Transcript

8/10/2019 Privacy Meets Security

http://slidepdf.com/reader/full/privacy-meets-security 1/2

EDITOR S

NOTE

 2 0

o matter how old we get

the cr isp autumn feel of

September still conjures up

ories of headi ng back to school,

e all the sweeter w ith a new box

 a

 big three-ring binder,

nd  a handful of freshly s harpe ned

  2 pencils. OK, the tools toda y for

chool scene are slightly

ferent. Think smartphon es, iPads,

This issue seemed to be the per-

t place to talk about our th em e of

 for

 academic communi-

  Our three features this month

 all

 the bases, from elearning

to iSchools.

Firs t, in Up Close With Steph en

 A.  Drake gets this

obed thinke r talk ing about his dedi-

 to librarianship and his  mission

 vsdth the w ork of li-

as well as the  vice pres-

 of

  strategic partnerships

 and

 at Gale Cengage Learning.

Then, author Robert S. Benchley

 look at the crossroads of crowd-

ing outside the box

NineSigm a: Finding Innovation in

 Places. CEO Andy Zynga

rships to meet ever-changing

Finally, we step into the virtual

oms at three top iSchools tha t

  the

 academic creativity

ed in shapin g the m inds of  to-

s librarians an d information

cientists

 in

  iSchools: Shapi ng the

Landscape. Wh ether

ecords managem ent

 or digital initiatives libraria ns,

to the core.

This issue is  packed with infor-

nd se rvices designed especially for

he academic com munity, from ed2go

Gale, part of Cengage Learning)

 to

he Turnitin plagiarism tool (iPara-

digms, LLC). Enjoy t he issue.

  EHINDTHELENS

Where Privacy

IVIeets Security

by D I CK K SER

A

uthors Daniel Garrie and Yoav Griver, who

are attorneys, quickly advised the audience

at SoMoLo@NY (part of the info360 confer-

ence in mid-June ) that the ir forthcoming comm ents

did not constitute legal advice. But I've already he ard

their comments many times before: Cloud comput-

ing is not necessarily safe.

Garrie a nd Griver were on a speaking tour celebrat-

ing their book.

  ispute Resolution

  and e Discovery

(Thomson Reuters Westlaw, 2012), which

 is

 now

 in

its second edition.

Down the  hall in New York City s Jacob K Javits Con-

vention C enter, the info360 show, the ON DEMAND

Expo,

 and the Cloud Expo were all taki ng place simul-

taneously, as the two lawyers address ed the legal is-

sues involved in moving data to, or using application s

residing on, remotely hosted computers, such as the

ones that provide

 YouTube,

 Gmaü, Microsoft Office  365,

Salesforce.com, TurboTax, and Tw itter. The cloud may

even be a part of your operational infrastruc ture if  re-

mote service providers are helping your operations.

The la-wyers actually sounded a lot like

 realtors.

 You

know, it's all about location, location, location. Where

is your data? What local law governs it? Who owns

this data in that place? Who is allowed to access it? And

what a re they required to do if you demand it back? Who

is liable to your custom ers if those rem ote serve rs go

do-wn or get attacked, the d ata gets corrupted, or (heaven

forbid) the service provider goes out of business?

If this has n't scared you enough, bear in mind tha t

Google apps

 are

 made available over thousands

 of

servers, and under the terms of service you signed

when you clicked the Accept button, those servers can

be located an3rwhere, they warne d.

Afew weeks later at the ALA Anaheim 2012 Annual

Conference & Exhibition, I was reminded th at even

if those servers are in the

U.S.,  your privacy may also

be at risk, ironically enough

for security rea sons.

Speaking about the pen-

ding U.S.  legislation. Cyber

Intelligence Sharing and

Protection Act

 (CISPA),

 an d

its cousin in the S enate, the

Cybersecurity Act, Rainey

Reitman, who is  the acti-

vism director

 at

 the Elec-

tronic Frontier Foimdation,

said, CISPA would have allowed for cybersecurity

purposes social sites

 to

 pass along data w ithout

 a

Ramey Reitman, activism director at

the Electronic Frontier F oundation,

spolie  at  the ALA Anaheirr)  2012

Annual Conference  Exhibition.

douds cover New Yori City s Jacob K. Javits Conve ntion Center durin

Cloud Expo.

wa rrant to NSA [National Security Agency]. Its s

bill in the S enate m ay be better, but th e two will n

to be reconciled. Our watchdogs in Washington, D

are paid to make us worry about such things.

  These bills are about censorship, she warned

audience at ALA. These buls are about surveillan

I attended a special preconference session at

Anaheim titled  Who Do I Trust to Protect My  Priv

The session was pa rt of an ALA  initiative to prom

a nat ional dialogue about privacy by using a del

ation format. It's not a discussion or a debate

meth od pro-vides a way for the pu blic to weigh in

establish common ground by weighing pros and c

Carolyn Caywood developed an approach for raising awareness about

 

Carolyn Caywood, who was the facilitator o

session, said, It cuts right across the red and b

political lines. And based on the session

 I

 atten

I must say it really

 works.

 Librarians anywhere

download the materials and hold  a session in 

hometowns from th e Privacy Revolution website (w

.pr ivacyrevolu tion .org /index .php/resources/f

libraries/civic_engagement) .

I find myself wondering whet her it isn 't the c

where the interest of security and privacy meet

I know one thing for sure, bu t I'll defer to Reit

to say it for  me. She told the audience at ALA

brarians are the ethical backbone of this countr

when you're on the side of librarians, you know

are on the right side.

I

Dick Kaser is Information Today, Inc. s vice president of cont

Send your comments about this column to [email protected]

SEPTEMBER 2012  I N F O R M T IO N T O D

8/10/2019 Privacy Meets Security

http://slidepdf.com/reader/full/privacy-meets-security 2/2

Copyright of Information Today is the property of Information Today Inc. and its content may not be copied or

emailed to multiple sites or posted to a listserv without the copyright holder's express written permission.

However, users may print, download, or email articles for individual use.


Top Related