Privacy and Security

  • Privacy and Security
  • Privacy Overview
  • Security Overview
  • Cybersecurity
  • Real ID
  • E-Verify
  • Social Security Numbers
  • Archives

USACM considers Privacy and Security to be interlinked. The idea that one must give up privacy for security or vice versa ignores how good privacy practices can help establish good security, and how good security can help protect privacy.  The rash of data breaches over the last several years represents failures in protecting both privacy and security. 

Preserving privacy and security is more than implementing best practices.  From the design of systems through their implementation and operation it is critical to keep both security and privacy in mind.  Any personal data used in a large computing system needs to be stored, collected and managed appropriately throughout its use.  Computing security involves not just protection against anticipated threats, but monitoring for possible threats (from within and without), physical protection, access controls, and both individual and corporate accountability for security and its failure

Related Documents


Related Articles

Do Not Track Legislation Reintroduced in Senate
On Thursday Senator Rockefeller of West Virginia introduced legislation to establish an option for people to opt out of tracking their online activity. It is S.418 and can be reviewed online. The Senator introduced a similar bill in 2011. He did not vigorously pursue the measure, ...Read More

  • (Posted on 04-Mar-13)
  • USACM Chair Comments on Cybersecurity Executive Order
    On Tuesday, as part of the State of the Union address, President Obama issued an executive order on cybersecurity. The order focuses on the cybersecurity of critical infrastructure – defined in the order as “systems and assets, whether physical or virtual, so vital to ...Read More

  • (Posted on 15-Feb-13)
  • Federal Trade Commission Updates Online Privacy Rules For Pre-Teens
    On Wednesday the Federal Trade Commission (FTC) announced the final updated rules for implementing the Children’s Online Privacy Protection Act (COPPA). Passed in 1998, COPPA rules had not been updated to reflect changes in technology, most notably the rise of mobile intern ...Read More

  • (Posted on 21-Dec-12)
  • USACM Offers Comments on Federal Cybersecurity R&D Strategy
    The National Science Foundation (NSF) sought comments on the Federal Cybersecurity Research and Development Plan. The plan was released in late 2011, and NSF was interested in getting feedback from the research community on the effectiveness of the plan. Yesterday USACM submitted ...Read More

  • (Posted on 20-Dec-12)
  • USACM Comments on House Cybersecurity Information Sharing Bill
    In late April the House considered and passed several pieces of cybersecurity legislation. At the time USACM released a statement with general recommendations for cybersecurity bills. Of the bills that passed the House, H.R. 3523, the Cyber Intelligence Sharing and Protection Act ...Read More

  • (Posted on 06-Jun-12)
  • The House Will Engage With Cybersecurity Legislation This Week
    While Congress has tried to pass major cybersecurity legislation for the last few years, this week marks what could be a major step forward in finally getting a bill to the President’s desk. The House leadership has scheduled four cybersecurity bills for votes on Thursday a ...Read More

  • (Posted on 25-Apr-12)
  • gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.