A Blog dedicated to exploring privacy and technology

Archive for the ‘Uncategorized’ Category

Reversing Negative Privacy Behaviors Using a Didactic Approach

Posted by Wayne on March 14, 2014

There is an old phrase of death by a thousand cuts. This simple and oft used phrase refers to a slowly occurring negative change, so slow that we often don’t seem to notice and even go as far as to adjust and accept the inevitability of the path that we’re on.

Personally this is what I believe many of us have come to accept when it comes to privacy in the digital age. When a new gizmo or website presents us with a new way of improving our life – we ignore the voice in our head and click through the privacy policy, fill in answers to questions, link other systems to the one we’re in and trade one more small slice of our privacy for convenience.


In fact – I think this picture depicts what it is like – we are led by these tiny morsels of goodness – in trade for heading in a direction. Like Pavlov’s experiment we are trained slowly and in the smallest increments that it is ok to divest our ownership of our own information and acquiesce future control over the use or modification of the information.

The problem with this learned behavior is that the incremental loss of authority, access, and provenance of our data has to eventually lead to bad outcomes. Are all of the data collection systems bad? Not in the least. However as technologies such as the Internet of Things, Cloud, and Big Data – continue to develop ways to create, collect, harvest, and analyze data about us – we are assisting the populating the data warehouses.

So that gets us to what can we do about it? Thankfully there are a number of companies that are starting to tackle just that problem. One example is a company called Lookout which is a mobile app that helps a mobile user digest the privacy policy. We need products that alert us and teach us how to protect our privacy. One of the best models I’ve seen for this kind of teaching method is what Toyota has included in its Prius dashboard.



If you’ve ever driven one – it has a visual feedback mechanism that gives the driver positive feedback when driving economically. I’ve personally experimented with it and if I ignore it and drive it like a big V8 – foot to the floor when the lights change, drive at 80+, etc. I get as little as 40 MPG. If I drive it paying attention to all the feedback and the conditions are right I learn to drive in a way that I can get between 54-60 MPG which is a huge difference in mileage.

This is what we need in privacy – companies that are not leading us down a path of complete exposure but down a path that teaches us how to be far more aware of our privacy risks and alert/monitor that what we are sharing is the right data at the right time. With as complete an understanding of what the data is going to be used for and how as it is put to use. This applies to data in all three phases – in use, in flight, and at rest.

I’m excited because for the longest time privacy protection wasn’t monetizable – companies can’t exist without revenue and wouldn’t be able get investors interested without a solid economic model. Recent events have catalyzed innovation in privacy that have created interest in the VC community as well as for entrepreneurs. I will be talking these exciting new companies over the coming weeks and months on this site.

It is good to be back and a very exciting time for privacy.


Posted in Uncategorized | Tagged: , , | Leave a Comment »

Part 2 – Choosing the Assessments

Posted by Wayne on March 2, 2012

Once I had detailed the research questions I next needed to decide what privacy assessments I was going to use. First I looked to the security instruments out there to see what they had and found that several of the common security instruments did have a few questions that pertained to information privacy they were by no means comprehensive. For example the ISO/IEC 27002:2005 instrument has sections on privacy policy management and data classification but is missing specifics on notice, use, or retention as examples. The next place to look was for books on privacy assessments. Again though I found books that contained sections on privacy such as Debra Hermann’s book “Complete Guide to Security and Privacy Metrics” only about 10% of all the metrics listed were US-centric privacy metrics. US-centricity was a self-imposed requirement to managed the scope of this research.

Next approach was to try something that I figured this would be an easy step – run a few searches on the Internet and I’d probably have too many privacy assessments to choose from. Instead what I got was a lot of commercial consulting companies that have all developed their own assessments. Now what? More searches – only directed and emails to friends and friends of friends! I found three that seemed to be pretty good choices and also finding them detailed in an article written by Roger Clarke on Privacy Impact Assessments helped support the use of them.

DHS/DOJ Privacy Impact Assessment – The first one is the only mandated privacy assessment in the US which is mandated by the DHS/DOJ when deploying a new government system (also someone government specific as well). Since it is a privacy impact assessment it is designed to be used as a ‘pre-assessment’ before a system is implemented. I couldn’t determine the provenance of the DHS/DOJ PIA but I had to assume that it is a ‘best practice’ and is reviewed by the office of the CPO. Also the DHS/DOJ PIA only has 40 questions in it making it the briefest of assessments.

ISO/IEC 22307:2008 Financial Services Privacy Impact Assessment – This is an international standard and is financial services biased. It is also a pre-assessment instrument and has a total of 102 questions. I had to purchase this assessment for my research from ANSI who manages ISO standards here in the US.

SharedAssessments Privacy Assessment – Shared Assessments is a not-for-profit group that was created by leading financial institutions and accounting firms. The instrument I used was an earlier version and was freely available. However if you wish to access the tools today you have to become a member.The SharedAssessments tool that I used has 127 questions.

So these the three assessments I used. In my next post I’ll talk about the cloud providers I choose and why.



p.s. There is a bit of irony that I want to mention – a complete book on privacy impact assessments was published just recently that may be useful if you are interested in knowing more about this topic: Privacy Impact Assessment (Law, Governance, and Technology Series).

Posted in cloud, privacy, risk, Uncategorized | Tagged: , , , | Leave a Comment »

Part 1- An Introduction to my Dissertation Research

Posted by Wayne on February 11, 2012

Over the next few months I’ll finally be able to come out of hiding … not that I’ve been doing anything stealthy or that exciting even. I’ve been working on completing the hardest thing I’ve ever under taken in my life – a PhD. Four and a half calendar years and literally well over a thousand hours of time. For some I guess this is something they know they are going to do when they are young and full of energy and strong of heart and mind but for me this was my mid-life-crises.

Anyway – the coolest outcomes are: I definitely think a little different about things and the research that I got to do has some interesting and (I think) valuable results.

My initial goal was to do something epic, far reaching, and somehow alter the way we think about things. Did I accomplish that? Yes for me I did. I had some outstanding help from some great minds on my dissertation committee that helped me to explore a few things that will add to the science regarding privacy. I learned a lot from the body of knowledge already out there, from and about myself, and from those who supported me through the process.

The topic of study was “An Empirical Study of Privacy Risk Assessment Methodologies in Cloud Computing Environments” the initial abstract was published here and it has changed to look more like this. The abstract is not the only thing to change – the hypothesis changed, the research questions changed, and even the methodology changed. Fortunately what didn’t change was the data.

For this post I’m just going to share the research questions:

Q1.Do existing privacy assessment methods adequately assess privacy risk exposures of cloud computing for the enterprise?

Q2.By using the scoring system (outlined in the methodology section) are the new characteristics in cloud computing such as on-demand/self-service, broad network access, measured services, shared resources, and elasticity adequately evaluated or accommodated in existing privacy assessment methods?

The drivers for these questions were based on some basic phenomena that I had observed 4 years ago when I started looking for problems to explore. First and foremost I was (and still am) so excited about cloud computing. In my opinion Cloud is the most interesting technical thing to happen since the 80’s and Vax/VMS clusters ruled the computing world. The second thing that I realized was that privacy was also a domain that seemed to be important and was so incredibly polarizing with my peers in school and colleagues at work. The last thing that I noticed was that we seem to have this blind belief system and trust in assessment methods. Security folk call it checklist compliance – find a good checklist, check things off, and everything will be fine.

In the privacy domain risk assessments are very immature compared to the security world. Also what got me thinking about all this was – who says we’re asking the right questions? When we’re done why can’t we have a risk score like with our credit card score? I found some work done by Dr. George Yee (Estimating the Privacy Protection Capability of a Web Service Provider) that became the basis for my inquiry – how do we get assurances of privacy when we connect with web service providers?

More to come soon …


Posted in cloud, privacy, risk, security, Uncategorized | Tagged: , , , , | Leave a Comment »

Information Handling – Top 10 Information Tenets for the Cloud

Posted by Wayne on March 18, 2011

   My new role at EMC is to teach people to be Virtual Data Center (VDC) and Cloud Architects. For me this is a great privilege and an incredible learning experience – and a chance to build trust in the cloud one architect at a time.

   During the process the team of course developers researched hundreds if not thousands of papers, read numerous books  (such as Nicholas Carr’s The Big Switch: Rewiring the World, from Edison to Google, David Linthicum’s Cloud Computing and SOA Convergence in Your Enterprise, Jeff Barr’s Host Your Web Site in the Cloud, Scott Lowe’s Mastering VMware  vSphere 4, and Edward Heletky’s VMware vSphere and Virtual Infrastructure Security to name a few), tons of blogs, and reviewed websites of manufacturers and consultants too numerous to list. We also spent time reviewing the standards and emerging standards developments such as the Cloud Security Alliance (CSA),  the European Network an Information SecurityAgency (ENISA), Also the great work that the National Institute of Standards and Technology (NIST) have been doing – all of which we’ve incorporated their guidance and definitions into the class.

   One of the modules included in the VDC and Cloud Architect course we’ve developed includes a Governance, Regulatory, and Compliance (GRC) section that I developed focused on VDC and Cloud GRC definitions and processes. As I’ve had a chance to first research this in-depth and to teach it to over 50 people now I’ve come up with a list of what the top ’10’ tenets:

  1. Always OWN your information no matter where it is. This has to be the number one rule. Always own your own data. Make sure that wherever it gets created, stored, shared, etc.  that if it is your company’s information asset. Good providers will put that in writing in their terms of service.
  2. If you don’t have good GRC today, what makes you think you will have good GRC practices in a VDC or Cloud?  Seriously – does anyone think that if they go to a cloud they are all of a sudden going to have these great new policies and processes? Can you inherit new ones that the provider has that improve your standard? Sure – but how will you know that if you didn’t come up with a standard in the first place?
  3. Develop an information life-cycle for all information – cradle-to-grave. Information has a lifetime. Keep it too long and it gets you and your company in trouble. Either because it gets acquired by someone you don’t want to acquire it or demanded by a regulatory or legal entity that wants to get all the data they can going back forever if they can. Just like you can’t leave stacks of all printouts and correspondence around your office forever – you need to be diligent with your digital information. When it is created – set an expiration date, create an archive policy, and a purge date!
  4. Less (information) is more. One of the bad habits of the past couple of decades is that we develop software and databases that collect and store a lot more data than we’ll ever need. Information is a powerful tool – but it can also be a liability. Collect what you need it will save you a lot of headaches and $$$ (minimally for storing and protecting) down the road.
  5. Develop an Information Taxonomy. Back a few decades ago – enterprise development efforts had things called meta data dictionaries and information flow diagrams. Because a large enterprise has so many applications that not only collect new data but also reuse data collected earlier dependencies become critical for data accuracy reasons. For example when a new application is built that is customer facing – recollecting the same customer data each time they engage with your company is both frustrating for the customer as is the inherent probability of creating a nearly duplicate set of information. I said nearly duplicate for a reason – the customer may put the address in different the second time creating a second version of the data. So when another application needs it – which one is right? By creating a  taxonomy you can develop a methodology for single sourcing critical data, remove redundancies, and in this day and age – manage the regulatory and legal issues related to certain types of data.
  6. Always know who your (data) handlers are. Let’s face it – systems in general let more and more information be seen and handled by more people. This raises the risk quotient considerably. When you leverage a cloud services provider – you need to take the time to find out their data handling procedures are. You are effectively increasing the risks and attack surfaces by extending your technology, people, and processes into the cloud. How do you mitigate this? One way is to go back again and read those terms of service. A good provider is going to say things like “our employees do not have direct access to your information nor are they allowed to engage with it without your express written permission” – when they want an affidavit attesting they are allowed to access it – they take their access to your data pretty seriously.
  7. Cloud Security requirements regarding information should be at least as good as internal, recommend they are better. This is much like the GRC standards in-house in #1 – but has to be said. Make sure your security standards are met by the provider and ideally their standard is higher. We’ve developed some excellent tools in the course that help determine what this should look like.
  8. Read, Comprehend, and Acknowledge all the information related cloud providers terms. Actually read them (terms of service, terms of use, service level agreements, security policy, privacy policy, retention policies, termination agreements, license agreements, etc.) print them to PDF’s and sit with your legal department/contracts groups in addition to your information security and privacy offices. On-demand or not – these agreements will define roles and responsibilities and things like what happens when you no longer want to use the service and now you have to get all your data back, or what kind of data does the provider keep about you as a customer, for how long, who do they share it with, etc.
  9. Think about Transitivity! This one applies to both service levels and other items like 3rd parties. For service levels – always look at what each discreet service you are using has for an SLA and then think about what happens when you bundle services. For example when you combine a Virtual Machine service that is 99.95%, and a storage service that is 99.99% and a messaging service that is 0.00% – you get a combined service bundled that you can expect a 0.00% SLA. When it comes to other items of concern – make sure the provider has the same standard for their 3rd parties as they do for their employees. For example the provider uses a security contractor for their info-sec department. Do they do the same background and drug tests on the 3rd party’s as they do for their employee’s? Does the provider have the same standard as you do for your employee’s? See the transitivity issue here? Make sure the standard is as good as or better!
  10. Evaluate your assets in terms of Asset Value. We spend a lot of time in the class talking about this one. take the time to come up with asset valuations that are going to go into the cloud. For example come up with a quick score that rates the asset as High/Medium/Low in value. Then make a policy decision that all High value assets either need special security provisions in the cloud or they just can’t be put in the cloud for now. This process helps prioritize the start of the process for assessing the cloud for your information assets and prioritizing the candidates but it is only the beginning.

This isn’t an exhaustive list – but is a good starting point for coming up with some good practices for building trust in the cloud and assurance for Information Handling. Want to learn more – then come take our EMC Proven Professional VDC & Cloud Architect Class!


Posted in Uncategorized | Leave a Comment »

Privacy Assessments and their usefullness in the cloud, an empirical study

Posted by Wayne on December 12, 2010

It is about a tad over a year when I started writing my dissertation proposal now I am embarking on the next part of the journey – the actual study. In the past year I’ve had the opportunity to author or co-author a couple of papers that are related to my dissertation study. The first one was a position paper about risk assessment in the

PIA Image from ENISA

cloud and how would it be accomplished as a service. The second one just got published in a special edition of IEEE Security & Privacy on cloud computing and is about cloud provider transparency.

These are related to the dissertation study in that they all look at aspects of how privacy risk can be assessed in cloud environments. The dissertation study will differ in that it will empirically test three different privacy assessments against a ‘reference application’ that would run in cloud environments. The reference application will contain data that is regulated or needs to be protected as it is considered private data. The objective of the study is determine how well the privacy assessments work in cloud environments. Does multi-tenancy have an impact on the outcome or does elasticity? Does one assessment versus another do a better job in cloud environments?

The study is not an exhaustive one because it has to be something I can finish in a reasonable amount of time (and finish is the key word here!). It is however unique based on my review of the literature. There does not appear to be a lot of empirical data when it comes to privacy in the research. I honestly couldn’t find anything published about privacy assessments other than Clarke’s work which provides some excellent background and perspective on privacy assessments and where they originated from (hint: environment impact). Breaches – yes – lots of good stuff, privacy assessments – no, not so much. 

Now I just have to sign up three to five cloud providers to allow me to do the study. A bunch of folks said “sure, when you are ready let us know” when I approached them before but now I need real commitments from cloud providers. If anyone can help me by putting me into contact with the decision makers on research at the CSPs or is interested in learning more – please feel free to send me a note or a tweet. The abstract can be found here: Dissertation Abstract and I’ll glad provide more details to the study if you would like to learn more.


email: wayne.pauley at   twitter: @wpauley

Posted in Uncategorized | Leave a Comment »

Should Teachers Friend Students?

Posted by Wayne on August 16, 2010

I was reading the NH Union Leader when I came across this article about the need for the school system to caution teachers not to “friend” their students in Facebook or Twitter.

Facebook heads-up headed to teachers:

 “All school district employees are reminded that personal information posted on the Internet is not truly private as it creates a permanent record that may be retrieved and retained and thus any expectation of privacy may be unwarranted,” the proposed policy states. “Information posted on the Internet is routinely reviewed by potential employers and may impact future employment opportunities.”

No-Facebook for Teachers

I have a couple of problems with this first statement.. First of all – what an employee does with their personal information is – well their personal information. But, and there is a but needed here – public school teachers are public employee’s and should be guided by a code of ethics that holds them to a high standard. I would think this standard would include requirements on what is allowed in terms of types and modes of communications between students and teachers. I would think that this code would exist without any specific technical method for communication. So if a teacher only has a pen and paper or a landline based phone – there should be guidelines for what is acceptable and what is not acceptable. Ok – so now we have Facebook and Twitter and texting – so what? These should not have to have a new policy associated with them – the same guiding principles should apply.

The article continues with:

“The policy also prohibits teachers from inviting students to be “friends” on social networking sites or agreeing to student friend requests. They should not chat, text, e-mail or Instant Message with students “in an overly casual, unprofessional, inappropriate or offensive manner.”

Huh? Now the policy is going to thwart productive and useful interaction between students and teachers. What kind of message does this send to the students? Social networks are bad? The issue here is what is communicated and transparency. If a teacher wants to communicate with a student – then there needs to be guidelines that are based on a code of ethics that the teacher has to follow. Private conversations are allowed between students and teachers – so why not allow private communications using other methods? The teachers ethics must be held to a high standard and that has to go beyond the classroom. We must also continue to find ways for our children to grow up in a world where the rules are the rules and good behavior is good behavior. Digital information technologies are part of our children’s DNA – they are growing up as digital natives. We all have to learn to appreciate usefulness and capabilities of technology and also sustain the trust and control mechanisms that protect our students and the teachers. We must create an atmosphere of trust and the right to privacy.

I found another article on the same matter that mentioned that the school system had filters on its firewalls to stop the use of Facebook. Geeze do these people realize that 1 out of 2 Americans will have a smarthphone by Christmas 2011 and that the first apps that are built for the phone is Facebook, Twitter, and Texting? Who cares what the firewalls do?

Ironically the teachers handbook for the Nashua school system that has put this new policy forward has nothing about a code of ethics on its website or in the Teachers Handbook. Why not? Transparency seems like a good policy – especially when it comes to ethics.

 What do you think?


Posted in Uncategorized | Leave a Comment »

Finally, almost published …

Posted by Wayne on March 27, 2010

About 18 months ago I took a (premature) shot at publishing a paper on cloud … I was neither ready for the level required for the paper nor was the topic mature enough when I had started writing it. When I finally heard from the organization I submitted the article to I also almost gave up ever trying again … the whole process of submitting, waiting, etc. is really a trying process. The amount of friction involved likely drives many away from even bothering when there are so many other avenues with a much lower coefficient of friction.

For those who are prolific peer-reviewed researchers and writers my hat is off to you. With all the work work, school work, dissertation efforts, and errata activities I decided to give “published” writing a break.

In the past 2 months a funny thing happened – call it aligning the stars or something in the water – whatever it is I had a brainstorm for a paper, ran across a great venue for it, and my idea was accepted. I had blogged about and posted on other sites about cloud transparency so I thought why don’t I do the real research and empirically do a quick (small population study). The process forced me to analytically break down the notion of cloud service provider transparency, do the literature review, and come up with a workable scorecard. Then I studied six cloud providers to see how they fared based on the scorecard. The process all forced me to re-evaluate the scorecard. I also had a few friends help out – like Randy Bias at Cloudscaling who made a few suggestions on the scorecard.

The second event came about through someone sending me the link to a venue and saying to me – “hey Wayne – you should present at this”.  “This” happens to be this summers Usenix HotCloud conference. When I read the event structure and topics I knew I wanted to do something for the conference but … how do I do something that is related to my dissertation without spilling all the beans on what my study is about (this is a primal fear in researchers – for good reason – stolen work)? So I asked a colleague at work who I am so privileged to know Dr. Burton S. Kaliski, Jr. and who has so very graciously agreed to be on my dissertation committee. He suggested – why not take your thesis topic and we do something related as a position paper? So the scramble began and in two weeks we wrote a position paper on Risk Assessment as a Service in Cloud Environments … won’t hear if we got in or not for a few weeks. The whole process of working with such a knowledgable person who can write a paragraph faster than I can read one! He is amazing and so fluid with his thoughts. We took a years worth of white board discussions and came up with a closely related topic that has already provided me greater insight into what I have to clarify in my thesis process.

