FAQ: What you need to know about CISPA
The House version of the information-sharing bill passed last week
Computerworld - The U.S. House of Representatives last week passed the controversial Cyber Intelligence Sharing and Protection Act despite opposition from privacy advocates, lawmakers and even the White House, which threatened to veto the bill if it lands on the president's desk in its current form.
Here's what you need to know about CISPA.
What is CISPA? CISPA is short for the Cyber Intelligence Sharing and Protection Act (H.R. 3523). U.S Reps. Mike J. Rogers (R-Mich.) and C.A. Dutch Ruppersberger (D-Md.) introduced the bill in the House in November. The bill is designed to bolster cybersecurity by enabling better information sharing between Internet companies and the government. An amended version of the bill passed the House by a 248-168 vote Thursday.
What sort of information sharing? CISPA would allow Internet companies, such as Internet service providers, to monitor their networks and to collect, analyze and share information on any user activities that they believe present a threat to their networks. The law would allow companies to share any information "pertaining to the protection" of their networks with the National Security Agency and other federal agencies. In return, federal agencies would share both classified and unclassified cyberthreat information in their possession to help Internet companies bolster their defenses against cyberthreats.
Who supports CISPA? CISPA has broad support from many technology companies, industry trade groups and lawmakers who say that information sharing is vital to cybersecurity.
Why do privacy advocates and rights groups oppose the bill? Organizations such as the Electronic Frontier Foundation, the American Civil Liberties Union and the Center for Democracy and Technology say the bill is dangerous because it is too vaguely worded. They worry that the bill would allow Internet companies to collect an almost unlimited set of information about Internet users and would allow the companies to share the information with government agencies such as the NSA, without judicial oversight. The law would also allow Internet companies to use a "cybersecurity exception" clause to skirt the privacy protection provided by statutes such as the Federal Wiretap Act and the Electronic Communications Privacy Act.
What do you mean by vaguely worded? Critics claim the bill uses loose language to describe cyberthreats, network security attacks, countermeasures, cybersecurity systems, and other crucial terms. They claim the ambiguity can create big problems. For instance, CISPA offers no clear explanation of what activity defines a cyberthreat, although companies would be allowed to monitor and share information about those activities. The language would also allow companies to collect information on almost all Internet communications, and justify it on cybersecurity grounds. Even innocuous activity such as using a proxy server or an anonymizer could be deemed a suspicious activity under CISPA.
Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Gov't Legislation/Regulation White Papers | Webcasts