Critical Infrastructure Protection, Information Sharing and Cyber Security
Public Sector Links
DHS CSVA (17MB)
and related documents (May 2009)
Private Sector Links
Critical Infrastructure Protection and Information Sharing
As 85% of our nation's critical infrastructure is owned or operated by the private sector, it is vital to our economic and national security that business is actively involved in the formulation of homeland security policies. One of the most important next steps to critical infrastructure protection is establishing a set of rules that provide legal protection for companies who conduct risk assessments and share information on vulnerabilities with the appropriate government entities. Without legal and regulatory protection, companies risk exposure to antitrust sanctions stemming from sharing information or to lawsuits from customers over the disclosure of the companies' vulnerability to intentional interference or incapacitation.
U.S. Chamber Activities
The Chamber will work with the appropriate government entities to establish rules that will give critical infrastructure owners the protection they need from liability and freedom of information act requests, while also requiring the government to keep confidential proprietary business information.
The rapid adoption of information technology has transformed global commerce. By using the internet, people can shop anywhere in the world, without ever leaving their homes. Thanks to the "Information Revolution", businesses are increasingly more productive, are open to additional markets, and more people have access to critical information faster than ever before.
However, this same revolution that propels global commerce also emboldens hackers, thieves, and other cyber criminals. Unprotected computers are susceptible to viruses and worms that can damage or destroy a company's network. These risks must be effectively managed if businesses are to consolidate and build upon the opportunities created by the information revolution.
U.S. Chamber Activities
The Chamber works to influence policies, legislation, and regulations that promote private sector solutions to cyber security. We support legislation and regulations that enable companies to share information about threats to and breach of computer network security without fear of criminal or civil liability.
2011 National Strategy for Trusted Identities in Cyberspace Release Event
As a way to combat online identity theft in the age of digital shoplifting, the White House has developed a plan dubbed the National Strategy for Trusted Identities in Cyberspace, or NSTIC. "Today, we take another major step; this one to ensure that the Internet's security features keep up with the many different types of online transactions people now engage in," Commerce Secretary Gary Locke (Above) said at the unveiling at the U.S. Chamber of Commerce last week.
Howard A. Schmidt, White House Cybersecurity Coordinator, says the strategy does not call for a card but a choice for individuals.