Menu

Cyberspace Developments: Obama's Proposed Information-Sharing Bill

Cybersecurity and Privacy   |   Intellectual Property   |   January 15, 2015
Download   
Share Page

In advance of the State of the Union address, President Obama unveiled the next steps in his plan to address recent threats by rogue hackers to public and private networks. These include a new legislative proposal to tackle the information-sharing challenges that can cripple cyberattack responses, and revisions to those provisions of the 2011 legislative proposal on which Congress has yet to act.

The release of this strategy is a significant development in the cybersecurity space. It demonstrates that the White House and Congress are preparing for increased regulation and legislation in this area, going beyond the steps states have already taken. U.S. companies should begin to prepare for increased oversight, regulatory requirements, and enforcement efforts by the federal government on all cybersecurity and information management matters.

The proposed bill codifies mechanisms for enabling cybersecurity information-sharing between private and government entities, and among private entities. The key provisions include:

  • Private companies whose customer data is breached must inform affected individuals within 30 days.
  • Companies would be further encouraged to share cyberthreat information with the Department of Homeland Security’s National Cybersecurity and Communications Integration Center, which, in turn, would share the information with other government agencies and industry groups known as Information Sharing and Analysis Organizations (ISAOs) that are being formed to help monitor and disrupt attacks.
  • Companies that share cyberthreat information would get liability protection for sharing the information, as long as steps are taken to protect consumers’ personal information.

The proposed bill also aims to modernize law enforcement authorities to combat cybercrime. The key criminal provisions include:

  • Update the Racketeering Influenced and Corrupt Organizations Act (RICO) to apply to cybercrimes.
  • Allow for the prosecution of the sale of botnets, computer networks created to carry out cybercrime, and give courts authority to shut down botnets involved in denial of service (DOS) attacks and other fraudulent activity.
  • Criminalize the overseas sale of stolen financial information.
  • Expand federal law enforcement to deter the sale of spyware used to stalk or commit identity theft.
  • Update the Computer Fraud and Abuse Act to make clear it can be used to prosecute insiders who abuse their ability to access information.


©2019 Carlton Fields, P.A. Carlton Fields practices law in California through Carlton Fields, LLP. Carlton Fields publications should not be construed as legal advice on any specific facts or circumstances. The contents are intended for general information and educational purposes only, and should not be relied on as if it were advice about a particular fact situation. The distribution of this publication is not intended to create, and receipt of it does not constitute, an attorney-client relationship with Carlton Fields. This publication may not be quoted or referred to in any other publication or proceeding without the prior written consent of the firm, to be given or withheld at our discretion. To request reprint permission for any of our publications, please use our Contact Us form via the link below. The views set forth herein are the personal views of the author and do not necessarily reflect those of the firm. This site may contain hypertext links to information created and maintained by other entities. Carlton Fields does not control or guarantee the accuracy or completeness of this outside information, nor is the inclusion of a link to be intended as an endorsement of those outside sites.

Subscribe to Publications

Disclaimer

The information on this website is presented as a service for our clients and Internet users and is not intended to be legal advice, nor should you consider it as such. Although we welcome your inquiries, please keep in mind that merely contacting us will not establish an attorney-client relationship between us. Consequently, you should not convey any confidential information to us until a formal attorney-client relationship has been established. Please remember that electronic correspondence on the internet is not secure and that you should not include sensitive or confidential information in messages. With that in mind, we look forward to hearing from you.