Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
CISA’SPRIVACYFACTS
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
The Cybersecurity Information Sharing Act (C...
1
FACT
When sharing cyber threat information
with the government, CISA would require
public and private entities to remove...
2The government can only use cyber
information for “cybersecurity purposes.”
CISA would not allow the government to
use cy...
3The government is prohibited from
disclosing, retaining, or using information
in ways not authorized by CISA.
FACT
WWW.CY...
4CISA would require law enforcement
officials to have written consent from an
entity sharing cyber threat information
befo...
5The Attorney General will develop and review
privacy and civil liberties guidelines governing
the use of cyber threat inf...
6CISA directs federal entities to regularly
report to Congress to examine the
impact that information sharing has
on priva...
7Under CISA, businesses are NOT REQUIRED
to share information with the government.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @C...
8Only businesses that voluntarily share
electronic threat data with the Department
of Homeland Security, a civilian entity...
9CISA does not offer businesses safeguards
when sharing threat information with the
Department of Defense (including the
N...
JOINTHECOALITION
#VOTECISA
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
Prochain SlideShare
Chargement dans…5
×

CISA's Privacy Facts

8 415 vues

Publié le

The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.

  • I make 1000$/day with this easy trick: https://bit.ly/3h55R2O
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Sex in your area is here: ♥♥♥ https://bit.ly/2ZVgKze ♥♥♥
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Businesses pay you up to $25 per hour to be on Twitter? ◆◆◆ http://t.cn/AieXiXbg
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • I would never forgive myself it i didn't give you one last opportunity to try the incredible Halki Diabetes Remedy for yourself! ♣♣♣ http://t.cn/AiBhrKDq
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Real people just like you are kissing the idea of punching the clock for someone else goodbye, and embracing a new way of living. The internet economy is exploding, and there are literally THOUSANDS of great earnings opportunities available right now, all just one click away. ♣♣♣ http://t.cn/AisJWUCf
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

CISA's Privacy Facts

  1. 1. CISA’SPRIVACYFACTS WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
  2. 2. 1 FACT When sharing cyber threat information with the government, CISA would require public and private entities to remove personally identifiable information. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  3. 3. 2The government can only use cyber information for “cybersecurity purposes.” CISA would not allow the government to use cyber threat information to investigate or prosecute “serious violent felonies.” FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  4. 4. 3The government is prohibited from disclosing, retaining, or using information in ways not authorized by CISA. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  5. 5. 4CISA would require law enforcement officials to have written consent from an entity sharing cyber threat information before investigating a computer crime. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  6. 6. 5The Attorney General will develop and review privacy and civil liberties guidelines governing the use of cyber threat information. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  7. 7. 6CISA directs federal entities to regularly report to Congress to examine the impact that information sharing has on privacy and civil liberties. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  8. 8. 7Under CISA, businesses are NOT REQUIRED to share information with the government. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  9. 9. 8Only businesses that voluntarily share electronic threat data with the Department of Homeland Security, a civilian entity, receive limited liability protections. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  10. 10. 9CISA does not offer businesses safeguards when sharing threat information with the Department of Defense (including the National Security Agency) or the FBI. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  11. 11. JOINTHECOALITION #VOTECISA WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

×