Sharon Bradford Franklin
A carefully crafted information-sharing program that includes robust privacy safeguards could be an effective approach to cybersecurity, CISPA lacks such protections for individual rights.
CISPA would appropriately authorize the federal government to share cyberthreat intelligence with the private sector, to enable private companies to protect their networks from such threats. However, CISPA would also authorize the private sector to share customers' personal information and the contents of private communications with the federal government, without incorporating necessary safeguards:
CISPA's definition of the information private companies may share with the federal government is overly broad, and fails to include any requirement that unrelated personally identifiable information be stripped from the data to be shared.
CISPA lacks any meaningful limitations on the ways in which the federal government may use personal information and the content of private communications that it receives from private companies. The use of such information should be limited to cybersecurity purposes, or to sharing with law enforcement when there is probable cause of a non-cybercrime. Under CISPA, by contrast, once an individual's information is in the government's hands, it can be used for just about any purpose.
CISPA should explicitly require that companies may only share information with civilian agencies. The NSA and the
Although we appreciate the Intelligence Committee's efforts to improve the bill and willingness to engage in a dialogue with privacy advocates, the changes in its most current draft do not come close to addressing the civil liberties threats posed by the bill, and some of the proposals would actually make CISPA worse. Therefore,
- Taking a Break from Emails Decreases Stress
- New Facebook Effort Targets Educating School Counselors
- Verizon's High-Speed Internet Collusion
- RapidShare: Megaupload File-Sharing Pirates Are Unwelcome
- Twitter Cuts Two Ways
- China's Cyber 'Predators' Must Be Stopped
- CISPA Lacks Protections for Individual Rights
- CISPA Not the Right Way to Achieve Cybersecurity
- CISPA Effectively Addresses Threat of Cybercrime
- Dawn of the Phablet
- Price-Fixing Suit Could be a Spot on Apple
- Avoiding Fragmented Infrastructure in the Data Center
- Internet Service Providers Close to Implementing System to Punish Piracy
- Inside the Silicon Valley Gender Gap
- Why the FCC Fined Google Just 68 Seconds in Profits
- Is There an Internet Off Switch?
- Power of the iMob
- Widespread Android Virus Could Hide in Popular App Updates
- Under the Hood: A Look Inside the Ultrabook
- That's Entertainment: 3D Leaps From Theater to Home
- Are You a Tech Geek?
- Is Your Office Preparing For an iPad Insurgency?
- How to Find Happiness on Social Networks
- The Pirate Bay to Fly 'Server Drones' to Avoid Law Enforcement
- DevOps: Indispensable Approach or Costly Distraction?
- New Programming Languages to Watch
- How to Conquer Tech Buyer's Remorse
- Trade in Your Old Gadgets for Cash or Credit
- Why the New iPad Features Don't Really Matter
- Chinese Computer Games
- Why Do We Need Intelligent Desktop Virtualization?
- Lawsuit Says Facebook Tracks Users After Logging Out
- Facebook and Twitter Cause Insider Trading Headaches for the SEC
- Avoid Social Media MBAs, Some Students Say
- 5 iPhone Apps I Cannot Live Without
- The New Mobile Landscape
- Is Free Public Wi-Fi Safe?
- Keep Your Data Safe When Telecommuting
- Security Issues for Multicore Processors
- How to Reduce Smartphone Security Risks
- Are You Too Snarky Online?
- Who's Gawking at Your Photos?
- Is Social Media a Waste of Time?
- 5 New Ways to Feed Your Online Addiction
- Investors Increasingly Tap Social Media for Stock Tips
- McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
- A Game Plan for Protecting Stored Data
- Think Big When It Comes to Data Breaches
- Information Security MBA's Teach Business Side of Cybersecurity
- Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
- FBI Wants to Monitor Social Media for 'Emerging Threats'
- Youth on the Web: Reason? Who Needs a Reason
- Google Unveils 'Find My Face' Recognition Tool
- Why Investors Should Keep Their Eyes on the Cloud
- 10 Ways to Stay Safe While Shopping Online
- Take Advantage of Free Shipping Deals This Holiday Season
- Online Shopping Deals Hurt State Budgets
- Tips for Shopping With Your Smartphone
- Seven Rules of Successful Bloggers
- Twitter Redesigns Site, Aims for Simplicity
- 3 Ways to Use Foursquare to Connect With Your College
- United States Reacts to Indian Government's Efforts to Censure Online Content
- Will Apple Be the Same Without Steve Jobs?
- Steve Jobs: 6 Secrets of Success
- Open Clouds
- The Cloud: A Security Solution for Small Business
- 4 Twitter Tips for Business Success
- Twitter: How to Tweet to Get Results
- 3 Sneaky New Online Scams to Avoid
(c) 2012 U.S. News & World Report