The Cyber Crime bill presents a logical way of addressing privacy and security concerns in the networks. While the bill seeks to increase computer security among supporters, detractors believe that the law’s interest is expanding the government’s surveillance that undermines individual privacy. The Cyber-security Information Sharing Act (CISA) seeks to protect Internet users against loss of personal information and counter cyber-attacks. Critics against the bill insist that the legislation seeks to enhance public surveillance, which is contrary to the concept of providing security. I believe CISA provides a legal framework that allows public and private firms to share sensitive information on cyber-security threats that can enhance security and ensure individuals’ privacy.
CISA prompts the government and private sector to share information for the objective of creating a formidable security system to enhance cyber-security. The country requires a meaningful system of reducing cyber-attacks and other security vulnerabilities by sharing sensitive data that can enhance the collection of intelligence (Moreno et al., 2016). Likewise, the process uses an evidence-based approach to gather critical information into an analytical system that can predict and prevent cybercrime. Countries without cyber laws are encountering high levels of cyber-attacks that result in loss of sensitive corporate data that includes loss of finances and assets. Sharing of information is done under a strict code that is determined by the legal authorities, which reduces the chances of infringing on privacy rights. Therefore, CISA seeks to enhance the sharing of data between government firms and the private sector through a legal system that limits spying.
Delegate your assignment to our experts and they will do the rest.
CISA has put in place critical mechanisms of limiting liability and reducing disclosure of private information, which guarantees proper protection of critical personal data. The bill intends to monitor cyber threat indicators that include identifying users who engage in suspicious and malicious activities and finding out the methods by which they exploit security vulnerabilities to obtain private information (Moreno et al., 2016). Likewise, the approach ensures that government and private firms come up with defensive measures to block users who engage in suspicious activities. Moreover, information is shared in a DHS-sanctioned method that reduces vulnerabilities associated with infringing private information. Therefore, CISA will enhance security within the Internet platform and reduce cyber-attacks.
Detractors suggest that CISA lacks means of boosting security and that the means of sharing information creates a vulnerability that can lead to surveillance. The provisions of the bill lack ways of addressing fears associated with the possibility of spying on personal data (Greenberg, 2015). The law could allow private firms to collect intelligence on specific individuals that can reduce the need to strengthen privacy protections. CISA lacks a means of limiting the usage of personal data obtained by private firms. The fact that the government requires private firms to share information related to online crimes that hurt the economy creates a vulnerable system that can be abused. For example, law enforcement agencies can use information collected for investigations and prosecutions that are based on digital communications. CISA has loopholes that allow information sharing without adequate protections that can ensure the privacy of clients.
CISA seeks to improve cyber-security by creating a legal system for the sharing of information about security threats. Detractors of the bill are mistaken when asserting that information shared could be used to prosecute a person since CISA enforcement limitations advice against such activities. The purpose of the bill is to streamline the process of sharing information in a way that guarantees the protection of private information.
References
Greenberg, A. (2015, March 20). CISA security bill: An F for security but an A+ for spying. Wired.com . Retrieved from https://www.wired.com/2015/03/cisa-security-bill-gets-f-security-spying/.
Moreno, J. V., Rockwood, E. J., Carey, P., & Gerver, K. (2016). Potential risks and rewards of cybersecurity information sharing under CISA. Cadwalader . Retrieved from https://www.cadwalader.com/uploads/cfmemos/8668f2fed1449aa81848c8f6c8a93f6e.pdf