{"id":5887,"date":"2012-05-09T09:10:08","date_gmt":"2012-05-09T14:10:08","guid":{"rendered":"http:\/\/blogs.lib.luc.edu\/locl\/?p=5887"},"modified":"2026-01-12T15:37:17","modified_gmt":"2026-01-12T21:37:17","slug":"net-issues-cyber-intelligence-sharing-and-protection-act","status":"publish","type":"post","link":"https:\/\/libblogs.luc.edu\/noteworthy\/2012\/05\/09\/net-issues-cyber-intelligence-sharing-and-protection-act\/","title":{"rendered":"Net Issues: Cyber Intelligence Sharing and Protection Act"},"content":{"rendered":"<p>The goal behind Cyber Intelligence Sharing and Protection Act (CISPA) is \u201cTo provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes\u201d\u00a0\u00a0 <a href=\"http:\/\/thomas.loc.gov\/cgi-bin\/query\/D?c112:2:.\/temp\/%7Ec112DsF7ci::\">Bill Number H.R.3523<\/a>.\u00a0 The bill itself is currently worded in such a way that it is starting to cause alarm similar to what was seen with the SOPA and PIPA legislations.<em>\u00a0 <\/em><del><a href=\"https:\/\/www.cdt.org\/cispa-resource-page\">The Center for Democracy and Technology<\/a><\/del> (CDT) lists <a href=\"https:\/\/www.cdt.org\/files\/pdfs\/Critical%20Problems%20with%20CISPA.pdf\">the following large issues<\/a> with this bill:<\/p>\n<ul>\n<li>CISPA has a very broad, almost unlimited definition of the information that can be shared with government agencies and it supersedes all other privacy laws.<\/li>\n<li>CISPA is likely to lead to expansion of the government\u2019s role in the monitoring of private communications.<\/li>\n<li>CISPA is likely to shift control of government cybersecurity efforts from civilian agencies to the military.<\/li>\n<li>Once the information is shared with the government, it wouldn\u2019t have to be used for cybersecurity, but could instead be used for other purposes.<\/li>\n<\/ul>\n<p>The <a href=\"http:\/\/intelligence.house.gov\/cyber-bill-key-points\">U.S. House of Representatives<\/a> has released its own key points concerning the bill:<\/p>\n<ul>\n<li><strong>Helps private sector job creators defend themselves from attacks<\/strong> from countries like China by allowing the government to provide the intelligence information needed to protect their networks and their customers\u2019 privacy;<\/li>\n<li><strong>Keeps the federal government\u2019s hands off the Internet<\/strong><strong>,<\/strong> and does not allow the government to stop access to particular websites, or to censor or require private companies to remove content;<\/li>\n<li><strong>Protects Americans\u2019 privacy<\/strong> by prohibiting Washington from forcing private companies to hand over information while encouraging companies to \u201canonymize\u201d information voluntarily shared with others;<\/li>\n<li><strong>Does not impose new federal regulations or mandates<\/strong><strong>,<\/strong> and does not require additional spending or bureaucracy; keeps Washington out of the business of monitoring or guarding private networks; and<\/li>\n<li><strong>Was written in the open in a bipartisan way<\/strong> with input from private-sector companies, trade groups, privacy and civil liberties advocates, and the Executive Branch \u2013 and concerns will continue to be addressed.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>For more information on both sides of the issue, check out the following resources:<\/p>\n<p><a href=\"https:\/\/www.cdt.org\/cispa-resource-page\">CDT\u2019s Resource page<\/a><\/p>\n<p><a href=\"http:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/z?d112:HR03523:@@@L&amp;summ2=m&amp;\">Library of Congress\u2019 THOMAS: Bill summary and status<\/a><\/p>\n<p><a href=\"http:\/\/intelligence.house.gov\/bill\/cyber-intelligence-sharing-and-protection-act-2011\">U.S. House of Representatives CISPA page<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The goal behind Cyber Intelligence Sharing and Protection Act (CISPA) is \u201cTo provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes\u201d\u00a0\u00a0 Bill Number H.R.3523.\u00a0 The bill itself is currently worded in such a way that it is starting to cause [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":5896,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_s2mail":""},"categories":[1],"tags":[5014,5015],"_links":{"self":[{"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/posts\/5887"}],"collection":[{"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/comments?post=5887"}],"version-history":[{"count":6,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/posts\/5887\/revisions"}],"predecessor-version":[{"id":12422,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/posts\/5887\/revisions\/12422"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/media\/5896"}],"wp:attachment":[{"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/media?parent=5887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/categories?post=5887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/libblogs.luc.edu\/noteworthy\/wp-json\/wp\/v2\/tags?post=5887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}