SlideShare a Scribd company logo
1 of 11
Download to read offline
CISA’SPRIVACYFACTS
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways
that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
1
FACT
When sharing cyber threat information
with the government, CISA would require
public and private entities to remove
personally identifiable information.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
2The government can only use cyber
information for “cybersecurity purposes.”
CISA would not allow the government to
use cyber threat information to investigate
or prosecute “serious violent felonies.”
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
3The government is prohibited from
disclosing, retaining, or using information
in ways not authorized by CISA.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
4CISA would require law enforcement
officials to have written consent from an
entity sharing cyber threat information
before investigating a computer crime.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
5The Attorney General will develop and review
privacy and civil liberties guidelines governing
the use of cyber threat information.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
6CISA directs federal entities to regularly
report to Congress to examine the
impact that information sharing has
on privacy and civil liberties.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
7Under CISA, businesses are NOT REQUIRED
to share information with the government.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
8Only businesses that voluntarily share
electronic threat data with the Department
of Homeland Security, a civilian entity,
receive limited liability protections.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
9CISA does not offer businesses safeguards
when sharing threat information with the
Department of Defense (including the
National Security Agency) or the FBI.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
JOINTHECOALITION
#VOTECISA
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

More Related Content

What's hot

Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
Kevin Murphy
 
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
Taiye Lambo
 

What's hot (20)

Ccpa compliance services in usa
Ccpa compliance services in usaCcpa compliance services in usa
Ccpa compliance services in usa
 
The Rise of California Cybercrime
The Rise of California Cybercrime The Rise of California Cybercrime
The Rise of California Cybercrime
 
Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015Cyber Crime Seminar Jan 2015
Cyber Crime Seminar Jan 2015
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
Cyber security (2) (2)
Cyber security (2) (2)Cyber security (2) (2)
Cyber security (2) (2)
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?
 
Cyber security awareness & training 2.1
Cyber security awareness & training 2.1Cyber security awareness & training 2.1
Cyber security awareness & training 2.1
 
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
Coordinated cyber attacks known as op qatar terrorizes qatar once again
Coordinated cyber attacks known as op qatar terrorizes qatar once againCoordinated cyber attacks known as op qatar terrorizes qatar once again
Coordinated cyber attacks known as op qatar terrorizes qatar once again
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Cyber law
Cyber lawCyber law
Cyber law
 
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo localCómo usar la tecnología para generar más Seguridad y desarrollo local
Cómo usar la tecnología para generar más Seguridad y desarrollo local
 
Top 5 it security threats for 2015
Top 5 it security threats for 2015Top 5 it security threats for 2015
Top 5 it security threats for 2015
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
 
Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)Opening Keynote (Identity Live Berlin 2018)
Opening Keynote (Identity Live Berlin 2018)
 
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume BourcyTeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
 
Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?Cryptocurrency Scams | How Do You Protect Yourself?
Cryptocurrency Scams | How Do You Protect Yourself?
 
Matthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its ImpactsMatthew Hough Clewes | Cyber Crime and its Impacts
Matthew Hough Clewes | Cyber Crime and its Impacts
 

Similar to CISA's Privacy Facts

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
gertrudebellgrove
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 

Similar to CISA's Privacy Facts (20)

Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA Open Letter From EFF Opposing CISPA
Open Letter From EFF Opposing CISPA
 
New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
Naavi theory regulated_anonymity
Naavi theory regulated_anonymityNaavi theory regulated_anonymity
Naavi theory regulated_anonymity
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Legal and regulatory environment e commerce
Legal and regulatory environment e commerceLegal and regulatory environment e commerce
Legal and regulatory environment e commerce
 
Digital security law security of individual or government
Digital security law security of individual or governmentDigital security law security of individual or government
Digital security law security of individual or government
 
State of Encryption in Kenya
State of Encryption in KenyaState of Encryption in Kenya
State of Encryption in Kenya
 
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUNDCYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
 
#DCI11 Access to Information
#DCI11 Access to Information#DCI11 Access to Information
#DCI11 Access to Information
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Onlinecrime and New Cyber Laws in Pakistan
Onlinecrime  and New Cyber Laws in PakistanOnlinecrime  and New Cyber Laws in Pakistan
Onlinecrime and New Cyber Laws in Pakistan
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of PrivacyHCMUT IMP Computer Science 20 - E-Government from the view of Privacy
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Cybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection GuideCybersecurity Whistleblower Protection Guide
Cybersecurity Whistleblower Protection Guide
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Iot privacy vs convenience
Iot privacy vs  convenienceIot privacy vs  convenience
Iot privacy vs convenience
 

More from U.S. Chamber of Commerce

More from U.S. Chamber of Commerce (20)

Brexit Webinar Series 5
Brexit Webinar Series 5 Brexit Webinar Series 5
Brexit Webinar Series 5
 
Brexit Webinar Series 4
Brexit Webinar Series 4Brexit Webinar Series 4
Brexit Webinar Series 4
 
Brexit Webinar Series 3
Brexit Webinar Series 3Brexit Webinar Series 3
Brexit Webinar Series 3
 
Brexit Webinar Series 2
Brexit Webinar Series 2Brexit Webinar Series 2
Brexit Webinar Series 2
 
Brexit Webinar Series 1
Brexit Webinar Series 1Brexit Webinar Series 1
Brexit Webinar Series 1
 
Tell Congress: Ditch WOTUS
Tell Congress: Ditch WOTUSTell Congress: Ditch WOTUS
Tell Congress: Ditch WOTUS
 
ASEAN Business Outlook Survey 2016
ASEAN Business Outlook Survey 2016ASEAN Business Outlook Survey 2016
ASEAN Business Outlook Survey 2016
 
Elementary and Secondary Education Act
Elementary and Secondary Education ActElementary and Secondary Education Act
Elementary and Secondary Education Act
 
The threat to small business retirement savings
The threat to small business retirement savingsThe threat to small business retirement savings
The threat to small business retirement savings
 
Let's Rebuild America
Let's Rebuild AmericaLet's Rebuild America
Let's Rebuild America
 
Key vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion AuthorityKey vote alert! - Trade Promotion Authority
Key vote alert! - Trade Promotion Authority
 
What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?What Can You Do to Prevent Childhood Obesity?
What Can You Do to Prevent Childhood Obesity?
 
Innovation that Matters
Innovation that MattersInnovation that Matters
Innovation that Matters
 
Where's the accountability?
Where's the accountability?Where's the accountability?
Where's the accountability?
 
Youth Employment
Youth EmploymentYouth Employment
Youth Employment
 
A Brief History of Keystone XL
A Brief History of Keystone XLA Brief History of Keystone XL
A Brief History of Keystone XL
 
Behind the Red Tape
Behind the Red TapeBehind the Red Tape
Behind the Red Tape
 
5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right5 Steps to Get Our Rules Right
5 Steps to Get Our Rules Right
 
East Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs WashingtonEast Meets West: Massachusetts vs Washington
East Meets West: Massachusetts vs Washington
 
America's Offshore Resources
America's Offshore ResourcesAmerica's Offshore Resources
America's Offshore Resources
 

Recently uploaded

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

CISA's Privacy Facts

  • 1. CISA’SPRIVACYFACTS WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
  • 2. 1 FACT When sharing cyber threat information with the government, CISA would require public and private entities to remove personally identifiable information. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 3. 2The government can only use cyber information for “cybersecurity purposes.” CISA would not allow the government to use cyber threat information to investigate or prosecute “serious violent felonies.” FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 4. 3The government is prohibited from disclosing, retaining, or using information in ways not authorized by CISA. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 5. 4CISA would require law enforcement officials to have written consent from an entity sharing cyber threat information before investigating a computer crime. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 6. 5The Attorney General will develop and review privacy and civil liberties guidelines governing the use of cyber threat information. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 7. 6CISA directs federal entities to regularly report to Congress to examine the impact that information sharing has on privacy and civil liberties. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 8. 7Under CISA, businesses are NOT REQUIRED to share information with the government. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 9. 8Only businesses that voluntarily share electronic threat data with the Department of Homeland Security, a civilian entity, receive limited liability protections. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 10. 9CISA does not offer businesses safeguards when sharing threat information with the Department of Defense (including the National Security Agency) or the FBI. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA