BRUSSELS — The European Parliament narrowly (285 vs 281 votes) adopted a nonbinding but nonetheless forceful resolution on Thursday urging the 28 nations of the European Union to recognize Edward J. Snowden as a "whistle-blower and international human rights defender" and to shield him from prosecution.
On Twitter, Mr. Snowden, the former National Security Agency contractor who leaked documents about electronic surveillance by the American government, called the vote a "game-changer."
But the resolution has no legal force and limited practical effect for Mr. Snowden, who is living in Russia on a three-year residency permit. Whether to grant Mr. Snowden asylum remains a decision for the individual European governments, and thus far, none have done so.
(Score: 2) by Runaway1956 on Monday November 02 2015, @01:06AM
(C) facilitate information sharing, inter-
5
action, and collaboration among and between
6
the Federal Government; State, local, tribal,
7
and territorial governments; and cybersecurity
8
providers and self-protected entities
(6) I
NFORMATION SHARING RELATIONSHIPS
.—
1
Nothing in this section shall be construed to—
2
(A) alter existing agreements or prohibit
3
new agreements with respect to the sharing of
4
cyber threat information between the Depart-
5
ment of Defense and an entity that is part of
6
the defense industrial base;
7
(B) alter existing information-sharing rela-
8
tionships between a cybersecurity provider, pro-
9
tected entity, or self-protected entity and the
10
Federal Government;
(D) alter existing agreements or prohibit
19
new agreements with respect to the sharing of
20
cyber threat information between the Depart-
21
ment of Treasury and an entity that is part of
22
the financial services sector.
8
HR 624 RFS
(A) D
ISCUSSIONS AND ASSISTANCE
.—
1
Nothing in this section shall be construed to
2
prohibit any department or agency of the Fed-
3
eral Government from engaging in formal or in-
4
formal technical discussion regarding cyber
5
threat information with a cybersecurity provider
6
or self-protected entity or from providing tech-
7
nical assistance to address vulnerabilities or
8
mitigate threats at the request of such a pro-
9
vider or such an entity.
(B) C
OORDINATION
.—Any department or
11
agency of the Federal Government engaging in
12
an activity referred to in subparagraph (A)
13
shall coordinate such activity with the entity of
14
the Department of Homeland Security des-
15
ignated under paragraph (1) and share all sig-
16
nificant information resulting from such activity
17
with such entity and all other appropriate de-
18
partments and agencies of the Federal Govern-
19
ment.
‘
CYBER THREAT INTELLIGENCE AND INFORMATION
14
SHARING
15
‘‘S
EC
. 1104. (a) I
NTELLIGENCE
C
OMMUNITY
S
HAR
-
16
ING OF
C
YBER
T
HREAT
I
NTELLIGENCE
W
ITH
P
RIVATE
17
S
ECTOR AND
U
TILITIES
.—
18
‘‘(1) I
N GENERAL
.—The Director of National
19
Intelligence shall establish procedures to allow ele-
20
ments of the intelligence community to share cyber
21
threat intelligence with private-sector entities and
22
utilities and to encourage the sharing of such intel-
23
ligence.
There's more, of course. Do you need me to c/p the entire bill here? Yes, I've read it. Any and all corporations that have some legitimate security role gets access to the stuff.
One of the real kickers in this bill is:
‘‘(3) E
XEMPTION FROM LIABILITY
.—
1
‘‘(A) E
XEMPTION
.—No civil or criminal
2
cause of action shall lie or be maintained in
3
Federal or State court against a protected enti-
4
ty, self-protected entity, cybersecurity provider,
5
or an officer, employee, or agent of a protected
6
entity, self-protected entity, or cybersecurity
7
provider, acting in good faith—
Let us note that our librarians are still looking out for our interests:
‘‘(4) P
ROTECTION OF SENSITIVE PERSONAL
19
DOCUMENTS
.—The Federal Government may not
20
use the following information, containing informa-
21
tion that identifies a person, shared with the Federal
22
Government in accordance with subsection (b):
23
‘‘(A) Library circulation records.
24
‘‘(B) Library patron lists.
25
VerDate Mar 15 2010 01:12 Apr 23, 2013 Jkt 029200 PO 00000 Frm 00023 Fmt 6652 Sfmt 6201 E:\BILLS\H624.RFS H624
PWALKER on DSK7TPTVN1PROD with BILLS
24
HR 624 RFS
‘‘(C) Book sales records.
1
‘‘(D) Book customer lists.
2
‘‘(E) Firearms sales records.
3
‘‘(F) Tax return records.
4
‘‘(G) Educational records.
5
‘‘(H) Medical records.
Here's another kicker - the bill recognizes that consumers are products, not customers.
DATA.
19
Nothing in this Act or the amendments made by this
20
Act shall be construed to provide new or alter any existing
21
authority for an entity to sell personal information of a
22
consumer to another entity for marketing purposes.
Now, who do you think that last applies to? Facebook, linkedin, twitter, Gmail, and every other corporation that makes money mining you for data.
Again, yes, I've read it. I've read it from start to finish, I've read other people's analysis of the proposed law, and I've read it again and again. CISPA formalizes the fact that Corporate America has free reign to data mine the population, to share that data with government, and to benefit from government sharing that data with the corporations.
(Score: 2) by frojack on Monday November 02 2015, @01:24AM
Perfectly Horrible paste job.
Nothing in this Act or the amendments made by this
Act shall be construed to provide new or alter any existing
authority for an entity to sell personal information of a
consumer to another entity for marketing purposes.
No new authority to sell information. The existing consumer protection rules, which have been tightened over time, still prevail.
No, you are mistaken. I've always had this sig.