Privacy groups protest CISPA bill
Smocer downplayed the privacy concerns that have been raised over the bill and hinted that they stemmed from a lack of understanding of the information that companies are seeking to share with each other and the government.
"The reality is that the data being shared on threats are the technical details of malware, sources of malicious attacks and warnings of potential attacks (i.e., 'ones and zeros')," Smocer said.
"If we were comparing this to the world of physical crime, one could think of it as the sharing of ballistic data or modi operandi -- information that does not relate to an individual, but that is important to understand both the criminal activity and to stop future risk."
A "Civil Liberties Talking Points" memo on the House Intelligence Committee's website also sought to dispel what the committee claimed were myths related to the legislation.
Privacy advocates, civil rights groups and academics, however, see a much darker side to the bill. Many of them contend the legislation creates or at least enables wide-ranging government surveillance of Internet users.
Their main concern is that the bill's language would allow a wide range of information, including personal data, personal communications and social media interactions, to be collected and shared with government agencies such as the DHS and the National Security Agency under the pretext of cybersecurity.
CISPA also overrides existing privacy law and would grant broad immunities against lawsuits and liabilities to participating companies, EFF policy analyst Mark Jaycox wrote in a blog post Wednesday.
Importantly, there are few transparency provisions in the legislation, Jaycox wrote. Information collected by private companies and provided to the government would be exempt from Freedom of Information Act requests, he noted. There is also nothing in the bill that would require companies to inform users if their information is shared with the government, he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- Privacy jitters derail controversial K-12 big data initiative
- 3 privacy violations you shouldn't worry about
- U.S. commercial drone industry struggles to take off
- Snowden leaks erode trust in Internet companies, government
- NSA phone metadata collection program renewed for 90 days
- NSA isn't evil, says noted civil libertarian
- Franken presses Ford on location data collection practices
- Justices let stand appeals court decision on border searches of laptops
- California lawmakers move to bar state help to NSA
- Appeals court again nixes Google's bid to overturn Street View case
Read more about Security in Computerworld's Security Topic Center.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Neustar 2014 DDoS Attacks and Impact Report For the third consecutive year, Neustar surveyed hundreds of companies on distributed denial of service (DDoS) attacks. The survey reveals evidence that the...
- Acxiom Case Study This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity...
- Windows® XP Migration: Protect and Secure Critical Data With the end of the Microsoft Windows XP operating system's lifecycle on April 8, 2014, businesses are faced with the decision to migrate...
- Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management This CommVault Business Value and Technology White Paper explains how Simpana IntelliSnap® Recovery Manager can make your application recovery fast and reliable.
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts