Cybersecurity

Justice reassures ISPs on information-sharing

Privacy and Information-sharing

The Department of Justice has moved to reassure Internet service providers and private industry about what it believes "information sharing" in federal communications law means in the fight against cyberattack and intrusion.

As the number and severity of cybercrimes and attacks against private and public institutions grow, ISPs and private industry have become increasingly concerned about their legal obligations and protections in providing threat information to the federal government.

In a seven-page white paper released May 9, DOJ spelled out its views on whether the Stored Communications Act restricts Internet service providers and other private network operators from voluntarily sharing aggregated data with the government.

The 1986 law bars ISPs from voluntarily giving customer information to federal agencies. But the white paper's bottom line is that the act does not preclude companies from providing aggregate data to the government if those records do not contain specific, detailed information on customers.

"We understand that the private sector would benefit from a better understanding of whether the electronic communications statutes that the Department of Justice routinely interprets and enforces prohibit them from voluntarily sharing useful cybersecurity information with the government," said the paper.

The report said that companies have expressed a desire to share information with the government, "but have had questions about exactly what information may lawfully be shared" and what is restricted.

Taking too broad a view of those restrictions is bad for everybody, according to the DOJ.

"Overly expansive views of what information is prohibited from voluntary disclosure could unnecessarily prevent the sharing of important information that would be used to enhance cybersecurity, thereby thwarting opportunities to address a substantial challenge facing our modern society," the white paper said.

About the Author

Mark Rockwell is a staff writer at FCW.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.

Featured

  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • Login.gov moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group