SlideShare a Scribd company logo
1 of 4
Download to read offline
April 12, 2012               Government Contractors Now Subject to Cybersecurity
                                 Regulations – And More are on the Way

Government Contracts Client Alert
                                 I.    INTRODUCTION
This Alert provides only
general information and          Congress currently is considering various cybersecurity bills. While Congress debates
                                 cyber legislation, the executive agencies are adopting regulations governing how
should not be relied upon as
                                 government contractors handle contract-related information either residing on or
legal advice. This Alert may     transiting through their computer systems.
be considered attorney
advertising under court and      As described below, if your company contracts with the General Services Administration
bar rules in certain
                                 (GSA), and has access to government information, you may already be required to have
                                 an IT security plan and to be a certified provider. Department of Defense (DOD)
jurisdictions.
                                 contractors should expect even more stringent regulations to be finalized in 2012, which
                                 could restrict even a company’s internal access policies and practices.
For more information, contact
your Patton Boggs LLP            This memorandum provides an overview of the regulatory scheme imposed on GSA
attorney or the authors listed
                                 contractors and previews the requirements expected to be implemented by DOD. If
                                 requested, we would be happy to provide additional detail on the regulatory
below.
                                 requirements.

Mary Beth Bosco                  II.   GSA CURRENT AND DOD PROPOSED REGULATIONS
mbbosco@pattonboggs.com
                                       A.     GSA Cybersecurity Regulations

                                 In January of this year, GSA finalized its June 2011 interim cybersecurity rules. These
WWW.PATTONBOGGS.COM              regulations apply to GSA contracts for IT supplies, services or systems which involve
                                 physical or electronic access to non-classified government information supporting the
                                 mission of GSA. If you have a GSA IT contract, and you are provided information by the
                                 agency or have access to GSA information, you are covered by the regulations, as are
                                 your subcontractors. The new rules require contractors to maintain government-approved
                                 security plans, and to possess a security authorization. These provisions are summarized
                                 below.

                                              1.     Contractor IT Security Plan

                                 The first GSA requirement is preparation of an IT security plan for each contract. This
                                 plan must be submitted to the contracting officer for approval within 30 days of contract
                                 award, and must comply with the Federal Information Security Management Act of 2002
                                 and the E-Government Act of 2002. The approved plan will be incorporated as part of the
                                 contract.

                                 In addition to the basic IT security plan, GSA contractors are now required to maintain a
                                 continuous monitoring strategy. The strategy must provide (a) a configuration
                                 management process for the information system and its constituent components; (b) a
means to make determinations of the security impact of changes to the information
system and environment of operations; (c) ongoing security control assessments in
accordance with the organizational continuous monitoring strategy; (d) regular reporting
requirements as to the security state of the information system to designated GSA
officials; and (e) a description of the continuous monitoring support systems and
applications.

             2.     Security Authorization

Within six months of receipt of a covered contract, GSA contractors must submit proof of
IT security authorization in accordance with National Institute of Standards and Testing
(NIST) Special Publication 800-37. Contractors can “self” authorize or use a third-party
verifier. The authorization document must include a final security plan, risk assessment
plan, security test and evaluation plan, and a disaster recovery and continuity of
operations plan. Once approved by the contracting officer, the security authorization
document becomes part of the contract requirements, and contractors will be required to
submit annual verifications of compliance.

             3.     Notice and Access Requirements

Under the new GSA regulations, contractors must notify GSA each time an employee
with access to GSA information systems or data leaves or is hired. Contractors are also
required to have procedures in place for immediate cancellation of system access rights
for terminated employees. Finally, the regulations provide for GSA access to contractor
and subcontractor personnel, operations, and IT systems for the purpose of inspection,
investigation or audit relating to compliance with the cyber regulations.

     B.      DOD’s Proposed Cybersecurity Regulations

In June of 2011, DOD published a proposal for cybersecurity regulation. DOD accepted
comments on its proposal through November 2011, but has not yet issued final
regulations. They are expected to come out later this year. The DOD proposal covers
non-public, non-classified DOD information resident on or transitioning through a
contractor's information systems. The proposed rules divide this information into two
subsets, with different security measures applicable to each.

             1.     “Basic” Information Covered by DOD’s Proposed Regulations

The first category of information is “basic” DOD information, which is defined as
information that has been provided by DOD or is used or generated in support of a DOD
activity. The information must be “nonpublic,” which means (a) it is either exempt from
disclosure under the Freedom of Information Act (FOIA), or (b) it has not been
disseminated to the general public and DOD has not made a determination that the
information is releaseable. In other words, unless DOD has specifically authorized a
contractor to release information, or the information would not be protected by FOIA, the
contractor will be required to treat the information in accordance with DOD’s rules.

             2.     Safeguarding “Basic” Information

Absent DOD’s determination that information is releasable, and with certain exceptions
for audits and investigations, the proposed rules preclude contractors from releasing
even basic level information outside of their organizations or to employees who do not
have a right to know the information. Subcontractors will also be subject to these same
restrictions. This general prohibition has the potential to result in costly changes to the
structure of company email, intranet, and other data sharing systems. The proposed
regulations further contain these specific mandates:

a.   Contractors cannot process government information on publicly-accessible
     computers or on company computers that do not have access control.

b.   Contractors’ electronic transmission systems must provide “the best level of
     security and privacy available, given facilities, conditions, and environment.”

c.   Voice data may only be transmitted when the user has reasonable assurance that
     access is limited only to authorized recipients.

d.   When information is not being accessed, it must be protected by at least one
     physical barrier (e.g., lock or password).

e.   Contractors must have procedures to clear information from devices before they are
     released or discarded.

f.   Contractors must have minimum intrusion protections, including regularly updated
     malware and prompt application of security-related patches and upgrades.

g.   Finally, contractors may only transfer covered data to subcontractors with a need to
     know the information and who employ the safeguards listed above.

             3.       “Enhanced” Information

The second category of information is “enhanced” information, which includes information
designated by DOD as critical, information subject to the export control laws, information
subject to DOD-specific FOIA directives, information designated as controlled information
(such as “Official Use Only”), personal identification information, and certain technical
data. If data falls within these categories, contractors must implement enhanced security
requirements in addition to those described above for basic data. To constitute enhanced
protection, a contractor’s security program will need to comply with the standards set
forth in NIST Special Publication 800-53. In the alternative, a contractor may prepare a
written submission describing either why the NIST standard is inapplicable or how the
contractor’s systems meet the NIST requirements through other means. Additionally,
contractors handling enhanced data will be required to use DOD-approved identity
credentials for accessing the information.

             4.      Cyber Incident Reporting for Enhanced Information

DOD’s proposal mandates reporting of cyber incidents affecting DOD information within
72 hours of discovery. Cyber incidents include data exfiltration or manipulation or other
loss or compromise, or unauthorized access to a system on which DOD data resides or
is transiting. In addition to incident reporting, contractors will need to take immediate
action to support forensic activities. These actions include an immediate review of the
system to identify compromised computers, servers and user accounts; identification of
the specific DOD information that has been affected; and preservation of the known
affected systems and any corresponding capture data. In the event DOD determines to
perform its own damage assessment, the contractor will be required to comply with all
information requests and cooperate with DOD’s investigation.
III.   CONCLUSION

At a minimum, GSA’s cyber regulations and DOD’s proposal will require affected
contractors to review their IT security procedures to ensure they match the respective
agency’s requirements. In some cases, these rules may result in substantial changes to
company IT policies and operations. While the DOD regulations are not yet final,
proactive review of contractor IT policies and procedures may be warranted in order to
accomplish a more orderly and less compressed path towards compliance once the rules
are published.




This Alert provides only general information and should not be relied upon as legal advice. This Alert may
also be considered attorney advertising under court and bar rules in certain jurisdictions.


       WASHINGTON DC | NORTHERN VIRGINIA | NEW JERSEY | NEW YORK | DALLAS | DENVER | ANCHORAGE
                                     DOHA, QATAR | ABU DHABI, UAE

More Related Content

What's hot

Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsTrustArc
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your BusinessTrustArc
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateTrustArc
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Terrance Tong
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...TrustArc
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...Benjamin Ang
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protectionMathew Chacko
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive OrderBooz Allen Hamilton
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Sagar Rahurkar
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
 
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...TrustArc
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleUlf Mattsson
 

What's hot (20)

Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
2019-06-11 What New US State Laws Mean For Your Business
2019-06-11 What New US State Laws  Mean For Your Business2019-06-11 What New US State Laws  Mean For Your Business
2019-06-11 What New US State Laws Mean For Your Business
 
So Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law UpdateSo Many States, So Many Privacy Laws: US State Privacy Law Update
So Many States, So Many Privacy Laws: US State Privacy Law Update
 
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
Strengthening the Great Cyber-Wall of China — An Effort in Protecting the Mas...
 
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
The Court Speaks: Privacy Shield, Standard Contractual Clauses and Cookie Con...
 
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...2017 cyber legislation in Singapore  (v2) - case study and discussion of cybe...
2017 cyber legislation in Singapore (v2) - case study and discussion of cybe...
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
The Cybersecurity Executive Order
The Cybersecurity Executive OrderThe Cybersecurity Executive Order
The Cybersecurity Executive Order
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000Compliance audit under the Information Technology Act, 2000
Compliance audit under the Information Technology Act, 2000
 
Law firm information security overview focus on encryption by dave cunningh...
Law firm information security overview   focus on encryption by dave cunningh...Law firm information security overview   focus on encryption by dave cunningh...
Law firm information security overview focus on encryption by dave cunningh...
 
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...
TrustArc Webinar: How to Prepare Your Business for Privacy Changes in the Mid...
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Do You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? ArticleDo You Have a Roadmap for EU GDPR Compliance? Article
Do You Have a Roadmap for EU GDPR Compliance? Article
 

Viewers also liked

Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”
Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”
Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”Patton Boggs LLP
 
C:\fakepath\desarrollo del proyecto de aula
C:\fakepath\desarrollo del proyecto de aulaC:\fakepath\desarrollo del proyecto de aula
C:\fakepath\desarrollo del proyecto de aulaMaría Belén
 
TechComm Industry Update ~ November 2, 2012
TechComm Industry Update ~ November 2, 2012TechComm Industry Update ~ November 2, 2012
TechComm Industry Update ~ November 2, 2012Patton Boggs LLP
 
Capital Thinking Update Special Edition - The Budget Control Act of 2011
Capital Thinking Update Special Edition - The Budget Control Act of 2011Capital Thinking Update Special Edition - The Budget Control Act of 2011
Capital Thinking Update Special Edition - The Budget Control Act of 2011Patton Boggs LLP
 
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...Patton Boggs LLP
 
Criminal Antitrust Update - June 2011
Criminal Antitrust Update - June 2011 Criminal Antitrust Update - June 2011
Criminal Antitrust Update - June 2011 Patton Boggs LLP
 
Busn3025 Seminar 1 Introduction To Ihr Ma
Busn3025 Seminar 1 Introduction To Ihr MaBusn3025 Seminar 1 Introduction To Ihr Ma
Busn3025 Seminar 1 Introduction To Ihr Mamayank2012
 
Theories Of International Trade
Theories Of International TradeTheories Of International Trade
Theories Of International Trademayank2012
 

Viewers also liked (9)

Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”
Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”
Bankruptcy Alert: The Second Circuit Condemns Chapter 11 Plan “Gifting”
 
C:\fakepath\desarrollo del proyecto de aula
C:\fakepath\desarrollo del proyecto de aulaC:\fakepath\desarrollo del proyecto de aula
C:\fakepath\desarrollo del proyecto de aula
 
TechComm Industry Update ~ November 2, 2012
TechComm Industry Update ~ November 2, 2012TechComm Industry Update ~ November 2, 2012
TechComm Industry Update ~ November 2, 2012
 
Capital Thinking Update Special Edition - The Budget Control Act of 2011
Capital Thinking Update Special Edition - The Budget Control Act of 2011Capital Thinking Update Special Edition - The Budget Control Act of 2011
Capital Thinking Update Special Edition - The Budget Control Act of 2011
 
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...
TechComm Federal Grant Compliance Alert: Are you a Subrecipient or Vendor? Un...
 
Criminal Antitrust Update - June 2011
Criminal Antitrust Update - June 2011 Criminal Antitrust Update - June 2011
Criminal Antitrust Update - June 2011
 
Busn3025 Seminar 1 Introduction To Ihr Ma
Busn3025 Seminar 1 Introduction To Ihr MaBusn3025 Seminar 1 Introduction To Ihr Ma
Busn3025 Seminar 1 Introduction To Ihr Ma
 
Theories Of International Trade
Theories Of International TradeTheories Of International Trade
Theories Of International Trade
 
Evangelismo Quatro Leis
Evangelismo Quatro LeisEvangelismo Quatro Leis
Evangelismo Quatro Leis
 

Similar to Government Contractors Now Subject to Cybersecurity Regulations – And More are on the Way

Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsPatton Boggs LLP
 
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...Patton Boggs LLP
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program Patton Boggs LLP
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxJack Nichelson
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateWilmerHale
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationIBM Security
 
DevOps vs GDPR: How to Comply and Stay Agile
DevOps vs GDPR: How to Comply and Stay AgileDevOps vs GDPR: How to Comply and Stay Agile
DevOps vs GDPR: How to Comply and Stay AgileBen Saunders
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.Salman Baset
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortzitnewsafrica
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...Patton Boggs LLP
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsMMMTechLaw
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPRTim Hyman LLB
 
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceWilliam McBorrough
 
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal ContractorsArnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal ContractorsJSchaus & Associates
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industryRohana K Amarakoon
 

Similar to Government Contractors Now Subject to Cybersecurity Regulations – And More are on the Way (20)

Cybersecurity 101: Government Contracts
Cybersecurity 101: Government ContractsCybersecurity 101: Government Contracts
Cybersecurity 101: Government Contracts
 
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...
New FAR Clause Establishes Minimum Data Security Requirements for Federal Con...
 
DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program DoD Implements Broad Cybersecurity Information–Sharing Program
DoD Implements Broad Cybersecurity Information–Sharing Program
 
Key Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government ContractorsKey Cyber Security Issues for Government Contractors
Key Cyber Security Issues for Government Contractors
 
GSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through AcquisitionGSA's Presentation on Improving Cyber Security Through Acquisition
GSA's Presentation on Improving Cyber Security Through Acquisition
 
DFARS & CMMC Overview
DFARS & CMMC Overview DFARS & CMMC Overview
DFARS & CMMC Overview
 
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptxA Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
A Clear Path to NIST & CMMC Compliance - 2022 Summit.pptx
 
Cybersecurity and Data Privacy Update
Cybersecurity and Data Privacy UpdateCybersecurity and Data Privacy Update
Cybersecurity and Data Privacy Update
 
How IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity LegislationHow IBM Supports Clients around GDPR and Cybersecurity Legislation
How IBM Supports Clients around GDPR and Cybersecurity Legislation
 
DevOps vs GDPR: How to Comply and Stay Agile
DevOps vs GDPR: How to Comply and Stay AgileDevOps vs GDPR: How to Comply and Stay Agile
DevOps vs GDPR: How to Comply and Stay Agile
 
GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.GDPR considerations for blockchain solution architects.
GDPR considerations for blockchain solution architects.
 
FAR 'Final Rule' Blog
FAR 'Final Rule' BlogFAR 'Final Rule' Blog
FAR 'Final Rule' Blog
 
Contracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy BortzContracting in the Cloud by Tammy Bortz
Contracting in the Cloud by Tammy Bortz
 
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
GSA Seeks Industry Comments on How Best to Incorporate Cybersecurity into Fed...
 
Navigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology TransactionsNavigating Risk In Data & Technology Transactions
Navigating Risk In Data & Technology Transactions
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
The Essential Guide to GDPR
The Essential Guide to GDPRThe Essential Guide to GDPR
The Essential Guide to GDPR
 
MCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance ServiceMCGlobalTech CMMC Managed Compliance Service
MCGlobalTech CMMC Managed Compliance Service
 
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal ContractorsArnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
Arnold & Porter Cybersecurity Compliance and Enforcement for Federal Contractors
 
Policies & Laws in IT industry
Policies & Laws in IT industryPolicies & Laws in IT industry
Policies & Laws in IT industry
 

More from Patton Boggs LLP

Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Patton Boggs LLP
 
Update: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActUpdate: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActPatton Boggs LLP
 
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Patton Boggs LLP
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Patton Boggs LLP
 
American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...Patton Boggs LLP
 
Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Patton Boggs LLP
 
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesSupreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesPatton Boggs LLP
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"Patton Boggs LLP
 
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityPatton Boggs LLP
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16Patton Boggs LLP
 
Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Patton Boggs LLP
 
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustThe U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustPatton Boggs LLP
 
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...Patton Boggs LLP
 
Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Patton Boggs LLP
 
Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Patton Boggs LLP
 
CFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsCFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsPatton Boggs LLP
 
Australia Elects a New Federal Government
Australia Elects a New Federal GovernmentAustralia Elects a New Federal Government
Australia Elects a New Federal GovernmentPatton Boggs LLP
 
"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013Patton Boggs LLP
 
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosureU.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosurePatton Boggs LLP
 

More from Patton Boggs LLP (20)

Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
Crimea: U.S. Response Intensifies As Congress, President Obama Issue More San...
 
Update: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care ActUpdate: Employer Responsibilities Under the Affordable Care Act
Update: Employer Responsibilities Under the Affordable Care Act
 
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
Crimea: U.S. Executive Actions and Legal Implications of Overlapping Global S...
 
Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...Protecting Patient Information - Feds Find Security Lapses in State and Local...
Protecting Patient Information - Feds Find Security Lapses in State and Local...
 
American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...American University International Law Review Annual Symposium: Managing the G...
American University International Law Review Annual Symposium: Managing the G...
 
Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014Reinsurance Newsletter - March 2014
Reinsurance Newsletter - March 2014
 
Social Impact Bonds
Social Impact BondsSocial Impact Bonds
Social Impact Bonds
 
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent CasesSupreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
Supreme Court Agrees to Hear Two Cases on Attorneys' Fees in Patent Cases
 
FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"FTC Announces Study of "Patent Assertion Entities"
FTC Announces Study of "Patent Assertion Entities"
 
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of AuthorityALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
ALJ Ruling on Heart Attack Reporting Requirements Creates Split of Authority
 
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16New TCPA Requirements for "Prior Express Written Consent" Effective October 16
New TCPA Requirements for "Prior Express Written Consent" Effective October 16
 
Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013Reinsurance Newsletter ~ September 2013
Reinsurance Newsletter ~ September 2013
 
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible DustThe U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
The U.S. Chemical Safety Board to OSHA: Get to Work on Combustible Dust
 
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...The Transatlantic Trade and Investment Partnership: The Intersection of the I...
The Transatlantic Trade and Investment Partnership: The Intersection of the I...
 
Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013Capital Thinking ~ July 29, 2013
Capital Thinking ~ July 29, 2013
 
Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013Capital Thinking ~ July 22, 2013
Capital Thinking ~ July 22, 2013
 
CFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked QuestionsCFTC Cross-Border Guidance Frequently Asked Questions
CFTC Cross-Border Guidance Frequently Asked Questions
 
Australia Elects a New Federal Government
Australia Elects a New Federal GovernmentAustralia Elects a New Federal Government
Australia Elects a New Federal Government
 
"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013"Advance Australia Fair" - The Australian Federal Election 2013
"Advance Australia Fair" - The Australian Federal Election 2013
 
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay DisclosureU.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
U.S. Securities and Exchange Commission Proposes New Rule on Pay Disclosure
 

Recently uploaded

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Government Contractors Now Subject to Cybersecurity Regulations – And More are on the Way

  • 1. April 12, 2012 Government Contractors Now Subject to Cybersecurity Regulations – And More are on the Way Government Contracts Client Alert I. INTRODUCTION This Alert provides only general information and Congress currently is considering various cybersecurity bills. While Congress debates cyber legislation, the executive agencies are adopting regulations governing how should not be relied upon as government contractors handle contract-related information either residing on or legal advice. This Alert may transiting through their computer systems. be considered attorney advertising under court and As described below, if your company contracts with the General Services Administration bar rules in certain (GSA), and has access to government information, you may already be required to have an IT security plan and to be a certified provider. Department of Defense (DOD) jurisdictions. contractors should expect even more stringent regulations to be finalized in 2012, which could restrict even a company’s internal access policies and practices. For more information, contact your Patton Boggs LLP This memorandum provides an overview of the regulatory scheme imposed on GSA attorney or the authors listed contractors and previews the requirements expected to be implemented by DOD. If requested, we would be happy to provide additional detail on the regulatory below. requirements. Mary Beth Bosco II. GSA CURRENT AND DOD PROPOSED REGULATIONS mbbosco@pattonboggs.com A. GSA Cybersecurity Regulations In January of this year, GSA finalized its June 2011 interim cybersecurity rules. These WWW.PATTONBOGGS.COM regulations apply to GSA contracts for IT supplies, services or systems which involve physical or electronic access to non-classified government information supporting the mission of GSA. If you have a GSA IT contract, and you are provided information by the agency or have access to GSA information, you are covered by the regulations, as are your subcontractors. The new rules require contractors to maintain government-approved security plans, and to possess a security authorization. These provisions are summarized below. 1. Contractor IT Security Plan The first GSA requirement is preparation of an IT security plan for each contract. This plan must be submitted to the contracting officer for approval within 30 days of contract award, and must comply with the Federal Information Security Management Act of 2002 and the E-Government Act of 2002. The approved plan will be incorporated as part of the contract. In addition to the basic IT security plan, GSA contractors are now required to maintain a continuous monitoring strategy. The strategy must provide (a) a configuration management process for the information system and its constituent components; (b) a
  • 2. means to make determinations of the security impact of changes to the information system and environment of operations; (c) ongoing security control assessments in accordance with the organizational continuous monitoring strategy; (d) regular reporting requirements as to the security state of the information system to designated GSA officials; and (e) a description of the continuous monitoring support systems and applications. 2. Security Authorization Within six months of receipt of a covered contract, GSA contractors must submit proof of IT security authorization in accordance with National Institute of Standards and Testing (NIST) Special Publication 800-37. Contractors can “self” authorize or use a third-party verifier. The authorization document must include a final security plan, risk assessment plan, security test and evaluation plan, and a disaster recovery and continuity of operations plan. Once approved by the contracting officer, the security authorization document becomes part of the contract requirements, and contractors will be required to submit annual verifications of compliance. 3. Notice and Access Requirements Under the new GSA regulations, contractors must notify GSA each time an employee with access to GSA information systems or data leaves or is hired. Contractors are also required to have procedures in place for immediate cancellation of system access rights for terminated employees. Finally, the regulations provide for GSA access to contractor and subcontractor personnel, operations, and IT systems for the purpose of inspection, investigation or audit relating to compliance with the cyber regulations. B. DOD’s Proposed Cybersecurity Regulations In June of 2011, DOD published a proposal for cybersecurity regulation. DOD accepted comments on its proposal through November 2011, but has not yet issued final regulations. They are expected to come out later this year. The DOD proposal covers non-public, non-classified DOD information resident on or transitioning through a contractor's information systems. The proposed rules divide this information into two subsets, with different security measures applicable to each. 1. “Basic” Information Covered by DOD’s Proposed Regulations The first category of information is “basic” DOD information, which is defined as information that has been provided by DOD or is used or generated in support of a DOD activity. The information must be “nonpublic,” which means (a) it is either exempt from disclosure under the Freedom of Information Act (FOIA), or (b) it has not been disseminated to the general public and DOD has not made a determination that the information is releaseable. In other words, unless DOD has specifically authorized a contractor to release information, or the information would not be protected by FOIA, the contractor will be required to treat the information in accordance with DOD’s rules. 2. Safeguarding “Basic” Information Absent DOD’s determination that information is releasable, and with certain exceptions for audits and investigations, the proposed rules preclude contractors from releasing even basic level information outside of their organizations or to employees who do not have a right to know the information. Subcontractors will also be subject to these same
  • 3. restrictions. This general prohibition has the potential to result in costly changes to the structure of company email, intranet, and other data sharing systems. The proposed regulations further contain these specific mandates: a. Contractors cannot process government information on publicly-accessible computers or on company computers that do not have access control. b. Contractors’ electronic transmission systems must provide “the best level of security and privacy available, given facilities, conditions, and environment.” c. Voice data may only be transmitted when the user has reasonable assurance that access is limited only to authorized recipients. d. When information is not being accessed, it must be protected by at least one physical barrier (e.g., lock or password). e. Contractors must have procedures to clear information from devices before they are released or discarded. f. Contractors must have minimum intrusion protections, including regularly updated malware and prompt application of security-related patches and upgrades. g. Finally, contractors may only transfer covered data to subcontractors with a need to know the information and who employ the safeguards listed above. 3. “Enhanced” Information The second category of information is “enhanced” information, which includes information designated by DOD as critical, information subject to the export control laws, information subject to DOD-specific FOIA directives, information designated as controlled information (such as “Official Use Only”), personal identification information, and certain technical data. If data falls within these categories, contractors must implement enhanced security requirements in addition to those described above for basic data. To constitute enhanced protection, a contractor’s security program will need to comply with the standards set forth in NIST Special Publication 800-53. In the alternative, a contractor may prepare a written submission describing either why the NIST standard is inapplicable or how the contractor’s systems meet the NIST requirements through other means. Additionally, contractors handling enhanced data will be required to use DOD-approved identity credentials for accessing the information. 4. Cyber Incident Reporting for Enhanced Information DOD’s proposal mandates reporting of cyber incidents affecting DOD information within 72 hours of discovery. Cyber incidents include data exfiltration or manipulation or other loss or compromise, or unauthorized access to a system on which DOD data resides or is transiting. In addition to incident reporting, contractors will need to take immediate action to support forensic activities. These actions include an immediate review of the system to identify compromised computers, servers and user accounts; identification of the specific DOD information that has been affected; and preservation of the known affected systems and any corresponding capture data. In the event DOD determines to perform its own damage assessment, the contractor will be required to comply with all information requests and cooperate with DOD’s investigation.
  • 4. III. CONCLUSION At a minimum, GSA’s cyber regulations and DOD’s proposal will require affected contractors to review their IT security procedures to ensure they match the respective agency’s requirements. In some cases, these rules may result in substantial changes to company IT policies and operations. While the DOD regulations are not yet final, proactive review of contractor IT policies and procedures may be warranted in order to accomplish a more orderly and less compressed path towards compliance once the rules are published. This Alert provides only general information and should not be relied upon as legal advice. This Alert may also be considered attorney advertising under court and bar rules in certain jurisdictions. WASHINGTON DC | NORTHERN VIRGINIA | NEW JERSEY | NEW YORK | DALLAS | DENVER | ANCHORAGE DOHA, QATAR | ABU DHABI, UAE