Array

What we should all learn from Sarah Palin’s e-mail hack

Sarah Palin may seem like the Belinda Stronach of American politics – the conservative who comes out of nowhere and attracts more scrutiny over her looks and gender than her track record in government – but she may actually share a greater kinship with fallen former Foreign Affairs Minister Maxime Bernier.

The U.S. vice-presidential nominee was already dealing with the tabloids prying into her personal life before a hacker managed to crack into her Yahoo! account. Much like the revelations of her pregnant daughter and son with Down’s Syndrome, the e-mail security breach should make her more sympathetic to the American voter. Not only could it happen to any of us, as researchers were quick to assert, but it’s a wonder it doesn’t happen to more of us more often. Like a lot of knowledge workers, Palin was blurring the professional and the personal in terms of her IT usage. It doesn’t have the drama of Bernier’s ex-girlfriend with the alleged ties to biker gangs or the sensationalism of a tempestuous affair and documents reportedly left at a lover’s loft, but Palin’s e-mail incident is instructive precisely because it is so pedestrian.

It’s possible that this election will make U.S. history in an unexpected way: that for the first time candidates for office are being evaluated (or at least criticized) for the way in which they manage, share and store electronic information. It’s not a trivial matter. By allegedly conducting state business via Yahoo!, Palin was, in a sense, an early adopter of cloud computing, highlighting both the ease of using Web-based communication and the dangers of trusting a public rather than a private, protected network. If she was truly trying to get around the data retention rules, well, what could be more all-American? Or Canadian, for that matter?

That the McCain-Palin campaign has made little comment on the e-mail breach is disappointing. Unlike the gaffs which have so far plagued the parties in the Canadian federal election – Puffin poop and brainless bloggers – the Republicans may be missing an opportunity to truly lead by example. In this case, it would amount to admitting there was an error in judgment, a commitment to learning more about the risks involved in using personal software applications for business purposes and a recognition that appropriate handling of information has to start at the top.

Perhaps politicians shy away from such things because they don’t fully understand the liabilities that surround electronic messaging, or they don’t think it’s a topic likely to engage the average citizen. And they may be right. Still, IT managers who spend their days trying to craft usage policies can’t be the only ones who would appreciate the value of working behind the firewall. In the U.S. they tend to focus on electing a Commander-in-Chief. Perhaps we should all start rallying for someone who can prove themselves a worthy User-in-Chief too.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada
Shane Schick
Shane Schickhttp://shaneschick.com
Your guide to the ongoing story of how technology is changing the world

Featured Download

IT World Canada in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Latest Blogs

Senior Contributor Spotlight