Essential for Cybersecurity and Privacy: Wyden Amendment No. 2621 is the Best Path Forward
Strengthens the Requirement for Companies to Remove Personal Information
“In 20 years of doing cybersecurity鈥 have never seen a package of threat intelligence that’s actionable that also includes personally identifiable information.” –, testifying on cybersecurity information sharing legislation before the House Permanent Select Committee on Intelligence (February 14, 2013).
鈥淧rivate information about individual users is often a detriment in developing threat signatures鈥ny bill that allows for and results in significant sharing of personal information could decrease the signal to noise ratio and make IoCs less actionable.鈥 -Letter on information sharing legislation from (April 16, 2015).
Unnecessary sharing and dissemination of PII 鈥渨ould fail to mitigate and in fact would contribute to the compromise of personally identifiable information by spreading it further.鈥 –, letter to Sen. Franken (July 31, 2015).
The Senate Must Strengthen the Requirement for Companies to Remove PII
The most important improvement the Senate can make to CISA during the amendment and debate process it to enhance the front-end protections for communications content and personally identifiable information (PII) by strengthening the requirement to remove that sensitive and unnecessary information. Strengthening this requirement would reduce all other privacy and civil liberties concerns, since there would be less PII to be mishandled or misused by the government or by companies.
Because of how broadly CISA defines the term 鈥渃yber threat indicator鈥 is defined, the information that is shared could include a tremendous amount of unnecessary personal information. A chart outlining the some of the types of 鈥渃yber threat indicators鈥 that could be shared which could have the most personal information, and what that information could reveal, is available .
There are two amendments that address this important issue – the Wyden amendment () and the Heller amendment (). OTI strongly supports the Wyden amendment because it will significantly enhance both cybersecurity and privacy. OTI is neutral on the Heller amendment because, while it would be an improvement upon the status quo, that improvement would be marginal and incomplete.
Why Removal of PII is Important for Cybersecurity and for Privacy
As is evident from the above quotes from leading cybersecurity experts, PII is generally not useful information for preventing or defending against cyber threats. In fact, when companies share more PII, cyber threat indicators will become less useful and the cybersecurity threat will increase. First, sharing unnecessary PII makes protecting against cyber threats harder because it makes actionable information less obvious, since security experts will have to sift through those excess data to identify the threat. Second, the more widely PII is distributed, the more those sensitive data – and the companies and government entities that hold it – will be targeted by malicious actors who seek to improperly access and use that information.
Why CISA鈥檚 Current Requirement to Remove PII is Dangerously Weak:
CISA requires only that companies review cyber threat indicators and remove personal or identifiable information if they know at the time of sharing that it is not directly related to the threat. This is problematic in three ways:
-
There is no standard established for what would constitute a sufficient review of the information to identify PII, so companies could engage in cursory reviews that would not be sufficient to identify the majority of the PII that might be improperly or unnecessarily shared, and then share that information nonetheless.
-
By requiring only that PII be removed if the company knows at the time of sharing that it is not directly related to the cyber threat, CISA allows most – if not all – PII to be shared. This is because a company can default to leaving all PII in indicators that it shares, asserting that it does not have complete situational awareness of all cyber threats and thus does not 鈥渒now鈥 if PII is not directly related to one.
-
While in rare instances there may be some PII that is helpful in identifying or protecting against a cyber threat, most PII is unnecessary. By allowing PII to be shared so long as it is directly related to a threat, CISA may allow vast amounts of unnecessary personal information to be shared, including victim information.
OTI Supports Wyden :
Senator Wyden鈥檚 amendment would improve cybersecurity and better protect privacy by reducing the amount of unnecessary and inactionable PII that could be shared, and increasing how useful 鈥渃yber threat indicators鈥 would be. This amendment effectively addresses all three concerns with how CISA鈥檚 current requirement to remove PII is drafted.
-
Effective Protection for PII: This amendment would allow only actionable or useful PII to be shared since it would only permit PII to be shared if it is 鈥渘ecessary to describe or identify a cybersecurity threat.鈥
-
Reasonable and Flexible Efficacy Standard for Companies: This amendment requires that companies review cyber threat indicators to identify and remove unnecessary PII 鈥渢o the extent feasible.鈥 This is a good standard. It does not call for perfection, but rather is flexible, asking companies to protect their users鈥 information by removing PII to the degree possible given their resources and capabilities. Thus, under this standard, a major tech company would be expected to be better able to identify and remove unnecessary PII than a small business or a start-up company.
OTI is Neutral on Heller :
Senator Heller鈥檚 amendment would make a small improvement over the status quo. Its positive impact on cybersecurity and privacy would not be nearly as significant as that of the Wyden amendment.
-
Marginally Better Protection for PII: The Heller amendment requires the government to remove PII if, at the time of sharing, they 鈥渞easonably believe鈥 that PII is not directly related to a cyber threat. This addresses the concern that if companies to unnecessarily leave PII in cyber threat indicators when sharing it, some of that PII will be removed before the cyber threat indicators are further shared with the government. However, it does not raise the standard to ensure that companies will remove unnecessary PII, and allows them to default to sharing that PII unless they know that it is not directly related to the threat.
-
No Efficacy Standard: The Heller amendment does not establish a standard for how effective the government鈥檚 processes for identifying and removing PII must be. Thus, the government could engage in a mere cursory review to identify and remove PII before sharing the information.
A chart analyzing CISA amendments is available at .