Privacy on the state side

The National Association of State Chief Information Officers earlier this month released a guide to help state officials deal with common privacy challenges.

The guide, "Information Privacy: A Spotlight on Key Issues," focuses on the most common information held by states, including information on children, drivers, education and health. It also highlights the issues that must be taken into consideration for Web site privacy policies and government data matching and sharing.

This document is important because, in many cases, CIOs effectively serve as chief privacy officers, said Stuart McKee, chairman of the association's Privacy Committee and CIO for the state of Washington.

"It seemed like the right step for us to take, to get a comprehensive handle on privacy legislation," he said. "It really gives people a sense of the magnitude of privacy laws and concerns, and that really hadn't been done before."

Privacy has become a hot issue in the past few years because of the amount of personal data handled and stored in information systems.

Studies performed in the past year have found that for new systems and online services, privacy and security are considered as important as convenience, said Ari Schwartz, associate director of the Center for Democracy and Technology.

"Citizens expect that governments will take all three into account and won't just focus on one," Schwartz said. "A lot of the IT folks we speak to want to do the right thing, but they don't know how to do that; this [guide] takes away the excuses."

The rise of new systems to hold and sort information related to homeland security has also raised the level of privacy awareness, and that reaches even further, initiating concerns within the business community and from private citizens, said Bardon "Buzz" Blizzard, a senior director at Computer Sciences Corp. He spoke at a meeting of the Homeland Security Leadership Alliance this month in Baltimore.

Given that environment, agencies must address the fact that concerns about privacy are just as often about perception as they are about reality, McKee said.

"Our perception of privacy is evolving, and one of the challenges we face is education and dialogue that has to occur around privacy," he said.

That doesn't only mean educating the public, but also educating officials within both the executive and legislative branches of state governments. During the next year, NASCIO's Privacy Committee plans to build on the guide by focusing on education and trying to create a common understanding so every person at every level is at least using the same set of definitions when they're talking about privacy, McKee said.

Standard definitions are clearly absent, even within a single organization, and developing a common language is an obvious but important first step, Blizzard said.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group