More Unwritten Rules: Developments in U.S. National Security Regulation of Undersea Cable Systems. Kent Bressie
|
|
- Erin Holmes
- 8 years ago
- Views:
Transcription
1 More Unwritten Rules: Developments in U.S. National Security Regulation of Undersea Cable Systems Kent Bressie 1
2 Overview In the past year, the U.S. Government has: Begun imposing security agreements on all new international undersea cable systems landing in the United States, and adopted new infrastructure protection-related requirements for the standard security agreement Requested from existing systems information re equipment deployment and contracting for maintenance and security, noting that requests may evolve into ongoing reporting requirements Imposed on all systems new reporting requirements re operational status and restoration 2
3 Overview 2 Yet the U.S. Government has not been transparent about most of these new requirements. Most requirements have not been promulgated in regulations or with public written guidance, or even reported by the media. In some cases, the requirements seem designed to avoid public or legal scrutiny. These requirements differ greatly from other U.S. Government national security programs (e.g., security clearances, export controls) all of which are governed by formal regulations and written guidance. These unwritten requirements complicate infrastructure planning, imposing costs on operators. 3
4 1. Security-Agreement Changes in 2008: More Agreements, More Requirements, More DHS Team Telecom now led by the Department of Homeland Security ( DHS ) in undersea cable matters requires agreements for more systems, and imposes new infrastructureprotection conditions in those agreements. 4
5 Security-Agreement Changes 2 Brief Overview of Team Telecom Department of Justice ( DoJ ), Department of Defense ( DoD ) and DHS (together, Team Telecom ) scrutinize national security and law enforcement aspects of applications for licenses and transaction consents filed with the Federal Communications Commission ( FCC ). Team Telecom seeks to protect critical infrastructure, protect government communications, preserve government wiretapping and surveillance capabilities, prevent terrorist acts, and deter money laundering and drug trafficking. Team Telecom does not act pursuant to any particular law, has adopted no formal regulations, and retains substantial power and discretion. 5
6 Security-Agreement Changes 3 Brief Recap of Security Agreements Team Telecom often negotiates a security agreement with an infrastructure owner or service provider holding an FCC license. A security agreement typically imposes restrictions re traffic routing, storage of data and records, foreign surveillance, while imposing other obligations re U.S. surveillance, security procedures, and auditing and reporting. Team Telecom petitions FCC to condition any license or transaction approval on compliance with a security agreement. Team Telecom retains right to ask FCC to revoke a license or transaction approval if the applicant fails to comply with a security agreement. 6
7 Security-Agreement Changes 4 In 2008, DHS took the lead in Team Telecom reviews of undersea cable matters In some cases (e.g., PPC 1 and American Samoa-Hawaii Cable), DHS was the only agency negotiating and signing the security agreement. By contrast, DoJ is still heavily involved in Team Telecom reviews involving mobile carriers and satellite operators. As the most cautious of Team Telecom s agencies, DHS is now in a position to adopt new requirements that other agencies might have thought unnecessary. 7
8 Security-Agreement Changes 5 Team Telecom now imposes security agreements on all international undersea cable systems landing in the United States Previously, Team Telecom required security agreements only for certain foreign-owned undersea cable systems. As of June 2008, however, Team Telecom began to require security agreements for all U.S.-owned systems, unless they connect only domestic points (e.g., within Hawaii, or Oregon-Alaska). American Samoa-Hawaii Cable was the first system subjected to this requirement, as it has a segment connecting American Samoa with the Independent State of Samoa. United States includes American Samoa, Guam, the Commonwealth of the Northern Mariana Islands, Puerto Rico, and the U.S. Virgin Islands. 8
9 Security-Agreement Changes 6 Team Telecom has expanded scope of national security reviews to include infrastructure security Prior focus only on information security, e.g., integrity of surveillance conducted by U.S. law enforcement agencies, notice of foreigngovernment attempts to conduct surveillance, and security of cable system records As of June 2008, expanded focus on infrastructure security, seeking up-to-date information re: Principal equipment to be installed, including manufacturer and model Contractors for maintenance and security of the system 9
10 Security-Agreement Changes 7 Standard security agreement now includes more intrusive conditions pertaining to infrastructure security Requires advance written notice to DHS prior to performing any maintenance, repair, or replacement that would result in any modification of the cable system s principal equipment Permits bona fide emergency maintenance, repair, or replacement without prior written notice, so long as activity is necessary to ensure continued operability of the cable system Requires advance written notice to DHS prior to making any modification to list of contracts for cable system maintenance and security. 10
11 Security-Agreement Changes 8 Why has Team Telecom expanded its focus? DHS has expressed concern that the industry supplying equipment for cable systems is evolving and globalizing a veiled reference to Chinese equipment manufacturers and service suppliers All agencies are concerned about terrorist attacks on, and unauthorized access to, installed infrastructure 11
12 Security-Agreement Changes 9 In spite of new requirements and DHS s lead role, it s difficult to say whether national security review process takes more or less time to complete Factors contributing to longer reviews Lack of applicant preparedness More complex ownership and landing arrangements for cable systems Team Telecom s expansion of scope to include infrastructure security DHS leadership of process, as DHS is the most cautious agency and most likely to seek additional or more stringent conditions in a security agreement 12
13 Security-Agreement Changes 10 Factors contributing to shorter reviews: Applicant preparedness Fewer agencies signing any particular agreement, meaning that DHS need not take additional time to negotiate compromises with other agencies Increased DHS responsiveness, as DHS is increasingly sensitive to suggestion that it is responsible for licensing delays Pressure from other agencies, particularly FCC 13
14 Security-Agreement Changes 11 FCC Cable Landing License Processing Times for Recent Pacific-Ocean Systems System Date FCC Application Filed Date Security Agreement Signed Date FCC License Granted Total Licensing Time Honotua Sept. 26, 2008 none none ongoing American Samoa Hawaii Aug. 13, 2008 Jan. 9, 2009 Jan. 15, days Unity May 16, 2008 none none ongoing PPC 1 Feb. 11, 2008 Sept. 4, 2008 Sept. 10, days AAG Aug. 23, 2007 June 10, 2008 July 2, days Telstra Sydney- Hawaii June 19, 2007 Apr. 16, 2008 May 6, days FLAG NGN Mar. 27, 2007 none none ongoing TPE Feb. 22, 2007 Dec. 20, 2007 Jan. 10, days GCI SEAFAST Oct. 23, 2007 not applicable Dec. 6, days ACS AKORN Oct. 23, 2007 not applicable Dec. 4, days 14
15 Security-Agreement Changes 12 Comments on Table 1 Caveat: Confidential nature of Team Telecom process makes it difficult to characterize trends in licensing and negotiation time. Generally, FCC has not been a significant source of delay, though Team Telecom reviews now takes long enough in most cases to permit the FCC to work through its issues without extending the processing time for a license application. Operators of domestic, U.S.-owned undersea cable systems (e.g., SEAFAST, AKORN) have obtained their cable landing licenses in much less time, as their systems were not subject to Team Telecom review during initial licensing. 15
16 Security-Agreement Changes 13 What can an applicant do to shorten Team Telecom s national security review? Expect Team Telecom to impose a security agreement if the system connects the United States with a point outside the United States Familiarize itself with the standard Team Telecom questionnaires, and even draft answers in parallel with drafting of FCC application Engage Team Telecom for initial project briefing at or before time of filing FCC application For consortia in particular, establish clear responsibilities for gathering information, reviewing filings, and providing signature pages As a last resort, ask FCC to use its persuasive powers and urge Team Telecom to act 16
17 2. DHS Collection of Information from Existing Undersea Cable Systems DHS has requested from existing systems information re equipment deployment and contracting for maintenance and security Requests could turn into ongoing reporting requirements, or portend security agreements for all systems (including domestic ones). 17
18 DHS Information Collection 2 In August 2008, DHS requested extensive operational information for existing undersea cable systems Requests covered much of the information currently sought for new cables during Team Telecom national security reviews Requests made of all systems Regardless of whether they are subject to security agreements Including international and domestic systems DHS claimed that compliance with the requests was voluntary but suggested that it could ask the FCC to amend cable landing licenses to require compliance 18
19 DHS Information Collection 3 DHS requested detailed information about: Security procedures and protocols Technical abilities of network operations center ( NOC ) Foreign persons with knowledge of NOC configuration Deployment of equipment manufactured outside the United States in the network management system Arrangements for employee access to cable system Principal equipment deployed, including manufacturer name and model Companies contracted for system maintenance and security Methods for installing firmware, software, and patches Foreign companies receiving restoration messages and system-status reports Cable governance 19
20 DHS Information Collection 4 What prompted DHS information collection? Same concerns prompting new securityagreement provisions: Concern that the industry supplying equipment for cable systems is evolving and globalizing Threat of terrorist attacks on, and unauthorized access to, installed infrastructure Realization that by relying on security agreements, DHS lacked key information for the majority of undersea cables landing in the United States 20
21 DHS Information Collection 5 Concerns with DHS Information Collection Possible precursor to security agreements for all undersea cable systems, regardless of ownership or landing points Possible precursor to DHS lists of approved and prohibited suppliers and contractors Failure to obtain prior approval of White House Office of Management and Budget under Paperwork Reduction Act, a process that: Guards against burdensome and duplicative regulation Ensures similarly-situated companies are treated fairly and equally Duplication of FCC-OSTP and National Security Telecommunications Advisory Committee ( NSTAC ) reporting and monitoring efforts Uncertain safeguards to preserve confidentiality of information submitted Lack of clarity regarding ongoing reporting obligations 21
22 3. New FCC-OSTP Reporting Requirements for All Undersea Cable Systems FCC and White House Office of Science and Technology Policy ( OSTP ) adopted new reporting requirements regarding operational status and restoration arrangements for all undersea cables landing in the United States, raising concerns about compliance costs and disclosure of commercially-sensitive information. 22
23 FCC-OSTP Reporting 2 In April 2008, OSTP asked FCC to request that all undersea cable operators voluntarily comply with new reporting requirements Agencies made requests of all systems landing in the United States. FCC and OSTP claimed that compliance with the requests was voluntary for existing systems, even though it expected 100-percent compliance. FCC stated that compliance was mandatory for new systems. FCC and OSTP presumed operators already possessed requested information. 23
24 FCC-OSTP Reporting 3 FCC and OSTP require contemporaneous reporting about: Indications of potential problems Potential traffic-impacting hazardous conditions or impairments Affected facilities and outage times Restoration activity Repair activity Periods of test activity 24
25 FCC-OSTP Reporting 4 FCC and OSTP also require submission of updated information about: As-laid terrestrial route paths between beach manholes and cable stations Route position lists Restoration capabilities 25
26 FCC-OSTP Reporting 5 What prompted FCC-OSTP reporting requirements? OSTP believe that reported information would increase U.S. Government s situational awareness of cable facilities, thereby permitting better protection of U.S. interests OSTP worried about then-recent cable cuts occurring: In January-February 2008 near Egypt, in the Persian Gulf, and near Malaysia In December 2006 following Hengchun earthquake off Taiwan s south coast OSTP wanted direct access to information; possible tension with DHS/NSTAC 26
27 FCC-OSTP Reporting 6 Concerns with FCC-OSTP reporting requirements Ill-defined requirements; unclear reporting thresholds Flawed assumptions about system similarities Danger that FCC and OSTP will receive too much irrelevant information and information that cannot be compared across systems Costs of (1) implementing or modifying existing monitoring systems and (2) ongoing reporting Tension between FCC and OSTP Circumvention of FCC rulemaking process, which would have ensured public scrutiny and fairness Duplication of DHS and NSTAC reporting and monitoring Possible misuse of reported information or disclosure to competitors 27
28 4. Possible Changes in U.S. National Security Regulation of Undersea Cables in 2009 Security agreements for all undersea cables landing in the United States? Approved/prohibited vendor and contractor lists? FCC opposition to lengthy Team Telecom reviews? Regulations governing Team Telecom reviews and security agreements? Less powerful DHS? 28
29 Kent Bressie HARRIS, WILTSHIRE & GRANNIS LLP th Street, N.W., Suite 1200 Washington, D.C U.S.A office mobile fax Kent Bressie 29
Kent Bressie 6 November 2012
Managing the Parade of Regulatory Horribles in the United States Kent Bressie 6 November 2012 1. The Parade of Horribles 2 FCC FCC Universal Service Contributions FCC has proposed to reform contribution
More informationNew Barriers to U.S. Market Entry by Undersea Cable Operators and International Carriers. Kent Bressie
New Barriers to U.S. Market Entry by Undersea Cable Operators and International Carriers Kent Bressie 1 Recent regulatory developments in the United States have made it increasingly burdensome to construct
More informationGovernment Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015
Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015 1 Network and cybersecurity vs. access Fundamental tension exists between:
More informationVoice. of the Industry ISSN 1948-3031. Regional Systems Edition. In This Issue:
Voice of the Industry 64 j u l y 2012 ISSN 1948-3031 Regional Systems Edition In This Issue: In Cuba, Mystery Shrouds Fate Of Internet Cable U.S. Regulatory Update: FCC Proposes Extraordinary Increases
More informationThe Department of Homeland Security The Department of Justice
The Department of Homeland Security The Department of Justice to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationTo improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG15121 Discussion Draft S.L.C. 114TH CONGRESS 1ST SESSION S. XXXX To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
More informationLegislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
More informationDIVISION N CYBERSECURITY ACT OF 2015
H. R. 2029 694 DIVISION N CYBERSECURITY ACT OF 2015 SEC. 1. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 2015. (b) TABLE OF CONTENTS. The table
More informationU.S. Department of State Foreign Affairs Manual Volume 9 - Visas 9 FAM 41.41 NOTES. (CT:VISA-1763; 10-27-2011) (Office of Origin: CA/VO/L/R)
9 FAM 41.41 NOTES (Office of Origin: CA/VO/L/R) 9 FAM 41.41 N1 CLASSIFICATION UNDER INA 101(A)(15)(D) 9 FAM 41.41 N1.1 Crewman s Services Required for Normal Operation On Board Vessel A crewman is an alien
More informationIn This Issue: Finance & Legal Edition. Voice. Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry
Voice of the Industry 69 m a r 2013 ISSN 1948-3031 Finance & Legal Edition In This Issue: Cybersecurity Developments Raise Growing Regulatory Concerns For Undersea Cable Industry Current Legal Trends And
More informationAttachment II FLOW-DOWN CLAUSES APPLICABLE TO PURCHASE ORDERS INVOLVING FUNDS FROM A FEDERAL GOVERNMENT CONTRACT OR GRANT
Attachment II FLOW-DOWN CLAUSES APPLICABLE TO PURCHASE ORDERS INVOLVING FUNDS FROM A FEDERAL GOVERNMENT CONTRACT OR GRANT If the Order involves funds from a Federal government contract or funds from a
More informationIntroduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide
Introduction to Data Security Breach Preparedness with Model Data Security Breach Preparedness Guide by Christopher Wolf Directors, Privacy and Information Management Practice Hogan Lovells US LLP christopher.wolf@hoganlovells.com
More informationTITLE III INFORMATION SECURITY
H. R. 2458 48 (1) maximize the degree to which unclassified geographic information from various sources can be made electronically compatible and accessible; and (2) promote the development of interoperable
More informationComparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills
April 4, 2012 Comparison of Information Sharing, Monitoring and Countermeasures Provisions in the Cybersecurity Bills The chart below compares on civil liberties grounds four bills that seek to promote
More informationAIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended)
for the AIRSPACE WAIVERS AND FLIGHT AUTHORIZATIONS FOR CERTAIN AVIATION OPERATIONS (INCLUDING DCA) (Amended) Contact Point Lisa S. Dean Privacy Officer Transportation Security Administration (571) 227-3947
More information9/11 Heroes Stamp Act of 2001 File System
for the 9/11 Heroes Stamp Act of 2001 File System Contact Point Elizabeth Edge US Fire Administration Federal Emergency Management Agency (202) 646-3675 Reviewing Official Nuala O Connor Kelly Chief Privacy
More informationH. R. 5005 11 SEC. 201. DIRECTORATE FOR INFORMATION ANALYSIS AND INFRA STRUCTURE PROTECTION.
H. R. 5005 11 (d) OTHER OFFICERS. To assist the Secretary in the performance of the Secretary s functions, there are the following officers, appointed by the President: (1) A Director of the Secret Service.
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Enhanced Configuration Controls and Management Policies Can Improve USCG Network Security (Redacted) Notice: The Department of Homeland Security,
More informationMINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION
MINA'BENTE SITE NA LIHESLATURAN GUAHAN 2005 (FIRST) REGULAR SESSION Introduced by: Co on Calendar By r&uest of I Maga 'la hen Guhhan in accordance with the Organic Act of Guam. AN ACT TO ESTABLISH THE
More informationNational Marine Sanctuaries Act
Please note: This text is from the fourth edition of Federal Historic Preservation Laws, published in 2006 by the National Center for Cultural Resources, National Park Service, Department of the Interior.
More informationCFIUS and Network Security Agreements 1
CFIUS and Network Security Agreements 1 Mark E. Plotkin 2 David M. Marchick 3 David N. Fagan 4 This memorandum provides an overview of the principal U.S. government national security considerations and
More informationOctober 27, 2010. The Honorable John Berry Director Office of Personnel Management 1900 E Street, NW Washington, DC 20415. Dear Director Berry:
October 27, 2010 The Honorable John Berry Director Office of Personnel Management 1900 E Street, NW Washington, DC 20415 Dear Director Berry: We are writing to express our concerns about the Health Claims
More informationTitle: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION
Title: Data Security Policy Code: 1-100-200 Date: 11-6-08rev Approved: WPL INTRODUCTION The purpose of this policy is to outline essential roles and responsibilities within the University community for
More informationLegislative Language
Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking
More informationPrivacy Impact Assessment (PIA) Waiver Review System (WRS) Version 03.06.01.01. Last Updated: December 2, 2013
United States Department of State (PIA) Waiver Review System (WRS) Version 03.06.01.01 Last Updated: December 2, 2013 Bureau of Administration 1. Contact Information Department of State Privacy Coordinator
More informationS. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG0 Discussion Draft S.L.C. TH CONGRESS D SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 COMMENTS OF VONAGE HOLDINGS CORPORATION
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. 20554 In the Matter of Ensuring Customer Premises Equipment PS Docket No. 14-174 Backup Power for Continuity of Communications Technology Transitions
More informationOffice of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
More informationCASE MATTER MANAGEMENT TRACKING SYSTEM
for the CASE MATTER MANAGEMENT TRACKING SYSTEM September 25, 2009 Contact Point Mr. Donald A. Pedersen Commandant (CG-0948) (202) 372-3818 Reviewing Official Mary Ellen Callahan Chief Privacy Officer Department
More information7.0 Information Security Protections The aggregation and analysis of large collections of data and the development
7.0 Information Security Protections The aggregation and analysis of large collections of data and the development of interconnected information systems designed to facilitate information sharing is revolutionizing
More informationCOMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER THE DEPARTMENT OF DEFENSE [DOD-2009-OS-0183/RIN 0790-AI60]
COMMENTS OF THE ELECTRONIC PRIVACY INFORMATION CENTER to THE DEPARTMENT OF DEFENSE Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities By notice published
More informationDIVISION N CYBERSECURITY ACT OF 2015
U:\0REPT\OMNI\FinalOmni\CPRT--HPRT-RU00-SAHR0-AMNT.xml DIVISION N CYBERSECURITY ACT OF 0 SEC.. SHORT TITLE; TABLE OF CONTENTS. (a) SHORT TITLE. This division may be cited as the Cybersecurity Act of 0.
More informationApril 28, 2009. Dear Mr. Chairman:
April 28, 2009 The Honorable Edward J. Markey Chairman Subcommittee on Energy and Environment Committee on Energy and Commerce U.S. House of Representatives Washington, D.C. 20515 Dear Mr. Chairman: I
More informationFederal Communications Commission Public Safety and Homeland Security Bureau
Federal Communications Commission Public Safety and Homeland Security Bureau Spectrum Policy Seminar Department of Energy Washington, DC December 08, 2010 Jennifer A. Manner, Deputy Bureau Chief Public
More informationMONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP)
MONTSERRAT COLLEGE OF ART WRITTEN INFORMATION SECURITY POLICY (WISP) 201 CMR 17.00 Standards for the Protection of Personal Information Of Residents of the Commonwealth of Massachusetts Revised April 28,
More informationSTRATEGIC SOURCING. Opportunities Exist to Better Manage Information Technology Services Spending
United States Government Accountability Office Report to Congressional Requesters September 2015 STRATEGIC SOURCING Opportunities Exist to Better Manage Information Technology Services Spending GAO-15-549
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C. 20554
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON D.C. 20554 In the Matter of: ) ) The Proposed Extension of Part 4 of the ) PS Docket No. 11-82 Commission s Ruling Regarding Outage ) Reporting to
More informationGAO. HEALTH INFORMATION TECHNOLOGY Efforts Continue but Comprehensive Privacy Approach Needed for National Strategy. Testimony
GAO For Release on Delivery Expected at 2:00 p.m. EDT Tuesday, June 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Information Policy, Census, and National
More informationAUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW. 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR
AUDIT REPORT 03-11 WEB PORTAL SECURITY REVIEW 2004 FEBRUARY R. D. MacLEAN CITY AUDITOR Web Portal Security Review Page 2 Audit Report 03-11 Web Portal Security Review INDEX SECTION I EXECUTIVE SUMMARY
More informationADDRESSES SYSTEM LOCATION
Volume 80, Number 28 Wednesday, February 11, 2015 Public Notice 9034; Pages 7671 Privacy Act; System of Records: Medical Records, State-24 SUMMARY: Notice is hereby given that the Department of State proposes
More informationInside The Proposed DFARS Business Systems Rule
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Inside The Proposed DFARS Business s Rule Law360,
More informationNASDAQ LISTING RULES 4000 Series This version of the 4000 series will not be operative until April 13, 2009.
4000 Series This version of the 4000 series will not be operative until April 13, 2009. 4000. The Nasdaq Stock Market 4100. General 4110. Use of Nasdaq on a Test Basis Notwithstanding the listing standards
More informationHow Efficient Is Your Hybrid?
How Efficient Is Your Hybrid? Legal and Regulatory Consequences of Deploying Undersea Telecommunications Cables with Additional Energy- or Scientific Research-Related Functions Kent Bressie 13 April 2011
More informationFive Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455. Notification of Security Breach Policy
Five Rivers Medical Center, Inc. 2801 Medical Center Drive Pocahontas, AR 72455 Notification of Security Breach Policy Purpose: This policy has been adopted for the purpose of complying with the Health
More informationBilling Code: 4810-25. Guidance Concerning the National Security Review Conducted by the Committee
This document has been submitted to the Office of the Federal Register (OFR) for publication and is currently pending placement on public display at the OFR and publication in the Federal Register. The
More informationUS Telecom Industry - A Case Study in Service Decisions
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of Ensuring Customer Premises Equipment Backup Power for Continuity of Communications Technology Transitions Policies and
More informationCALEA Monitoring Report for Broadband Access and VOIP Services
FEDERAL COMMUNICATIONS COMMISSION CALEA Monitoring Report for Broadband Access and VOIP Services Notice to Individuals Required by the Privacy Act of 1974 and the Paperwork Reduction Act of 1995 Public
More informationBefore the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C.
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. In the Matter of PPC 1 LIMITED File No. SCL-LIC-2008- and PPC 1 (US) INC., Application for a License to Land and Operate a Private Fiber-Optic
More informationChemical Safety and Hazard Investigation Board
Chemical Safety and Hazard Investigation Board BOARD ORDER 045 SUBJECT: Foreign Travel CONTENTS 1. Purpose... 2 2. Effective Date... 2 3. Scope... 2 4. References... 2 5. Policy... 2 6. Definitions...
More informationImpact & Consequences to Submarine Cable Systems Submarine Networks World - 10 September 2013
Maritime Jurisdictional Creep Impact & Consequences to Submarine Cable Systems Submarine Networks World - 10 September 2013 Kent Bressie Kent is a partner with the law firm of Wiltshire & Grannis LLP in
More informationHow To Create A Blue Alert
PUBLIC LAW 114 12 MAY 19, 2015 RAFAEL RAMOS AND WENJIAN LIU NATIONAL BLUE ALERT ACT OF 2015 VerDate Mar 15 2010 15:47 May 20, 2015 Jkt 049139 PO 00012 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL012.114
More informationPUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554
PUBLIC NOTICE Federal Communications Commission 445 12 th St., S.W. Washington, D.C. 20554 News Media Information 202 / 418-0500 Internet: http://www.fcc.gov TTY: 1-888-835-5322 DA 12-1264 Released: August
More informationAdvanced AMC, Inc. Appraiser Services Agreement (Independent Contractor Agreement)
Advanced AMC, Inc.. Appraiser Services Agreement (Independent Contractor Agreement) This Appraiser Services Agreement ( Agreement ) shall be effective as of the Effective Date by and between Advanced AMC,
More informationSEC. 1553. PROTECTING STATE AND LOCAL GOVERNMENT AND CONTRACTOR WHISTLEBLOWERS. (a) PROHIBITION OF REPRISALS. An employee of any non-federal employer
SEC. 1553. PROTECTING STATE AND LOCAL GOVERNMENT AND CONTRACTOR WHISTLEBLOWERS. (a) PROHIBITION OF REPRISALS. An employee of any non-federal employer receiving covered funds may not be discharged,demoted,
More informationPATIENT SAFETY AND QUALITY IMPROVEMENT ACT OF 2005
PUBLIC LAW 109 41 JULY 29, 2005 PATIENT SAFETY AND QUALITY IMPROVEMENT ACT OF 2005 VerDate 14-DEC-2004 11:17 Aug 05, 2005 Jkt 039139 PO 00041 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL041.109 APPS10 PsN:
More informationDATA SECURITY AGREEMENT. Addendum # to Contract #
DATA SECURITY AGREEMENT Addendum # to Contract # This Data Security Agreement (Agreement) is incorporated in and attached to that certain Agreement titled/numbered and dated (Contract) by and between the
More informationACTION: Notice of proposed rulemaking and notice of public hearing. SUMMARY: This document contains proposed regulations relating to Additional
This document is scheduled to be published in the Federal Register on 12/05/2012 and available online at http://federalregister.gov/a/2012-29237, and on FDsys.gov DEPARTMENT OF THE TREASURY Internal Revenue
More informationGAO HOMELAND DEFENSE. U.S. Northern Command Has a Strong Exercise Program, but Involvement of Interagency Partners and States Can Be Improved
GAO United States Government Accountability Office Report to Congressional Requesters September 2009 HOMELAND DEFENSE U.S. Northern Command Has a Strong Exercise Program, but Involvement of Interagency
More informationU.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
More informationCRS Report for Congress
Order Code RS21283 Updated August 6, 2003 CRS Report for Congress Received through the CRS Web Homeland Security: Intelligence Support Richard A. Best, Jr. Specialist in National Defense Foreign Affairs,
More informationReview of the Office of Justice Programs Forensic Science Improvement Grant Program. December 2005
U.S. Department of Justice Review of the Office of Justice Programs Forensic Science Improvement Grant Program December 2005 I-2006-002 EXECUTIVE SUMMARY The Department of Justice Paul Coverdell Forensic
More informationDirectory Services and Email System (DSES)
for the Directory Services and Email System (DSES) Contact Point James Kief Functional Area Manager Department of Homeland Security/US Coast Guard (304) 264-2573 Reviewing Official Hugo Teufel III Chief
More informationPART I ARTICLE. apply to all insurers domiciled in this State unless exempt. (b) The purposes of this article shall be to:
THE SENATE TWENTY-EIGHTH LEGISLATURE, 0 STATE OF HAWAII A BILL FOR AN ACT RELATING TO INSURANCE BE IT ENACTED BY THE LEGISLATURE OF THE STATE OF HAWAII: PART I SECTION. Chapter, Hawaii Revised Statutes,
More informationPrivacy and Civil Liberties Interim Guidelines: Cybersecurity Information Sharing Act of 2015
The Department of Homeland Security The Department of Justice Privacy and Civil Liberties : Cybersecurity Information Sharing Act of 2015 February 16, 2016 Table of Contents 1 Purpose... 3 2 Applicability...
More informationDepartment of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 ) ) ) ) COMMENTS OF THE UNITED STATES TELECOM ASSOCIATION
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of Protecting and Promoting the Open Internet ) ) ) ) GN Docket No. 14-28 COMMENTS OF THE UNITED STATES TELECOM ASSOCIATION
More informationJustice Management Division
Justice Management Division Privacy Impact Assessment for the Justice Unified Telecommunications Network (JUTNet) Voice Services System Issued by: Arthur E. Gary, General Counsel and Senior Component Official
More informationThese practices, characteristics, terms and conditions are effective as of November 20, 2011.
Norvado Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Fixed Services Norvado ( the Company ) has adopted the following
More information28 September 2012 BY ELECTRONIC FILING
1200 18TH STREET, N.W., STE. 1200 WASHINGTON, D.C. 20036-2516 U.S.A. TEL +1 202 730 1300 FAX +1 202 730 1301 WWW.WILTSHIREGRANNIS.COM ATTORNEYS AT LAW BY ELECTRONIC FILING Ms. Jennifer Golladay Bureau
More informationBefore the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C.
Before the FEDERAL COMMUNICATIONS COMMISSION Washington, D.C. In the Matter of UNITED UTILITIES, INC., and GCI COMMUNICATION CORP., File No. SCL-LIC-2010- Application for a License to Land and Operate
More informationTransitional Guidance for Taxpayers Claiming Relief Under the Military Spouses Residency Relief Act for Taxable Year 2009
Part III - Administrative, Procedural, and Miscellaneous Transitional Guidance for Taxpayers Claiming Relief Under the Military Spouses Residency Relief Act for Taxable Year 2009 Notice 2010-30 I. PURPOSE
More informationState of Vermont. Intrusion Detection and Prevention Policy. Date: 11-02-10 Approved by: Tom Pelham Policy Number:
State of Vermont Intrusion Detection and Prevention Policy Date: 11-02-10 Approved by: Tom Pelham Policy Number: 1 Table of Contents 1.0 Introduction... 3 1.1 Authority... 3 1.2 Purpose... 3 1.3 Scope...
More informationS. ll. To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes.
BAG Discussion Draft S.L.C. TH CONGRESS ST SESSION S. ll To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes. IN THE
More informationThis notice advises taxpayers that the Treasury Department and the Internal
Information Reporting on Minimum Essential Coverage Notice 2015-68 PURPOSE This notice advises taxpayers that the Treasury Department and the Internal Revenue Service intend to propose regulations under
More informationMyths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
More informationAnti-Bribery Provision. 30A of the Securities Exchange Act of 1934. [15 U.S.C. 78dd-1]
Anti-Bribery Provision 30A of the Securities Exchange Act of 1934 [15 U.S.C. 78dd-1] 30A - Prohibited Foreign Trade Practices by Issuers (a) Prohibition It shall be unlawful for any issuer which has a
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 ) ) ) ) ) REPLY COMMENTS OF SOUTHERNLINC WIRELESS
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Protecting and Promoting the Open Internet GN Docket No. 14-28 To: Chief, Consumer and Governmental Affairs Bureau REPLY
More informationAGREEMENT RECITALS. WHEREAS, protection of Classified and Sensitive Information is also critical to U.S. national security;
TO FURTHER REVISION AGREEMENT THIS AGREEMENT (the Agreement ) is made as of the date of the last signature affixed hereto, by and between Level 3 Communications, Inc. ( Level 3 Parent ), including its
More informationTEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
More informationPrivacy Impact Assessment for the. January 19, 2007
for the National Emergency Management Information System Mitigation (MT) Electronic Grants Management System (NEMIS-MT egrants) January 19, 2007 Contact Point Shabbar Saifee Federal Emergency Management
More informationSecurity Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
More informationNetwork Working Group. S. Crocker Trusted Information Systems, Inc. B. Fraser. Software Engineering Institute. November 1991
Network Working Group Request for Comments: 1281 R. Pethia Software Engineering Institute S. Crocker Trusted Information Systems, Inc. B. Fraser Software Engineering Institute November 1991 Status of this
More information0;;876 / (- VI3D B-276884. May 27, 1997. The Honorable Daniel Patrick Moynihan Ranking Minority Member Committee on Finance United States Senate
United States O JGA General Accounting Office Washington, D.C. 20548 Health, Education and Human Services Division 158730 B-276884 May 27, 1997 The Honorable Daniel Patrick Moynihan Ranking Minority Member
More informationFederal Acquisition Regulation Subcontract Flowdown Provisions
Federal Acquisition Regulation Subcontract Flowdown Provisions Clause Title Title Applicability 52.203-6, Alt 1 Restrictions on Subcontractor Sales to the (if subcontract over $150,000) Government (SEP
More informationBefore the Federal Communications Commission Washington, D.C. 20554 COMMENTS OF THE UNITED STATES TELECOM ASSOCIATION
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of ) ) Lifeline Biennial Audit Plan ) WC Docket No. 11-42 COMMENTS OF THE UNITED STATES TELECOM ASSOCIATION The United
More informationBefore the Federal Communications Commission Washington, DC 20554
Before the Federal Communications Commission Washington, DC 20554 In the Matter of Technologies Transitions Policy Task Force GN Docket No. 13-5 COMMENTS OF THE AMERICAN CABLE ASSOCIATION ON PUBLIC NOTICE
More informationHUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE
PERFORMANCE AUDIT OF HUMAN RESOURCES MANAGEMENT NETWORK (HRMN) SELF-SERVICE DEPARTMENT OF CIVIL SERVICE July 2004 ...The auditor general shall conduct post audits of financial transactions and accounts
More informationAPPENDIX H SECURITY ADDENDUM
APPENDIX H SECURITY ADDENDUM The following pages contain the legal authority, purpose, and genesis of the Criminal Justice Information Services Security Addendum (H2-H4); the Security Addendum itself (H5-H6);
More informationDelving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Delving Into FCC's 'Damn Important' Cybersecurity
More informationFederal Bureau of Prisons. Privacy Impact Assessment for the HR Automation System. Issued by: Sonya D. Thompson Deputy Assistant Director/CIO
Federal Bureau of Prisons Privacy Impact Assessment for the HR Automation System Issued by: Sonya D. Thompson Deputy Assistant Director/CIO Reviewed by: Approved by: Eric Olson, Acting Chief Information
More informationGovDelivery Email Subscription Management System
Privacy Impact Assessment for the GovDelivery Email Subscription Management System March 7, 2008 Contact Point Tina Kelley Internet Services Office E-Gov Services Staff 202-616-0992 Reviewing Official
More informationHIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
More informationWhat The OMB Cybersecurity Proposal Does And Doesn't Do
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com What The OMB Cybersecurity Proposal Does And Doesn't
More informationmicros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
More informationTHE FREEDOM OF INFORMATION ACT A User s Guide
THE FREEDOM OF INFORMATION ACT A User s Guide By The Freedom of Information Clearinghouse A Project of Ralph Nader (Revised 11/05) The Freedom of Information Act ( FOIA ) was enacted by Congress in 1966
More informationJOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015
JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015 The following consists of the joint explanatory statement to accompany the Cybersecurity Act of 2015. This joint explanatory statement
More informationSAMPLE BUSINESS ASSOCIATE AGREEMENT
SAMPLE BUSINESS ASSOCIATE AGREEMENT THIS AGREEMENT IS TO BE USED ONLY AS A SAMPLE IN DEVELOPING YOUR OWN BUSINESS ASSOCIATE AGREEMENT. ANYONE USING THIS DOCUMENT AS GUIDANCE SHOULD DO SO ONLY IN CONSULT
More information