SlideShare a Scribd company logo
March	
  11,	
  2013	
  
	
  	
  
	
  	
  
Dear	
  Representative:	
  
	
  	
  
We	
  the	
  undersigned	
  organizations	
  write	
  in	
  opposition	
  to	
  H.R.	
  624,	
  the	
  
Cyber	
  Intelligence	
  Sharing	
  and	
  Protection	
  Act	
  of	
  2013	
  (CISPA).	
  We	
  are	
  
gravely	
  concerned	
  that	
  this	
  bill	
  will	
  allow	
  companies	
  that	
  hold	
  very	
  
sensitive	
  and	
  personal	
  information	
  to	
  liberally	
  share	
  it	
  with	
  the	
  
government,	
  which	
  could	
  then	
  use	
  the	
  information	
  without	
  
meaningful	
  oversight	
  for	
  purposes	
  unrelated	
  to	
  cybersecurity.	
  	
  
	
  	
  
CISPA	
  creates	
  an	
  exception	
  to	
  all	
  privacy	
  laws	
  to	
  permit	
  companies	
  to	
  
share	
  our	
  information	
  with	
  each	
  other	
  and	
  with	
  the	
  government	
  in	
  the	
  
name	
  of	
  cybersecurity.	
  Although	
  a	
  carefully-­‐crafted	
  information	
  
sharing	
  program	
  that	
  strictly	
  limits	
  the	
  information	
  to	
  be	
  shared	
  and	
  
includes	
  robust	
  privacy	
  safeguards	
  could	
  be	
  an	
  effective	
  approach	
  to	
  
cybersecurity,	
  CISPA	
  lacks	
  such	
  protections	
  for	
  individual	
  rights.	
  
CISPA’s	
  information	
  sharing	
  regime	
  allows	
  the	
  transfer	
  of	
  vast	
  
amounts	
  of	
  data,	
  including	
  sensitive	
  information	
  like	
  internet	
  records	
  
or	
  the	
  content	
  of	
  emails,	
  to	
  any	
  agency	
  in	
  the	
  government	
  including	
  
military	
  and	
  intelligence	
  agencies	
  like	
  the	
  National	
  Security	
  Agency	
  or	
  
the	
  Department	
  of	
  Defense	
  Cyber	
  Command.	
  Once	
  in	
  government	
  
hands,	
  this	
  information	
  can	
  be	
  used	
  for	
  undefined	
  ‘national	
  security’	
  
purposes	
  unrelated	
  to	
  cybersecurity.	
  	
  
	
  	
  
Developments	
  over	
  the	
  last	
  year	
  make	
  CISPA’s	
  approach	
  even	
  more	
  
questionable	
  than	
  before.	
  First,	
  the	
  President	
  recently	
  signed	
  
Executive	
  Order	
  13636,	
  which	
  will	
  increase	
  information	
  sharing	
  from	
  
the	
  government	
  to	
  the	
  private	
  sector.	
  	
  Information	
  sharing	
  in	
  this	
  
direction	
  is	
  often	
  cited	
  as	
  a	
  substantial	
  justification	
  for	
  CISPA	
  and	
  will	
  
proceed	
  without	
  legislation.	
  	
  Second,	
  the	
  cybersecurity	
  legislation	
  the	
  
Senate	
  considered	
  last	
  year,	
  S.	
  3414,	
  included	
  privacy	
  protections	
  for	
  
information	
  sharing	
  that	
  are	
  entirely	
  absent	
  from	
  CISPA,	
  and	
  the	
  
Obama	
  administration,	
  including	
  the	
  intelligence	
  community,	
  has	
  
confirmed	
  that	
  those	
  protections	
  would	
  not	
  inhibit	
  cybersecurity	
  
programs.	
  These	
  included	
  provisions	
  to	
  ensure	
  that	
  private	
  companies	
  
send	
  cyber	
  threat	
  information	
  only	
  to	
  civilian	
  agencies,	
  and	
  stricter	
  
limits	
  on	
  how	
  this	
  information	
  may	
  be	
  used.	
  	
  Finally,	
  witnesses	
  at	
  a	
  
hearing	
  before	
  the	
  House	
  Permanent	
  Select	
  Committee	
  on	
  Intelligence	
  
confirmed	
  only	
  weeks	
  ago	
  that	
  companies	
  can	
  strip	
  out	
  personally	
  
identifiably	
  information	
  that	
  is	
  not	
  necessary	
  to	
  address	
  cyber	
  threats,	
  
and	
  CISPA	
  omits	
  any	
  requirement	
  that	
  reasonable	
  efforts	
  be	
  
undertaken	
  to	
  do	
  so.	
  
	
  	
  
We	
  continue	
  to	
  oppose	
  CISPA	
  and	
  encourage	
  you	
  to	
  vote	
  ‘no.’	
  
Fundamental	
  changes	
  to	
  this	
  bill	
  are	
  required	
  to	
  address	
  the	
  many	
  civil	
  
liberties	
  problems.	
  	
  	
  
	
  	
  
	
  	
  
Sincerely,	
  
	
  	
  
Access	
  
Advocacy	
  for	
  Principled	
  Action	
  in	
  Government	
  
American	
  Arab	
  Anti-­‐Discrimination	
  Committee	
  
American	
  Association	
  of	
  Law	
  Libraries	
  
American	
  Civil	
  Liberties	
  Union	
  
American	
  Library	
  Association	
  
Amicus	
  
Association	
  of	
  Research	
  Libraries	
  
Bill	
  of	
  Rights	
  Defense	
  Committee	
  
Center	
  for	
  Democracy	
  &	
  Technology	
  
Center	
  for	
  Media	
  and	
  Democracy	
  
Center	
  for	
  National	
  Security	
  Studies	
  
Competitive	
  Enterprise	
  Institute	
  
The	
  Constitution	
  Project	
  
Council	
  on	
  American-­‐Islamic	
  Relations	
  
CREDO	
  Action	
  
Cyber	
  Privacy	
  Project	
  
Defending	
  Dissent	
  Foundation	
  
Demand	
  Progress	
  
Electronic	
  Frontier	
  Foundation	
  
Fight	
  for	
  the	
  Future	
  
Floor64	
  Inc.	
  
Free	
  Press	
  Action	
  Fund	
  
Liberty	
  Coalition	
  
Mozilla	
  
National	
  Association	
  of	
  Criminal	
  Defense	
  Lawyers	
  
New	
  American	
  Foundation’s	
  Open	
  Technology	
  Institute	
  
NY	
  Tech	
  Meetup	
  
OpenTheGovernment.org	
  
Personal	
  Democracy	
  Media	
  
PolitiHacks	
  
Privacy	
  Rights	
  Clearinghouse	
  
Reporters	
  Without	
  Borders	
  
US	
  PIRG

More Related Content

What's hot

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
Meg Weber
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
mlw32785
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
Tushar Rajput
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
Louise Collins
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
WilmerHale
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
jwilso
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Shawn Tuma
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
Hubbamar
 
S719a
S719aS719a
S719a
ecommerce
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
centralohioissa
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
vinyas87
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
Kenneth Riley
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography
Vivastream
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
Jessica Pattison
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
Integral university, India
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
cliff_rudolph
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
Greg Ezeilo
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
misecho
 

What's hot (20)

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Major Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINALMajor Essay_ US-China Relations_FINAL
Major Essay_ US-China Relations_FINAL
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
Cybersecurity Legal and Compliance Issues Business & IT Leaders Must Know -- ...
 
Chapter 8 big data and privacy - social media 3533
Chapter 8  big data and privacy - social media 3533Chapter 8  big data and privacy - social media 3533
Chapter 8 big data and privacy - social media 3533
 
S719a
S719aS719a
S719a
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 
Privacy issues and internet privacy
Privacy issues and internet privacyPrivacy issues and internet privacy
Privacy issues and internet privacy
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
Dan Larkin - Biography
Dan Larkin - Biography Dan Larkin - Biography
Dan Larkin - Biography
 
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
GDPR: A ticking time bomb is approaching - Another Millennium Bug or is this ...
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 
Data Privacy
Data PrivacyData Privacy
Data Privacy
 
Data protection regulation
Data protection regulationData protection regulation
Data protection regulation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 

Similar to Open Letter From EFF Opposing CISPA

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
gertrudebellgrove
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
adampcarr67227
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
College Papers Writing Service
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
James Bollen
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
Russ Dutcher, CBRM,CORM,CDPS
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
Russ Dutcher, CBRM,CORM,CDPS
 
2013 01-14
2013 01-142013 01-14
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
cargillfilberto
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
toltonkendal
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
Sean Whalen
 
Internet Privacy
Internet PrivacyInternet Privacy
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
Anushka Perera
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
Diane Allen
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Alvaro Lopez Ortega
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
Fabio Chiusi
 
Naavi theory regulated_anonymity
Naavi theory regulated_anonymityNaavi theory regulated_anonymity
Naavi theory regulated_anonymity
Vijayashankar Na
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
Brian Rowe
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
Megan Espinoza
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
nettletondevon
 

Similar to Open Letter From EFF Opposing CISPA (19)

New York Washington, D.C. Los Angeles Palo.docx
 New York     Washington, D.C.      Los Angeles     Palo.docx New York     Washington, D.C.      Los Angeles     Palo.docx
New York Washington, D.C. Los Angeles Palo.docx
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Internet Privacy Essay
Internet Privacy EssayInternet Privacy Essay
Internet Privacy Essay
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe1Annotated BibliographyTamika S. BouldinLibe
1Annotated BibliographyTamika S. BouldinLibe
 
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docxRunning head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
Running head THE FUTURE OF ORGANIC FOOD.Surname 7NameIns.docx
 
Lofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and EncryptionLofty Ideals: The Nature of Clouds and Encryption
Lofty Ideals: The Nature of Clouds and Encryption
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
The Self-Invasion Of Privacy
The Self-Invasion Of PrivacyThe Self-Invasion Of Privacy
The Self-Invasion Of Privacy
 
Open Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective EncryptionOpen Letter to President Obama Opposing Backdoors and Defective Encryption
Open Letter to President Obama Opposing Backdoors and Defective Encryption
 
Don't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' DebateDon't Panic. Making Progress on the 'Going Dark' Debate
Don't Panic. Making Progress on the 'Going Dark' Debate
 
Naavi theory regulated_anonymity
Naavi theory regulated_anonymityNaavi theory regulated_anonymity
Naavi theory regulated_anonymity
 
Privacy reconsidered
Privacy reconsideredPrivacy reconsidered
Privacy reconsidered
 
An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )An Unmanned Aircraft System ( Uas )
An Unmanned Aircraft System ( Uas )
 
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docxAccessing Password Protected andor Encrypted Mobile DataAbstrac.docx
Accessing Password Protected andor Encrypted Mobile DataAbstrac.docx
 

More from Small Business Trends

Meyer vs Aabaco - Yahoo Small Business
Meyer vs Aabaco - Yahoo Small BusinessMeyer vs Aabaco - Yahoo Small Business
Meyer vs Aabaco - Yahoo Small Business
Small Business Trends
 
FTC Office Supply Lawsuit - Scam Against Small Business
FTC Office Supply Lawsuit - Scam Against Small BusinessFTC Office Supply Lawsuit - Scam Against Small Business
FTC Office Supply Lawsuit - Scam Against Small Business
Small Business Trends
 
Amazon Fake Reviews Lawsuit Against Fiverr Sellers
Amazon Fake Reviews Lawsuit Against Fiverr SellersAmazon Fake Reviews Lawsuit Against Fiverr Sellers
Amazon Fake Reviews Lawsuit Against Fiverr Sellers
Small Business Trends
 
Google Robocalls Lawsuit Against Local Lighthouse Corp
Google Robocalls Lawsuit Against Local Lighthouse CorpGoogle Robocalls Lawsuit Against Local Lighthouse Corp
Google Robocalls Lawsuit Against Local Lighthouse Corp
Small Business Trends
 
8 Elements of a Memorable Marketing Gift
8 Elements of a Memorable Marketing Gift8 Elements of a Memorable Marketing Gift
8 Elements of a Memorable Marketing Gift
Small Business Trends
 
Taxpayer Bill of Rights - IRS
Taxpayer Bill of Rights - IRSTaxpayer Bill of Rights - IRS
Taxpayer Bill of Rights - IRS
Small Business Trends
 
2014 Small Business Book Awards Winners
2014 Small Business Book Awards Winners2014 Small Business Book Awards Winners
2014 Small Business Book Awards Winners
Small Business Trends
 
41 Thought Leaders on Social Media, Customer Service and Tech
41 Thought Leaders on Social Media, Customer Service and Tech41 Thought Leaders on Social Media, Customer Service and Tech
41 Thought Leaders on Social Media, Customer Service and Tech
Small Business Trends
 
SoftLayer customer notice of IBM acquisition
SoftLayer customer notice of IBM acquisitionSoftLayer customer notice of IBM acquisition
SoftLayer customer notice of IBM acquisition
Small Business Trends
 
Decision overturning union poster rule
Decision overturning union poster ruleDecision overturning union poster rule
Decision overturning union poster rule
Small Business Trends
 
Owners Rights: Supreme Court Case, Buyers Have Right to Resell
Owners Rights: Supreme Court Case, Buyers Have Right to ResellOwners Rights: Supreme Court Case, Buyers Have Right to Resell
Owners Rights: Supreme Court Case, Buyers Have Right to Resell
Small Business Trends
 
FTC Sponsored Tweet and Mobile Disclosure Rules
FTC Sponsored Tweet and Mobile Disclosure RulesFTC Sponsored Tweet and Mobile Disclosure Rules
FTC Sponsored Tweet and Mobile Disclosure Rules
Small Business Trends
 
Who's Who Among Women in Ecommerce
Who's Who Among Women in EcommerceWho's Who Among Women in Ecommerce
Who's Who Among Women in Ecommerce
Small Business Trends
 
OPEN BOOK - Social Media Guide
OPEN BOOK - Social Media GuideOPEN BOOK - Social Media Guide
OPEN BOOK - Social Media Guide
Small Business Trends
 
100 Green Small Business Tips
100 Green Small Business Tips100 Green Small Business Tips
100 Green Small Business Tips
Small Business Trends
 
Practical Social Media Tips
Practical Social Media TipsPractical Social Media Tips
Practical Social Media Tips
Small Business Trends
 
Holiday Tips
Holiday TipsHoliday Tips
Holiday Tips
Small Business Trends
 
Home Based Business Research: Dispelling the Myths
Home Based Business Research: Dispelling the MythsHome Based Business Research: Dispelling the Myths
Home Based Business Research: Dispelling the Myths
Small Business Trends
 
Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your Business
Small Business Trends
 
Blogging to Market Your Business
Blogging to Market Your BusinessBlogging to Market Your Business
Blogging to Market Your Business
Small Business Trends
 

More from Small Business Trends (20)

Meyer vs Aabaco - Yahoo Small Business
Meyer vs Aabaco - Yahoo Small BusinessMeyer vs Aabaco - Yahoo Small Business
Meyer vs Aabaco - Yahoo Small Business
 
FTC Office Supply Lawsuit - Scam Against Small Business
FTC Office Supply Lawsuit - Scam Against Small BusinessFTC Office Supply Lawsuit - Scam Against Small Business
FTC Office Supply Lawsuit - Scam Against Small Business
 
Amazon Fake Reviews Lawsuit Against Fiverr Sellers
Amazon Fake Reviews Lawsuit Against Fiverr SellersAmazon Fake Reviews Lawsuit Against Fiverr Sellers
Amazon Fake Reviews Lawsuit Against Fiverr Sellers
 
Google Robocalls Lawsuit Against Local Lighthouse Corp
Google Robocalls Lawsuit Against Local Lighthouse CorpGoogle Robocalls Lawsuit Against Local Lighthouse Corp
Google Robocalls Lawsuit Against Local Lighthouse Corp
 
8 Elements of a Memorable Marketing Gift
8 Elements of a Memorable Marketing Gift8 Elements of a Memorable Marketing Gift
8 Elements of a Memorable Marketing Gift
 
Taxpayer Bill of Rights - IRS
Taxpayer Bill of Rights - IRSTaxpayer Bill of Rights - IRS
Taxpayer Bill of Rights - IRS
 
2014 Small Business Book Awards Winners
2014 Small Business Book Awards Winners2014 Small Business Book Awards Winners
2014 Small Business Book Awards Winners
 
41 Thought Leaders on Social Media, Customer Service and Tech
41 Thought Leaders on Social Media, Customer Service and Tech41 Thought Leaders on Social Media, Customer Service and Tech
41 Thought Leaders on Social Media, Customer Service and Tech
 
SoftLayer customer notice of IBM acquisition
SoftLayer customer notice of IBM acquisitionSoftLayer customer notice of IBM acquisition
SoftLayer customer notice of IBM acquisition
 
Decision overturning union poster rule
Decision overturning union poster ruleDecision overturning union poster rule
Decision overturning union poster rule
 
Owners Rights: Supreme Court Case, Buyers Have Right to Resell
Owners Rights: Supreme Court Case, Buyers Have Right to ResellOwners Rights: Supreme Court Case, Buyers Have Right to Resell
Owners Rights: Supreme Court Case, Buyers Have Right to Resell
 
FTC Sponsored Tweet and Mobile Disclosure Rules
FTC Sponsored Tweet and Mobile Disclosure RulesFTC Sponsored Tweet and Mobile Disclosure Rules
FTC Sponsored Tweet and Mobile Disclosure Rules
 
Who's Who Among Women in Ecommerce
Who's Who Among Women in EcommerceWho's Who Among Women in Ecommerce
Who's Who Among Women in Ecommerce
 
OPEN BOOK - Social Media Guide
OPEN BOOK - Social Media GuideOPEN BOOK - Social Media Guide
OPEN BOOK - Social Media Guide
 
100 Green Small Business Tips
100 Green Small Business Tips100 Green Small Business Tips
100 Green Small Business Tips
 
Practical Social Media Tips
Practical Social Media TipsPractical Social Media Tips
Practical Social Media Tips
 
Holiday Tips
Holiday TipsHoliday Tips
Holiday Tips
 
Home Based Business Research: Dispelling the Myths
Home Based Business Research: Dispelling the MythsHome Based Business Research: Dispelling the Myths
Home Based Business Research: Dispelling the Myths
 
Internet Communications - How to Use in Your Business
Internet Communications - How to Use in Your BusinessInternet Communications - How to Use in Your Business
Internet Communications - How to Use in Your Business
 
Blogging to Market Your Business
Blogging to Market Your BusinessBlogging to Market Your Business
Blogging to Market Your Business
 

Recently uploaded

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

Open Letter From EFF Opposing CISPA

  • 1. March  11,  2013           Dear  Representative:       We  the  undersigned  organizations  write  in  opposition  to  H.R.  624,  the   Cyber  Intelligence  Sharing  and  Protection  Act  of  2013  (CISPA).  We  are   gravely  concerned  that  this  bill  will  allow  companies  that  hold  very   sensitive  and  personal  information  to  liberally  share  it  with  the   government,  which  could  then  use  the  information  without   meaningful  oversight  for  purposes  unrelated  to  cybersecurity.         CISPA  creates  an  exception  to  all  privacy  laws  to  permit  companies  to   share  our  information  with  each  other  and  with  the  government  in  the   name  of  cybersecurity.  Although  a  carefully-­‐crafted  information   sharing  program  that  strictly  limits  the  information  to  be  shared  and   includes  robust  privacy  safeguards  could  be  an  effective  approach  to   cybersecurity,  CISPA  lacks  such  protections  for  individual  rights.   CISPA’s  information  sharing  regime  allows  the  transfer  of  vast   amounts  of  data,  including  sensitive  information  like  internet  records   or  the  content  of  emails,  to  any  agency  in  the  government  including   military  and  intelligence  agencies  like  the  National  Security  Agency  or   the  Department  of  Defense  Cyber  Command.  Once  in  government   hands,  this  information  can  be  used  for  undefined  ‘national  security’   purposes  unrelated  to  cybersecurity.         Developments  over  the  last  year  make  CISPA’s  approach  even  more   questionable  than  before.  First,  the  President  recently  signed   Executive  Order  13636,  which  will  increase  information  sharing  from   the  government  to  the  private  sector.    Information  sharing  in  this   direction  is  often  cited  as  a  substantial  justification  for  CISPA  and  will   proceed  without  legislation.    Second,  the  cybersecurity  legislation  the   Senate  considered  last  year,  S.  3414,  included  privacy  protections  for   information  sharing  that  are  entirely  absent  from  CISPA,  and  the   Obama  administration,  including  the  intelligence  community,  has  
  • 2. confirmed  that  those  protections  would  not  inhibit  cybersecurity   programs.  These  included  provisions  to  ensure  that  private  companies   send  cyber  threat  information  only  to  civilian  agencies,  and  stricter   limits  on  how  this  information  may  be  used.    Finally,  witnesses  at  a   hearing  before  the  House  Permanent  Select  Committee  on  Intelligence   confirmed  only  weeks  ago  that  companies  can  strip  out  personally   identifiably  information  that  is  not  necessary  to  address  cyber  threats,   and  CISPA  omits  any  requirement  that  reasonable  efforts  be   undertaken  to  do  so.       We  continue  to  oppose  CISPA  and  encourage  you  to  vote  ‘no.’   Fundamental  changes  to  this  bill  are  required  to  address  the  many  civil   liberties  problems.               Sincerely,       Access   Advocacy  for  Principled  Action  in  Government   American  Arab  Anti-­‐Discrimination  Committee   American  Association  of  Law  Libraries   American  Civil  Liberties  Union   American  Library  Association   Amicus   Association  of  Research  Libraries   Bill  of  Rights  Defense  Committee   Center  for  Democracy  &  Technology   Center  for  Media  and  Democracy   Center  for  National  Security  Studies   Competitive  Enterprise  Institute   The  Constitution  Project   Council  on  American-­‐Islamic  Relations   CREDO  Action   Cyber  Privacy  Project   Defending  Dissent  Foundation  
  • 3. Demand  Progress   Electronic  Frontier  Foundation   Fight  for  the  Future   Floor64  Inc.   Free  Press  Action  Fund   Liberty  Coalition   Mozilla   National  Association  of  Criminal  Defense  Lawyers   New  American  Foundation’s  Open  Technology  Institute   NY  Tech  Meetup   OpenTheGovernment.org   Personal  Democracy  Media   PolitiHacks   Privacy  Rights  Clearinghouse   Reporters  Without  Borders   US  PIRG