt;br /&gt;
:*enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:*re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
:*Password change frequency&lt;br /&gt;
:*Enforcement of a minimum password length&lt;br /&gt;
:*No maximum password length limits&lt;br /&gt;
:*Previous passwords should not be allowed to be chosen&lt;br /&gt;
:*Password lock out policy&lt;br /&gt;
:*Password complexity requirements&lt;br /&gt;
:*Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
:*for high value transactions&lt;br /&gt;
:*where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
:*where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
:*administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92523</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92523"/>
				<updated>2010-11-08T22:33:03Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Draft Text version 2 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee. OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization that ensures the ongoing availability and support for our work at OWASP.&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
•	BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
•	W3C Mobile Web Application Best Practices Working Draft and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
1) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA? Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website. Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
•	input, storage and output of additional text&lt;br /&gt;
•	alternative forms of CATCHA&lt;br /&gt;
•	input, storage and output of additional files&lt;br /&gt;
•	third-party services&lt;br /&gt;
•	additional client-side scripting&lt;br /&gt;
•	flexible session timeouts&lt;br /&gt;
•	enforcing code validity&lt;br /&gt;
These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
•	re-authentication recovery&lt;br /&gt;
Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule?&lt;br /&gt;
The W3C WAI pages on WCAG 2.0 provide ample information. In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effort elsewhere would appear to be un-necessary. In terms of ensuring the security is maintained, we recommend OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Security Verification Standard and the Software assurance Maturity Model. These are already referenced by organizations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations&lt;br /&gt;
&lt;br /&gt;
7) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible?&lt;br /&gt;
At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
When applying website accessibility standards to transactional websites. (E-commerce, financial, healthcare, educational) It is important for users to understand that these websites must comply with security standards set forth to protect customer, patient and student information.  These same security standards could make it more difficult for users with disabilities to utilize transactional websites.  &lt;br /&gt;
&lt;br /&gt;
The following features may render compliance with accessibility requirements difficult or impossible, however they are very important tools in protecting sensitive information in a transactional website. &lt;br /&gt;
&lt;br /&gt;
Session Timeout&lt;br /&gt;
One such standard is enforcing a session timeout.  Session tokens that do not expire on the HTTP server can allow an attacker unlimited time to guess or brute-force a valid authenticated session token.  If a user’s cookie file is captured or brute-forced, then an attacker can use these static session tokens to gain access to that user’s web account for that site.  OWASP recommends that idle session time out for highly protected web applications are set at 5 minutes and no more than 20 minutes for low risk applications.  &lt;br /&gt;
&lt;br /&gt;
Passwords&lt;br /&gt;
OWASP Recommends that website security policy for passwords include the following:&lt;br /&gt;
•	Password change frequency&lt;br /&gt;
•	Enforcement of a minimum password length&lt;br /&gt;
•	No maximum password length limits&lt;br /&gt;
•	Previous passwords should not be allowed to be chosen&lt;br /&gt;
•	Password lock out policy&lt;br /&gt;
•	Password complexity requirements&lt;br /&gt;
•	Password lock out&lt;br /&gt;
&lt;br /&gt;
Strong Authentication&lt;br /&gt;
Strong authentication (such as tokens, certificates, etc) provides a higher level of security than username and passwords. The generalized form of strong authentication is “something you know, something you hold”. Therefore, anything that requires a secret (the “something you know”) and authenticator like a token, USB fob, or certificate (the “something you hold”) is a stronger control than username and passwords (which is just “something you know”) or biometrics (“something you are”).&lt;br /&gt;
&lt;br /&gt;
OWASP recommends strong authentication for certain applications:&lt;br /&gt;
•	for high value transactions&lt;br /&gt;
•	where privacy is a strong or legally compelled consideration (such as health records, government records, etc)&lt;br /&gt;
•	where audit trails are legally mandated and require a strong association between a person and the audit trail, such as banking applications&lt;br /&gt;
•	administrative access for high value or high risk systems&lt;br /&gt;
&lt;br /&gt;
CAPTCHA&lt;br /&gt;
OWASP does not recommend the use of CAPTCHA. Instead OWASP recommends that Website owner provide another method to sign up or register for a website offline or via another method.  Site should use a “no follow” tag. Another option is to limit privileges of a newly signed up account or similar until a positive validation has occurred.&lt;br /&gt;
&lt;br /&gt;
8) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider?&lt;br /&gt;
In the OWASP response to Question 1, we stated that an accessible website can be secure. It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which do not meet the conformance requirements. A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92522</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92522"/>
				<updated>2010-11-08T21:35:48Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete second draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92520</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=92520"/>
				<updated>2010-11-08T21:04:59Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:lorna.alamri(at)owasp.org '''Lorna Alamri''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* 9 Nov 2010 - Complete first draft response&lt;br /&gt;
* 12 Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* 19 Nov 2010 - Prepare final version&lt;br /&gt;
* 22 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/fileview?id=0B5wp7wNKKjxnYzg3MDI3MTctYzgzYy00MWQzLThmM2UtZjkwOWYzNWU3MzQz&amp;amp;hl=en Annotated version]&lt;br /&gt;
&lt;br /&gt;
[https://spreadsheets.google.com/ccc?key=0AnrIOS37w1dAdDRPSXpWQzF3cXBpY3h4ZVhfTFlSQmc&amp;amp;hl=en&amp;amp;invite=CJPD_e4H Project plan]&lt;br /&gt;
&lt;br /&gt;
[http://www.regulations.gov/search/Regs/home.html#docketDetail?R=DOJ-CRT-2010-0005 Other comments submitted]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== CW's notes ===&lt;br /&gt;
&lt;br /&gt;
''CW: I think the following questions posed by the DoJ are the most relevant for response by OWASP.  My comments on each of those are included below.''&lt;br /&gt;
&lt;br /&gt;
1.) Should the Department adopt the WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; as it's standard for Web site accessibility for entities covered by Titles II and III of the ADA?  Is there any reason why the Department should consider adopting another success criteria level of the WCAG 2.0?&lt;br /&gt;
&lt;br /&gt;
:From a website security point of view, WCAG 2.0s &amp;quot;Level AA Success Criteria&amp;quot; is not inconsistent with having a secure website.  Conformance levels A, AA and AAA all require additional considerations for security due to the use of:&lt;br /&gt;
:* input, storage and output of additional text&lt;br /&gt;
:* alternative forms of CATCHA&lt;br /&gt;
:* input, storage and output of additional files &lt;br /&gt;
:* third party services&lt;br /&gt;
:* additional client-side scripting&lt;br /&gt;
:* flexible session timeouts&lt;br /&gt;
:* enforcing code validity&lt;br /&gt;
:These can all be achieved using secure development practices, but the additional requirements increase complexity. There is one aspect in the more stringent &amp;quot;Level AAA Success Criteria&amp;quot; which would be difficult to achieve in a secure manner:&lt;br /&gt;
:* re-authentication recovery&lt;br /&gt;
:Reference: &amp;quot;Can an accessible web application be secure? Assessment issues for security testers, developers and auditors&amp;quot;, Colin Watson, OWASP AppSec Europe 2009, http://www.owasp.org/images/2/22/AppSecEU09_owasp_appsec_eu09_colin_watson_2.ppt&lt;br /&gt;
&lt;br /&gt;
6.) What Resources and services are available to public accommodations and public entities to make their Web sites accessible? What is the ability of covered entities to make their Web sites accessible with in-house staff? What technical assistance should the Department make available to public entities and public accommodations to assist them with complying with this rule? &lt;br /&gt;
&lt;br /&gt;
:The W3C WAI pages on WCAG 2.0 provide ample information.  In particular the &amp;quot;Techniques and Failures for Web Content Accessibility Guidelines 2.0&amp;quot; provide excellent guidance and duplication of this effeort elsewhere would appear to be un-necessary.  In terms of ensuring the security is maintained, we recommed OWASP's own guidance documents, standards and tools such as the Top Ten, Development Guide, Code Review Guide, Testing Guide, Application Securitity Versification Standard and the Software assurance Maturity Model.  These are already referenced by organisations such as DISA, NIST, NSA and the FFIEC.&lt;br /&gt;
:Reference: OWASP Citations http://www.owasp.org/index.php/Industry:Citations''&lt;br /&gt;
&lt;br /&gt;
7.) Are there distinct or specialized features used on Web sites that render compliance with accessibility requirements difficult or impossible? &lt;br /&gt;
&lt;br /&gt;
:At Conformance Level AA, no.&lt;br /&gt;
&lt;br /&gt;
8.) Given that most websites today provide significant amounts of services and information in a dynamic, evolving setting that would be difficult, if not impossible, to replicate through alternative, accessible means, to what extent can accessible alternatives still be provided? Might viable accessible alternatives still exist for simple, non-dynamic Web sites?&lt;br /&gt;
&lt;br /&gt;
:It is important that alternative means provide the same level of protection to the users, their data and the business systems, so that for example weaker authentication requirements in an alternative telephone service make it easier to steal a person's identity than through an online website service, or the telephone service can be used to assist exploitation of the website (e.g. enumerate usernames).&lt;br /&gt;
&lt;br /&gt;
19.) The Department is interested in gathering other information or data relating to the Department’s objective to provide requirements for Web accessibility under titles II and III of the ADA. Are there additional issues or information not addressed by the Department’s questions that are important for the Department to Consider? &lt;br /&gt;
&lt;br /&gt;
:In the OWASP response to Question 1, we stated that an accessible website can be secure.  It is also worth mentioning that an insecure website possibly may not be accessible because it would be possible to create web pages (responses) which are do not met the conformance requirements.  A simple example would be injecting code which includes inaccessible content from a third party website, or which breaks the code validity because an extra H1 tag has been inserted.&lt;br /&gt;
