Lawmakers to reintroduce controversial info-sharing bill
Privacy advocates say CISPA would allow private companies to share personal information with few restrictions
IDG News Service - Two U.S. lawmakers plan to reintroduce a controversial cybersecurity bill that allows private companies to share customers' personal information related to a wide range of cyberthreats with government agencies.
Representatives Mike Rogers, a Michigan Republican, and C.A. "Dutch" Ruppersberger, a Maryland Democrat, are scheduled to reintroduce the Cyber Intelligence Sharing and Protection Act (CISPA) on Wednesday, they said in a press release. The new version of CISPA will be identical to the one that passed the U.S. House of Representatives despite objections from several privacy groups.
The bill is needed because of a lack of communication about cyberthreats between private U.S. companies and government agencies, the bill's sponsors said.
Privacy advocates, including the American Civil Liberties Union and the Center for Democracy and Technology, opposed the bill during the last session of Congress. The bill would allow private companies to share customer information with the government with few privacy safeguards, the groups have said.
President Barack Obama's administration also opposed the bill. The bill would allow broad sharing of cyberthreat information between private companies and government agencies "without establishing requirements for both industry and the government to minimize and protect personally identifiable information," the White House Office of Management and Budget said last April.
The new version of CISPA will be "the same bill that allows companies to turn over your sensitive internet records directly to the [National Security Agency] and the Department of Defense without requiring them to make even a reasonable effort to protect your privacy," Michelle Richardson, legislative counsel for the ACLU's Washington, D.C., office, wrote in a blog post.
Rogers, chairman of the House Intelligence Committee, and Ruppersberger, the committee's ranking Democrat, defended the bill. It would allow the U.S. government to more easily share classified cyberthreat information with private companies, and it would allow private companies to share anonymous cyberthreat information with each other, they said in the press release.
Several tech vendors and trade groups, including the Information Technology Industry Council and the Software and Information Industry Association, voiced support for CISPA last year.
CISPA includes several protections for privacy and civil liberties, its sponsors said. The bill limits the information sharing to cyberthreat information, it restricts the government's use and retention of the data shared, and it allows people to sue the government for privacy violations, they said.
The bill would also sunset in five years, forcing Congress to decide whether its provisions should be extended, they said.
Cyberattacks are "clearly not a theoretical threat -- the recent spike in advanced cyberattacks against the banks and newspapers makes that crystal clear," Rogers said in a statement.A "American businesses are under siege. We need to provide American companies the information they need to better protect their networks from these dangerous cyber threats."
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts