Georgia Tech Settles False Claims Act Allegations Over Cybersecurity Failures

Bradley Arant Boult Cummings LLP
Contact

Bradley Arant Boult Cummings LLP

The Department of Justice recently announced that Georgia Tech Research Corporation (GTRC) has agreed to pay $875,000 to resolve allegations that it violated the False Claims Act by failing to meet required cybersecurity standards in connection with contracts with the U.S. Air Force and the Defense Advanced Research Projects Agency (DARPA).

In light of this development, government contractors would be well advised to review their cybersecurity programs, ensure the accuracy of their self-assessments, and prepare for heightened oversight under the Cybersecurity Maturity Model Certification (CMMC) program.

Alleged Failures and Misrepresentations

GTRC manages sponsored research agreements on behalf of the Georgia Institute of Technology (Georgia Tech), including research contracts with the U.S. Department of Defense (DoD). According to the government, GTRC and Georgia Tech failed to implement critical cybersecurity controls while conducting sensitive cyber-defense research, misrepresented their compliance posture, and submitted false information to DoD regarding their cybersecurity readiness.

Specifically, the government alleged that until December 2021, GTRC and Georgia Tech:

  • Failed to install, update, or run required anti-virus or anti-malware tools on desktops, laptops, servers, and networks at Georgia Tech’s Astrolavos Lab.
  • Did not have a system security plan in place until at least February 2020, despite contractual requirements to maintain one.
  • Submitted a false cybersecurity assessment score of 98 in December 2020, representing that the university had a campus-wide IT system compliant with DoD standards. In reality, the score was based on a “fictitious” or “virtual” environment and did not reflect actual systems used to process covered defense information.

According to the government, these alleged misrepresentations were material because providing an accurate cybersecurity assessment score was a condition of the contract award for GTRC’s DoD contracts.

DOJ and DoD Emphasize Contractor Cybersecurity Obligations

As part of the announced settlement, senior government officials emphasized the critical importance of cybersecurity compliance in DoD contracts:

  • Assistant Attorney General Brett A. Shumate stated that contractors who fail to meet cybersecurity standards “leave sensitive government information vulnerable to malicious actors and cyber threats.”
  • U.S. Attorney Theodore S. Hertzberg for the Northern District of Georgia warned that defense contractors “who fail to implement required cybersecurity controls, provide false information to the government, and otherwise fail to fulfill their cybersecurity obligations will be held accountable.”
  • Stacy Bostjanick, Chief Defense Industrial Base Cybersecurity for DoD, noted that this case should remind contractors to prioritize compliance with NIST SP 800-171 and the CMMC program.

Qui Tam Whistleblowers Receive Share of Recovery

The settlement resolves claims brought under the False Claims Act’s qui tam provisions by Christopher Craig and Kyle Koza, former members of Georgia Tech’s cybersecurity team. The United States intervened in the lawsuit and filed its own complaint in August 2024. Under the settlement, the relators will receive $201,250 as their share of the recovery.

Key Takeaways for Government Contractors

This settlement underscores several important points for government contractors and subcontractors to consider:

  • Cybersecurity can be a contractual obligation – Not meeting requirements under NIST SP 800-171 or misrepresenting compliance can lead to False Claims Act liability, among other things.
  • Assessment scores matter – Submitting inaccurate or misleading cybersecurity scores, even at a summary level, may expose contractors to government enforcement actions.
  • Whistleblowers are watching – Employees with knowledge of cybersecurity deficiencies may bring False Claims Act suits, and DOJ has shown its willingness to intervene in these cases.
  • CMMC is the next step – DoD’s CMMC program will further strengthen assessment and certification requirements, increasing potential liability for contractors that fail to comply.

Conclusion

As enforcement actions like this one make clear, cybersecurity is no longer just an IT issue — it is a core compliance and contract performance obligation. Accordingly, federal contractors should review their cybersecurity programs, ensure the accuracy of their self-assessments, and prepare for heightened oversight under CMMC.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Bradley Arant Boult Cummings LLP

Written by:

Bradley Arant Boult Cummings LLP
Contact
more
less

What do you want from legal thought leadership?

Please take our short survey – your perspective helps to shape how firms create relevant, useful content that addresses your needs:

Bradley Arant Boult Cummings LLP on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide