Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Legislation Near

By Mark W. Menezes, Frederick R. Eames and Evan D. Wolff
December 27, 2012

On Nov. 15, the U.S. Senate declined to approve S. 3414, the Cybersecurity Act of 2012, introduced by senators Joe Lieberman (I-CT) and Susan Collins (R-ME), and supported by the Obama administration. (See, www.govtrack.us/congress/bills/112/s3414.) The proposed legislation would have set voluntary cybersecurity standards for owners of the nation's critical infrastructure, such as gas pipelines, utilities and banks. The bill also would have authorized companies and the government to share information about online threats. Most supported the information-sharing provisions of the proposed legislation, but many businesses were concerned that even voluntary standards could impose new liabilities upon them and that the act did not provide adequate liability protection to address those risks.

Executive Order

In the absence of cybersecurity legislation, the Obama administration now is considering taking action through an executive order.

Failing to get the Cybersecurity Act passed, administration officials have drafted an executive order that would encourage companies to meet cybersecurity standards. As with S. 3414, similar concerns are being expressed about the absence of liability protections in the draft order, and the potential impact of a final order upon critical infrastructure owners is subject to considerable debate and uncertainty.

[Editor's Note: Lieberman supported using an Executive Order in a Sept. 24 letter to President Obama:

[N]otwithstanding the overwhelming evidence of our nation's vulnerability to cyber attack and the potential that such an attack could cost significant loss of American lives and treasure, a filibuster in the Senate derailed S. 3414, the Cybersecurity Act of 2012. This gridlock threatens to prevent the Senate from passing a cyber bill before the end of this Congress. Therefore, I urge you to use your executive authority to the maximum extent possible to defend the nation from cyber attack. ' Executive action cannot make all the changes necessary to facilitate the type of information sharing we urgently need ' only new statutory authorization will be sufficient. While the Senate failed to make these critical changes to the law, I hope that you will use your authority to the extent possible to facilitate greater cybersecurity information sharing.]

http://1.usa.gov/Ws14JS

Under current law, critical infrastructure owners and operators may be liable for damages that others experience resulting from a cyberattack on their systems. This will depend on a variety of case-specific facts ' e.g., whether the company exercised reasonable care in protecting its systems, whether it had notice of a potential vulnerability, whether it had a direct (e.g., customer) or only indirect relationship with the plaintiff, whether contractual obligations may apply, whether sector-specific standards (such as the Federal Energy Regulatory Commission's Critical Infrastructure Protection standards) may apply and the applicability of state laws.

The original version of S. 3414 would have allowed the U.S. Department of Homeland Security (DHS) to create mandatory cybersecurity compliance standards for each critical infrastructure sector. S. 3414 was revised to make these cybersecurity standards voluntary, providing incentives for participation, including limited liability protection. Yet some felt even these voluntary standards could set the legal standard of care for critical-infrastructure cybersecurity, thus potentially compelling compliance. Some businesses also expressed concerns that the liability protections included in the proposed legislation were too limited because, among other reasons, they would not apply to an incident not identified by an assessment conducted under the statute, did not address liability for substantial consequential damages that could arise from a cyberattack, and would preclude punitive damages only in limited circumstances.

A draft of the executive order now under consideration by the Obama administration would institute a voluntary cybersecurity standards structure for critical infrastructure similar to S. 3414's, but without liability protection. As a discussion paper accompanying the draft order notes: “Liability protection requires statutory authority; therefore, the Executive Order cannot establish such an incentive.” White House Draft Executive Order Dated 11-21-12, http://bit.ly/WwvChw. The draft executive order directs the U.S. Department of Commerce to have the National Institute of Standards and Technology coordinate development of a cybersecurity framework. The DHS would invite critical infrastructure owners and operators to “participate in a voluntary program to encourage the adoption” of the framework. Sector-specific agencies would report to the president on their authorities to regulate the cybersecurity of critical infrastructure, and after DHS review would be encouraged to propose regulations within a year.

Additional Liability

The executive order has the potential to create additional liability for companies, in addition to the concerns noted above about any voluntary standards morphing into a legal standard of care.

First, as with S. 3414, the executive order should result in enhanced information sharing between the government and private sector for those private companies that choose to participate. While this appears to be a positive development, it presents difficulties for private companies, as they will be expected to have the
sophistication and ability to respond swiftly to such information and warnings. Not responding, whether due to lack of a technological solution, a lack of resources or differing assessments of the threat's gravity, may put private companies in a worse liability position as they will have demonstrable actual knowledge of the threat and may be seen as not adhering to the standards.

Second, there may be some private companies that choose not to participate in the voluntary standards. These companies will certainly not receive the information from the government, but if victimized by a threat may still need to contend with the voluntary standards, particularly if adherence to such standards could be argued to have nullified or mitigated the threat. In addition, insurers may rely on the standards in evaluating or underwriting polices, and regulatory bodies may use them when evaluating indirect action, such as disclosure obligations.

The government has looked before at the issue of liability protection for critical infrastructure and provided what many believe is a good solution in the Support Anti-terrorism by Fostering Effective Technologies Act of 2002, known as the SAFETY Act (http://bit.ly/UfBRUy). The SAFETY Act authorizes the DHS to grant significant liability protections to entities that sell or use qualified products and services to protect against an “act of terrorism.” The significant protections of the Act ' including caps on damages to the company's insurance coverage, a bar on punitive and other noncompensatory damages, and the ability to use the government contractor defense in litigation ' have been applied to a very broad range of products and services including cybersecurity products and services. Thus, the SAFETY Act could be used as a tool to mitigate some of the liabilities that may arise from a final executive order, but a real question remains regarding the extent of this coverage and an understanding of what a triggering event is.

If an executive order proceeds, information sharing-only legislation ' an idea many businesses prefer to a more comprehensive bill ' could be a beneficial step. Through the legislation, Congress can authorize the types of liability protections that not only will protect companies who are collaborating with the government and each other to enhance cybersecurity, but also will encourage greater information sharing and increased security.


Mark W. Menezes is co-head of Hunton & Williams' (www.hunton.com) regulated markets and energy infrastructure team and can be reached at [email protected]. Frederick R. Eames is a partner in that team. He can be reached at [email protected]. Evan D. Wolff serves as director of the firm's homeland security practice and can be reached at [email protected].

On Nov. 15, the U.S. Senate declined to approve S. 3414, the Cybersecurity Act of 2012, introduced by senators Joe Lieberman (I-CT) and Susan Collins (R-ME), and supported by the Obama administration. (See, www.govtrack.us/congress/bills/112/s3414.) The proposed legislation would have set voluntary cybersecurity standards for owners of the nation's critical infrastructure, such as gas pipelines, utilities and banks. The bill also would have authorized companies and the government to share information about online threats. Most supported the information-sharing provisions of the proposed legislation, but many businesses were concerned that even voluntary standards could impose new liabilities upon them and that the act did not provide adequate liability protection to address those risks.

Executive Order

In the absence of cybersecurity legislation, the Obama administration now is considering taking action through an executive order.

Failing to get the Cybersecurity Act passed, administration officials have drafted an executive order that would encourage companies to meet cybersecurity standards. As with S. 3414, similar concerns are being expressed about the absence of liability protections in the draft order, and the potential impact of a final order upon critical infrastructure owners is subject to considerable debate and uncertainty.

[Editor's Note: Lieberman supported using an Executive Order in a Sept. 24 letter to President Obama:

[N]otwithstanding the overwhelming evidence of our nation's vulnerability to cyber attack and the potential that such an attack could cost significant loss of American lives and treasure, a filibuster in the Senate derailed S. 3414, the Cybersecurity Act of 2012. This gridlock threatens to prevent the Senate from passing a cyber bill before the end of this Congress. Therefore, I urge you to use your executive authority to the maximum extent possible to defend the nation from cyber attack. ' Executive action cannot make all the changes necessary to facilitate the type of information sharing we urgently need ' only new statutory authorization will be sufficient. While the Senate failed to make these critical changes to the law, I hope that you will use your authority to the extent possible to facilitate greater cybersecurity information sharing.]

http://1.usa.gov/Ws14JS

Under current law, critical infrastructure owners and operators may be liable for damages that others experience resulting from a cyberattack on their systems. This will depend on a variety of case-specific facts ' e.g., whether the company exercised reasonable care in protecting its systems, whether it had notice of a potential vulnerability, whether it had a direct (e.g., customer) or only indirect relationship with the plaintiff, whether contractual obligations may apply, whether sector-specific standards (such as the Federal Energy Regulatory Commission's Critical Infrastructure Protection standards) may apply and the applicability of state laws.

The original version of S. 3414 would have allowed the U.S. Department of Homeland Security (DHS) to create mandatory cybersecurity compliance standards for each critical infrastructure sector. S. 3414 was revised to make these cybersecurity standards voluntary, providing incentives for participation, including limited liability protection. Yet some felt even these voluntary standards could set the legal standard of care for critical-infrastructure cybersecurity, thus potentially compelling compliance. Some businesses also expressed concerns that the liability protections included in the proposed legislation were too limited because, among other reasons, they would not apply to an incident not identified by an assessment conducted under the statute, did not address liability for substantial consequential damages that could arise from a cyberattack, and would preclude punitive damages only in limited circumstances.

A draft of the executive order now under consideration by the Obama administration would institute a voluntary cybersecurity standards structure for critical infrastructure similar to S. 3414's, but without liability protection. As a discussion paper accompanying the draft order notes: “Liability protection requires statutory authority; therefore, the Executive Order cannot establish such an incentive.” White House Draft Executive Order Dated 11-21-12, http://bit.ly/WwvChw. The draft executive order directs the U.S. Department of Commerce to have the National Institute of Standards and Technology coordinate development of a cybersecurity framework. The DHS would invite critical infrastructure owners and operators to “participate in a voluntary program to encourage the adoption” of the framework. Sector-specific agencies would report to the president on their authorities to regulate the cybersecurity of critical infrastructure, and after DHS review would be encouraged to propose regulations within a year.

Additional Liability

The executive order has the potential to create additional liability for companies, in addition to the concerns noted above about any voluntary standards morphing into a legal standard of care.

First, as with S. 3414, the executive order should result in enhanced information sharing between the government and private sector for those private companies that choose to participate. While this appears to be a positive development, it presents difficulties for private companies, as they will be expected to have the
sophistication and ability to respond swiftly to such information and warnings. Not responding, whether due to lack of a technological solution, a lack of resources or differing assessments of the threat's gravity, may put private companies in a worse liability position as they will have demonstrable actual knowledge of the threat and may be seen as not adhering to the standards.

Second, there may be some private companies that choose not to participate in the voluntary standards. These companies will certainly not receive the information from the government, but if victimized by a threat may still need to contend with the voluntary standards, particularly if adherence to such standards could be argued to have nullified or mitigated the threat. In addition, insurers may rely on the standards in evaluating or underwriting polices, and regulatory bodies may use them when evaluating indirect action, such as disclosure obligations.

The government has looked before at the issue of liability protection for critical infrastructure and provided what many believe is a good solution in the Support Anti-terrorism by Fostering Effective Technologies Act of 2002, known as the SAFETY Act (http://bit.ly/UfBRUy). The SAFETY Act authorizes the DHS to grant significant liability protections to entities that sell or use qualified products and services to protect against an “act of terrorism.” The significant protections of the Act ' including caps on damages to the company's insurance coverage, a bar on punitive and other noncompensatory damages, and the ability to use the government contractor defense in litigation ' have been applied to a very broad range of products and services including cybersecurity products and services. Thus, the SAFETY Act could be used as a tool to mitigate some of the liabilities that may arise from a final executive order, but a real question remains regarding the extent of this coverage and an understanding of what a triggering event is.

If an executive order proceeds, information sharing-only legislation ' an idea many businesses prefer to a more comprehensive bill ' could be a beneficial step. Through the legislation, Congress can authorize the types of liability protections that not only will protect companies who are collaborating with the government and each other to enhance cybersecurity, but also will encourage greater information sharing and increased security.


Mark W. Menezes is co-head of Hunton & Williams' (www.hunton.com) regulated markets and energy infrastructure team and can be reached at [email protected]. Frederick R. Eames is a partner in that team. He can be reached at [email protected]. Evan D. Wolff serves as director of the firm's homeland security practice and can be reached at [email protected].

This premium content is locked for Entertainment Law & Finance subscribers only

  • Stay current on the latest information, rulings, regulations, and trends
  • Includes practical, must-have information on copyrights, royalties, AI, and more
  • Tap into expert guidance from top entertainment lawyers and experts

For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473

Read These Next
COVID-19 and Lease Negotiations: Early Termination Provisions Image

During the COVID-19 pandemic, some tenants were able to negotiate termination agreements with their landlords. But even though a landlord may agree to terminate a lease to regain control of a defaulting tenant's space without costly and lengthy litigation, typically a defaulting tenant that otherwise has no contractual right to terminate its lease will be in a much weaker bargaining position with respect to the conditions for termination.

How Secure Is the AI System Your Law Firm Is Using? Image

What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Authentic Communications Today Increase Success for Value-Driven Clients Image

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.