<span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px;background-color:rgb(255,255,255)">CISPA backers reintroduce bill; privacy advocates quick to reiterate criticism</span><div><br>

</div><div><span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px"><a href="http://www.fiercegovernmentit.com/story/cispa-backers-reintroduce-bill-privacy-advocates-quick-reiterate-criticism/2013-02-14#ixzz2LGuwIvbU" style="text-decoration:initial;color:rgb(0,51,153)">http://www.fiercegovernmentit.com/story/cispa-backers-reintroduce-bill-privacy-advocates-quick-reiterate-criticism/2013-02-14#ixzz2LGuwIvbU</a> </span><div>

<span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px"><br></span></div><div><span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:14px;line-height:18px;background-color:rgb(255,255,255)">February 14, 2013 | By </span><a href="http://www.fiercegovernmentit.com/author/dperera" title="View author profile." rel="author" style="text-decoration:initial;color:rgb(0,0,153);font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:14px;line-height:18px;background-color:rgb(255,255,255)">David Perera</a></div>

<div><br></div><div><p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">Backers of a controversial cybersecurity bill <a href="http://www.fiercegovernmentit.com/story/house-approves-cispa/2012-04-30" style="text-decoration:initial;color:rgb(0,0,153)">approved</a> by the House in April 2012 reintroduced it again Feb. 13 for consideration by the new Congress.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">The Cyber Intelligence Sharing and Protection Act (<a href="http://hdl.loc.gov/loc.uscongress/legislation.113hr624" style="text-decoration:initial;color:rgb(0,0,153)">H.R. 624</a>) would create a mechanism for the private sector to share with the federal government cyber threat information--the Homeland Security Department, or another federal agency. Critics such as the Center for Democracy and Technology say the bill language creates an avenue for information on American Internet users to go to the intelligence community, a criticism CDT President Leslie Harris <a href="https://www.cdt.org/pr_statement/cybersecurity-legislation-still-fundamentally-flawed-cdt-opposes-cispa" style="text-decoration:initial;color:rgb(0,0,153)">reiterated</a> soon after the bill's reintroduction.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">Privacy groups have also said the bill would allow federal agencies to repurpose the information they do receive through the information sharing program, something that goes against privacy principles requiring data to be used only for the purpose for which it was collected.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">The reintroduced bill, like the version that passed the House, says the government could use the information for cybersecurity itself, as well as the investigation and prosecution of cybersecurity crimes; protection of individuals from the danger of death or physical injury; protection of minors from physical or psychological harm; and protection of the national security of the United States.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">Critics have particularly noted the crime and national security provisions, stating that they could lead to overly broad uses of the data.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">Bill co-sponsors Reps. Mike Rogers (R-Mich.) and Dutch Ruppersberger (D-Md.), chairman and ranking member, respectively, of the House Intelligence Committee, have said much of the criticism is unwarranted.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">The bill's language prevents an Internet service provider from sharing information about its individual customers, a committee "myth v. fact" <a href="http://intelligence.house.gov/sites/intelligence.house.gov/files/documents/cispamythvactFeb122013v2.pdf" style="text-decoration:initial;color:rgb(0,0,153)">document</a> (.pdf) says.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">Worries that the federal government would be able to read private emails without a warrant ignores "the highly rapid and automated nature of cyber threat information sharing," the document also says.</p>

<p style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px">For more:<br>- <a href="http://hdl.loc.gov/loc.uscongress/legislation.113hr624" style="text-decoration:initial;color:rgb(0,0,153)">go to</a> the THOMAS page for H.R. 624<br>

- <a href="http://intelligence.house.gov/hr-624-press-materials" style="text-decoration:initial;color:rgb(0,0,153)">go to</a> a House Intelligence Committee webpage with press materials on the bill</p><span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px"><br>

</span><span style="font-family:Arial,Helvetica,FreeSans,sans-serif;font-size:13px;line-height:19px"><br></span>-- <br>Diego R. Canabarro<div><font face="arial, helvetica, sans-serif"><span style="vertical-align:top;text-align:left"><a href="http://lattes.cnpq.br/4980585945314597" target="_blank">http://lattes.cnpq.br/4980585945314597</a></span> </font><br>

<br>--<br>diego.canabarro [at] <a href="http://ufrgs.br" target="_blank">ufrgs.br</a></div><div>diego [at] <a href="http://pubpol.umass.edu" target="_blank">pubpol.umass.edu</a><br>MSN: diegocanabarro [at] <a href="http://gmail.com" target="_blank">gmail.com</a><br>

Skype: diegocanabarro<br>Cell # +55-51-9244-3425 (Brasil) / +1-413-362-0133 (USA)<br>--<br></div>
</div></div>