Skip to content

Discerning Data

  • About Us
  • Additional Resources
  • Contact Us

DISCERNING DATA

A Faegre Drinker Blog Covering the Latest in Privacy, Cybersecurity and Data Strategy

  • Privacy
  • Cybersecurity
  • Data Strategy
  • Disruptionware

Congress Passes New Cyber Incident and Ransomware Payment Reporting Legislation

Share

The United States Congress recently passed legislation that includes new cybersecurity provisions requiring critical infrastructure providers to report cyber security incidents, including the payment of ransom, to the federal government. The bill, also known as the “Strengthening American Cybersecurity Act of 2022,” passed the Senate by unanimous vote on March 1. It then passed the House of Representatives and was signed into law by President Biden on March 15, 2022.

The new law builds on previous legislative efforts to tighten the nation’s cybersecurity-reporting requirements, and it appears that legislative persistence has finally carried the day. Passed under the fiscal 2022 omnibus spending bill, the new legislation, when it becomes law, will mandate the following:

  • Require federal civilian agencies to report all “substantial” cyber incidents to the Cybersecurity and Infrastructure Security Agency (CISA) within 72 hours
  • Require ransomware payments that are covered within the law to be reported to CISA within 24 hours of payment
  • Require information sharing and better coordination between federal agencies tasked to assist in combatting these attacks
  • Require the authorization of the Federal Risk and Authorization Management Program (“FedRAMP”) for five years so that all federal agencies can adopt cloud-based technologies

“Critical” infrastructure sectors have been previously identified by CISA as:

  • Chemical Sector
  • Commercial Facilities Sector
  • Communications Sector
  • Critical Manufacturing Sector
  • Dam Sector
  • Defense Industrial Base Sector
  • Energy Sector
  • Financial Services Sector
  • Food and Agriculture Sector
  • Government Facilities Sector
  • Healthcare and Public Health Sector
  • Information Technology Sector
  • Nuclear Reactors, Materials and Waste Sector
  • Transportation Sector and
  • Water and Wastewater Systems Sector

CISA will now become the main “hub” for federal reporting of both cyber-attacks on critical infrastructure providers and the payment of any ransomware payments associated with cyber-attacks on these providers. The law also authorizes the Director of the Office and Management and Budget to consult with various federal agencies, including the Department of Justice, to use regulations to implement the new legislation. Finally, CISA will now have subpoena power to use against entities that fail to properly report substantial cybersecurity incidents or ransomware payments. CISA is also mandated to launch a program warning critical infrastructure providers of new and emerging vulnerabilities and to establish a joint “ransomware task force” to better coordinate federal efforts at limiting these types of attacks.

According to CISA Director Jenn Easterly, the legislation is a “game-changer” and will allow CISA to “use these reports from our private sector partners to build a common understanding of how our adversaries are targeting U.S. networks and critical infrastructure.” The new law also includes large budget increases for CISA, the DoD, the Justice Department, the Departments of State and Treasury, and other assorted federal agencies as a means to continue improving federal IT infrastructure and cybersecurity controls.

There is implementation work for CISA as a result of the legislation; the law’s provisions will not come into full force until CISA delineates the necessary rules and regulations to define which entities fall within the critical infrastructure sectors that will be affected by this legislation. Additionally, CISA must clearly denote what types of “substantial” cyber incidents are covered by the law’s reporting requirements. CISA has 24 months from the March 15 bill passage date to issue its proposed rules. Final rules must be issued by CISA within 18 months after the issuance of those proposed rules.

The material contained in this communication is informational, general in nature and does not constitute legal advice. The material contained in this communication should not be relied upon or used without consulting a lawyer to consider your specific circumstances. This communication was published on the date specified and may not include any changes in the topics, laws, rules or regulations covered. Receipt of this communication does not establish an attorney-client relationship. In some jurisdictions, this communication may be considered attorney advertising.

About the Author: Jason G. Weiss

Jason G. Weiss leverages a past career as a cybersecurity and computer forensics Supervisory Special Agent with more than 22 years of decorated service at the FBI to guide clients through the complex and high-stakes issues associated with cybersecurity incident preparedness and response and compliance. View Jason's full bio on the Faegre Drinker website.

About the Author: Peter Baldwin

Peter Baldwin draws on his experience as a former federal prosecutor to counsel clients facing government investigations and cybersecurity issues. View Peter's full bio on the Faegre Drinker website.

About the Author: Grayson Harbour

Grayson Harbour is an associate in the firm's Labor & Employment practice group. Read Grayson's full bio on the Faegre Drinker website.

About the Author: Jane Blaney

Jane Blaney assists clients seeking solutions related to insurance matters, with concentrated knowledge in health insurance, health insurance regulation and technology services. View Jane's full bio on the Faegre Drinker website.

Receive Email Alerts to New Articles

SUBSCRIBE

March 22, 2022
Written by: Jason G. Weiss, Peter Baldwin, Grayson Harbour and Jane Blaney
Category: Cybersecurity
Tags: CISA, cyberattack, cybersecurity, federal legislation

Post navigation

Previous Previous post: Faegre Drinker on Law and Technology Podcast: The CCPA, CPRA and the Future of Privacy Laws
Next Next post: A Cyber Hygiene Strategy: Cyber Insurance Endorsements

Search the Blog

Sign Up for Email Alerts

PODCASTS

Faegre Drinker on Law and Technology

©2023 Faegre Drinker Biddle & Reath LLP. All Rights Reserved. Lawyer Advertising.

  • About Us
  • Additional Resources
  • Contact Us
We use cookies to improve your experience with our website. By browsing our site, you are agreeing to the use of cookies. For more information about how we use cookies, please review our privacy policy and cookie policy. OK
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT