Privacy advocates vow to continue CISPA fight
The EFF condemned Thursday's vote in the House and vowed to continue its fight against in the Senate.
"Hundreds of thousands of Internet users spoke out against this bill, and their numbers will only grow as we move this debate to the Senate," said Lee Tien, EFF's senior staff attorney, in a statement. Tien added that EFF will continue opposing the bill in an effort to ensure that "Congress does not sacrifice those rights in a rush to pass vaguely-worded cybersecurity bills."
The CDT, meanwhile, is "extremely disappointed" by CISPA's passage in the House, said Mark Stanley, the public policy organization's new media manager. "We think it is a seriously flawed piece of legislation and we think the process by which it was passed is flawed," he said.
The CDTs biggest concern is that the legislation would allow private companies to share Internet communications data with the NSA without judicial oversight. The fact the data can be used for a broad range of national security purposes is disconcerting Stanley added.
Following the House vote, the focus of backers and opponents quickly shifted to two cybersecurity bills being considered by the Senate.
The Cybersecurity Act of 2012, is sponsored by Sen. Joseph Lieberman (I-CT), and the Secure IT act is sponsored by Sen. John McCain (R-AZ).
Both bills have problems said Jerry Brito, director of the Technology Policy Program at the Mercatus Center at George Mason University.
The McCain bill is closer to CISPA in language and intent than Lieberman's, which would put the United States Department of Homeland Security in charge of overseeing cybersecurity.
Like CISPA, the Secure IT act would allow private companies to collect and share a broad range of Internet user information with the NSA and several federal agencies, under the premise of cybersecurity, Brito said.
Rather than tweaking existing statutes to make information sharing easier, Secure IT, like CISPA, proposes fundamentally new rules. "It takes a scythe rather than a scalpel to privacy laws," Brito said.
Lieberman's proposal would put the United States Department of Homeland Security in charge of regulating critical infrastructure protections, he said. "I've not seen the case yet where the government needs to come in and tell private network operators how to secure their networks," Brito said.
Of the two bills, Lieberman's proposal looks the one more likely to be debated in the Senate, Brito predicted.
If and when a Senate passes a bill, it will then need to be reconciled with the House version before it lands on the President's desk. The White House on Wednesday threatened to veto the CISPA legislation in the form passed by the House.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
Read more about Security in Computerworld's Security Topic Center.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts