CLS Blue Sky Blog

Sullivan & Cromwell discusses The Cybersecurity Act of 2015

On December 18, 2015, President Obama signed into law the Cybersecurity Act of 2015. The Act, arguably the most significant piece of federal cyber-related legislation enacted to date, establishes a mechanism for cybersecurity information sharing among private‑sector and federal government entities. It also provides safe harbors from liability for private entities that share cybersecurity information in accordance with certain procedures, and it authorizes various entities, including outside the federal government, to monitor certain information systems and operate defensive measures for cybersecurity purposes. The Act also contains provisions designed to bolster cybersecurity protections at federal agencies, assess the federal government’s cybersecurity workforce, and implement a range of measures intended to improve the cybersecurity preparedness of critical information systems and networks.

BACKGROUND

For nearly two decades, information relating to potential cyber threats has been shared through industry-specific Information Sharing and Analysis Centers (“ISACs”), established in 1998 under the auspices of Presidential Decision Directive 63. Despite the growth and importance of ISACs, participants and commentators have expressed concern that perceived risks associated with information sharing—including potential civil liability, antitrust issues, and the protection of intellectual property and other proprietary business information—have limited the effectiveness of ISACs and other information-sharing efforts.

On February 13, 2015, President Obama signed Executive Order 13691 “to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government.” The Order encouraged the development of Information Sharing and Analysis Organizations (“ISAOs”) and of a common set of voluntary standards for ISAOs, including privacy protections. It also clarified the authority and operational framework of the National Cybersecurity and Communications Integration Center (“NCCIC”), a civilian agency in the Department of Homeland Security (“DHS”) tasked with coordinating the sharing of information within the federal government and with entities outside the government. Finally, it added DHS to the list of federal agencies that approve classified information-sharing arrangements to streamline private companies’ ability to access classified cybersecurity threat information.

Building on Executive Order 13691, in April 2015, the House of Representatives passed two bills—one reported by the House Permanent Select Committee on Intelligence and the other by the House Committee on Homeland Security—intended to encourage information sharing within the private sector and between the private sector and the government. In October 2015, the Senate passed a separate cybersecurity information-sharing bill, which was reported by the Senate Select Committee on Intelligence. While the three bills were similar in many ways and would all have encouraged the voluntary sharing of cybersecurity threat information, they differed in important respects. Significantly, the House Committee on Homeland Security’s bill and the Senate bill would have vested oversight of the information-sharing apparatus in DHS, while the House Intelligence Committee’s bill would instead have placed that responsibility with the intelligence community. Title I of the Cybersecurity Act of 2015, which is called the Cybersecurity Information Sharing Act of 2015 (“CISA”), is the product of intense negotiations to reconcile the three bills.

POINTS OF EMPHASIS

The Cybersecurity Act of 2015—and particularly the information-sharing mechanism it implements through CISA—is expected to set the parameters for how federal departments and agencies, as well as private entities and state, tribal, and local government agencies (collectively, “Non-Federal Entities”), share and receive cybersecurity-related information. The legislation is the product of years of discussions, numerous bill drafts, and extended debates about the privacy and liability risks associated with information sharing. Privacy advocates and civil liberties groups continue to express concern about some of the Act’s provisions.[1] On the other hand, industry groups such as the U.S. Chamber of Commerce and the Financial Services Roundtable have lauded the Act as a crucial step forward in protecting Americans’ data and intellectual property from devastating cyberattacks.[2]

The following are a few key points regarding the legislation, which is reviewed in detail below:

Entities engaged in or contemplating information sharing are advised to review the Cybersecurity Act of 2015 closely and may wish to consult counsel to better understand the requirements of the Act and the legal protections from which they may be able to benefit.

OVERVIEW OF THE ACT

The Cybersecurity Act of 2015 contains four titles:

A.    Title I – Cybersecurity Information Sharing Act of 2015

Title I of the Act, CISA, establishes mechanisms by which (a) federal departments and agencies can share cybersecurity information with one another and with Non-Federal Entities; and (b) Non-Federal Entities can share cybersecurity information with one another and with federal departments and agencies. It also provides several safe harbors from liability for private entities that share cybersecurity information in accordance with its procedures and the processes that DHS is to promulgate, and it authorizes Non‑Federal Entities to monitor certain information systems and operate defensive measures for cybersecurity purposes. Finally, it establishes reporting mechanisms designed to keep Congress apprised of the implementation of information-sharing measures; compliance with information-sharing policies, procedures and guidelines; the protection of personal privacy through removal of personal data from shared information; and the general state of cybersecurity threats directed against the United States. CISA also includes a preemption clause and a ten-year sunset provision.

Sharing by Federal Departments and Agencies

CISA requires key federal agencies to develop and issue a series of procedures to facilitate information sharing by federal departments and agencies with other federal entities, Non-Federal Entities, and the public. The procedures, which are to be developed jointly by the Secretary of Defense, the Attorney General, the Secretary of Homeland Security, and the Director of National Intelligence, must be issued within 60 days of the law’s enactment.

The procedures are to be designed to facilitate the timely sharing of both classified and unclassified cyber threat indicators and defensive measures with persons who have appropriate security clearances, including by declassifying information as appropriate, and to permit the sharing of unclassified information directly with the public. The procedures also are to encourage timely sharing of information about cybersecurity threats with entities that are the subjects of those threats, as well as the periodic sharing, through publications and targeted outreach, of cybersecurity best practices, with particular attention to accessibility and implementation challenges faced by small businesses.

The information-sharing procedures should also:

Sharing by Non-Federal Entities

CISA authorizes Non-Federal Entities to share cyber threat indicators and defensive measures with, and receive such information from, both federal entities and Non-Federal Entities for cybersecurity purposes. In so doing, Non-Federal Entities must protect classified information from improper disclosure and comply with any lawful use or sharing restrictions placed on information they receive.

Importantly, as with federal departments and agencies, prior to sharing cyber threat indicators, Non‑Federal Entities must scrub them for any information not directly related to a cybersecurity threat that the Non-Federal Entity knows at the time of sharing is personal or personally identifying information. Non‑Federal Entities are permitted to employ technical means configured to remove such information.

CISA also streamlines the process by which the federal government generally receives cyber threat indicators and defensive measures from Non-Federal Entities. Within 90 days of CISA’s enactment, DHS is directed to develop and implement a capability and process to (a) accept, in real-time, cyber threat indicators and defensive measures on behalf of the federal government from Non-Federal Entities, and (b) share such information automatically with various other federal entities, including the Departments of Commerce, Defense, Energy, Justice, and the Treasury, and the Office of the Director of National Intelligence (collectively with DHS, “Appropriate Federal Entities”). The Secretary of Homeland Security is also directed to consult with these federal entities in developing the capability and process, and to certify to Congress within 90 days of the enactment of CISA whether the capability and process is fully operational.

While the DHS information-sharing process is to be the primary means by which the federal government receives cybersecurity information from Non-Federal Entities, CISA directs that the DHS process is not to limit or prohibit otherwise lawful disclosures of cybersecurity information by Non-Federal Entities to federal entities, including reporting of suspected criminal activity, participation in federal investigations, or the provision of cyber threat indicators or defensive measures as part of a statutory or contractual requirement. Moreover, certain communications between federal entities and Non-Federal Entities are specifically excepted from the process. Specifically, certain communications concerning previously shared cyber threat indicators need not flow through DHS, and regulated Non-Federal Entities can continue to communicate directly with their respective federal regulatory authorities regarding cybersecurity threats.

Within 60 days of CISA’s enactment, the Attorney General and the Secretary of Homeland Security are directed to develop a number policies, procedures and guidelines to govern the information-sharing process:

Possible Parallel Designation

Although CISA vests the federal government’s information-sharing capability and process in DHS, it also permits the president to designate a second federal entity to develop and implement a parallel information-sharing capability and process. The agency designated to create this parallel process may not be the National Security Agency or any other part of the Department of Defense. To make such a designation, the president must explain and certify to Congress that such a designation is necessary to ensure the full, effective, and secure operation of the information-sharing mechanism; that the mechanism will be conducted in compliance with policies, procedures, and guidelines developed under CISA; and that its implementation is consistent with the mission of the designated federal entity.

Limitations on Federal Use

CISA also limits what the federal government and state, tribal, and local governments may do with information provided to them pursuant to CISA. Specifically, such information may be disclosed, retained, or used only for: (a) a cybersecurity purpose; (b) identifying cybersecurity threats or security vulnerabilities; (c) responding to, preventing or mitigating a specific threat of death, or serious bodily or economic harm, including a terrorist act; or (d) responding to, investigating, prosecuting, preventing, or mitigating a serious threat to a minor, including sexual exploitation and threats to physical safety, any offense arising out of a threat described in (c), or certain offenses relating to fraud, identity theft, espionage, censorship, or the protection of trade secrets.

Monitoring and Operation of Defensive Measures

CISA authorizes private entities, for cybersecurity purposes, to monitor and apply defensive measures to their own information systems and those of other entities that have provided written consent. Private entities can also monitor information stored on, processed by, or transiting through such information systems. Measures that destroy, render unusable, provide unauthorized access to, or substantially harm an information system or information not owned by either the private entity operating the measure or a consenting entity are, however, excluded from the definition of “defensive measures” and are therefore not authorized by CISA.

Safe Harbors

CISA establishes a number of safe harbors from liability for private entities that share cyber threat indicators or defensive measures, so long as sharing is conducted in accordance with CISA’s requirements:

B.    Title II – National Cybersecurity Advancement

Title II contains two subtitles: Subtitle A, the National Cybersecurity Protection Advancement Act of 2015 (“NCPAA”); and Subtitle B, the Federal Cybersecurity Enhancement Act of 2015 (“FCEA”).

The NCPAA amends the Homeland Security Act of 2002 to charge NCCIC with the implementation of the information-sharing mechanism set forth in CISA. Among other things, the NCPAA also:

The FCEA aims to secure the information systems of the federal government by requiring DHS to deploy and make available to federal agencies a system to detect and prevent cybersecurity risks in network traffic transiting or traveling to or from an agency information system. The system must be deployed within a year of the FCEA’s enactment. This requirement applies to federal agencies and systems other than the Department of Defense, intelligence community components, and national security systems,[3] and is required to be used for all information travelling between their information systems and information systems not belonging to a federal agency. In developing the cybersecurity system, DHS and private entities retained by DHS are authorized to access information transiting or traveling through or from federal agency information systems, but the FCEA sets out a number of principles limiting permissible access to and use of such information.

Within one year of the FCEA’s enactment, the head of each federal agency and system other than the Department of Defense, intelligence community components, and national security systems must also conduct certain cybersecurity assessments and implement certain cybersecurity measures specified in the FCEA, unless doing so would be excessively burdensome and is not necessary to secure the agency’s information system.

The FCEA grants DHS a central role in ensuring that the federal government as a whole has the appropriate tools in place to protect its systems from cybersecurity threats. Beyond tasking DHS with developing the aforementioned cybersecurity system, the FCEA provides that:

The FCEA also instructs the Comptroller General to conduct a study and publish a report within three years of the FCEA’s enactment on the effectiveness of the federal government’s strategy and approach to securing agency information systems and puts into place various reporting requirements to ensure Congress is kept apprised of relevant developments.

C.    Title III – Federal Cybersecurity Workforce Assessment Act of 2015

Title III of the Act is the Federal Cybersecurity Workforce Assessment Act of 2015 (“FCWAA”). The FCWAA contemplates a wide-ranging assessment of the federal workforce, both civilian and non-civilian, to identify positions that require the performance of cybersecurity or other cyber-related functions. The assessment is expected to be completed approximately three years after enactment of the FCWAA. One year after the first assessment, and annually thereafter, the head of each federal agency will be required to identify roles of critical need in the areas of information technology, cybersecurity or other cyber-related work.

D.    Title IV – Changes to Access Device Liability Outside of the United States and Other Cyber Matters

Title IV of the Act includes miscellaneous provisions intended to address cybersecurity threats. One of these measures is a change to the U.S. Code provision criminalizing access device fraud, which includes credit card fraud, 18 U.S.C. § 1029. This change will eliminate one of the two jurisdictional requirements for application of the statute to persons outside the United States. Prior to the amendment, persons outside the territorial jurisdiction of the United States who engaged in one of the prohibited acts would only be covered by the statute if there was a physical territorial connection to the United States, such as the transportation or storage in the United States of any article used to assist in the commission of the offense or of the proceeds of the offense.[4] With the elimination of that requirement, a person outside the territorial jurisdiction of the United States will be covered by the statute so long as he or she meets the remaining requirement that the offense involve an access device (such as a credit card, debit card, or account number) issued, owned, managed, or controlled by a financial institution, account issuer, credit card system member, or other entity organized under the laws of the United States, or of any state, the District of Columbia, or any other territory of the United States. The amendment also narrows the scope of entities protected by 18 U.S.C. § 1029, since they must now be organized under U.S. law, instead of merely being within the jurisdiction of the United States.

Title IV also calls on the Secretary of State to take actions in the international sphere to protect U.S. systems. Among other measures, the Secretary of State must produce a comprehensive strategy relating to U.S. international policy with regard to cyberspace. This strategy is to include the development of norms of responsible international behavior in cyberspace and a review of alternative concepts with regard to international norms in cyberspace offered by countries such as Brazil, China, India, and Russia.

The other measures contemplated by Title IV include a study on the security of federal mobile devices, initiatives to ensure that international cybercriminals who are not extradited to the United States are apprehended and prosecuted in other countries, enhancement of emergency services, measures to improve cybersecurity in the healthcare industry (including creation of a healthcare cybersecurity task force), and reports on access security of U.S. national security systems and U.S. systems that provide access to personally identifiable information.

ENDNOTES

[1]     See, e.g., Jenna McLaughlin, Last-Minute Budget Bill Allows New Privacy-Invading Surveillance in the Name of Cybersecurity, The Intercept (Dec. 18, 2015), https://theintercept.com/2015/12/18/last-minute-budget-bill-allows-new-privacy-invading-surveillance-in-the-name-of-cybersecurity/; Mark Jaycox, EFF Opposes Cybersecurity Bill Added to Congressional End of Year Budget Package, EFF (Dec. 18, 2015), https://www.eff.org/deeplinks/2015/12/statement-finalized-congressional-cybersecurity-bill.

[2]     See Press Release, U.S. Chamber of Commerce, U.S. Chamber President Comments on Omnibus Spending Bill (Dec. 16, 2015), https://www.uschamber.com/press-release/us-chamber-president-comments-omnibus-spending-bill; Press Release, Fin. Serv. Roundtable, Spending Bill Inclusion of Cybersecurity Information Sharing Legislation is Victory for Strengthening Defenses Against Cyber Attacks (Dec. 15, 2015), http://fsroundtable.org/spending-bill-inclusion-of-cybersecurity-information-sharing-legislation-is-victory-for-strengthening-defenses-against-cyber-attacks/.

[3]     A national security system is defined as “a telecommunications or information system operated by the federal government, the function, operation, or use of which . . . involves intelligence activities; involves cryptologic activities related to national security; involves command and control of military forces; involves equipment that is an integral part of a weapon or weapons system; or . . . is critical to the direct fulfillment of military or intelligence missions, . . . [other than] a system to be used for routine administrative and business applications (including payroll, finance, logistics, and personnel management applications).” 40 U.S.C. § 11103(a).

[4]     The text of 18 USC § 1029(h), prior to its amendment by the Cybersecurity Act of 2015, provided that:

(h) Any person who, outside the jurisdiction of the United States, engages in any act that, if committed within the jurisdiction of the United States, would constitute an offense under subsection (a) or (b) of this section, shall be subject to the fines, penalties, imprisonment, and forfeiture provided in this title if—

(1) the offense involves an access device issued, owned, managed, or controlled by a financial institution, account issuer, credit card system member, or other entity within the jurisdiction of the United States; and

(2)   the person transports, delivers, conveys, transfers to or through, or otherwise stores, secrets, or holds within the jurisdiction of the United States, any article used to assist in the commission of the offense or the proceeds of such offense or property derived therefrom.

As amended, it reads as follows:

(h) Any person who, outside the jurisdiction of the United States, engages in any act that, if committed within the jurisdiction of the United States, would constitute an offense under subsection (a) or (b) of this section, shall be subject to the fines, penalties, imprisonment, and forfeiture provided in this title if the offense involves an access device issued, owned, managed, or controlled by a financial institution, account issuer, credit card system member, or other entity organized under the laws of the United States, or any State, the District of Columbia, or other territory of the United States.

The preceding post comes to us from Sullivan & Cromwell LLP, and is based on their memorandum dated as of December 22, 2015 and available here.

Exit mobile version