Legal Update | Implications of Cybersecurity Information Sharing Act of 2015 Expiring

Foster Swift Collins & Smith
Contact

Foster Swift Collins & Smith

The Cybersecurity Information Sharing Act of 2015 (“CISA”) expired yesterday on September 30, 2025.

Though Congress discussed renewing the statute prior to its expiration, CISA was not officially reauthorized by the federal government.

CISA was designed to encourage private organizations to share cybersecurity information with other private sector entities and the federal government through the Department of Homeland Security, aiming to strengthen overall monitoring capabilities and bolster collective defense against cyber threats. In particular, the statute allowed private entities to monitor their own information systems and take defensive measures related to those systems, so long as such actions complied with other applicable data privacy and cybersecurity laws, rules, and regulations. Additionally, CISA provided legal protections to reporting private entities in order to encourage their participation.

CISA’s overarching goal was to counter cyber-attacks, and due to its expiration, we may see significantly fewer private organizations open to sharing cybersecurity-related data without CISA’s protections and guardrails. The landscape is now uncertain, and without CISA’s safeguards, companies may face greater legal risks when sharing data breach and cyber threat information with other organizations or the federal government. This increased risk could discourage the reporting practices established over the past decade and undermine the collaborative cyber defense efforts built during that time.

Importantly, the sharing of technical threat information, such as indicators of compromise and malicious tactics, techniques, and procedures, remains lawful, just as it was prior to the enactment of CISA in 2015. However, with the lapse of CISA, organizations should consider taking some extra precautions when sharing cyber threat-related information that previously would have been protected under CISA. Additionally, entities should review their data privacy and cybersecurity measures in place, such as employee policies on data-sharing and company privacy notices, to ensure that a valid legal basis remains to monitor information systems and communications for cyber threats.

At Foster Swift Collins & Smith, P.C., we are closely monitoring developments in the information technology, data privacy, and cybersecurity spaces, and are committed to advising our clients on how to prepare for possible legal and compliance impacts.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations. Attorney Advertising.

© Foster Swift Collins & Smith

Written by:

Foster Swift Collins & Smith
Contact
more
less

What do you want from legal thought leadership?

Please take our short survey – your perspective helps to shape how firms create relevant, useful content that addresses your needs:

Foster Swift Collins & Smith on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide