National Protection and Programs Directorate; Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality, 21780-21782 [2014-08702]

Download as PDF 21780 Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Institute of Environmental Health Sciences; Notice of Meeting TKELLEY on DSK3SPTVN1PROD with NOTICES Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of a meeting of the National Advisory Environmental Health Sciences Council. The meeting will be open to the public as indicated below, with attendance limited to space available. Individuals who plan to attend and need special assistance, such as sign language interpretation or other reasonable accommodations, should notify the Contact Person listed below in advance of the meeting. The meeting will be closed to the public in accordance with the provisions set forth in sections 552b(c)(4) and 552b(c)(6), Title 5 U.S.C., as amended. The grant applications and the discussions could disclose confidential trade secrets or commercial property such as patentable material, and personal information concerning individuals associated with the grant applications, the disclosure of which would constitute a clearly unwarranted invasion of personal privacy. Name of Committee: National Advisory Environmental Health Sciences Council. Date: May 13–14, 2014. Open: May 13, 2014, 8:30 a.m. to 5:00 p.m. Agenda: Discussion of program policies and issues. Place: Nat. Inst. of Environmental Health Sciences, Building 101, Rodbell Auditorium, 111 T. W. Alexander Drive, Research Triangle Park, NC 27709. Closed: May 14, 2014, 8:30 a.m. to 11:30 a.m. Agenda: To review and evaluate grant applications. Place: Nat. Inst. of Environmental Health Sciences, Building 101, Rodbell Auditorium, 111 T. W. Alexander Drive, Research Triangle Park, NC 27709. Contact Person: Gwen W. Collman, Ph.D., Interim Director, Division of Extramural Research & Training, National Institutes of Health, Nat. Inst. of Environmental Health Sciences, 615 Davis Dr., KEY615/3112, Research Triangle Park, NC 27709, (919) 541– 4980, collman@niehs.nih.gov. Any interested person may file written comments with the committee by forwarding the statement to the Contact Person listed on this notice. The statement should include the name, address, telephone number and when applicable, the business or professional affiliation of the interested person. Information is also available on the Institute’s Council home page: www.niehs.nih.gov/about/boards/naehsc/ index.cfm, where an agenda and any VerDate Mar<15>2010 17:28 Apr 16, 2014 Jkt 232001 additional information for the meeting will be posted when available. (Catalogue of Federal Domestic Assistance Program Nos. 93.115, Biometry and Risk Estimation—Health Risks from Environmental Exposures; 93.142, NIEHS Hazardous Waste Worker Health and Safety Training; 93.143, NIEHS Superfund Hazardous Substances—Basic Research and Education; 93.894, Resources and Manpower Development in the Environmental Health Sciences; 93.113, Biological Response to Environmental Health Hazards; 93.114, Applied Toxicological Research and Testing, National Institutes of Health, HHS). Dated: April 11, 2014. Carolyn A. Baum, Program Analyst, Office of Federal Advisory Committee Policy. [FR Doc. 2014–08678 Filed 4–16–14; 8:45 am] BILLING CODE 4140–01–P Microbiology and Infectious Diseases Research, National Institutes of Health, HHS). Dated: April 11, 2014. David Clary, Program Analyst, Office of Federal Advisory Committee Policy. [FR Doc. 2014–08680 Filed 4–16–14; 8:45 am] BILLING CODE 4140–01–P DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS–2014–0015] National Protection and Programs Directorate; Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality (Authority: E.O. 13636, 78 FR 11737) DEPARTMENT OF HEALTH AND HUMAN SERVICES National Institutes of Health National Institute of Allergy and Infectious Diseases; Notice of Closed Meeting Pursuant to section 10(d) of the Federal Advisory Committee Act, as amended (5 U.S.C. App.), notice is hereby given of the following meeting. The meeting will be closed to the public in accordance with the provisions set forth in sections 552b(c)(4) and 552b(c)(6), Title 5 U.S.C., as amended. The grant applications and the discussions could disclose confidential trade secrets or commercial property such as patentable material, and personal information concerning individuals associated with the grant applications, the disclosure of which would constitute a clearly unwarranted invasion of personal privacy. Name of Committee: National Institute of Allergy and Infectious Diseases Special Emphasis Panel; NIAID SBIR Phase II Clinical Trial Implementation Cooperative Agreement (U44) and Clinical Trial Planning Grants (R34). Date: May 12, 2014. Time: 1:00 p.m. to 5:00 p.m. Agenda: To review and evaluate grant applications. Place: National Institutes of Health, 6700B Rockledge Drive, Bethesda, MD 20817, (Telephone Conference Call). Contact Person: Quirijn Vos, Ph.D., Scientific Review Officer Scientific Review Program, Division of Extramural, Activities DHHS/NIH/NIAID, 6700B Rockledge Drive, MSC, 7616 Bethesda, MD 20892, 301–451– 2666, qvos@niaid.nih.gov. (Catalogue of Federal Domestic Assistance Program Nos. 93.855, Allergy, Immunology, and Transplantation Research; 93.856, PO 00000 Frm 00070 Fmt 4703 Sfmt 4703 National Protection and Programs Directorate, DHS. ACTION: Public notice of completion of notification and process for requesting reconsideration to owners and operators of cyber-dependent infrastructure. AGENCY: The Secretary of Homeland Security has been directed to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. In addition to identifying such infrastructure, the Secretary has also been directed to confidentially notify owners and operators of critical infrastructure identified and establish a mechanism through which entities can request reconsideration of that identification, whether inclusion or exclusion from this list. This notice informs owners and operators of critical infrastructure that the confidential notification process is complete and describes the process for requesting reconsideration. DATES: The agency must receive the reconsideration package before May 15, 2014. ADDRESSES: Submit reconsideration requests and unclassified written reconsideration materials to CDII@ HQ.DHS.GOV. See SUPPLEMENTARY INFORMATION for formatting instructions. FOR FURTHER INFORMATION CONTACT: The Office of Cyber and Infrastructure Analysis, National Protection and Programs Directorate, United States Department of Homeland Security, Washington, DC 20528, or via email at cdii@hq.dhs.govmailto:carlos.kizzee@ dhs.gov. Responsible DHS Official: Under Secretary, National Protection and SUMMARY: E:\FR\FM\17APN1.SGM 17APN1 TKELLEY on DSK3SPTVN1PROD with NOTICES Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices Programs Directorate, United States Department of Homeland Security. SUPPLEMENTARY INFORMATION: Background: In section 9 of Executive Order (E.O.) 13636 the President directs the Secretary of Homeland Security to identify critical infrastructure where a cybersecurity incident could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security.’’ E.O. 13636, 78 FR 11737 (Feb. 12, 2013). Once that list of infrastructure is transmitted to the President in accordance with sec. 9, the Secretary is further directed to confidentially notify each entity that it has been identified and, ‘‘establish a process through which owners and operators of critical infrastructure may submit relevant information and request reconsideration of identifications under [this section].’’ Id at § 9(c). The United States Department of Homeland Security (DHS), in accordance with the consultative process required under E.O. 13636, developed a functions-based approach to identify critical infrastructure where ‘‘a cybersecurity incident could reasonably result in catastrophic regional or national effects.’’ DHS consulted with sector stakeholders throughout the identification process including, Sector-Specific Agencies, Sector Coordinating Councils, Government Coordinating Councils, independent regulatory agencies, subject-matter experts, and critical infrastructure owners and operators. DHS developed, reviewed, and discussed with private sector entities and trade associations criteria for evaluating when a cybersecurity incident involving critical infrastructure could reasonably result in catastrophic regional or national effects on public health or safety, economic security, or national security. ‘‘Catastrophic’’ was determined to be a higher level of impact than the ‘‘debilitating’’ standard found in the statutory definition of critical infrastructure. The higher threshold ensures that only infrastructure where a cybersecurity incident could cause the greatest impact is identified. The criteria for determining inclusion of the critical infrastructure were designed to assess whether a cybersecurity incident could reasonably result in incapacitation of the infrastructure or function and whether this incapacitation could cause catastrophic regional or national impacts on: Public Health or Safety, Economic Security or National Security. Identifying cyber-dependent critical infrastructure supports both critical VerDate Mar<15>2010 17:28 Apr 16, 2014 Jkt 232001 infrastructure needs and national security objectives by (1) providing the Federal government with the ability to more effectively disseminate specific and targeted cybersecurity threat information to identified cyberdependent critical infrastructure owners and operators; (2) supporting the prioritization, as appropriate, of government resources and programs available to identified cyber-dependent critical infrastructure; and (3) improving government’s understanding of the systems or assets whose incapacity or disruption would have catastrophic consequences in furtherance of government planning, protection, mitigation and response efforts to be provided in partnership with impacted state, local, territorial, tribal and private sector entities in the event of a cyber incident. The Secretary presented the initial list of identified infrastructure to the President, through the Assistant to President for Homeland Security and Counterterrorism on July 19, 2013. In accordance with E.O. 13636, this list will be reviewed and updated annually. DHS has completed the process of notifying owners and operators of critical infrastructure that were included on the July 19, 2013 initial list. If critical infrastructure owners and operators have not been contacted by DHS in connection with their status on the initial list, then such infrastructure has not been included on the initial list. Such infrastructure may be included in subsequent updates based on the outcome of reconsideration requests, annual reviews, or amendments to the list. The opportunity for reconsideration of initial identifications by DHS is available to all critical infrastructure owners and operators, whether or not their infrastructure has been identified as cyber-dependent by DHS, in accordance with this notice. The opportunity for reconsideration will be provided annually. The Secretary has delegated to the Under Secretary for National Protection and Programs the authority to address reconsideration requests and to make determinations in connection in subsequent updates. Definitions ‘‘Critical infrastructure’’ means systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. PO 00000 Frm 00071 Fmt 4703 Sfmt 4703 21781 ‘‘Cyber dependent’’ means critical infrastructure that utilizes computers, electronic communications systems, electronic communications services, wire communication, and/or electronic communication, including information contained therein, in order function or be maintained. ‘‘Cyber incident’’ means an event or series of events that impairs the confidentiality, integrity, or availability of electronic information, information systems, services, or networks. ‘‘Reconsideration official’’ means the Under Secretary for National Protection and Programs, or her or his designee, who will consider requests for reconsideration in accordance with the process set forth in this notice. Impact of Being Identified Under Sec. 9 The primary purpose of identifying critical infrastructure under sec. 9 of E.O. 13636 is to better understand national and regional cyber dependencies and consequences across critical infrastructure, inform planning and program development for federal critical infrastructure security and resilience programs, and enable improved cyber risk management by the identified critical infrastructure owners and operators. Owners and operators of identified cyber-dependent critical infrastructure have the opportunity to request expedited processing through the DHS Private Sector Clearance Program, which may provide access to classified government cybersecurity threat information as appropriate. Cyber-dependent critical infrastructure may also be prioritized for routine and incident-driven cyber technical assistance activities offered by DHS and other agencies. Additionally, owners and operators of identified cyberdependent critical infrastructure are encouraged to participate in the National Institute of Standards and Technology (NIST) cybersecurity framework for critical infrastructure (‘‘NIST framework’’). As Federal government resources and programs develop and improve to enhance the security and resilience of critical infrastructure against cybersecurity threats, cyber-dependent critical infrastructure will be a continued priority. Reconsideration Process Submitting a Reconsideration Request Reconsideration of identifications under sec. 9 of E.O. 13636 will be based on an evaluation of new information provided to DHS by the requesting entity. An entity must initiate the reconsideration process in writing. E:\FR\FM\17APN1.SGM 17APN1 21782 Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices TKELLEY on DSK3SPTVN1PROD with NOTICES However, the entity also may request a meeting with a DHS official (in person or by phone) to discuss the additional information they will provide in support of their reconsideration request or to seek additional information about the basis for identifications. DHS will consider meeting requests on a case by case basis and identify an appropriate official to participate in such meetings on behalf of the reconsideration official. Owners and operators of critical infrastructure entities or their authorized agents may initiate a reconsideration request by sending an email to CDII@HQ.DHS.GOV including: 1. The entity for reconsideration; 2. the name, title, telephone number and email address of a designated point of contact, whether an employee or nonemployee agent, for the owner or operator of that entity to whom all communications related to the reconsideration process will be directed; and 3. if desired, a request for a meeting with DHS representatives. DHS will confirm the submission of each reconsideration request with an email to the submitting entity and will provide a reconsideration request number within three days of receipt. Where the requesting entity has requested a telephonic or in-person meeting, a representative of DHS will contact the entity at the email address provided in the initial request to schedule a meeting or inform the entity that the requested meeting is not available. Submission of Reconsideration Materials Following DHS confirmation of the request, entities may submit reconsideration materials as part of an in-person or telephone meeting or in writing. Entities who submit written documentation in lieu of a meeting or who choose to provide additional documentation following a meeting should submit the information via email (with exceptions noted below) in the form of a single attachment. All pages submitted to DHS should be doublespaced 12 point Times New Roman text or visual material, with 1’’ margins and page numbers. Supporting documentation should be organized and labeled. Entities should include the DHS-provided reconsideration request number on each page of the submission. Documentation used to justify a change in status for an entity with respect to identified cyber-dependent critical infrastructure may constitute protected critical infrastructure information (PCII) if it satisfies, and is submitted in accordance with, VerDate Mar<15>2010 17:28 Apr 16, 2014 Jkt 232001 applicable requirements. The PCII program is an information-protection program that enhances voluntary information sharing between infrastructure owners and operators and the government. In order to ensure handling under the provisions of the PCII program, owner operators must submit information consistent with the Critical Infrastructure Information Act (6 U.S.C. 131 et seq), the PCII final rule (6 CFR part 29), and the PCII Program Manual. Additional information regarding the PCII program may be found at https://www.dhs.gov/pcii. Classified information must not be transmitted to mailto:cdii@hq.dhs.gov; however, a request for guidance on alternate submission guidance may be sent, without any classified information, to cdii@hq.dhs.gov. DHS may in its sole discretion grant a reasonable extension to the reconsideration submission for the purpose of accommodating a request to submit classified information. Reconsideration Request Review A preliminary review by DHS following a meeting or submission of the reconsideration materials will evaluate whether any additional information is needed to make a decision on the reconsideration request. DHS will contact the submitter within 30 days of the meeting or submission to request additional information, if needed, or to confirm that the reconsideration package is complete. If additional information is requested, the submitter will have up to 60 days from the date of DHS’s request to provide such information, and DHS will have another 30 days from the additional submission to deem the package complete. Following receipt and review of a complete reconsideration package, DHS will provide requesting entities with a written response including the basis for its determination. If a complete reconsideration package is not received by DHS before May 15, 2014, any information provided by a submitter may be considered in connection with the next annual update rather than as a request for reconsideration of this year’s determination. In considering requests for reconsideration, DHS may consult with sector specific agencies and other appropriate federal entities. Information submitted to DHS, including appropriately submitted PCII, will be protected in accordance with applicable requirements and used only for permitted purposes. Entities may contact cdii@hq.dhs.gov at any time to request a status update during the reconsideration request PO 00000 Frm 00072 Fmt 4703 Sfmt 4703 review process. After a determination has been made in connection with the request, subsequent reconsideration requests will not be accepted until the next annual review. Dated: April 11, 2014. Suzanne Spaulding, Under Secretary, National Protection and Programs Directorate, Department of Homeland Security. [FR Doc. 2014–08702 Filed 4–16–14; 8:45 am] BILLING CODE 9110–9P–P DEPARTMENT OF HOMELAND SECURITY Coast Guard [Docket Number USCG–2009–0139; OMB Control Number: 1625–0043] Information Collection Request to Office of Management and Budget Coast Guard, DHS. Sixty-day notice requesting comments. AGENCY: ACTION: In compliance with the Paperwork Reduction Act of 1995, the Coast Guard plans to submit an Information Collection Request (ICR) to the Office of Management and Budget (OMB), Office of Information and Regulatory Affairs (OIRA), requesting a revision to the following collection of information: 1625–0043, Ports and Waterways Safety Act—Title 33, Subchapter P. The Coast Guard invites comments as described below. DATES: Comments must reach the Coast Guard on or before June 16, 2014. ADDRESSES: You may submit comments identified by Coast Guard docket number [USCG–2009–0139] to the Docket Management Facility (DMF) at the U.S. Department of Transportation (DOT). To avoid duplicate submissions, please use only one of the following means: (1) Online: https:// www.regulations.gov. (2) Mail: DMF (M–30), DOT, West Building Ground Floor, Room W12–140, 1200 New Jersey Avenue SE., Washington, DC 20590–0001. (3) Hand delivery: Same as mail address above, between 9 a.m. and 5 p.m., Monday through Friday, except Federal holidays. The telephone number is 202–366–9329. (4) Fax: 202–493–2251. To ensure your comments are received in a timely manner, mark the fax, to attention Desk Officer for the Coast Guard. The DMF maintains the public docket for this Notice. Comments and material received from the public, as well as SUMMARY: E:\FR\FM\17APN1.SGM 17APN1

Agencies

[Federal Register Volume 79, Number 74 (Thursday, April 17, 2014)]
[Notices]
[Pages 21780-21782]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2014-08702]


=======================================================================
-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

[Docket No. DHS-2014-0015]


National Protection and Programs Directorate; Notice of 
Completion of Notification of Cyber-Dependent Infrastructure and 
Process for Requesting Reconsideration of Determinations of Cyber 
Criticality

(Authority: E.O. 13636, 78 FR 11737)

AGENCY: National Protection and Programs Directorate, DHS.

ACTION: Public notice of completion of notification and process for 
requesting reconsideration to owners and operators of cyber-dependent 
infrastructure.

-----------------------------------------------------------------------

SUMMARY: The Secretary of Homeland Security has been directed to 
identify critical infrastructure where a cybersecurity incident could 
reasonably result in catastrophic regional or national effects on 
public health or safety, economic security, or national security. In 
addition to identifying such infrastructure, the Secretary has also 
been directed to confidentially notify owners and operators of critical 
infrastructure identified and establish a mechanism through which 
entities can request reconsideration of that identification, whether 
inclusion or exclusion from this list. This notice informs owners and 
operators of critical infrastructure that the confidential notification 
process is complete and describes the process for requesting 
reconsideration.

DATES: The agency must receive the reconsideration package before May 
15, 2014.

ADDRESSES: Submit reconsideration requests and unclassified written 
reconsideration materials to CDII@HQ.DHS.GOV. See SUPPLEMENTARY 
INFORMATION for formatting instructions.

FOR FURTHER INFORMATION CONTACT: The Office of Cyber and Infrastructure 
Analysis, National Protection and Programs Directorate, United States 
Department of Homeland Security, Washington, DC 20528, or via email at 
cdii@hq.dhs.govmailto:carlos.kizzee@dhs.gov.
    Responsible DHS Official: Under Secretary, National Protection and

[[Page 21781]]

Programs Directorate, United States Department of Homeland Security.

SUPPLEMENTARY INFORMATION:
    Background: In section 9 of Executive Order (E.O.) 13636 the 
President directs the Secretary of Homeland Security to identify 
critical infrastructure where a cybersecurity incident could reasonably 
result in catastrophic regional or national effects on public health or 
safety, economic security, or national security.'' E.O. 13636, 78 FR 
11737 (Feb. 12, 2013). Once that list of infrastructure is transmitted 
to the President in accordance with sec. 9, the Secretary is further 
directed to confidentially notify each entity that it has been 
identified and, ``establish a process through which owners and 
operators of critical infrastructure may submit relevant information 
and request reconsideration of identifications under [this section].'' 
Id at Sec.  9(c).
    The United States Department of Homeland Security (DHS), in 
accordance with the consultative process required under E.O. 13636, 
developed a functions-based approach to identify critical 
infrastructure where ``a cybersecurity incident could reasonably result 
in catastrophic regional or national effects.'' DHS consulted with 
sector stakeholders throughout the identification process including, 
Sector-Specific Agencies, Sector Coordinating Councils, Government 
Coordinating Councils, independent regulatory agencies, subject-matter 
experts, and critical infrastructure owners and operators.
    DHS developed, reviewed, and discussed with private sector entities 
and trade associations criteria for evaluating when a cybersecurity 
incident involving critical infrastructure could reasonably result in 
catastrophic regional or national effects on public health or safety, 
economic security, or national security. ``Catastrophic'' was 
determined to be a higher level of impact than the ``debilitating'' 
standard found in the statutory definition of critical infrastructure. 
The higher threshold ensures that only infrastructure where a 
cybersecurity incident could cause the greatest impact is identified. 
The criteria for determining inclusion of the critical infrastructure 
were designed to assess whether a cybersecurity incident could 
reasonably result in incapacitation of the infrastructure or function 
and whether this incapacitation could cause catastrophic regional or 
national impacts on: Public Health or Safety, Economic Security or 
National Security.
    Identifying cyber-dependent critical infrastructure supports both 
critical infrastructure needs and national security objectives by (1) 
providing the Federal government with the ability to more effectively 
disseminate specific and targeted cybersecurity threat information to 
identified cyber-dependent critical infrastructure owners and 
operators; (2) supporting the prioritization, as appropriate, of 
government resources and programs available to identified cyber-
dependent critical infrastructure; and (3) improving government's 
understanding of the systems or assets whose incapacity or disruption 
would have catastrophic consequences in furtherance of government 
planning, protection, mitigation and response efforts to be provided in 
partnership with impacted state, local, territorial, tribal and private 
sector entities in the event of a cyber incident.
    The Secretary presented the initial list of identified 
infrastructure to the President, through the Assistant to President for 
Homeland Security and Counterterrorism on July 19, 2013. In accordance 
with E.O. 13636, this list will be reviewed and updated annually.
    DHS has completed the process of notifying owners and operators of 
critical infrastructure that were included on the July 19, 2013 initial 
list. If critical infrastructure owners and operators have not been 
contacted by DHS in connection with their status on the initial list, 
then such infrastructure has not been included on the initial list. 
Such infrastructure may be included in subsequent updates based on the 
outcome of reconsideration requests, annual reviews, or amendments to 
the list.
    The opportunity for reconsideration of initial identifications by 
DHS is available to all critical infrastructure owners and operators, 
whether or not their infrastructure has been identified as cyber-
dependent by DHS, in accordance with this notice. The opportunity for 
reconsideration will be provided annually.
    The Secretary has delegated to the Under Secretary for National 
Protection and Programs the authority to address reconsideration 
requests and to make determinations in connection in subsequent 
updates.

Definitions

    ``Critical infrastructure'' means systems and assets, whether 
physical or virtual, so vital to the United States that the incapacity 
or destruction of such systems and assets would have a debilitating 
impact on security, national economic security, national public health 
or safety, or any combination of those matters.
    ``Cyber dependent'' means critical infrastructure that utilizes 
computers, electronic communications systems, electronic communications 
services, wire communication, and/or electronic communication, 
including information contained therein, in order function or be 
maintained.
    ``Cyber incident'' means an event or series of events that impairs 
the confidentiality, integrity, or availability of electronic 
information, information systems, services, or networks.
    ``Reconsideration official'' means the Under Secretary for National 
Protection and Programs, or her or his designee, who will consider 
requests for reconsideration in accordance with the process set forth 
in this notice.

Impact of Being Identified Under Sec. 9

    The primary purpose of identifying critical infrastructure under 
sec. 9 of E.O. 13636 is to better understand national and regional 
cyber dependencies and consequences across critical infrastructure, 
inform planning and program development for federal critical 
infrastructure security and resilience programs, and enable improved 
cyber risk management by the identified critical infrastructure owners 
and operators. Owners and operators of identified cyber-dependent 
critical infrastructure have the opportunity to request expedited 
processing through the DHS Private Sector Clearance Program, which may 
provide access to classified government cybersecurity threat 
information as appropriate. Cyber-dependent critical infrastructure may 
also be prioritized for routine and incident-driven cyber technical 
assistance activities offered by DHS and other agencies. Additionally, 
owners and operators of identified cyber-dependent critical 
infrastructure are encouraged to participate in the National Institute 
of Standards and Technology (NIST) cybersecurity framework for critical 
infrastructure (``NIST framework''). As Federal government resources 
and programs develop and improve to enhance the security and resilience 
of critical infrastructure against cybersecurity threats, cyber-
dependent critical infrastructure will be a continued priority.

Reconsideration Process

Submitting a Reconsideration Request

    Reconsideration of identifications under sec. 9 of E.O. 13636 will 
be based on an evaluation of new information provided to DHS by the 
requesting entity. An entity must initiate the reconsideration process 
in writing.

[[Page 21782]]

However, the entity also may request a meeting with a DHS official (in 
person or by phone) to discuss the additional information they will 
provide in support of their reconsideration request or to seek 
additional information about the basis for identifications. DHS will 
consider meeting requests on a case by case basis and identify an 
appropriate official to participate in such meetings on behalf of the 
reconsideration official.
    Owners and operators of critical infrastructure entities or their 
authorized agents may initiate a reconsideration request by sending an 
email to CDII@HQ.DHS.GOV including:
    1. The entity for reconsideration;
    2. the name, title, telephone number and email address of a 
designated point of contact, whether an employee or non-employee agent, 
for the owner or operator of that entity to whom all communications 
related to the reconsideration process will be directed; and
    3. if desired, a request for a meeting with DHS representatives.
    DHS will confirm the submission of each reconsideration request 
with an email to the submitting entity and will provide a 
reconsideration request number within three days of receipt. Where the 
requesting entity has requested a telephonic or in-person meeting, a 
representative of DHS will contact the entity at the email address 
provided in the initial request to schedule a meeting or inform the 
entity that the requested meeting is not available.

Submission of Reconsideration Materials

    Following DHS confirmation of the request, entities may submit 
reconsideration materials as part of an in-person or telephone meeting 
or in writing. Entities who submit written documentation in lieu of a 
meeting or who choose to provide additional documentation following a 
meeting should submit the information via email (with exceptions noted 
below) in the form of a single attachment. All pages submitted to DHS 
should be double-spaced 12 point Times New Roman text or visual 
material, with 1'' margins and page numbers. Supporting documentation 
should be organized and labeled. Entities should include the DHS-
provided reconsideration request number on each page of the submission.
    Documentation used to justify a change in status for an entity with 
respect to identified cyber-dependent critical infrastructure may 
constitute protected critical infrastructure information (PCII) if it 
satisfies, and is submitted in accordance with, applicable 
requirements. The PCII program is an information-protection program 
that enhances voluntary information sharing between infrastructure 
owners and operators and the government. In order to ensure handling 
under the provisions of the PCII program, owner operators must submit 
information consistent with the Critical Infrastructure Information Act 
(6 U.S.C. 131 et seq), the PCII final rule (6 CFR part 29), and the 
PCII Program Manual. Additional information regarding the PCII program 
may be found at https://www.dhs.gov/pcii.
    Classified information must not be transmitted to 
mailto:cdii@hq.dhs.gov; however, a request for guidance on alternate 
submission guidance may be sent, without any classified information, to 
cdii@hq.dhs.gov. DHS may in its sole discretion grant a reasonable 
extension to the reconsideration submission for the purpose of 
accommodating a request to submit classified information.

Reconsideration Request Review

    A preliminary review by DHS following a meeting or submission of 
the reconsideration materials will evaluate whether any additional 
information is needed to make a decision on the reconsideration 
request. DHS will contact the submitter within 30 days of the meeting 
or submission to request additional information, if needed, or to 
confirm that the reconsideration package is complete. If additional 
information is requested, the submitter will have up to 60 days from 
the date of DHS's request to provide such information, and DHS will 
have another 30 days from the additional submission to deem the package 
complete. Following receipt and review of a complete reconsideration 
package, DHS will provide requesting entities with a written response 
including the basis for its determination.
    If a complete reconsideration package is not received by DHS before 
May 15, 2014, any information provided by a submitter may be considered 
in connection with the next annual update rather than as a request for 
reconsideration of this year's determination.
    In considering requests for reconsideration, DHS may consult with 
sector specific agencies and other appropriate federal entities. 
Information submitted to DHS, including appropriately submitted PCII, 
will be protected in accordance with applicable requirements and used 
only for permitted purposes.
    Entities may contact cdii@hq.dhs.gov at any time to request a 
status update during the reconsideration request review process. After 
a determination has been made in connection with the request, 
subsequent reconsideration requests will not be accepted until the next 
annual review.

    Dated: April 11, 2014.
Suzanne Spaulding,
Under Secretary, National Protection and Programs Directorate, 
Department of Homeland Security.
[FR Doc. 2014-08702 Filed 4-16-14; 8:45 am]
BILLING CODE 9110-9P-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.