Introduction
With the advancing technology and increased internet connectivity, many people around the world are using online sites for various activities. Organizations as well as individuals have found it safe to store their most valued information on the internet. This has increased accessibility of information while enhancing the flow of information.
Unfortunately, the same technological advancements have been used by people with ulterior motives to take advantage of private information, or even disrupt normal operations of an organization. Consequently, there is need to enforce policies that will help in protecting organizational information and systems from criminals.
The Cyber Intelligence Sharing and Protection Act (CISPA)
This is one of the policies that has been proposed to curb cyber crimes and is being debated in the congress. The Act proposes the sharing of information between the U.S. government and other security agencies including technology and manufacturing companies.
The main aim is to establish communication channels between private firms and government intelligence bodies to enhance sharing of potential and emerging cyber security threats (Rachael, 2013).This is meant to enable the government to investigate cyber threats thus enhance systems security.
Advantages
CISPA is expected to increase detection of cyber security threats and thus help in reduction of cyber crimes. On the same note, CISPA includes in its definition intellectual property which is the most risky material. Moreover, the systems of United States which are vital for every day live needs protection from hackers and this Act serves just that purpose (Foss, 2012). The Act also seeks to enhance confidence of people and organizations on the internet and various systems in general.
Disadvantages
Nevertheless, the Act has been opposed by majority of people both from the government and from the private sector. Firstly, some people are very concerned with the inclusion of intellectual property as one of the reasons for sharing information. It has been argued that the
Act is so vague on this matter which might lead to infringement of the right to privacy. On top, security agencies can use this leeway to screen people’s communication in the pretext of searching for potential cyber threats. Similarly, critics have argued that the Act gives security personnel excuses to interfere and even messing up with people’s information because no legal action can be taken against them (Foss, 2012).
Other related Acts
It is not only the CISPA Act that has been proposed to counter cyber threats. There was the Stop Online Piracy Act which was defeated because it included intellectual property theft. On the same note, U.S. representative Dan Lungren proposed the Precise Act which after dropping grave provisions will be debated together with the CISPA.
Additionally, there is the Federal Information Security Amendment Act of 2012. Contrary to the CISPA, many of these other Acts have not included intellectual property in any of their clauses. However, they are all aiming at the same goal of eliminating chances of cyber crime taking place (Rachael, 2013).
Conclusion
Cyber security is a necessity given the increasing number of cyber crimes that are being recorded. In this regard, any step that will help in identifying possible security threats should be highly encouraged. However, care should be taken so as not to interfere with people’s right to privacy. Furthermore, drafting of the Bills should avoid vague language that will leave loopholes for people to misapply the law.
References
Foss, S. H. (2012). Cyberfraud and Businesses. New York Times. Web.
Rachael, K. (2013). Companies Blindfolded in Cyber War Defense. The Wall Street Journal. Web.