Big Data

Science council approves big-data privacy report

privacy keyboard

Looking for new ways to build privacy protections into IT systems, the White House will publish its "Big Data and Privacy: A Technological Perspective" in the coming days after the report was approved at an April 30 meeting of the President's Council of Advisors on Science and Technology.

The report is part of a larger administration look at the potential big data technology holds to threaten personal privacy.

That broader effort is being led by presidential advisor John Podesta; PCAST was charged with examining the technology behind big data.

The authors backed the routine, consistent use of encryption and other security technologies to protect personal data as it moves across networks. More education is needed for researchers and others who work with personal data to protect the privacy of subjects, especially on the federal side.

They also supported boosting research and adding scale to some types of security protections that are now being implemented "by hand," according to co-author Susan Graham, a computer science professor at the University of California, Berkeley.

"We believe that technology alone can't reduce privacy risks. There has to be policy as well," Graham said. New policy recommendations weren't part of the PCAST brief; those will have to come from the political side of the White House. But Graham did say that the federal government "needs to lead by example," by using good privacy protection practices.

The National Institute of Standards and Technology is in the midst of creating a privacy engineering framework analogous to its work on cybersecurity standards. While not related to the big data review per se, NIST's basic goal is to "develop reusable tools and practices to facilitate the creation and maintenance of systems with strong privacy postures," NIST privacy policy advisor Naomi Lefkovitz said at an agency workshop on privacy earlier this month. 

Part of the problem is that policymakers don't have a framework for talking to engineers about privacy, and there's a lack of clarity about precisely what is meant by privacy in a networked world in which information is shared voluntarily, but also obtained through passive sensors and surveillance systems.

"For too long the risk to individual privacy has been dismissed as too unpredictable or too opaque to be tackled in the development process," said Charles Romine, director of NIST's IT Laboratory.

While there is no schedule for the release of new NIST guidance, the agency is looking to private sector, academia and other stakeholders for input on the development of a methodology that can engineer privacy protections into IT systems.

About the Author

Adam Mazmanian is executive editor of FCW.

Before joining the editing team, Mazmanian was an FCW staff writer covering Congress, government-wide technology policy, health IT and the Department of Veterans Affairs. Prior to joining FCW, Mr. Mazmanian was technology correspondent for National Journal and served in a variety of editorial roles at B2B news service SmartBrief. Mazmanian started his career as an arts reporter and critic, and has contributed reviews and articles to the Washington Post, the Washington City Paper, Newsday, Architect magazine, and other publications. He was an editorial assistant and staff writer at the now-defunct New York Press and arts editor at the About.com online network in the 1990s, and was a weekly contributor of music and film reviews to the Washington Times from 2007 to 2014.

Click here for previous articles by Mazmanian. Connect with him on Twitter at @thisismaz.


The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group