by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
GCN : January 2013
[the index] optional art here, if available Inside Departments 5 NEWS ANALYSIS LOC seeks tech to make its expanding Twitter archive accessible for researchers. 6 NEWS ANALYSIS Four potential areas that could cause renewed security problems in 2013. 11 EXPLAINER Want to disable your smart phone's geotagging feature? Here's how. Commentary 20 CYBEREYE Assessing predictions for 2012 and looking ahead to 2013. 14 INTERNAUT Once regarded as a compliance tool, ITIL is re-emerging as a multiple resource management asset. 15 REALITY CHECK Amazon Web Services is turning vision of "computing as a utility" into reality. 34 EMERGING TECH The Navy's new X-47 drone may be the DOD's first true military robot. Features 16 ANALYSIS Testing technologies for trusted IDs $9 million in grants fund 5 pilot studies to create digital identity ecosystem. 24 CASE STUDY Ohio county merges 3 public health agencies How Summit County used VOIP to consolidate 350 phone lines in 11 locations. 27 CASE STUDY Western states build GIS data platform 15-member consortium builds public cloud-hosting services. 29 CASE STUDY How to build a better surveillance system Boca Raton PD enlists public video to coordinate security efforts. 31 CASE STUDY Public Wi-Fi: Can it regain its lost luster? Staunton, Va., installs free Wi- Fi for public park bandstand. 11 basic steps to securing mobile devices The Health and Human Services Department has released several online resources to help health care provid- ers protect patient privacy on mobile devices. A recent Ponemon Institute survey said negligence is the main reason for patient privacy and data breaches, the primary cause being lost or stolen devices, most of which were mobile. On average, 51 percent of employees bring their own devices to health care facilities, and 94 percent of the health care organizations surveyed reported a data breach in the past two years. HHS recommends 11 specific steps to secure sensitive information: 1. Configure mobile devices to require passwords, personal ID numbers or passcodes. 2. Install and enable encryption devices. 3. Install and activate remote wiping and/or remote disabling. 4. Avoid file-sharing apps, a way for unauthorized users to gain access. 5. Install and enable a firewall. 6. Install and enable security software. 7. Keep security software up to date. 8. Research and install mobile apps only from known, reputable providers. 9. Keep mobile devices in locked draw- ers when not being carried by the user. 10. Do not send or receive health infor- mation via public Wi-Fi unless it has secure, encrypted connections. 11. Delete all stored health informa- tion before discarding or reusing the mobile device. --- Kathleen Hickey GCN JANUARY 2013 • GCN.COM 3 16 JANUARY 2013