- The Foundry: Conservative Policy News from The Heritage Foundation - http://blog.heritage.org -

Cybersecurity Act of 2012 Defeated, but a Similarly Flawed Executive Order Is Around the Corner

Posted By David Inserra On November 15, 2012 @ 2:59 pm In Featured | Comments Disabled

Last night, the Cybersecurity Act of 2012 (CSA) failed to pass [1] the U.S. Senate. The vote is already being portrayed as Republican obstructionism, even though five Democrats voted against the bill and four Republicans voted for it.

Such rhetoric is being used to justify a cybersecurity executive order [2] that mimics the CSA. Instead of using cybersecurity as a political bludgeon for more executive power grabs, Congress should continue to debate the real policy differences that cross party lines.

The CSA failed to the pass the Senate because it uses a regulatory approach to cybersecurity. The House of Representatives did not even consider such a regulatory option. The executive order, however, takes the same regulatory approach that has been rejected in both houses of Congress.

The reason Congress could not agree to cybersecurity regulations is because there are too many questions left unanswered [3] and too many concerns unaddressed [4]. The executive order answers none of these questions and leaves cybersecurity regulations completely up to executive whim. If the executive order is issued, the U.S. would just have to wait and see to figure out the answers to these questions:

  • How much would it cost?
  • What critical infrastructure would be covered?
  • Would the standards be outdated before they even take effect?
  • How would it affect innovation?
  • Can the government develop good standards?

These and other important questions deserve to answered, but the Administration does not seem interested in finding out the answers. Most likely, it is because the answers don’t look good.

The cost of regulations is unknown, but depending on what regulators come up with, the cost to the private sector could potentially be very high. The scope of such regulations could also be widespread, hitting business from agriculture to banking. Cyber regulations would likely be outdated before they are even finalized. Regulations would likely stifle innovation [5], not enhance it. And given the ongoing failure [6] of the U.S. government to protect itself from cybersecurity attacks, there isn’t a very good reason to put our faith in government-driven rules.

Instead of issuing an executive order with a flawed cybersecurity approach similar to the twice-defeated CSA, the Administration should focus on more nimble and less costly solutions, such as information sharing. Information sharing provides the government and the private sector with up-to-date warnings against cyber threats and vulnerabilities while costing nearly nothing.

Since both the Senate and House agreed that information sharing is important, sharing, not regulation, should serve as the basis for a meaningful and bipartisan cybersecurity bill during the next Congress.


Article printed from The Foundry: Conservative Policy News from The Heritage Foundation: http://blog.heritage.org

URL to article: http://blog.heritage.org/2012/11/15/cybersecurity-act-of-2012-defeated-but-a-similarly-flawed-executive-order-is-around-the-corner/

URLs in this post:

[1] failed to pass: http://www.bloomberg.com/news/2012-11-15/cybersecurity-bill-killed-paving-way-for-executive-order.html

[2] cybersecurity executive order: http://www.heritage.org/research/reports/2012/11/cybersecurity-draft-executive-order-pushes-for-more-government-control

[3] questions left unanswered: http://www.heritage.org/research/reports/2012/07/questions-on-cybersecurity-that-need-to-be-answered?query=Cybersecurity+Legislation:+Questions+That+Need+to+Be+Answered

[4] concerns unaddressed: http://www.heritage.org/research/reports/2012/07/cybersecurity-act-of-2012-revised-cyber-bill-still-has-problems

[5] stifle innovation: http://www.heritage.org/research/reports/2012/06/cybersecurity-and-red-tape-more-regulations-not-the-answer

[6] ongoing failure: http://www.heritage.org/research/reports/2012/11/cybersecurity-breaches-and-failures-in-the-us-government-continue

Copyright © 2011 The Heritage Foundation. All rights reserved.