privacy meets security

2
EDITOR S NOTE Learning  2 0 N o matter how  old we get the crisp autumn feel  o f September still conjures up mem ories of heading back to school, mad e all the sweeter w ith a new box of Crayolas,  a  big three-ring binder, a nd  a  handful of freshly s harpened No.  2 pencils. OK, the tools toda y for the back-to-school scene are slightly dif ferent. Think smartphon es, iPads, and Facebook. This issue seemed to be the per- fect place to talk about our theme of innovation  fo r  academic communi- ties.  Our three features this month cover  all  the bases, from elearning to innovation to iSchools. First, in Up Close With Steph en Abram, Miriam  A.  Drake gets this globed thinker talk ing about his dedi- cation  to  librarianship and  his  mission to merge learning  vsdth  the w ork of  li- brarians. Abram offers his insights as a librarian as well as the  vice  pres- ident  of  strategic partnerships  a nd markets  at  Gale Cengage Learning. Then, author Robert S. Benchley takes a  look  at the crossroads of crowd- sourcing and think ing outside the box in NineSigm a: Finding Innovation in Unexpected  Places. CEO Andy Zynga helps enterprises forge innovative partnerships to meet ever-changing technology needs in the marketplace. Finally, we step into the virtual classrooms at three top iSchools tha t represent  the  academic creativity involved in shapin g the minds of  to- morrow's librarians and information scientists  in  iSchools: Shaping the Information Landscape. Whether their titles are records management specialists, business intelligence an- alysts,  or digital initiatives librarians, they're librarians to the core. This issue  is  packed with infor- mation about new products, tools, and services designed especially for the academic com munity, from ed2go (Gale, part of Cengage Learning)  to the Turnitin plagiarism tool (iPara- digms, LLC). Enjoy t he issue.  EHINDTHELENS Where Privacy IVIeets Security by DICK K SER A uthors Daniel Garrie and Yoav Griver, who are attorneys, quickly advised the audience at SoMoLo@NY (part of the info360 confer- ence  in  mid-June) that their forthcoming comments did not constitute legal advice. But I've already heard their comments many times before: Cloud comput- ing is not necessarily safe. Garrie a nd Griver were on a speaking tour celebrat- ing their book.  ispute Resolution  and  e Discovery (Thomson Reuters Westlaw, 2012), which  is  now  in its second edition. Down the  hall  in  New  Y ork City s Jacob  K Javits Con- vention Center, the info360 show, the ON DEMAND Expo,  and the Cloud Expo were all taki ng place simul- taneously, as the two lawyers address ed the legal is- sues involved in moving data to, or using application s residing on, remotely hosted computers, such as the ones that provide  YouTube,  Gmaü, Microsoft Office  365, Salesf orce.com, TurboTax, and Tw itter. The cloud may even be a part of your operational infrastruc ture if  re- mote service providers are helping your operations. The la-wyer s actually sounded a lot like  realtors.  You know, it's all about location, location, location. Where is your data? What local law governs it? Who owns this data in that  place?  Who  is allowed  to  access it? And what are they required  to do  if you demand it  back?  Who is liable to your custom ers if those rem ote servers go do-wn  or  get attacked, the d ata gets corrupted,  or  (heaven forbid) the service provider goes out of business? If this has n't scared you enough, bear in mind that Google apps  are  made available over thousands  o f servers, and under the terms  o f  service you signed when you clicked the Accept button, those servers can be located an3rwhere, they warned. Afew weeks later at the ALA Anaheim 2012 Annual Conference & Exhibition,  I  was reminded that even if those servers are in the U.S.,  your privacy may also be at risk, ironical ly enough for security reasons. Speaking about the pen- ding  U.S.  legislation. Cyber Intelligence Sharing and Protection  Act  (CISPA),  an d its cousin in the S enate, the Cybersecurity Act, Rainey Reitman, who  is  the acti- vism director  at  the Elec- tronic Frontier Foimdation, said, CISPA would have allowed  fo r  cybersecurity purposes social sites  to  pass along data without  a Ramey  Reitman, activism director at the Electronic Frontier F oundation, spolie  at  the ALA Anaheirr)  2012 Annual Conference  Exhibition. douds cover New  Yori City s Jacob K. Javits Conve ntion Center during  the Cloud Expo. warrant to NSA [National Security  Agency]. Its sister bill in the S enate m ay be better, but the two will need to be reconciled. Our watchdogs in Washington, D.C., are paid to make us worry about such things. These bills are about censorship, she warned the audience at ALA. These buls are about surveillance. I attended  a  special preconference session at ALA Anaheim titled  Who Do  I Trust to Protect  My  Privacy? The session was pa rt of an  ALA  initiative to promote a national dialogue about privacy by using  a  deliber- ation format. It's  not a  discussion  or a  debate;  the meth od pro-v ides a way for the pu blic to weigh in and establish common ground by weighing pros and cons. Carolyn Caywood developed an approach for raising awareness about  privacy. Carolyn Caywood, who was the facilitator ofthe session, said, It cuts right across the red and blue political lines. And based on the session  I  attended, I must say  it  really  works.  Librarians anywhere can download the materials and hold  a  session  in  their hometowns from the Privacy Revolution website (www .privacyrevolution.org/index.php/resources/for_ libraries/civic_engagement). I find myself wondering whether it isn 't the cloud where the interest of security and privacy meet. I know one thing for sure, but I'll defer to Reitman to say  it for  me. She told the audience  at  ALA, Li- brarians are the ethical backbone of this country,  so when you're on the side of librarians, you know you are on the right side. I Dick Kase r is Informati on To day , Inc. s vice president of content. Send your comments about this column to [email protected]. SEPTEMBER 2012  INFORM TION TOD Y

Upload: kevin-martin

Post on 02-Jun-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

8/10/2019 Privacy Meets Security

http://slidepdf.com/reader/full/privacy-meets-security 1/2

EDITOR S

NOTE

 2 0

o matter how old we get

the cr isp autumn feel of

September still conjures up

ories of headi ng back to school,

e all the sweeter w ith a new box

 a

 big three-ring binder,

nd  a handful of freshly s harpe ned

  2 pencils. OK, the tools toda y for

chool scene are slightly

ferent. Think smartphon es, iPads,

This issue seemed to be the per-

t place to talk about our th em e of

 for

 academic communi-

  Our three features this month

 all

 the bases, from elearning

to iSchools.

Firs t, in Up Close With Steph en

 A.  Drake gets this

obed thinke r talk ing about his dedi-

 to librarianship and his  mission

 vsdth the w ork of li-

as well as the  vice pres-

 of

  strategic partnerships

 and

 at Gale Cengage Learning.

Then, author Robert S. Benchley

 look at the crossroads of crowd-

ing outside the box

NineSigm a: Finding Innovation in

 Places. CEO Andy Zynga

rships to meet ever-changing

Finally, we step into the virtual

oms at three top iSchools tha t

  the

 academic creativity

ed in shapin g the m inds of  to-

s librarians an d information

cientists

 in

  iSchools: Shapi ng the

Landscape. Wh ether

ecords managem ent

 or digital initiatives libraria ns,

to the core.

This issue is  packed with infor-

nd se rvices designed especially for

he academic com munity, from ed2go

Gale, part of Cengage Learning)

 to

he Turnitin plagiarism tool (iPara-

digms, LLC). Enjoy t he issue.

  EHINDTHELENS

Where Privacy

IVIeets Security

by D I CK K SER

A

uthors Daniel Garrie and Yoav Griver, who

are attorneys, quickly advised the audience

at SoMoLo@NY (part of the info360 confer-

ence in mid-June ) that the ir forthcoming comm ents

did not constitute legal advice. But I've already he ard

their comments many times before: Cloud comput-

ing is not necessarily safe.

Garrie a nd Griver were on a speaking tour celebrat-

ing their book.

  ispute Resolution

  and e Discovery

(Thomson Reuters Westlaw, 2012), which

 is

 now

 in

its second edition.

Down the  hall in New York City s Jacob K Javits Con-

vention C enter, the info360 show, the ON DEMAND

Expo,

 and the Cloud Expo were all taki ng place simul-

taneously, as the two lawyers address ed the legal is-

sues involved in moving data to, or using application s

residing on, remotely hosted computers, such as the

ones that provide

 YouTube,

 Gmaü, Microsoft Office  365,

Salesforce.com, TurboTax, and Tw itter. The cloud may

even be a part of your operational infrastruc ture if  re-

mote service providers are helping your operations.

The la-wyers actually sounded a lot like

 realtors.

 You

know, it's all about location, location, location. Where

is your data? What local law governs it? Who owns

this data in that place? Who is allowed to access it? And

what a re they required to do if you demand it back? Who

is liable to your custom ers if those rem ote serve rs go

do-wn or get attacked, the d ata gets corrupted, or (heaven

forbid) the service provider goes out of business?

If this has n't scared you enough, bear in mind tha t

Google apps

 are

 made available over thousands

 of

servers, and under the terms of service you signed

when you clicked the Accept button, those servers can

be located an3rwhere, they warne d.

Afew weeks later at the ALA Anaheim 2012 Annual

Conference & Exhibition, I was reminded th at even

if those servers are in the

U.S.,  your privacy may also

be at risk, ironically enough

for security rea sons.

Speaking about the pen-

ding U.S.  legislation. Cyber

Intelligence Sharing and

Protection Act

 (CISPA),

 an d

its cousin in the S enate, the

Cybersecurity Act, Rainey

Reitman, who is  the acti-

vism director

 at

 the Elec-

tronic Frontier Foimdation,

said, CISPA would have allowed for cybersecurity

purposes social sites

 to

 pass along data w ithout

 a

Ramey Reitman, activism director at

the Electronic Frontier F oundation,

spolie  at  the ALA Anaheirr)  2012

Annual Conference  Exhibition.

douds cover New Yori City s Jacob K. Javits Conve ntion Center durin

Cloud Expo.

wa rrant to NSA [National Security Agency]. Its s

bill in the S enate m ay be better, but th e two will n

to be reconciled. Our watchdogs in Washington, D

are paid to make us worry about such things.

  These bills are about censorship, she warned

audience at ALA. These buls are about surveillan

I attended a special preconference session at

Anaheim titled  Who Do I Trust to Protect My  Priv

The session was pa rt of an ALA  initiative to prom

a nat ional dialogue about privacy by using a del

ation format. It's not a discussion or a debate

meth od pro-vides a way for the pu blic to weigh in

establish common ground by weighing pros and c

Carolyn Caywood developed an approach for raising awareness about

 

Carolyn Caywood, who was the facilitator o

session, said, It cuts right across the red and b

political lines. And based on the session

 I

 atten

I must say it really

 works.

 Librarians anywhere

download the materials and hold  a session in 

hometowns from th e Privacy Revolution website (w

.pr ivacyrevolu tion .org /index .php/resources/f

libraries/civic_engagement) .

I find myself wondering whet her it isn 't the c

where the interest of security and privacy meet

I know one thing for sure, bu t I'll defer to Reit

to say it for  me. She told the audience at ALA

brarians are the ethical backbone of this countr

when you're on the side of librarians, you know

are on the right side.

I

Dick Kaser is Information Today, Inc. s vice president of cont

Send your comments about this column to [email protected]

SEPTEMBER 2012  I N F O R M T IO N T O D

8/10/2019 Privacy Meets Security

http://slidepdf.com/reader/full/privacy-meets-security 2/2

Copyright of Information Today is the property of Information Today Inc. and its content may not be copied or

emailed to multiple sites or posted to a listserv without the copyright holder's express written permission.

However, users may print, download, or email articles for individual use.