Cyber Security Legislation

Every year a host of cybersecurity bills are introduced in Congress. In 2014, the Cyber Intelligence Sharing and Protection Act (CISPA) was introduced in the US House, and the Cybersecurity Information Sharing Act (CISA) was introduced in the Senate. Both bills are privacy invasive bills that grant companies broad legal immunity to share more information with the government and private companies. Click here to read our FAQ on CISPA 2.0.

These bills often purport to allow companies and the federal government to “share” threat information for a “cybersecurity” purpose—to protect and defend against attacks against computer systems and networks. But the bills are written broadly enough to permit your communications service providers to identify, obtain, and share your emails and text messages with the government. While business leaders have conceded that they do not need to share personally identifying information to combat computer threats, the bill provides an exception to existing law designed to protect your personal information.

The newly granted powers are intended to thwart computer security threats against a company's rights and property. But the definitions are broad and vague. The terms allow purposes such as guarding against “improper” information modification and ensuring “timely” access to information, functions that are not necessarily tied to attacks.

Once handed over, the government is able to use this information for investigating crimes that are unrelated to the underlying security threat.

The bills' vague definitions like "cybersecurity threat" and "cybersecurity system" also raise the frightening possibility of a company using aggressive countermeasures. In CISPA, if a company wants to combat a threat, it is empowered to use “cybersecurity systems” to identify and obtain “cyber threat information.” But CISPA does not define exactly how far a company can go, leaving it open to the possibility of abuse.

Companies would also be immune from both civil and criminal liability for any action, including but not limited to violating a user’s privacy, as long as the company used the powers granted by CISPA in "good faith." The immunity even extends to "decisions made based on" any information “directly pertaining” to a security threat. The consequences of such a clause are far-reaching.

Stay in Touch

NSA Spying

EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

Follow EFF

"Shadow Regulation" deals aren't the way to address online problems. Our new infographic outlines a better approach. https://www.eff.org/deeplinks...

Sep 30 @ 2:50pm

Queens, NY! EFF will be at World Maker Faire at the NY Hall of Science this weekend. Come explore and say hi! #WMF16 http://makerfaire.com/new-york/

Sep 30 @ 1:26pm

What do you call it when companies make back-room deals to control Internet content? We call it Shadow Regulation. https://www.eff.org/deeplinks...

Sep 29 @ 3:14pm
JavaScript license information