Privacy groups protest CISPA bill
Smocer downplayed the privacy concerns that have been raised over the bill and hinted that they stemmed from a lack of understanding of the information that companies are seeking to share with each other and the government.
"The reality is that the data being shared on threats are the technical details of malware, sources of malicious attacks and warnings of potential attacks (i.e., 'ones and zeros')," Smocer said.
"If we were comparing this to the world of physical crime, one could think of it as the sharing of ballistic data or modi operandi -- information that does not relate to an individual, but that is important to understand both the criminal activity and to stop future risk."
A "Civil Liberties Talking Points" memo on the House Intelligence Committee's website also sought to dispel what the committee claimed were myths related to the legislation.
Privacy advocates, civil rights groups and academics, however, see a much darker side to the bill. Many of them contend the legislation creates or at least enables wide-ranging government surveillance of Internet users.
Their main concern is that the bill's language would allow a wide range of information, including personal data, personal communications and social media interactions, to be collected and shared with government agencies such as the DHS and the National Security Agency under the pretext of cybersecurity.
CISPA also overrides existing privacy law and would grant broad immunities against lawsuits and liabilities to participating companies, EFF policy analyst Mark Jaycox wrote in a blog post Wednesday.
Importantly, there are few transparency provisions in the legislation, Jaycox wrote. Information collected by private companies and provided to the government would be exempt from Freedom of Information Act requests, he noted. There is also nothing in the bill that would require companies to inform users if their information is shared with the government, he said.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan, or subscribe to Jaikumar's RSS feed . His e-mail address is email@example.com.
- NSA defends collecting data from U.S. residents not suspected of terrorist activities
- Groups fear bill would allow free flow of data between private sector and NSA
- Google's move into home automation means even less privacy
- Bill to require warrant for email searches gains ground in House
- Coming soon to a fridge near you -- targeted ads
- Snowden leaks prompt tech firms to tout privacy, transparency policies
- License reader lawsuit can be heard, appeals court rules
- Is EU's 'right to be forgotten' really the 'right to edit the truth'?
- Tails 1.0: A bootable Linux distro that protects your privacy
- Privacy jitters derail controversial K-12 big data initiative
Read more about Security in Computerworld's Security Topic Center.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!