linkedin logo
schedule a pickup request data destruction quote
west coast computer recycler R2 RIOs Certified west coast computer recycler reliable data security west coast computer recycler secure ewaste recycling west coast computer recycler certifications
padlock in cloud graphic

Views on the Cybersecurity Information Sharing Act

With our growing dependency on technology and with the amount of personal information that is shared over the Internet, it is no wonder that protecting this information from cyber threats and hacking has become one of the government’s utmost priorities. In a recent attempt to be more capable of meeting cyber attacks head on, the government approved the Cybersecurity Information Sharing Act (CISA) earlier this year. This act would allow for private companies to share cyberthreat data with the US government. The idea behind the act being that if the government can have more information on how companies are being hacked, they will be able to better safeguard against future attacks. However, a growing number of security experts have expressed their concerns about the act passed to protect cyber information; many saying that the act will be more likely to infringe on the privacy of citizens than on protecting them from hacking incidents.

The data that would be shared with the government would consist of sensitive information that would consist of personally identifiable information. This information would be shared with offices such as the Department of Justice, the Director of National Intelligence, and Department of Homeland Security. Those against the bill point out that this information could end up as yet another way for the NSA to have surveillance on citizens. Instead of using the information to created better security systems, it would instead be used for a variety of reasons such as identifying terrorists, prosecuting normal criminal offenses etc. Since the act allows the government to retain, disclose, and use any of the data they receive from the CISA, opponents argue that the information could create dangerous incentives for government officials to use the information for criminal investigations under false premises. In addition, many wonder if the government will be able to efficiently keep track of all the information they receive as the offices of government are not as effective as sharing information among themselves. If the CISA is to help protect against cyber attacks as it was initially intended to do, than the government must first come up with a more efficient way to share the information that they receive.

ohsas 18001:2007 logo
iso 14001 2004 logo
r2 responsible recycling 2013 logo
west coast computer recycler bonded and insured