USACM considers Privacy and Security to be interlinked. The idea that one must give up privacy for security or vice versa ignores how good privacy practices can help establish good security, and how good security can help protect privacy.  The rash of data breaches over the last several years represents failures in protecting both privacy and security. 

Preserving privacy and security is more than implementing best practices.  From the design of systems through their implementation and operation it is critical to keep both security and privacy in mind.  Any personal data used in a large computing system needs to be stored, collected and managed appropriately throughout its use.  Computing security involves not just protection against anticipated threats, but monitoring for possible threats (from within and without), physical protection, access controls, and both individual and corporate accountability for security and its failure

Related Documents


Related Articles

Washington News – Alerts and Updates
General Announcements * USACM submitted comments on the NIST roadmap for usability and accessibility of future elections. USACM’s comments highlight the importance of usable and accessible voting technologies and systems and the need to improve and ensure the right of all voters ...Read More

  • (Posted on 11-May-15)
  • NIST Seeks Comments on Electronic Authentication Guideline
    NIST seeks public input on which sections of its Electronic Authentication Guideline need updating. Given the evolving landscape of cybersecurity technological innovations and threats targeting remote authentication, NIST is considering a “significant update.” This te ...Read More

  • (Posted on 11-May-15)
  • U.S. Copyright Office to Hold Public Hearings on DMCA Exemptions
    The U.S. Copyright Office will hold public hearings in May on the proposed exemptions to the prohibitions against circumvention of copyrighted works given in the Digital Millennium Copyright Act (DMCA). The public hearings will be held May 19-21 in Los Angeles, California and May ...Read More

  • (Posted on 11-May-15)
  • FCC Seeks Comments on Cybersecurity Risk Management and Best Practices Report
    The FCC seeks public comments on the report on “Cybersecurity Risk Management and Best Practices” submitted by the FCC Communications Security, Reliability and Interoperability Council. The 415-page report involved 100+ cybersecurity professionals in a yearlong, multi ...Read More

  • (Posted on 11-May-15)
  • Federal Agencies Seek Comments on Federal Cybersecurity Research and Development Strategic Plan
    Federal agencies involved in the National Science and Technology Council (NSTC) and the Networking and Information Technology Research and Development (NITRD) Program seek public input on the priorities and objectives to be included in a cybersecurity research and development str ...Read More

  • (Posted on 11-May-15)
  • Washington News – Alerts and Updates
    * ACM named Michael Stonebraker of the Massachusetts Institute of Technology (MIT) recipient of the 2014 ACM A.M. Turing Award for fundamental contributions to the concepts and practices underlying modern database systems. * ACM named Dan Boneh recipient of the 2014 ACM-Infosys F ...Read More

  • (Posted on 14-Apr-15)