Blog Posts Tagged with "CISPA"
Under CISPA, Who Can Get Your Data?
March 21, 2013 Added by:Electronic Frontier Foundation
Under CISPA, companies can collect your information in order to "protect the rights and property" of the company, and then share that information with third parties, including the government, so long as it is for "cybersecurity purposes."
Comments (0)
Congress is Hurting the U.S. Regarding Cybersecurity
March 19, 2013 Added by:Joel Harding
If Congress doesn’t wake up and begin asking serious questions around cybersecurity, their inattention is going to cause us great harm in the coming years.
Comments (0)
Industry Experts to Congress: We Can Remove Personally Identifiable Information Before Reporting Cybersecurity Threats
February 20, 2013 Added by:Electronic Frontier Foundation
Companies say redacting personally identifiable information of users is possible, but it wouldn’t be required under CISPA.
Comments (0)
Stop the Next SOPA and CISPA: Register to Vote for Internet Freedom
September 30, 2012 Added by:Electronic Frontier Foundation
Congress needs to know that the Internet is watching and that users won’t sit on the sidelines as technology intended to connect us and bring knowledge to people worldwide is turned against us for the purposes of censorship and surveillance...
Comments (0)
Time for Congress to Pledge to Uphold Internet Freedom
July 03, 2012 Added by:Electronic Frontier Foundation
Congress has attempted to legislate in favor of corporations and law enforcement at the expense of its users’ basic rights. Netizens’ strong desire to keep the Internet open and free has been brushed aside as naïve and inconsequential, in favor of lobbyists and special interest groups. Well, no longer...
Comments (0)
Organization for Computer Professionals Opposes CISPA
June 12, 2012 Added by:Electronic Frontier Foundation
ACM is the world's largest organization for computer professionals. They are joining a diverse group in opposing CISPA, including a wide array of digital civil liberties organizations like EFF, computer scientists like Bruce Schneier and Tim Berners-Lee, and companies like the Mozilla Foundation...
Comments (0)
Cybersecurity Act Threatens Online Rights: a Handout for Your Senator
June 11, 2012 Added by:Electronic Frontier Foundation
The Cybersecurity Act (S. 2105), sponsored by Sen. Lieberman and Sen. Collins, compromises core American civil liberties in the name of thwarting network attacks. While Internet security is of the utmost importance, safeguarding our networks need not come at the expense of our online freedoms...
Comments (0)
Lieberman-Collins Cybersecurity Act Frequently Asked Questions
June 04, 2012 Added by:Electronic Frontier Foundation
Companies already use firewalls to protect their networks. ISPs do filtering as well, for example disallowing end users from hosting certain services, or de-prioritizing certain types of traffic. But this bill makes no effort to restrict the definition of countermeasures to reasonable techniques in use today...
Comments (0)
Join the Fight Against Cyber Spying Proposals in the Senate
May 29, 2012 Added by:Electronic Frontier Foundation
Even when faced with opposition from security experts and the Obama Administration, the House of Representatives managed to ram through CISPA, a bill widely decried as empowering the military to collect the Internet records of Americans’ everyday Internet use. Now the fight is moving to the Senate...
Comments (0)
No National 'Stand Your Cyberground' Law Please
May 14, 2012 Added by:William Mcborrough
We know that some attacks on our privately owned critical infrastructure have been attributed to foreign government networks. Would it be wise to license companies to attack these networks? The last thing we need is an international incident started by some SysAdmin..
Comments (0)
CISPA: The Devil is in the Details
May 07, 2012 Added by:Michelle Valdez
The problem with CISPA involves all the information added under one of the approved amendments. The vagueness about what information can be shared has caused most of the concern – especially that catch all category of “to protect the national security of the United States”...
Comments (2)
When Security and Privacy Wrestle Who is the Winner?
April 30, 2012 Added by:Theresa Payton
You need to make sure your voice is heard. Regardless of whether or not you love the idea or do not like the idea at all, you need to weigh in. It is an important part of the process to make sure we get the best chance and striking a balance between security and privacy...
Comments (1)
Procrastination in Cybersecurity Legislation
April 29, 2012 Added by:Michelle Valdez
Congress is procrastinating with regards to cybersecurity legislation. The debates will continue about regulation and authorities and privacy rights but in the end, we all need to come together and find the best way to share threat data so that we can protect critical networks...
Comments (0)
House Republicans Declare Cyber Security Week
April 23, 2012 Added by:Headlines
"The focus of these bills... address the central issue the federal government and industry have stated must be addressed now: updating existing cybersecurity laws to provide the legal authorities to allow for information-sharing and public-private partnerships..."
Comments (0)
EFF Opposes CISPA at Hackers and Founders Panel
April 23, 2012 Added by:Electronic Frontier Foundation
The fundamental problems with the bill are numerous. The language of the bill is too broad, and it's hard to know what information will actually be shared by private entities as a result of the bill, or what “cybersecurity systems” will do once they are enabled...
Comments (0)
CISPA Legislation FAQs: The Disturbing Dangers
April 18, 2012 Added by:Electronic Frontier Foundation
EFF—along with a host of other civil liberties groups—are protesting the dangerous new cybersecurity bill known as CISPA that will be voted on in the House on April 23. Here is everything you need to know about the bill and why we are protesting...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider