• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • Heritage Cyber Chart: Cyber Legislation Compared

    Cybersecurity is a vital national security and economic issue. To better inform Congress, Heritage has assembled a cybersecurity chart that seeks to lay bare many of the details of the competing cybersecurity bills, including CISPA, the Cybersecurity Act of 2012, and SECURE IT. While these bills contain many similarities, the differences make them vastly different in their approach, effectiveness, and cost.

    The House of Representatives considered various proposals before approving the Cyber Intelligence Sharing and Protection Act (CISPA) in April. CISPA relies on voluntary information sharing among and between the private sector and the government. Heritage released a number of reports on CISPA, including our final analysis of the bill after passage.

    Though it started as a strong bill, certain key changes—including the weakening of liability protection and the addition of artificial restrictions on use—made the bill significantly weaker in accomplishing information sharing. CISPA’s general premise of encouraging information still remains, though, and could be improved in conference.

    The Senate is currently ground zero for cybersecurity legislation, as two bills battle for votes: the Cybersecurity Act of 2012, by Senators Joseph Lieberman (I–CT) and Susan Collins (R–ME), and the Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act of 2012 (SECURE IT) by Senator John McCain (R–AZ). SECURE IT takes a similar approach to CISPA in encouraging voluntary information sharing, but so far it includes stronger liability protections, which is a critical improvement.

    Opposed to SECURE IT, the Cybersecurity Act of 2012 uses a different strategy to achieve cybersecurity. Though it includes information-sharing provisions (albeit weaker than SECURE IT), the main focus of the bill is on regulating critical infrastructure. The bill would set in motion a process to determine which facilities and networks need cybersecurity improvements and then require those networks to improve their cybersecurity to some level. Though the Cybersecurity Act tried to be creative in its regulatory efforts, it still faces critical problems of adaptability, cost, and cost-effectiveness.

    The Heritage cyber chart describes the position of each bill on information sharing, the role of the government, and costs and regulations that each bill would impose. Before Congress acts, it should closely consider how well each provision improves our security and how cost effective it is.

    Posted in Security [slideshow_deploy]

    2 Responses to Heritage Cyber Chart: Cyber Legislation Compared

    1. Andrew says:

      Yeah, they claim it's for our "protection", but really this is just another attempt by the government to seize control of the net, and the people won't stand for it. CISPA, SOPA, ACTA, it doesn't matter what they call it, it's all the same, with corrupt politicians trying to pass draconian laws so they can maintain control of the people. I hope CISPA and whatever new bill they come up with after it blows up in their faces.

    2. Tymon says:

      I'm sorry but what? "Before Congress acts, it should closely consider how well each provision improves our security and how cost effective it is." How about 'How each provision tramples upon our rights in the name of the almighty dollar'? The only people this keeps 'secure' are the rich people of the MPAA and RIAA

    Comments are subject to approval and moderation. We remind everyone that The Heritage Foundation promotes a civil society where ideas and debate flourish. Please be respectful of each other and the subjects of any criticism. While we may not always agree on policy, we should all agree that being appropriately informed is everyone's intention visiting this site. Profanity, lewdness, personal attacks, and other forms of incivility will not be tolerated. Please keep your thoughts brief and avoid ALL CAPS. While we respect your first amendment rights, we are obligated to our readers to maintain these standards. Thanks for joining the conversation.

    Big Government Is NOT the Answer

    Your tax dollars are being spent on programs that we really don't need.

    I Agree I Disagree ×

    Get Heritage In Your Inbox — FREE!

    Heritage Foundation e-mails keep you updated on the ongoing policy battles in Washington and around the country.