Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that “cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago.” Mr. Chertoff may be on to something. In its April 2012 monthly monitoring report, DHS announced that various companies in the national gas pipeline industry were apparently being targeted by cyberattacks. Between October 2011 and February 2012, DHS claimed that there were 86 reported attacks on U.S. computer systems controlling U.S. critical infrastructure.
U.S. Secretary of Defense Leon Panetta recently referred to the “so-called Distributed Denial of Service attacks” that targeted large U.S. financial institutions recently. “These attacks delayed or disrupted services on customers websites,” Panetta said. “While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented.” Those attacks against the private sector represent a “significant escalation of the cyber threat.”
Panetta said his department is “focusing on three main tracks” when it comes to defending the country. In addition to “developing new capabilities,” and creating the necessary policies and organizations, he said the department's third area of focus is “building much more effective cooperation with industry and with our international partners.”
He said the department also needs to work with businesses “to develop baseline standards” to protect critical infrastructure that's in private hands. “Although awareness is growing, the reality is that too few companies have invested in even basic cybersecurity,” he said. (A transcript is available at http://1.usa.gov/PSjynZ.)
To address these threats, several competing bills were recently introduced in Congress ' however, it is unlikely that the current bills will be enacted into law in the near future.
The Pending Legislation
The Cyber Intelligence Sharing And Protection Act (CISPA)
On April 26, CISPA (a Republican-sponsored measure) passed the U.S. House of Representatives. CISPA takes the approach of facilitating greater sharing of cyber threat information among government and industry. CISPA does not mandate any minimum cybersecurity standards for private enterprise. Pursuant to CISPA:
Civil libertarians and left-leaning groups have criticized CISPA for, among other things, potentially overriding federal and state privacy laws.
Find CISPA, also known as H.R. 3523, online at http://1.usa.gov/THmFAs.
The Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act Of 2012 (the SECURE IT Act)
The SECURE IT Act, sponsored by Senator John McCain (R-AZ), was originally introduced into the Senate on March 1, 2012. Like CISPA, the SECURE IT Act simply provides for an information-sharing mechanism related to cyber threats. The Act, also known as S. 3342, is available at http://bit.ly/THmZPE.
Under the SECURE IT Act:
Like CISPA, the SECURE IT Act has been criticized for not sufficiently protecting existing privacy rights provided for under federal and state law.
The Cybersecurity Act of 2012 (CSA)
The CSA was originally introduced into the Senate on Feb. 14, 2012 by Senator Joe Lieberman (I-CT). The CSA addresses many aspects of cybersecurity, but the most relevant portions for private enterprise are contained in Titles I and VII of the bill.
Unlike CISPA and the SECURE IT Act, the original version of the CSA set forth fairly stringent regulatory provisions. For instance, Title I of the original bill granted DHS the authority to develop minimum risk-based cybersecurity performance requirements for companies operating “critical infrastructure.”
Business groups vociferously criticized the Title I regulatory provisions of the original bill, charging that they would lead to the imposition of costly
compliance burdens on a number of companies in key industries. In response to such criticism, a revised version of the CSA was introduced on July 19, 2012. Under the revised bill, a group of governmental and industry actors would develop a set of voluntary “cybersecurity practices” for protecting critical national infrastructure. However, existing governmental regulators with supervisory authority over any “critical national infrastructure” could still require companies in the regulated industry to comply with the “voluntary” cybersecurity practices.
Title VII of the CSA, like the other proposed bills, sets forth certain information monitoring and sharing provisions. Under Title VII:
CSA, S. 2105, can be found online at http://bit.ly/WOL9bM.
Status of the Cybersecurity Bills and Possible Executive Action
In late 2011, Senate Majority Leader Harry Reid (D-NV) promised to have a Senate vote on cybersecurity legislation in 2012. True to his word, Senator Reid brought the revised CSA bill to the Senate floor in late July 2012. However, on Aug. 2, the bill failed to muster a sufficient number of votes to invoke cloture and move to a final vote. Given that failure, and the likely dominance of election year politics during the remainder of 2012, it looks doubtful that any of the currently pending cybersecurity bills will be enacted into law anytime soon.
Despite this legislative failure, Senator Jay Rockefeller (D-WV) has publicly called for President Obama to implement portions of the CSA through executive order. At least one White House aide (John Brennan, the White House's chief counterterrorism adviser) has indicated President Obama is considering just such an action.
Implications for Private Enterprise
While there is little chance of cybersecurity legislation passing this year, cyber-risks are not going away and elected officials (and federal agencies) have not lost their desire to develop a governmental response to real and perceived cyber threats. Companies will need to remain proactive in addressing cyber risks.
Even in the absence of new legislation, companies should be aware that they may have existing legal obligations to guard against cyberthreats. For instance, many financial-services firms are already subject to the Interagency Guidelines Establishing Information Security Standards promulgated by federal financial regulators pursuant to the Gramm-Leach-Bliley Act. These guidelines set forth a number of information-security rules for financial-services firms.
Publicly traded companies are on notice that cyberthreats can impact their legally required disclosure obligations. Last year, the Securities and Exchange Commission issued a guidance document that described how cybersecurity issues could impact disclosure items in public filings required to be made under federal securities laws.
There is also potential state law liability for failure to protect against cyber threats. For example, the Delaware Supreme Court noted in the 2006 Stone v. Ritter, No. 93,2006 (http://1.usa.gov/R7bRVW) case that corporate directors may be liable for breach of their fiduciary duties where they failed to implement or monitor any information system or controls.
Given this ever-changing legal background, what should private companies do? As an initial matter, to the extent that a company has not already done so, it should consider adopting a formal, written information security program, with the guidance and input from technical experts who are familiar with both information security issues in general and the cyber threats that specifically impact that company. Companies should also consider charging a senior corporate officer with responsibility for overseeing cybersecurity issues. Given the emphasis on both sharing of cyber threat data and protection of individual privacy that is likely to come out of any new federal cybersecurity legislation, companies should consider analyzing how they can share cyber threat information with other companies (and the government) while remaining mindful of their antitrust and data privacy obligations.
Cybersecurity is a dynamic field. Companies must be flexible as they manage both cyber threats and new laws and regulations that are likely to be enacted in response to cyber threats.
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that “cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago.” Mr. Chertoff may be on to something. In its April 2012 monthly monitoring report, DHS announced that various companies in the national gas pipeline industry were apparently being targeted by cyberattacks. Between October 2011 and February 2012, DHS claimed that there were 86 reported attacks on U.S. computer systems controlling U.S. critical infrastructure.
U.S. Secretary of Defense Leon Panetta recently referred to the “so-called Distributed Denial of Service attacks” that targeted large U.S. financial institutions recently. “These attacks delayed or disrupted services on customers websites,” Panetta said. “While this kind of tactic isn't new, the scale and speed with which it happened was unprecedented.” Those attacks against the private sector represent a “significant escalation of the cyber threat.”
Panetta said his department is “focusing on three main tracks” when it comes to defending the country. In addition to “developing new capabilities,” and creating the necessary policies and organizations, he said the department's third area of focus is “building much more effective cooperation with industry and with our international partners.”
He said the department also needs to work with businesses “to develop baseline standards” to protect critical infrastructure that's in private hands. “Although awareness is growing, the reality is that too few companies have invested in even basic cybersecurity,” he said. (A transcript is available at http://1.usa.gov/PSjynZ.)
To address these threats, several competing bills were recently introduced in Congress ' however, it is unlikely that the current bills will be enacted into law in the near future.
The Pending Legislation
The Cyber Intelligence Sharing And Protection Act (CISPA)
On April 26, CISPA (a Republican-sponsored measure) passed the U.S. House of Representatives. CISPA takes the approach of facilitating greater sharing of cyber threat information among government and industry. CISPA does not mandate any minimum cybersecurity standards for private enterprise. Pursuant to CISPA:
Civil libertarians and left-leaning groups have criticized CISPA for, among other things, potentially overriding federal and state privacy laws.
Find CISPA, also known as H.R. 3523, online at http://1.usa.gov/THmFAs.
The Strengthening and Enhancing Cybersecurity by Using Research, Education, Information, and Technology Act Of 2012 (the SECURE IT Act)
The SECURE IT Act, sponsored by Senator John McCain (R-AZ), was originally introduced into the Senate on March 1, 2012. Like CISPA, the SECURE IT Act simply provides for an information-sharing mechanism related to cyber threats. The Act, also known as S. 3342, is available at http://bit.ly/THmZPE.
Under the SECURE IT Act:
Like CISPA, the SECURE IT Act has been criticized for not sufficiently protecting existing privacy rights provided for under federal and state law.
The Cybersecurity Act of 2012 (CSA)
The CSA was originally introduced into the Senate on Feb. 14, 2012 by Senator Joe Lieberman (I-CT). The CSA addresses many aspects of cybersecurity, but the most relevant portions for private enterprise are contained in Titles I and VII of the bill.
Unlike CISPA and the SECURE IT Act, the original version of the CSA set forth fairly stringent regulatory provisions. For instance, Title I of the original bill granted DHS the authority to develop minimum risk-based cybersecurity performance requirements for companies operating “critical infrastructure.”
Business groups vociferously criticized the Title I regulatory provisions of the original bill, charging that they would lead to the imposition of costly
compliance burdens on a number of companies in key industries. In response to such criticism, a revised version of the CSA was introduced on July 19, 2012. Under the revised bill, a group of governmental and industry actors would develop a set of voluntary “cybersecurity practices” for protecting critical national infrastructure. However, existing governmental regulators with supervisory authority over any “critical national infrastructure” could still require companies in the regulated industry to comply with the “voluntary” cybersecurity practices.
Title VII of the CSA, like the other proposed bills, sets forth certain information monitoring and sharing provisions. Under Title VII:
CSA, S. 2105, can be found online at http://bit.ly/WOL9bM.
Status of the Cybersecurity Bills and Possible Executive Action
In late 2011, Senate Majority Leader Harry Reid (D-NV) promised to have a Senate vote on cybersecurity legislation in 2012. True to his word, Senator Reid brought the revised CSA bill to the Senate floor in late July 2012. However, on Aug. 2, the bill failed to muster a sufficient number of votes to invoke cloture and move to a final vote. Given that failure, and the likely dominance of election year politics during the remainder of 2012, it looks doubtful that any of the currently pending cybersecurity bills will be enacted into law anytime soon.
Despite this legislative failure, Senator Jay Rockefeller (D-WV) has publicly called for President Obama to implement portions of the CSA through executive order. At least one White House aide (John Brennan, the White House's chief counterterrorism adviser) has indicated President Obama is considering just such an action.
Implications for Private Enterprise
While there is little chance of cybersecurity legislation passing this year, cyber-risks are not going away and elected officials (and federal agencies) have not lost their desire to develop a governmental response to real and perceived cyber threats. Companies will need to remain proactive in addressing cyber risks.
Even in the absence of new legislation, companies should be aware that they may have existing legal obligations to guard against cyberthreats. For instance, many financial-services firms are already subject to the Interagency Guidelines Establishing Information Security Standards promulgated by federal financial regulators pursuant to the Gramm-Leach-Bliley Act. These guidelines set forth a number of information-security rules for financial-services firms.
Publicly traded companies are on notice that cyberthreats can impact their legally required disclosure obligations. Last year, the Securities and Exchange Commission issued a guidance document that described how cybersecurity issues could impact disclosure items in public filings required to be made under federal securities laws.
There is also potential state law liability for failure to protect against cyber threats. For example, the Delaware Supreme Court noted in the 2006 Stone v. Ritter, No. 93,2006 (http://1.usa.gov/R7bRVW) case that corporate directors may be liable for breach of their fiduciary duties where they failed to implement or monitor any information system or controls.
Given this ever-changing legal background, what should private companies do? As an initial matter, to the extent that a company has not already done so, it should consider adopting a formal, written information security program, with the guidance and input from technical experts who are familiar with both information security issues in general and the cyber threats that specifically impact that company. Companies should also consider charging a senior corporate officer with responsibility for overseeing cybersecurity issues. Given the emphasis on both sharing of cyber threat data and protection of individual privacy that is likely to come out of any new federal cybersecurity legislation, companies should consider analyzing how they can share cyber threat information with other companies (and the government) while remaining mindful of their antitrust and data privacy obligations.
Cybersecurity is a dynamic field. Companies must be flexible as they manage both cyber threats and new laws and regulations that are likely to be enacted in response to cyber threats.
During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.
The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.