80_FR_14413 80 FR 14360 - Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

80 FR 14360 - Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

DEPARTMENT OF COMMERCE
National Telecommunications and Information Administration

Federal Register Volume 80, Issue 53 (March 19, 2015)

Page Range14360-14363
FR Document2015-06344

The Department of Commerce Internet Policy Task Force (IPTF) is requesting comment to identify substantive cybersecurity issues that affect the digital ecosystem and digital economic growth where broad consensus, coordinated action, and the development of best practices could substantially improve security for organizations and consumers. The IPTF invites public comment on these issues from all stakeholders with an interest in cybersecurity, including the commercial, academic and civil society sectors, and from relevant federal, state, local, and tribal entities.

Federal Register, Volume 80 Issue 53 (Thursday, March 19, 2015)
[Federal Register Volume 80, Number 53 (Thursday, March 19, 2015)]
[Notices]
[Pages 14360-14363]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2015-06344]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Telecommunications and Information Administration

[Docket No. 150312253-5253-01]
RIN 0660-XC018


Stakeholder Engagement on Cybersecurity in the Digital Ecosystem

AGENCY: National Telecommunications and Information Administration, 
U.S. Department of Commerce.

ACTION: Request for Public Comment.

-----------------------------------------------------------------------

SUMMARY: The Department of Commerce Internet Policy Task Force (IPTF) 
is requesting comment to identify substantive cybersecurity issues that 
affect the digital ecosystem and digital economic growth where broad 
consensus, coordinated action, and the development of best practices 
could substantially improve security for organizations and consumers. 
The IPTF invites public comment on these issues from all stakeholders 
with an interest in cybersecurity, including the commercial, academic 
and civil society sectors, and from relevant federal, state, local, and 
tribal entities.

DATES: Comments are due on or before 5 p.m. Eastern Time on May 18, 
2015.

ADDRESSES: Written comments may be submitted by email to 
securityRFC2015@ntia.doc.gov. Comments submitted by email should be 
machine-searchable and should not be copy-protected. Written comments 
also may be submitted by mail to the National Telecommunications and 
Information Administration, U.S. Department of Commerce, 1401 
Constitution Avenue NW., Room 4725, Attn: Cybersecurity RFC 2015, 
Washington, DC 20230. Responders should include the name of the person 
or organization filing the comment, as well as a page number, on each 
page of their submissions. All comments received are a part of the 
public record and will generally be posted to http://www.ntia.doc.gov/category/internet-policy-task-force without change. All personal 
identifying information (e.g., name, address) voluntarily submitted by 
the commenter may be publicly accessible. Do not submit Confidential 
Business Information or otherwise sensitive or protected information. 
NTIA will accept anonymous comments.

FOR FURTHER INFORMATION CONTACT: Allan Friedman, National 
Telecommunications and Information Administration, U.S. Department of 
Commerce, 1401 Constitution Avenue NW., Room 4725, Washington, DC 
20230; Telephone: (202) 482-4281; Email: afriedman@ntia.doc.gov. Please 
direct media inquiries to NTIA's Office of Public Affairs: (202) 482-
7002.

SUPPLEMENTARY INFORMATION: Background: The Department of Commerce IPTF 
published a Notice of Inquiry (NOI) in 2010, focusing on the 
relationship between cybersecurity and the pace of innovation in the 
information economy.\1\ Based on the comments received, the Department 
of Commerce published a Green Paper, Cybersecurity, Innovation, and the 
Internet Economy, in 2011.\2\ The Green Paper focused on the sector of 
the economy that creates or uses the Internet or networking services 
and falls outside the classification of critical infrastructure, as 
defined by existing law and Administration policy. In that document, 
the IPTF focused on two themes. First, there are real, evolving threats 
in cyberspace that not only put businesses and their online operations 
at risk, but threaten to undermine the trust on which much of the 
digital economy depends. Second, the pace of innovation in the highly 
dynamic digital ecosystem makes traditional regulation and compliance 
difficult and inefficient.
---------------------------------------------------------------------------

    \1\ U.S. Department of Commerce, Internet Policy Task Force, 
Notice of Inquiry, Cybersecurity, Innovation, and the Internet 
Economy, Dkt. No. 100721305-0305-01, 75 FR 44216 (July 28, 2010), 
available at: http://www.ntia.doc.gov/federal-register-notices/2010/cybersecurity-innovation-and-internet-economy. Responses to the 
Notice of Inquiry are available at: http://www.nist.gov/itl/cybercomments.cfm.
    \2\ U.S. Department of Commerce, Internet Policy Task Force, 
Cybersecurity, Innovation, and the Internet Economy (June 2011) 
(``Green Paper''), available at: http://www.nist.gov/itl/upload/Cybersecurity_Green-Paper_FinalVersion.pdf.
---------------------------------------------------------------------------

    Stakeholder response to the Green Paper provided a roadmap for the 
IPTF to continue its cybersecurity policy work. In September 2011, the 
IPTF, in coordination with the Department of Homeland Security, issued 
a NOI on possible approaches to creating a voluntary industry code of 
conduct to address the detection, notification, and mitigation of 
botnets, which led to an industry-led working group.\3\ In February 
2013, the White House released Executive Order 13636 which called upon 
the Department of Commerce to work with industry to develop a framework 
for use by U.S. critical infrastructure to improve

[[Page 14361]]

cybersecurity practices, and to undertake a study on incentives to 
encourage private sector adoption of cybersecurity protections.\4\
---------------------------------------------------------------------------

    \3\ U.S. Department of Commerce and U.S. Department of Homeland 
Security, Notice of Inquiry, Models To Advance Voluntary Corporate 
Notification to Consumers Regarding the Illicit Use of Computer 
Equipment by Botnets and Related Malware, Dkt. No. 110829543-1541-
01, 76 FR 58466 (September 21, 2011), available at: http://www.ntia.doc.gov/files/ntia/publications/botnet_rfi.pdf.
    \4\ Exec. Order No. 14636, Improving Critical Infrastructure 
Cybersecurity, 78 FR 11739 (February 12, 2013), available at https://www.federalregister.gov/articles/2013/02/19/2013-03915/improving-critical-infrastructure-cybersecurity.
---------------------------------------------------------------------------

    The Cybersecurity Framework was developed by the National Institute 
of Standards and Technology (NIST), an agency of the Department of 
Commerce, with the aid of broad stakeholder participation.\5\ The 
Cybersecurity Framework offers organizations a guide for understanding 
and implementing appropriate cybersecurity protections, and has been 
applied by a range of organizations, including a number that fall 
``outside the orbit of critical infrastructure or key resources,'' the 
focus of the Green Paper effort.\6\ Following launch of the 
Cybersecurity Framework, NIST published a Request for Information (RFI) 
in August 2014 asking for stakeholder feedback on Cybersecurity 
Framework awareness, use, and next steps.\7\ In response to questions 
regarding next steps that could complement the Cybersecurity Framework 
process, stakeholders again identified the IPTF as a vehicle to 
facilitate further collaborative cybersecurity work, building on the 
models of multistakeholder participation initially discussed in the 
Green Paper.\8\
---------------------------------------------------------------------------

    \5\ National Institute of Standards and Technology, Framework 
for Improving Critical Infrastructure Cybersecurity Version 1.0, 
(February 12, 2014), available at: http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf.
    \6\ Green Paper at ii.
    \7\ U.S. Department of Commerce, National Institute of Standards 
and Technology, Notice of Inquiry, Experience With the Framework for 
Improving Critical Infrastructure Cybersecurity, Dkt. No. 140721609-
4609-01, 79 FR 50891 (August 26, 2014), available at: https://www.federalregister.gov/articles/2014/08/26/2014-20315/experience-with-the-framework-for-improving-critical-infrastructure-cybersecurity.
    \8\ See, e.g., comments from the Information Technology Industry 
Council (ITI), US Telecom Association, and Microsoft on the 
Cybersecurity Framework RFI (August 2014), available at: http://csrc.nist.gov/cyberframework/rfi_comments_10_2014.html.
---------------------------------------------------------------------------

    Accordingly, the IPTF proposes to facilitate one or more 
multistakeholder processes around key cybersecurity issues facing the 
digital ecosystem and economy. Multistakeholder processes, built on the 
principles of openness, transparency, and consensus, can generate 
collective guidance and foundations for coordinated voluntary action. 
Potential outcomes would vary by the issue discussed, but could include 
voluntary policy guidelines, procedures, or best practices. In the 
digital ecosystem, the rapid pace of innovation often outstrips the 
ability of regulators to effectively administer key policy questions. 
Open, voluntary, and consensus-driven processes can work to safeguard 
the interests of all stakeholders while still allowing the digital 
economy to thrive.
    The focus of these processes is to address discrete security 
challenges in the digital ecosystem where collaborative voluntary 
action between diverse actors can substantially improve security for 
everyone. Each process will engage a wide range of participants to 
ensure that the outcomes reflect the consensus of the relevant 
community, and are fair, voluntary, and stakeholder-driven.
    These processes will be designed to complement, rather than 
duplicate existing initiatives, both inside and outside the government. 
They will be coordinated by the IPTF, under the leadership of the 
National Telecommunications and Information Administration (NTIA). 
Under its statutory authority, NTIA undertakes Internet policy 
initiatives that serve to protect, promote and reinforce an open, 
innovative Internet ecosystem and digital economy, and is the executive 
branch lead for promoting the multistakeholder approach to Internet 
policymaking.\9\ In partnership with its IPTF partners, NTIA has 
addressed other key challenges in Internet policy through 
multistakeholder processes, including an ongoing set of initiatives 
around privacy and digital copyright.\10\ These proposed cybersecurity 
processes will be coordinated with standards and technology work 
underway within the Department of Commerce focused on cybersecurity, 
including the Cybersecurity Framework, the National Cybersecurity 
Center of Excellence, and the National Strategy for Trusted Identities 
in Cyberspace.\11\ Through the comprehensive scope of all these 
efforts, the Department of Commerce seeks to foster innovation and to 
better secure the ecosystem to ensure that businesses, organizations 
and individuals can expand their trust, investment and engagement in 
the digital economy, while also reinforcing the voluntary, 
multistakeholder approach to Internet policymaking.
---------------------------------------------------------------------------

    \9\ See 47 U.S.C. 901(c) (describing NTIA's policy roles, 
including ``[p]romoting the benefits of technological development in 
the United States for all users of telecommunications and 
information facilities;'' ``[f]ostering national safety and 
security, economic prosperity, and the delivery of critical social 
services through telecommunications;'' and ``[f]acilitating and 
contributing to the full development of competition, efficiency, and 
the free flow of commerce in domestic and international 
telecommunications.'')
    \10\ More information about the IPTF's work on privacy and 
copyright initiatives, including multiple Requests for Comment, are 
available at: http://www.ntia.doc.gov/category/internet-policy-task-force.
    \11\ More information about the Cybersecurity Framework is 
available at: http://www.nist.gov/cyberframework; the National 
Cybersecurity Center of Excellence at: http://nccoe.nist.gov; and 
the National Strategy for Trusted Identities in Cyberspace at: 
http://www.nist.gov/nstic.
---------------------------------------------------------------------------

    Request for Comment: IPTF plans to facilitate a series of 
discussions around key cybersecurity challenges that may be addressed 
through a better shared understanding of the nature of the problem, and 
where multistakeholder discussion can be a catalyst for self-
coordination of cybersecurity activities. Outcomes would depend on the 
issues discussed, but may involve combinations of principles, 
practices, and the voluntary application of policies and existing 
standards. Initially, IPTF seeks to conduct a cybersecurity 
multistakeholder process focused on a definable area where consumers 
and organizations will achieve the greatest benefit and consensus in a 
reasonable timeframe. While IPTF will avoid duplicating existing work, 
areas where stakeholders have identified the problem or begun to seek 
consensus around specific practices could provide a useful starting 
point.
    To identify potential cybersecurity topics that would benefit from 
a multistakeholder process, IPTF seeks comment from stakeholders on the 
following questions:
    1. What security challenges could be best addressed by bringing 
together the relevant participants in an open, neutral forum to explore 
coordinated, voluntary action through principles, practices, and 
guidelines? For each issue, also provide comment on:
    i. Why this topic is a good fit for a multistakeholder process, and 
whether stakeholders might reasonably be expected to come to some 
consensus;
    ii. Why such a process would benefit the digital ecosystem as a 
whole;
    iii. How long a facilitated, participant-led process on this topic 
should take to come to consensus;
    iv. What form an actionable outcome might take; and
    v. What pre-existing organizations and work already exist on the 
topic.
    2. Please comment on which of the following topics could result in 
actionable, collective progress by stakeholders in a multistakeholder 
setting. For each issue, also provide comment on:
    i. Why or why not this topic is a good fit for a multistakeholder 
process, and whether stakeholders might reasonably be expected to come 
to some consensus;

[[Page 14362]]

    ii. Why such a process would benefit the digital ecosystem as a 
whole;
    iii. How long a facilitated, participant-led process on this topic 
should take to come to consensus;
    iv. What form an actionable outcome might take; and
    v. What pre-existing organizations and work already exist on the 
topic.

Network and Infrastructure Security

    (a) Botnet Mitigation. Disrupting botnets requires coordinated 
action and transparency between ISPs, vendors, consumers, and the 
public sector, such as previous efforts of the voluntary public-private 
partnership between the U.S. Office of the Cybersecurity Coordinator 
and the U.S. Departments of Commerce and Homeland Security related to 
ISP codes of conduct.\12\ What additional collective steps can be taken 
to support efforts to create awareness and manage the effects of 
botnets?
---------------------------------------------------------------------------

    \12\ U.S. Department of Commerce, Press Release, White House 
Announces Public-Private Partnership Initiatives to Combat Botnets 
(May 30, 2012), available at: http://www.commerce.gov/news/press-releases/2012/05/30/white-house-announces-public-private-partnership-initiatives-combat-b.
---------------------------------------------------------------------------

    (b) Trust and Security in Core Internet Infrastructure: Naming, 
Routing, and Public Key Infrastructure. Key aspects of the Internet's 
core infrastructure were designed and deployed without explicit 
security mechanisms (e.g., the Domain Name System (DNS) and Border 
Gateway Protocol (BGP)) and new threats have been discovered in the 
Internet's Public-Key Infrastructure (i.e., PKIX). Technical solutions 
have been developed for many of these issues (e.g., DNSSEC, BGPSec and 
RPKI, DANE and certificate transparency) but uptake has been slow. What 
collective action can be taken to promote the voluntary adoption and 
diffusion of existing technical solutions to make the infrastructure 
more trustworthy?
    (c) Domain Name System (DNS), Border Gateway Protocol (BGP), and 
Transport Layer Security (TLS) Certificates. Key aspects of the 
Internet infrastructure have long been known to be vulnerable. While 
technical solutions exist for security vulnerabilities in routing, the 
domain name system and TLS certificates, uptake has been slow or is 
just beginning. What collective action can be taken to promote the 
voluntary adoption and diffusion of technical solutions, such as DNS 
Security (DNSSEC), to make the infrastructure more trustworthy?
    (d) Open Source Assurance. Many organizations depend on open source 
projects for a wide range of purposes across the digital economy. How 
can stakeholders better support improving the security of open source 
projects, and the distribution of patches?
    (e) Malware Mitigation. Disrupting and mitigating malware and 
malware networks can sometimes adversely impact consumers and 
stakeholders who may be inadvertently caught-up in the incident. How 
can existing models of mitigation and disruption better incorporate the 
needs and concerns of all relevant stakeholders?

Web Security and Consumer Trust

    (f) Web Security. Many consumers assume that their connections with 
Web sites are secure, and that the Web sites themselves are secure, 
when there is little guarantee that safeguards are in place. What 
actions can improve web security and trust for consumers, including 
transport layer (Transport Layer Security, or TLS, often referred to as 
Secure Sockets Layer, or SSL) and web application security, potentially 
building on the success of existing stakeholder initiatives? \13\
---------------------------------------------------------------------------

    \13\ See, e.g., Open Web Application Security Project (OWASP), 
Top 10 List (``represent[ing] a broad consensus about the most 
critical web application security flaws''), available at: https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project.
---------------------------------------------------------------------------

    (g) Malvertising. Several popular Web sites have inadvertently 
spread malware through ``malvertising,'' when malicious code is served 
from legitimate advertising networks. How can diverse stakeholders work 
together to limit this risk?
    (h) Trusted Downloads. Internet users often download content and 
applications online without clear assurance of the security of the 
site. Are there best practices and existing standards that providers of 
online applications and downloadable tools can adopt to ensure consumer 
protection without impacting innovation or business models?
    (i) Cybersecurity and the Internet of Things. As the Internet of 
Things matures and more systems integrate information technologies (IT) 
and operational technologies (OT), cybersecurity is enmeshed in a 
broader risk context that includes safety, reliability, and 
resilience.\14\ How can we foster the emergence of voluntary policy 
frameworks, informed by market dynamics, that enable Internet of Things 
innovation while addressing the full spectrum of risks associated with 
cyber-physical systems?
---------------------------------------------------------------------------

    \14\ See, e.g., NIST Cyber-Physical Systems Homepage, available 
at: http://www.nist.gov/cps; see also, FTC Staff, Internet of 
Things: Privacy & Security in a Connected World (January 2015), 
available at: http://www.ftc.gov/system/files/documents/reports/federal-trade-commission-staff-report-november-2013-workshop-entitled-internet-things-privacy/150127iotrpt.pdf.
---------------------------------------------------------------------------

    (j) Privacy. As noted in the Cybersecurity Framework, privacy and 
civil liberties implications may arise when personal information is 
used, collected, processed, maintained, or disclosed in connection with 
an organization's cybersecurity activities. How can risks to privacy or 
civil liberties arising from the application of cybersecurity measures 
or best practices be addressed in this process(es)?

Business Processes and Enabling Markets

    (k) Managed Security Services: Requirements and Adoption. Managed 
security services (MSS) allow many firms, particularly small- and 
medium-sized businesses, to secure themselves without acquiring 
expensive in-house expertise, yet there are obstacles preventing 
seamless market cooperation and accountability between clients and 
vendors. How can a common understanding of security needs by 
stakeholders enable faster and more efficient adoption to improve 
security without sacrificing accountability?
    (l) Vulnerability Disclosure. The security of the digital economy 
depends on a productive relationship between security vendors and 
researchers of all types who discover vulnerabilities in existing 
technology and systems, and the providers, owners, and operators of 
those systems. How can stakeholders build on existing work in this 
space to responsibly manage the vulnerability disclosure process 
without putting consumers at risk in the short run? \15\
---------------------------------------------------------------------------

    \15\ See, e.g., Vulnerability Disclosure Overview, ISO Standard 
29147 (2014), available at: http://www.iso.org/iso/catalogue_detail.htm?csnumber=45170.
---------------------------------------------------------------------------

    (m) Security Investment and Metrics. Market solutions for security 
require good information. What types of robust, practical, and 
actionable metrics can be used within organizations to understand 
security investment, and by consumers and clients to understand 
security practices and promote market demand for security?
    This list is not exhaustive. The IPTF welcomes comments on any of 
these topics, as well as descriptions of other topics that the IPTF and 
stakeholders should consider for the cybersecurity multistakeholder 
process. Note that comments are directly sought on which topics to 
address through the process, rather than the best solution to any given 
question.
    3. Please comment on what factors should be considered in selecting 
the issues for multistakeholder processes.

[[Page 14363]]

    IPTF also plans to draw on the Green Paper and earlier responses to 
past Requests for Public Comment; past respondents are invited to 
provide additional and updated viewpoints on IPTF efforts since those 
comments were provided.
    Implementing the Multistakeholder Process: Commenters also may wish 
to provide their views on how stakeholder discussions of the proposed 
issue(s) should be structured to ensure openness, transparency, and 
consensus-building. Analogies to other Internet-related 
multistakeholder processes, whether they are concerned with policy or 
technical issues, could be especially valuable.
    4. Please comment on the best structure and mechanics for the 
process(es). If different security issues will require different 
process structures, please offer guidance on how to best design an 
appropriate process for the issue selected.
    5. How can the IPTF promote participation from a broad range of 
stakeholders, i.e., from industry, civil society, academia, and 
international partners? In particular, how can we promote engagement 
from small and medium-sized enterprises (SME) that play key roles in 
the digital ecosystem? How critical is location for meetings, and what 
factors should be considered in determining where to host meetings?
    6. What procedures and technologies can promote transparency of 
process, including promoting discussion between stakeholders and 
ensuring those outside the process can understand the decisions made?
    7. What types of consensus outcomes can promote real security 
benefits without further adding to a compliance-oriented model of 
security?
    8. Would certain cybersecurity issues be better served by a single 
workshop or other event to raise awareness and promote independent 
action, rather than a longer multistakeholder, consensus-building 
process?
    9. How should evaluation of the processes be conducted to assess 
results and to ensure that recommendations and outcomes of the process 
remain actionable and current?
    Response to this Request for Public Comment is voluntary. 
Commenters are free to address any or all of the issues identified 
above, as well as provide information on other topics that they think 
are relevant to promoting voluntary coordinated action to address 
cybersecurity risks through an open, transparent, voluntary, consensus-
based process. Please note that the Government will not pay for 
response preparation or for the use of any information contained in the 
response.

    Authority: 47 U.S.C. 901(c).

    Dated: March 16, 2015.
Angela Simpson,
Deputy Assistant Secretary for Communications and Information.
[FR Doc. 2015-06344 Filed 3-18-15; 8:45 am]
 BILLING CODE 3510-60-P



                                               14360                        Federal Register / Vol. 80, No. 53 / Thursday, March 19, 2015 / Notices

                                               DATES:  The meeting will be held on                     DEPARTMENT OF COMMERCE                                NW., Room 4725, Washington, DC
                                               Monday, April 13, 2015, from 1:30 p.m.                                                                        20230; Telephone: (202) 482–4281;
                                               until 4 p.m.                                            National Telecommunications and                       Email: afriedman@ntia.doc.gov. Please
                                                                                                       Information Administration                            direct media inquiries to NTIA’s Office
                                               ADDRESSES:   The meeting will be held                                                                         of Public Affairs: (202) 482–7002.
                                               via Internet Webinar. Detailed                          [Docket No. 150312253–5253–01]
                                                                                                                                                             SUPPLEMENTARY INFORMATION:
                                               connection details are available at                     RIN 0660–XC018                                        Background: The Department of
                                               http://www.mafmc.org. To join the                                                                             Commerce IPTF published a Notice of
                                               Webinar, follow this link and enter the                 Stakeholder Engagement on                             Inquiry (NOI) in 2010, focusing on the
                                               online meeting room: http://                            Cybersecurity in the Digital Ecosystem                relationship between cybersecurity and
                                               mafmc.adobeconnect.com/                                                                                       the pace of innovation in the
                                               april2015scoq/.                                         AGENCY:  National Telecommunications
                                                                                                       and Information Administration, U.S.                  information economy.1 Based on the
                                                  Council address: Mid-Atlantic Fishery                                                                      comments received, the Department of
                                                                                                       Department of Commerce.
                                               Management Council, 800 North State                                                                           Commerce published a Green Paper,
                                                                                                       ACTION: Request for Public Comment.                   Cybersecurity, Innovation, and the
                                               Street, Suite 201, Dover, DE 19901;
                                               telephone: (302) 674–2331.                              SUMMARY:   The Department of Commerce                 Internet Economy, in 2011.2 The Green
                                                                                                       Internet Policy Task Force (IPTF) is                  Paper focused on the sector of the
                                               FOR FURTHER INFORMATION CONTACT:                                                                              economy that creates or uses the
                                                                                                       requesting comment to identify
                                               Christopher M. Moore Ph.D., Executive                                                                         Internet or networking services and falls
                                                                                                       substantive cybersecurity issues that
                                               Director, Mid-Atlantic Fishery                                                                                outside the classification of critical
                                                                                                       affect the digital ecosystem and digital
                                               Management Council, 800 N. State                                                                              infrastructure, as defined by existing
                                                                                                       economic growth where broad
                                               Street, Suite 201, Dover, DE 19901;                                                                           law and Administration policy. In that
                                                                                                       consensus, coordinated action, and the
                                               telephone: (302) 526–5255.                                                                                    document, the IPTF focused on two
                                                                                                       development of best practices could
                                                                                                                                                             themes. First, there are real, evolving
                                               SUPPLEMENTARY INFORMATION:      The                     substantially improve security for
                                                                                                                                                             threats in cyberspace that not only put
                                               purpose of the meeting is to develop a                  organizations and consumers. The IPTF
                                                                                                                                                             businesses and their online operations
                                               fishery performance report by the                       invites public comment on these issues
                                                                                                                                                             at risk, but threaten to undermine the
                                               Council’s Surfclam and Ocean Quahog                     from all stakeholders with an interest in
                                                                                                                                                             trust on which much of the digital
                                               Advisory Panel. The intent of this report               cybersecurity, including the
                                                                                                                                                             economy depends. Second, the pace of
                                               is to facilitate structured input from the              commercial, academic and civil society                innovation in the highly dynamic digital
                                               Surfclam and Ocean Quahog Advisory                      sectors, and from relevant federal, state,            ecosystem makes traditional regulation
                                               Panel members to the Council and its                    local, and tribal entities.                           and compliance difficult and inefficient.
                                               Scientific and Statistical Committee                    DATES: Comments are due on or before                     Stakeholder response to the Green
                                               (SSC).                                                  5 p.m. Eastern Time on May 18, 2015.                  Paper provided a roadmap for the IPTF
                                                                                                       ADDRESSES: Written comments may be                    to continue its cybersecurity policy
                                                  Although non-emergency issues not
                                                                                                       submitted by email to                                 work. In September 2011, the IPTF, in
                                               contained in this agenda may come                                                                             coordination with the Department of
                                                                                                       securityRFC2015@ntia.doc.gov.
                                               before these groups for discussion, those                                                                     Homeland Security, issued a NOI on
                                                                                                       Comments submitted by email should
                                               issues may not be the subject of formal                 be machine-searchable and should not                  possible approaches to creating a
                                               action during this meeting. Action will                 be copy-protected. Written comments                   voluntary industry code of conduct to
                                               be restricted to those issues specifically              also may be submitted by mail to the                  address the detection, notification, and
                                               listed in this notice and any issues                    National Telecommunications and                       mitigation of botnets, which led to an
                                               arising after publication of this notice                Information Administration, U.S.                      industry-led working group.3 In
                                               that require emergency action under                     Department of Commerce, 1401                          February 2013, the White House
                                               section 305(c) of the Magnuson-Stevens                  Constitution Avenue NW., Room 4725,                   released Executive Order 13636 which
                                               Act, provided the public has been                       Attn: Cybersecurity RFC 2015,                         called upon the Department of
                                               notified of the Council’s intent to take                Washington, DC 20230. Responders                      Commerce to work with industry to
                                               final action to address the emergency.                  should include the name of the person                 develop a framework for use by U.S.
                                                                                                       or organization filing the comment, as                critical infrastructure to improve
                                               Special Accommodations
                                                                                                       well as a page number, on each page of
                                                                                                                                                                1 U.S. Department of Commerce, Internet Policy
                                                 The meeting is physically accessible                  their submissions. All comments
                                                                                                                                                             Task Force, Notice of Inquiry, Cybersecurity,
                                               to people with disabilities. Requests for               received are a part of the public record              Innovation, and the Internet Economy, Dkt. No.
                                               sign language interpretation or other                   and will generally be posted to http://               100721305–0305–01, 75 FR 44216 (July 28, 2010),
                                               auxiliary aids should be directed to M.                 www.ntia.doc.gov/category/internet-                   available at: http://www.ntia.doc.gov/federal-
                                                                                                       policy-task-force without change. All                 register-notices/2010/cybersecurity-innovation-and-
                                               Jan Saunders at the Mid-Atlantic                                                                              internet-economy. Responses to the Notice of
                                               Council Office, (302) 526–5251, at least                personal identifying information (e.g.,               Inquiry are available at: http://www.nist.gov/itl/
                                                                                                       name, address) voluntarily submitted by               cybercomments.cfm.
                                               5 days prior to the meeting date.
                                                                                                       the commenter may be publicly                            2 U.S. Department of Commerce, Internet Policy

                                                 Dated: March 16, 2015.                                accessible. Do not submit Confidential                Task Force, Cybersecurity, Innovation, and the
                                                                                                                                                             Internet Economy (June 2011) (‘‘Green Paper’’),
                                               Tracey L. Thompson,                                     Business Information or otherwise                     available at: http://www.nist.gov/itl/upload/
                                               Acting Deputy Director, Office of Sustainable           sensitive or protected information.                   Cybersecurity_Green-Paper_FinalVersion.pdf.
Rmajette on DSK2VPTVN1PROD with NOTICES




                                               Fisheries, National Marine Fisheries Service.           NTIA will accept anonymous                               3 U.S. Department of Commerce and U.S.

                                                                                                       comments.                                             Department of Homeland Security, Notice of
                                               [FR Doc. 2015–06317 Filed 3–18–15; 8:45 am]
                                                                                                                                                             Inquiry, Models To Advance Voluntary Corporate
                                               BILLING CODE 3510–22–P                                  FOR FURTHER INFORMATION CONTACT:                      Notification to Consumers Regarding the Illicit Use
                                                                                                       Allan Friedman, National                              of Computer Equipment by Botnets and Related
                                                                                                                                                             Malware, Dkt. No. 110829543–1541–01, 76 FR
                                                                                                       Telecommunications and Information                    58466 (September 21, 2011), available at: http://
                                                                                                       Administration, U.S. Department of                    www.ntia.doc.gov/files/ntia/publications/botnet_
                                                                                                       Commerce, 1401 Constitution Avenue                    rfi.pdf.



                                          VerDate Sep<11>2014   15:18 Mar 18, 2015   Jkt 235001   PO 00000   Frm 00004   Fmt 4703   Sfmt 4703   E:\FR\FM\19MRN1.SGM   19MRN1


                                                                             Federal Register / Vol. 80, No. 53 / Thursday, March 19, 2015 / Notices                                                   14361

                                               cybersecurity practices, and to                         digital ecosystem, the rapid pace of                        the Department of Commerce seeks to
                                               undertake a study on incentives to                      innovation often outstrips the ability of                   foster innovation and to better secure
                                               encourage private sector adoption of                    regulators to effectively administer key                    the ecosystem to ensure that businesses,
                                               cybersecurity protections.4                             policy questions. Open, voluntary, and                      organizations and individuals can
                                                  The Cybersecurity Framework was                      consensus-driven processes can work to                      expand their trust, investment and
                                               developed by the National Institute of                  safeguard the interests of all                              engagement in the digital economy,
                                               Standards and Technology (NIST), an                     stakeholders while still allowing the                       while also reinforcing the voluntary,
                                               agency of the Department of Commerce,                   digital economy to thrive.                                  multistakeholder approach to Internet
                                               with the aid of broad stakeholder                         The focus of these processes is to                        policymaking.
                                               participation.5 The Cybersecurity                       address discrete security challenges in                        Request for Comment: IPTF plans to
                                               Framework offers organizations a guide                  the digital ecosystem where                                 facilitate a series of discussions around
                                               for understanding and implementing                      collaborative voluntary action between                      key cybersecurity challenges that may
                                               appropriate cybersecurity protections,                  diverse actors can substantially improve                    be addressed through a better shared
                                               and has been applied by a range of                      security for everyone. Each process will                    understanding of the nature of the
                                               organizations, including a number that                  engage a wide range of participants to                      problem, and where multistakeholder
                                               fall ‘‘outside the orbit of critical                    ensure that the outcomes reflect the                        discussion can be a catalyst for self-
                                               infrastructure or key resources,’’ the                  consensus of the relevant community,                        coordination of cybersecurity activities.
                                               focus of the Green Paper effort.6                       and are fair, voluntary, and stakeholder-                   Outcomes would depend on the issues
                                               Following launch of the Cybersecurity                   driven.                                                     discussed, but may involve
                                               Framework, NIST published a Request                       These processes will be designed to                       combinations of principles, practices,
                                               for Information (RFI) in August 2014                    complement, rather than duplicate                           and the voluntary application of
                                               asking for stakeholder feedback on                      existing initiatives, both inside and                       policies and existing standards.
                                               Cybersecurity Framework awareness,                      outside the government. They will be                        Initially, IPTF seeks to conduct a
                                               use, and next steps.7 In response to                    coordinated by the IPTF, under the                          cybersecurity multistakeholder process
                                               questions regarding next steps that                     leadership of the National                                  focused on a definable area where
                                               could complement the Cybersecurity                      Telecommunications and Information                          consumers and organizations will
                                               Framework process, stakeholders again                   Administration (NTIA). Under its                            achieve the greatest benefit and
                                               identified the IPTF as a vehicle to                     statutory authority, NTIA undertakes                        consensus in a reasonable timeframe.
                                               facilitate further collaborative                        Internet policy initiatives that serve to                   While IPTF will avoid duplicating
                                               cybersecurity work, building on the                     protect, promote and reinforce an open,                     existing work, areas where stakeholders
                                               models of multistakeholder                              innovative Internet ecosystem and                           have identified the problem or begun to
                                               participation initially discussed in the                digital economy, and is the executive                       seek consensus around specific
                                               Green Paper.8                                           branch lead for promoting the                               practices could provide a useful starting
                                                  Accordingly, the IPTF proposes to                    multistakeholder approach to Internet                       point.
                                               facilitate one or more multistakeholder                 policymaking.9 In partnership with its                         To identify potential cybersecurity
                                               processes around key cybersecurity                      IPTF partners, NTIA has addressed                           topics that would benefit from a
                                               issues facing the digital ecosystem and                 other key challenges in Internet policy                     multistakeholder process, IPTF seeks
                                               economy. Multistakeholder processes,                    through multistakeholder processes,                         comment from stakeholders on the
                                               built on the principles of openness,                    including an ongoing set of initiatives                     following questions:
                                               transparency, and consensus, can                        around privacy and digital copyright.10                        1. What security challenges could be
                                               generate collective guidance and                        These proposed cybersecurity processes                      best addressed by bringing together the
                                               foundations for coordinated voluntary                   will be coordinated with standards and                      relevant participants in an open, neutral
                                               action. Potential outcomes would vary                   technology work underway within the                         forum to explore coordinated, voluntary
                                               by the issue discussed, but could                       Department of Commerce focused on                           action through principles, practices, and
                                               include voluntary policy guidelines,                    cybersecurity, including the                                guidelines? For each issue, also provide
                                               procedures, or best practices. In the                   Cybersecurity Framework, the National                       comment on:
                                                                                                       Cybersecurity Center of Excellence, and                        i. Why this topic is a good fit for a
                                                 4 Exec. Order No. 14636, Improving Critical           the National Strategy for Trusted                           multistakeholder process, and whether
                                               Infrastructure Cybersecurity, 78 FR 11739 (February     Identities in Cyberspace.11 Through the
                                               12, 2013), available at https://                                                                                    stakeholders might reasonably be
                                               www.federalregister.gov/articles/2013/02/19/2013-       comprehensive scope of all these efforts,                   expected to come to some consensus;
                                               03915/improving-critical-infrastructure-                                                                               ii. Why such a process would benefit
                                               cybersecurity.                                             9 See 47 U.S.C. 901(c) (describing NTIA’s policy
                                                                                                                                                                   the digital ecosystem as a whole;
                                                 5 National Institute of Standards and Technology,     roles, including ‘‘[p]romoting the benefits of
                                               Framework for Improving Critical Infrastructure         technological development in the United States for
                                                                                                                                                                      iii. How long a facilitated, participant-
                                               Cybersecurity Version 1.0, (February 12, 2014),         all users of telecommunications and information             led process on this topic should take to
                                               available at: http://www.nist.gov/cyberframework/       facilities;’’ ‘‘[f]ostering national safety and security,   come to consensus;
                                               upload/cybersecurity-framework-021214.pdf.              economic prosperity, and the delivery of critical              iv. What form an actionable outcome
                                                 6 Green Paper at ii.                                  social services through telecommunications;’’ and
                                                 7 U.S. Department of Commerce, National               ‘‘[f]acilitating and contributing to the full
                                                                                                                                                                   might take; and
                                                                                                       development of competition, efficiency, and the                v. What pre-existing organizations
                                               Institute of Standards and Technology, Notice of
                                               Inquiry, Experience With the Framework for              free flow of commerce in domestic and                       and work already exist on the topic.
                                               Improving Critical Infrastructure Cybersecurity, Dkt.   international telecommunications.’’)                           2. Please comment on which of the
                                                                                                          10 More information about the IPTF’s work on
                                               No. 140721609–4609–01, 79 FR 50891 (August 26,                                                                      following topics could result in
                                               2014), available at: https://www.federalregister.gov/   privacy and copyright initiatives, including
                                                                                                                                                                   actionable, collective progress by
Rmajette on DSK2VPTVN1PROD with NOTICES




                                               articles/2014/08/26/2014-20315/experience-with-         multiple Requests for Comment, are available at:
                                               the-framework-for-improving-critical-infrastructure-    http://www.ntia.doc.gov/category/internet-policy-           stakeholders in a multistakeholder
                                               cybersecurity.                                          task-force.                                                 setting. For each issue, also provide
                                                 8 See, e.g., comments from the Information               11 More information about the Cybersecurity
                                                                                                                                                                   comment on:
                                               Technology Industry Council (ITI), US Telecom           Framework is available at: http://www.nist.gov/                i. Why or why not this topic is a good
                                               Association, and Microsoft on the Cybersecurity         cyberframework; the National Cybersecurity Center
                                               Framework RFI (August 2014), available at: http://      of Excellence at: http://nccoe.nist.gov; and the
                                                                                                                                                                   fit for a multistakeholder process, and
                                               csrc.nist.gov/cyberframework/rfi_comments_10_           National Strategy for Trusted Identities in                 whether stakeholders might reasonably
                                               2014.html.                                              Cyberspace at: http://www.nist.gov/nstic.                   be expected to come to some consensus;


                                          VerDate Sep<11>2014   15:18 Mar 18, 2015   Jkt 235001   PO 00000   Frm 00005    Fmt 4703    Sfmt 4703   E:\FR\FM\19MRN1.SGM     19MRN1


                                               14362                        Federal Register / Vol. 80, No. 53 / Thursday, March 19, 2015 / Notices

                                                 ii. Why such a process would benefit                  the security of open source projects, and               spectrum of risks associated with cyber-
                                               the digital ecosystem as a whole;                       the distribution of patches?                            physical systems?
                                                 iii. How long a facilitated, participant-                (e) Malware Mitigation. Disrupting                      (j) Privacy. As noted in the
                                               led process on this topic should take to                and mitigating malware and malware                      Cybersecurity Framework, privacy and
                                               come to consensus;                                      networks can sometimes adversely                        civil liberties implications may arise
                                                 iv. What form an actionable outcome                   impact consumers and stakeholders                       when personal information is used,
                                               might take; and                                         who may be inadvertently caught-up in                   collected, processed, maintained, or
                                                 v. What pre-existing organizations                    the incident. How can existing models                   disclosed in connection with an
                                               and work already exist on the topic.                    of mitigation and disruption better                     organization’s cybersecurity activities.
                                               Network and Infrastructure Security                     incorporate the needs and concerns of                   How can risks to privacy or civil
                                                                                                       all relevant stakeholders?                              liberties arising from the application of
                                                  (a) Botnet Mitigation. Disrupting
                                                                                                                                                               cybersecurity measures or best practices
                                               botnets requires coordinated action and                 Web Security and Consumer Trust                         be addressed in this process(es)?
                                               transparency between ISPs, vendors,
                                               consumers, and the public sector, such                     (f) Web Security. Many consumers                     Business Processes and Enabling
                                               as previous efforts of the voluntary                    assume that their connections with Web                  Markets
                                               public-private partnership between the                  sites are secure, and that the Web sites
                                                                                                       themselves are secure, when there is                       (k) Managed Security Services:
                                               U.S. Office of the Cybersecurity                                                                                Requirements and Adoption. Managed
                                               Coordinator and the U.S. Departments                    little guarantee that safeguards are in
                                                                                                       place. What actions can improve web                     security services (MSS) allow many
                                               of Commerce and Homeland Security                                                                               firms, particularly small- and medium-
                                               related to ISP codes of conduct.12 What                 security and trust for consumers,
                                                                                                       including transport layer (Transport                    sized businesses, to secure themselves
                                               additional collective steps can be taken                                                                        without acquiring expensive in-house
                                               to support efforts to create awareness                  Layer Security, or TLS, often referred to
                                                                                                       as Secure Sockets Layer, or SSL) and                    expertise, yet there are obstacles
                                               and manage the effects of botnets?                                                                              preventing seamless market cooperation
                                                  (b) Trust and Security in Core Internet              web application security, potentially
                                                                                                       building on the success of existing                     and accountability between clients and
                                               Infrastructure: Naming, Routing, and
                                                                                                       stakeholder initiatives? 13                             vendors. How can a common
                                               Public Key Infrastructure. Key aspects of
                                                                                                          (g) Malvertising. Several popular Web                understanding of security needs by
                                               the Internet’s core infrastructure were
                                                                                                       sites have inadvertently spread malware                 stakeholders enable faster and more
                                               designed and deployed without explicit
                                                                                                       through ‘‘malvertising,’’ when malicious                efficient adoption to improve security
                                               security mechanisms (e.g., the Domain
                                                                                                       code is served from legitimate                          without sacrificing accountability?
                                               Name System (DNS) and Border
                                                                                                       advertising networks. How can diverse                      (l) Vulnerability Disclosure. The
                                               Gateway Protocol (BGP)) and new
                                                                                                       stakeholders work together to limit this                security of the digital economy depends
                                               threats have been discovered in the
                                                                                                       risk?                                                   on a productive relationship between
                                               Internet’s Public-Key Infrastructure (i.e.,
                                                                                                                                                               security vendors and researchers of all
                                               PKIX). Technical solutions have been                       (h) Trusted Downloads. Internet users                types who discover vulnerabilities in
                                               developed for many of these issues (e.g.,               often download content and                              existing technology and systems, and
                                               DNSSEC, BGPSec and RPKI, DANE and                       applications online without clear                       the providers, owners, and operators of
                                               certificate transparency) but uptake has                assurance of the security of the site. Are              those systems. How can stakeholders
                                               been slow. What collective action can be                there best practices and existing                       build on existing work in this space to
                                               taken to promote the voluntary adoption                 standards that providers of online                      responsibly manage the vulnerability
                                               and diffusion of existing technical                     applications and downloadable tools                     disclosure process without putting
                                               solutions to make the infrastructure                    can adopt to ensure consumer                            consumers at risk in the short run? 15
                                               more trustworthy?                                       protection without impacting
                                                  (c) Domain Name System (DNS),                                                                                   (m) Security Investment and Metrics.
                                                                                                       innovation or business models?                          Market solutions for security require
                                               Border Gateway Protocol (BGP), and                         (i) Cybersecurity and the Internet of
                                               Transport Layer Security (TLS)                                                                                  good information. What types of robust,
                                                                                                       Things. As the Internet of Things                       practical, and actionable metrics can be
                                               Certificates. Key aspects of the Internet               matures and more systems integrate
                                               infrastructure have long been known to                                                                          used within organizations to understand
                                                                                                       information technologies (IT) and                       security investment, and by consumers
                                               be vulnerable. While technical solutions                operational technologies (OT),
                                               exist for security vulnerabilities in                                                                           and clients to understand security
                                                                                                       cybersecurity is enmeshed in a broader                  practices and promote market demand
                                               routing, the domain name system and                     risk context that includes safety,
                                               TLS certificates, uptake has been slow                                                                          for security?
                                                                                                       reliability, and resilience.14 How can we                  This list is not exhaustive. The IPTF
                                               or is just beginning. What collective                   foster the emergence of voluntary policy
                                               action can be taken to promote the                                                                              welcomes comments on any of these
                                                                                                       frameworks, informed by market                          topics, as well as descriptions of other
                                               voluntary adoption and diffusion of                     dynamics, that enable Internet of Things
                                               technical solutions, such as DNS                                                                                topics that the IPTF and stakeholders
                                                                                                       innovation while addressing the full                    should consider for the cybersecurity
                                               Security (DNSSEC), to make the
                                               infrastructure more trustworthy?                                                                                multistakeholder process. Note that
                                                                                                         13 See, e.g., Open Web Application Security
                                                  (d) Open Source Assurance. Many                                                                              comments are directly sought on which
                                                                                                       Project (OWASP), Top 10 List (‘‘represent[ing] a
                                               organizations depend on open source                     broad consensus about the most critical web
                                                                                                                                                               topics to address through the process,
                                               projects for a wide range of purposes                   application security flaws’’), available at: https://   rather than the best solution to any
                                               across the digital economy. How can                     www.owasp.org/index.php/Category:OWASP_Top_             given question.
Rmajette on DSK2VPTVN1PROD with NOTICES




                                                                                                       Ten_Project.                                               3. Please comment on what factors
                                               stakeholders better support improving                     14 See, e.g., NIST Cyber-Physical Systems
                                                                                                                                                               should be considered in selecting the
                                                                                                       Homepage, available at: http://www.nist.gov/cps;
                                                 12 U.S. Department of Commerce, Press Release,        see also, FTC Staff, Internet of Things: Privacy &      issues for multistakeholder processes.
                                               White House Announces Public-Private Partnership        Security in a Connected World (January 2015),
                                               Initiatives to Combat Botnets (May 30, 2012),           available at: http://www.ftc.gov/system/files/            15 See, e.g., Vulnerability Disclosure Overview,

                                               available at: http://www.commerce.gov/news/press-       documents/reports/federal-trade-commission-staff-       ISO Standard 29147 (2014), available at: http://
                                               releases/2012/05/30/white-house-announces-              report-november-2013-workshop-entitled-internet-        www.iso.org/iso/catalogue_
                                               public-private-partnership-initiatives-combat-b.        things-privacy/150127iotrpt.pdf.                        detail.htm?csnumber=45170.



                                          VerDate Sep<11>2014   15:18 Mar 18, 2015   Jkt 235001   PO 00000   Frm 00006   Fmt 4703   Sfmt 4703   E:\FR\FM\19MRN1.SGM     19MRN1


                                                                            Federal Register / Vol. 80, No. 53 / Thursday, March 19, 2015 / Notices                                                  14363

                                                  IPTF also plans to draw on the Green                 preparation or for the use of any                     issues may not be the subject of formal
                                               Paper and earlier responses to past                     information contained in the response.                action during this meeting. Action will
                                               Requests for Public Comment; past                         Authority: 47 U.S.C. 901(c).                        be restricted to those issues specifically
                                               respondents are invited to provide                                                                            listed in this notice and any issues
                                               additional and updated viewpoints on                      Dated: March 16, 2015.                              arising after publication of this notice
                                               IPTF efforts since those comments were                  Angela Simpson,                                       that require emergency action under
                                               provided.                                               Deputy Assistant Secretary for                        section 305(c) of the Magnuson-Stevens
                                                  Implementing the Multistakeholder                    Communications and Information.                       Act, provided the public has been
                                               Process: Commenters also may wish to                    [FR Doc. 2015–06344 Filed 3–18–15; 8:45 am]           notified of the Council’s intent to take
                                               provide their views on how stakeholder                  BILLING CODE 3510–60–P                                final action to address the emergency.
                                               discussions of the proposed issue(s)
                                                                                                                                                             Special Accommodations
                                               should be structured to ensure
                                               openness, transparency, and consensus-                  DEPARTMENT OF COMMERCE                                  This meeting is physically accessible
                                               building. Analogies to other Internet-                                                                        to people with disabilities. Requests for
                                                                                                       National Oceanic and Atmospheric                      sign language interpretation or other
                                               related multistakeholder processes,
                                                                                                       Administration                                        auxiliary aids should be directed to
                                               whether they are concerned with policy
                                               or technical issues, could be especially                RIN 0748–XD841                                        Thomas A. Nies, Executive Director, at
                                               valuable.                                                                                                     (978) 465–0492, at least 5 days prior to
                                                  4. Please comment on the best                        New England Fishery Management                        the meeting date.
                                               structure and mechanics for the                         Council; Public Meeting                                 Authority: 16 U.S.C. 1801 et seq.
                                               process(es). If different security issues               AGENCY:  National Marine Fisheries                      Dated: March 16, 2015.
                                               will require different process structures,              Service (NMFS), National Oceanic and                  Tracey L. Thompson,
                                               please offer guidance on how to best                    Atmospheric Administration (NOAA),                    Acting Deputy Director, Office of Sustainable
                                               design an appropriate process for the                   Commerce.                                             Fisheries, National Marine Fisheries Service.
                                               issue selected.
                                                                                                       ACTION: Notice; public meeting.                       [FR Doc. 2015–06307 Filed 3–18–15; 8:45 am]
                                                  5. How can the IPTF promote
                                                                                                                                                             BILLING CODE 3510–22–P
                                               participation from a broad range of                     SUMMARY:   The New England Fishery
                                               stakeholders, i.e., from industry, civil                Management Council (Council) is
                                               society, academia, and international                    scheduling a joint public meeting of its              DEPARTMENT OF COMMERCE
                                               partners? In particular, how can we                     Monkfish Committee to consider actions
                                               promote engagement from small and                       affecting New England fisheries in the                National Oceanic and Atmospheric
                                               medium-sized enterprises (SME) that                     exclusive economic zone (EEZ).                        Administration
                                               play key roles in the digital ecosystem?                Recommendations from this group will
                                               How critical is location for meetings,                                                                        RIN 0648–XD840
                                                                                                       be brought to the full Council for formal
                                               and what factors should be considered                   consideration and action, if appropriate.             New England Fishery Management
                                               in determining where to host meetings?
                                                                                                       DATES: This meeting will be held on                   Council; Public Meeting
                                                  6. What procedures and technologies
                                                                                                       Tuesday, April 7, 2015 at 9:30 a.m.
                                               can promote transparency of process,                                                                          AGENCY:  National Marine Fisheries
                                               including promoting discussion                          ADDRESSES:                                            Service (NMFS), National Oceanic and
                                               between stakeholders and ensuring                          Meeting address: The meeting will be               Atmospheric Administration (NOAA),
                                               those outside the process can                           held at the Radisson Airport Hotel, 2081              Commerce.
                                               understand the decisions made?                          Post Road, Warwick, RI 02886;                         ACTION: Notice; public meeting.
                                                  7. What types of consensus outcomes                  telephone: (401) 739–3000; fax: (401)
                                               can promote real security benefits                      732–9309.                                             SUMMARY:   The New England Fishery
                                               without further adding to a compliance-                    Council address: New England                       Management Council’s (Council)
                                               oriented model of security?                             Fishery Management Council, 50 Water                  Scientific and Statistical Committee
                                                  8. Would certain cybersecurity issues                Street, Mill 2, Newburyport, MA 01950.                (SSC) will meet to consider actions
                                               be better served by a single workshop or                FOR FURTHER INFORMATION CONTACT:                      affecting New England fisheries in the
                                               other event to raise awareness and                      Thomas A. Nies, Executive Director,                   exclusive economic zone (EEZ).
                                               promote independent action, rather than                 New England Fishery Management                        DATES: The meeting will be held on
                                               a longer multistakeholder, consensus-                   Council; telephone: (978) 465–0492.                   Tuesday, April 7, 2015 at 9 a.m.
                                               building process?                                       SUPPLEMENTARY INFORMATION: The                        ADDRESSES: The meeting will be held at
                                                  9. How should evaluation of the                      Monkfish Committee will meet to                       the Courtyard by Marriott/Boston Logan
                                               processes be conducted to assess results                discuss draft alternatives for Framework              Airport, 225 McClellan Highway,
                                               and to ensure that recommendations                      Adjustment 9 that could modify the                    Boston, MA 02128; telephone: (617)
                                               and outcomes of the process remain                      current days-at-Sea/trip limit system                 569–5250.
                                               actionable and current?                                 and possession limits. The Committee                     Council address: New England
                                                  Response to this Request for Public                  will review Plan Development Team                     Fishery Management Council, 50 Water
                                               Comment is voluntary. Commenters are                    analyses requested at the August 25,                  Street, Mill 2, Newburyport, MA 01950.
                                               free to address any or all of the issues                2014 meeting. The Committee will also                 FOR FURTHER INFORMATION CONTACT:
                                               identified above, as well as provide                    discuss Monkfish Research Set-Aside                   Thomas A. Nies, Executive Director,
Rmajette on DSK2VPTVN1PROD with NOTICES




                                               information on other topics that they                   (RSA) priorities for 2016. The                        New England Fishery Management
                                               think are relevant to promoting                         Committee may also discuss other                      Council; telephone: (978) 465–0492.
                                               voluntary coordinated action to address                 business as necessary, e.g. the RSA                   SUPPLEMENTARY INFORMATION:
                                               cybersecurity risks through an open,                    program.                                                 Agenda items:
                                               transparent, voluntary, consensus-based                    Although non-emergency issues not                     The Committee will receive a report
                                               process. Please note that the                           contained in this agenda may come                     from Northeast Fisheries Science Center
                                               Government will not pay for response                    before this group for discussion, those               Regime Shifts Working Group and


                                          VerDate Sep<11>2014   15:18 Mar 18, 2015   Jkt 235001   PO 00000   Frm 00007   Fmt 4703   Sfmt 4703   E:\FR\FM\19MRN1.SGM   19MRN1



Document Created: 2018-02-21 09:42:22
Document Modified: 2018-02-21 09:42:22
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionNotices
ActionRequest for Public Comment.
DatesComments are due on or before 5 p.m. Eastern Time on May 18, 2015.
ContactAllan Friedman, National Telecommunications and Information Administration, U.S. Department of Commerce, 1401 Constitution Avenue NW., Room 4725, Washington, DC 20230; Telephone: (202) 482-4281; Email: [email protected] Please direct media inquiries to NTIA's Office of Public Affairs: (202) 482- 7002.
FR Citation80 FR 14360 
RIN Number0660-XC01

2024 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR