Privacy groups protest CISPA bill
Barely a day after the controversial legislation was reintroduced, opposition to the bill has already started
Computerworld - In what is turning out to be a repeat of last year, privacy rights groups launched an assault against the Cyber Intelligence Sharing and Protection Act (CISPA), barely a day after the controversial legislation was reintroduced in Congress on Wednesday.
The bill, sponsored by U.S. Reps. Mike Rogers, R-Mich., and C.A. Dutch Ruppersberger, D-Md., would bolster cybersecurity by enabling better threat information sharing between the private sector and the government. The law would provide a safe harbor against lawsuits and liability issues for private companies that share intelligence data with each other and with federal agencies, such as the Department of Homeland Security.
Advocacy groups Demand Progress and Fight for the Future claim they have already submitted more than 300,000 signatures from people opposing the bill via email and Twitter. The signatures have been delivered electronically to members of the U.S. House Intelligence Committee and more are being delivered electronically every hour, the two groups claimed in a statement.
According to Tiffany Cheng, a spokeswoman for Fight for the Future, the campaign to oppose CISPA began last Friday when the group first heard of plans to reintroduce CISPA. In total, more than 1 million signatures opposing the measure have been collected by several organizations, including the Electronic Frontier Foundation (EFF) and Free Press, Cheng said. So far, a PDF file containing 300,000 of those signatures has been sent to the House Intelligence Committee, she said.
In separate blog posts, rights advocacy groups the EFF and the Center for Democracy and Technology (CDT) expressed adamant opposition to the legislation and urged others to join the fight.
"In seeking to promote cybersecurity information sharing, CISPA creates a sweeping exception to all privacy laws," CDT president Leslie Harris wrote in CDT's blog. "It dismantles years of hard-fought privacy protections for Americans."
CISPA was first introduced last year and was approved by the House of Representatives despite a hurricane of protests, including one from President Barack Obama, who threatened to veto the bill if it landed on his desk.
The bill's supporters, which include nearly every major industry trade group, insist that the information-sharing provisions contained in CISPA are vital to their ability to fight new cyberthreats.
In testimony before Congress on Thursday, Paul Smocer, president of BITS, the technology policy division of the influential Financial Services Roundtable, called the bill essential to improving cybersecurity.
"Given the interconnected nature of cyberspace, institutions recognize that the strongest preparations and responses to cyberattacks require collaboration beyond their own companies," Smocer said in prepared testimony. "The ability to share information more broadly is critical to our response to future attacks."
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts