What is CISPA 2015 and why should you know about it?

CISPA 2015

On and off the issue of CISPA act keeps rolling and garner attention of the cyber activists. It has been re-introduced as Cyber Intelligence Security Act in 2015 after it failed to find a place in the house back in 2013.

What is CISPA?

Originated in 2013, CISPA is an abbreviated term for “Cyber Intelligence Sharing and Protection Act” meant to regulate and control the information sharing among the private enterprises and the government related to cybercrime or cyber-attacks. If private companies notice any potential cyber-attack, it shall immediately notify government about it. For instance if Google or Facebook identify any suspicious activity on their networks that might be a cyber-attack, they must immediately share the information with the government.

Why is there an opposition to CISPA?

The opposition is afraid that CISPA might lead to undue revelation of certain confidential user information by the private companies to the government. This may override the privacy laws causing an ambiguity.

What is the nature of private information?

CISPA allows the communication service providers to even share the emails and text messages to the government. Not only this, your files stored with your cloud service provider may get shared too in an event of any suspicion of cyber-attack.

Why CISPA 2015 emerged from the dead grave?

Recent hacks like one on the Sony Entertainment and few more serious ones, CISPA is reconsidered in the House of Representatives. In 2015, CISPA act has been passed with slight amendments in it. The first one being the name-It is now Cyber-security Information Sharing Act. It mandates privacy and civil liberties report but at the same time allows government agencies to classify the annexes to the reports. Moreover, the shared information under CISPA 2015 will be exempted from the Freedom of Information Act. You can get the full text of the Act on the official sites for detailed information.

Though CISPA is a pro-security technique against battling any cyber-threat but on the other hand it may potentially lead to treacherous impact on the privacy of users that may create a turmoil.