at the Border
As new government programs seek to implement border security solutions, it is possible to protect the privacy of citizens' information while using information and intelligence to identify high-risk individuals. Security and privacy are not mutu-ally exclusive. Border management programs dealing with the use and distribution of informa-tion must build privacy solutions internally from the beginning while effectively managing public perceptions externally. Chief Privacy Officers (CPOs) must work together with Chief Informa-tion Officers (CIOs) to conduct early and routine Privacy Impact Assessments (PIAs) to verify that the program accommodates current privacy laws, policy and unveils the need for the improvement and evolution of these privacy measures.
With the evolution and improvement of current privacy legislation and a broader understanding of how the use of technology impacts citizen privacy the U.S. Government can achieve the design, development and implementation of new security programs to secure our borders successfully.
Privacy planning in each stage of a project design and implementation is critical to public acceptance and long-term program viability.