CISPA Amendment Proves Everyone's Fears Were Justified While Failing To Assuage Them
(7) PRIVACY-The Federal Government may, in agreement with the need to protect federal systems and information infrastructure threats to cybersecurity and critical mitigate these threats, reasonable efforts to limit the impact on privacy and civil liberties of sharing information on cyber threats with the federal government under this paragraph.
So, uh, the federal government
May
worry about privacy, if they wish, provided that undermine efforts of cybersecurity . It is curious that it had yet to be explained, and certainly does not count as a guarantee. Response to criticism of the authors of the bill has been the same since last year: to deny that this bill has nothing to do with spying on people, and insist that it is fair sharing of technical data threats. This week the member Rogers said categorically that this is not a bill of surveillance. However, in an attempt to appease the opposition, which supported the amendment (PDF embedded below) of this paragraph replace Rep. Hines, who spent the marking phase. Here is the new text:
PRIVACY AND FREEDOM -.
(a) policies and PROCEDURES.-The Director of National Intelligence, in consultation with the Secretary of Homeland Security and the Attorney General, establish and periodically review policies and procedures for the receipt, storage, use and disclosure of non-publicly available information on cyber threats shared with the federal government pursuant to subsection (1). These policies and procedures, consistent with the need to protect systems and networks against cyber threats and mitigate security threats in a timely manner
(i) minimize the impact on privacy and civil liberties;(ii) reasonable to limit the receipt, storage, use and disclosure of information on cyber threats associated with specific individuals who have no need to protect systems and networks against cyber threats and mitigate security threats in a timely manner (iii) contains requirements to protect the information in the cyber threat not available to the public can be used to identify specific individuals access or unauthorized acquisition,
(iv) protect the confidentiality of information on cyber threats associated with some people as much as possible, and (v) not to delay or prevent the flow of information on cyber threats to defend against or mitigate cyber threatFind best price for : --CISPA--
0 comments:
Post a Comment