USACM considers Privacy and Security to be interlinked. The idea that one must give up privacy for security or vice versa ignores how good privacy practices can help establish good security, and how good security can help protect privacy.  The rash of data breaches over the last several years represents failures in protecting both privacy and security. 

Preserving privacy and security is more than implementing best practices.  From the design of systems through their implementation and operation it is critical to keep both security and privacy in mind.  Any personal data used in a large computing system needs to be stored, collected and managed appropriately throughout its use.  Computing security involves not just protection against anticipated threats, but monitoring for possible threats (from within and without), physical protection, access controls, and both individual and corporate accountability for security and its failure

Related Documents

Related Articles

NYSE Publishes Cybersecurity Guidance for Companies
The New York Stock Exchange and Palo Alto Networks released a free book, Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers. This handbook provides pragmatic information for CEOs, CISOs, lawyers, digital forensic experts, professors, researc ...Read More

  • (Posted on 04-Nov-15)
  • Hill Tech Happenings, Week of November 2
    Tuesday, November 3, 2015 Hearing: TSA Security Gaps House Oversight and Government Reform Committee 10 am | 2154 Rayburn House Office Building Hearing: Examining the EU Safe Harbor Decision and Impacts for Transatlantic Data Flows House Energy and Commerce Subcommittee on C ...Read More

  • (Posted on 02-Nov-15)
  • Hill Tech Happenings, Week of October 5
    Tuesday, October 6, 2015 House Floor: H.R. 3510 – Department of Homeland Security Cybersecurity Strategy Act of 2015, as amended U.S. House of Representatives Wednesday, October 7, 2015 Hearing: Ensuring Aviation Safety in the Era of Unmanned Aircraft Systems House Transpor ...Read More

  • (Posted on 06-Oct-15)
  • Hill Tech Happenings, Week of September 28
    Tuesday, September 29, 2015 Hearing: Cybersecurity Policy and Threats Senate Armed Services Committee 9:30 am | G50 Dirksen Senate Office Building Hearing: Outside Perspectives on the Department of Defense Cyber Strategy House Armed Services Subcommittee on Emerging Threats ...Read More

  • (Posted on 28-Sep-15)
  • USACM Submits Comments to NIST on U.S. Participation in International Cybersecurity Standardization
    The ACM U.S. Public Policy Council, in collaboration with four other ACM entities, submitted comments to the National Institute of Standards and Technology (NIST) on a draft interagency report advocating U.S. participation in international cybersecurity standardization. Because t ...Read More

  • (Posted on 25-Sep-15)
  • FTC PrivacyCon 2016 – Call for Privacy and Security Research Presentations
    The FTC invites presentation proposals on consumer privacy and security issues in the commercial sector for a privacy conference, PrivacyCon, to be held on January 14 in Washington, D.C. The conference is intended for security researchers, academics, industry representatives, con ...Read More

  • (Posted on 22-Sep-15)