HOME

TheInfoList



OR:

A cybersecurity regulation comprises directives that safeguard
information technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
and
computer systems A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
with the purpose of forcing companies and organizations to protect their systems and information from
cyberattack A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content. The rising dependence on increasingly complex and inte ...
s like
viruses A virus is a submicroscopic infectious agent that replicates only inside the living cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are found in almo ...
,
worms The World Register of Marine Species (WoRMS) is a taxonomic database that aims to provide an authoritative and comprehensive catalogue and list of names of marine organisms. Content The content of the registry is edited and maintained by scien ...
, Trojan horses,
phishing Phishing is a form of social engineering and a scam where attackers deceive people into revealing sensitive information or installing malware such as viruses, worms, adware, or ransomware. Phishing attacks have become increasingly sophisticate ...
, denial of service (DOS) attacks, unauthorized access (stealing intellectual property or confidential information) and control system attacks. While cybersecurity regulations aim to minimize cyber risks and enhance protection, the uncertainty arising from frequent changes or new regulations can significantly impact organizational response strategies. There are numerous measures available to prevent cyberattacks.
Cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
measures include firewalls, anti-virus software,
intrusion detection An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
and prevention systems,
encryption In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
, and login
password A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services t ...
s. There have been attempts to improve cybersecurity through regulation and collaborative efforts between the
government A government is the system or group of people governing an organized community, generally a State (polity), state. In the case of its broad associative definition, government normally consists of legislature, executive (government), execu ...
and the private sector to encourage voluntary improvements to cybersecurity. Industry regulators, including banking regulators, have taken notice of the risk from cybersecurity and have either begun or planned to begin to include cybersecurity as an aspect of regulatory examinations. Recent research suggests there is also a lack of cyber-security regulation and enforcement in maritime businesses, including the digital connectivity between ships and ports.


Background

In 2011 the US DoD released a guidance called the '' Department of Defense Strategy for Operating in Cyberspace'' which articulated five goals: to treat cyberspace as an operational domain, to employ new defensive concepts to protect DoD networks and systems, to partner with other agencies and the private sector in pursuit of a "whole-of-government cybersecurity Strategy", to work with international allies in support of collective cybersecurity and to support the development of a cyber workforce capable of rapid technological innovation. A March 2011
GAO Gao (or Gawgaw/Kawkaw) is a city in Mali and the capital of the Gao Region. The city is located on the River Niger, east-southeast of Timbuktu on the left bank at the junction with the Tilemsi valley. For much of its history Gao was an imp ...
report "identified protecting the federal government's information systems and the nation's cyber critical infrastructure as a governmentwide high-risk area" noting that federal
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
had been designated a high-risk area since 1997. As of 2003 systems protecting critical infrastructure, called cyber critical infrastructure protection of cyber CIP has also been included. In November 2013, the DoD put forward the new cybersecurity rule (78 Fed. Reg. 69373), which imposed certain requirements on contractors: compliance with certain
NIST The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
IT standards, mandatory reporting of cybersecurity incidents to the DoD, and a "flow-down" clause that applies the same requirements to subcontractors. A June 2013 Congressional report found there were over 50 statutes relevant to cybersecurity compliance. The Federal Information Security Management Act of 2002 (FISMA) is one of the key statutes governing federal cybersecurity regulations.


United States


Federal government

There are few federal cybersecurity regulations and the ones that exist focus on specific industries. The three main cybersecurity regulations are the 1996
Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 (HIPAA or the Ted Kennedy, Kennedy–Nancy Kassebaum, Kassebaum Act) is a United States Act of Congress enacted by the 104th United States Congress and signed into law by President ...
(HIPAA), the 1999 Gramm-Leach-Bliley Act, and the 2002
Homeland Security Act The Homeland Security Act (HSA) of 2002 () was introduced in the aftermath of the September 11 attacks and subsequent mailings of anthrax spores. The HSA was cosponsored by 118 members of Congress. The act passed the U.S. Senate by a vote of 9 ...
, which included the Federal Information Security Management Act (FISMA). The three regulations mandate that healthcare organizations, financial institutions, and federal agencies should protect their systems and information. For example, FISMA, which applies to every government agency, "requires the development and implementation of mandatory policies, principles, standards, and guidelines on information security." However, the regulations do not address numerous computer-related industries, such as
Internet Service Provider An Internet service provider (ISP) is an organization that provides a myriad of services related to accessing, using, managing, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, no ...
s (ISPs) and software companies. Furthermore, the regulations do not specify what cybersecurity measures must be implemented and require only a "reasonable" level of security. The vague language of these regulations leaves much room for interpretation.
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
, the founder of Cupertino's Counterpane Internet Security, argues that companies will not make sufficient investments in cybersecurity unless the government forces them to do so. He also states that successful cyberattacks on government systems still occur despite government efforts. It has been suggested that the Data Quality Act already provides the
Office of Management and Budget The Office of Management and Budget (OMB) is the largest office within the Executive Office of the President of the United States (EOP). The office's most prominent function is to produce the president's budget, while it also examines agency pro ...
the statutory authority to implement critical infrastructure protection regulations by the Administrative Procedure Act rulemaking process. The idea has not been fully vetted and would require additional legal analysis before a
rulemaking In administrative law, rulemaking is the process that executive and independent agencies use to create, or ''promulgate'', regulations. In general, legislatures first set broad policy mandates by passing statutes, then agencies create more de ...
could begin.


State governments

State governments have attempted to improve cybersecurity by increasing public visibility of firms with weak security. In 2003,
California California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
passed the Notice of Security Breach Act, which requires that any company that maintains personal information of California citizens and has a security breach must disclose the details of the event. Personal information includes name,
social security number In the United States, a Social Security number (SSN) is a nine-digit number issued to United States nationality law, U.S. citizens, Permanent residence (United States), permanent residents, and temporary (working) residents under section 205(c)(2 ...
, driver's license number, credit card number or financial information. Several other states have followed California's example and passed similar security breach notification regulations. Such security breach notification regulations punish firms for their cybersecurity failures while giving them the freedom to choose how to secure their systems. Also, the regulation creates an incentive for companies to voluntarily invest in cybersecurity to avoid the potential loss of reputation and the resulting economic loss that can come from a successful cyber attack. In 2004, the
California State Legislature The California State Legislature is the bicameral state legislature of the U.S. state of California, consisting of the California State Assembly (lower house with 80 members) and the California State Senate (upper house with 40 members). ...
passed California Assembly Bill 1950, which also applies to businesses that own or maintain personal information for California residents. The regulation dictates for businesses to maintain a reasonable level of security and that they required security practices also extend to business partners. The regulation is an improvement on the federal standard because it expands the number of firms required to maintain an acceptable standard of cybersecurity. However, like the federal legislation, it requires a "reasonable" level of cybersecurity, which leaves much room for interpretation until case law is established.


Proposed regulation

The
US Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
has proposed numerous bills that expand upon cybersecurity regulation. The Consumer Data Security and Notification Act amends the Gramm-Leach-Bliley Act to require disclosure of security breaches by financial institutions. Congressmen have also proposed "expanding Gramm-Leach-Bliley to all industries that touch consumer financial information, including any firm that accepts payment by a credit card." Congress has proposed cybersecurity regulations similar to California's Notice of Security Breach Act for companies that maintain personal information. The Information Protection and Security Act requires that data brokers "ensure data accuracy and confidentiality, authenticate and track users, detect and prevent unauthorized activity, and mitigate potential harm to individuals." In addition to requiring companies to improve cybersecurity, Congress is also considering bills that criminalize cyberattacks. The Securely Protect Yourself Against Cyber Trespass Act ( SPY ACT) was a bill of this type. It focused on phishing and
spyware Spyware (a portmanteau for spying software) is any malware that aims to gather information about a person or organization and send it to another entity in a way that harms the user by violating their privacy, endangering their device's securit ...
bill and was passed on May 23, 2005, in the
US House of Representatives The United States House of Representatives is a chamber of the bicameral United States Congress; it is the lower house, with the U.S. Senate being the upper house. Together, the House and Senate have the authority under Article One of th ...
but died in the
US Senate The United States Senate is a chamber of the bicameral United States Congress; it is the upper house, with the U.S. House of Representatives being the lower house. Together, the Senate and House have the authority under Article One of the ...
. The bill "makes unlawful the unauthorized usage of a computer to take control of it, modify its setting, collect or induce the owner to disclose
personally identifiable information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely used in the United States, but the phrase it abbreviates has fou ...
, install unsolicited software, and tamper with security, anti-spyware, or anti-virus software." On May 12, 2011, US president
Barack Obama Barack Hussein Obama II (born August 4, 1961) is an American politician who was the 44th president of the United States from 2009 to 2017. A member of the Democratic Party, he was the first African American president in American history. O ...
proposed a package o
cybersecurity legislative reforms
to improve the security of US persons, the federal government, and critical infrastructure. A year of public debate and Congress hearings followed, resulting in the House of Representative passing a
information sharing bill
and the Senate developing
compromise bill
seeking to balance national security, privacy, and business interests. In July 2012, the Cybersecurity Act of 2012 was proposed by Senators Joseph Lieberman and
Susan Collins Susan Margaret Collins (born December 7, 1952) is an American politician serving as the senior United States senator from Maine. A member of the Republican Party, she has held her seat since 1997 and is Maine's longest-serving member of ...
. The bill would have required creating voluntary "best practice standards" for protection of key infrastructure from cyber attacks, which businesses would be encouraged to adopt through incentives such as liability protection. The bill was put to a vote in the Senate but failed to pass. Obama had voiced his support for the Act in a ''Wall Street Journal'' op-ed, and it also received support from officials in the military and national security including John O. Brennan, the chief counterterrorism adviser to the White House. According to ''The Washington Post'', experts said that the failure to pass the act may leave the United States "vulnerable to widespread hacking or a serious cyberattack." The act was opposed by Republican senators like
John McCain John Sidney McCain III (August 29, 1936 – August 25, 2018) was an American statesman and United States Navy, naval officer who represented the Arizona, state of Arizona in United States Congress, Congress for over 35 years, first as ...
who was concerned that the act would introduce regulations that would not be effective and could be a "burden" for businesses. After the Senate vote, Republican Senator
Kay Bailey Hutchison Kay Bailey Hutchison (born Kathryn Ann Bailey; July 22, 1943) is an American attorney, television correspondent, politician, diplomat, and was the 22nd United States Permanent Representative to NATO from 2017 until 2021. A member of the Republic ...
stated that the opposition to the bill was not a partisan issue but it not take the right approach to cybersecurity.The senate vote was not strictly along partisan lines, as six Democrats voted against it, and five Republicans voted for it. Critics of the bill included the US Chamber of Commerce, advocacy groups like the
American Civil Liberties Union The American Civil Liberties Union (ACLU) is an American nonprofit civil rights organization founded in 1920. ACLU affiliates are active in all 50 states, Washington, D.C., and Puerto Rico. The budget of the ACLU in 2024 was $383 million. T ...
and the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties. It provides funds for legal defense in court, ...
, cybersecurity expert Jody Westby, and
The Heritage Foundation The Heritage Foundation (or simply Heritage) is an American Conservatism in the United States, conservative think tank based in Washington, D.C. Founded in 1973, it took a leading role in the conservative movement in the 1980s during the Presi ...
, both of whom argued that although the government must act on cybersecurity, the bill was flawed in its approach and represented "too intrusive a federal role." In February 2013, Obama proposed the Executive Order Improving Critical Infrastructure Cybersecurity. It represents the latest iteration of policy but is not considered to be law as it has not been addressed by Congress yet. It seeks to improve existing public-private partnerships by enhancing timeliness of information flow between DHS and critical infrastructure companies. It directs federal agencies to share cyber threat intelligence warnings to any private sector entity identified as a target. It also tasks DHS with improving the process to expedite security clearance processes for applicable public and private sector entities to enable the federal government to share this information at the appropriate sensitive and classified levels. It directs the development of a framework to reduce cyber risks, incorporating current industry best practices and voluntary standards. Lastly, it tasks the federal agencies involved with incorporating privacy and civil liberties protections in line with Fair Information Practice Principles. In January 2015, Obama announced a new cybersecurity legislative proposal. The proposal was made in an effort to prepare the US from the expanding number of cyber crimes. In the proposal, Obama outlined three main efforts to work towards a more secure cyberspace for the US. The first main effort emphasized the importance of enabling cybersecurity information sharing. By enabling that, the proposal encouraged information sharing between the government and the private sector. That would allow the government to know what main cyber threats private firms are facing and would then allow the government to provide liability protection to those firms that shared their information. Furthermore, that would give the government a better idea of what the US needs to be protected against. Another main effort that was emphasized in this proposal was to modernize the law enforcement authorities to make them more equipped to properly deal with cyber crimes by giving them the tools they need in order to do so. It would also update classifications of cyber crimes and consequences. One way this would be done would be by making it a crime for overseas selling of financial information. Another goal of the effort is to place cyber crimes prosecutable. The last major effort of the legislative proposal was to require businesses to report data breaching to consumers if their personal information had been sacrificed. By requiring companies to do so, consumers are aware of when they are in danger of identity theft. In February 2016, Obama developed a Cybersecurity National Security Action Plan (CNAP). The plan was made to create long-term actions and strategies in an effort to protect the US against cyber threats. The focus of the plan was to inform the public about the growing threat of cyber crimes, improve cybersecurity protections, protects personal information of Americans, and to inform Americans on how to control digital security. One of the highlights of this plan include creating a "Commission on Enhancing National Cybersecurity." The goal of this is to create a Commission that consists of a diverse group of thinkers with perspectives that can contribute to make recommendations on how to create a stronger cybersecurity for the public and private sector. The second highlight of the plan is to change Government IT. The new Government IT will make it so that a more secure IT can be put in place. The third highlight of the plan is to give Americans knowledge on how they can secure their online accounts and avoid theft of their personal information through multi-factor authentication. The fourth highlight of the plan is to invest 35% more money that was invested in 2016 into cybersecurity.


Other government efforts

In addition to regulation, the federal government has tried to improve cybersecurity by allocating more resources to research and collaborating with the private sector to write standards. In 2003, the President's
National Strategy to Secure Cyberspace In the United States government, the National Strategy to Secure Cyberspace, is a component of the larger National Strategy for Homeland Security. The National Strategy to Secure Cyberspace was drafted by the Department of Homeland Security Th ...
made the
Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department responsible for public security, roughly comparable to the interior, home, or public security ministries in other countries. Its missions invol ...
(DHS) responsible for security recommendations and researching national solutions. The plan calls for cooperative efforts between government and industry "to create an emergency response system to cyber-attacks and to reduce the nation's vulnerability to such threats " In 2004, the US Congress allocated $4.7 billion toward cybersecurity and achieving many of the goals stated in the President's National Strategy to Secure Cyberspace. Some industry security experts state that the President's National Strategy to Secure Cyberspace is a good first step but is insufficient. Bruce Schneier stated, "The National Strategy to Secure Cyberspace hasn't secured anything yet." However, the President's National Strategy clearly states that the purpose is to provide a framework for the owners of computer systems to improve their security rather than the government taking over and solving the problem. However, companies that participate in the collaborative efforts outlined in the strategy are not required to adopt the discovered security solutions. In the United States, the
US Congress The United States Congress is the legislature, legislative branch of the federal government of the United States. It is a Bicameralism, bicameral legislature, including a Lower house, lower body, the United States House of Representatives, ...
is trying to make information more transparent after the Cyber Security Act of 2012, which would have created voluntary standards for protecting vital infrastructure, failed to pass through the Senate. In February 2013, the
White House The White House is the official residence and workplace of the president of the United States. Located at 1600 Pennsylvania Avenue Northwest (Washington, D.C.), NW in Washington, D.C., it has served as the residence of every U.S. president ...
issued an executive order, titled "Improving Critical Infrastructure Cybersecurity," which allows the
executive branch The executive branch is the part of government which executes or enforces the law. Function The scope of executive power varies greatly depending on the political context in which it emerges, and it can change over time in a given country. In ...
to share information about threats with more companies and individuals. In April 2013, the House of Representatives passed the
Cyber Intelligence Sharing and Protection Act The Cyber Intelligence Sharing and Protection Act (CISPA (112th Congress), (113th Congress), (114th Congress)) was a proposed law in the United States which would allow for the sharing of Internet traffic information between the U.S. gove ...
(CISPA), which calls for protecting against lawsuits aimed at companies that disclose breach information. The
Obama administration Barack Obama's tenure as the 44th president of the United States began with his first inauguration on January 20, 2009, and ended on January 20, 2017. Obama, a Democrat from Illinois, took office following his victory over Republican nomine ...
said that it might veto the bill.


India

In the light of the hacking of the website of the Indian Space Agency's commercial arm in 2015, Antrix Corporation and government's Digital India programme, a cyberlaw expert and advocate at the
Supreme Court of India The Supreme Court of India is the supreme judiciary of India, judicial authority and the supreme court, highest court of the Republic of India. It is the final Appellate court, court of appeal for all civil and criminal cases in India. It also ...
, Pavan Duggal, stated that "a dedicated cyber security legislation as a key requirement for India. It is not sufficient to merely put cyber security as a part of the IT Act. We have to see cyber security not only from the sectoral perspective, but also from the national perspective."


European Union

Cybersecurity standards have been of great prominence in today's technology driven businesses. To maximize their profits, corporations leverage technology by running most of their operations by the internet. Since there are a large number of risks that entail internetwork operations, such operations must be protected by comprehensive and extensive regulations. Existing cybersecurity regulations all cover different aspects of business operations and often vary by region or country in which a business operates. Because of the differences in a country's society, infrastructure, and values, one overarching cyber security standard is not optimal for decreasing risks. While US standards provide a basis for operations, the
European Union The European Union (EU) is a supranational union, supranational political union, political and economic union of Member state of the European Union, member states that are Geography of the European Union, located primarily in Europe. The u ...
has created a more tailored regulation for businesses operating specifically within the EU. Also, in light of
Brexit Brexit (, a portmanteau of "Britain" and "Exit") was the Withdrawal from the European Union, withdrawal of the United Kingdom (UK) from the European Union (EU). Brexit officially took place at 23:00 GMT on 31 January 2020 (00:00 1 February ...
, it is important to consider how the UK has chosen to adhere to such security regulations. Three major regulations within the EU include the ENISA, the NIS Directive and the EU GDPR. They are part of the Digital Single Market strategy. Regarding standards, the Cybersecurity Act / ENISA Regulation does not refer directly to standards. Nevertheless, ENISA recognises on its website that "EU’s cybersecurity strategy underscores support for greater standardisation via the European standardisation organisations (CEN, CENELEC and ETSI) as well as ISO." ISO/IEC Standards, as well as European Standards from CEN, CENELEC and ETSI can be used on a voluntary way to support the requirements in the EU legislation. An updated list of ISO/IEC and CEN/CENELEC standards on the topic of Cybersecurity can be followed up via the free and publicly available information website Genorma.com.


ENISA

The
European Union Agency for Cybersecurity The European Union Agency for Cybersecurity – self-designation ENISA from the abbreviation of its original name – is an agency of the European Union. It is fully operational since September 1, 2005. The Agency is located in Athens, Greece a ...
(ENISA) is a governing agency that was originally set up by the Regulation (EC) No 460/2004 of the European Parliament and of the Council of 10 March 2004 for the Purpose of Raising Network and Information Security (NIS) for all internetwork operations in the EU. ENISA currently runs under Regulation (EU) No 526/2013, which has replaced the original regulation in 2013. ENISA works actively with all member states of the EU to provide a range of services. The focus of their operations are on three factors: * Recommendations to member states on the course of action for security breaches * Policy making and implementation support for all members states of the EU * Direct support with ENISA taking a hands-on approach to working with operational teams in the EU ENISA is made up of a management board that relies on the support of the executive director and the Permanent Stakeholders Group. Most operations, however, are run by the heads of various departments. ENISA has released various publications that cover all major issues on cybersecurity. ENISA's past and current initiatives include the EU Cloud Strategy, Open Standards in Information Communications Technology, a Cyber Security Strategy of the EU and a Cyber Security Coordination Group. ENISA also works in collaboration with existing international standard organizations like the
ISO The International Organization for Standardization (ISO ; ; ) is an independent, non-governmental, international standard development organization composed of representatives from the national standards organizations of member countries. Me ...
and the ITU.


NIS Directive

On July 6, 2016, the European Parliament set into policy the Directive on Security of Network and Information Systems (the NIS Directive). The directive went into effect in August 2016, and all member states of the European Union were given 21 months to incorporate the directive's regulations into their own national laws. The aim of the NIS Directive is to create an overall higher level of cybersecurity in the EU. The directive significantly affects digital service providers (DSPs) and operators of essential services (OESs). Operators of essential services include any organizations whose operations would be greatly affected in the case of a security breach if they engage in critical societal or economic activities. Both DSPs and OES are now held accountable for reporting major security incidents to Computer Security Incident Response Teams (CSIRT). While DSPs are not held to as stringent regulations as operators of essential services, DSPs that are not set up in the EU but still operate in the EU still face regulations. Even if DSPs and OES outsource the maintenance of their information systems to third parties, the NIS Directive still holds them accountable for any security incidents. The member states of the EU are required to create a NIS directive strategy, which includes the CSIRTs, in addition to National Competent Authorities (NCAs) and Single Points of Contact (SPOCs). Such resources are given the responsibility of handling cybersecurity breaches in a way that minimizes impact. In addition, all member states of the EU are encouraged to share cyber security information. Security requirements include technical measures that manage the risks of cybersecurity breaches in a preventative manner. Both DSP and OES must provide information that allows for an in depth assessment of their information systems and security policies. All significant incidents must be notified to the CSIRTs. Significant cybersecurity incidents are determined by the number of users affected by the security breach as well as the longevity of the incident and the geographical reach of the incident. A NIS 2 is in the making. Only 23 Member States have fully implemented the measures contained with the NIS Directive. Infringement proceedings against them to enforce the Directive have not taken place, and they are not expected to take place in the near future. This failed implementation has led to the fragmentation of cybersecurity capabilities across the EU, with differing standards, incident reporting requirements and enforcement requirements being implemented in different Member States.


EU Cybersecurity Act

The EU Cybersecurity Act establishes an EU-wide cybersecurity certification framework for digital products, services and processes. It complements the NIS Directive. ENISA will have a key role in setting up and maintaining the European cybersecurity certification framework.


EU GDPR

The EU
General Data Protection Regulation The General Data Protection Regulation (Regulation (EU) 2016/679), abbreviated GDPR, is a European Union regulation on information privacy in the European Union (EU) and the European Economic Area (EEA). The GDPR is an important component of ...
(GDPR) was set into place on 14 April 2016, but the current date of enforcement is set to be on 25 May 2018. The GDPR aims to bring a single standard for data protection among all member states in the EU. Changes include the redefining of geographical borders. It applies to entities that operate in the EU or deal with the data of any resident of the EU. Regardless of where the data is processed, if an EU citizen's data is being processed, the entity is now subject to the GDPR. Fines are also much more stringent under the GDPR and can total €20 million or 4% of an entity's annual turnover, whichever is higher. In addition, like in previous regulations, all data breaches that effect the rights and freedoms of individuals residing in the EU must be disclosed within 72 hours. The overarching board, the EU Data Protection Board, EDP, is in charge of all oversight set by the GDPR. Consent plays a major role in the GDPR. Companies that hold data in regards to EU citizens must now also offer to them the right to back out of sharing data just as easily as when they consented to sharing data. In addition, citizens can also restrict processing of the data stored on them and can choose to allow companies to store their data but not process it, which creates a clear differentiation. Unlike previous regulations, the GDPR also restricts the transfer of a citizen's data outside of the EU or to a third party without a citizen's prior consent.


NIS 2 Directive

On the 16 January 2023, the EU Parliament and Council adopted the 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS Directive). This new Directive aims to extend the scope of obligations on entities required to take measures to increase their cybersecurity capabilities. The Directive also aims to harmonise the EU approach to incident notifications, security requirements, supervisory measures and information sharing. The National Cyber Security Bill 2024 will transpose NIS2 into Irish law once enacted. The National Cyber Security Bill 2024 represents a proactive step towards safeguarding Ireland's critical infrastructure and enhancing its overall cybersecurity resilience in line with European standards, as stipulated in NIS2.


The Digital Operational Resilience Act (DORA)

DORA creates a regulatory framework on digital operational resilience whereby all firms need to make sure they can withstand, respond to and recover from all types of ICT-related disruptions and threats. These requirements are homogenous across all EU member states. The regulation will apply from 17 January 2025 for relevant financial entities and ICT third-party service providers.


Cyber Resilience Act

The Cyber Resilience Act (CRA) is a
regulation Regulation is the management of complex systems according to a set of rules and trends. In systems theory, these types of rules exist in various fields of biology and society, but the term has slightly different meanings according to context. Fo ...
proposed on 15 September 2022 by the European Commission which outlines common cybersecurity standards for hardware and software products in the EU.


Individual EU Countries


Republic of Ireland

The Criminal Justice (Offences Relating to Information Systems) Act 2017 was introduced in May 2017 to consolidate laws on computer crime.


Reactions

While experts agree that cybersecurity improvements are necessary, there is disagreement about whether the solution is more government regulation or more private-sector innovation.


Support

Many government officials and cybersecurity experts believe that the private sector has failed to solve the cybersecurity problem and that regulation is needed. Richard Clarke states that "industry only responds when you threaten regulation. If industry does not respond o the threat you have to follow through." He believes that software companies must be forced to produce more secure programs.
Bruce Schneier Bruce Schneier (; born January 15, 1963) is an American cryptographer, computer security professional, privacy specialist, and writer. Schneier is an Adjunct Lecturer in Public Policy at the Harvard Kennedy School and a Fellow at the Berkman ...
also supports regulation that encourages software companies to write more secure code through economic incentives. US Representative Rick Boucher ( D– VA) proposes improving cybersecurity by making software companies liable for security flaws in their code. In addition, to improving software security, Clarke believes that certain industries, such as utilities and ISPs, require regulation.


Opposition

On the other hand, many private-sector executives and lobbyists believe that more regulation will restrict their ability to improve cybersecurity. Harris Miller, a lobbyist and president of the Information Technology Association of America, believes that regulation inhibits innovation. Rick White, former corporate attorney and president and
CEO A chief executive officer (CEO), also known as a chief executive or managing director, is the top-ranking corporate officer charged with the management of an organization, usually a company or a nonprofit organization. CEOs find roles in variou ...
of the lobby group TechNet, also opposes more regulation. He states that "the private-sector must continue to be able to innovate and adapt in response to new attack methods in cyber space, and toward that end, we commend President Bush and the Congress for exercising regulatory restraint." Another reason many private-sector executives oppose regulation is that it is costly and involves government oversight in private enterprise. Firms are just as concerned about regulation reducing profits as they are about regulation limiting their flexibility to solve the cybersecurity problem efficiently. Specifically around the CRA, concern is expressed over the breadth of impact by prominent free and
Open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
software organizations:
Eclipse Foundation The Eclipse Foundation AISBL is an independent, Europe-based not-for-profit organization that acts as a steward of the Eclipse open source software development community, with legal jurisdiction in the European Union. It is an organization supp ...
,
Internet Society The Internet Society (ISOC) is an American non-profit advocacy organization founded in 1992 with local chapters around the world. It has offices in Reston, Virginia, United States, and Geneva, Switzerland. Organization The Internet Society ...
, and
Python Software Foundation The Python Software Foundation (PSF) is an American nonprofit organization devoted to the Python programming language, launched on March 6, 2001. The mission of the foundation is to foster development of the Python community and is responsible fo ...
. These organizations raise several consequences which are unstated by the regulation, that they conclude fundamentally damage the Open source movement. They offer changes that would allow Open source to be used in the EU without being regulated in the same manner as would be on commercial software developers.


See also

* CERT Coordination Center *
Cyber security standards Information security standards (also cyber security standards) are techniques generally outlined in published materials that attempt to protect a user's or organization's cyber environment. This environment includes users themselves, networks, devi ...
* Cybersecurity Information Sharing Act * Cyber Security and Resilience Bill - proposed UK regulation. * Default password *
Information assurance Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and data transmission, transmission of information. Information assurance includes protection of the data integrity, inte ...
*
List of data breaches This is a list of reports about data breaches, using data compiled from various sources, including press reports, government news releases, and mainstream news articles. The list includes those involving the theft or compromise of 30,000 or more ...
* Medical device hijack * National Cyber Security Division *
National Strategy to Secure Cyberspace In the United States government, the National Strategy to Secure Cyberspace, is a component of the larger National Strategy for Homeland Security. The National Strategy to Secure Cyberspace was drafted by the Department of Homeland Security Th ...
*
Presidential directive In the United States, a presidential directive, or executive action, is a written or oral instruction or declaration issued by the president of the United States, which may draw upon the powers vested in the president by the Constitution of the Uni ...
*
Proactive cyber defence Proactive cyber defense means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or d ...
* United States Computer Emergency Readiness Team *
United States Department of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. United States federal executive departments, federal executive department responsible for public security, roughly comparable to the Interior minister, interior, Home Secretary ...


Notes

#
A chronology of data breaches reported since the ChoicePoint incident
" (2005). Retrieved October 13, 2005. #

" (2005). Retrieved October 23, 2005. # " ttp://www.howstuffworks.com/virus.htm How computer viruses work" (2005). Retrieved October 10, 2005. #
The National Strategy to Secure Cyberspace
." (2003). Retrieved December 14, 2005. #

" 2003). Retrieved October 23, 2005. #

" (2003). Retrieved December 4, 2005. # Gordon, L. A., Loeb, M. P., Lucyshyn, W. & Richardson, R. (2005).
2005 CSI/FBI computer crime and security survey
" Retrieved October 10, 2005. # Heiman, B. J. (2003)
Cybersecurity regulation is here
RSA security conference, Washington, D.C. Retrieved October 17, 2005. # Kirby, C. (2003, December 4, 2003).
Forum focuses on cybersecurity
. San Francisco Chronicle. # Lemos, R. (2003).

" Retrieved December 4, 2005. # Menn, J. (2002, January 14, 2002).

. Los Angeles Times, pp. C1. # Rasmussen, M., & Brown, A. (2004).

" Retrieved October 31, 2005. # Schmitt, E., Charron, C., Anderson, E., & Joseph, J. (2004).

" Retrieved October 31, 2005. # Jennifer Rizzo. (August 2, 2012)
Cybersecurity bill fails in Senate
" Accessed August 29, 2012. # Paul Rosenzweig. (July 23, 2012) "." The Heritage Foundation. Accessed August 20, 2012. # Ed O'Keefe & Ellen Nakashima. (August 2, 2012 )

" The Washington Post. Accessed August 20, 2012. # Alex Fitzpatrick. (July 20, 2012)
Obama Gives Thumbs-Up to New Cybersecurity Bill
" Mashable. Accessed August 29, 2012. # Brendan Sasso. (August 4, 2012)
After defeat of Senate cybersecurity bill, Obama weighs executive-order option
. The Hill. Accessed August 20, 2012. # Jaikumar Vijayan. (August 16, 2012)
No partisan fight over cybersecurity bill, GOP senator says
. Computerworld. Accessed August 29, 2012. # Carl Franzen. (August 2, 2012)
As Cybersecurity Bill Fails In Senate, Privacy Advocates Rejoice
. TPM. August 29, 2012. # Alex Fitzpatrick. (August 2, 2012)
Cybersecurity Bill Stalls in the Senate
. Mashable. Accessed August 29, 2012. # Jody Westby (August 13, 2012)
Congress Needs to Go Back To School on Cyber Legislation
. Forbes. Accessed August 20, 2012.


References

{{DEFAULTSORT:Cyber-Security Regulation Government in the United States Computer security procedures Cyberwarfare Politics and technology Data laws Computer law