Upload
kevin-martin
View
221
Download
0
Embed Size (px)
Citation preview
8/10/2019 Privacy Meets Security
http://slidepdf.com/reader/full/privacy-meets-security 1/2
EDITOR S
NOTE
2 0
o matter how old we get
the cr isp autumn feel of
September still conjures up
ories of headi ng back to school,
e all the sweeter w ith a new box
a
big three-ring binder,
nd a handful of freshly s harpe ned
2 pencils. OK, the tools toda y for
chool scene are slightly
ferent. Think smartphon es, iPads,
This issue seemed to be the per-
t place to talk about our th em e of
for
academic communi-
Our three features this month
all
the bases, from elearning
to iSchools.
Firs t, in Up Close With Steph en
A. Drake gets this
obed thinke r talk ing about his dedi-
to librarianship and his mission
vsdth the w ork of li-
as well as the vice pres-
of
strategic partnerships
and
at Gale Cengage Learning.
Then, author Robert S. Benchley
look at the crossroads of crowd-
ing outside the box
NineSigm a: Finding Innovation in
Places. CEO Andy Zynga
rships to meet ever-changing
Finally, we step into the virtual
oms at three top iSchools tha t
the
academic creativity
ed in shapin g the m inds of to-
s librarians an d information
cientists
in
iSchools: Shapi ng the
Landscape. Wh ether
ecords managem ent
or digital initiatives libraria ns,
to the core.
This issue is packed with infor-
nd se rvices designed especially for
he academic com munity, from ed2go
Gale, part of Cengage Learning)
to
he Turnitin plagiarism tool (iPara-
digms, LLC). Enjoy t he issue.
EHINDTHELENS
Where Privacy
IVIeets Security
by D I CK K SER
A
uthors Daniel Garrie and Yoav Griver, who
are attorneys, quickly advised the audience
at SoMoLo@NY (part of the info360 confer-
ence in mid-June ) that the ir forthcoming comm ents
did not constitute legal advice. But I've already he ard
their comments many times before: Cloud comput-
ing is not necessarily safe.
Garrie a nd Griver were on a speaking tour celebrat-
ing their book.
ispute Resolution
and e Discovery
(Thomson Reuters Westlaw, 2012), which
is
now
in
its second edition.
Down the hall in New York City s Jacob K Javits Con-
vention C enter, the info360 show, the ON DEMAND
Expo,
and the Cloud Expo were all taki ng place simul-
taneously, as the two lawyers address ed the legal is-
sues involved in moving data to, or using application s
residing on, remotely hosted computers, such as the
ones that provide
YouTube,
Gmaü, Microsoft Office 365,
Salesforce.com, TurboTax, and Tw itter. The cloud may
even be a part of your operational infrastruc ture if re-
mote service providers are helping your operations.
The la-wyers actually sounded a lot like
realtors.
You
know, it's all about location, location, location. Where
is your data? What local law governs it? Who owns
this data in that place? Who is allowed to access it? And
what a re they required to do if you demand it back? Who
is liable to your custom ers if those rem ote serve rs go
do-wn or get attacked, the d ata gets corrupted, or (heaven
forbid) the service provider goes out of business?
If this has n't scared you enough, bear in mind tha t
Google apps
are
made available over thousands
of
servers, and under the terms of service you signed
when you clicked the Accept button, those servers can
be located an3rwhere, they warne d.
Afew weeks later at the ALA Anaheim 2012 Annual
Conference & Exhibition, I was reminded th at even
if those servers are in the
U.S., your privacy may also
be at risk, ironically enough
for security rea sons.
Speaking about the pen-
ding U.S. legislation. Cyber
Intelligence Sharing and
Protection Act
(CISPA),
an d
its cousin in the S enate, the
Cybersecurity Act, Rainey
Reitman, who is the acti-
vism director
at
the Elec-
tronic Frontier Foimdation,
said, CISPA would have allowed for cybersecurity
purposes social sites
to
pass along data w ithout
a
Ramey Reitman, activism director at
the Electronic Frontier F oundation,
spolie at the ALA Anaheirr) 2012
Annual Conference Exhibition.
douds cover New Yori City s Jacob K. Javits Conve ntion Center durin
Cloud Expo.
wa rrant to NSA [National Security Agency]. Its s
bill in the S enate m ay be better, but th e two will n
to be reconciled. Our watchdogs in Washington, D
are paid to make us worry about such things.
These bills are about censorship, she warned
audience at ALA. These buls are about surveillan
I attended a special preconference session at
Anaheim titled Who Do I Trust to Protect My Priv
The session was pa rt of an ALA initiative to prom
a nat ional dialogue about privacy by using a del
ation format. It's not a discussion or a debate
meth od pro-vides a way for the pu blic to weigh in
establish common ground by weighing pros and c
Carolyn Caywood developed an approach for raising awareness about
Carolyn Caywood, who was the facilitator o
session, said, It cuts right across the red and b
political lines. And based on the session
I
atten
I must say it really
works.
Librarians anywhere
download the materials and hold a session in
hometowns from th e Privacy Revolution website (w
.pr ivacyrevolu tion .org /index .php/resources/f
libraries/civic_engagement) .
I find myself wondering whet her it isn 't the c
where the interest of security and privacy meet
I know one thing for sure, bu t I'll defer to Reit
to say it for me. She told the audience at ALA
brarians are the ethical backbone of this countr
when you're on the side of librarians, you know
are on the right side.
I
Dick Kaser is Information Today, Inc. s vice president of cont
Send your comments about this column to [email protected]
SEPTEMBER 2012 I N F O R M T IO N T O D
8/10/2019 Privacy Meets Security
http://slidepdf.com/reader/full/privacy-meets-security 2/2
Copyright of Information Today is the property of Information Today Inc. and its content may not be copied or
emailed to multiple sites or posted to a listserv without the copyright holder's express written permission.
However, users may print, download, or email articles for individual use.