&lt;br /&gt;
''Some customised About OWASP text''&lt;br /&gt;
&lt;br /&gt;
This response is submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee.  OWASP is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a U.S. recognized 501(c)(3) not-for-profit charitable organization, that ensures the ongoing availability and support for our work at OWASP. &lt;br /&gt;
&lt;br /&gt;
OWASP has previously submitted responses to related standards and guidance:&lt;br /&gt;
* BS 8878:2009 Web accessibility. Building accessible experiences for disabled people DPC&lt;br /&gt;
* W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
and NIST documents such as NIST SP 800-37 (Rev 1), SP 800-53 (Rev 3), SP 800-122 and IR 7628.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=91281</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=91281"/>
				<updated>2010-10-12T17:07:00Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Committee Plan ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Lorna Alamri&lt;br /&gt;
| lorna.alamri 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik 'at' gmail dot com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The committee chair is Colin Watson.  From 1st November 2010, Yiannis Pavlosoglou will take over this role.&lt;br /&gt;
&lt;br /&gt;
== Monthly Report ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 29 September 2010&lt;br /&gt;
Updated by: CW&lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month&lt;br /&gt;
* Finish writing article for BCS&lt;br /&gt;
* Continued work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc)&lt;br /&gt;
* Yiannis Pavlosoglou was elected unopposed as GIC chair from 1 Nov 2010&lt;br /&gt;
Planned for Next Month&lt;br /&gt;
* Review whether OWASP should respond to W3C Document Object Model (DOM) Level 3 Events Specification&lt;br /&gt;
* Follow up outreach to SPVA, USNA and USMMA&lt;br /&gt;
* Response to UK Office of Fair Trading consultation&lt;br /&gt;
Issues/Risks/Challenges&lt;br /&gt;
* Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009)&lt;br /&gt;
* Budget: nil (nil)&lt;br /&gt;
* Actual: nil (nil)&lt;br /&gt;
* OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
* TBC&lt;br /&gt;
** Dial in number:  +1 866 534 4754&lt;br /&gt;
** Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes_2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call])&lt;br /&gt;
* [[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call])&lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute.&lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]].  We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively.&lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DOJ Nondiscrimination on the Basis of Disability|DOJ Nondiscimination on the Basis of Disability]]&lt;br /&gt;
| 24 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress&lt;br /&gt;
| Provide response to US DOJ's &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
| AF/LA&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ICO Data Sharing CoP|Data Sharing CoP]]&lt;br /&gt;
| 5 Jan 2011 &lt;br /&gt;
| Standards &lt;br /&gt;
| In progress&lt;br /&gt;
| Provide response to UK ICO's &amp;quot;Data Sharing Code of Practice Consultation&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New&lt;br /&gt;
| Present a talk about OWASP.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010&lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress&lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten.&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 8-11 Nov 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams.&lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group.&lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG.  Arranging a financial panel for AppSec in Washington, DC in November&lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| In Progress &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]'s [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together.  Have had trouble getting through to them but have a good lead now.  Updates soon :)&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:e-Consumer Protection Consultation |e-Consumer Protection Consultation]]&lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed&lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ e-Consumer Protection Consultation].&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010&lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's  [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group].&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs.  Outcome - no help required at present, but BusinessLink system to be disbanded.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor  &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp; presentations online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps&lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]]&lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Liaise with the UK  [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee  &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=91278</id>
		<title>Industry:DOJ Nondiscrimination on the Basis of Disability</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Industry:DOJ_Nondiscrimination_on_the_Basis_of_Disability&amp;diff=91278"/>
				<updated>2010-10-12T15:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: Created page with '__NOTOC__  Return to Global Industry Committee  {| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;  ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font co…'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Activity Name'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''DOJ Nondiscrimination on the Basis of Disability''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Description''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Provide response to &amp;quot;Accessibility of Web Information and Services of State and Local Government Entities and Public Accommodations&amp;quot;&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Related Projects ''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|None&lt;br /&gt;
 |-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts &amp;amp; Roles'''&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Primary'''&amp;lt;br&amp;gt;[mailto:alexander.fry(at)owasp.org '''Alexander Fry'''] &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Secondary'''&amp;lt;br&amp;gt;[mailto:(at)owasp.org '''TBC''']&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''Mailing list'''&amp;lt;br&amp;gt;Please use the [http://lists.owasp.org/mailman/listinfo/global_industry_committee Industry Committee list]&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ACTIVITY SPECIFICS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Objectives'''&lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* Review Proposed Rulemaking - in particular issues relating to Web application security&lt;br /&gt;
* Where appropriate, draft a response for submission&lt;br /&gt;
* Submit the response as an official OWASP statement&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Deadlines''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* ? Nov 2010 - Complete first draft response&lt;br /&gt;
* ? Nov 2010 - Circulate to OWASP chapters and GIC mailing lists&lt;br /&gt;
* ? Nov 2010 - Prepare final version&lt;br /&gt;
* 30 Nov 2010 - Submit to DOJ&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Status''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* In Progress&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Resources''' &lt;br /&gt;
 | colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|[http://www.regulations.gov/search/Regs/home.html#documentDetail?R=0900006480b20b1a Document detail]&lt;br /&gt;
&lt;br /&gt;
Response submission to Federal eRulemaking Web site: www.regulations.gov by 24th January 2011&lt;br /&gt;
 |-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Submission Response ==&lt;br /&gt;
&lt;br /&gt;
''Latest first''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Final version ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 2 ===&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Draft Text version 1 ===&lt;br /&gt;
&lt;br /&gt;
==== Introduction ====&lt;br /&gt;
&lt;br /&gt;
This official response has been submitted on behalf of the Open Web Application Security Project (OWASP) by the OWASP Global Industry Committee, following our own consultation process.&lt;br /&gt;
&lt;br /&gt;
==== Response ====&lt;br /&gt;
&lt;br /&gt;
''tbc''&lt;br /&gt;
&lt;br /&gt;
==== About OWASP ====&lt;br /&gt;
&lt;br /&gt;
''to be added in final draft''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Return to [[Global Industry Committee]]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=89309</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=89309"/>
				<updated>2010-09-14T22:37:43Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Committee Plan ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik@gmail.com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Monthly Report ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 31 August 2010&lt;br /&gt;
Updated by: CW&lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month&lt;br /&gt;
* Response to W3C Mobile Web Application Best Practices Working Draft&lt;br /&gt;
* Writing article for BCS (in progress)&lt;br /&gt;
* Continued work on Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project (with ENISA, CSA, etc)&lt;br /&gt;
* Meeting with UK Office of Fair Trading regarding e-consumer protection&lt;br /&gt;
Planned for Next Month&lt;br /&gt;
* Finish writing article for BCS&lt;br /&gt;
* Follow up outreach to SPVA and USMMA&lt;br /&gt;
* Election of new GIC chair&lt;br /&gt;
* Response to UK Office of Fair Trading consultation&lt;br /&gt;
* Outreach to UK ICO (in conjunction with UK chapters and Connections Committee)&lt;br /&gt;
Issues/Risks/Challenges&lt;br /&gt;
* Difficulty getting enough engagement with good contacts in all priority sectors&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010 (2009)&lt;br /&gt;
* Budget: nil (nil)&lt;br /&gt;
* Actual: nil (nil)&lt;br /&gt;
* OWASP staff time: negligible (negligible)&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
* TBC&lt;br /&gt;
** Dial in number:  +1 866 534 4754&lt;br /&gt;
** Call code 192341&lt;br /&gt;
&lt;br /&gt;
Minutes of previous meetings are: &lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes_2010-08-17|17 Aug 2010]] (also [http://www.owasp.org/images/0/0d/Gic_call_17aug2010.mp3 MP3 recording of the call])&lt;br /&gt;
* [[Industry:Minutes 2010-05-18|18 May 2010]] &lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] (also [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 MP3 recording of the call])&lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. But you don't have to be an OWASP Member or Committee Member to contribute.&lt;br /&gt;
&lt;br /&gt;
The current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]].  We would especially welcome new members who can widen our geographic coverage (e.g. Africa, Asia and South America) and who have time to contribute proactively.&lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.londoncentral.bcs.org BCS London Central] &lt;br /&gt;
| 17 Feb 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New&lt;br /&gt;
| Present a talk about OWASP.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.bcs.org BCS] &lt;br /&gt;
| 3 Sep 2010&lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress&lt;br /&gt;
| Write article for BCS ITnow magazine about application security and OWASP Top Ten.&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 8-11 Nov 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/OFTwork/consultations/current/eprotection/ UK OFT e-Consumer Protection Consultation] &lt;br /&gt;
| 13 Oct 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| New&lt;br /&gt;
| Review and provide official OWASP response to [http://www.oft.gov.uk/ UK Office of Fair Trading] consultation.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USMMA computer club or security teams.&lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usna.edu/ USNA] &lt;br /&gt;
| 1 Jan 2011 &lt;br /&gt;
| Outreach &lt;br /&gt;
| New &lt;br /&gt;
| Make contact. Present a talk about OWASP to the USNA computer science faculty and students or interest group.&lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG.  Arranging a financial panel for AppSec in Washington, DC in November&lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| In Progress &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]'s [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together.  Have had trouble getting through to them but have a good lead now.  Updates soon :)&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.w3.org/TR/2010/WD-mwabp-20100713/ Mobile Web Application Best Practices Working Draft] &lt;br /&gt;
| 6 Aug 2010&lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Review and provide official OWASP response to W3C's  [http://www.w3.org/2005/MWI/BPWG/ Mobile Web Best Practices Working Group].&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.oft.gov.uk/ UK Office of Fair Trading] &lt;br /&gt;
| 23 Jul 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| 1 Jul 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs.  Outcome - no help required at present, but BusinessLink system to be disbanded.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| 28 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports. Outcome - positive response received.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor  &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp; presentations online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps&lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]]&lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Liaise with the UK  [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee  &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=85702</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=85702"/>
				<updated>2010-06-30T19:47:22Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Work in Progress */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Committee Plan ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik@gmail.com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Monthly Report ==&lt;br /&gt;
&lt;br /&gt;
Date of last update: 30 June 2010&lt;br /&gt;
Updated by: CW&lt;br /&gt;
&lt;br /&gt;
Accomplishments for this Month&lt;br /&gt;
* Outreach at FROC 2010&lt;br /&gt;
* Contacted UK BusinessLink&lt;br /&gt;
* Work on ENISA Common Assurance Maturity Model in conjunction with OWASP Cloud 10 project&lt;br /&gt;
* Presentations about ENISA CAMM and AppSensor project at OWASP Leeds/North chapter meeting&lt;br /&gt;
* Minor updates to OWASP Citations page&lt;br /&gt;
Planned for Next Month&lt;br /&gt;
* Continue work on ENISA Common Assurance Maturity Model&lt;br /&gt;
* Follow up outreach to SPVA and BusinessLink&lt;br /&gt;
* Outreach to Veracode report authors&lt;br /&gt;
Issues/Risks/Challenges&lt;br /&gt;
* Committee members lacking time due to other commitments (e.g. other OWASP commitments, work and family)&lt;br /&gt;
Financial costs to OWASP for calender year ending 31 Dec 2010&lt;br /&gt;
* Budget: nil&lt;br /&gt;
* Actual: nil&lt;br /&gt;
* OWASP staff time: negligible&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC&lt;br /&gt;
** Dial in number:  +1 866 534 4754&lt;br /&gt;
** Call code 192341&lt;br /&gt;
&lt;br /&gt;
Previous meetings are: &lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes 2010-05-18|18 May 2010]]&lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] - [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 Recording (mp3) of the call] &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. &lt;br /&gt;
&lt;br /&gt;
You don't have to be an OWASP Member or Committee Member to contribute - the current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| Veracode &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Discuss use of Open SAMM to classify Secure SDL maturity in Veracode's code analysis summary reports&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.businesslink.gov.uk BusinessLink] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Offer to contribute to development of IT security information about [http://www.businesslink.gov.uk/bdotg/action/layer?topicId=1075421745 application security] on the BusinessLink website for UK SMEs&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.auscert.org.au/ AusCERT] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities for OWASP to contribute to their work&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Financial Services SIG &lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress &lt;br /&gt;
| Working with Fabio Cerullo, Eoin Keary, Jim Routh, Jerry Kickenson and others on forming a SIG&lt;br /&gt;
| JB/EK&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:ENISA Cloud Computing Common Assurance Metrics|ENISA Common Assurance Maturity Model]] &lt;br /&gt;
| 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| In Progress &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Maturity Model for [http://www.enisa.europa.eu/ ENISA]'s [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together.  Have had trouble getting through to them but have a good lead now.  Updates soon :)&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.usmma.edu/ USMMA] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Make contact and discuss opportunities to introduce OWASP to less exposed industry verticals.&lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Leeds_UK OWASP Leeds/North] &lt;br /&gt;
| 16 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentations at chapter meeting in Newcastle-upon-Tyne about ENISA CAMM and OWASP Appsensor  &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2010 Front Range OWASP Conference (FROC) 2010] &lt;br /&gt;
| 2 Jun 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation [http://tinyurl.com/froctalks Vids &amp;amp; presentations online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.isaca-denver.org/meetings/MAY_2010_CHPT_MTG.shtml OWASP Presentation at ISACA Denver Annual Meeting] &lt;br /&gt;
| 27 May 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation [https://docs.google.com/fileview?id=0B_-vbfka88vFNjIwY2IwYjItZmYyNi00MmNiLWFhOWItYmQ4OGZmZjVmZWUx&amp;amp;hl=en Presentation online]&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.issa-uk.org/ ISSA-UK] &lt;br /&gt;
| 13 May 2010&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation&lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Mobile Apps&lt;br /&gt;
| Mar 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and introduce OWASP contact for ENISA's Mobile Apps Project, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Technology Strategy Board Secure Software Development Initiative|Technology Strategy Board Secure Software Development Partnership]]&lt;br /&gt;
| 18 Feb 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Liaise with the UK  [http://www.innovateuk.org/ Technology Strategy Board] about the Secure Software Development Partnership (SSDP) in conjunction with the [http://www.owasp.org/index.php/London London chapter] leader Justin Clarke&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee  &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] &lt;br /&gt;
| Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed&lt;br /&gt;
| Discuss opportunities for OWASP to work with ENISA, in conjunction with Dinis Cruz. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=76676</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=76676"/>
				<updated>2010-01-24T18:22:59Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Completed Items */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.''' &lt;br /&gt;
&lt;br /&gt;
== Mission Statement ==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.'' [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Committee Plan ==&lt;br /&gt;
&lt;br /&gt;
Step 1: [[Industry:Organizations for Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel &lt;br /&gt;
&lt;br /&gt;
Step 2: Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us &lt;br /&gt;
&lt;br /&gt;
Step 3: Execute, leveraging global OWASP resources as much as possible to maximize impact &lt;br /&gt;
&lt;br /&gt;
Step 4: Evaluate progress &amp;amp;amp; repeat Step 1-3 &lt;br /&gt;
&lt;br /&gt;
== Committee Members ==&lt;br /&gt;
&lt;br /&gt;
Current Board Member Rep (appointed Jan 2010): [mailto:dave.wichers@owasp.org Dave Wichers] &lt;br /&gt;
&lt;br /&gt;
Original Board Member Rep: [mailto:tomb@owasp.org Tom Brennan] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; Committee Members: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Name &lt;br /&gt;
! Email &lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik &lt;br /&gt;
| bernik@gmail.com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth &lt;br /&gt;
| rex.booth 'at' gt dot com &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell &lt;br /&gt;
| dcampbell 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry &lt;br /&gt;
| alexander.fry 'at' owasp dot org &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess &lt;br /&gt;
| georg.hess 'at' artofdefence dot com &lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary &lt;br /&gt;
| eoin.keary 'at' owasp dot org &lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou &lt;br /&gt;
| yiannis 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson &lt;br /&gt;
| colin.watson 'at' owasp dot org &lt;br /&gt;
| UK&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
OWASP Employees: &lt;br /&gt;
&lt;br /&gt;
*Alison &lt;br /&gt;
*Kate Hartman&lt;br /&gt;
&lt;br /&gt;
== Getting Involved ==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List  ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list] &lt;br /&gt;
&lt;br /&gt;
=== Meetings  ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be: &lt;br /&gt;
&lt;br /&gt;
*TBC&lt;br /&gt;
&lt;br /&gt;
Previous meetings are: &lt;br /&gt;
&lt;br /&gt;
*[[Industry:Minutes 2010-01-05|05 Jan 2010]] - [http://www.owasp.org/images/a/a3/Owasp_gic_call_5jan10.mp3 Recording (mp3) of the call] &lt;br /&gt;
*[[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership  ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. &lt;br /&gt;
&lt;br /&gt;
You don't have to be an OWASP Member or Committee Member to contribute - the current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]]. &lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives  ===&lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide. &lt;br /&gt;
*[http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry. &lt;br /&gt;
*[http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
== Current Activity ==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress  ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken: &lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Deadline &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.enisa.europa.eu/ ENISA] Cloud Computing Common Assurance Metrics &lt;br /&gt;
| 2010 &lt;br /&gt;
| Standards &lt;br /&gt;
| New &lt;br /&gt;
| Work with [[:Category:OWASP Cloud ‐ 10 Project]] to contribute to the development of Common Assurance Metrics for ENISA's [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-information-assurance-framework?searchterm=cloud Cloud Computing Information Assurance Framework]. See also the [http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment Cloud Computing Risk Assessment] report. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Personal Information Online Code of Practice|Personal Information Online COP]] &lt;br /&gt;
| 5 Mar 2010 &lt;br /&gt;
| Legislation &lt;br /&gt;
| In Progress &lt;br /&gt;
| Provide response to UK Information Commissioner's Office draft &amp;quot;Personal Information Online Code of Practice&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| In Progress &lt;br /&gt;
| Begin dialogue about possibility of working together &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items  ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Task &lt;br /&gt;
! Completed &lt;br /&gt;
! Type &lt;br /&gt;
! Status &lt;br /&gt;
! Description &lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.issa-nova.org Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA)] &lt;br /&gt;
| 21 Jan 2010 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide presentation covering CSSLP, fundamentals of AppSec and Intro to OWASP and Global Industry Committee  &lt;br /&gt;
| AF&lt;br /&gt;
|-&lt;br /&gt;
| [[:Industry:Draft NIST SP 800-37 Revision 1|NIST SP 800-37 Revision 1 FPD]] Review Project &lt;br /&gt;
| 30 Dec 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST SP 800-37 Revision 1 Final Public Draft, Guide for Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.crest-approved.org/ CREST] CRESTCon &lt;br /&gt;
| 15 Dec 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp;amp; CW have been placed on the reserve list. Update: Positions secured for the 15th. &lt;br /&gt;
| YP&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network] &lt;br /&gt;
| 30 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628|Draft NIST IR 7628]] &lt;br /&gt;
| 25 Nov 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009] &lt;br /&gt;
| 10-13 Nov 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice] &lt;br /&gt;
| - &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Ask to be added to official consultation list &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA] &lt;br /&gt;
| 13-15 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| OWASP booth at trade show &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009] &lt;br /&gt;
| 13 Oct 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 28 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009] &lt;br /&gt;
| 10 Sep 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations &lt;br /&gt;
| 7 Sep 2009 &lt;br /&gt;
| Other &lt;br /&gt;
| Closed &lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress] &lt;br /&gt;
| 26 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit] &lt;br /&gt;
| 13 Aug 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures]. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]] &lt;br /&gt;
| 31 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project] &lt;br /&gt;
| 8 Jul 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0] &lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]] &lt;br /&gt;
| 25 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009] &lt;br /&gt;
| 1 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Deliver presentation on web threats and countermeasures. See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info. &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory] &lt;br /&gt;
| - &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters. &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London] &lt;br /&gt;
| 2 Jun 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce] &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]] &lt;br /&gt;
| 29 May 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot; &lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association &lt;br /&gt;
| 15 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation on OWASP &lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines] &lt;br /&gt;
| 7 May 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]] &lt;br /&gt;
| 31 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]] &lt;br /&gt;
| 27 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot; &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]] &lt;br /&gt;
| 13 Mar 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]] &lt;br /&gt;
| 12 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]]) &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]] &lt;br /&gt;
| 11 Mar 2009 &lt;br /&gt;
| Legislation &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range] &lt;br /&gt;
| 5 Mar 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Conference organisation &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce] &lt;br /&gt;
| 25 Feb 2009 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group &lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]] &lt;br /&gt;
| 31 Jan 2009 &lt;br /&gt;
| Standards &lt;br /&gt;
| Closed &lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC) &lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure. [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here]. Email DC for full PPT with speaker notes &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk] &lt;br /&gt;
| Nov 2008 &lt;br /&gt;
| Outreach &lt;br /&gt;
| Closed &lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website &lt;br /&gt;
| DC&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports  ===&lt;br /&gt;
&lt;br /&gt;
[[Summit 2009]] &lt;br /&gt;
&lt;br /&gt;
*Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations): &lt;br /&gt;
&lt;br /&gt;
*Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]] &lt;br /&gt;
*Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]] &lt;br /&gt;
*May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]] &lt;br /&gt;
*Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]] &lt;br /&gt;
*Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=73980</id>
		<title>Global Industry Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee&amp;diff=73980"/>
				<updated>2009-11-23T15:31:35Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* Committee Members */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''The Global Industry Committee was created during the OWASP EU Summit in Portugal. The primary purpose of the Global Industry Committee is to work with industry executives to gather requirements from industry, work with Membership, Projects and others.'''&lt;br /&gt;
&lt;br /&gt;
==Mission Statement==&lt;br /&gt;
&lt;br /&gt;
''To expand awareness of and promote the inclusion of software security best practices in Industry, Government, Academia and regulatory agencies and be a voice for industry. We will accomplish this through outreach; including presentations, development of position papers and collaborative efforts with other entities.''  [https://www.owasp.org/index.php/Global_Industry_Committee#General_Presentations_and_Reports Powerpoint of Accomplishments]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Committee Plan==&lt;br /&gt;
&lt;br /&gt;
Step 1:&lt;br /&gt;
[[Industry:Organizations_for_Outreach|Identify specific organizations]] worth working with to spread the OWASP gospel&lt;br /&gt;
&lt;br /&gt;
Step 2:&lt;br /&gt;
Prioritize the proposed liasons based on potential impact, and also realistic likelihood of the organization actively working with us&lt;br /&gt;
&lt;br /&gt;
Step 3:&lt;br /&gt;
Execute, leveraging global OWASP resources as much as possible to maximize impact&lt;br /&gt;
&lt;br /&gt;
Step 4:&lt;br /&gt;
Evaluate progress &amp;amp; repeat Step 1-3&lt;br /&gt;
&lt;br /&gt;
==Committee Members==&lt;br /&gt;
&lt;br /&gt;
Board Member Rep: [mailto:tomb@owasp.org Tom Brennan]&lt;br /&gt;
&lt;br /&gt;
Committee Members:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Name&lt;br /&gt;
! Email&lt;br /&gt;
! Location&lt;br /&gt;
|-&lt;br /&gt;
| Joe Bernik&lt;br /&gt;
| &lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Rex Booth&lt;br /&gt;
| rex.booth 'at' gt dot com&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| David Campbell&lt;br /&gt;
| dcampbell 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Alexander Fry&lt;br /&gt;
| alexander.fry 'at' owasp dot org&lt;br /&gt;
| US&lt;br /&gt;
|-&lt;br /&gt;
| Georg Hess&lt;br /&gt;
| georg.hess 'at' artofdefence dot com&lt;br /&gt;
| Germany&lt;br /&gt;
|-&lt;br /&gt;
| Eoin Keary&lt;br /&gt;
| eoin.keary 'at' owasp dot org&lt;br /&gt;
| Ireland&lt;br /&gt;
|-&lt;br /&gt;
| Yiannis Pavlosoglou&lt;br /&gt;
| yiannis 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
| Colin Watson&lt;br /&gt;
| colin.watson 'at' owasp dot org&lt;br /&gt;
| UK&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
OWASP Employees:&lt;br /&gt;
* Alison&lt;br /&gt;
* Kate Hartman&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
=== Mailing List ===&lt;br /&gt;
&lt;br /&gt;
[http://lists.owasp.org/mailman/listinfo/global_industry_committee Join our mailing list]&lt;br /&gt;
&lt;br /&gt;
=== Meetings ===&lt;br /&gt;
&lt;br /&gt;
The next Global Industry Committee meeting will be:&lt;br /&gt;
&lt;br /&gt;
* TBC (Conference Bridge: 1-866-534-4754)&lt;br /&gt;
&lt;br /&gt;
Host Code: check calendar invite&lt;br /&gt;
&lt;br /&gt;
Guest Code:  192341&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Previous meeting minutes are:&lt;br /&gt;
&lt;br /&gt;
* [[Industry:Minutes 2009-01-23|23 Jan 2009]]&lt;br /&gt;
&lt;br /&gt;
=== Membership ===&lt;br /&gt;
&lt;br /&gt;
[[Membership]] explains how to become an OWASP organization supporter or individual member. &lt;br /&gt;
&lt;br /&gt;
You don't have to be an OWASP Member or Committee Member to contribute - the current committee members joined for a 12 month term - see [[How to Join a Committee]] and [[Global Committee Pages]].&lt;br /&gt;
&lt;br /&gt;
=== Other ongoing initiatives ===&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/index.php/Global_Industry_Committee-SIG Special Interest Groups] - Outreach to sector-specific critical infrastructures worldwide.&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:India OWASP India Advisory Board] - Regional panel contributing to the software outsourcing industry.&lt;br /&gt;
* [http://www.owasp.org/index.php/Industry:Citations OWASP Citations] - References to OWASP in official, or otherwise important, documents.&lt;br /&gt;
&lt;br /&gt;
==Current Activity==&lt;br /&gt;
&lt;br /&gt;
=== Work in Progress ===&lt;br /&gt;
&lt;br /&gt;
The current activities being undertaken:&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Deadline&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.spva.org Secure POS Vendor Alliance (SPVA)]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress&lt;br /&gt;
| Begin dialogue about possibility of working together &lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST IR 7628]]&lt;br /&gt;
| 25 Nov 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| In Progress&lt;br /&gt;
| Provide response to &amp;quot;NIST IR 7628 Draft Smart Grid Cyber Security Strategy and Requirements&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://msdn.microsoft.com/en-us/security/cc448177.aspx SDL Pro Network]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress&lt;br /&gt;
| Contact SDL Pro Network to discuss if there are opportunities for OWASP to become involved or connected in some way&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| CRESTCon on 15th December&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| Contacted CREST&lt;br /&gt;
| Already an oversubscribed event, YP &amp;amp; CW have been placed on the reserve list&lt;br /&gt;
| YP&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== Completed Items ===&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
