CISA’SPRIVACYFACTS
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways
that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
1
FACT
When sharing cyber threat information
with the government, CISA would require
public and private entities to remove
personally identifiable information.
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
2The government can only use cyber
information for “cybersecurity purposes.”
CISA would not allow the government to
use cyber threat information to investigate
or prosecute “serious violent felonies.”
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
3The government is prohibited from
disclosing, retaining, or using information
in ways not authorized by CISA.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
4CISA would require law enforcement
officials to have written consent from an
entity sharing cyber threat information
before investigating a computer crime.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
5The Attorney General will develop and review
privacy and civil liberties guidelines governing
the use of cyber threat information.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
6CISA directs federal entities to regularly
report to Congress to examine the
impact that information sharing has
on privacy and civil liberties.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
7Under CISA, businesses are NOT REQUIRED
to share information with the government.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
8Only businesses that voluntarily share
electronic threat data with the Department
of Homeland Security, a civilian entity,
receive limited liability protections.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
9CISA does not offer businesses safeguards
when sharing threat information with the
Department of Defense (including the
National Security Agency) or the FBI.
FACT
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
JOINTHECOALITION
#VOTECISA
WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA

CISA's Privacy Facts

  • 1.
    CISA’SPRIVACYFACTS WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY| #VOTECISA The Cybersecurity Information Sharing Act (CISA) would spur cyber threat information sharing in smart ways that protect and respect privacy. The bipartisan bill includes compromises from multiple stakeholders.
  • 2.
    1 FACT When sharing cyberthreat information with the government, CISA would require public and private entities to remove personally identifiable information. WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 3.
    2The government canonly use cyber information for “cybersecurity purposes.” CISA would not allow the government to use cyber threat information to investigate or prosecute “serious violent felonies.” FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 4.
    3The government isprohibited from disclosing, retaining, or using information in ways not authorized by CISA. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 5.
    4CISA would requirelaw enforcement officials to have written consent from an entity sharing cyber threat information before investigating a computer crime. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 6.
    5The Attorney Generalwill develop and review privacy and civil liberties guidelines governing the use of cyber threat information. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 7.
    6CISA directs federalentities to regularly report to Congress to examine the impact that information sharing has on privacy and civil liberties. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 8.
    7Under CISA, businessesare NOT REQUIRED to share information with the government. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 9.
    8Only businesses thatvoluntarily share electronic threat data with the Department of Homeland Security, a civilian entity, receive limited liability protections. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 10.
    9CISA does notoffer businesses safeguards when sharing threat information with the Department of Defense (including the National Security Agency) or the FBI. FACT WWW.CYBERSECURITYADVOCACY.COM | @CYBERSECURITY | #VOTECISA
  • 11.