So now the fun begins – I wait and hopefully go from – almost published … to published. Either way the experience and learning was well worth it. Now back to my thesis …


Updated May 7th:

We (Dr. Kaliski and I) got accepted into the Usenix HotCloud workshop on June 22. We have some minor edits and then I will post the paper. You can find the program for the day here which has sections on Performance/Power, Economics/Pricing, New Programming Models and Usage Scenario’s, and my favorite Security and Reliability.

Updated June 25th:

My second article got accepted by IEEE Privacy and Security. The article will appear soon online and be printed in a special edition on Cloud Computing this fall.

Posted in cloud, risk, security, Uncategorized | Leave a Comment »

What hat do you wear in private?

Posted by Wayne on March 15, 2010

I’ve been studying privacy for about three solid years now and have sat in graduate level classes, read some 300+ research papers, 100’s of blog postings/articles (thanks IAPP – the dailys are awesome). and own/read some 25+ books on privacy (checkout my library), and even follow some great minds in twitter (like @privprof!) ,- so this all totals up to hours and hours (north of 1500 hours) of thought after thought about privacy.

What strikes me as a point of interest is that 99.999% of the content seems to be about the user/consumer/citizen – the person. Not that this is a bad thing – because lets face it – most private information comes from people.  We have contemporary privacy scholars who focus on the legal aspects of privacy like Daniel Solove (if you haven’t read his book “Understanding Privacy” – I highly recommend it!). Software Engineering privacy experts like  Lorrie Cranor who has driven incredible changes in how software, user interfaces, and web tools gather and use privacy related information. Roger Clarke who has looked at privacy statements and privacy impact assessments in-depth. Or Herman Tavani who has shaped much of the theoretical basis for IT Ethics (he has published some excellent research on Privacy & Ethics) And I could go on and on with the list of really great minds.

Recently I have had a few discussions with folks who are privacy experts – in fact a few of them are world-renowned in the academic circles. When I bring up the fact that business has a privacy requirement too – let’s just say I usually get a pretty strong negative response to that. One person even suggested that maybe I’m just working for a business and not really doing research.

Let’s face it – particularly here in the U.S. companies have been very liberal with their controls of their customers (and even just prospects) information. Take the days of the 3×5 warranty card. How is it that a company that sold you a baby carriage needed to know your annual income or your age? All that they need to know (if they need to know anything) is the date it was purchased, where it was purchased, a serial number, and your address.

But … what if we thought about privacy a little bit different? What if we thought of it as if the corporation were a person. For example – a corporation has to worry about the data of their employees, customers, and their own “information”. Their own information could include protected things like intellectual property or more grey area things like temporal or tribal knowledge (e.g. current incentives given to sales to drive sales behavior against a competitor).

Also – has anyone every heard the phrase “it would be like pushing on a rope”. In other words if the discussion/argument/definition is one sided – how do you really move your position forward if there is nothing there to resist the progress? Benjamin Franklin said “Reading makes a full man, meditation a profound man, discourse a clear man.” How can the tension between man and corporation when it comes to privacy be one-sided? It seems valuable to research and understand the privacy privilege, violation, protections, perspective, and purpose from the corporate side of the coin seems to be not only valuable – but a requirement. How can we fully understand where the line needs to be drawn with regard to individual protections if the fight is one-sided?

H. Jeff Smith wrote in his book “Managing Privacy” that corporations only respond to privacy requirements when there is an external event (breach, lawsuit, regulation) – why not choose to find a different – proactive course? One which embraces the needs of the enterprise, assesses it against the needs and rights of the citizen – so that we can find the middle ground? Why constrain our forward movement in the realm of privacy to just the outcome of complaint or the past tense of lost privacy?

And no, my research is not for the corporation or by the corporation. My personal opinion is that corporate America does have too many liberties with our private information and we’re not adequately protected. However my opinion doesn’t count when it comes to research and one of the most interesting ways to study a problem is to reverse it.


Posted in privacy, risk, Uncategorized | Leave a Comment »

What it is like to be a diabetic …

Posted by Wayne on March 4, 2010

Its been a while since I’ve posted anything so I figured to get back into it this year I’d start by exposing some thing about myself – that I wish more people would talk about…   

   Today marks the one year anniversary of my finding out I’m a Type 1 Diabetic. With over 20 million Americans currently diagnosed with Diabetes and evidence that the number is going to more than double of the next decade – you might actually know someone who has this disease. In a recent American Diabetes Association Magazine article I read that every 20 seconds someone becomes a diabetic. Every 20 seconds! Wow.

I thought I would share some of the things I’ve gone through and learned in the process … so lets start with a year ago. Everyone asks did you have symptoms? Yup … did I ignore them – yes, for a few months. The symptoms were weight loss – 35 pounds in 3 weeks. I was going to the gym so I was thinking – wow this was working great. The problem was I really only wanted to lose about 15 pounds and what I didn’t know I was losing fat and muscle. The next symptom I had was that I was run down all the time – in fact I would get home from work (which took everything I had to get through and commute home) and would sit on the couch and fall asleep – sitting up. Now I’ve always found it easy to catch a cat nap but my wife knew something was wrong and was urging me to go see the doc. Nope, not me – I was fine. The final symptoms were I had to urinate all the time – every 20 minutes, and was craving sweetened drinks like Gatorade and coke which I’ve never been big on.

So on March 3rd last year, I remember that it was a Monday and that we had a snowstorm – so I opted to work from home. My wife said that was it – I was going to see the doc who probably had openings due to the storm. I went to the Dr’s and shared my symptoms and he took the usual fluids to test and said he would call me the next day. Three hours later I get a call from him and he said go to the hospital – now and to have someone else drive – because he was pretty sure I had diabetes and my glucose levels were off the charts. The healthy person usually ranges from 75-150 my levels were in the 800’s! Needless to say I spent a few days in the hospital while they stabilized me and spent 2 days teaching me what my life was going to be like as an insulin dependent person.

I thought I’d share some of the experiences – which for me has been a life changer. Not because I have to eat better and workout to stay healthy – because I already did that for the most part. No, it is more that for me I’ve always had relatively perfect health and never had anything serious happen to me health-wise. No broken bones, no hospital visits, no pills required – to having to test my blood 4-5 times a day, count my carbs, and inject 2 kinds of insulin into my body 4-5 times a day.

When I first started dealing with the insulin – I would scurry into the bathroom if we were out or hide in my office and test and inject. Why? I was afraid to have anyone see me do what I’ve done over 1500 times in the past year. At the time I was very self-conscious (still am somewhat), worried people would think I was damaged goods at work, and didn’t want people to stare at me. For the most part I’ve found people are mildly curious or have seen it all before and don’t care – plus I can get through the whole process in less than a minute at this point. Some people stare at me – but hey I have to get over it – and it is my lifeline and the technology and products are so much better now than even 1o years ago. I’ve got it easy compared to those who didn’t have the medical tech we have today or have had to deal with diabetes since they were small children – I’ve had decades of great health (and plan on many more).

I also went through the whole denial, anger, why me stuff. That took most of the last year – and still comes on in short blasts still even a year later. The Dr’s not being able to explain to me what caused it, what I should have/could have done differently, etc didn’t help me understand the question of “why me”. For my trip in this journey – I’ve become more focused on my health overall – more gym time, dialing in the food/diet/insulin ratio’s and reading/learning what I can about the disease and the medical technology and progress toward curing this disease. I’ve also learned to listen to my friends and family and couldn’t have made it this without their caring and support – they have been awesome. The last thing is I’ve dialed back  pushing myself quite so hard. It means things slip off the list until I can get to them – this is probably the hardest thing of all for me.

So one last bit before I end this posting. I had to share one moment that was really hard for me. I finished working out at the gym was stopping at Dunkin’s on the way home for a nice hot coffee and walked in and stopped and just stared at the racks and racks of donuts. For some reason it just hit me so hard – here was all this stuff which I liked to have as a treat once in a while – and it was all off-limits – why did I have to be different? The moment passed and I can actually have a donut once in a while (as long as I take my meds and don’t make it a habit). What I did learn is that – yes my life is different now, I have to plan my days and stay on track with my changed ways – and maybe someday Diabetes will be cured. In the meantime – I’ll do my part.

My call to action to you is – get your glucose levels tested, find out what your A1C  number is, watch your diet, exercise, and live long. Oh – and cheers to another year that we get to walk the planet.


Posted in Uncategorized | Tagged: , | Leave a Comment »

Privacy Knowledge – Solving for the X factor

Posted by Wayne on December 31, 2009

   I was toiling away today on the third version of my dissertation proposal (more like a complete redo!) and I came across a paper “An Ontology-based approach to Information Systems Security Management” written by three researchers from Greece. What struck me as an important idea from their paper was that they created a way to categorize security management into a framework that could be codified as a schema in a database (more on that in a sec) and most importantly was based on “security knowledge”.

  Why is “security knowledge”  (SK) such an important construct? To those who have been in the security business a long time – they probably already have a good idea of what SK is. SK is made up of a thorough understanding of context of the infrastructure, the collecting of requirements, the actions that are to be deployed, and value of information assets.  Most organizations have some or all of these elements in their security knowledge base – though it is likely diffused over several people or even departments or stored in multiple products. The diffusion of security knowledge  is not a trivial problem in its own though beyond what I wanted to try to get to in this posting.

As a privacy researcher, what struck me as a key concept in this research is that there is a  parallel need for “privacy knowledge” and it has to stop being an “also ran” to security knowledge. Privacy is important because privacy is based on Information and we are literally exuding Exabytes of information annually – much of it personal (70% according to this IDC link).

In the security domain one of the metrics listed by Hermann in her book “Complete Guide to Security and Privacy Metrics” is security policy management. I found it interesting that of the 972 metrics she listed there is not a corollary to security policy management which I would think would be called  “privacy policy management“. Yet with the Cloud or any Internet-based business these days – Privacy Policies are kind of treated as “ho hum – ya we got one” item – but have you ever read one (Microsoft has an excellent one that is easy to read , while Wal-Mart’s is easy to enough to read but is lacking in navigation friendliness)? Maybe when you do online banking you take the time to read it, but I’d bet a $1.00 you never read it when you sign up for another widget you want to use on Facebook (that the FB folks wash their hands of when it is not their widget! – What! you didn’t know their privacy policies were NOT transitive? ). So why not have a privacy policy management metric? Why not include the privacy policy as part of the Privacy Knowledge (PK) that the enterprise has to manage since the privacy policy defines a set of requirements that the what the company is adhere to when they DO something with your not-as-private information that they now have.

What if we had a full-blown PK though? To some folks this seems like slicing the onion a different way – but bear with me for a minute. What if you actually took all the SK steps and applied to privacy knowledge and treated privacy knowledge as important as we do security knowledge? The steps would be:

  • Get a full inventory of all your information assets (instead of the infrastructure itself) that applied to your customers, employees, and intellectual property.
  • Understand who has access to the information and can transform, store, or transmit this information (who being people, process, or technology!)
  • Extract privacy knowledge (privacy requirements) from the privacy policy
  • Associate the privacy requirements with privacy controls.  Control instruments would include rule-of-law, regulations (HIPAA, SOX, etc.), and internal business rules as defined in privacy policy.

   Hypothetically speaking if you took these steps and put the resulting information into a database, married it to the Privacy Rights Clearinghouse database, throw in some information asset values – you could begin to perform analytics against the policies. With the  historical breach data you could model potential exposures and perform what if’s. Minimally you could begin to evaluate privacy risk quantitatively. If nothing else you would be a lot closer to understanding X, X standing for the unknown.


Posted in Uncategorized | Leave a Comment »

%d bloggers like this: