Privacy groups protest CISPA bill
Barely a day after the controversial legislation was reintroduced, opposition to the bill has already started
Computerworld - In what is turning out to be a repeat of last year, privacy rights groups launched an assault against the Cyber Intelligence Sharing and Protection Act (CISPA), barely a day after the controversial legislation was reintroduced in Congress on Wednesday.
The bill, sponsored by U.S. Reps. Mike Rogers, R-Mich., and C.A. Dutch Ruppersberger, D-Md., would bolster cybersecurity by enabling better threat information sharing between the private sector and the government. The law would provide a safe harbor against lawsuits and liability issues for private companies that share intelligence data with each other and with federal agencies, such as the Department of Homeland Security.
Advocacy groups Demand Progress and Fight for the Future claim they have already submitted more than 300,000 signatures from people opposing the bill via email and Twitter. The signatures have been delivered electronically to members of the U.S. House Intelligence Committee and more are being delivered electronically every hour, the two groups claimed in a statement.
According to Tiffany Cheng, a spokeswoman for Fight for the Future, the campaign to oppose CISPA began last Friday when the group first heard of plans to reintroduce CISPA. In total, more than 1 million signatures opposing the measure have been collected by several organizations, including the Electronic Frontier Foundation (EFF) and Free Press, Cheng said. So far, a PDF file containing 300,000 of those signatures has been sent to the House Intelligence Committee, she said.
In separate blog posts, rights advocacy groups the EFF and the Center for Democracy and Technology (CDT) expressed adamant opposition to the legislation and urged others to join the fight.
"In seeking to promote cybersecurity information sharing, CISPA creates a sweeping exception to all privacy laws," CDT president Leslie Harris wrote in CDT's blog. "It dismantles years of hard-fought privacy protections for Americans."
CISPA was first introduced last year and was approved by the House of Representatives despite a hurricane of protests, including one from President Barack Obama, who threatened to veto the bill if it landed on his desk.
The bill's supporters, which include nearly every major industry trade group, insist that the information-sharing provisions contained in CISPA are vital to their ability to fight new cyberthreats.
In testimony before Congress on Thursday, Paul Smocer, president of BITS, the technology policy division of the influential Financial Services Roundtable, called the bill essential to improving cybersecurity.
"Given the interconnected nature of cyberspace, institutions recognize that the strongest preparations and responses to cyberattacks require collaboration beyond their own companies," Smocer said in prepared testimony. "The ability to share information more broadly is critical to our response to future attacks."
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
- Older Mac webcams can spy without activating warning light
- Update: Judge rules NSA spy efforts may be unconstitutional
- Perspective: Privacy concerns could keep Amazon delivery drones grounded
- NSA collects data from millions of cellphones daily
- Perspective: Curbing data use is key to reining in NSA
- Lavabit-DOJ dispute zeroes in on encryption key ownership
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts