Privacy advocates vow to continue CISPA fight
Attention turns to Senate after House passes bill despite threat of Obama veto
Computerworld - The battle over the Cyber Intelligence Sharing and Protection Act (CISPA) is certain to heat up over the next few weeks, as the U.S. Senate begins debate on its versions of the controversial cybersecurity legislation.
The U.S. House Thursday passed its CISPA bill in the face of a White House veto threat.
Privacy advocates and civil rights groups, which bitterly opposed the bill passed by the House, promised today to intensify their protests as the debate moves on to the Senate.
The opponents of the legislation contend that, despite late changes to the bill, it would undermine fundamental privacy protections granted to Internet users under multiple statutes, including the Federal Wiretap Act and the Electronic Communications Privacy.
Meanwhile, the scores of high technology companies and trade associations that support CISPA argue that the measure is a vital part of an effort to improve cybersecurity at a time when U.S. business, government and critical infrastructure networks face unprecedented hacker attacks.
The House version passed yesterday was introduced last November by Reps. Mike J. Rogers (R-Mich.) and Rep. C.A. Dutch Ruppersberger (D-Md.), by a vote of 248 to 168.
The bill aims to make it easier for Internet Service Provides and Internet companies to collect and share cyber threat information gleaned from their networks with federal agencies like the U.S National Security Agency.
Critics charge that the bill remains vaguely worded and would allow government agencies unprecedented access to business and private Internet communications.
The critics say the legislation would give ISPs and other Internet companies too much leeway to collect and share all kinds of user data with the government. And, they add, government agencies could use the data They say it will let federal agencies use the data for national security and other law enforcement purposes as well as to blunt cyber thieves.
The bill's backers did add late amendments to the original bill in an effort to address privacy concerns. For instance, the amendments add restrictions limiting the kind of data that can be collected and shared, and on how that data can be used.
In a statement after yesterday's vote, Rogers said the amended bill provides the federal government with the authority it needs to share cyber threat information with the private sector.
The bill "knocks down barriers to cyber threat information sharing" while ensuring privacy protections for Internet users, Rogers said. "We can't stand by and do nothing as U.S. companies are hemorrhaging from the cyber looting coming from nation states like China and Russia."
Rogers is chairman of the powerful House Intelligence Committee.
But groups such as the Electronic Frontier Foundation (EFF), Center for Democracy and Technology (CDT) and the American Civil Liberties Union said that CISPA remains a dangerous threat to online privacy even with the amendments.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts