USACM considers Privacy and Security to be interlinked. The idea that one must give up privacy for security or vice versa ignores how good privacy practices can help establish good security, and how good security can help protect privacy.  The rash of data breaches over the last several years represents failures in protecting both privacy and security. 

Preserving privacy and security is more than implementing best practices.  From the design of systems through their implementation and operation it is critical to keep both security and privacy in mind.  Any personal data used in a large computing system needs to be stored, collected and managed appropriately throughout its use.  Computing security involves not just protection against anticipated threats, but monitoring for possible threats (from within and without), physical protection, access controls, and both individual and corporate accountability for security and its failure

Related Documents

Related Articles

Hill Tech Happenings, Week of June 22
House Floor H.R. 805, Domain Openness Through Continued Oversight Matters (DOTCOM) Act of 2015 H.R. 1626, DHS IT Duplication Reduction Act of 2015, as amended H.R. 1637 Federally Funded Research and Development Sunshine Act of 2015, as amended H.R. 2200, CBRN Intelligence and Inf ...Read More

  • (Posted on 23-Jun-15)
  • USACM Signs Letter to President Obama Urging Wide Adoption of Encryption Technology
    USACM signed a letter to President Obama from a variety of civil society organizations urging him to pursue public policies that encourage the wide adoption of strong encryption technology. The letter is responsive to public statements by Obama Administration officials suggesting ...Read More

  • (Posted on 16-Jun-15)
  • Hill Tech Happenings, Week of June 15
    House Floor Possible consideration of trade legislation. See below for Tuesday’s scheduled floor action. Monday, June 15, 2015 Hearing: Commercial Cyber Espionage and Barriers to Digital Trade in China U.S.-China Economic and Security Review Commission 9 am | 608 Dirks ...Read More

  • (Posted on 15-Jun-15)
  • FCC Net Neutrality Rules Take Effect
    The FCC’s Open Internet Order became effective on June 12. The Order imposes new bright-line net neutrality rules that prohibit broadband providers from blocking, throttling, and prioritizing paid “fast lanes.” The rules apply to both fixed and mobile broadband ...Read More

  • (Posted on 15-Jun-15)
  • FCC Renews Consumer Advisory Committee
    The renewed FCC Consumer Advisory Committee held its first public meeting on June 12. The Committee is comprised of 37 appointed representatives from industry, academia, consumer organizations, disability organizations, and regulatory agencies. FCC Chairman Wheeler reappointed De ...Read More

  • (Posted on 15-Jun-15)
  • Hill Tech Happenings, Week of June 8
    Monday, June 8, 2015 Congressional briefing: Carnegie Mellon University and IEEE-USA on “What Can Be Done Today to Dramatically Improve Cybersecurity” with Jeremy Epstein, John Haller, and Rob Seacord. 3 pm | 2168 Rayburn House Office Building Tuesday, June 9, 2015 Nominatio ...Read More

  • (Posted on 09-Jun-15)