CISPA sister emerges in the US

Powered by SC Magazine

Draft bill pushed ahead.

A US lawmaker has reportedly drafted legislation akin to the Cyber Intelligence Sharing and Protection Act (CISPA), a contentious bill that failed to gain support from that nation's Senate this year.

The new bill would support information-sharing between the private sector and the government, the central aim of CISPA, which itself provided concerning provisions for legal immunity and failed to make certain that personally identifiable information (PII) would be removed in the threat-sharing process.

The Senate Intelligence Committee Chairwoman Dianne Feinstein has been working on legislation that would serve as the “Senate's counterpart” to CISPA, The Hill reported.

In late April, the Senate decided not to take up CISPA, despite the fact that the US House of Representatives passed the bill earlier that month.

Feinstein told The Hill that a draft bill was prepared and she planned to move forward with the legislation.

SC US reached out to Feinstein's office but did not immediately hear back.

Little else about the bill has been revealed other than it would serve as a complement to CISPA, but the move has privacy advocates expectant of the developing legislation.

Electronic Frontier Foundation policy analyst Mark Jaycox said government guidance, like the cyber security executive order issued in February has proven to support information-sharing about cyber threats between the public and private sector.

Anything reminiscent to CISPA's privacy-impacting provisions, however, could encourage government agencies to tread in dangerous terrain, he said.

“The devil is the details, so we will have to wait to see the language of the bill,” Jaycox said, later adding,  “I would hope that Senator Feinstein realises that any bill that tries to provide legal immunity or information-sharing [of PII] won't pass the Senate."

This article originally appeared at

Copyright © SC Magazine, US edition

CISPA sister emerges in the US
Top Stories
There's no coke and hookers in the cloud
[Blog post] Where did the love go?
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
Five zero-cost ways to improve MySQL performance
How to easily boost MySQL throughput by up to 5x.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats