National Protection and Programs Directorate; Notice of Completion of Notification of Cyber-Dependent Infrastructure and Process for Requesting Reconsideration of Determinations of Cyber Criticality, 21780-21782 [2014-08702]
Download as PDF
21780
Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
National Institute of Environmental
Health Sciences; Notice of Meeting
TKELLEY on DSK3SPTVN1PROD with NOTICES
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended (5 U.S.C. App.), notice is
hereby given of a meeting of the
National Advisory Environmental
Health Sciences Council.
The meeting will be open to the
public as indicated below, with
attendance limited to space available.
Individuals who plan to attend and
need special assistance, such as sign
language interpretation or other
reasonable accommodations, should
notify the Contact Person listed below
in advance of the meeting.
The meeting will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: National Advisory
Environmental Health Sciences Council.
Date: May 13–14, 2014.
Open: May 13, 2014, 8:30 a.m. to 5:00 p.m.
Agenda: Discussion of program policies
and issues.
Place: Nat. Inst. of Environmental Health
Sciences, Building 101, Rodbell Auditorium,
111 T. W. Alexander Drive, Research
Triangle Park, NC 27709.
Closed: May 14, 2014, 8:30 a.m. to 11:30
a.m.
Agenda: To review and evaluate grant
applications.
Place: Nat. Inst. of Environmental Health
Sciences, Building 101, Rodbell Auditorium,
111 T. W. Alexander Drive, Research
Triangle Park, NC 27709.
Contact Person: Gwen W. Collman, Ph.D.,
Interim Director, Division of Extramural
Research & Training, National Institutes of
Health, Nat. Inst. of Environmental Health
Sciences, 615 Davis Dr., KEY615/3112,
Research Triangle Park, NC 27709, (919) 541–
4980, collman@niehs.nih.gov.
Any interested person may file written
comments with the committee by forwarding
the statement to the Contact Person listed on
this notice. The statement should include the
name, address, telephone number and when
applicable, the business or professional
affiliation of the interested person.
Information is also available on the
Institute’s Council home page:
www.niehs.nih.gov/about/boards/naehsc/
index.cfm, where an agenda and any
VerDate Mar<15>2010
17:28 Apr 16, 2014
Jkt 232001
additional information for the meeting will
be posted when available.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.115, Biometry and Risk
Estimation—Health Risks from
Environmental Exposures; 93.142, NIEHS
Hazardous Waste Worker Health and Safety
Training; 93.143, NIEHS Superfund
Hazardous Substances—Basic Research and
Education; 93.894, Resources and Manpower
Development in the Environmental Health
Sciences; 93.113, Biological Response to
Environmental Health Hazards; 93.114,
Applied Toxicological Research and Testing,
National Institutes of Health, HHS).
Dated: April 11, 2014.
Carolyn A. Baum,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2014–08678 Filed 4–16–14; 8:45 am]
BILLING CODE 4140–01–P
Microbiology and Infectious Diseases
Research, National Institutes of Health, HHS).
Dated: April 11, 2014.
David Clary,
Program Analyst, Office of Federal Advisory
Committee Policy.
[FR Doc. 2014–08680 Filed 4–16–14; 8:45 am]
BILLING CODE 4140–01–P
DEPARTMENT OF HOMELAND
SECURITY
[Docket No. DHS–2014–0015]
National Protection and Programs
Directorate; Notice of Completion of
Notification of Cyber-Dependent
Infrastructure and Process for
Requesting Reconsideration of
Determinations of Cyber Criticality
(Authority: E.O. 13636, 78 FR 11737)
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
National Institutes of Health
National Institute of Allergy and
Infectious Diseases; Notice of Closed
Meeting
Pursuant to section 10(d) of the
Federal Advisory Committee Act, as
amended (5 U.S.C. App.), notice is
hereby given of the following meeting.
The meeting will be closed to the
public in accordance with the
provisions set forth in sections
552b(c)(4) and 552b(c)(6), Title 5 U.S.C.,
as amended. The grant applications and
the discussions could disclose
confidential trade secrets or commercial
property such as patentable material,
and personal information concerning
individuals associated with the grant
applications, the disclosure of which
would constitute a clearly unwarranted
invasion of personal privacy.
Name of Committee: National Institute of
Allergy and Infectious Diseases Special
Emphasis Panel; NIAID SBIR Phase II
Clinical Trial Implementation Cooperative
Agreement (U44) and Clinical Trial Planning
Grants (R34).
Date: May 12, 2014.
Time: 1:00 p.m. to 5:00 p.m.
Agenda: To review and evaluate grant
applications.
Place: National Institutes of Health, 6700B
Rockledge Drive, Bethesda, MD 20817,
(Telephone Conference Call).
Contact Person: Quirijn Vos, Ph.D.,
Scientific Review Officer Scientific Review
Program, Division of Extramural, Activities
DHHS/NIH/NIAID, 6700B Rockledge Drive,
MSC, 7616 Bethesda, MD 20892, 301–451–
2666, qvos@niaid.nih.gov.
(Catalogue of Federal Domestic Assistance
Program Nos. 93.855, Allergy, Immunology,
and Transplantation Research; 93.856,
PO 00000
Frm 00070
Fmt 4703
Sfmt 4703
National Protection and
Programs Directorate, DHS.
ACTION: Public notice of completion of
notification and process for requesting
reconsideration to owners and operators
of cyber-dependent infrastructure.
AGENCY:
The Secretary of Homeland
Security has been directed to identify
critical infrastructure where a
cybersecurity incident could reasonably
result in catastrophic regional or
national effects on public health or
safety, economic security, or national
security. In addition to identifying such
infrastructure, the Secretary has also
been directed to confidentially notify
owners and operators of critical
infrastructure identified and establish a
mechanism through which entities can
request reconsideration of that
identification, whether inclusion or
exclusion from this list. This notice
informs owners and operators of critical
infrastructure that the confidential
notification process is complete and
describes the process for requesting
reconsideration.
DATES: The agency must receive the
reconsideration package before May 15,
2014.
ADDRESSES: Submit reconsideration
requests and unclassified written
reconsideration materials to CDII@
HQ.DHS.GOV. See SUPPLEMENTARY
INFORMATION for formatting instructions.
FOR FURTHER INFORMATION CONTACT: The
Office of Cyber and Infrastructure
Analysis, National Protection and
Programs Directorate, United States
Department of Homeland Security,
Washington, DC 20528, or via email at
cdii@hq.dhs.govmailto:carlos.kizzee@
dhs.gov.
Responsible DHS Official: Under
Secretary, National Protection and
SUMMARY:
E:\FR\FM\17APN1.SGM
17APN1
TKELLEY on DSK3SPTVN1PROD with NOTICES
Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices
Programs Directorate, United States
Department of Homeland Security.
SUPPLEMENTARY INFORMATION:
Background: In section 9 of Executive
Order (E.O.) 13636 the President directs
the Secretary of Homeland Security to
identify critical infrastructure where a
cybersecurity incident could reasonably
result in catastrophic regional or
national effects on public health or
safety, economic security, or national
security.’’ E.O. 13636, 78 FR 11737 (Feb.
12, 2013). Once that list of infrastructure
is transmitted to the President in
accordance with sec. 9, the Secretary is
further directed to confidentially notify
each entity that it has been identified
and, ‘‘establish a process through which
owners and operators of critical
infrastructure may submit relevant
information and request reconsideration
of identifications under [this section].’’
Id at § 9(c).
The United States Department of
Homeland Security (DHS), in
accordance with the consultative
process required under E.O. 13636,
developed a functions-based approach
to identify critical infrastructure where
‘‘a cybersecurity incident could
reasonably result in catastrophic
regional or national effects.’’ DHS
consulted with sector stakeholders
throughout the identification process
including, Sector-Specific Agencies,
Sector Coordinating Councils,
Government Coordinating Councils,
independent regulatory agencies,
subject-matter experts, and critical
infrastructure owners and operators.
DHS developed, reviewed, and
discussed with private sector entities
and trade associations criteria for
evaluating when a cybersecurity
incident involving critical infrastructure
could reasonably result in catastrophic
regional or national effects on public
health or safety, economic security, or
national security. ‘‘Catastrophic’’ was
determined to be a higher level of
impact than the ‘‘debilitating’’ standard
found in the statutory definition of
critical infrastructure. The higher
threshold ensures that only
infrastructure where a cybersecurity
incident could cause the greatest impact
is identified. The criteria for
determining inclusion of the critical
infrastructure were designed to assess
whether a cybersecurity incident could
reasonably result in incapacitation of
the infrastructure or function and
whether this incapacitation could cause
catastrophic regional or national
impacts on: Public Health or Safety,
Economic Security or National Security.
Identifying cyber-dependent critical
infrastructure supports both critical
VerDate Mar<15>2010
17:28 Apr 16, 2014
Jkt 232001
infrastructure needs and national
security objectives by (1) providing the
Federal government with the ability to
more effectively disseminate specific
and targeted cybersecurity threat
information to identified cyberdependent critical infrastructure owners
and operators; (2) supporting the
prioritization, as appropriate, of
government resources and programs
available to identified cyber-dependent
critical infrastructure; and (3) improving
government’s understanding of the
systems or assets whose incapacity or
disruption would have catastrophic
consequences in furtherance of
government planning, protection,
mitigation and response efforts to be
provided in partnership with impacted
state, local, territorial, tribal and private
sector entities in the event of a cyber
incident.
The Secretary presented the initial list
of identified infrastructure to the
President, through the Assistant to
President for Homeland Security and
Counterterrorism on July 19, 2013. In
accordance with E.O. 13636, this list
will be reviewed and updated annually.
DHS has completed the process of
notifying owners and operators of
critical infrastructure that were
included on the July 19, 2013 initial list.
If critical infrastructure owners and
operators have not been contacted by
DHS in connection with their status on
the initial list, then such infrastructure
has not been included on the initial list.
Such infrastructure may be included in
subsequent updates based on the
outcome of reconsideration requests,
annual reviews, or amendments to the
list.
The opportunity for reconsideration
of initial identifications by DHS is
available to all critical infrastructure
owners and operators, whether or not
their infrastructure has been identified
as cyber-dependent by DHS, in
accordance with this notice. The
opportunity for reconsideration will be
provided annually.
The Secretary has delegated to the
Under Secretary for National Protection
and Programs the authority to address
reconsideration requests and to make
determinations in connection in
subsequent updates.
Definitions
‘‘Critical infrastructure’’ means
systems and assets, whether physical or
virtual, so vital to the United States that
the incapacity or destruction of such
systems and assets would have a
debilitating impact on security, national
economic security, national public
health or safety, or any combination of
those matters.
PO 00000
Frm 00071
Fmt 4703
Sfmt 4703
21781
‘‘Cyber dependent’’ means critical
infrastructure that utilizes computers,
electronic communications systems,
electronic communications services,
wire communication, and/or electronic
communication, including information
contained therein, in order function or
be maintained.
‘‘Cyber incident’’ means an event or
series of events that impairs the
confidentiality, integrity, or availability
of electronic information, information
systems, services, or networks.
‘‘Reconsideration official’’ means the
Under Secretary for National Protection
and Programs, or her or his designee,
who will consider requests for
reconsideration in accordance with the
process set forth in this notice.
Impact of Being Identified Under Sec. 9
The primary purpose of identifying
critical infrastructure under sec. 9 of
E.O. 13636 is to better understand
national and regional cyber
dependencies and consequences across
critical infrastructure, inform planning
and program development for federal
critical infrastructure security and
resilience programs, and enable
improved cyber risk management by the
identified critical infrastructure owners
and operators. Owners and operators of
identified cyber-dependent critical
infrastructure have the opportunity to
request expedited processing through
the DHS Private Sector Clearance
Program, which may provide access to
classified government cybersecurity
threat information as appropriate.
Cyber-dependent critical infrastructure
may also be prioritized for routine and
incident-driven cyber technical
assistance activities offered by DHS and
other agencies. Additionally, owners
and operators of identified cyberdependent critical infrastructure are
encouraged to participate in the
National Institute of Standards and
Technology (NIST) cybersecurity
framework for critical infrastructure
(‘‘NIST framework’’). As Federal
government resources and programs
develop and improve to enhance the
security and resilience of critical
infrastructure against cybersecurity
threats, cyber-dependent critical
infrastructure will be a continued
priority.
Reconsideration Process
Submitting a Reconsideration Request
Reconsideration of identifications
under sec. 9 of E.O. 13636 will be based
on an evaluation of new information
provided to DHS by the requesting
entity. An entity must initiate the
reconsideration process in writing.
E:\FR\FM\17APN1.SGM
17APN1
21782
Federal Register / Vol. 79, No. 74 / Thursday, April 17, 2014 / Notices
TKELLEY on DSK3SPTVN1PROD with NOTICES
However, the entity also may request a
meeting with a DHS official (in person
or by phone) to discuss the additional
information they will provide in
support of their reconsideration request
or to seek additional information about
the basis for identifications. DHS will
consider meeting requests on a case by
case basis and identify an appropriate
official to participate in such meetings
on behalf of the reconsideration official.
Owners and operators of critical
infrastructure entities or their
authorized agents may initiate a
reconsideration request by sending an
email to CDII@HQ.DHS.GOV including:
1. The entity for reconsideration;
2. the name, title, telephone number
and email address of a designated point
of contact, whether an employee or nonemployee agent, for the owner or
operator of that entity to whom all
communications related to the
reconsideration process will be directed;
and
3. if desired, a request for a meeting
with DHS representatives.
DHS will confirm the submission of
each reconsideration request with an
email to the submitting entity and will
provide a reconsideration request
number within three days of receipt.
Where the requesting entity has
requested a telephonic or in-person
meeting, a representative of DHS will
contact the entity at the email address
provided in the initial request to
schedule a meeting or inform the entity
that the requested meeting is not
available.
Submission of Reconsideration
Materials
Following DHS confirmation of the
request, entities may submit
reconsideration materials as part of an
in-person or telephone meeting or in
writing. Entities who submit written
documentation in lieu of a meeting or
who choose to provide additional
documentation following a meeting
should submit the information via email
(with exceptions noted below) in the
form of a single attachment. All pages
submitted to DHS should be doublespaced 12 point Times New Roman text
or visual material, with 1’’ margins and
page numbers. Supporting
documentation should be organized and
labeled. Entities should include the
DHS-provided reconsideration request
number on each page of the submission.
Documentation used to justify a
change in status for an entity with
respect to identified cyber-dependent
critical infrastructure may constitute
protected critical infrastructure
information (PCII) if it satisfies, and is
submitted in accordance with,
VerDate Mar<15>2010
17:28 Apr 16, 2014
Jkt 232001
applicable requirements. The PCII
program is an information-protection
program that enhances voluntary
information sharing between
infrastructure owners and operators and
the government. In order to ensure
handling under the provisions of the
PCII program, owner operators must
submit information consistent with the
Critical Infrastructure Information Act
(6 U.S.C. 131 et seq), the PCII final rule
(6 CFR part 29), and the PCII Program
Manual. Additional information
regarding the PCII program may be
found at https://www.dhs.gov/pcii.
Classified information must not be
transmitted to mailto:cdii@hq.dhs.gov;
however, a request for guidance on
alternate submission guidance may be
sent, without any classified information,
to cdii@hq.dhs.gov. DHS may in its sole
discretion grant a reasonable extension
to the reconsideration submission for
the purpose of accommodating a request
to submit classified information.
Reconsideration Request Review
A preliminary review by DHS
following a meeting or submission of
the reconsideration materials will
evaluate whether any additional
information is needed to make a
decision on the reconsideration request.
DHS will contact the submitter within
30 days of the meeting or submission to
request additional information, if
needed, or to confirm that the
reconsideration package is complete. If
additional information is requested, the
submitter will have up to 60 days from
the date of DHS’s request to provide
such information, and DHS will have
another 30 days from the additional
submission to deem the package
complete. Following receipt and review
of a complete reconsideration package,
DHS will provide requesting entities
with a written response including the
basis for its determination.
If a complete reconsideration package
is not received by DHS before May 15,
2014, any information provided by a
submitter may be considered in
connection with the next annual update
rather than as a request for
reconsideration of this year’s
determination.
In considering requests for
reconsideration, DHS may consult with
sector specific agencies and other
appropriate federal entities. Information
submitted to DHS, including
appropriately submitted PCII, will be
protected in accordance with applicable
requirements and used only for
permitted purposes.
Entities may contact cdii@hq.dhs.gov
at any time to request a status update
during the reconsideration request
PO 00000
Frm 00072
Fmt 4703
Sfmt 4703
review process. After a determination
has been made in connection with the
request, subsequent reconsideration
requests will not be accepted until the
next annual review.
Dated: April 11, 2014.
Suzanne Spaulding,
Under Secretary, National Protection and
Programs Directorate, Department of
Homeland Security.
[FR Doc. 2014–08702 Filed 4–16–14; 8:45 am]
BILLING CODE 9110–9P–P
DEPARTMENT OF HOMELAND
SECURITY
Coast Guard
[Docket Number USCG–2009–0139; OMB
Control Number: 1625–0043]
Information Collection Request to
Office of Management and Budget
Coast Guard, DHS.
Sixty-day notice requesting
comments.
AGENCY:
ACTION:
In compliance with the
Paperwork Reduction Act of 1995, the
Coast Guard plans to submit an
Information Collection Request (ICR) to
the Office of Management and Budget
(OMB), Office of Information and
Regulatory Affairs (OIRA), requesting a
revision to the following collection of
information: 1625–0043, Ports and
Waterways Safety Act—Title 33,
Subchapter P. The Coast Guard invites
comments as described below.
DATES: Comments must reach the Coast
Guard on or before June 16, 2014.
ADDRESSES: You may submit comments
identified by Coast Guard docket
number [USCG–2009–0139] to the
Docket Management Facility (DMF) at
the U.S. Department of Transportation
(DOT). To avoid duplicate submissions,
please use only one of the following
means:
(1) Online: https://
www.regulations.gov.
(2) Mail: DMF (M–30), DOT, West
Building Ground Floor, Room W12–140,
1200 New Jersey Avenue SE.,
Washington, DC 20590–0001.
(3) Hand delivery: Same as mail
address above, between 9 a.m. and 5
p.m., Monday through Friday, except
Federal holidays. The telephone number
is 202–366–9329.
(4) Fax: 202–493–2251. To ensure
your comments are received in a timely
manner, mark the fax, to attention Desk
Officer for the Coast Guard.
The DMF maintains the public docket
for this Notice. Comments and material
received from the public, as well as
SUMMARY:
E:\FR\FM\17APN1.SGM
17APN1
Agencies
[Federal Register Volume 79, Number 74 (Thursday, April 17, 2014)]
[Notices]
[Pages 21780-21782]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2014-08702]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF HOMELAND SECURITY
[Docket No. DHS-2014-0015]
National Protection and Programs Directorate; Notice of
Completion of Notification of Cyber-Dependent Infrastructure and
Process for Requesting Reconsideration of Determinations of Cyber
Criticality
(Authority: E.O. 13636, 78 FR 11737)
AGENCY: National Protection and Programs Directorate, DHS.
ACTION: Public notice of completion of notification and process for
requesting reconsideration to owners and operators of cyber-dependent
infrastructure.
-----------------------------------------------------------------------
SUMMARY: The Secretary of Homeland Security has been directed to
identify critical infrastructure where a cybersecurity incident could
reasonably result in catastrophic regional or national effects on
public health or safety, economic security, or national security. In
addition to identifying such infrastructure, the Secretary has also
been directed to confidentially notify owners and operators of critical
infrastructure identified and establish a mechanism through which
entities can request reconsideration of that identification, whether
inclusion or exclusion from this list. This notice informs owners and
operators of critical infrastructure that the confidential notification
process is complete and describes the process for requesting
reconsideration.
DATES: The agency must receive the reconsideration package before May
15, 2014.
ADDRESSES: Submit reconsideration requests and unclassified written
reconsideration materials to CDII@HQ.DHS.GOV. See SUPPLEMENTARY
INFORMATION for formatting instructions.
FOR FURTHER INFORMATION CONTACT: The Office of Cyber and Infrastructure
Analysis, National Protection and Programs Directorate, United States
Department of Homeland Security, Washington, DC 20528, or via email at
cdii@hq.dhs.govmailto:carlos.kizzee@dhs.gov.
Responsible DHS Official: Under Secretary, National Protection and
[[Page 21781]]
Programs Directorate, United States Department of Homeland Security.
SUPPLEMENTARY INFORMATION:
Background: In section 9 of Executive Order (E.O.) 13636 the
President directs the Secretary of Homeland Security to identify
critical infrastructure where a cybersecurity incident could reasonably
result in catastrophic regional or national effects on public health or
safety, economic security, or national security.'' E.O. 13636, 78 FR
11737 (Feb. 12, 2013). Once that list of infrastructure is transmitted
to the President in accordance with sec. 9, the Secretary is further
directed to confidentially notify each entity that it has been
identified and, ``establish a process through which owners and
operators of critical infrastructure may submit relevant information
and request reconsideration of identifications under [this section].''
Id at Sec. 9(c).
The United States Department of Homeland Security (DHS), in
accordance with the consultative process required under E.O. 13636,
developed a functions-based approach to identify critical
infrastructure where ``a cybersecurity incident could reasonably result
in catastrophic regional or national effects.'' DHS consulted with
sector stakeholders throughout the identification process including,
Sector-Specific Agencies, Sector Coordinating Councils, Government
Coordinating Councils, independent regulatory agencies, subject-matter
experts, and critical infrastructure owners and operators.
DHS developed, reviewed, and discussed with private sector entities
and trade associations criteria for evaluating when a cybersecurity
incident involving critical infrastructure could reasonably result in
catastrophic regional or national effects on public health or safety,
economic security, or national security. ``Catastrophic'' was
determined to be a higher level of impact than the ``debilitating''
standard found in the statutory definition of critical infrastructure.
The higher threshold ensures that only infrastructure where a
cybersecurity incident could cause the greatest impact is identified.
The criteria for determining inclusion of the critical infrastructure
were designed to assess whether a cybersecurity incident could
reasonably result in incapacitation of the infrastructure or function
and whether this incapacitation could cause catastrophic regional or
national impacts on: Public Health or Safety, Economic Security or
National Security.
Identifying cyber-dependent critical infrastructure supports both
critical infrastructure needs and national security objectives by (1)
providing the Federal government with the ability to more effectively
disseminate specific and targeted cybersecurity threat information to
identified cyber-dependent critical infrastructure owners and
operators; (2) supporting the prioritization, as appropriate, of
government resources and programs available to identified cyber-
dependent critical infrastructure; and (3) improving government's
understanding of the systems or assets whose incapacity or disruption
would have catastrophic consequences in furtherance of government
planning, protection, mitigation and response efforts to be provided in
partnership with impacted state, local, territorial, tribal and private
sector entities in the event of a cyber incident.
The Secretary presented the initial list of identified
infrastructure to the President, through the Assistant to President for
Homeland Security and Counterterrorism on July 19, 2013. In accordance
with E.O. 13636, this list will be reviewed and updated annually.
DHS has completed the process of notifying owners and operators of
critical infrastructure that were included on the July 19, 2013 initial
list. If critical infrastructure owners and operators have not been
contacted by DHS in connection with their status on the initial list,
then such infrastructure has not been included on the initial list.
Such infrastructure may be included in subsequent updates based on the
outcome of reconsideration requests, annual reviews, or amendments to
the list.
The opportunity for reconsideration of initial identifications by
DHS is available to all critical infrastructure owners and operators,
whether or not their infrastructure has been identified as cyber-
dependent by DHS, in accordance with this notice. The opportunity for
reconsideration will be provided annually.
The Secretary has delegated to the Under Secretary for National
Protection and Programs the authority to address reconsideration
requests and to make determinations in connection in subsequent
updates.
Definitions
``Critical infrastructure'' means systems and assets, whether
physical or virtual, so vital to the United States that the incapacity
or destruction of such systems and assets would have a debilitating
impact on security, national economic security, national public health
or safety, or any combination of those matters.
``Cyber dependent'' means critical infrastructure that utilizes
computers, electronic communications systems, electronic communications
services, wire communication, and/or electronic communication,
including information contained therein, in order function or be
maintained.
``Cyber incident'' means an event or series of events that impairs
the confidentiality, integrity, or availability of electronic
information, information systems, services, or networks.
``Reconsideration official'' means the Under Secretary for National
Protection and Programs, or her or his designee, who will consider
requests for reconsideration in accordance with the process set forth
in this notice.
Impact of Being Identified Under Sec. 9
The primary purpose of identifying critical infrastructure under
sec. 9 of E.O. 13636 is to better understand national and regional
cyber dependencies and consequences across critical infrastructure,
inform planning and program development for federal critical
infrastructure security and resilience programs, and enable improved
cyber risk management by the identified critical infrastructure owners
and operators. Owners and operators of identified cyber-dependent
critical infrastructure have the opportunity to request expedited
processing through the DHS Private Sector Clearance Program, which may
provide access to classified government cybersecurity threat
information as appropriate. Cyber-dependent critical infrastructure may
also be prioritized for routine and incident-driven cyber technical
assistance activities offered by DHS and other agencies. Additionally,
owners and operators of identified cyber-dependent critical
infrastructure are encouraged to participate in the National Institute
of Standards and Technology (NIST) cybersecurity framework for critical
infrastructure (``NIST framework''). As Federal government resources
and programs develop and improve to enhance the security and resilience
of critical infrastructure against cybersecurity threats, cyber-
dependent critical infrastructure will be a continued priority.
Reconsideration Process
Submitting a Reconsideration Request
Reconsideration of identifications under sec. 9 of E.O. 13636 will
be based on an evaluation of new information provided to DHS by the
requesting entity. An entity must initiate the reconsideration process
in writing.
[[Page 21782]]
However, the entity also may request a meeting with a DHS official (in
person or by phone) to discuss the additional information they will
provide in support of their reconsideration request or to seek
additional information about the basis for identifications. DHS will
consider meeting requests on a case by case basis and identify an
appropriate official to participate in such meetings on behalf of the
reconsideration official.
Owners and operators of critical infrastructure entities or their
authorized agents may initiate a reconsideration request by sending an
email to CDII@HQ.DHS.GOV including:
1. The entity for reconsideration;
2. the name, title, telephone number and email address of a
designated point of contact, whether an employee or non-employee agent,
for the owner or operator of that entity to whom all communications
related to the reconsideration process will be directed; and
3. if desired, a request for a meeting with DHS representatives.
DHS will confirm the submission of each reconsideration request
with an email to the submitting entity and will provide a
reconsideration request number within three days of receipt. Where the
requesting entity has requested a telephonic or in-person meeting, a
representative of DHS will contact the entity at the email address
provided in the initial request to schedule a meeting or inform the
entity that the requested meeting is not available.
Submission of Reconsideration Materials
Following DHS confirmation of the request, entities may submit
reconsideration materials as part of an in-person or telephone meeting
or in writing. Entities who submit written documentation in lieu of a
meeting or who choose to provide additional documentation following a
meeting should submit the information via email (with exceptions noted
below) in the form of a single attachment. All pages submitted to DHS
should be double-spaced 12 point Times New Roman text or visual
material, with 1'' margins and page numbers. Supporting documentation
should be organized and labeled. Entities should include the DHS-
provided reconsideration request number on each page of the submission.
Documentation used to justify a change in status for an entity with
respect to identified cyber-dependent critical infrastructure may
constitute protected critical infrastructure information (PCII) if it
satisfies, and is submitted in accordance with, applicable
requirements. The PCII program is an information-protection program
that enhances voluntary information sharing between infrastructure
owners and operators and the government. In order to ensure handling
under the provisions of the PCII program, owner operators must submit
information consistent with the Critical Infrastructure Information Act
(6 U.S.C. 131 et seq), the PCII final rule (6 CFR part 29), and the
PCII Program Manual. Additional information regarding the PCII program
may be found at https://www.dhs.gov/pcii.
Classified information must not be transmitted to
mailto:cdii@hq.dhs.gov; however, a request for guidance on alternate
submission guidance may be sent, without any classified information, to
cdii@hq.dhs.gov. DHS may in its sole discretion grant a reasonable
extension to the reconsideration submission for the purpose of
accommodating a request to submit classified information.
Reconsideration Request Review
A preliminary review by DHS following a meeting or submission of
the reconsideration materials will evaluate whether any additional
information is needed to make a decision on the reconsideration
request. DHS will contact the submitter within 30 days of the meeting
or submission to request additional information, if needed, or to
confirm that the reconsideration package is complete. If additional
information is requested, the submitter will have up to 60 days from
the date of DHS's request to provide such information, and DHS will
have another 30 days from the additional submission to deem the package
complete. Following receipt and review of a complete reconsideration
package, DHS will provide requesting entities with a written response
including the basis for its determination.
If a complete reconsideration package is not received by DHS before
May 15, 2014, any information provided by a submitter may be considered
in connection with the next annual update rather than as a request for
reconsideration of this year's determination.
In considering requests for reconsideration, DHS may consult with
sector specific agencies and other appropriate federal entities.
Information submitted to DHS, including appropriately submitted PCII,
will be protected in accordance with applicable requirements and used
only for permitted purposes.
Entities may contact cdii@hq.dhs.gov at any time to request a
status update during the reconsideration request review process. After
a determination has been made in connection with the request,
subsequent reconsideration requests will not be accepted until the next
annual review.
Dated: April 11, 2014.
Suzanne Spaulding,
Under Secretary, National Protection and Programs Directorate,
Department of Homeland Security.
[FR Doc. 2014-08702 Filed 4-16-14; 8:45 am]
BILLING CODE 9110-9P-P