Security and Privacy: This is not a case of “opposites attract”

David SherryWhat have you done with technology in the last 24-48 hours? I going to assume that you did many, many things including: used your email, looked up sports scores or news, sent a text (or hundreds), purchased a book on Amazon, sent or viewed tweets, updated your wall, and reviewed your calendar to plan a trip to view the foliage. And I can also assume that you did some work with your devices and networked technology as well.

Have you ever wondered where you leave digital footprints? Have you ever considered where all of your information resides? Have you ever thought about how this impacts your privacy? Technology now has the ability to know what you look like, your personal appointments, your correspondence, your documents, where you are, what you watch, what you are looking at, and where you have searched. That is a great deal of information, and can paint a fairly accurate picture of you. Of course, if can also paint the opposite if you are not careful.

Privacy used to be easy, but it is much more difficult now. And privacy has the propensity to be somewhat of a relative word, and the personal definition can be drastic from one person to another. The view of privacy can also change from generation to generation.

Addressing both the concerns of security and laws of privacy are aligned in many ways. That is why you will find some focus on privacy as ISG celebrates National Cyber Security Month (NCSAM) in October. We’ll have tips and presentation to aid in your privacy, both at work and at home. ISG is also preparing Brown to be part of National Data Privacy Day in late January of 2013. Privacy will also get some attention throughout the university in the coming year. We think that you will find our information valuable, while also reducing the risk to the University.

I hope that you will follow all that is going on for NCSAM. Follow us on Twitter (@CISOatBrownU | @ISGatBrown), look for our ads in the BDH, and take in a session or two. There are opportunities for great prizes that can be won simply by participating!

As always, I welcome your comments and feedback. Please feel free to reach out to me directly at, or the group at Let me know how we are doing, areas of concern you may have, or questions on protecting your identity or personal computing security. I truly enjoy hearing from each and every one of you. And remember, sec_rity is not complete without U!

Posted in Fall 2012 Edition, Safe Computing | Comments Off on Security and Privacy: This is not a case of “opposites attract”