Verified Document

Security Related Federal Legislation Essay

One of the most important security-related pieces of legislation recently passed in Congress is the H.R. 1731: the National Cybersecurity Protection Advancement Act of 2015, also known simply as the Cybersecurity Act of 2015. The Act has widely been considered a “landmark cybersecurity information sharing legislation,” (Abascal, Archie, Crawford, et al., 2016) and “the most significant piece of federal cyber-related legislation enacted to date,” (Sullivan & Cromwell LLP, 2015, p. 1) because it is one of the first and strongest attempts to federalize cybersecurity in the broader interests of counterterrorism and national security. In fact, the Act specifies the role the Department of Homeland Security plays in coordinating information sharing efforts. Most significantly, the Act requires that the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC) interact with non-federal and private sector organizations for comprehensive information sharing. What this generally means for individuals and businesses is that we are now better equipped to cooperate with the federal government in terms of information sharing, such as divulging any information requested by the NCCIC. The Act does not mandate that any organization share data with the government. However, the Act does make it so that individuals and companies are protected from liability when information is shared. The Act includes specific liability and information privacy protection provisions to facilitate information sharing from the private sector. Without these provisions, the private sector would fear any repercussions that came from information sharing. Therefore, the Cybersecurity Act of 2015 offers an ideal balance between privacy protections and national security needs.

Initially the Act had “raised concerns among privacy advocates,” (Zakrzwski, 2015, p. 1). The reason for these concerns is that when organizations in either the public or private sector share information with the Department of Homeland Security, there is some potential for that information to contain your personal data. By including provisions related to the role the Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer play in reviewing and assessing how the act has been implemented and any privacy-related consequences or concerns it has raised, the Act does offer a reasonable compromise that should appeal to most Americans. Moreover, the Act protects organizations from liability with the only exception being in cases involving “willful misconduct,”...

Another way the Act does protect Americans from infringements on privacy is that it holds the government liable “if an agency or department violates privacy and civil liberty guidelines and restrictions on the use of information required by the bill,” (Congressional Budget Office, 2015). For this reason, even the most sensitive of privacy watchdog groups have offered tacit, cautionary support for the Act (Zakrzewski, 2015). The American Civil Liberties Union (ACLU) even gave its “blessing” for the Act, “a rare occurrence for a cyber bill, (Bennett & Marcos, 2015, p. 1). Therefore, anyone concerned about how the Act impacts their own privacy should rest assured that their personal information is actually much better protected now than ever before.
Prior to this Act, government and private entities were vulnerable to cyberattacks, which could undermine counterterrorism efforts in general, and cause havoc to basic public infrastructure like transportation and communication networks and banking systems. Ancillary problems like identity theft can also occur when a private or government entity is under cyberattack. A series of serious attacks on Sony Entertainment, Anthem, Home Depot and JPMorgan Chase made it abundantly clear that greater coordination and information sharing was needed to protect Americans from cyberattacks (Bennett & Marcos, 2015). President Obama quickly responded with an executive order that led to preliminary drafts of the Cybersecurity Act, and Congress passed the Act practically unanimously with a 355-63 vote.

It may seem surprising to you that the ACLU and other civil liberties organizations would support an Act that “authorizes various entities, including outside the federal government, to monitor certain information systems and operate defensive measures for cybersecurity purposes,” (Sullivan & Cromwell LLP, 2015). After all, authorizing the government to “monitor certain information systems” sounds a lot like surveillance. The reason why the Act does not run roughshod over American civil liberties is that it builds in safeguards such as mandatory removal of personal information that is unrelated to the security threat. The Chief Privacy Officer continually monitors the collection, dissemination, and utilization of data and continually consults with civil liberties agencies (“H.R.1731 - National Cybersecurity Protection Advancement Act of 2015,” 2015). Furthermore, an amendment to the Act requires…

Sources used in this document:

References

Abascal, M.A., Archie, J.C., Crawford, G.E., et al. (2016). What You Need to Know About the Cybersecurity Act of 2015. Lexology. https://www.lexology.com/library/detail.aspx?g=71db9ab9-d14b-470c-8e9b-c94b29065a94

Bennett, C. & Marcos, C. (2015). Cyber threat-sharing bill heads to Senate. The Hill. http://thehill.com/blogs/floor-action/house/239856-house-sends-cybersecurity-bill-to-senate

Congressional Budget Office (2015). H.R. 1731, National Cybersecurity Protection Advancement Act of 2015. https://www.cbo.gov/publication/50116

“H.R.1731 - National Cybersecurity Protection Advancement Act of 2015.” Congress.gov. https://www.congress.gov/bill/114th-congress/house-bill/1731

Sullivan & Cromwell LLP (2015). The cybersecurity act of 2015. https://www.sullcrom.com/siteFiles/Publications/SC_Publication_The_Cybersecurity_Act_of_2015.pdf

Zakrzewski, C. (2015). House passes complementary cyber information-sharing bill. TechCrunch. https://techcrunch.com/2015/04/23/house-passes-complementary-cyber-information-sharing-bill/


Cite this Document:
Copy Bibliography Citation

Related Documents

Federal Legislation and Agency on Emergency
Words: 1868 Length: 6 Document Type: Discussion Chapter

FEMA & Robert T. Stafford Act of 1988 Disaster relief has been an issue of significant focus for the federal government through the Federal Emergency Management Agency was not created until 1978. The significance of disaster relief for the federal government is evident in the creation of the earliest piece of federal legislation in 1803. The federal government created the Congressional Act of 1803 as its earliest legislative attempt to address

Security on the Web
Words: 3164 Length: 8 Document Type: Term Paper

Internet: Security on the Web Security on the Web -- What are the Key Issues for Major Banks? The age of digital technology -- email, Web-driven high-speed communication and information, online commerce, and more -- has been in place now for several years, and has been touted as a "revolutionary" technological breakthrough, and for good reason: This technology presents enormous new business opportunities. For example, by moving the key element of marketing

Federal Tort Claims Act Federal Tort Claims
Words: 1421 Length: 4 Document Type: Essay

Federal Tort Claims Act Federal Tort Claims The Federal Tort Claims Act (FTCA) (P.L. 79-601, 60 Stat. 842) was enacted by U.S. Congress in August 1946, according to which any individual can sue the federal government for personal damages, like loss of money and property, physical injury or any other such situation caused by federal organization and its employees, while working within the limits of employment. The person can file claims against

Security Issues of Online Communities
Words: 15576 Length: 60 Document Type: Term Paper

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are:

Security Information Security and Risk Management in
Words: 1322 Length: 5 Document Type: Term Paper

SECURITY Information Security and Risk Management in IT This essay is designed to present and discuss both an assessment of information security and risk management in IT systems and a comparative discussion of important academic theories related to security and risk. In the first section, An assessment, a conceptual framework will emerge including reference to important terminology and concepts as well as an outline of legislation and authorized usage examples. In the

Differences Between Proprietary and Contract Security
Words: 650 Length: 2 Document Type: Essay

When considering their security needs, businesses will be faced with whether to develop an in-house, proprietary team or to outsource their security to a contractor. There are significant differences between contract security services and proprietary security, as well as costs and benefits associated with each. With proprietary services, the company can control and monitor all their security needs, change security strategies as needed, and conduct all training in-house. Security personnel

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now