Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

CISA's Privacy Facts

8,371 views

Published on

The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.

  • I make 1000$/day with this easy trick: https://bit.ly/3h55R2O
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Sex in your area is here: ♥♥♥ https://bit.ly/2ZVgKze ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Businesses pay you up to $25 per hour to be on Twitter? ◆◆◆ http://t.cn/AieXiXbg
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • I would never forgive myself it i didn't give you one last opportunity to try the incredible Halki Diabetes Remedy for yourself! ♣♣♣ http://t.cn/AiBhrKDq
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Real people just like you are kissing the idea of punching the clock for someone else goodbye, and embracing a new way of living. The internet economy is exploding, and there are literally THOUSANDS of great earnings opportunities available right now, all just one click away. ♣♣♣ http://t.cn/AisJWUCf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

CISA's Privacy Facts

  1. 1. CISA’SPRIVACYFACTS WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
  2. 2. 1 FACT When sharing cyber threat information with the government, CISA would require public and private entities to remove personally identifiable information. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  3. 3. 2The government can only use cyber information for “cybersecurity purposes.” CISA would not allow the government to use cyber threat information to investigate or prosecute “serious violent felonies.” FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  4. 4. 3The government is prohibited from disclosing, retaining, or using information in ways not authorized by CISA. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  5. 5. 4CISA would require law enforcement officials to have written consent from an entity sharing cyber threat information before investigating a computer crime. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  6. 6. 5The Attorney General will develop and review privacy and civil liberties guidelines governing the use of cyber threat information. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  7. 7. 6CISA directs federal entities to regularly report to Congress to examine the impact that information sharing has on privacy and civil liberties. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  8. 8. 7Under CISA, businesses are NOT REQUIRED to share information with the government. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  9. 9. 8Only businesses that voluntarily share electronic threat data with the Department of Homeland Security, a civilian entity, receive limited liability protections. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  10. 10. 9CISA does not offer businesses safeguards when sharing threat information with the Department of Defense (including the National Security Agency) or the FBI. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  11. 11. JOINTHECOALITION #VOTECISA WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

×