Controversial Cybersecurity Bill A Threat To Privacy

Controversial Cybersecurity Bill

As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may be compromised. The DHS has also warned that the proposed legislation might slow down response to cyber attacks, and therefore be counter productive.

Additionally, a number of IT firms and privacy advocates are convinced that the proposed legislation will make it much easier for the National Security Agency (NSA) to acquire corporate and personal information that it not related to cybersecurity.

The new cybersecurity bill aims to create incentives that will encourage companies to share information of cyber threats with the federal government, and has generally been welcomed. But potential threats to privacy and other issues could stall implementation of the legislation until next year, because there simply isn’t enough time to debate issues before the upcoming recess at the end of this week.

Privacy Threats

An active privacy advocate, Senator Al Franken (Democrat) has made public a letter to him from the deputy secretary of the DHS, Alejandro Mayorkas that indicates if the bill is passed in its current form, it could undermine the cybersecurity objectives of the nation as a whole. It would also threaten “important privacy protections and civil liberties.”

Senator Bernie Sanders (Democrat), who is running for president, has proposed an amendment to the Cybersecurity Information Sharing Act (CISA) that will establish a group that will investigate the implications relating to privacy and how data gathered might be used. Essentially he wants transparency for consumers and for Government because of the real threat of modern technology on the privacy of Americans. His argument is that public policy has been outpaced by technology, and already “a huge amount of information” is being collected about individuals from where they go to what they do.

Also an active advocate for the individual right to privacy, Sanders voted against the USA Freedom Act earlier this year, because he said it did not safeguard privacy. Amongst other things, the legislation, enacted in June this year, “reformed” the way federal government conducts electronic surveillance, uses trap and trace devices, gathers information for counter-terrorism, foreign intelligence and criminal purposes, and accesses business records.

Two other senators, Dianne Feinstein (Democrat) and Richard Burr (Republican), have also proposed changes to the bill that will limit what government can do with information shared. For example, they say it should only be used for cybersecurity purposes and not to prosecute criminals, even in the case of “serious violent felonies.”

Calls to Pass the Bill Immediately

This is the third time a cybersecurity bill of this type has been presented to the Senate. To prevent it being stalled a third time, the US Chamber of Commerce – a very influential body – has urged “every member” to pass the Cybersecurity Information Sharing Act of 2015 immediately. When the bill was approved by the Senate’s Intelligence Committee in March this year there was only one vote against it – that of Senator Ron Wyden (Democrat) who continues to push for amendments before it becomes law.

Mitch McConnell, Senate Majority Leader (Republican) has also urged senators to pass the bill immediately.

If the bill is passed this week, it will still need to be “reconciled” with cybersecurity bill passed by the House of Representatives in April. Only then can it sent to President Barack Obama for signing into law.

By Penny Swift

Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...
Rakesh Soni
Multi-tenant clouds are becoming more popular than ever because they're incredibly cost effective and easy to set up. If you're considering switching your business over to a multi-tenant cloud platform, this article is for you ...
Cloud Image Migration
Effective Cloud Migration Monitoring The global pandemic witnessed the digital transformation of businesses in the cloud.  Today, even as the world resumes to normal, the end-to-end innovation in business strategies has kept the momentum going ...
Threat Security
Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.