The Guardian’s computer editor, Jack Schofield, has formulated three “laws of computing” over the years.
I’ve found these useful to keep in mind, both in my own personal use of computers and in advising on IT contracts, so here is a quick post bringing all three together in one short list:
- Schofield’s First Law: never put data into a program unless you can see exactly how to get it out.
- Schofield’s Second Law: data doesn’t really exist unless you have at least two copies of it.
- Schofield’s Third Law: the easier it is for you to access your data, the easier it is for someone else to access your data.
Of those, I’d say the first is the most useful in a commercial IT context. (This post was prompted by reviewing a contract in which our ability to do this isn’t as set out as clearly as I’d like, though I’m sure it’s not going to be a problem in practice.)
In my personal IT use, it’s the second law that is the one I always keep in mind – and that I try to find a gentle way of pointing out to people when they are mourning the loss of family photographs in a hard drive crash or laptop theft. Dropbox is your friend, people!
The third law is both vaguer and probably of wider application – particularly after the Year of Snowden has highlighted how porous supposedly “secure” IT systems can be.