SlideShare a Scribd company logo
CISA’SPRIVACYFACTS
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways
that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
1
FACT
When sharing cyber threat information
with the government, CISA would require
public and private entities to remove
personally identifiable information.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
2The government can only use cyber
information for “cybersecurity purposes.”
CISA would not allow the government to
use cyber threat information to investigate
or prosecute “serious violent felonies.”
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
3The government is prohibited from
disclosing, retaining, or using information
in ways not authorized by CISA.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
4CISA would require law enforcement
officials to have written consent from an
entity sharing cyber threat information
before investigating a computer crime.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
5The Attorney General will develop and review
privacy and civil liberties guidelines governing
the use of cyber threat information.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
6CISA directs federal entities to regularly
report to Congress to examine the
impact that information sharing has
on privacy and civil liberties.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
7Under CISA, businesses are NOT REQUIRED
to share information with the government.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
8Only businesses that voluntarily share
electronic threat data with the Department
of Homeland Security, a civilian entity,
receive limited liability protections.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
9CISA does not offer businesses safeguards
when sharing threat information with the
Department of Defense (including the
National Security Agency) or the FBI.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
JOINTHECOALITION
#VOTECISA
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

More Related Content

PDF
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
PDF
What's new with Cybersecurity in Singapore?
PDF
McAfee's Commitment to Innovation - Chris Young
PDF
Equifax Flyer Aug 2017
PDF
The Equifax Data Breach - How to Tell if You've Been Impacted
DOCX
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
PPTX
State of cybersecurity report 2020- Post Covid 19
PDF
QTS Datacenters-Cyber Security infographic
5 Reasons to Support Cybersecurity Information Sharing Act (CISA)
What's new with Cybersecurity in Singapore?
McAfee's Commitment to Innovation - Chris Young
Equifax Flyer Aug 2017
The Equifax Data Breach - How to Tell if You've Been Impacted
Nearly 80 billion dollars were spent in 2016 to fight cybercrime
State of cybersecurity report 2020- Post Covid 19
QTS Datacenters-Cyber Security infographic

What's hot (20)

PPTX
Ccpa compliance services in usa
PPTX
The Rise of California Cybercrime
PPTX
Cyber Crime Seminar Jan 2015
PDF
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
PPTX
Cyber security (2) (2)
PDF
Is your cloud GDPR compliant?
PPTX
Cyber security awareness & training 2.1
PPTX
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
PPTX
Tackling the maze ransomware attack with security testing
PDF
Coordinated cyber attacks known as op qatar terrorizes qatar once again
PPTX
Security v. Privacy: the great debate
PPT
Cyber law
PPT
Cómo usar la tecnología para generar más Seguridad y desarrollo local
PPTX
Top 5 it security threats for 2015
PDF
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
PDF
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
PDF
Cryptocurrency Scams | How Do You Protect Yourself?
PPTX
Matthew Hough Clewes | Cyber Crime and its Impacts
Ccpa compliance services in usa
The Rise of California Cybercrime
Cyber Crime Seminar Jan 2015
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
Cyber security (2) (2)
Is your cloud GDPR compliant?
Cyber security awareness & training 2.1
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Tackling the maze ransomware attack with security testing
Coordinated cyber attacks known as op qatar terrorizes qatar once again
Security v. Privacy: the great debate
Cyber law
Cómo usar la tecnología para generar más Seguridad y desarrollo local
Top 5 it security threats for 2015
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
SOFE_CDS_NAIC_Principles_for_Effective_Cybersecurity_2016-08-04-2016
Opening Keynote (Identity Live Berlin 2018)
TeleSign’s Findings on the Future of Digital Identity, Guillaume Bourcy
Cryptocurrency Scams | How Do You Protect Yourself?
Matthew Hough Clewes | Cyber Crime and its Impacts
Ad

Similar to CISA's Privacy Facts (20)

PDF
Open Letter From EFF Opposing CISPA
DOCX
New York Washington, D.C. Los Angeles Palo.docx
PDF
Naavi theory regulated_anonymity
PPT
Hass & Associates Online Reviews
PDF
Legal and regulatory environment e commerce
PDF
Digital security law security of individual or government
PDF
State of Encryption in Kenya
PPTX
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
PPT
#DCI11 Access to Information
PDF
Internet Privacy Essay
PPTX
Onlinecrime and New Cyber Laws in Pakistan
DOC
Cyber-Law and Cyber-Crime
DOC
Cyber law and cyber-crime
PPTX
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
PPT
Cyber laws
PDF
Why Hackers Win Power And Disruption In The Network Society Patrick Burkart T...
PDF
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
DOCX
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
PDF
Cybersecurity Whistleblower Protection Guide
PPT
Cyberlaw An Overview
Open Letter From EFF Opposing CISPA
New York Washington, D.C. Los Angeles Palo.docx
Naavi theory regulated_anonymity
Hass & Associates Online Reviews
Legal and regulatory environment e commerce
Digital security law security of individual or government
State of Encryption in Kenya
CYBERCRIME - WHEN THE VIRTUAL WORLD BECOMES A CRIMINAL PLAYGROUND
#DCI11 Access to Information
Internet Privacy Essay
Onlinecrime and New Cyber Laws in Pakistan
Cyber-Law and Cyber-Crime
Cyber law and cyber-crime
OVERVIEW OF CYBER LAWS IN INDIA AND SECTIONS
Cyber laws
Why Hackers Win Power And Disruption In The Network Society Patrick Burkart T...
HCMUT IMP Computer Science 20 - E-Government from the view of Privacy
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
Cybersecurity Whistleblower Protection Guide
Cyberlaw An Overview
Ad

More from U.S. Chamber of Commerce (20)

PDF
Brexit Webinar Series 5
PDF
Brexit Webinar Series 4
PDF
Brexit Webinar Series 3
PDF
Brexit Webinar Series 2
PDF
Brexit Webinar Series 1
PDF
Tell Congress: Ditch WOTUS
PDF
ASEAN Business Outlook Survey 2016
PDF
Elementary and Secondary Education Act
PDF
The threat to small business retirement savings
PDF
Let's Rebuild America
PDF
Key vote alert! - Trade Promotion Authority
PDF
What Can You Do to Prevent Childhood Obesity?
PDF
Innovation that Matters
PDF
Where's the accountability?
PDF
Youth Employment
PDF
A Brief History of Keystone XL
PDF
Behind the Red Tape
PDF
5 Steps to Get Our Rules Right
PDF
East Meets West: Massachusetts vs Washington
PDF
America's Offshore Resources
Brexit Webinar Series 5
Brexit Webinar Series 4
Brexit Webinar Series 3
Brexit Webinar Series 2
Brexit Webinar Series 1
Tell Congress: Ditch WOTUS
ASEAN Business Outlook Survey 2016
Elementary and Secondary Education Act
The threat to small business retirement savings
Let's Rebuild America
Key vote alert! - Trade Promotion Authority
What Can You Do to Prevent Childhood Obesity?
Innovation that Matters
Where's the accountability?
Youth Employment
A Brief History of Keystone XL
Behind the Red Tape
5 Steps to Get Our Rules Right
East Meets West: Massachusetts vs Washington
America's Offshore Resources

Recently uploaded (20)

PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Architecture types and enterprise applications.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPTX
The various Industrial Revolutions .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
project resource management chapter-09.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
cloud_computing_Infrastucture_as_cloud_p
Architecture types and enterprise applications.pdf
WOOl fibre morphology and structure.pdf for textiles
OMC Textile Division Presentation 2021.pptx
Developing a website for English-speaking practice to English as a foreign la...
The various Industrial Revolutions .pptx
Tartificialntelligence_presentation.pptx
Getting Started with Data Integration: FME Form 101
TLE Review Electricity (Electricity).pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Module 1.ppt Iot fundamentals and Architecture
Univ-Connecticut-ChatGPT-Presentaion.pdf
Programs and apps: productivity, graphics, security and other tools
project resource management chapter-09.pdf
NewMind AI Weekly Chronicles - August'25-Week II
observCloud-Native Containerability and monitoring.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A novel scalable deep ensemble learning framework for big data classification...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11

CISA's Privacy Facts

  • 1. CISA’SPRIVACYFACTS WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
  • 2. 1 FACT When sharing cyber threat information with the government, CISA would require public and private entities to remove personally identifiable information. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 3. 2The government can only use cyber information for “cybersecurity purposes.” CISA would not allow the government to use cyber threat information to investigate or prosecute “serious violent felonies.” FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 4. 3The government is prohibited from disclosing, retaining, or using information in ways not authorized by CISA. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 5. 4CISA would require law enforcement officials to have written consent from an entity sharing cyber threat information before investigating a computer crime. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 6. 5The Attorney General will develop and review privacy and civil liberties guidelines governing the use of cyber threat information. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 7. 6CISA directs federal entities to regularly report to Congress to examine the impact that information sharing has on privacy and civil liberties. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 8. 7Under CISA, businesses are NOT REQUIRED to share information with the government. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 9. 8Only businesses that voluntarily share electronic threat data with the Department of Homeland Security, a civilian entity, receive limited liability protections. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 10. 9CISA does not offer businesses safeguards when sharing threat information with the Department of Defense (including the National Security Agency) or the FBI. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA