Security Related Federal Legislation Essay

PAGES
5
WORDS
1619
Cite

One of the most important security-related pieces of legislation recently passed in Congress is the H.R. 1731: the National Cybersecurity Protection Advancement Act of 2015, also known simply as the Cybersecurity Act of 2015. The Act has widely been considered a “landmark cybersecurity information sharing legislation,” (Abascal, Archie, Crawford, et al., 2016) and “the most significant piece of federal cyber-related legislation enacted to date,” (Sullivan & Cromwell LLP, 2015, p. 1) because it is one of the first and strongest attempts to federalize cybersecurity in the broader interests of counterterrorism and national security. In fact, the Act specifies the role the Department of Homeland Security plays in coordinating information sharing efforts. Most significantly, the Act requires that the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC) interact with non-federal and private sector organizations for comprehensive information sharing. What this generally means for individuals and businesses is that we are now better equipped to cooperate with the federal government in terms of information sharing, such as divulging any information requested by the NCCIC. The Act does not mandate that any organization share data with the government. However, the Act does make it so that individuals and companies are protected from liability when information is shared. The Act includes specific liability and information privacy protection provisions to facilitate information sharing from the private sector. Without these provisions, the private sector would fear any repercussions that came from information sharing. Therefore, the Cybersecurity Act of 2015 offers an ideal balance between privacy protections and national security needs.

Initially the Act had “raised concerns among privacy advocates,” (Zakrzwski, 2015, p. 1). The reason for these concerns is that when organizations in either the public or private sector share information with the Department of Homeland Security, there is some potential for that information to contain your personal data. By including provisions related to the role the Chief Privacy Officer and the Chief Civil Rights and Civil Liberties Officer play in reviewing and assessing how the act has been implemented and any privacy-related consequences or concerns it has raised, the Act does offer a reasonable compromise that should appeal to most Americans. Moreover, the Act protects organizations from liability with the only exception being in cases involving “willful misconduct,”...

...

Another way the Act does protect Americans from infringements on privacy is that it holds the government liable “if an agency or department violates privacy and civil liberty guidelines and restrictions on the use of information required by the bill,” (Congressional Budget Office, 2015). For this reason, even the most sensitive of privacy watchdog groups have offered tacit, cautionary support for the Act (Zakrzewski, 2015). The American Civil Liberties Union (ACLU) even gave its “blessing” for the Act, “a rare occurrence for a cyber bill, (Bennett & Marcos, 2015, p. 1). Therefore, anyone concerned about how the Act impacts their own privacy should rest assured that their personal information is actually much better protected now than ever before.
Prior to this Act, government and private entities were vulnerable to cyberattacks, which could undermine counterterrorism efforts in general, and cause havoc to basic public infrastructure like transportation and communication networks and banking systems. Ancillary problems like identity theft can also occur when a private or government entity is under cyberattack. A series of serious attacks on Sony Entertainment, Anthem, Home Depot and JPMorgan Chase made it abundantly clear that greater coordination and information sharing was needed to protect Americans from cyberattacks (Bennett & Marcos, 2015). President Obama quickly responded with an executive order that led to preliminary drafts of the Cybersecurity Act, and Congress passed the Act practically unanimously with a 355-63 vote.

It may seem surprising to you that the ACLU and other civil liberties organizations would support an Act that “authorizes various entities, including outside the federal government, to monitor certain information systems and operate defensive measures for cybersecurity purposes,” (Sullivan & Cromwell LLP, 2015). After all, authorizing the government to “monitor certain information systems” sounds a lot like surveillance. The reason why the Act does not run roughshod over American civil liberties is that it builds in safeguards such as mandatory removal of personal information that is unrelated to the security threat. The Chief Privacy Officer continually monitors the collection, dissemination, and utilization of data and continually consults with civil liberties agencies (“H.R.1731 - National Cybersecurity Protection Advancement Act of 2015,” 2015). Furthermore, an amendment to the Act requires…

Sources Used in Documents:

References

Abascal, M.A., Archie, J.C., Crawford, G.E., et al. (2016). What You Need to Know About the Cybersecurity Act of 2015. Lexology. https://www.lexology.com/library/detail.aspx?g=71db9ab9-d14b-470c-8e9b-c94b29065a94

Bennett, C. & Marcos, C. (2015). Cyber threat-sharing bill heads to Senate. The Hill. http://thehill.com/blogs/floor-action/house/239856-house-sends-cybersecurity-bill-to-senate

Congressional Budget Office (2015). H.R. 1731, National Cybersecurity Protection Advancement Act of 2015. https://www.cbo.gov/publication/50116

“H.R.1731 - National Cybersecurity Protection Advancement Act of 2015.” Congress.gov. https://www.congress.gov/bill/114th-congress/house-bill/1731

Sullivan & Cromwell LLP (2015). The cybersecurity act of 2015. https://www.sullcrom.com/siteFiles/Publications/SC_Publication_The_Cybersecurity_Act_of_2015.pdf

Zakrzewski, C. (2015). House passes complementary cyber information-sharing bill. TechCrunch. https://techcrunch.com/2015/04/23/house-passes-complementary-cyber-information-sharing-bill/



Cite this Document:

"Security Related Federal Legislation" (2018, July 04) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/security-related-federal-legislation-essay-2169955

"Security Related Federal Legislation" 04 July 2018. Web.25 April. 2024. <
https://www.paperdue.com/essay/security-related-federal-legislation-essay-2169955>

"Security Related Federal Legislation", 04 July 2018, Accessed.25 April. 2024,
https://www.paperdue.com/essay/security-related-federal-legislation-essay-2169955

Related Documents

FEMA & Robert T. Stafford Act of 1988 Disaster relief has been an issue of significant focus for the federal government through the Federal Emergency Management Agency was not created until 1978. The significance of disaster relief for the federal government is evident in the creation of the earliest piece of federal legislation in 1803. The federal government created the Congressional Act of 1803 as its earliest legislative attempt to address

In general, the CDT urges the enactment of legislation organized around FIPs. Such practices are guided by certain principles: transparency; individual participation; purpose specification; data minimization; use limitation; data quality and integrity; security; accountability and auditing. (CDT Comments, 10-11). These principles have been at the heart of privacy legislation since the Privacy Act of 1974. (Dep't of Homeland Security). For example, the CDT advocates for consumer privacy legislation that regulates both

Security on the Web
PAGES 8 WORDS 3164

Internet: Security on the Web Security on the Web -- What are the Key Issues for Major Banks? The age of digital technology -- email, Web-driven high-speed communication and information, online commerce, and more -- has been in place now for several years, and has been touted as a "revolutionary" technological breakthrough, and for good reason: This technology presents enormous new business opportunities. For example, by moving the key element of marketing

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Federal Tort Claims Act Federal Tort Claims The Federal Tort Claims Act (FTCA) (P.L. 79-601, 60 Stat. 842) was enacted by U.S. Congress in August 1946, according to which any individual can sue the federal government for personal damages, like loss of money and property, physical injury or any other such situation caused by federal organization and its employees, while working within the limits of employment. The person can file claims against

This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information exchange in no way constitutes a community. For a cyber-place with an associated computer mediated group to be labeled as a virtual settlement it is necessary for it to meet a minimum set of conditions. These are: