It looks like the horrible SOPA bill is back with a new name.
One article on CISPA (excerpts follow)
Another article
One article on CISPA (excerpts follow)
Congress is doing it again: they’re proposing overbroad regulations that could have dire consequences for our Internet ecology. The Cyber Intelligence Sharing and Protection Act of 2011 (H.R. 3523), introduced by Rep. Mike Rogers and Rep. Dutch Ruppersberger, allows companies or the government free rein to bypass existing laws in order to monitor communications, filter content, or potentially even shut down access to online services for “cybersecurity purposes.” Companies are encouraged to share data with the government and with one another, and the government can share data in return. The idea is to facilitate detection of and defense against a serious cyber threat, but the definitions in the bill go well beyond that. The language is so broad it could be used as a blunt instrument to attack websites like The Pirate Bay [oh noes] or WikiLeaks. Join EFF in calling on Congress to stop the Rogers’ cybersecurity bill.
[...]
The language of “theft or misappropriation of private or government information” is equally concerning. Regardless of the intent of this language, the end result is that the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information.
[...]
The language of “theft or misappropriation of private or government information” is equally concerning. Regardless of the intent of this language, the end result is that the government and Internet companies could use this language to block sites like WikiLeaks and NewYorkTimes.com, both of which have published classified information.
Unlike SOPA, however, CISPA operates under the guise of national cybersecurity as opposed to economic concerns, but CISPA’s overly broad language could be used for surveillance or censorship because the bill lacks sufficient restrictions. Supporters of CISPA will be quick to discourage comparisons of CISPA to SOPA considering the former was economic and the later is concerned with security (and considering “SOPA” has pretty much developed into something of a slur). While this is true, both bills would could have similarly devastating effects on the Internet and the people who hang out and do business there.
[...]
The fact that CISPA-related information exchanges are only reviewed for validity after the fact, instead of being carefully considered beforehand, is only part of the problem. CISPA also has very, very broad protections in place for anyone who shares anything relating to cybersecurity. First of all, CISPA sharing supersedes any and every other privacy law, federal and state, meaning anything that might be considered private otherwise is suddenly not when cybersecurity is involved.
Second, anyone who does or doesn’t do stuff with CISPA-shared data is protected from pretty much anything. Basically, anyone acting “in good faith” is exempt from both civil and federal suits regarding any information they’ve shared or regarding any actions they took — or failed to take — based on any cybersecurity information they may have received. So even if someone shares something they shouldn’t have, or over-reaches based on some juicy dish they got, they’re in the clear so long as it’s decided they were acting in good faith.
[...]
The fact that CISPA-related information exchanges are only reviewed for validity after the fact, instead of being carefully considered beforehand, is only part of the problem. CISPA also has very, very broad protections in place for anyone who shares anything relating to cybersecurity. First of all, CISPA sharing supersedes any and every other privacy law, federal and state, meaning anything that might be considered private otherwise is suddenly not when cybersecurity is involved.
Second, anyone who does or doesn’t do stuff with CISPA-shared data is protected from pretty much anything. Basically, anyone acting “in good faith” is exempt from both civil and federal suits regarding any information they’ve shared or regarding any actions they took — or failed to take — based on any cybersecurity information they may have received. So even if someone shares something they shouldn’t have, or over-reaches based on some juicy dish they got, they’re in the clear so long as it’s decided they were acting in good faith.
Comment