As we reported last week, on May 12, 2011, the Obama administration announced a comprehensive cybersecurity legislative proposal in a letter to Congress. The proposal, which is the culmination of two years of work by an interagency team made up of representatives from multiple departments and agencies, aims to improve the nation’s cybersecurity and protect critical infrastructure. If enacted, this legislation will affect many government and private-sector owners and operators of cyber systems, including all critical infrastructure, such as energy, financial systems, manufacturing, communications and transportation. In addition, the proposal includes a wide-reaching data breach notification law that is intended generally to preempt the existing state breach laws in 46 states plus Washington, D.C., Puerto Rico and the U.S. Virgin Islands.
Homeland Security Provisions
According to the administration, the proposed new cybersecurity legislation would strengthen privacy and protect the nation’s critical infrastructure by providing the federal government with tighter oversight of critical infrastructure and by mandating that critical infrastructure operators develop frameworks for addressing cyber threats. These frameworks would be based on federally developed, risk-based standards tailored to each system’s specific needs and circumstances. The proposal — which takes a cue from the existing federal program established four years ago to protect high-risk chemical facilities from terrorist attacks — would allow flexibility to private industry to develop their own approach to cybersecurity by working cooperatively with the federal government.
Under the proposal, the Department of Homeland Security (“DHS”) would be required to work cooperatively with private industry to detect vulnerabilities to cyber attack. These provisions would require DHS to develop, in coordination with industry, a list of covered critical infrastructure facilities and a set of risk-based standards for those covered facilities. A covered critical infrastructure sector is selected based on relative interdependencies and components of covered facilities, relative size and “potential for the incapacity or disruption of the entity, a system or asset it operates or a service it provides to cause severe, negative consequences to national security, national economic security and national public health and safety.” DHS would then establish risk-based tiers for the covered facilities based on threat, vulnerability and consequence of a cyber attack. Under the provisions, covered facilities would be mandated to develop cybersecurity plans to meet the risk-based standards. A covered facility also would be required to make a high-level overview of the plan publicly available. The plan would be required to be signed by a responsible corporate officer, audited by a third party and certified annually by DHS or the Securities and Exchange Commission (“SEC”). DHS is empowered, as a means of enforcement, to publicize circumstances where a covered facility is not sufficiently addressing cybersecurity risk.
The proposal does not specifically mention types of infrastructure to be covered, such as energy or electric facilities, nor does it specifically authorize a role for the Federal Energy Regulatory Commission (“FERC”) or the Department of Energy. The proposal does establish a collaborative process for agencies and regional councils to participate in the identification of critical infrastructure and authorizes the agencies with authority over such infrastructure to promulgate rules. The Office of Management and Budget (“OMB”) can exempt certain infrastructure if sufficient regulation is already in place. In an effort to coordinate the nation’s federal information security policy, the proposal would also grant DHS primary authority for information security across the federal government’s civilian computers and networks, including formalizing DHS’s responsibility for implementation of the Federal Information Security Management Act (“FISMA”).
Finally, the proposal also seeks to address privacy protection issues. DHS and other agencies, with input from civil liberties experts and with oversight and approval from the attorney general, would be required to develop privacy and civil liberties procedures for information that they acquire or use. Companies that seek to share information with the government would need to make reasonable efforts to remove any identifying information unrelated to cyber threats. No information obtained could be used except as authorized. The goals of these procedures would be to: (1) minimize the impact on privacy and civil liberties; (2) limit the collection and use of information and records to carry out DHS’s responsibilities; (3) safeguard individually identifiable information from unauthorized access or acquisition; and (4) protect the confidentiality of individually identifiable information to the greatest extent practicable and require recipients of such information to disclose it only to protect against cybersecurity threats.
National Data Breach Notification Law
In addition to the Homeland Security issues, the proposal also calls for a lengthy and detailed national data breach notification law that would generally preempt existing state breach notification laws. The proposed breach law would require any “business entity” that uses, accesses or collects “sensitive personally identifiable information” about more than 10,000 individuals during a 12-month period to notify the individuals following a “security breach.” The proposal contains many important provisions that will serve to both clarify and expand existing breach notification obligations. These provisions include:
- Definition of Sensitive Personally Identifiable Information (“SPII”) – SPII is defined as “any information or compilation of information, in electronic or digital form that includes” (1) an individual’s first and last name or first initial and last name in combination with two of the following: A home address or telephone number, mother’s maiden name or birth date; (2) a nontruncated Social Security number, driver’s license number, passport number or government-issued unique identification number; (3) biometric data; (4) a unique account identifier such as a credit card number or routing code; or (5) any combination of an individual’s first and last name or first initial and last name, a unique account identifier, or any security code, access code or password, or a source code that could be used to generate such codes or passwords. This definition of SPII addresses many of the definitional issues that arise under the existing state law framework and, if passed, will greatly expand breach notification obligations for all companies subject to the law.
- Harm Threshold – The proposal requires business entities to notify affected individuals whose SPII “has been, or is reasonably believed to have been, accessed or acquired, unless there is no reasonable risk of harm or fraud to such individual.” The notification threshold contained in the proposal is similar to existing state law, but the inclusion of the harm threshold at the national level would serve to streamline the breach notification process, as current state laws conflict with respect to the presence of a harm threshold. In some cases, under existing state breach laws, notification is required even if there is no reasonable risk of harm as a result of an information security incident.
- Risk Assessment – The proposal requires business entities to perform a detailed risk assessment to demonstrate that no risk of harm exists and must notify the FTC within 45 days after discovery of a breach of (1) the results of the risk assessment and (2) the decision to invoke the risk assessment exemption. The risk assessment must contain “logging data” for the six months prior to the submission of the risk assessment that contains specified information regarding communications and logs.
- Timing – The proposal requires business entities to notify affected individuals without unreasonable delay, which means in 60 days or less unless (1) the business entity can demonstrate to the FTC that additional time is reasonably necessary or (2) a federal law enforcement agency determines that the notification would impede a criminal investigation or national security activity. Notices to the entity designated by the secretary of Homeland Security, as described in more detail below, must occur either (1) 72 hours before notification is sent to affected individuals or (2) 10 days after discovery of the security breach, whichever is earlier.
- Other Notification Requirements – In addition to the notice required to individuals, a business entity must notify the media in any state where more than 5,000 individuals are impacted by the breach. Business entities will also be required to notify “an entity designated by the Secretary of Homeland Security” if the security breach (1) affects more than 5,000 intervals; (2) involves a database containing the SPII of more than 500,000 individuals; (3) involves a database owned by the federal government; or (4) primarily involves the SPII of federal employees or contactors involved in national security or law enforcement.
- Enforcement – The national data breach notification law would be enforced under the FTC Act as an unfair or deceptive act or practice in commerce. The law may be enforced by the FTC “irrespective of whether that business entity is engaged in commerce or meets any other jurisdictional tests in the [FTC] Act.” The law also provides enforcement authority to state attorneys general to enjoin any violations of the law, enforce compliance with the law or impose civil penalties of up to $1,000 per day for each affected individual, up to a maximum of $1,000,000 per violation unless the conduct is “willful or intentional,” in which case there is no limit mentioned in the proposal.
- Preemption – The law contains a preemption provision that states that it “shall supersede any provision of the law of any State, or a political subdivision thereof, relating to notification by a business entity engaged in interstate commerce of a security breach of computerized data” apart from any state laws that require victim protection assistance.
- Scope – The proposal excludes from coverage “covered entities,” “business associates” and “vendors of personal health records” subject to the breach notification requirements of the Health Information Technology for Economic and Clinical Health (“HITECH”) Act.
Outlook
Undoubtedly, this proposal will be thoroughly discussed in Congress. There are currently numerous privacy and cybersecurity bills that have been introduced recently, from comprehensive privacy bills such as the “Commercial Privacy Bill of Rights Act of 2011” introduced by Senators Kerry (D-MA) and McCain (R-AZ) to separate bills addressing online tracking introduced by Senator Rockefeller (D-WV) and Representative Speier (D-CA). The administration’s proposal incorporates elements already contained in some existing bills on cybersecurity and will undoubtedly be the source of further hearings. If the proposal is eventually enacted, it will require extensive additional rulemaking by the FTC, DHS and other agencies to implement the legislation.
Search
Recent Posts
Categories
- Behavioral Advertising
- Centre for Information Policy Leadership
- Children’s Privacy
- Cyber Insurance
- Cybersecurity
- Enforcement
- European Union
- Events
- FCRA
- Financial Privacy
- General
- Health Privacy
- Identity Theft
- Information Security
- International
- Marketing
- Multimedia Resources
- Online Privacy
- Security Breach
- U.S. Federal Law
- U.S. State Law
- Workplace Privacy
Tags
- Aaron Simpson
- Accountability
- Adequacy
- Advertisement
- Advertising
- American Privacy Rights Act
- Anna Pateraki
- Anonymization
- Anti-terrorism
- APEC
- Apple Inc.
- Argentina
- Arkansas
- Article 29 Working Party
- Artificial Intelligence
- Australia
- Austria
- Automated Decisionmaking
- Baltimore
- Bankruptcy
- Belgium
- Biden Administration
- Big Data
- Binding Corporate Rules
- Biometric Data
- Blockchain
- Bojana Bellamy
- Brazil
- Brexit
- British Columbia
- Brittany Bacon
- Brussels
- Business Associate Agreement
- BYOD
- California
- CAN-SPAM
- Canada
- Cayman Islands
- CCPA
- CCTV
- Chile
- China
- Chinese Taipei
- Christopher Graham
- CIPA
- Class Action
- Clinical Trial
- Cloud
- Cloud Computing
- CNIL
- Colombia
- Colorado
- Committee on Foreign Investment in the United States
- Commodity Futures Trading Commission
- Compliance
- Computer Fraud and Abuse Act
- Congress
- Connecticut
- Consent
- Consent Order
- Consumer Protection
- Cookies
- COPPA
- Coronavirus/COVID-19
- Council of Europe
- Council of the European Union
- Court of Justice of the European Union
- CPPA
- CPRA
- Credit Monitoring
- Credit Report
- Criminal Law
- Critical Infrastructure
- Croatia
- Cross-Border Data Flow
- Cyber Attack
- Cybersecurity
- Cybersecurity and Infrastructure Security Agency
- Data Brokers
- Data Controller
- Data Localization
- Data Privacy Framework
- Data Processor
- Data Protection Act
- Data Protection Authority
- Data Protection Impact Assessment
- Data Transfer
- David Dumont
- David Vladeck
- Delaware
- Denmark
- Department of Commerce
- Department of Health and Human Services
- Department of Homeland Security
- Department of Justice
- Department of the Treasury
- District of Columbia
- Do Not Call
- Do Not Track
- Dobbs
- Dodd-Frank Act
- DPIA
- E-Privacy
- E-Privacy Directive
- Ecuador
- Ed Tech
- Edith Ramirez
- Electronic Communications Privacy Act
- Electronic Privacy Information Center
- Elizabeth Denham
- Employee Monitoring
- Encryption
- ENISA
- EU Data Protection Directive
- EU Member States
- European Commission
- European Data Protection Board
- European Data Protection Supervisor
- European Parliament
- Facial Recognition Technology
- FACTA
- Fair Credit Reporting Act
- Fair Information Practice Principles
- Federal Aviation Administration
- Federal Bureau of Investigation
- Federal Communications Commission
- Federal Data Protection Act
- Federal Trade Commission
- FERC
- FinTech
- Florida
- Food and Drug Administration
- Foreign Intelligence Surveillance Act
- France
- Franchise
- Fred Cate
- Freedom of Information Act
- Freedom of Speech
- Fundamental Rights
- GDPR
- Geofencing
- Geolocation
- Georgia
- Germany
- Global Privacy Assembly
- Global Privacy Enforcement Network
- Gramm Leach Bliley Act
- Hacker
- Hawaii
- Health Data
- Health Information
- HIPAA
- HIPPA
- HITECH Act
- Hong Kong
- House of Representatives
- Hungary
- Illinois
- India
- Indiana
- Indonesia
- Information Commissioners Office
- Information Sharing
- Insurance Provider
- Internal Revenue Service
- International Association of Privacy Professionals
- International Commissioners Office
- Internet
- Internet of Things
- Iowa
- IP Address
- Ireland
- Israel
- Italy
- Jacob Kohnstamm
- Japan
- Jason Beach
- Jay Rockefeller
- Jenna Rode
- Jennifer Stoddart
- Jersey
- Jessica Rich
- John Delionado
- John Edwards
- Kentucky
- Korea
- Latin America
- Laura Leonard
- Law Enforcement
- Lawrence Strickling
- Legislation
- Liability
- Lisa Sotto
- Litigation
- Location-Based Services
- London
- Madrid Resolution
- Maine
- Malaysia
- Markus Heyder
- Maryland
- Massachusetts
- Meta
- Mexico
- Microsoft
- Minnesota
- Mobile App
- Mobile Device
- Montana
- Morocco
- MySpace
- Natascha Gerlach
- National Institute of Standards and Technology
- National Labor Relations Board
- National Science and Technology Council
- National Security
- National Security Agency
- National Telecommunications and Information Administration
- Nebraska
- NEDPA
- Netherlands
- Nevada
- New Hampshire
- New Jersey
- New Mexico
- New York
- New Zealand
- Nigeria
- Ninth Circuit
- North Carolina
- Norway
- Obama Administration
- OECD
- Office for Civil Rights
- Office of Foreign Assets Control
- Ohio
- Oklahoma
- Opt-In Consent
- Oregon
- Outsourcing
- Pakistan
- Parental Consent
- Payment Card
- PCI DSS
- Penalty
- Pennsylvania
- Personal Data
- Personal Health Information
- Personal Information
- Personally Identifiable Information
- Peru
- Philippines
- Phyllis Marcus
- Poland
- PRISM
- Privacy By Design
- Privacy Policy
- Privacy Rights
- Privacy Rule
- Privacy Shield
- Protected Health Information
- Ransomware
- Record Retention
- Red Flags Rule
- Regulation
- Rhode Island
- Richard Thomas
- Right to Be Forgotten
- Right to Privacy
- Risk-Based Approach
- Rosemary Jay
- Russia
- Safe Harbor
- Sanctions
- Schrems
- Scott H. Kimpel
- Scott Kimpel
- Securities and Exchange Commission
- Security Rule
- Senate
- Serbia
- Service Provider
- Singapore
- Smart Grid
- Smart Metering
- Social Media
- Social Security Number
- South Africa
- South Carolina
- South Dakota
- South Korea
- Spain
- Spyware
- Standard Contractual Clauses
- State Attorneys General
- Steven Haas
- Stick With Security Series
- Stored Communications Act
- Student Data
- Supreme Court
- Surveillance
- Sweden
- Switzerland
- Taiwan
- Targeted Advertising
- Telecommunications
- Telemarketing
- Telephone Consumer Protection Act
- Tennessee
- Terry McAuliffe
- Texas
- Text Message
- Thailand
- Transparency
- Transportation Security Administration
- Trump Administration
- United Arab Emirates
- United Kingdom
- United States
- Unmanned Aircraft Systems
- Uruguay
- Utah
- Vermont
- Video Privacy Protection Act
- Video Surveillance
- Virginia
- Viviane Reding
- Washington
- Whistleblowing
- Wireless Network
- Wiretap
- ZIP Code