Kendall Burman
There is a need for cybersecurity legislation, but CISPA -- an overly broad bill that lacks restrictions on government abuse -- is not the right way to achieve it.
CISPA allows companies to voluntarily share information pertaining to suspected attacks on their networks with other companies and the government. Operators of networks have said they need clearer legal authority to share this information. However, there are three major problems with how CISPA would allow Internet users' information to be shared and used.
1. CISPA has an almost unlimited definition of what user information can be shared with the government. This definition should be narrowed to apply only to actual cyberattacks or threats.
2. CISPA would allow companies to share Internet users' information directly with the
3. CISPA would allow information shared with the government to be used for purposes unrelated to cybersecurity, including law enforcement purposes -- this has the potential to turn cybersecurity into a new surveillance program.
On top of this, CISPA supersedes all other privacy laws. If privacy protections for Internet users aren't built into the bill, they simply don't exist.
Legislation that secures networks can be achieved without posing these threats -- an important first step is to narrow the language.
The authors of CISPA have made some positive changes recently. Unfortunately, none of the changes gets to the heart of the privacy concerns that Internet users and advocacy groups have expressed.
- Taking a Break from Emails Decreases Stress
- New Facebook Effort Targets Educating School Counselors
- Verizon's High-Speed Internet Collusion
- RapidShare: Megaupload File-Sharing Pirates Are Unwelcome
- Twitter Cuts Two Ways
- China's Cyber 'Predators' Must Be Stopped
- CISPA Lacks Protections for Individual Rights
- CISPA Not the Right Way to Achieve Cybersecurity
- CISPA Effectively Addresses Threat of Cybercrime
- Dawn of the Phablet
- Price-Fixing Suit Could be a Spot on Apple
- Avoiding Fragmented Infrastructure in the Data Center
- Internet Service Providers Close to Implementing System to Punish Piracy
- Inside the Silicon Valley Gender Gap
- Why the FCC Fined Google Just 68 Seconds in Profits
- Is There an Internet Off Switch?
- Power of the iMob
- Widespread Android Virus Could Hide in Popular App Updates
- Under the Hood: A Look Inside the Ultrabook
- That's Entertainment: 3D Leaps From Theater to Home
- Are You a Tech Geek?
- Is Your Office Preparing For an iPad Insurgency?
- How to Find Happiness on Social Networks
- The Pirate Bay to Fly 'Server Drones' to Avoid Law Enforcement
- DevOps: Indispensable Approach or Costly Distraction?
- New Programming Languages to Watch
- How to Conquer Tech Buyer's Remorse
- Trade in Your Old Gadgets for Cash or Credit
- Why the New iPad Features Don't Really Matter
- Chinese Computer Games
- Why Do We Need Intelligent Desktop Virtualization?
- Lawsuit Says Facebook Tracks Users After Logging Out
- Facebook and Twitter Cause Insider Trading Headaches for the SEC
- Avoid Social Media MBAs, Some Students Say
- 5 iPhone Apps I Cannot Live Without
- The New Mobile Landscape
- Is Free Public Wi-Fi Safe?
- Keep Your Data Safe When Telecommuting
- Security Issues for Multicore Processors
- How to Reduce Smartphone Security Risks
- Are You Too Snarky Online?
- Who's Gawking at Your Photos?
- Is Social Media a Waste of Time?
- 5 New Ways to Feed Your Online Addiction
- Investors Increasingly Tap Social Media for Stock Tips
- McAfee's Edward Metcalf Shares Hybrid Rootkit-thwarting Strategy
- A Game Plan for Protecting Stored Data
- Think Big When It Comes to Data Breaches
- Information Security MBA's Teach Business Side of Cybersecurity
- Apple Predicts 'Death of the Big Backpack' with New iPad Textbooks
- FBI Wants to Monitor Social Media for 'Emerging Threats'
- Youth on the Web: Reason? Who Needs a Reason
- Google Unveils 'Find My Face' Recognition Tool
- Why Investors Should Keep Their Eyes on the Cloud
- 10 Ways to Stay Safe While Shopping Online
- Take Advantage of Free Shipping Deals This Holiday Season
- Online Shopping Deals Hurt State Budgets
- Tips for Shopping With Your Smartphone
- Seven Rules of Successful Bloggers
- Twitter Redesigns Site, Aims for Simplicity
- 3 Ways to Use Foursquare to Connect With Your College
- United States Reacts to Indian Government's Efforts to Censure Online Content
- Will Apple Be the Same Without Steve Jobs?
- Steve Jobs: 6 Secrets of Success
- Open Clouds
- The Cloud: A Security Solution for Small Business
- 4 Twitter Tips for Business Success
- Twitter: How to Tweet to Get Results
- 3 Sneaky New Online Scams to Avoid
(c) 2012 U.S. News & World Report