! Task&lt;br /&gt;
! Completed&lt;br /&gt;
! Type&lt;br /&gt;
! Status&lt;br /&gt;
! Description&lt;br /&gt;
! Who&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_DC_2009 Appsec DC 2009]&lt;br /&gt;
| 10-13 Nov 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| In Progress&lt;br /&gt;
| Conference organisation - special effort to engage with US Federal sector&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.justice.gov.uk/ UK Ministry of Justice]&lt;br /&gt;
| -&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Ask to be added to official consultation list&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.it-sa.de/ IT-SA]&lt;br /&gt;
| 13-15 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| OWASP booth at trade show&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_AppSec_Germany_2009_Conference OWASP AppSec Germany 2009]&lt;br /&gt;
| 13 Oct 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 28 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/OWASP_Ireland_AppSec_2009_Conference OWASP Ireland AppSec 2009]&lt;br /&gt;
| 10 Sep 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| EK&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Citations&lt;br /&gt;
| 7 Sep 2009&lt;br /&gt;
| Other&lt;br /&gt;
| Closed&lt;br /&gt;
| Identify and record the most important references to OWASP in official, or otherwise important, documents. Page created at: [[Industry:Citations]]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.loc.gov Library of Congress]&lt;br /&gt;
| 26 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| OWASP webcast at Brighttalk [http://www.brighttalk.com/summit/dataprivacy2 Data and Privacy in Web 2.0 Summit]&lt;br /&gt;
| 13 Aug 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver [http://www.brighttalk.com/webcasts/4767/attend OWASP presentation on XSS, client side exploitation, and countermeasures].&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:SAFECode Secure Development Practices (update to Oct 2008 version)|SAFECode Secure Development Practices (update to Oct 2008 version)]]&lt;br /&gt;
| 31 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to [http://www.safecode.org/ SAFECode] &amp;quot;Fundamental Practices for Secure Software Development: A Guide to the Most Effective Secure Development Practices in Use Today.&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Category:OWASP_CSA_Project OWASP CSA Project]&lt;br /&gt;
| 8 Jul 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Response to RFC [http://www.cloudsecurityalliance.org/guidance/csaguide.pdf Cloud Security Alliance Guidance v1.0]&lt;br /&gt;
| TB&lt;br /&gt;
|-&lt;br /&gt;
| [[Scotland]]&lt;br /&gt;
| 25 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-scotland-industry-committee-june-2009.ppt]] and written notes [[Image:Owasp-scotland-industry-committee-june-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| OWASP Presentation at [http://cfp2009.org/ CFP Con 2009]&lt;br /&gt;
| 1 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Deliver presentation on web threats and countermeasures.  See [http://www.cfp2009.org/wiki/index.php/Tutorials/Workshops CFP tutorial page] grep OWASP for more info.&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| ENISA [http://www.enisa.europa.eu/pages/02_03_news_2009_02_19_who_is_who.html Who-Is-Who Directory]&lt;br /&gt;
| -&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact ENISA regarding OWASP inclusion in directory (in progress). Encourage European chapter leaders to contact their ENISA liaison officers (completed). Contact UK liaison officer on behalf of London, Leeds and Scotland chapters.&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| IIL [http://www.iilondon.co.uk/ Insurance Institute of London]&lt;br /&gt;
| 2 Jun 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Contact IIL regarding future input to their publication [http://www.iilondon.co.uk/XtraCart/store/comersus_viewItem.asp?idProduct=187 Insurance Aspects of E-Commerce]&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-118|Draft NIST SP 800-118]]&lt;br /&gt;
| 29 May 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-118 Guide to Enterprise Password Management&amp;quot;&lt;br /&gt;
| CW/EK/RB/DC&lt;br /&gt;
|-&lt;br /&gt;
| German IT Industry Association&lt;br /&gt;
| 15 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation on OWASP&lt;br /&gt;
| GH&lt;br /&gt;
|-&lt;br /&gt;
| [http://docs.google.com/Present?docid=ddkr62qv_171cd7gh5fb&amp;amp;skipauth=true Outreach Presentation to Frontier Airlines]&lt;br /&gt;
| 7 May 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide outreach presentation covering fundamentals of AppSec and Intro to OWASP&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 10012|DPC BS 10012]]&lt;br /&gt;
| 31 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 10012 Specification for the management of personal information in compliance with the Data Protection Act 1998&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-53 Revision 3|Draft NIST SP 800-53 Revision 3]]&lt;br /&gt;
| 27 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-53 (Revision 3) Recommended Security Controls for Federal Information Systems and Organizations&amp;quot;&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Draft NIST SP 800-122|Draft NIST SP 800-122]]&lt;br /&gt;
| 13 Mar 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;Draft NIST Special Publication 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information (PII)&amp;quot;&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[London]]&lt;br /&gt;
| 12 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about the Global Industry Committee, its role and recent activities (presentation slides [[Image:Owasp-london-industry-committee-march-2009.ppt]] and written notes [[Image:Owasp-london-industry-committee-march-2009-notes.pdf]])&lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:Digital Britain Interim Report|Digital Britain Interim Report]]&lt;br /&gt;
| 11 Mar 2009&lt;br /&gt;
| Legislation&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to UK Government's &amp;quot;Digital Britain Interim Report Jan 2009&amp;quot; &lt;br /&gt;
| CW&lt;br /&gt;
|-&lt;br /&gt;
| [http://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Front Range]&lt;br /&gt;
| 5 Mar 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Conference organisation&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| US [http://www.commerce.gov/ Department of Commerce]&lt;br /&gt;
| 25 Feb 2009&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Presentation about OWASP to Economic Security Working Group&lt;br /&gt;
| RB&lt;br /&gt;
|-&lt;br /&gt;
| [[Industry:DPC BS 8878:2009|DPC BS 8878:2009]]&lt;br /&gt;
| 31 Jan 2009&lt;br /&gt;
| Standards&lt;br /&gt;
| Closed&lt;br /&gt;
| Provide response to &amp;quot;BS 8878:2009 Web accessibility. Building accessible experiences for disabled people&amp;quot; Draft for Public Comment (DPC)&lt;br /&gt;
| Puneet/CW&lt;br /&gt;
|-&lt;br /&gt;
| AppSec Presentation Delivered to Infragard, Dec 2008 &lt;br /&gt;
| Dec 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| [http://www.infragard.net/ Infragard] is a collaboration between the US FBI and maintainers of critical infrastructure.  [http://docs.google.com/Present?docid=ddkr62qv_0cn7km4c3&amp;amp;skipauth=true Presentation here].  Email DC for full PPT with speaker notes&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
| The Register [http://www.theregister.co.uk/2008/11/22/google_analytics_as_security_risk/ Google Analytics — Yes, it is a security risk]&lt;br /&gt;
| Nov 2008&lt;br /&gt;
| Outreach&lt;br /&gt;
| Closed&lt;br /&gt;
| Co-ordination of response and provision of comments from OWASP leaders about risk of JavaScript on Barack Obama's website&lt;br /&gt;
| DC&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== General Presentations and Reports ===&lt;br /&gt;
&lt;br /&gt;
[[Summit_2009]]&lt;br /&gt;
* Global Industry Committee Presentation [[Image:Owasp-summit2009-industry-committee.ppt]]&lt;br /&gt;
&lt;br /&gt;
Summaries (for inclusion into other full OWASP presentations):&lt;br /&gt;
* Sep 2009 [[Image:Owasp-industry-committee-summary-september-2009.ppt]]&lt;br /&gt;
* Jul 2009 [[Image:Owasp-industry-committee-summary-july-2009.ppt]]&lt;br /&gt;
* May 2009 [[Image:Owasp-industry-committee-summary-may-2009.ppt]]&lt;br /&gt;
* Apr 2009 [[Image:Owasp-industry-committee-summary-april-2009.ppt]]&lt;br /&gt;
* Mar 2009 [[Image:Owasp-industry-committee-summary-march-2009.ppt]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Other [http://www.owasp.org/index.php/Global_Committee_Pages Global Committees]&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=73124</id>
		<title>How to Join a Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=73124"/>
				<updated>2009-11-12T19:21:36Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* 2ND WAVE APPLICANTS/MEMBERS UNDER ELECTION - APPLICATION FORMS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Global Committee Pages|Click here to return to the Global Committee Pages]].&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Many individuals start with OWASP as a user of a tool/guide or attending a local chapter. From that they may become a individual project leader on a new tool/guide or may serve on the board of a local OWASP chapter.  Becoming a member of one of the Global Committees is not only a great achievement in the technical community, but is an opportunity to directly impact the future of OWASP Foundation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Global Committees are designed to develop a committee plan and then work on a global effort with your peers from around the world. Ideally you nominate a peer as a regional spokesperson and he/she is the conduit for global issues that has approx., 10 hrs per month to volunteer time to OWASP Foundation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This NEW ROLE was announced at the OWASP Portugal Summit and several individuals were nominated from the floor of the event and a motion was approved at the public board meeting in November 2008.  There is still time....  If you were not at the event and would like to get involved with a global role and are either a project leader or chapter leader and it must be supported by 5 endorsements of you regional peers*. We are calling this the &amp;quot;2009 2nd wave applicants&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;#42; Note that to prevent conflict of interest, Board members cannot endorse candidates for any committee nor can a committee member endorse a candidate for their own committee. Committee members may endorse candidates for other committees to which they do not belong.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fill in one of the below application forms. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2ND WAVE APPLICANTS/MEMBERS UNDER ELECTION - APPLICATION FORMS  ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:90%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''OWASP GLOBAL COMMITTEES - UNDER ELECTION'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | OWASP GLOBAL COMMITTEES &lt;br /&gt;
| style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Projects''' &lt;br /&gt;
| style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Membership''' &lt;br /&gt;
| style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Education''' &lt;br /&gt;
| style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Conferences''' &lt;br /&gt;
| style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Industry''' &lt;br /&gt;
| style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Chapters'''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''New Applications''' &lt;br /&gt;
| style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Projects and Tools Committee - Application 1|Aryavalli Gandhi]]'''&amp;lt;br&amp;gt;'''[[Global Projects and Tools Committee - Application 2|Brad Causey]]'''&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Projects and Tools Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee - Application 1|Applicant 1]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 2|Applicant 2]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Membership - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Education Committee - Application 2|'''Carlos Serrão''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 3|'''Sébastien Gioria''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 4|Nishi Kumar]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Education Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Conferences Committee - Application 2|'''Lucas C. Ferreira''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 3|'''John Wilander''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Conferences Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Industry Committee - Application 2|Alexander Fry]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Industry Committee - Template|more]], if needed &lt;br /&gt;
| style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''[[Global Chapter Committee - Application 2|Matthew Chalmers]]'''&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global Chpaters Committee - Template|more]], if needed&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== MEMBERS WITH OWASP SUMMIT'S APPROVAL ===&lt;br /&gt;
{| style=&amp;quot;width:90%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''OWASP GLOBAL COMMITTEES - ELECTED AT THE OWASP SUMMIT 08'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | OWASP GLOBAL COMMITTEES&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Projects Committee|'''Projects''']]   &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee|'''Membership''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Education Committee|'''Education''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Conferences Committee|'''Conferences''']]  &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Industry Committee|'''Industry''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Chapter Committee|'''Chapters''']]   &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Current committee members&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Dinis.cruz|Dinis Cruz]] &lt;br /&gt;
* [[:Image:Image021-Jason Li.jpg|Jason Li]] &lt;br /&gt;
* [[:Image:Image019-Matt Tesauro.jpg|Matt Tesauro]] &lt;br /&gt;
* [[:Image:Image022-Leo Cavallari.jpg|Leo Cavallari]] &lt;br /&gt;
* [[:Image:Image020-Pravir Chandra.jpg|Pravir Chandra]] &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
* [[:User:Brennan|Tom Brennan]] &lt;br /&gt;
* [[:Image:Image018-Dan Cornell.jpg|Dan Cornell]] &lt;br /&gt;
* [[:Image:Image017-Michael Coates.jpg|Michael Coates]] &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[User:Sdeleersnyder|Seba Deleersnyder]]&lt;br /&gt;
* [[:Image:Image007-Martin Knobloch.jpg|Martin Knobloch]]&lt;br /&gt;
* [[:Image:Image012-Mano Paul.jpg|Mano Paul]]&lt;br /&gt;
* [[:Image:Image008-Eduardo Neves.jpg|Eduardo Neves]]&lt;br /&gt;
* [[:Image:Image010-Kuai Hinjosa.jpg|Kuai Hinjosa]]&lt;br /&gt;
* [[:Image:Image011-Cecil Su.jpg|Cecil Su]] &lt;br /&gt;
* [[:Image:Image009-Fabio Cerullo.jpg|Fabio Cerullo]]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Wichers|Dave Wichers]]&lt;br /&gt;
* [[:Image:Image005-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
* [[:Image:Image003-Steve Antoniewicz.jpg|Steve Antoniewicz]] &lt;br /&gt;
* [[:Image:Image004-Dhruv Soi.jpg|Dhruv Soi]]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Brennan|Tom Brennan]] &lt;br /&gt;
* [[:Image:Image014 Rex Booth.jpg|Rex Booth]]&lt;br /&gt;
* [[:Image:Image016-Georg Hess.jpg|Georg Hess]]&lt;br /&gt;
* [[:Image:Image013-Eoin Keary.jpg|Eoin Keary]] &lt;br /&gt;
* [[:Image:Image015-David Campbell.jpg|David Campbell]]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
* [[User:Sdeleersnyder|Seba Deleersnyder]]&lt;br /&gt;
* [[:Image:Image002-Puneet Mehta.jpg|Puneet Mehta]] &lt;br /&gt;
* [[:Image:Image001-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_4&amp;diff=73122</id>
		<title>Global Education Committee - Application 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_4&amp;diff=73122"/>
				<updated>2009-11-12T19:19:56Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Nishi Kumar&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Contributor to OWASP Live CD and ESAPI.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Education Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Alexander Fry&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Reviewer of OWASP projects in SoC 2008&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Nishi has valuable experience in creating application security computer based training courses. She will be a valuable contributor to the education committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_4&amp;diff=73110</id>
		<title>Global Education Committee - Application 4</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Education_Committee_-_Application_4&amp;diff=73110"/>
				<updated>2009-11-12T18:25:41Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Nishi Kumar&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|List here.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Education Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=72953</id>
		<title>How to Join a Committee</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=How_to_Join_a_Committee&amp;diff=72953"/>
				<updated>2009-11-11T14:34:31Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: /* 2ND WAVE APPLICANTS/MEMBERS UNDER ELECTION - APPLICATION FORMS */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[:Global Committee Pages|Click here to return to the Global Committee Pages]].&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is a worldwide free and open community focused on improving the security of application software. Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Many individuals start with OWASP as a user of a tool/guide or attending a local chapter. From that they may become a individual project leader on a new tool/guide or may serve on the board of a local OWASP chapter.  Becoming a member of one of the Global Committees is not only a great achievement in the technical community, but is an opportunity to directly impact the future of OWASP Foundation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Global Committees are designed to develop a committee plan and then work on a global effort with your peers from around the world. Ideally you nominate a peer as a regional spokesperson and he/she is the conduit for global issues that has approx., 10 hrs per month to volunteer time to OWASP Foundation. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This NEW ROLE was announced at the OWASP Portugal Summit and several individuals were nominated from the floor of the event and a motion was approved at the public board meeting in November 2008.  There is still time....  If you were not at the event and would like to get involved with a global role and are either a project leader or chapter leader and it must be supported by 5 endorsements of you regional peers*. We are calling this the &amp;quot;2009 2nd wave applicants&amp;quot; &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;amp;#42; Note that to prevent conflict of interest, Board members cannot endorse candidates for any committee nor can a committee member endorse a candidate for their own committee. Committee members may endorse candidates for other committees to which they do not belong.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Fill in one of the below application forms. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 2ND WAVE APPLICANTS/MEMBERS UNDER ELECTION - APPLICATION FORMS ===&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:90%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''OWASP GLOBAL COMMITTEES - UNDER ELECTION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | OWASP GLOBAL COMMITTEES&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Projects'''   &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Membership'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Education'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Conferences''' &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Industry'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | '''Chapters'''   &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''New Applications'''  &lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''[[Global Projects and Tools Committee - Application 1|Aryavalli Gandhi]]'''&amp;lt;br&amp;gt;'''[[Global Projects and Tools Committee - Application 2|Brad Causey]]'''&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Projects and Tools Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Projects_and_Tools_Committee_-_Template|more]], if needed   &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee - Application 1|Applicant 1]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 2|Applicant 2]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Membership Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Membership_-_Template|more]], if needed&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Education Committee - Application 2|'''Carlos Serrão''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 3|'''Sébastien Gioria''']]&amp;lt;br&amp;gt;[[Global Education Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Education Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Education_Committee_-_Template|more]], if needed&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Conferences Committee - Application 2|'''Lucas C. Ferreira''']]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Conferences Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Conferences_Committee_-_Template|more]], if needed&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;[[Global Industry Committee - Application 2|Alexander Fry]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Industry Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Industry_Committee_-_Template|more]], if needed&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | &amp;lt;br&amp;gt;'''[[Global Chapter Committee - Application 2|Matthew Chalmers]]'''&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 3|Applicant 3]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 4|Applicant 4]]&amp;lt;br&amp;gt;[[Global Chapter Committee - Application 5|Applicant 5]]&amp;lt;br&amp;gt;add [[Global_Chpaters_Committee_-_Template|more]], if needed&lt;br /&gt;
   &lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
=== MEMBERS WITH OWASP SUMMIT'S APPROVAL ===&lt;br /&gt;
{| style=&amp;quot;width:90%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''OWASP GLOBAL COMMITTEES - ELECTED AT THE OWASP SUMMIT 08'''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | OWASP GLOBAL COMMITTEES&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Projects Committee|'''Projects''']]   &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Membership Committee|'''Membership''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Education Committee|'''Education''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Conferences Committee|'''Conferences''']]  &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Industry Committee|'''Industry''']]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#f2984c&amp;quot; align=&amp;quot;center&amp;quot; | [[Global Chapter Committee|'''Chapters''']]   &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Current committee members&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Dinis.cruz|Dinis Cruz]] &lt;br /&gt;
* [[:Image:Image021-Jason Li.jpg|Jason Li]] &lt;br /&gt;
* [[:Image:Image019-Matt Tesauro.jpg|Matt Tesauro]] &lt;br /&gt;
* [[:Image:Image022-Leo Cavallari.jpg|Leo Cavallari]] &lt;br /&gt;
* [[:Image:Image020-Pravir Chandra.jpg|Pravir Chandra]] &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
* [[:User:Brennan|Tom Brennan]] &lt;br /&gt;
* [[:Image:Image018-Dan Cornell.jpg|Dan Cornell]] &lt;br /&gt;
* [[:Image:Image017-Michael Coates.jpg|Michael Coates]] &lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[User:Sdeleersnyder|Seba Deleersnyder]]&lt;br /&gt;
* [[:Image:Image007-Martin Knobloch.jpg|Martin Knobloch]]&lt;br /&gt;
* [[:Image:Image012-Mano Paul.jpg|Mano Paul]]&lt;br /&gt;
* [[:Image:Image008-Eduardo Neves.jpg|Eduardo Neves]]&lt;br /&gt;
* [[:Image:Image010-Kuai Hinjosa.jpg|Kuai Hinjosa]]&lt;br /&gt;
* [[:Image:Image011-Cecil Su.jpg|Cecil Su]] &lt;br /&gt;
* [[:Image:Image009-Fabio Cerullo.jpg|Fabio Cerullo]]&lt;br /&gt;
&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Wichers|Dave Wichers]]&lt;br /&gt;
* [[:Image:Image005-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
* [[:Image:Image003-Steve Antoniewicz.jpg|Steve Antoniewicz]] &lt;br /&gt;
* [[:Image:Image004-Dhruv Soi.jpg|Dhruv Soi]]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
* [[:User:Brennan|Tom Brennan]] &lt;br /&gt;
* [[:Image:Image014 Rex Booth.jpg|Rex Booth]]&lt;br /&gt;
* [[:Image:Image016-Georg Hess.jpg|Georg Hess]]&lt;br /&gt;
* [[:Image:Image013-Eoin Keary.jpg|Eoin Keary]] &lt;br /&gt;
* [[:Image:Image015-David Campbell.jpg|David Campbell]]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; |&lt;br /&gt;
* [[User:Sdeleersnyder|Seba Deleersnyder]]&lt;br /&gt;
* [[:Image:Image002-Puneet Mehta.jpg|Puneet Mehta]] &lt;br /&gt;
* [[:Image:Image001-Wayne Huang.jpg|Wayne Huang]] &lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_2&amp;diff=72952</id>
		<title>Global Industry Committee - Application 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_2&amp;diff=72952"/>
				<updated>2009-11-11T14:33:26Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Alexander Fry&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|SoC 2008 Reviewer for Teachable Static Analysis Workbench and Source Code Review OWASP Projects&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Industry Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=51458</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=51458"/>
				<updated>2009-01-16T18:53:41Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# The Technical Report should have a  &amp;quot;How To&amp;quot; section that describes how to write additional analyzers for the project. If not, then a &amp;quot;Lessons Learned&amp;quot; for security analysts or developers who want to extend the project on their own, but could use your insight from building the first analyzer.&lt;br /&gt;
# I found a couple of minor spelling and grammar errors; it is probably best to just run all the documentation through a spelling/grammar checker and re-post. &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
One-click build, Fortify Software's open source review and FindBugs.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I think the documentation could be unified under the Technical Report as the main &amp;quot;Guide&amp;quot;, and the current documents could be chapters, e.g., Install, Use, Lessons Learned, Appendix 1 - How To, Appendix 2 - Build Source, etc.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=49763</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=49763"/>
				<updated>2008-12-22T17:44:26Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
# Analyzed 10 OWASP projects (100%).&lt;br /&gt;
# Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
N/A&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Alpha criteria are fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Beta criteria are fulfilled.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The OWASP EU Summit presentation has been uploaded to fulfill that requirement.  &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All work has been completed 100%.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45679</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45679"/>
				<updated>2008-11-03T22:29:22Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# The Technical Report should have a  &amp;quot;How To&amp;quot; section that describes how to write additional analyzers for the project. If not, then a &amp;quot;Lessons Learned&amp;quot; for security analysts or developers who want to extend the project on their own, but could use your insight from building the first analyzer.&lt;br /&gt;
# I found a couple of minor spelling and grammar errors; it is probably best to just run all the documentation through a spelling/grammar checker and re-post. &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Add a common About Box.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
One-click build, Fortify Software's open source review and FindBugs.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I think the documentation could be unified under the Technical Report as the main &amp;quot;Guide&amp;quot;, and the current documents could be chapters, e.g., Install, Use, Lessons Learned, Appendix 1 - How To, Appendix 2 - Build Source, etc.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench&amp;diff=45678</id>
		<title>Project Information:template Teachable Static Analysis Workbench</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench&amp;diff=45678"/>
				<updated>2008-11-03T22:25:13Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Teachable Static Analysis Workbench Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The research will be intended to answer the following questions:&lt;br /&gt;
* Can we integrate existing open source static analysis tools (OWASP and third-party) to work altogether? We plan analysis to cover the following tools: LAPSE, Orizon, ESAPI, FindBugs.&lt;br /&gt;
* How static analysis workbench can be taught by security analyst?&lt;br /&gt;
* How static analysis workbench can support web-applications built using MVC frameworks? &lt;br /&gt;
Workbench prototype will be Java-based Eclipse plug-in which aim is to help security analyst/code reviewer validation of web application. At prototype step we suggest to analyze J2EE Web tier applications build on Java Servlets, JSP (without business logic in it) and one MVC framework (Apache Struts). We plan workbench prototype to have the following functionality:&lt;br /&gt;
* Input validation vulnerabilities analysis: identification of web application entry points (aka attack surface in P024), call graph for each entry point (see “Packages -&amp;gt; Classes -&amp;gt; Methods -&amp;gt; callsites” in P023), identification of data validation routines, teachable taint analysis.&lt;br /&gt;
* Authentification and access control analysis: identification of code related to access control and it’s analysis.&lt;br /&gt;
* Pattern-based code analysis.&lt;br /&gt;
* Teachability: analyst indicates security-related code (sources of tainted data, sensitive sinks, input validation and sanitizing functions, access control code, etc.) and workbench automatically recomputes possible vulnerabilities list. The second idea is to spread knowledge gathered from analyst to other web applications. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:ddk(at)cs.msu.su '''Dmitry Kozlov''']&amp;lt;br&amp;gt;[mailto:igor.konnov(at)gmail.com '''Igor Konnov''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:to(at)change '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-teachable-static-analysis-workbench '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:owasp-teachable-static-analysis-workbench(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:afry(at)strongcrypto.biz '''Alex Fry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:mwcoates(at)gmail.com '''Michael Coates''']&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* http://code.google.com/p/teachablesa/&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''  &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Teachable Static Analysis Workbench - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45677</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45677"/>
				<updated>2008-11-03T22:23:45Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# The Technical Report should have a  &amp;quot;How To&amp;quot; section that describes how to write additional analyzers for the project. If not, then a &amp;quot;Lessons Learned&amp;quot; for security analysts or developers who want to extend the project on their own, but could use your insight from building the first analyzer. &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Add a common About Box.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
One-click build, Fortify Software's open source review and FindBugs.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I think the documentation could be unified under the Technical Report as the main &amp;quot;Guide&amp;quot;, and the current documents could be chapters, e.g., Install, Use, Lessons Learned, Appendix 1 - How To, Appendix 2 - Build Source, etc.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45676</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45676"/>
				<updated>2008-11-03T22:18:34Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# There could be a &amp;quot;How To&amp;quot; document that describes how to write additional analyzers for the project. If not, then a &amp;quot;Lessons Learned&amp;quot; for security analysts or developers who want to extend the project on their own, but could use your insight from building the first analyzer. &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Add a common About Box.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
One-click build, Fortify Software's open source review and FindBugs.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
I think the future versions should&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45674</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45674"/>
				<updated>2008-11-03T21:54:57Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# There should be some clarification on the Wiki for what must be done to merely install and use the tool(s). For example, the &amp;quot;InstallGuide&amp;quot; is then followed by &amp;quot;BuildingFromSource&amp;quot;. Does a normal user of TSAW need to build from source?&lt;br /&gt;
#&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
None.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45673</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45673"/>
				<updated>2008-11-03T21:53:36Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# There should be some clarification on the Wiki for what must be done to merely install and use the tool(s). For example, the &amp;quot;InstallGuide&amp;quot; is then followed by &amp;quot;BuildingFromSource&amp;quot;. Does a normal user of TSAW need to build from source?&lt;br /&gt;
#&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45672</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45672"/>
				<updated>2008-11-03T21:52:43Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# It is difficult to understand what must be done to merely install and use the tool(s). For example, the &amp;quot;InstallGuide&amp;quot; is then followed by &amp;quot;BuildingFromSource&amp;quot;. Does a normal user of TSAW need to build from source? Maybe the &lt;br /&gt;
#&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45663</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45663"/>
				<updated>2008-11-03T19:16:56Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# It is difficult to understand what must be done to merely install and use the tool(s). For example, the &amp;quot;InstallGuide&amp;quot; is then followed by &amp;quot;BuildingFromSource&amp;quot;. Does a normal user of TSAW need to build from source?&lt;br /&gt;
#&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45379</id>
		<title>Project Information:template Teachable Static Analysis Workbench - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Teachable_Static_Analysis_Workbench_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45379"/>
				<updated>2008-11-01T21:19:14Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Teachable Static Analysis Workbench|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|OWASP Teachable Static Analysis Workbench Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
Input Validation functionality works as stated.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Teachable Static Analysis Workbench|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The promised deliverables and functionality have been completed 100%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45371</id>
		<title>Project Information:template Source Code Review OWASP Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45371"/>
				<updated>2008-11-01T18:49:26Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Source Code Review OWASP-Projects Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The objectives of this project are: 1. Develop and document a workflow for FLOSS projects to incorporate static analysis into the Software Development Life Cycle (SDLC); 2. Apply the above workflow as a required step for OWASP projects; 3. Aid in auditing select FLOSS projects to create a baseline for comparing security amongst FLOSS projects. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:dan@denimgroup.com '''Dan Cornell''']&amp;lt;br&amp;gt;SoC's Project Leader&amp;lt;br&amp;gt;[mailto:waldenj1@nku.edu '''James Walden''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:jderry@owasp.org '''Justin Derry''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:doylem3@nku.edu '''Maureen Doyle''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:whelanm87@gmail.com '''Michael Whelan''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-scode-review-owasp-projects '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:OWASP-SCode-Review-OWASP-Projects(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:afry(at)strongcrypto.biz '''Alex Fry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marco.m.morana(at)gmail.com '''Marco M. Morana''']&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Marco M Morana Curriculum|Curriculum]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* Updated workflow [[Image:Workflow_July_11a.zip]]&lt;br /&gt;
* [[Image:Workflow_Draft1.pdf]]&lt;br /&gt;
* [[Image:CreateProjectExample.pdf]]&lt;br /&gt;
* [https://owasp.fortify.com/teamserver/welcome.fhtml Fortify OWASP Open Review Project]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45370</id>
		<title>Project Information:template Source Code Review OWASP Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45370"/>
				<updated>2008-11-01T18:48:36Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Source Code Review OWASP-Projects Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The objectives of this project are: 1. Develop and document a workflow for FLOSS projects to incorporate static analysis into the Software Development Life Cycle (SDLC); 2. Apply the above workflow as a required step for OWASP projects; 3. Aid in auditing select FLOSS projects to create a baseline for comparing security amongst FLOSS projects. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:dan@denimgroup.com '''Dan Cornell''']&amp;lt;br&amp;gt;SoC's Project Leader&amp;lt;br&amp;gt;[mailto:waldenj1@nku.edu '''James Walden''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:jderry@owasp.org '''Justin Derry''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:doylem3@nku.edu '''Maureen Doyle''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:whelanm87@gmail.com '''Michael Whelan''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-scode-review-owasp-projects '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:OWASP-SCode-Review-OWASP-Projects(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:afry(at)strongcrypto.biz '''Alex Fry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marco.m.morana(at)gmail.com '''Marco M. Morana''']&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Marco M Morana Curriculum|Curriculum]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* Updated workflow [[Image:Workflow_July_11a.zip]]&lt;br /&gt;
* [[Image:Workflow_Draft1.pdf]]&lt;br /&gt;
* [[Image:CreateProjectExample.pdf]]&lt;br /&gt;
* [https://owasp.fortify.com/teamserver/welcome.fhtml Fortify OWASP Open Review Project]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45369</id>
		<title>Project Information:template Source Code Review OWASP Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects&amp;diff=45369"/>
				<updated>2008-11-01T18:48:02Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Source Code Review OWASP-Projects Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The objectives of this project are: 1. Develop and document a workflow for FLOSS projects to incorporate static analysis into the Software Development Life Cycle (SDLC); 2. Apply the above workflow as a required step for OWASP projects; 3. Aid in auditing select FLOSS projects to create a baseline for comparing security amongst FLOSS projects. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:dan@denimgroup.com '''Dan Cornell''']&amp;lt;br&amp;gt;SoC's Project Leader&amp;lt;br&amp;gt;[mailto:waldenj1@nku.edu '''James Walden''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;[mailto:jderry@owasp.org '''Justin Derry''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:doylem3@nku.edu '''Maureen Doyle''']&amp;lt;br&amp;gt;&lt;br /&gt;
[mailto:whelanm87@gmail.com '''Michael Whelan''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-scode-review-owasp-projects '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:OWASP-SCode-Review-OWASP-Projects(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:afry(at)strongcrypto.biz '''Alex Fry''']&amp;lt;br&amp;gt;[http://www.linkedin.com/in/alexanderfry Profile]&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:marco.m.morana(at)gmail.com '''Marco M. Morana''']&amp;lt;br&amp;gt;[[OWASP Summer of Code 2008 Projects Authors Status Target and Reviewers Marco M Morana Curriculum|Curriculum]]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* Updated workflow [[Image:Workflow_July_11a.zip]]&lt;br /&gt;
* [[Image:Workflow_Draft1.pdf]]&lt;br /&gt;
* [[Image:CreateProjectExample.pdf]]&lt;br /&gt;
* [https://owasp.fortify.com/teamserver/welcome.fhtml Fortify OWASP Open Review Project]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Source Code Review OWASP Projects - Final Review - OWASP Board Member - G|See/Edit: Final Review/Board Member (G)]]&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45368</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45368"/>
				<updated>2008-11-01T18:47:01Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
# Analyzed 10 OWASP projects (100%).&lt;br /&gt;
# Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
N/A&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Alpha criteria are fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project leads state that documentation needs to be expanded and links added to the code review guide.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project leads intend to add the OWASP EU Summit presentation to fulfill that requirement once it's ready.  &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
More OWASP project leaders need to integrate security into the Software Life Cycle.  A &amp;quot;lead with a tool&amp;quot; approach, using a static analysis tool, is a good way to start. This type of approach also enhances other complementary software assurance activities, e.g., bug tracking and testing. Participation and feedback from these efforts will help inform this process and make it an integral part of the OWASP SDL.&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45366</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45366"/>
				<updated>2008-11-01T18:42:11Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
# Analyzed 10 OWASP projects (100%).&lt;br /&gt;
# Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
N/A&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Alpha criteria are fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project leads state that documentation needs to be expanded and links added to the code review guide.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The project leads intend to add the OWASP EU Summit presentation to fulfill that requirement once it's ready.  &lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45364</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45364"/>
				<updated>2008-11-01T18:41:08Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
# Analyzed 10 OWASP projects (100%).&lt;br /&gt;
# Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
N/A&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Alpha criteria are fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
The project leads state that documentation needs to be expanded and links added to the code review guide.&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
The project leads intend to add the OWASP EU Summit presentation to fulfill that requirement once it's ready.  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45362</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45362"/>
				<updated>2008-11-01T18:37:23Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
# Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
# Analyzed 10 OWASP projects (100%).&lt;br /&gt;
# Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
N/A&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
All Alpha criteria are fulfilled.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45361</id>
		<title>Project Information:template Source Code Review OWASP Projects - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Source_Code_Review_OWASP_Projects_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45361"/>
				<updated>2008-11-01T18:35:52Z</updated>
		
		<summary type="html">&lt;p&gt;Afry: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Source Code Review OWASP Projects|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|OWASP Source Code Review OWASP-Projects Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
The major project objectives have been accomplished:&lt;br /&gt;
# Verified that the workflow for introducing static analysis into OWASP projects has been created.&lt;br /&gt;
# Verified that 10 OWASP projects have been submitted to be analyzed on the owasp.fortify.com site to establish an OWASP baseline.&lt;br /&gt;
# Verified that the project has submitted the 25 most popular open source PHP projects to be analyzed on the owasp.fortify.com site to establish an open source baseline.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications - Need Futher Clarifications#Source Code Review OWASP Projects|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
	1.	Workflow for introducing static analysis into OWASP projects (100%).&lt;br /&gt;
	2.	Analyzed 10 OWASP projects (100%).&lt;br /&gt;
	3.	Analyzed 25 most popular open source PHP projects on owasp.fortify.com (100%).&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Afry</name></author>	</entry>

	</feed>