80_FR_59772 80 FR 59581 - Department of Defense (DoD)-Defense Industrial Base (DIB) Cybersecurity (CS) Activities

80 FR 59581 - Department of Defense (DoD)-Defense Industrial Base (DIB) Cybersecurity (CS) Activities

DEPARTMENT OF DEFENSE
Office of the Secretary

Federal Register Volume 80, Issue 191 (October 2, 2015)

Page Range59581-59588
FR Document2015-24296

DoD is revising its DoD-DIB Cybersecurity (CS) Activities regulation to mandate reporting of cyber incidents that result in an actual or potentially adverse effect on a covered contractor information system or covered defense information residing therein, or on a contractor's ability to provide operationally critical support, and modify eligibility criteria to permit greater participation in the voluntary DoD-Defense Industrial Base (DIB) Cybersecurity (CS) information sharing program.

Federal Register, Volume 80 Issue 191 (Friday, October 2, 2015)
[Federal Register Volume 80, Number 191 (Friday, October 2, 2015)]
[Rules and Regulations]
[Pages 59581-59588]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2015-24296]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF DEFENSE

Office of the Secretary

32 CFR Part 236

[DOD-2014-OS-0097]
RIN 0790-AJ29


Department of Defense (DoD)-Defense Industrial Base (DIB) 
Cybersecurity (CS) Activities

AGENCY: Office of the DoD Chief Information Officer, DoD.

ACTION: Interim final rule.

-----------------------------------------------------------------------

SUMMARY: DoD is revising its DoD-DIB Cybersecurity (CS) Activities 
regulation to mandate reporting of cyber incidents that result in an 
actual or potentially adverse effect on a covered contractor 
information system or covered defense information residing therein, or 
on a contractor's ability to provide operationally critical support, 
and modify eligibility criteria to permit greater participation in the 
voluntary

[[Page 59582]]

DoD-Defense Industrial Base (DIB) Cybersecurity (CS) information 
sharing program.

DATES: Effective Date: This rule if effective October 2, 2015. Comments 
must be received by December 1, 2015.

ADDRESSES: You may submit comments, identified by docket number and/or 
Regulatory Information Number (RIN) number and title, by any of the 
following methods:
     Federal Rulemaking Portal: http://www.regulations.gov. 
Follow the instructions for submitting comments.
     Mail: Department of Defense, Office of the Deputy Chief 
Management Officer, Directorate of Oversight and Compliance, Regulatory 
and Audit Matters Office, 9010 Defense Pentagon, Washington, DC 20301-
9010.

FOR FURTHER INFORMATION CONTACT: DoD-DIB Cybersecurity Activities 
Office: (703) 604-3167, toll free (855) 363-4227.

SUPPLEMENTARY INFORMATION:

Executive Summary

    This rule revises the DoD-DIB cybersecurity information sharing 
program regulation to implement new statutory requirements for DoD 
contractors and subcontractors to report cyber incidents that result in 
an actual or potentially adverse effect on a covered contractor 
information system or covered defense information residing therein, or 
on a contractor's ability to provide operationally critical support. 
The program also retains the voluntary information sharing activities 
for cybersecurity information that is outside the scope of the 
mandatory reporting requirements.
    Regarding the mandatory reporting, this part has been revised to 
set forth mandatory cyber incident reporting requirements that will 
apply to all forms of contracts or other agreements between DoD and DIB 
companies (e.g., procurement contracts, cooperative agreements, other 
transaction agreements). Thus, all relevant contracts or agreements are 
required to include these cyber reporting requirements (e.g., through 
incorporation of the reporting requirements by reference, or by 
expressly setting forth reporting requirements consistent with this 
part). The revisions provided in this rule are part of DoD's efforts to 
establish a single reporting mechanism for such cyber incidents on 
unclassified DoD contractor information systems. These requirements are 
focused on cyber incidents that threaten specific types of DoD program 
information, such as technical information controlled under the 
International Traffic in Arms Regulations or the Export Administration 
Regulations or otherwise controlled by DOD and operational security 
information that relates to DoD activities. Additional cyber incident 
reporting requirements for other important types of controlled 
unclassified information (CUI) (e.g., personally identifiable 
information (PII), budget or financial information) are more 
specifically addressed through other regulatory mechanisms, and thus 
are outside the scope of this rule. To clarify this distinction, the 
rule explicitly states that reporting under this program does not 
abrogate the contractor's responsibility for any other applicable cyber 
incident reporting requirements (Sec.  236.4(o)).
    The rule also revises the program's definitions to better harmonize 
with definitions that are already established and used by DoD and other 
Government agencies in similar contexts, such as those relating to the 
handling and safeguarding of Controlled Unclassified Information as 
used by the National Archives and Records Administration pursuant to 
Executive Order 13556 ``Controlled Unclassified Information'' (November 
4, 2010) (see http://www.archives.gov/cui/), and those widely used in 
the context of cybersecurity activities (see the Committee on National 
Security Systems Instruction No. 4009, ``National Information Assurance 
Glossary'').
    This rule is intended to streamline the reporting process for DoD 
contractors and minimize duplicative reporting processes, while 
preserving distinctions where appropriate. Cyber incident reporting 
involving classified information on classified contractor systems will 
be in accordance with the National Industrial Security Program 
Operating Manual (DoD-M 5220.22 (http://www.dtic.mil/whs/directives/corres/pdf/522022m.pdf)).
    This rule also modifies eligibility criteria to permit greater 
participation in the voluntary DoD-DIB CS information sharing program. 
Expanding participation in the DoD-DIB CS information sharing program 
is part of DoD's comprehensive approach to counter cyber threats 
through information sharing between the Government and DIB 
participants. The DoD-DIB CS information sharing program allows 
eligible DIB participants to receive Government furnished information 
(GFI) and cyber threat information from other DIB participants, thereby 
providing greater insights into adversarial activity targeting the DIB. 
The activities in this rule implement DoD statutory authorities to 
establish programs and activities to protect sensitive DoD information, 
including when such information resides on or transits information 
systems operated by contractors or others in support of DoD activities 
(e.g., 10 U.S.C. 391 and 2224, the Federal Information Security 
Modernization Act (FISMA), codified at 44 U.S.C. 3551 et seq., section 
941 of the NDAA for FY 2013 (Public Law 112-239)). Activities under 
this rule also fulfill important elements of DoD's critical 
infrastructure protection responsibilities, as the sector specific 
agency for the DIB sector (see Presidential Policy Directive 21 (PPD-
21), ``Critical Infrastructure Security and Resilience,'' available at 
https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil).
    Under this rule, contractors will incur costs associated with 
requirements for reporting cyber incidents of covered defense 
information on their covered contractor information system(s) or those 
affecting the contractor's ability to provide operationally critical 
support. Costs for contractors include identifying and analyzing cyber 
incidents and their impact on covered defense information, or a 
contractor's ability to provide operationally critical support, as well 
as obtaining DoD-approved medium assurance certificates to ensure 
authentication and identification when reporting cyber incidents to 
DoD. Government costs include onboarding new companies under the 
voluntary DoD-DIB CS information sharing program, and collecting and 
analyzing cyber incident reports, malicious software, and media.
    A foundational element of these new mandatory reporting 
requirements, as well as the voluntary DoD-DIB CS information sharing 
activities, is the recognition that the information being shared 
between the parties includes extremely sensitive information that 
requires protection. For additional information regarding the 
Government's safeguarding of information received from the contractors 
that require protection, see the Privacy Impact Assessment (PIA) for 
the DIB Cybersecurity/Information Assurance Activities located at 
http://dodcio.defense.gov/Portals/0/Documents/DIB%20CS-IA%20PIA_FINAL_signed_30jun2011_VMSS_GGMR_RC.pdf. The PIA provides 
detailed procedures for handling personally identifiable information 
(PII), attributional information about the strengths or vulnerabilities 
of specific covered contractor information systems, information 
providing a perceived or real competitive advantage on future

[[Page 59583]]

procurement action, and contractor information marked as proprietary or 
commercial or financial information.

Interim Final Rule Justification

    This rule is being published as an interim rule in order to comply 
with statutory guidance under Section 941 of the National Defense 
Authorization Act (NDAA) for Fiscal Year (FY) 2013, and section 391 of 
Title 10, United States Code (U.S.C.), requiring defense contractors to 
rapidly report cyber incidents on their unclassified networks or 
information systems that may affect unclassified defense information, 
or that affect their ability to provide operationally critical support 
to the Department. Issuing this rule as an interim final rule 
underscores the importance of better protecting unclassified defense 
information against the immediate cyber threat, while preserving the 
intellectual property and competitive capabilities of our national 
defense industrial base. The interim final rule enables DoD to better 
assess, in the near term, when mission critical capabilities and 
services are affected by cyber incidents and reinforces DoD's overall 
efforts to defend DoD information, protect U.S. national interests 
against cyber-attacks, and support military operations and contingency 
plans worldwide. Cybersecurity is a Congressional priority and this 
interim final rule supports the Administration's national cybersecurity 
strategy emphasizing public-private information sharing.

Regulatory Procedures

Executive Orders 12866, ``Regulatory Planning and Review'' and 13563, 
``Improving Regulation and Regulatory Review''

    Executive Orders 13563 and 12866 direct agencies to assess all 
costs and benefits of available regulatory alternatives and, if 
regulation is necessary, to select regulatory approaches that maximize 
net benefits (including potential economic, environmental, public 
health and safety effects, distribute impacts, and equity). Executive 
Order 13563 emphasizes the importance of quantifying both costs and 
benefits, of reducing costs, of harmonizing rules, and of promoting 
flexibility. This rule has been designated a ``significant regulatory 
action,'' although not economically significant, under section 3(f) of 
Executive Order 12866. Accordingly, the rule has been reviewed by the 
Office of Management and Budget (OMB).

Public Law 104-121, ``Congressional Review Act'' (5 U.S.C. 801)

    It has been determined that this rule is not a ``major'' rule under 
5 U.S.C. 801, enacted by Public Law 104-121, because it will not result 
in an annual effect on the economy of $100 million or more; a major 
increase in costs or prices for consumers, individual industries, 
Federal, State, or local Government agencies, or geographic regions; or 
significant adverse effects on competition, employment, investment, 
productivity, innovation, or on the ability of United States-based 
enterprises to compete with foreign-based enterprises in domestic and 
export markets.

Sec. 202, Public Law 104-4, ``Unfunded Mandates Reform Act''

    It has been determined that this rule does not contain a Federal 
mandate that may result in expenditure by State, local and tribal 
Governments, in aggregate, or by the private sector, of $100 million or 
more in any one year.

Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601)

    It has been certified that this rule is not subject to the 
Regulatory Flexibility Act (5 U.S.C. 601) because it would not, if 
promulgated, have a significant economic impact on a substantial number 
of small entities. Therefore, the Regulatory Flexibility Act, as 
amended, does not require us to prepare a regulatory flexibility 
analysis.

Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter 35)

    It has been determined that 32 CFR part 236 does contain reporting 
or recordkeeping requirements under the Paper Reduction Act (PRA) of 
1995. These reporting requirements apply existing collection approvals 
under Office of Management and Budget (OMB) Control Numbers: 0704-0489, 
``Defense Industrial Base Cyber Security/Information Assurance (DIB CS/
IA) Cyber Incident Reporting,'' and 0704-0490, ``Defense Industrial 
Base Cyber Security/Information Assurance (DIB CS/IA) Points of Contact 
(POC) Information.''
    DoD has submitted a revision for the 0704-0489 collection to OMB 
under the provisions of the Paperwork Reduction Act (44 U.S.C. Chapter 
35) in response to 32 CFR part 236 expanding the number of companies 
under mandatory cyber incident reporting requirements. Comments are 
invited on: (a) whether the proposed collection of information is 
necessary for the proper performance of the functions of DoD, including 
whether the information will have practical utility; (b) the accuracy 
of the estimate of the burden of the proposed information collection; 
(c) ways to enhance the quality, utility, and clarity of the 
information to be collected; and (d) ways to minimize the burden of the 
information collection on respondents, including the use of automated 
collection techniques or other forms of information technology.
    Title: Cyber Incident Reporting by DoD Contractors
    Type of Request: Revision.
    Number of DoD contractors impacted is 10,000.
    Projected Responses Per Participant Per Year: 5.
    Annual Total Responses: Up to 50,000.
    Average Burden Per Response: 7 hours (this includes searching 
existing data sources, gathering and maintaining the data needed, and 
completing and reviewing the collection of information).
    Annual Total Burden Hours: 250,000 hours for all participants.
    Needs and Uses: The requested information supports the mandatory 
cyber incident reporting requirements under Section 941 of the NDAA for 
Fiscal Year (FY) 13 and Section 1632 of the NDAA for FY 15, and 
facilitates cyber situational awareness and cyber threat information 
sharing. DoD contractors report incidents using the standard Incident 
Collection Format (ICF). The primary means of reporting is through a 
secure unclassified web portal, but a company may report incidents 
through other communication means if necessary.
    Affected Public: DoD contractors with the provisions of 32 CFR part 
236 in their agreements with DoD.
    Frequency: On occasion.
    Respondent's Obligation: Mandatory.
    DoD has submitted a revision for the 0704-0490 collection to OMB 
under the provisions of the Paperwork Reduction Act (44 U.S.C. Chapter 
35) in response to 32 CFR part 236 expanding the number of companies 
eligible to participate in the voluntary DIB CS information sharing 
program. Comments are invited on: (a) whether the proposed collection 
of information is necessary for the proper performance of the functions 
of DoD, including whether the information will have practical utility; 
(b) the accuracy of the estimate of the burden of the proposed 
information collection; (c) ways to enhance the quality, utility, and 
clarity of the information to be collected; and (d) ways to minimize 
the burden of the information collection on respondents, including the 
use of automated collection techniques or other forms of information 
technology.

[[Page 59584]]

    Title: Defense Industrial Base Cybersecurity Activities Points of 
Contact (POC) Information.
    Type of Request: Revision.
    Number of DoD contractors impacted is 8,500. DoD estimates that no 
more than 10% of the total eligible population of cleared defense 
contractors will apply to the voluntary DIB Cybersecurity Activities 
program resulting in 850 cleared defense contractors impacted annually. 
An additional 10% of the population or 85 contractors may provide 
updated points of contact for the program, as required.
    Projected Responses Per Participant: Initial collection is one per 
company with updates on a case-by-case basis.
    Annual Total Responses: 935.
    Average Burden Per Response: 20 minutes.
    Annual Total Burden Hours: 312 hours for all participants.
    Needs and Uses: The Government will collect business points of 
contact (POC) information from all Defense Industrial Base (DIB) 
Cybersecurity program participants on a one-time basis, with updates as 
necessary, to facilitate communications and the sharing of share 
unclassified and classified cyber threat information.
    Affected Public: Business or other for-profit and not-for-profit 
institutions.
    Frequency: On occasion.
    Respondent's Obligation: Voluntary.
    OMB Desk Officer:
    Written comments and recommendations on these information 
collections should be sent to Ms. Jasmeet Seehra at the Office of 
Management and Budget, DoD Desk Officer, Room 10102, New Executive 
Office Building, Washington, DC 20503, with a copy to the Director, 
DoD-DIB Cybersecurity Activities Office, at the Office of the DoD Chief 
Information Officer, 6000 Defense Pentagon, Attn: DIB CS Activities 
Office, Washington, DC 20301-6000, or email at OSD.DIBCSIA@mail.mil.
    You may also submit comments, identified by docket number and 
title, by the following method:
    Federal Rulemaking Portal: http://www.regulations.gov. Follow the 
instructions for submitting comments.
    All submissions received must include the agency name, docket 
number and title for this Federal Register document. The general policy 
for comments and other submissions from members of the public is to 
make these submissions available for public viewing on the Internet at 
http://www.regulations.gov as they are received without change, 
including any personal identifiers or contact information.

Executive Order 13132, ``Federalism''

    It has been determined that this rule does not have federalism 
implications, as set forth in Executive Order 13132. This rule does not 
have substantial direct effects on:
    (a) The States;
    (b) The relationship between the National Government and the 
States; or
    (c) The distribution of power and responsibilities among the 
various levels of Government.

List of Subjects in 32 CFR Part 236

    Government contracts, Security measures.
    Accordingly, 32 CFR part 236 is revised to read as follows:

PART 236--DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) 
CYBERSECURITY (CS) ACTIVITIES

Sec.
236.1 Purpose.
236.2 Definitions.
236.3 Policy.
236.4 Mandatory cyber incident reporting procedures.
236.5 DoD-DIB CS information sharing program.
236.6 General provisions of the DoD-DIB CS information sharing 
program.
236.7 DoD-DIB CS information sharing program requirements.

    Authority: 10 U.S.C. 391; 10 U.S.C. 2224; 44 U.S.C. 3506; 44 
U.S.C. 3544; and Section 941, Publ. L. 112-239, 126 Stat. 1632.


Sec. 236.1  Purpose.

    Cyber threats to contractor unclassified information systems 
represent an unacceptable risk of compromise of DoD information and 
pose an imminent threat to U.S. national security and economic security 
interests. This part requires all DoD contractors to rapidly report 
cyber incidents involving covered defense information on their covered 
contractor information systems or cyber incidents affecting the 
contractor's ability to provide operationally critical support. The 
part also modifies the eligibility criteria to permit greater 
participation in the voluntary DoD-DIB CS information sharing program 
in which DoD provides cyber threat information and cybersecurity best 
practices to DIB participants. The DoD-DIB CS information sharing 
program enhances and supplements DIB participants' capabilities to 
safeguard DoD information that resides on, or transits, DIB 
unclassified information systems.


Sec. 236.2  Definitions.

    As used in this part:
    Access to media means provision of media, or access to media 
physically or remotely to DoD personnel, as determined by the 
contractor.
    Cleared defense contractor (CDC) means a private entity granted 
clearance by DoD to access, receive, or store classified information 
for the purpose of bidding for a contract or conducting activities in 
support of any program of DoD.
    Compromise means disclosure of information to unauthorized persons, 
or a violation of the security policy of a system, in which 
unauthorized intentional or unintentional disclosure, modification, 
destruction, or loss of an object, or the copying of information to 
unauthorized media may have occurred.
    Contractor means an individual or organization outside the U.S. 
Government who has accepted any type of agreement or order to provide 
research, supplies, or services to DoD, including prime contractors and 
subcontractors.
    Contractor attributional/proprietary information means information 
that identifies the contractor(s), whether directly or indirectly, by 
the grouping of information that can be traced back to the 
contractor(s) (e.g., program description, facility locations), 
personally identifiable information, as well as trade secrets, 
commercial or financial information, or other commercially sensitive 
information that is not customarily shared outside of the company.
    Controlled Technical Information means technical information with 
military or space application that is subject to controls on the 
access, use, reproduction, modification, performance, display, release, 
disclosure, or dissemination. Controlled technical information would 
meet the criteria, if disseminated, for distribution statements B 
through F using the criteria set forth in DoD Instruction 5230.24, 
``Distribution Statements of Technical Documents,'' available at http://www.dtic.mil/whs/directives/corres/pdf/523024p.pdf. The term does not 
include information that is lawfully publicly available without 
restrictions.
    Covered contractor information system means an information system 
that is owned or operated by or for a contractor and that processes, 
stores, or transmits covered defense information.
    Covered defense information means unclassified information that:
    (1) Is:
    (i) Provided to the contractor by or on behalf of the DoD in 
connection with the performance of a contract; or
    (ii) Collected, developed, received, transmitted, used, or stored 
by or on behalf of the contractor in support of the performance of a 
contract; and

[[Page 59585]]

    (2) Falls in any of the following categories:
    (i) Controlled Technical Information;
    (ii) Critical information (operations security). Specific facts 
identified through the Operations Security process about friendly 
intentions, capabilities, and activities vitally needed by adversaries 
for them to plan and act effectively so as to guarantee failure or 
unacceptable consequences for friendly mission accomplishment (part of 
Operations Security process);
    (iii) Export Control. Unclassified information concerning certain 
items, commodities, technology, software, or other information whose 
export could reasonably be expected to adversely affect the United 
States national security and nonproliferation objectives. To include 
dual use items; items identified in export administration regulations, 
international traffic in arms regulations and munitions list; license 
applications; and sensitive nuclear technology information;
    (iv) Any other information, marked or otherwise identified by the 
Government, that requires safeguarding or dissemination controls 
pursuant to and consistent with law, regulations, and Government-wide 
policies (e.g., privacy, proprietary business information).
    Cyber incident means actions taken through the use of computer 
networks that result in a compromise or an actual or potentially 
adverse effect on an information system and/or the information residing 
therein.
    Cyber incident damage assessment means a managed, coordinated 
process to determine the effect on defense programs, defense scientific 
and research projects, or defense warfighting capabilities resulting 
from compromise of a contractor's unclassified computer system or 
network.
    Defense Industrial Base (DIB) means the Department of Defense, 
Government, and private sector worldwide industrial complex with 
capabilities to perform research and development, design, produce, and 
maintain military weapon systems, subsystems, components, or parts to 
satisfy military requirements.
    DIB participant means a CDC that has met all of the eligibility 
requirements to participate in the voluntary DoD-DIB CS Information 
Sharing Program as set forth in this part (see Sec.  236.7).
    Forensic analysis means the practice of gathering, retaining, and 
analyzing computer-related data for investigative purposes in a manner 
that maintains the integrity of the data.
    Government furnished information (GFI) means information provided 
by the Government under the voluntary DoD-DIB CS information sharing 
program including but not limited to cyber threat information and 
cybersecurity practices.
    Information means any communication or representation of knowledge 
such as facts, data, or opinions in any medium or form, including 
textual, numerical, graphic, cartographic, narrative, or audiovisual.
    Information system means a discrete set of information resources 
organized for the collection, processing, maintenance, use, sharing, 
dissemination, or disposition of information.
    Malicious software means software or firmware intended to perform 
an unauthorized process that will have adverse impact on the 
confidentiality, integrity, or availability of an information system. 
This definition includes a virus, worm, Trojan horse, or other code-
based entity that infects a host, as well as spyware and some forms of 
adware.
    Media means physical devices or writing surfaces, including but not 
limited to, magnetic tapes, optical disks, magnetic disks, large-scale 
integration memory chips, and printouts onto which covered defense 
information is recorded, stored, or printed within a covered Contractor 
information system.
    Operationally critical support means supplies or services 
designated by the Government as critical for airlift, sealift, 
intermodal transportation services, or logistical support that is 
essential to the mobilization, deployment, or sustainment of the Armed 
Forces in a contingency operation.
    Rapid(ly) report(ing) means within 72 hours of discovery of any 
cyber incident.
    Technical Information means technical data or computer software, as 
those terms are defined in DFARS 252.227-7013, ``Rights in Technical 
Data--Noncommercial Items'' (48 CFR 252.227-7013). Examples of 
technical information include research and engineering data, 
engineering drawings and associated lists, specifications, standards, 
process sheets, manuals, technical reports, technical orders, catalog-
item identifications, data sets, studies and analyses and related 
information, and computer software executable code and source code.
    Threat means any circumstance or event with the potential to 
adversely impact organization operations (including mission, functions, 
image, or reputation), organization assets, individuals, other 
organizations, or the Nation through an information system via 
unauthorized access, destruction, disclosure, modification of 
information and/or denial of service.
    U.S. based means provisioned, maintained, or operated within the 
physical boundaries of the United States.
    U.S. citizen means a person born in the United States or 
naturalized.


Sec. 236.3  Policy.

    It is DoD policy to:
    (a) Establish a comprehensive approach to require safeguarding of 
covered defense information on covered contractor information systems 
and to require contractor cyber incident reporting.
    (b) Increase Government stakeholder and DIB situational awareness 
of the extent and severity of cyber threats to DoD information by 
implementing a streamlined approval process that enables the contractor 
to elect, in conjunction with the cyber incident reporting and sharing, 
the extent to which DoD may share cyber threat information obtained 
from a contractor (or derived from information obtained from the 
company) under this part that is not information created by or for DoD 
with:
    (1) DIB contractors participating in the DoD-DIB CS information 
sharing program to enhance their cybersecurity posture to better 
protect covered defense information on covered contractor information 
systems, or a contractor's ability to provide operationally critical 
support; and
    (2) Other Government stakeholders for lawful Government activities, 
including cybersecurity for the protection of Government information or 
information systems, law enforcement and counterintelligence (LE/CI), 
and other lawful national security activities directed against the 
cyber threat (e.g., those attempting to infiltrate and compromise 
information on the contractor information systems).
    (c) Modify eligibility criteria to permit greater participation in 
the voluntary DoD-DIB CS information sharing program.


Sec.  236.4  Mandatory cyber incident reporting procedures.

    (a) Applicability and order of precedence. The requirement to 
report cyber incidents shall be included in all applicable agreements 
between the Government and the contractor in which covered defense 
information resides on, or transits covered contractor information 
systems or under which a contractor provides operationally critical 
support, and shall be identical to those requirements provided in this 
section (e.g., by incorporating the requirements of this section by 
reference, or by expressly setting forth

[[Page 59586]]

such reporting requirements consistent with those of this section). Any 
inconsistency between the relevant terms and condition of any such 
agreement and this section shall be resolved in favor of the terms and 
conditions of the agreement, provided and to the extent that such terms 
and conditions are authorized to have been included in the agreement in 
accordance with applicable laws and regulations.
    (b) Cyber incident reporting requirement. When a contractor 
discovers a cyber incident that affects a covered contractor 
information system or the covered defense information residing therein 
or that affects the contractor's ability to provide operationally 
critical support, the contractor shall:
    (1) Conduct a review for evidence of compromise of covered defense 
information including, but not limited to, identifying compromised 
computers, servers, specific data, and user accounts. This review shall 
also include analyzing covered contractor information system(s) that 
were part of the cyber incident, as well as other information systems 
on the contractor's network(s), that may have been accessed as a result 
of the incident in order to identify compromised covered defense 
information, or that affect the contractor's ability to provide 
operationally critical support; and
    (2) Rapidly report cyber incidents to DoD at http://dibnet.dod.mil.
    (c) Cyber incident report. The cyber incident report shall be 
treated as information created by or for DoD and shall include, at a 
minimum, the required elements at http://dibnet.dod.mil.
    (d) Subcontractor reporting procedures. Contractors shall flow down 
the cyber incident reporting requirements of this part to their 
subcontractors, as appropriate. Contractors shall require 
subcontractors to rapidly report cyber incidents directly to DoD at 
http://dibnet.dod.mil and the prime contractor. This includes providing 
the incident report number, automatically assigned by DoD, to the prime 
contractor (or next higher-tier subcontractor) as soon as practicable.
    (e) Medium assurance certificate requirement. In order to report 
cyber incidents in accordance with this part, the contractor or 
subcontractor shall have or acquire a DoD-approved medium assurance 
certificate to report cyber incidents. For information on obtaining a 
DoD-approved medium assurance certificate, see http://iase.disa.mil/pki/eca/certificate.html.
    (f) If the contractor utilizes a third-party service provider (SP) 
for information system security services, the SP may report cyber 
incidents on behalf of the contractor.
    (g) Contractors are encouraged to report information to promote 
sharing of cyber threat indicators that they believe are valuable in 
alerting the Government and others, as appropriate in order to better 
counter threat actor activity. Cyber incidents that are not compromises 
of covered defense information or do not adversely affect the 
contractor's ability to perform operationally critical support may be 
of interest to the DIB and DoD for situational awareness purposes.
    (h) Malicious software. Malicious software discovered and isolated 
by the contractor will be submitted to the DoD Cyber Crime Center (DC3) 
for forensic analysis.
    (i) Media preservation and protection. When a contractor discovers 
a cyber incident has occurred, the contractor shall preserve and 
protect images of known affected information systems identified in 
paragraph (b) of this section and all relevant monitoring/packet 
capture data for at least 90 days from submission of the cyber incident 
report to allow DoD to request the media or decline interest.
    (j) Access to additional information or equipment necessary for 
forensics analysis. Upon request by DoD, the contractor shall provide 
DoD with access to additional information or equipment that is 
necessary to conduct a forensic analysis.
    (k) Cyber incident damage assessment activities. If DoD elects to 
conduct a damage assessment, DoD will request that the contractor 
provide all of the damage assessment information gathered in accordance 
with paragraph (e) of this section.
    (l) DoD safeguarding and use of contractor attributional/
proprietary information. The Government shall protect against the 
unauthorized use or release of information obtained from the contractor 
(or derived from information obtained from the contractor) under this 
part that includes contractor attributional/proprietary information, 
including such information submitted in accordance with paragraph (b) 
of this section. To the maximum extent practicable, the contractor 
shall identify and mark attributional/proprietary information. In 
making an authorized release of such information, the Government will 
implement appropriate procedures to minimize the contractor 
attributional/proprietary information that is included in such 
authorized release, seeking to include only that information that is 
necessary for the authorized purpose(s) for which the information is 
being released.
    (m) Use and release of contractor attributional/proprietary 
information not created by or for DoD. Information that is obtained 
from the contractor (or derived from information obtained from the 
contractor) under this part that is not created by or for DoD is 
authorized to be released outside of DoD:
    (1) To entities with missions that may be affected by such 
information;
    (2) To entities that may be called upon to assist in the diagnosis, 
detection, or mitigation of cyber incidents;
    (3) To Government entities that conduct LE/CI investigations;
    (4) For national security purposes, including cyber situational 
awareness and defense purposes (including sharing with DIB contractors 
participating in the DIB CS program authorized by this part); or
    (5) To a support services contractor (``recipient'') that is 
directly supporting Government activities related to this part and is 
bound by use and non-disclosure restrictions that include all of the 
following conditions:
    (i) The recipient shall access and use the information only for the 
purpose of furnishing advice or technical assistance directly to the 
Government in support of the Government's activities related to this 
part, and shall not be used for any other purpose;
    (ii) The recipient shall protect the information against 
unauthorized release or disclosure;
    (iii) The recipient shall ensure that its employees are subject to 
use and non-disclosure obligations consistent with this part prior to 
the employees being provided access to or use of the information;
    (iv) The third-party contractor that reported the cyber incident is 
a third-party beneficiary of the non-disclosure agreement between the 
Government and the recipient, as required by paragraph (m)(5)(iii) of 
this section;
    (v) That a breach of these obligations or restrictions may subject 
the recipient to:
    (A) Criminal, civil, administrative, and contractual actions in law 
and equity for penalties, damages, and other appropriate remedies by 
the United States; and
    (B) Civil actions for damages and other appropriate remedies by the 
third party that reported the incident, as a third party beneficiary of 
the non-disclosure agreement.
    (6) Use and release of contractor attributional/proprietary 
information created by or for DoD. Information that

[[Page 59587]]

is obtained from the contractor (or derived from information obtained 
from the contractor) under this part that is created by or for DoD 
(including the information submitted pursuant to paragraph (b) of this 
section) is authorized to be used and released outside of DoD for 
purposes and activities authorized by this section, and for any other 
lawful Government purpose or activity, subject to all applicable 
statutory, regulatory, and policy based restrictions on the 
Government's use and release of such information.
    (n) Contractors shall conduct their respective activities under 
this part in accordance with applicable laws and regulations on the 
interception, monitoring, access, use, and disclosure of electronic 
communications and data.
    (o) Freedom of Information Act (FOIA). Agency records, which may 
include qualifying information received from non-federal entities, are 
subject to request under the Freedom of Information Act (5 U.S.C. 552) 
(FOIA), which is implemented in the DoD by DoD Directive 5400.07 and 
DoD Regulation 5400.7-R (see 32 CFR parts 285 and 286, respectively). 
Pursuant to established procedures and applicable regulations, the 
Government will protect sensitive nonpublic information reported under 
mandatory reporting requirements against unauthorized public disclosure 
by asserting applicable FOIA exemptions. The Government will inform the 
non-Government source or submitter (e.g., contractor or DIB participant 
of any such information that may be subject to release in response to a 
FOIA request), in order to permit the source or submitter to support 
the withholding of such information or pursue any other available legal 
remedies.
    (p) Other reporting requirements. Cyber incident reporting required 
by this part in no way abrogates the contractor's responsibility for 
other cyber incident reporting pertaining to its unclassified 
information systems under other clauses that may apply to its 
contract(s), or as a result of other applicable U.S. Government 
statutory or regulatory requirements, including Federal or DoD 
requirements for Controlled Unclassified Information as established by 
Executive Order 13556, as well as regulations and guidance established 
pursuant thereto.


Sec.  236.5  DoD-DIB CS information sharing program.

    (a) All contractors that are CDCs and meet the requirements set 
forth in Sec.  236.7 are eligible to join the voluntary DoD-DIB CS 
information sharing program as a DIB participant.
    (b) Under the voluntary activities of the DoD-DIB CS information 
sharing program, the Government and each DIB participant will execute a 
standardized agreement, referred to as a Framework Agreement (FA) to 
share, in a timely and secure manner, on a recurring basis, and to the 
greatest extent possible, cybersecurity information.
    (c) Each such FA between the Government and a DIB participant must 
comply with and implement the requirements of this part, and will 
include additional terms and conditions as necessary to effectively 
implement the voluntary information sharing activities described in 
this part with individual DIB participants.
    (d) The DoD-DIB CS Activities Office is the overall point of 
contact for the program. The DC3 managed DoD-DIB Collaborative 
Information Sharing Environment (DCISE) is the operational focal point 
for cyber threat information sharing and incident reporting under the 
DoD-DIB CS information sharing program.
    (e) The Government will maintain a Web site or other internet-based 
capability to provide potential DIB participants with information about 
eligibility and participation in the program, to enable online 
application or registration for participation, and to support the 
execution of necessary agreements with the Government.
    (f) GFI. The Government shall share GFI with DIB participants or 
designated SP in accordance with this part.
    (g) Prior to receiving GFI from the Government, each DIB 
participant shall provide the requisite points of contact information, 
to include security clearance and citizenship information, for the 
designated personnel within their company (e.g., typically 3-10 company 
designated points of contact) in order to facilitate the DoD-DIB 
interaction in the DoD-DIB CS information sharing program. The 
Government will confirm the accuracy of the information provided as a 
condition of that point of contact being authorized to act on behalf of 
the DIB participant for this program.
    (h) GFI will be issued via both unclassified and classified means. 
DIB participant handling and safeguarding of classified information 
shall be in compliance with DoD 5220.22-M, ``National Industrial 
Security Program Operating Manual (NISPOM),'' available at http://www.dss.mil/documents/odaa/nispom2006-5220.pdf. The Government shall 
specify transmission and distribution procedures for all GFI, and shall 
inform DIB participants of any revisions to previously specified 
transmission or procedures.
    (i) Except as authorized in this part or in writing by the 
Government, DIB participants may:
    (1) Use GFI only on U.S. based covered contractor information 
systems, or U.S. based networks or information systems used to provide 
operationally critical support; and
    (2) Share GFI only within their company or organization, on a need-
to-know basis, with distribution restricted to U.S. citizens.
    (j) In individual cases DIB participants may request, and the 
Government may authorize, disclosure and use of GFI under applicable 
terms and conditions when the DIB participant can demonstrate that 
appropriate information handling and protection mechanisms are in place 
and has determined that it requires the ability:
    (1) To share the GFI with a non-U.S. citizen; or
    (2) To use the GFI on a non-U.S. based covered contractor 
information system; or
    (3) To use the GFI on a non-U.S. based network or information 
system in order to better protect a contractor's ability to provide 
operationally critical support.
    (k) DIB participants shall maintain the capability to 
electronically disseminate GFI within the Company in an encrypted 
fashion (e.g., using Secure/Multipurpose Internet Mail Extensions (S/
MIME), secure socket layer (SSL), Transport Layer Security (TLS) 
protocol version 1.2, DoD-approved medium assurance certificates).
    (l) DIB participants shall not share GFI outside of their company 
or organization, regardless of personnel clearance level, except as 
authorized in this part or otherwise authorized in writing by the 
Government.
    (m) If the DIB participant utilizes a SP for information system 
security services, the DIB participant may share GFI with that SP under 
the following conditions and as authorized in writing by the 
Government:
    (1) The DIB participant must identify the SP to the Government and 
request permission to share or disclose any GFI with that SP (which may 
include a request that the Government share information directly with 
the SP on behalf of the DIB participant) solely for the authorized 
purposes of this program.
    (2) The SP must provide the Government with sufficient information 
to enable the Government to determine whether the SP is eligible to 
receive such information, and possesses the capability to provide 
appropriate protections for the GFI.

[[Page 59588]]

    (3) Upon approval by the Government, the SP must enter into a 
legally binding agreement with the DIB participant (and also an 
appropriate agreement with the Government in any case in which the SP 
will receive or share information directly with the Government on 
behalf of the DIB participant) under which the SP is subject to all 
applicable requirements of this part and of any supplemental terms and 
conditions in the DIB participant's FA with the Government, and which 
authorizes the SP to use the GFI only as authorized by the Government.
    (n) The DIB participant may not sell, lease, license, or otherwise 
incorporate the GFI into its products or services, except that this 
does not prohibit a DIB participant from being appropriately designated 
an SP in accordance with paragraph (m) of this section.


Sec.  236.6  General provisions of the DoD-DIB CS information sharing 
program.

    (a) Confidentiality of information that is exchanged under the DoD-
DIB CS information sharing program will be protected to the maximum 
extent authorized by law, regulation, and policy. DoD and DIB 
participants each bear responsibility for their own actions under the 
voluntary DoD-DIB CS information sharing program.
    (b) All DIB CS participants may participate in the Department of 
Homeland Security's Enhanced Cybersecurity Services (ECS) program 
(http://www.dhs.gov/enhanced-cybersecurity-services).
    (c) Participation in the voluntary DoD-DIB CS information sharing 
program does not obligate the DIB participant to utilize the GFI in, or 
otherwise to implement any changes to, its information systems. Any 
action taken by the DIB participant based on the GFI or other 
participation in this program is taken on the DIB participant's own 
volition and at its own risk and expense.
    (d) A DIB participant's participation in the voluntary DoD-DIB CS 
information sharing program is not intended to create any unfair 
competitive advantage or disadvantage in DoD source selections or 
competitions, or to provide any other form of unfair preferential 
treatment, and shall not in any way be represented or interpreted as a 
Government endorsement or approval of the DIB participant, its 
information systems, or its products or services.
    (e) The DIB participant and the Government may each unilaterally 
limit or discontinue participation in the voluntary DoD-DIB CS 
information sharing program at any time. Termination shall not relieve 
the DIB participant or the Government from obligations to continue to 
protect against the unauthorized use or disclosure of GFI, attribution 
information, contractor proprietary information, third-party 
proprietary information, or any other information exchanged under this 
program, as required by law, regulation, contract, or the FA.
    (f) Upon termination of the FA, and/or change of Facility Security 
Clearance (FCL) status below Secret, GFI must be returned to the 
Government or destroyed pursuant to direction of, and at the discretion 
of, the Government.
    (g) Participation in these activities does not abrogate the 
Government's, or the DIB participants' rights or obligations regarding 
the handling, safeguarding, sharing, or reporting of information, or 
regarding any physical, personnel, or other security requirements, as 
required by law, regulation, policy, or a valid legal contractual 
obligation. However, participation in the voluntary activities of the 
DoD-DIB CS information sharing program does not eliminate the 
requirement for DIB participants to report cyber incidents in 
accordance with Sec.  236.4.


Sec.  236.7  DoD-DIB CS information sharing program requirements.

    (a) To participate in the DoD-DIB CS information sharing program, a 
contractor must be a CDC and shall:
    (1) Have an existing active FCL granted under the NISPOM (DoD 
5220.22-M); and
    (2) Execute the standardized FA with the Government (available 
during the application process), which implements the requirements set 
forth in Sec. Sec.  236.5 through 236.7, and allows the CDC to select 
their level of participation in the voluntary DoD-DIB CS information 
sharing program.
    (3) In order for participating CDCs to receive classified cyber 
threat information electronically, they must:
    (i) Have or acquire a Communication Security (COMSEC) account in 
accordance with the NISPOM Chapter 9, Section 4 (DoD 5220.22-M), which 
provides procedures and requirements for COMSEC activities; and
    (ii) Have or acquire approved safeguarding for at least Secret 
information, and continue to qualify under the NISPOM for retention of 
its FCL and approved safeguarding; and
    (iii) Obtain access to DoD's secure voice and data transmission 
systems supporting the voluntary DoD-DIB CS information sharing 
program.
    (b) [Reserved]

    Dated: September 14, 2015.
Patricia L. Toppings,
OSD Federal Register, Liaison Officer, Department of Defense.
[FR Doc. 2015-24296 Filed 10-1-15; 8:45 am]
 BILLING CODE 5001-06-P



                                                                     Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations                                              59581

                                                  How This Document Complies With the                     E. Regulatory Flexibility Act                         List of Subjects in 27 CFR Part 555
                                                  Federal Administrative Requirements                       The Attorney General, in accordance                   Administrative practice and
                                                  for Rulemaking                                          with the Regulatory Flexibility Act, 5                procedure, Customs duties and
                                                  A. Executive Order 12866 and Executive                  U.S.C. 605(b), has reviewed this rule                 inspection, Explosives, Hazardous
                                                  Order 13563                                             and, by approving it, certifies that it will          substances, Imports, Penalties,
                                                                                                          not have a significant economic impact                Reporting and recordkeeping
                                                     This final rule has been drafted and                 on a substantial number of small entities             requirements, Safety, Security measures,
                                                  reviewed in accordance with Executive                   because it pertains to personnel and                  Seizures and forfeitures, Transportation,
                                                  Order 12866, ‘‘Regulatory Planning and                  administrative matters affecting the                  and Warehouses.
                                                  Review,’’ section 1(b), The Principles of               Department. Further, a Regulatory
                                                  Regulation, and Executive Order 13563,                                                                        Authority and Issuance
                                                                                                          Flexibility Analysis is not required for
                                                  ‘‘Improving Regulation and Regulatory                   this final rule because the Department                  Accordingly, for the reasons
                                                  Review,’’ section 1, General Principles                 was not required to publish a general                 discussed in the preamble, 27 CFR part
                                                  of Regulation. This rule is limited to                  notice of proposed rulemaking for this                555 is amended as follows:
                                                  agency organization, management, or                     matter. See 5 U.S.C. 604.
                                                  personnel matters as described by                                                                             PART 555—COMMERCE IN
                                                  Executive Order 12866, section 3(d)(3)                  F. Small Business Regulatory                          EXPLOSIVES
                                                  and, therefore, is not a ‘‘regulation’’ or              Enforcement Fairness Act of 1996
                                                  ‘‘rule’’ as defined by that Executive                                                                         ■ 1. The authority citation for 27 CFR
                                                                                                            This rule is not a major rule as                    part 555 continues to read as follows:
                                                  Order.                                                  defined by section 251 of the Small
                                                                                                          Business Regulatory Enforcement                           Authority: 18 U.S.C. 847.
                                                  B. Executive Order 13132
                                                                                                          Fairness Act of 1996, 5 U.S.C. 804. This              ■ 2. Revise the definition of ‘‘Customs
                                                    This final rule will not have                         rule will not result in an annual effect              officer’’ in § 555.11 to read as follows:
                                                  substantial direct effects on the States,               on the economy of $100 million or
                                                  on the relationship between the Federal                 more; a major increase in costs or prices;            § 555.11    Meaning of terms.
                                                  Government and the States, or on the                    or significant adverse effects on                     *     *     *    *     *
                                                  distribution of power and                               competition, employment, investment,                    Customs officer. Any officer of U.S.
                                                  responsibilities among the various                      productivity, innovation, or on the                   Customs and Border Protection, any
                                                  levels of government. Therefore, in                     ability of United States-based                        commissioned, warrant, or petty officer
                                                  accordance with section 6 of Executive                  enterprises to compete with foreign-                  of the Coast Guard, or any agent or other
                                                  Order 13132, ‘‘Federalism,’’ the                        based enterprises in domestic and                     person authorized by law to perform the
                                                  Attorney General has determined that                    export markets.                                       duties of a customs officer.
                                                  this regulation does not have sufficient                                                                      *     *     *    *     *
                                                  federalism implications to warrant the                  G. Unfunded Mandates Reform Act of
                                                  preparation of a federalism summary                     1995                                                    Dated: September 28, 2015.
                                                  impact statement.                                                                                             Loretta E. Lynch,
                                                                                                            This rule was not preceded by a
                                                                                                          published notice of proposed                          Attorney General.
                                                  C. Executive Order 12988
                                                                                                          rulemaking; will not result in the                    [FR Doc. 2015–25190 Filed 10–1–15; 8:45 am]
                                                    This regulation meets the applicable                  expenditure by State, local, and tribal               BILLING CODE 4410–FY–P
                                                  standards set forth in sections 3(a) and                governments, in the aggregate, or by the
                                                  3(b)(2) of Executive Order 12988, ‘‘Civil               private sector, of $100 million or more
                                                  Justice Reform.’’                                       in any one year; will not significantly or            DEPARTMENT OF DEFENSE
                                                  D. Administrative Procedure Act                         uniquely affect small governments; and
                                                                                                          does not contain significant                          Office of the Secretary
                                                     This final rule is purely a matter of                intergovernmental mandates. Therefore,
                                                  agency management. Accordingly, this                    no actions were deemed necessary                      32 CFR Part 236
                                                  rule is exempt from the usual                           under the provisions of the Unfunded                  [DOD–2014–OS–0097]
                                                  requirements of prior notice and                        Mandates Reform Act of 1995, 2 U.S.C.
                                                  comment and a 30-day delay in the                       1531–1535.                                            RIN 0790–AJ29
                                                  effective date. See 5 U.S.C. 553(a)(2). In
                                                                                                          H. Paperwork Reduction Act of 1995                    Department of Defense (DoD)-Defense
                                                  addition, prior notice and comment are
                                                                                                                                                                Industrial Base (DIB) Cybersecurity
                                                  not required because the final rule is a                  This final rule does not impose any
                                                                                                                                                                (CS) Activities
                                                  rule of agency organization, procedure,                 new reporting or recordkeeping
                                                  or practice. See 5 U.S.C. 553(b).                       requirements under the Paperwork                      AGENCY:  Office of the DoD Chief
                                                  Moreover, the Department finds good                     Reduction Act, 44 U.S.C. 3501–3521.                   Information Officer, DoD.
                                                  cause for exempting the rule from those                                                                       ACTION: Interim final rule.
                                                  requirements. Because this final rule                   I. Congressional Review Act
                                                  makes a technical correction for                           This action pertains to agency                     SUMMARY:   DoD is revising its DoD–DIB
                                                  accuracy and to improve the clarity of                  organization, procedure, or practice, and             Cybersecurity (CS) Activities regulation
                                                  the regulations, the Department finds it                does not substantially affect the rights or           to mandate reporting of cyber incidents
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  unnecessary to publish this rule for                    obligations of non-agency parties and,                that result in an actual or potentially
                                                  public notice and comment. See 5                        accordingly, is not a ‘‘rule’’ as that term           adverse effect on a covered contractor
                                                  U.S.C. 553(b). Similarly, because                       is used by the Congressional Review Act               information system or covered defense
                                                  delaying the effective date of this rule                (Subtitle E of the Small Business                     information residing therein, or on a
                                                  would serve no purpose, the                             Regulatory Enforcement Fairness Act of                contractor’s ability to provide
                                                  Department also finds good cause to                     1996). See 5 U.S.C. 804(3). Therefore,                operationally critical support, and
                                                  make this rule effective upon                           the reporting requirement of 5 U.S.C.                 modify eligibility criteria to permit
                                                  publication. See 5 U.S.C. 553(d)(3).                    801 does not apply.                                   greater participation in the voluntary


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00033   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                  59582              Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations

                                                  DoD-Defense Industrial Base (DIB)                       Regulations or the Export                             sensitive DoD information, including
                                                  Cybersecurity (CS) information sharing                  Administration Regulations or                         when such information resides on or
                                                  program.                                                otherwise controlled by DOD and                       transits information systems operated by
                                                  DATES: Effective Date: This rule if                     operational security information that                 contractors or others in support of DoD
                                                  effective October 2, 2015. Comments                     relates to DoD activities. Additional                 activities (e.g., 10 U.S.C. 391 and 2224,
                                                  must be received by December 1, 2015.                   cyber incident reporting requirements                 the Federal Information Security
                                                                                                          for other important types of controlled               Modernization Act (FISMA), codified at
                                                  ADDRESSES: You may submit comments,
                                                                                                          unclassified information (CUI) (e.g.,                 44 U.S.C. 3551 et seq., section 941 of the
                                                  identified by docket number and/or
                                                                                                          personally identifiable information (PII),            NDAA for FY 2013 (Public Law 112–
                                                  Regulatory Information Number (RIN)
                                                                                                          budget or financial information) are                  239)). Activities under this rule also
                                                  number and title, by any of the
                                                                                                          more specifically addressed through                   fulfill important elements of DoD’s
                                                  following methods:
                                                     • Federal Rulemaking Portal: http://                 other regulatory mechanisms, and thus                 critical infrastructure protection
                                                  www.regulations.gov. Follow the                         are outside the scope of this rule. To                responsibilities, as the sector specific
                                                                                                          clarify this distinction, the rule                    agency for the DIB sector (see
                                                  instructions for submitting comments.
                                                     • Mail: Department of Defense, Office                explicitly states that reporting under                Presidential Policy Directive 21 (PPD–
                                                  of the Deputy Chief Management                          this program does not abrogate the                    21), ‘‘Critical Infrastructure Security and
                                                  Officer, Directorate of Oversight and                   contractor’s responsibility for any other             Resilience,’’ available at https://
                                                  Compliance, Regulatory and Audit                        applicable cyber incident reporting                   www.whitehouse.gov/the-press-office/
                                                  Matters Office, 9010 Defense Pentagon,                  requirements (§ 236.4(o)).                            2013/02/12/presidential-policy-
                                                                                                             The rule also revises the program’s                directive-critical-infrastructure-security-
                                                  Washington, DC 20301-9010.
                                                                                                          definitions to better harmonize with                  and-resil).
                                                  FOR FURTHER INFORMATION CONTACT:                        definitions that are already established                 Under this rule, contractors will incur
                                                  DoD–DIB Cybersecurity Activities                        and used by DoD and other Government                  costs associated with requirements for
                                                  Office: (703) 604–3167, toll free (855)                 agencies in similar contexts, such as                 reporting cyber incidents of covered
                                                  363–4227.                                               those relating to the handling and                    defense information on their covered
                                                  SUPPLEMENTARY INFORMATION:                              safeguarding of Controlled Unclassified               contractor information system(s) or
                                                  Executive Summary                                       Information as used by the National                   those affecting the contractor’s ability to
                                                                                                          Archives and Records Administration                   provide operationally critical support.
                                                    This rule revises the DoD–DIB                         pursuant to Executive Order 13556                     Costs for contractors include identifying
                                                  cybersecurity information sharing                       ‘‘Controlled Unclassified Information’’               and analyzing cyber incidents and their
                                                  program regulation to implement new                     (November 4, 2010) (see http://                       impact on covered defense information,
                                                  statutory requirements for DoD                          www.archives.gov/cui/), and those                     or a contractor’s ability to provide
                                                  contractors and subcontractors to report                widely used in the context of                         operationally critical support, as well as
                                                  cyber incidents that result in an actual                cybersecurity activities (see the                     obtaining DoD-approved medium
                                                  or potentially adverse effect on a                      Committee on National Security                        assurance certificates to ensure
                                                  covered contractor information system                   Systems Instruction No. 4009, ‘‘National              authentication and identification when
                                                  or covered defense information residing                 Information Assurance Glossary’’).                    reporting cyber incidents to DoD.
                                                  therein, or on a contractor’s ability to                   This rule is intended to streamline the            Government costs include onboarding
                                                  provide operationally critical support.                 reporting process for DoD contractors                 new companies under the voluntary
                                                  The program also retains the voluntary                  and minimize duplicative reporting                    DoD–DIB CS information sharing
                                                  information sharing activities for                      processes, while preserving distinctions              program, and collecting and analyzing
                                                  cybersecurity information that is outside               where appropriate. Cyber incident                     cyber incident reports, malicious
                                                  the scope of the mandatory reporting                    reporting involving classified                        software, and media.
                                                  requirements.                                           information on classified contractor                     A foundational element of these new
                                                    Regarding the mandatory reporting,                    systems will be in accordance with the                mandatory reporting requirements, as
                                                  this part has been revised to set forth                 National Industrial Security Program                  well as the voluntary DoD–DIB CS
                                                  mandatory cyber incident reporting                      Operating Manual (DoD–M 5220.22                       information sharing activities, is the
                                                  requirements that will apply to all forms               (http://www.dtic.mil/whs/directives/                  recognition that the information being
                                                  of contracts or other agreements                        corres/pdf/522022m.pdf)).                             shared between the parties includes
                                                  between DoD and DIB companies (e.g.,                       This rule also modifies eligibility                extremely sensitive information that
                                                  procurement contracts, cooperative                      criteria to permit greater participation in           requires protection. For additional
                                                  agreements, other transaction                           the voluntary DoD–DIB CS information                  information regarding the Government’s
                                                  agreements). Thus, all relevant contracts               sharing program. Expanding                            safeguarding of information received
                                                  or agreements are required to include                   participation in the DoD–DIB CS                       from the contractors that require
                                                  these cyber reporting requirements (e.g.,               information sharing program is part of                protection, see the Privacy Impact
                                                  through incorporation of the reporting                  DoD’s comprehensive approach to                       Assessment (PIA) for the DIB
                                                  requirements by reference, or by                        counter cyber threats through                         Cybersecurity/Information Assurance
                                                  expressly setting forth reporting                       information sharing between the                       Activities located at http://
                                                  requirements consistent with this part).                Government and DIB participants. The                  dodcio.defense.gov/Portals/0/
                                                  The revisions provided in this rule are                 DoD–DIB CS information sharing                        Documents/DIB%20CS–IA%20PIA_
                                                  part of DoD’s efforts to establish a single             program allows eligible DIB participants              FINAL_signed_30jun2011_VMSS_
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  reporting mechanism for such cyber                      to receive Government furnished                       GGMR_RC.pdf. The PIA provides
                                                  incidents on unclassified DoD                           information (GFI) and cyber threat                    detailed procedures for handling
                                                  contractor information systems. These                   information from other DIB participants,              personally identifiable information (PII),
                                                  requirements are focused on cyber                       thereby providing greater insights into               attributional information about the
                                                  incidents that threaten specific types of               adversarial activity targeting the DIB.               strengths or vulnerabilities of specific
                                                  DoD program information, such as                        The activities in this rule implement                 covered contractor information systems,
                                                  technical information controlled under                  DoD statutory authorities to establish                information providing a perceived or
                                                  the International Traffic in Arms                       programs and activities to protect                    real competitive advantage on future


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00034   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                                     Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations                                        59583

                                                  procurement action, and contractor                      Public Law 104–121, ‘‘Congressional                   practical utility; (b) the accuracy of the
                                                  information marked as proprietary or                    Review Act’’ (5 U.S.C. 801)                           estimate of the burden of the proposed
                                                  commercial or financial information.                       It has been determined that this rule              information collection; (c) ways to
                                                                                                          is not a ‘‘major’’ rule under 5 U.S.C. 801,           enhance the quality, utility, and clarity
                                                  Interim Final Rule Justification                                                                              of the information to be collected; and
                                                                                                          enacted by Public Law 104–121,
                                                     This rule is being published as an                   because it will not result in an annual               (d) ways to minimize the burden of the
                                                  interim rule in order to comply with                    effect on the economy of $100 million                 information collection on respondents,
                                                  statutory guidance under Section 941 of                 or more; a major increase in costs or                 including the use of automated
                                                  the National Defense Authorization Act                  prices for consumers, individual                      collection techniques or other forms of
                                                  (NDAA) for Fiscal Year (FY) 2013, and                   industries, Federal, State, or local                  information technology.
                                                                                                          Government agencies, or geographic                       Title: Cyber Incident Reporting by
                                                  section 391 of Title 10, United States
                                                                                                          regions; or significant adverse effects on            DoD Contractors
                                                  Code (U.S.C.), requiring defense                                                                                 Type of Request: Revision.
                                                  contractors to rapidly report cyber                     competition, employment, investment,
                                                                                                          productivity, innovation, or on the                      Number of DoD contractors impacted
                                                  incidents on their unclassified networks                                                                      is 10,000.
                                                  or information systems that may affect                  ability of United States-based
                                                                                                                                                                   Projected Responses Per Participant
                                                  unclassified defense information, or that               enterprises to compete with foreign-
                                                                                                                                                                Per Year: 5.
                                                  affect their ability to provide                         based enterprises in domestic and
                                                                                                                                                                   Annual Total Responses: Up to
                                                  operationally critical support to the                   export markets.
                                                                                                                                                                50,000.
                                                  Department. Issuing this rule as an                     Sec. 202, Public Law 104–4, ‘‘Unfunded                   Average Burden Per Response: 7
                                                  interim final rule underscores the                      Mandates Reform Act’’                                 hours (this includes searching existing
                                                  importance of better protecting                           It has been determined that this rule               data sources, gathering and maintaining
                                                  unclassified defense information against                does not contain a Federal mandate that               the data needed, and completing and
                                                  the immediate cyber threat, while                       may result in expenditure by State, local             reviewing the collection of information).
                                                  preserving the intellectual property and                and tribal Governments, in aggregate, or                 Annual Total Burden Hours: 250,000
                                                  competitive capabilities of our national                by the private sector, of $100 million or             hours for all participants.
                                                  defense industrial base. The interim                                                                             Needs and Uses: The requested
                                                                                                          more in any one year.
                                                  final rule enables DoD to better assess,                                                                      information supports the mandatory
                                                  in the near term, when mission critical                 Public Law 96–354, ‘‘Regulatory                       cyber incident reporting requirements
                                                  capabilities and services are affected by               Flexibility Act’’ (5 U.S.C. 601)                      under Section 941 of the NDAA for
                                                  cyber incidents and reinforces DoD’s                       It has been certified that this rule is            Fiscal Year (FY) 13 and Section 1632 of
                                                  overall efforts to defend DoD                           not subject to the Regulatory Flexibility             the NDAA for FY 15, and facilitates
                                                  information, protect U.S. national                      Act (5 U.S.C. 601) because it would not,              cyber situational awareness and cyber
                                                                                                          if promulgated, have a significant                    threat information sharing. DoD
                                                  interests against cyber-attacks, and
                                                                                                          economic impact on a substantial                      contractors report incidents using the
                                                  support military operations and
                                                                                                          number of small entities. Therefore, the              standard Incident Collection Format
                                                  contingency plans worldwide.
                                                                                                          Regulatory Flexibility Act, as amended,               (ICF). The primary means of reporting is
                                                  Cybersecurity is a Congressional priority
                                                                                                          does not require us to prepare a                      through a secure unclassified web
                                                  and this interim final rule supports the
                                                                                                          regulatory flexibility analysis.                      portal, but a company may report
                                                  Administration’s national cybersecurity                                                                       incidents through other communication
                                                  strategy emphasizing public-private                     Public Law 96–511, ‘‘Paperwork                        means if necessary.
                                                  information sharing.                                    Reduction Act’’ (44 U.S.C. Chapter 35)                   Affected Public: DoD contractors with
                                                  Regulatory Procedures                                      It has been determined that 32 CFR                 the provisions of 32 CFR part 236 in
                                                                                                          part 236 does contain reporting or                    their agreements with DoD.
                                                  Executive Orders 12866, ‘‘Regulatory                    recordkeeping requirements under the                     Frequency: On occasion.
                                                  Planning and Review’’ and 13563,                        Paper Reduction Act (PRA) of 1995.                       Respondent’s Obligation: Mandatory.
                                                  ‘‘Improving Regulation and Regulatory                   These reporting requirements apply                       DoD has submitted a revision for the
                                                  Review’’                                                existing collection approvals under                   0704–0490 collection to OMB under the
                                                                                                          Office of Management and Budget                       provisions of the Paperwork Reduction
                                                     Executive Orders 13563 and 12866                     (OMB) Control Numbers: 0704–0489,                     Act (44 U.S.C. Chapter 35) in response
                                                  direct agencies to assess all costs and                 ‘‘Defense Industrial Base Cyber                       to 32 CFR part 236 expanding the
                                                  benefits of available regulatory                        Security/Information Assurance (DIB                   number of companies eligible to
                                                  alternatives and, if regulation is                      CS/IA) Cyber Incident Reporting,’’ and                participate in the voluntary DIB CS
                                                  necessary, to select regulatory                         0704–0490, ‘‘Defense Industrial Base                  information sharing program. Comments
                                                  approaches that maximize net benefits                   Cyber Security/Information Assurance                  are invited on: (a) whether the proposed
                                                  (including potential economic,                          (DIB CS/IA) Points of Contact (POC)                   collection of information is necessary
                                                  environmental, public health and safety                 Information.’’                                        for the proper performance of the
                                                  effects, distribute impacts, and equity).                  DoD has submitted a revision for the               functions of DoD, including whether the
                                                  Executive Order 13563 emphasizes the                    0704–0489 collection to OMB under the                 information will have practical utility;
                                                  importance of quantifying both costs                    provisions of the Paperwork Reduction                 (b) the accuracy of the estimate of the
                                                  and benefits, of reducing costs, of                     Act (44 U.S.C. Chapter 35) in response                burden of the proposed information
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  harmonizing rules, and of promoting                     to 32 CFR part 236 expanding the                      collection; (c) ways to enhance the
                                                  flexibility. This rule has been                         number of companies under mandatory                   quality, utility, and clarity of the
                                                  designated a ‘‘significant regulatory                   cyber incident reporting requirements.                information to be collected; and (d)
                                                  action,’’ although not economically                     Comments are invited on: (a) whether                  ways to minimize the burden of the
                                                  significant, under section 3(f) of                      the proposed collection of information                information collection on respondents,
                                                  Executive Order 12866. Accordingly,                     is necessary for the proper performance               including the use of automated
                                                  the rule has been reviewed by the Office                of the functions of DoD, including                    collection techniques or other forms of
                                                  of Management and Budget (OMB).                         whether the information will have                     information technology.


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00035   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                  59584              Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations

                                                     Title: Defense Industrial Base                       Executive Order 13132, ‘‘Federalism’’                 remotely to DoD personnel, as
                                                  Cybersecurity Activities Points of                        It has been determined that this rule               determined by the contractor.
                                                  Contact (POC) Information.                              does not have federalism implications,                   Cleared defense contractor (CDC)
                                                     Type of Request: Revision.                           as set forth in Executive Order 13132.                means a private entity granted clearance
                                                     Number of DoD contractors impacted                   This rule does not have substantial                   by DoD to access, receive, or store
                                                  is 8,500. DoD estimates that no more                    direct effects on:                                    classified information for the purpose of
                                                  than 10% of the total eligible population                 (a) The States;                                     bidding for a contract or conducting
                                                  of cleared defense contractors will apply                 (b) The relationship between the                    activities in support of any program of
                                                  to the voluntary DIB Cybersecurity                      National Government and the States; or                DoD.
                                                  Activities program resulting in 850                       (c) The distribution of power and                      Compromise means disclosure of
                                                  cleared defense contractors impacted                    responsibilities among the various                    information to unauthorized persons, or
                                                  annually. An additional 10% of the                      levels of Government.                                 a violation of the security policy of a
                                                  population or 85 contractors may                                                                              system, in which unauthorized
                                                  provide updated points of contact for                   List of Subjects in 32 CFR Part 236                   intentional or unintentional disclosure,
                                                  the program, as required.                                 Government contracts, Security                      modification, destruction, or loss of an
                                                     Projected Responses Per Participant:                 measures.                                             object, or the copying of information to
                                                  Initial collection is one per company                     Accordingly, 32 CFR part 236 is                     unauthorized media may have occurred.
                                                  with updates on a case-by-case basis.                   revised to read as follows:                              Contractor means an individual or
                                                     Annual Total Responses: 935.                                                                               organization outside the U.S.
                                                     Average Burden Per Response: 20                      PART 236—DEPARTMENT OF                                Government who has accepted any type
                                                  minutes.                                                DEFENSE (DoD)-DEFENSE                                 of agreement or order to provide
                                                     Annual Total Burden Hours: 312                       INDUSTRIAL BASE (DIB)                                 research, supplies, or services to DoD,
                                                  hours for all participants.                             CYBERSECURITY (CS) ACTIVITIES                         including prime contractors and
                                                     Needs and Uses: The Government                                                                             subcontractors.
                                                                                                          Sec.
                                                  will collect business points of contact                 236.1 Purpose.                                           Contractor attributional/proprietary
                                                  (POC) information from all Defense                      236.2 Definitions.                                    information means information that
                                                  Industrial Base (DIB) Cybersecurity                     236.3 Policy.                                         identifies the contractor(s), whether
                                                  program participants on a one-time                      236.4 Mandatory cyber incident reporting              directly or indirectly, by the grouping of
                                                  basis, with updates as necessary, to                         procedures.                                      information that can be traced back to
                                                  facilitate communications and the                       236.5 DoD–DIB CS information sharing                  the contractor(s) (e.g., program
                                                  sharing of share unclassified and                            program.                                         description, facility locations),
                                                  classified cyber threat information.                    236.6 General provisions of the DoD–DIB
                                                                                                               CS information sharing program.
                                                                                                                                                                personally identifiable information, as
                                                     Affected Public: Business or other for-              236.7 DoD–DIB CS information sharing                  well as trade secrets, commercial or
                                                  profit and not-for-profit institutions.                      program requirements.                            financial information, or other
                                                     Frequency: On occasion.                                                                                    commercially sensitive information that
                                                     Respondent’s Obligation: Voluntary.                    Authority: 10 U.S.C. 391; 10 U.S.C. 2224;
                                                                                                          44 U.S.C. 3506; 44 U.S.C. 3544; and Section           is not customarily shared outside of the
                                                     OMB Desk Officer:                                                                                          company.
                                                                                                          941, Publ. L. 112–239, 126 Stat. 1632.
                                                     Written comments and                                                                                          Controlled Technical Information
                                                  recommendations on these information                    §236.1    Purpose.                                    means technical information with
                                                  collections should be sent to Ms.                          Cyber threats to contractor                        military or space application that is
                                                  Jasmeet Seehra at the Office of                         unclassified information systems                      subject to controls on the access, use,
                                                  Management and Budget, DoD Desk                         represent an unacceptable risk of                     reproduction, modification,
                                                  Officer, Room 10102, New Executive                      compromise of DoD information and                     performance, display, release,
                                                  Office Building, Washington, DC 20503,                  pose an imminent threat to U.S. national              disclosure, or dissemination. Controlled
                                                  with a copy to the Director, DoD–DIB                    security and economic security                        technical information would meet the
                                                  Cybersecurity Activities Office, at the                 interests. This part requires all DoD                 criteria, if disseminated, for distribution
                                                  Office of the DoD Chief Information                     contractors to rapidly report cyber                   statements B through F using the criteria
                                                  Officer, 6000 Defense Pentagon, Attn:                   incidents involving covered defense                   set forth in DoD Instruction 5230.24,
                                                  DIB CS Activities Office, Washington,                   information on their covered contractor               ‘‘Distribution Statements of Technical
                                                  DC 20301–6000, or email at                              information systems or cyber incidents                Documents,’’ available at http://
                                                  OSD.DIBCSIA@mail.mil.                                   affecting the contractor’s ability to                 www.dtic.mil/whs/directives/corres/pdf/
                                                     You may also submit comments,                        provide operationally critical support.               523024p.pdf. The term does not include
                                                  identified by docket number and title,                  The part also modifies the eligibility                information that is lawfully publicly
                                                  by the following method:                                criteria to permit greater participation in           available without restrictions.
                                                     Federal Rulemaking Portal: http://                   the voluntary DoD–DIB CS information                     Covered contractor information
                                                  www.regulations.gov. Follow the                         sharing program in which DoD provides                 system means an information system
                                                  instructions for submitting comments.                   cyber threat information and                          that is owned or operated by or for a
                                                     All submissions received must                        cybersecurity best practices to DIB                   contractor and that processes, stores, or
                                                  include the agency name, docket                         participants. The DoD–DIB CS                          transmits covered defense information.
                                                  number and title for this Federal                       information sharing program enhances                     Covered defense information means
                                                  Register document. The general policy                   and supplements DIB participants’                     unclassified information that:
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  for comments and other submissions                      capabilities to safeguard DoD                            (1) Is:
                                                  from members of the public is to make                   information that resides on, or transits,                (i) Provided to the contractor by or on
                                                  these submissions available for public                  DIB unclassified information systems.                 behalf of the DoD in connection with
                                                  viewing on the Internet at http://                                                                            the performance of a contract; or
                                                  www.regulations.gov as they are                         §236.2    Definitions.                                   (ii) Collected, developed, received,
                                                  received without change, including any                   As used in this part:                                transmitted, used, or stored by or on
                                                  personal identifiers or contact                          Access to media means provision of                   behalf of the contractor in support of the
                                                  information.                                            media, or access to media physically or               performance of a contract; and


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00036   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                                     Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations                                          59585

                                                     (2) Falls in any of the following                    program including but not limited to                    U.S. based means provisioned,
                                                  categories:                                             cyber threat information and                          maintained, or operated within the
                                                     (i) Controlled Technical Information;                cybersecurity practices.                              physical boundaries of the United
                                                     (ii) Critical information (operations                   Information means any                              States.
                                                  security). Specific facts identified                    communication or representation of                      U.S. citizen means a person born in
                                                  through the Operations Security process                 knowledge such as facts, data, or                     the United States or naturalized.
                                                  about friendly intentions, capabilities,                opinions in any medium or form,
                                                  and activities vitally needed by                        including textual, numerical, graphic,                §236.3    Policy.
                                                  adversaries for them to plan and act                    cartographic, narrative, or audiovisual.                 It is DoD policy to:
                                                  effectively so as to guarantee failure or                  Information system means a discrete                   (a) Establish a comprehensive
                                                  unacceptable consequences for friendly                  set of information resources organized                approach to require safeguarding of
                                                  mission accomplishment (part of                         for the collection, processing,                       covered defense information on covered
                                                  Operations Security process);                           maintenance, use, sharing,                            contractor information systems and to
                                                     (iii) Export Control. Unclassified                   dissemination, or disposition of                      require contractor cyber incident
                                                  information concerning certain items,                   information.                                          reporting.
                                                  commodities, technology, software, or                      Malicious software means software or                  (b) Increase Government stakeholder
                                                  other information whose export could                    firmware intended to perform an                       and DIB situational awareness of the
                                                  reasonably be expected to adversely                     unauthorized process that will have                   extent and severity of cyber threats to
                                                  affect the United States national security              adverse impact on the confidentiality,                DoD information by implementing a
                                                  and nonproliferation objectives. To                     integrity, or availability of an                      streamlined approval process that
                                                  include dual use items; items identified                information system. This definition                   enables the contractor to elect, in
                                                  in export administration regulations,                   includes a virus, worm, Trojan horse, or              conjunction with the cyber incident
                                                  international traffic in arms regulations               other code-based entity that infects a                reporting and sharing, the extent to
                                                  and munitions list; license applications;               host, as well as spyware and some forms               which DoD may share cyber threat
                                                  and sensitive nuclear technology                        of adware.                                            information obtained from a contractor
                                                  information;                                               Media means physical devices or                    (or derived from information obtained
                                                     (iv) Any other information, marked or                writing surfaces, including but not                   from the company) under this part that
                                                  otherwise identified by the Government,                 limited to, magnetic tapes, optical disks,            is not information created by or for DoD
                                                  that requires safeguarding or                           magnetic disks, large-scale integration               with:
                                                  dissemination controls pursuant to and                  memory chips, and printouts onto                         (1) DIB contractors participating in
                                                  consistent with law, regulations, and                   which covered defense information is                  the DoD–DIB CS information sharing
                                                  Government-wide policies (e.g., privacy,                recorded, stored, or printed within a                 program to enhance their cybersecurity
                                                  proprietary business information).                      covered Contractor information system.                posture to better protect covered defense
                                                     Cyber incident means actions taken                      Operationally critical support means               information on covered contractor
                                                  through the use of computer networks                    supplies or services designated by the                information systems, or a contractor’s
                                                  that result in a compromise or an actual                Government as critical for airlift, sealift,          ability to provide operationally critical
                                                  or potentially adverse effect on an                     intermodal transportation services, or                support; and
                                                  information system and/or the                           logistical support that is essential to the              (2) Other Government stakeholders for
                                                  information residing therein.                           mobilization, deployment, or                          lawful Government activities, including
                                                     Cyber incident damage assessment                     sustainment of the Armed Forces in a                  cybersecurity for the protection of
                                                  means a managed, coordinated process                    contingency operation.                                Government information or information
                                                  to determine the effect on defense                         Rapid(ly) report(ing) means within 72              systems, law enforcement and
                                                  programs, defense scientific and                        hours of discovery of any cyber                       counterintelligence (LE/CI), and other
                                                  research projects, or defense warfighting               incident.                                             lawful national security activities
                                                  capabilities resulting from compromise                     Technical Information means                        directed against the cyber threat (e.g.,
                                                  of a contractor’s unclassified computer                 technical data or computer software, as               those attempting to infiltrate and
                                                  system or network.                                      those terms are defined in DFARS                      compromise information on the
                                                     Defense Industrial Base (DIB) means                  252.227–7013, ‘‘Rights in Technical                   contractor information systems).
                                                  the Department of Defense, Government,                  Data—Noncommercial Items’’ (48 CFR                       (c) Modify eligibility criteria to permit
                                                  and private sector worldwide industrial                 252.227–7013). Examples of technical                  greater participation in the voluntary
                                                  complex with capabilities to perform                    information include research and                      DoD–DIB CS information sharing
                                                  research and development, design,                       engineering data, engineering drawings                program.
                                                  produce, and maintain military weapon                   and associated lists, specifications,
                                                  systems, subsystems, components, or                     standards, process sheets, manuals,                   § 236.4 Mandatory cyber incident reporting
                                                                                                          technical reports, technical orders,                  procedures.
                                                  parts to satisfy military requirements.
                                                     DIB participant means a CDC that has                 catalog-item identifications, data sets,                (a) Applicability and order of
                                                  met all of the eligibility requirements to              studies and analyses and related                      precedence. The requirement to report
                                                  participate in the voluntary DoD–DIB                    information, and computer software                    cyber incidents shall be included in all
                                                  CS Information Sharing Program as set                   executable code and source code.                      applicable agreements between the
                                                  forth in this part (see § 236.7).                          Threat means any circumstance or                   Government and the contractor in
                                                     Forensic analysis means the practice                 event with the potential to adversely                 which covered defense information
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  of gathering, retaining, and analyzing                  impact organization operations                        resides on, or transits covered contractor
                                                  computer-related data for investigative                 (including mission, functions, image, or              information systems or under which a
                                                  purposes in a manner that maintains the                 reputation), organization assets,                     contractor provides operationally
                                                  integrity of the data.                                  individuals, other organizations, or the              critical support, and shall be identical to
                                                     Government furnished information                     Nation through an information system                  those requirements provided in this
                                                  (GFI) means information provided by                     via unauthorized access, destruction,                 section (e.g., by incorporating the
                                                  the Government under the voluntary                      disclosure, modification of information               requirements of this section by
                                                  DoD–DIB CS information sharing                          and/or denial of service.                             reference, or by expressly setting forth


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00037   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                  59586              Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations

                                                  such reporting requirements consistent                     (f) If the contractor utilizes a third-            information that is necessary for the
                                                  with those of this section). Any                        party service provider (SP) for                       authorized purpose(s) for which the
                                                  inconsistency between the relevant                      information system security services,                 information is being released.
                                                  terms and condition of any such                         the SP may report cyber incidents on                     (m) Use and release of contractor
                                                  agreement and this section shall be                     behalf of the contractor.                             attributional/proprietary information
                                                  resolved in favor of the terms and                         (g) Contractors are encouraged to                  not created by or for DoD. Information
                                                  conditions of the agreement, provided                   report information to promote sharing of              that is obtained from the contractor (or
                                                  and to the extent that such terms and                   cyber threat indicators that they believe             derived from information obtained from
                                                  conditions are authorized to have been                  are valuable in alerting the Government               the contractor) under this part that is
                                                  included in the agreement in                            and others, as appropriate in order to                not created by or for DoD is authorized
                                                  accordance with applicable laws and                     better counter threat actor activity.                 to be released outside of DoD:
                                                  regulations.                                            Cyber incidents that are not                             (1) To entities with missions that may
                                                    (b) Cyber incident reporting                          compromises of covered defense                        be affected by such information;
                                                  requirement. When a contractor                          information or do not adversely affect                   (2) To entities that may be called
                                                  discovers a cyber incident that affects a               the contractor’s ability to perform                   upon to assist in the diagnosis,
                                                  covered contractor information system                   operationally critical support may be of              detection, or mitigation of cyber
                                                  or the covered defense information                      interest to the DIB and DoD for                       incidents;
                                                  residing therein or that affects the                    situational awareness purposes.                          (3) To Government entities that
                                                  contractor’s ability to provide                            (h) Malicious software. Malicious                  conduct LE/CI investigations;
                                                  operationally critical support, the                     software discovered and isolated by the                  (4) For national security purposes,
                                                  contractor shall:                                       contractor will be submitted to the DoD               including cyber situational awareness
                                                    (1) Conduct a review for evidence of                  Cyber Crime Center (DC3) for forensic                 and defense purposes (including sharing
                                                  compromise of covered defense                           analysis.                                             with DIB contractors participating in the
                                                                                                             (i) Media preservation and protection.             DIB CS program authorized by this
                                                  information including, but not limited
                                                                                                          When a contractor discovers a cyber                   part); or
                                                  to, identifying compromised computers,
                                                                                                          incident has occurred, the contractor                    (5) To a support services contractor
                                                  servers, specific data, and user accounts.              shall preserve and protect images of                  (‘‘recipient’’) that is directly supporting
                                                  This review shall also include analyzing                known affected information systems                    Government activities related to this
                                                  covered contractor information                          identified in paragraph (b) of this                   part and is bound by use and non-
                                                  system(s) that were part of the cyber                   section and all relevant monitoring/                  disclosure restrictions that include all of
                                                  incident, as well as other information                  packet capture data for at least 90 days              the following conditions:
                                                  systems on the contractor’s network(s),                 from submission of the cyber incident                    (i) The recipient shall access and use
                                                  that may have been accessed as a result                 report to allow DoD to request the media              the information only for the purpose of
                                                  of the incident in order to identify                    or decline interest.                                  furnishing advice or technical assistance
                                                  compromised covered defense                                (j) Access to additional information or            directly to the Government in support of
                                                  information, or that affect the                         equipment necessary for forensics                     the Government’s activities related to
                                                  contractor’s ability to provide                         analysis. Upon request by DoD, the                    this part, and shall not be used for any
                                                  operationally critical support; and                     contractor shall provide DoD with                     other purpose;
                                                    (2) Rapidly report cyber incidents to                 access to additional information or                      (ii) The recipient shall protect the
                                                  DoD at http://dibnet.dod.mil.                           equipment that is necessary to conduct                information against unauthorized
                                                    (c) Cyber incident report. The cyber                  a forensic analysis.                                  release or disclosure;
                                                  incident report shall be treated as                        (k) Cyber incident damage assessment                  (iii) The recipient shall ensure that its
                                                  information created by or for DoD and                   activities. If DoD elects to conduct a                employees are subject to use and non-
                                                  shall include, at a minimum, the                        damage assessment, DoD will request                   disclosure obligations consistent with
                                                  required elements at http://                            that the contractor provide all of the                this part prior to the employees being
                                                  dibnet.dod.mil.                                         damage assessment information                         provided access to or use of the
                                                    (d) Subcontractor reporting                           gathered in accordance with paragraph                 information;
                                                  procedures. Contractors shall flow down                 (e) of this section.                                     (iv) The third-party contractor that
                                                  the cyber incident reporting                               (l) DoD safeguarding and use of                    reported the cyber incident is a third-
                                                  requirements of this part to their                      contractor attributional/proprietary                  party beneficiary of the non-disclosure
                                                  subcontractors, as appropriate.                         information. The Government shall                     agreement between the Government and
                                                  Contractors shall require subcontractors                protect against the unauthorized use or               the recipient, as required by paragraph
                                                  to rapidly report cyber incidents                       release of information obtained from the              (m)(5)(iii) of this section;
                                                  directly to DoD at http://dibnet.dod.mil                contractor (or derived from information                  (v) That a breach of these obligations
                                                  and the prime contractor. This includes                 obtained from the contractor) under this              or restrictions may subject the recipient
                                                  providing the incident report number,                   part that includes contractor                         to:
                                                  automatically assigned by DoD, to the                   attributional/proprietary information,                   (A) Criminal, civil, administrative,
                                                  prime contractor (or next higher-tier                   including such information submitted                  and contractual actions in law and
                                                  subcontractor) as soon as practicable.                  in accordance with paragraph (b) of this              equity for penalties, damages, and other
                                                    (e) Medium assurance certificate                      section. To the maximum extent                        appropriate remedies by the United
                                                  requirement. In order to report cyber                   practicable, the contractor shall identify            States; and
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  incidents in accordance with this part,                 and mark attributional/proprietary                       (B) Civil actions for damages and
                                                  the contractor or subcontractor shall                   information. In making an authorized                  other appropriate remedies by the third
                                                  have or acquire a DoD-approved                          release of such information, the                      party that reported the incident, as a
                                                  medium assurance certificate to report                  Government will implement appropriate                 third party beneficiary of the non-
                                                  cyber incidents. For information on                     procedures to minimize the contractor                 disclosure agreement.
                                                  obtaining a DoD-approved medium                         attributional/proprietary information                    (6) Use and release of contractor
                                                  assurance certificate, see http://                      that is included in such authorized                   attributional/proprietary information
                                                  iase.disa.mil/pki/eca/certificate.html.                 release, seeking to include only that                 created by or for DoD. Information that


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00038   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                                     Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations                                         59587

                                                  is obtained from the contractor (or                     DoD–DIB CS information sharing                        revisions to previously specified
                                                  derived from information obtained from                  program as a DIB participant.                         transmission or procedures.
                                                  the contractor) under this part that is                    (b) Under the voluntary activities of                 (i) Except as authorized in this part or
                                                  created by or for DoD (including the                    the DoD–DIB CS information sharing                    in writing by the Government, DIB
                                                  information submitted pursuant to                       program, the Government and each DIB                  participants may:
                                                  paragraph (b) of this section) is                       participant will execute a standardized                  (1) Use GFI only on U.S. based
                                                  authorized to be used and released                      agreement, referred to as a Framework                 covered contractor information systems,
                                                  outside of DoD for purposes and                         Agreement (FA) to share, in a timely                  or U.S. based networks or information
                                                  activities authorized by this section, and              and secure manner, on a recurring basis,              systems used to provide operationally
                                                  for any other lawful Government                         and to the greatest extent possible,                  critical support; and
                                                  purpose or activity, subject to all                     cybersecurity information.                               (2) Share GFI only within their
                                                  applicable statutory, regulatory, and                      (c) Each such FA between the                       company or organization, on a need-to-
                                                  policy based restrictions on the                        Government and a DIB participant must                 know basis, with distribution restricted
                                                  Government’s use and release of such                    comply with and implement the                         to U.S. citizens.
                                                  information.                                            requirements of this part, and will                      (j) In individual cases DIB
                                                     (n) Contractors shall conduct their                  include additional terms and conditions               participants may request, and the
                                                  respective activities under this part in                as necessary to effectively implement                 Government may authorize, disclosure
                                                  accordance with applicable laws and                     the voluntary information sharing                     and use of GFI under applicable terms
                                                  regulations on the interception,                        activities described in this part with                and conditions when the DIB
                                                                                                          individual DIB participants.                          participant can demonstrate that
                                                  monitoring, access, use, and disclosure
                                                                                                             (d) The DoD–DIB CS Activities Office               appropriate information handling and
                                                  of electronic communications and data.
                                                                                                          is the overall point of contact for the               protection mechanisms are in place and
                                                     (o) Freedom of Information Act                       program. The DC3 managed DoD–DIB                      has determined that it requires the
                                                  (FOIA). Agency records, which may                       Collaborative Information Sharing                     ability:
                                                  include qualifying information received                 Environment (DCISE) is the operational                   (1) To share the GFI with a non-U.S.
                                                  from non-federal entities, are subject to               focal point for cyber threat information              citizen; or
                                                  request under the Freedom of                            sharing and incident reporting under                     (2) To use the GFI on a non-U.S. based
                                                  Information Act (5 U.S.C. 552) (FOIA),                  the DoD–DIB CS information sharing                    covered contractor information system;
                                                  which is implemented in the DoD by                      program.                                              or
                                                  DoD Directive 5400.07 and DoD                              (e) The Government will maintain a                    (3) To use the GFI on a non-U.S. based
                                                  Regulation 5400.7–R (see 32 CFR parts                   Web site or other internet-based                      network or information system in order
                                                  285 and 286, respectively). Pursuant to                 capability to provide potential DIB                   to better protect a contractor’s ability to
                                                  established procedures and applicable                   participants with information about                   provide operationally critical support.
                                                  regulations, the Government will protect                eligibility and participation in the                     (k) DIB participants shall maintain the
                                                  sensitive nonpublic information                         program, to enable online application or              capability to electronically disseminate
                                                  reported under mandatory reporting                      registration for participation, and to                GFI within the Company in an
                                                  requirements against unauthorized                       support the execution of necessary                    encrypted fashion (e.g., using Secure/
                                                  public disclosure by asserting                          agreements with the Government.                       Multipurpose Internet Mail Extensions
                                                  applicable FOIA exemptions. The                            (f) GFI. The Government shall share                (S/MIME), secure socket layer (SSL),
                                                  Government will inform the non-                         GFI with DIB participants or designated               Transport Layer Security (TLS) protocol
                                                  Government source or submitter (e.g.,                   SP in accordance with this part.                      version 1.2, DoD-approved medium
                                                  contractor or DIB participant of any                       (g) Prior to receiving GFI from the                assurance certificates).
                                                  such information that may be subject to                 Government, each DIB participant shall                   (l) DIB participants shall not share
                                                  release in response to a FOIA request),                 provide the requisite points of contact               GFI outside of their company or
                                                  in order to permit the source or                        information, to include security                      organization, regardless of personnel
                                                  submitter to support the withholding of                 clearance and citizenship information,                clearance level, except as authorized in
                                                  such information or pursue any other                    for the designated personnel within                   this part or otherwise authorized in
                                                  available legal remedies.                               their company (e.g., typically 3–10                   writing by the Government.
                                                     (p) Other reporting requirements.                    company designated points of contact)                    (m) If the DIB participant utilizes a SP
                                                  Cyber incident reporting required by                    in order to facilitate the DoD–DIB                    for information system security services,
                                                  this part in no way abrogates the                       interaction in the DoD–DIB CS                         the DIB participant may share GFI with
                                                  contractor’s responsibility for other                   information sharing program. The                      that SP under the following conditions
                                                  cyber incident reporting pertaining to its              Government will confirm the accuracy                  and as authorized in writing by the
                                                  unclassified information systems under                  of the information provided as a                      Government:
                                                  other clauses that may apply to its                     condition of that point of contact being                 (1) The DIB participant must identify
                                                  contract(s), or as a result of other                    authorized to act on behalf of the DIB                the SP to the Government and request
                                                  applicable U.S. Government statutory or                 participant for this program.                         permission to share or disclose any GFI
                                                  regulatory requirements, including                         (h) GFI will be issued via both                    with that SP (which may include a
                                                  Federal or DoD requirements for                         unclassified and classified means. DIB                request that the Government share
                                                  Controlled Unclassified Information as                  participant handling and safeguarding                 information directly with the SP on
                                                  established by Executive Order 13556,                   of classified information shall be in                 behalf of the DIB participant) solely for
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  as well as regulations and guidance                     compliance with DoD 5220.22–M,                        the authorized purposes of this program.
                                                  established pursuant thereto.                           ‘‘National Industrial Security Program                   (2) The SP must provide the
                                                                                                          Operating Manual (NISPOM),’’ available                Government with sufficient information
                                                  § 236.5 DoD–DIB CS information sharing                  at http://www.dss.mil/documents/odaa/                 to enable the Government to determine
                                                  program.                                                nispom2006-5220.pdf. The Government                   whether the SP is eligible to receive
                                                    (a) All contractors that are CDCs and                 shall specify transmission and                        such information, and possesses the
                                                  meet the requirements set forth in                      distribution procedures for all GFI, and              capability to provide appropriate
                                                  § 236.7 are eligible to join the voluntary              shall inform DIB participants of any                  protections for the GFI.


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00039   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1


                                                  59588              Federal Register / Vol. 80, No. 191 / Friday, October 2, 2015 / Rules and Regulations

                                                    (3) Upon approval by the                              Termination shall not relieve the DIB                   Dated: September 14, 2015.
                                                  Government, the SP must enter into a                    participant or the Government from                    Patricia L. Toppings,
                                                  legally binding agreement with the DIB                  obligations to continue to protect                    OSD Federal Register, Liaison Officer,
                                                  participant (and also an appropriate                    against the unauthorized use or                       Department of Defense.
                                                  agreement with the Government in any                    disclosure of GFI, attribution                        [FR Doc. 2015–24296 Filed 10–1–15; 8:45 am]
                                                  case in which the SP will receive or                    information, contractor proprietary                   BILLING CODE 5001–06–P
                                                  share information directly with the                     information, third-party proprietary
                                                  Government on behalf of the DIB                         information, or any other information
                                                  participant) under which the SP is                      exchanged under this program, as
                                                  subject to all applicable requirements of               required by law, regulation, contract, or             LIBRARY OF CONGRESS
                                                  this part and of any supplemental terms                 the FA.
                                                  and conditions in the DIB participant’s                    (f) Upon termination of the FA, and/               Copyright Royalty Board
                                                  FA with the Government, and which                       or change of Facility Security Clearance
                                                  authorizes the SP to use the GFI only as                (FCL) status below Secret, GFI must be                37 CFR Part 380
                                                  authorized by the Government.                           returned to the Government or
                                                    (n) The DIB participant may not sell,                 destroyed pursuant to direction of, and               [Docket No. 2014–CRB–0001–WR (2016–
                                                  lease, license, or otherwise incorporate                at the discretion of, the Government.                 2020) (Web IV)]
                                                  the GFI into its products or services,                     (g) Participation in these activities
                                                  except that this does not prohibit a DIB                does not abrogate the Government’s, or                Digital Performance Right in Sound
                                                  participant from being appropriately                    the DIB participants’ rights or                       Recordings and Ephemeral
                                                  designated an SP in accordance with                     obligations regarding the handling,                   Recordings
                                                  paragraph (m) of this section.                          safeguarding, sharing, or reporting of
                                                                                                          information, or regarding any physical,               AGENCY:  Copyright Royalty Board,
                                                  § 236.6 General provisions of the DoD–DIB               personnel, or other security                          Library of Congress.
                                                  CS information sharing program.                                                                               ACTION: Final rule.
                                                                                                          requirements, as required by law,
                                                     (a) Confidentiality of information that              regulation, policy, or a valid legal
                                                  is exchanged under the DoD–DIB CS                       contractual obligation. However,                      SUMMARY:     The Copyright Royalty Judges
                                                  information sharing program will be                     participation in the voluntary activities             publish final regulations that set the
                                                  protected to the maximum extent                         of the DoD–DIB CS information sharing                 rates and terms for the digital
                                                  authorized by law, regulation, and                      program does not eliminate the                        performances of sound recordings by
                                                  policy. DoD and DIB participants each                   requirement for DIB participants to                   certain public radio stations and for the
                                                  bear responsibility for their own actions               report cyber incidents in accordance                  making of ephemeral recordings
                                                  under the voluntary DoD–DIB CS                          with § 236.4.                                         necessary to facilitate those
                                                  information sharing program.                                                                                  transmissions for the period
                                                     (b) All DIB CS participants may                      § 236.7 DoD–DIB CS information sharing                commencing January 1, 2016, and
                                                  participate in the Department of                        program requirements.                                 ending on December 31, 2020.
                                                  Homeland Security’s Enhanced                              (a) To participate in the DoD–DIB CS                DATES: Effective: January 1, 2016.
                                                  Cybersecurity Services (ECS) program                    information sharing program, a                        FOR FURTHER INFORMATION CONTACT:
                                                  (http://www.dhs.gov/enhanced-                           contractor must be a CDC and shall:                   LaKeshia Keys, Program Specialist, by
                                                  cybersecurity-services).                                  (1) Have an existing active FCL
                                                     (c) Participation in the voluntary                                                                         telephone at (202) 707–7658, or by
                                                                                                          granted under the NISPOM (DoD
                                                  DoD–DIB CS information sharing                                                                                email at crb@loc.gov.
                                                                                                          5220.22–M); and
                                                  program does not obligate the DIB                         (2) Execute the standardized FA with                SUPPLEMENTARY INFORMATION: The
                                                  participant to utilize the GFI in, or                   the Government (available during the                  Copyright Royalty Judges (‘‘Judges’’)
                                                  otherwise to implement any changes to,                  application process), which implements                received a joint motion from
                                                  its information systems. Any action                     the requirements set forth in §§ 236.5                SoundExchange, Inc.
                                                  taken by the DIB participant based on                   through 236.7, and allows the CDC to                  (‘‘SoundExchange’’), National Public
                                                  the GFI or other participation in this                  select their level of participation in the            Radio, Inc. (‘‘NPR’’) and the Corporation
                                                  program is taken on the DIB                             voluntary DoD–DIB CS information                      for Public Broadcasting (‘‘CPB’’) in
                                                  participant’s own volition and at its                   sharing program.                                      which they announced a partial
                                                  own risk and expense.                                     (3) In order for participating CDCs to              settlement in the above proceeding
                                                     (d) A DIB participant’s participation                receive classified cyber threat                       (‘‘Settlement’’) regarding royalty rates
                                                  in the voluntary DoD–DIB CS                             information electronically, they must:                and terms for certain internet
                                                  information sharing program is not                        (i) Have or acquire a Communication                 transmissions by NPR, American Public
                                                  intended to create any unfair                           Security (COMSEC) account in                          Media, Public Radio International, and
                                                  competitive advantage or disadvantage                   accordance with the NISPOM Chapter 9,                 certain public radio stations (‘‘covered
                                                  in DoD source selections or                             Section 4 (DoD 5220.22–M), which                      entities’’). The parties to the agreement
                                                  competitions, or to provide any other                   provides procedures and requirements                  requested that the Judges adopt the
                                                  form of unfair preferential treatment,                  for COMSEC activities; and                            Settlement as a determination of rates
                                                  and shall not in any way be represented                   (ii) Have or acquire approved                       and terms under Sections 112(e) and
                                                  or interpreted as a Government                          safeguarding for at least Secret                      114 of the Copyright Act for eligible
asabaliauskas on DSK5VPTVN1PROD with RULES




                                                  endorsement or approval of the DIB                      information, and continue to qualify                  transmissions by covered entities
                                                  participant, its information systems, or                under the NISPOM for retention of its                 through their Web sites and related
                                                  its products or services.                               FCL and approved safeguarding; and                    ephemeral recordings, as more
                                                     (e) The DIB participant and the                        (iii) Obtain access to DoD’s secure                 specifically set forth in the Settlement.
                                                  Government may each unilaterally limit                  voice and data transmission systems                   The Judges published the proposed
                                                  or discontinue participation in the                     supporting the voluntary DoD–DIB CS                   Settlement and requested comments
                                                  voluntary DoD–DIB CS information                        information sharing program.                          from the public. 80 FR 15958 (March 26,
                                                  sharing program at any time.                              (b) [Reserved]                                      2015).


                                             VerDate Sep<11>2014   20:30 Oct 01, 2015   Jkt 238001   PO 00000   Frm 00040   Fmt 4700   Sfmt 4700   E:\FR\FM\02OCR1.SGM   02OCR1



Document Created: 2015-12-15 08:44:33
Document Modified: 2015-12-15 08:44:33
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionRules and Regulations
ActionInterim final rule.
ContactDoD-DIB Cybersecurity Activities Office: (703) 604-3167, toll free (855) 363-4227.
FR Citation80 FR 59581 
RIN Number0790-AJ29
CFR AssociatedGovernment Contracts and Security Measures

2024 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR