Cyber Security Laws Business And Government

By Cliff Montgomery – Apr. 30th, 2015

Many cyber-analysts believe there is a “need for enhanced and timely exchange of cyber-threat intelligence, both within the private sector and between the private sector and the government,” declared a study released this March by the Congressional Research Service (CRS), a non-partisan research arm of the Library of Congress.

But “concerns may arise with regard to how the government collects and maintains privately held cyber-intelligence,” especially over the thorny matter of “the privacy rights of individuals whose information may be encompassed in disclosed cyber-intelligence,” added the CRS report.

And there’s another little issue.

“With regard to cyber-intelligence that is possessed by the private sector, legal issues are clouded with uncertainty,” pointed out the study.

Below, quotes the summary of the CRS study:

Over the course of the last year, a host of cyber-attacks has been perpetrated on a number of high profile American companies. The high profile cyber-attacks of 2014 and early 2015 appear to be indicative of a broader trend: the frequency and ferocity of cyber-attacks are increasing, posing grave threats to the national interests of the United States.

“While considerable debate exists with regard to the best strategies for protecting America’s various cyber-systems and promoting cyber-security, one point of general agreement amongst cyber-analysts is the perceived need for enhanced and timely exchange of cyber-threat intelligence both within the private sector and between the private sector and the government.

“Nonetheless, there are many reasons why entities may opt to not participate in a cyber-information sharing scheme, including the potential liability that could result from sharing internal cyber-threat information with other private companies or the government.

“More broadly, the legal issues surrounding cyber-security information sharing—whether it be with regard to sharing between two private companies or the dissemination of cyber-intelligence within the federal government—are complex and have few certain resolutions.

“In this vein, this report examines the various legal issues that arise with respect to the sharing of cyber-security intelligence, with a special focus on two distinct concepts: (1) sharing of cyber-information within the government’s possession and (2) sharing of cyber-information within the possession of the private sector.

“With regard to cyber-intelligence that is possessed by the federal government, the legal landscape is relatively clear: ample legal authority exists for the Department of land Security (DHS) to serve as the central repository and distributor of cyber-intelligence for the federal government.

“Nonetheless, the legal authorities that do exist often overlap, perhaps resulting in confusion as to which of the multiple sub-agencies within DHS or even outside of DHS should be leading efforts on the distribution of cyber-information within the government and with the public.

“Moreover, while the government has wide authority to disclose cyber-intelligence within its possession, that authority is not limitless and is necessarily tied to laws that restrict the government’s ability to release sensitive information within its possession.

“With regard to cyber-intelligence that is possessed by the private sector, legal issues are clouded with uncertainty. A private entity that wishes to share cyber-intelligence with another company, an information sharing organization like an Information Sharing and Analysis Organization (ISAO) or an Information Sharing and Analysis Centers (ISAC), or the federal government may be exposed to civil or even criminal liability from a variety of different federal and state laws.

“Moreover, because of the uncertainty that pervades the interplay between laws of general applicability—like federal anti-trust or privacy law—and their specific application to cyber-intelligence sharing, it may be very difficult for any private entity to accurately assess potential liability that could arise by participating in a sharing scheme.

“In addition, concerns may arise with regard to how the government collects and maintains privately held cyber-intelligence, including fears that the information disclosed to the government could (1) be released through a public records request, (2) result in the forfeit of certain intellectual property rights, (3) be used against a private entity in a subsequent regulatory action, or (4) risk the privacy rights of individuals whose information may be encompassed in disclosed cyber-intelligence.

“The report concludes by examining the major legislative proposal—including the Cyber-Intelligence Sharing and Protection Act (CISPA), Cyber-security Information Sharing Act (CISA), and the Cyber Threat Sharing Act (CTSA) and the potential legal issues that such laws could prompt.”

Sign Up for our e-Newsletter

You can expect to stay well ahead of the game, with the tough, insightful reporting of our e-Newsletter. No info-tainment or shouting matches passed off as ‘news’, but the real deal, sent to your personal e-mail every Monday morning, for less than 30 cents an issue.
Sign Up Today!