Eclectic Technology
224.6K views | +4 today
Follow
Eclectic Technology
Tech tools that assist all students to be independent learners & teachers to become better teachers
Curated by Beth Dichter
Your new post is loading...
Your new post is loading...
Scooped by Beth Dichter
Scoop.it!

CISPA: An Alternate Future Where Your Personal Privacy No Longer Exists

CISPA: An Alternate Future Where Your Personal Privacy No Longer Exists | Eclectic Technology | Scoop.it
Last week the House of Representatives passed the Cyber Intelligence Sharing and Protection Act (CISPA), a follow-up bill to SOPA that wants to erode your personal privacy.

This bill has received support from many corporations...but many still question the need for this specific legislation. Lifehacker has created "a fictional narrative based on what we believe the U.S. might be life if CISPA is passed into law, based on an in-depth inteview with Derek Bambauer, Associate Professor of Law at Brooklyn Law School." 

Reading this fictional narrative may help you understand some of the issues around CISPA.

No comment yet.
Scooped by Beth Dichter
Scoop.it!

Cyber Intelligence Sharing Protection Act: SOPA's Evil Twin [Infographic]

Cyber Intelligence Sharing  Protection Act: SOPA's Evil Twin [Infographic] | Eclectic Technology | Scoop.it
We stopped SOPA, but the legislative threats to the open Internet keep on coming. The latest is the Cyber Intelligence Sharing and Protection Act (CISPA).
No comment yet.
Scooped by Beth Dichter
Scoop.it!

Where CISPA's Going: Everything You Need to Know

Where CISPA's Going: Everything You Need to Know | Eclectic Technology | Scoop.it
An amended version of CISPA passed the House this week. Here's what you need to know about its future.

On the surface one might not question CIPSA. The bill states that private businesses may share cybersecurity information other private businesses and the U.S. federal government. But...there are two (at least) sections that have raised issues for many. Quoting from this article "would allow CISPA to be used in any case where national security is deemed at risk — a potentially broad category. The second would protect any business that shares cybersecurity information from lawsuits — including suits from users who think their private information may have been shared without justification." Read on for more information.

No comment yet.