2014 Intelligence Authorization Act Imposes Cyber Breach Reporting Requirement on Intelligence Community Contractors - Many Federal Government Contractors Already Subject to Varying Cyber Security Requirements – Congress Adds a New One

by Holland & Knight LLP
Contact

HIGHLIGHTS:

  • The federal government must publish new procedures 90 days after the 2014 Intelligence Authorization Act is signed. These procedures will become effective upon publication.
  • Intelligence community contractors will be required to report cyber incursions and provide information to the government relating to the breach.
  • The new procedures must create a mechanism for IC government personnel to obtain access to contractor equipment or information to enable the government to conduct its own forensic investigation, however, the legislation limits the scope of government access.

On July 7, 2014, President Obama signed into law the 2014 Intelligence Authorization Act that adds new requirements affecting intelligence community (IC) contractors. The new legislation recognizes the growing layers of agency-specific cyber requirements imposed on government contractors and, as explained below, contains a provision requiring the Director of National Intelligence (DNI) and the Department of Defense (DoD) to work together to harmonize the cyber regulations affecting IC and DoD contractors.

Section 325 of the 2014 Intelligence Authorization Act requires the DNI to establish procedures requiring cleared IC contractors to report to the government the successful penetration of a network or information system. The DNI has 90 days from July 7 to issue the new requirements, which will then become effective immediately.

Enhanced Protections Required for Certain Information

The legislation applies to networks or information systems that contain or process information created by or for an element of the IC triggering the requirement that the contractor must apply enhanced protections. While the bill leaves to the DNI the task of developing the specific disclosure requirements and which element or elements of the IC will receive the reports, it does specify that covered contractors must "rapidly" report incursions to their networks and systems. The bill also contains minimum content requirements for these reports as follows:

  • a description of the technique or method used in the penetration
  • a sample of the malicious software used in the penetration if the contractor has been able to discover and isolate the software
  • a summary of information created by or for the relevant government element in connection with any program of the element that has been potentially compromised

Forensic Government Investigations Allowed

In addition to the reporting requirement, the new procedures must create a mechanism for IC government personnel to obtain access to contractor equipment or information to enable the government to conduct its own forensic investigation. The legislation limits the scope of government access by requiring that the procedures contain reasonable protection for trade secrets, commercial or financial information, and personal identification information. It also restricts access to cleared contractor information or equipment to that which is necessary to determine whether the agency's information was indeed accessed and, if so, what information was the subject of the exfiltration. The act further seeks to alleviate contractor concerns about preserving the confidentiality of their data in the event of a government investigation by prohibiting the sharing of such data outside of the IC unless the contractor to whom the data belongs approves of sharing the data outside of the IC, or the information is provided to a congressional intelligence committee, or the information is provided to law enforcement to assist in an investigation of the data breach. The act does not, however, limit dissemination of the information once it is provided to congress or a law enforcement agency.

DNI Required to Work with DoD to Harmonize Cyber Requirements

As referenced above, the Intelligence Authorization Act recognizes that DoD already has regulations in place requiring the reporting of cyber incursions, potentially subjecting contractors holding both DoD and IC contracts to duplicate and even conflicting reporting requirements. To avoid multiple overlapping requirements, the 2014 Authorization Bill requires the DNI to work with DoD to submit a single report and recommended disclosure and reporting requirements satisfying both the 2014 Authorization Act and the DoD requirements. This report is due no later than 180 days after the act becomes law.

Given this requirement, the existing DoD Federal Acquisition Supplement (DFARS) provisions and accompanying clause (DFARS 252.204-7012) may provide IC contractors with a preview of what may be in store for them in terms of cyber protection and reporting requirements. As to reporting, DoD contractors handling unclassified controlled technical information now have 72 hours to report a cyber incident. The DFARS identifies 13 categories of information that potentially are to be contained in the report, including the following:

  • identification of the affected contracts
  • a description of the compromised information and how it was compromised
  • if the incident occurred on a subcontractor network, the name of the subcontractor

After the initial report, contractors must perform a more detailed forensic analysis and are required to preserve information concerning the incursion for at least 90 days in order to allow the government to conduct its own investigation. IC community contractors should also be aware that DFARS 252.204-7012 references NIST Special Publication 800-53 as the standard against which contractors are to assess the compliance of their own cyber security policies and practices.

In sum, the 2014 Intelligence Authorization Act requires the imposition of cyber breach reporting and investigation mandates on IC contractors. The details of these requirements are left to the DNI, but the current DFARS, clauses and referenced standards likely provide a roadmap of the regulations soon to be applicable to the IC community.

 

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Holland & Knight LLP | Attorney Advertising

Written by:

Holland & Knight LLP
Contact
more
less

Holland & Knight LLP on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
Privacy Policy (Updated: October 8, 2015):
hide

JD Supra provides users with access to its legal industry publishing services (the "Service") through its website (the "Website") as well as through other sources. Our policies with regard to data collection and use of personal information of users of the Service, regardless of the manner in which users access the Service, and visitors to the Website are set forth in this statement ("Policy"). By using the Service, you signify your acceptance of this Policy.

Information Collection and Use by JD Supra

JD Supra collects users' names, companies, titles, e-mail address and industry. JD Supra also tracks the pages that users visit, logs IP addresses and aggregates non-personally identifiable user data and browser type. This data is gathered using cookies and other technologies.

The information and data collected is used to authenticate users and to send notifications relating to the Service, including email alerts to which users have subscribed; to manage the Service and Website, to improve the Service and to customize the user's experience. This information is also provided to the authors of the content to give them insight into their readership and help them to improve their content, so that it is most useful for our users.

JD Supra does not sell, rent or otherwise provide your details to third parties, other than to the authors of the content on JD Supra.

If you prefer not to enable cookies, you may change your browser settings to disable cookies; however, please note that rejecting cookies while visiting the Website may result in certain parts of the Website not operating correctly or as efficiently as if cookies were allowed.

Email Choice/Opt-out

Users who opt in to receive emails may choose to no longer receive e-mail updates and newsletters by selecting the "opt-out of future email" option in the email they receive from JD Supra or in their JD Supra account management screen.

Security

JD Supra takes reasonable precautions to insure that user information is kept private. We restrict access to user information to those individuals who reasonably need access to perform their job functions, such as our third party email service, customer service personnel and technical staff. However, please note that no method of transmitting or storing data is completely secure and we cannot guarantee the security of user information. Unauthorized entry or use, hardware or software failure, and other factors may compromise the security of user information at any time.

If you have reason to believe that your interaction with us is no longer secure, you must immediately notify us of the problem by contacting us at info@jdsupra.com. In the unlikely event that we believe that the security of your user information in our possession or control may have been compromised, we may seek to notify you of that development and, if so, will endeavor to do so as promptly as practicable under the circumstances.

Sharing and Disclosure of Information JD Supra Collects

Except as otherwise described in this privacy statement, JD Supra will not disclose personal information to any third party unless we believe that disclosure is necessary to: (1) comply with applicable laws; (2) respond to governmental inquiries or requests; (3) comply with valid legal process; (4) protect the rights, privacy, safety or property of JD Supra, users of the Service, Website visitors or the public; (5) permit us to pursue available remedies or limit the damages that we may sustain; and (6) enforce our Terms & Conditions of Use.

In the event there is a change in the corporate structure of JD Supra such as, but not limited to, merger, consolidation, sale, liquidation or transfer of substantial assets, JD Supra may, in its sole discretion, transfer, sell or assign information collected on and through the Service to one or more affiliated or unaffiliated third parties.

Links to Other Websites

This Website and the Service may contain links to other websites. The operator of such other websites may collect information about you, including through cookies or other technologies. If you are using the Service through the Website and link to another site, you will leave the Website and this Policy will not apply to your use of and activity on those other sites. We encourage you to read the legal notices posted on those sites, including their privacy policies. We shall have no responsibility or liability for your visitation to, and the data collection and use practices of, such other sites. This Policy applies solely to the information collected in connection with your use of this Website and does not apply to any practices conducted offline or in connection with any other websites.

Changes in Our Privacy Policy

We reserve the right to change this Policy at any time. Please refer to the date at the top of this page to determine when this Policy was last revised. Any changes to our privacy policy will become effective upon posting of the revised policy on the Website. By continuing to use the Service or Website following such changes, you will be deemed to have agreed to such changes. If you do not agree with the terms of this Policy, as it may be amended from time to time, in whole or part, please do not continue using the Service or the Website.

Contacting JD Supra

If you have any questions about this privacy statement, the practices of this site, your dealings with this Web site, or if you would like to change any of the information you have provided to us, please contact us at: info@jdsupra.com.

- hide
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.