Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Storage

    Cyber-Security Should Not Limit Enterprise Privacy

    Written by

    Don Reisinger
    Published June 3, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      President Barack Obama unveiled a cyber-security plan last week that he hopes will ensure the United States is kept secure from cyber-threats going forward. He plans to find a cyber-security coordinator to oversee those efforts.
      The cyber-security plan will revolve around a few key initiatives. First off, President Obama wants to establish a framework for incident response, giving government officials and U.S. citizens more guidance in the event of a serious attack. The President also wants to use government resources to spur innovation in the security industry. Obama believes that if the private sector and the public sector work together, the United States could become much safer over time. Following that logic, the President said he wants to increase the number of federal IT workers, while promoting security awareness around the country.
      “From now on our digital infrastructure, the networks and computers we depend on everyday, will be treated as they should be-as a strategic national asset,” Obama said during a press conference last week. “Protecting this infrastructure will be a national security priority. We will ensure that these networks are secure, trustworthy and resilient.”
      It’s an interesting comment. The President used two buzzwords-secure and trustworthy-in the same sentence. But in the IT business, security and trustworthiness are not necessarily mutually exclusive. See, the issue with cyber-security initiatives and the idea of keeping the United States more secure through such initiatives is great at the surface. It will keep U.S. citizens secure (there’s that word again). But will it make the U.S. government trustworthy? And more importantly, will it ensure that the privacy of both consumers and the enterprise is maintained?
      There’s no way to tell.

      To see five hacks that could challenge the government’s new security plan, click here.

      Although it was originally proposed April 1 by Sen. Jay Rockefeller and not President Obama, the Cybersecurity Act of 2009 would give President Obama unprecedented control over private networks. If the bill passes, the President could designate private networks as a “critical infrastructure system or network.” Once that happens, the President could “declare a cyber-security emergency and order the limitation or shutdown of Internet traffic to and from” that network. The bill also proposes that software companies would need to get government approval on new security applications.
      But the biggest problem with the bill is that it would provide the Secretary of Commerce with the authority to access “all relevant data concerning [private] networks without regard to any provision of law, regulation, rule or policy restricting such access.” In other words, the company operating the private network wouldn’t have any legal recourse if the government decided to swoop in and access any and all “relevant” data on the network.
      To assuage security concerns, the bill does feature a caveat, which requires the president to justify his actions “with appropriate civil liberties and privacy protections.” Whatever that means.

      How Far Will the Government Go?

      Maybe it’s an overabundance of irrational concern, but am I the only person who thinks this bill is using security as a tool to invade the privacy of the corporate world and its employees? It’s a real possibility.

      There’s no debating that more attention needs to be paid to keeping the United States secure from cyber-threats, but just how far the government will go to ensure civil liberties are maintained is very much in doubt. And no matter how many arguments are made in defense of civil liberties on the part of politicians, it’s difficult to believe it when bills like the Cybersecurity Act of 2009 are even proposed.

      For his part, President Obama did say in a speech last week that the country’s “pursuit of cyber-security will not include … monitoring private sector networks or Internet traffic.” He went on to say that his administration will “preserve and protect the personal privacy and civil liberties that we cherish as Americans.”

      That’s certainly nice to hear. But whenever cyber-security policies are made a part of the U.S. government’s initiatives, it’s privacy that takes a blow. That doesn’t mean it will continue to happen going forward, but if we are to use the past as our guide for the future, it’s difficult to see how the government’s new stance can really ensure enterprise privacy.

      And perhaps that’s the biggest problem with President Obama’s plan and plans set forth by members of Congress. They realize that privacy is a major concern so they address it in statements before they enact policies. But as the enterprise starts being impacted by those policies, it quickly becomes clear that the government has the power to change its own rules whenever it’s deemed necessary.

      Say what you will about cyber-security and its importance to the future of the United States. But when it comes to limited enterprise privacy, not even protection against foreign hackers is as important to the fabric of this country as privacy.

      “We must protect our critical infrastructure at all costs-from our water to our electricity, to banking, traffic lights and electronic health records-the list goes on,” Sen. Rockefeller said in a statement earlier this year. “It’s an understatement to say that cyber-security is one of the most important issues we face; the increasingly connected nature of our lives only amplifies our vulnerability to cyber-attacks and we must act now.”

      At all costs? Let’s hope not.

      Don Reisinger
      Don Reisinger
      Don Reisinger is a longtime content writer to several technology and business publications. Over his career, Don has written about everything from geek-friendly gadgetry to issues of privacy and data security. He became an eWEEK writer in 2009 producing slide shows focusing on the top news stories of the day. When he's not writing, Don is typically found fixing computers or playing an old-school video game.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.