Views on the Framework for Improving Critical Infrastructure Cybersecurity, 7506 [2016-02860]
Download as PDF
7506
Federal Register / Vol. 81, No. 29 / Friday, February 12, 2016 / Notices
circumstances review are requested to
submit with each argument: (1) A
statement of the issue; (2) a brief
summary of the argument; and (3) a
table of authorities. Interested parties
who wish to comment on the
preliminary results must file briefs
electronically using Enforcement and
Compliance’s Antidumping and
Countervailing Duty Centralized
Electronic Service System (ACCESS).
ACCESS is available to registered users
at https://access.trade.gov. An
electronically-filed document must be
received successfully in its entirety by
the Department’s electronic records
system, ACCESS, by 5 p.m. Eastern
Time on the date the document is due.
Interested parties that wish to request
a hearing must submit a written request
to the Assistant Secretary for
Enforcement and Compliance, filed
electronically via ACCESS, within 14
days of publication of this notice.19
Parties will be notified of the time and
date of any hearing, if requested.20
Consistent with 19 CFR 351.216(e),
we intend to issue the final results of
this changed circumstance review no
later than 270 days after the date on
which this review was initiated, or
within 45 days of publication of these
preliminary results if all parties agree to
our preliminary finding.
We are issuing and publishing this
finding and notice in accordance with
sections 751(b)(1) and 777(i)(1) of the
Act, and 19 CFR 351.216 and
351.221(c)(3)(ii).
Dated: February 5, 2016.
Paul Piquado,
Assistant Secretary for Enforcement and
Compliance.
[FR Doc. 2016–02997 Filed 2–11–16; 8:45 am]
BILLING CODE 3510–DS–P
DEPARTMENT OF COMMERCE
National Institute of Standards and
Technology
[Docket Number 151103999–6076–02]
Views on the Framework for Improving
Critical Infrastructure Cybersecurity
National Institute of Standards
and Technology, Commerce.
ACTION: Notice; extension of comment
period.
asabaliauskas on DSK9F6TC42PROD with NOTICES2
AGENCY:
The National Institute of
Standards and Technology (NIST) is
extending the period for submitting
comments relating to the ‘‘Framework
SUMMARY:
17:38 Feb 11, 2016
Jkt 238001
Comments must be received by
5:00 p.m. Eastern time on February 23,
2016. Comments received after February
9, 2016 and before publication of this
notice are deemed to be timely.
DATES:
Written comments may be
submitted by mail to Diane Honeycutt,
National Institute of Standards and
Technology, 100 Bureau Drive, Stop
8930, Gaithersburg, MD 20899. Online
submissions in electronic form may be
sent to cyberframework@nist.gov in any
of the following formats: HTML; ASCII;
Word; RTF; or PDF. Please include your
name and your organization’s name (if
any), and cite ‘‘Views on the Framework
for Improving Critical Infrastructure
Cybersecurity’’ in all correspondence.
Comments containing references,
studies, research, and other empirical
data that are not widely published
should include copies of the referenced
materials. Please do not submit
additional materials.
All comments received in response to
this RFI will be posted at https://www.
nist.gov/cyberframework/cybersecurityframework-rfi.cfm without change or
redaction, so commenters should not
include information they do not wish to
be posted (e.g., personal or confidential
business information).
ADDRESSES:
For
questions about this RFI contact: Diane
Honeycutt, National Institute of
Standards and Technology, 100 Bureau
Drive, Stop 8930, Gaithersburg, MD
20899 or cyberframework@nist.gov.
Please direct media inquiries to NIST’s
Office of Public Affairs at (301) 975–
2762.
Enhancement Act of 2014 1 to ‘‘facilitate
and support the development of a
voluntary, consensus-based, industryled set of standards, guidelines, best
practices, methodologies, procedures,
and processes to cost-effectively reduce
cyber risks to critical infrastructure.’’ 2
Executive Order 13636, ‘‘Improving
Critical Infrastructure Cybersecurity’’ 3
tasked the Secretary of Commerce to
direct the Director of NIST to lead the
development of a framework to reduce
cyber risks to critical infrastructure. A
final version of Framework 1.0 was
published on February 12, 2014, after a
year-long, open process involving
private and public sector organizations,
including extensive industry input and
public comments, and announced in the
Federal Register (79 FR 9167) on
February 18, 2014. On December 11,
2015 NIST published a RFI in the
Federal Register (80 FR 76934) seeking
information about the variety of ways in
which the Framework is being used to
improve cybersecurity risk management,
how best practices for using the
Framework are being shared, the
relative value of different parts of the
Framework, the possible need for an
update of the Framework, and options
for the long-term governance of the
Framework. NIST is extending the
comment period announced in the
December 11, 2015 RFI from February 9,
2016 to February 23, 2016 to allow
comments to be submitted during a
timeframe in which a variety of
cybersecurity events are scheduled to
occur.
Kevin Kimball,
Chief of Staff.
[FR Doc. 2016–02860 Filed 2–11–16; 8:45 am]
BILLING CODE 3510–13–P
FOR FURTHER INFORMATION CONTACT:
NIST is
extending the comment period
announced in the December 11, 2015
Request for Information (RFI) (80 FR
76934) through February 23, 2016. NIST
is authorized by the Cybersecurity
SUPPLEMENTARY INFORMATION:
19 See 19 CFR 351.310(c); see also 19 CFR 351.303
for general filing requirements.
20 See 19 CFR 351.310.
VerDate Sep<11>2014
for Improving Critical Infrastructure
Cybersecurity’’ (the ‘‘Framework’’)
through February 23, 2016. In a Request
for Information (RFI) that published in
the Federal Register on December 11,
2015 (80 FR 76934), NIST requested
information about the variety of ways in
which the Framework is being used to
improve cybersecurity risk management,
how best practices for using the
Framework are being shared, the
relative value of different parts of the
Framework, the possible need for an
update of the Framework, and options
for the long-term governance of the
Framework. NIST is extending the
comment period announced in the
December 11, 2015 RFI from February 9,
2016 to February 23, 2016.
PO 00000
Frm 00010
Fmt 4703
Sfmt 9990
1 Public Law 113–274 (2014): https://www.gpo.
gov/fdsys/pkg/PLAW-113publ274/pdf/PLAW113publ274.pdf
2 Id., codified in relevant part at 15 U.S.C.
272(c)(15). Congress’s intent was to codify NIST’s
role in Executive Order No. 13636: ‘‘Title I would
codify certain elements of Executive Order 13636
by directing the National Institute of Standards and
Technology (NIST) to develop a framework of
voluntary standards designed to reduce risks arising
from cyberattacks on critical infrastructure that is
privately owned and operated.’’ S. Rep. No. 113–
270, at 9 (2014).
3 Exec. Order No. 13636, Improving Critical
Infrastructure Cybersecurity, 78 FR 11739 (Feb. 19,
2013).
E:\FR\FM\12FEN1.SGM
12FEN1
Agencies
[Federal Register Volume 81, Number 29 (Friday, February 12, 2016)]
[Notices]
[Page 7506]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-02860]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
National Institute of Standards and Technology
[Docket Number 151103999-6076-02]
Views on the Framework for Improving Critical Infrastructure
Cybersecurity
AGENCY: National Institute of Standards and Technology, Commerce.
ACTION: Notice; extension of comment period.
-----------------------------------------------------------------------
SUMMARY: The National Institute of Standards and Technology (NIST) is
extending the period for submitting comments relating to the
``Framework for Improving Critical Infrastructure Cybersecurity'' (the
``Framework'') through February 23, 2016. In a Request for Information
(RFI) that published in the Federal Register on December 11, 2015 (80
FR 76934), NIST requested information about the variety of ways in
which the Framework is being used to improve cybersecurity risk
management, how best practices for using the Framework are being
shared, the relative value of different parts of the Framework, the
possible need for an update of the Framework, and options for the long-
term governance of the Framework. NIST is extending the comment period
announced in the December 11, 2015 RFI from February 9, 2016 to
February 23, 2016.
DATES: Comments must be received by 5:00 p.m. Eastern time on February
23, 2016. Comments received after February 9, 2016 and before
publication of this notice are deemed to be timely.
ADDRESSES: Written comments may be submitted by mail to Diane
Honeycutt, National Institute of Standards and Technology, 100 Bureau
Drive, Stop 8930, Gaithersburg, MD 20899. Online submissions in
electronic form may be sent to cyberframework@nist.gov in any of the
following formats: HTML; ASCII; Word; RTF; or PDF. Please include your
name and your organization's name (if any), and cite ``Views on the
Framework for Improving Critical Infrastructure Cybersecurity'' in all
correspondence. Comments containing references, studies, research, and
other empirical data that are not widely published should include
copies of the referenced materials. Please do not submit additional
materials.
All comments received in response to this RFI will be posted at
https://www.nist.gov/cyberframework/cybersecurity-framework-rfi.cfm
without change or redaction, so commenters should not include
information they do not wish to be posted (e.g., personal or
confidential business information).
FOR FURTHER INFORMATION CONTACT: For questions about this RFI contact:
Diane Honeycutt, National Institute of Standards and Technology, 100
Bureau Drive, Stop 8930, Gaithersburg, MD 20899 or
cyberframework@nist.gov. Please direct media inquiries to NIST's Office
of Public Affairs at (301) 975-2762.
SUPPLEMENTARY INFORMATION: NIST is extending the comment period
announced in the December 11, 2015 Request for Information (RFI) (80 FR
76934) through February 23, 2016. NIST is authorized by the
Cybersecurity Enhancement Act of 2014 \1\ to ``facilitate and support
the development of a voluntary, consensus-based, industry-led set of
standards, guidelines, best practices, methodologies, procedures, and
processes to cost-effectively reduce cyber risks to critical
infrastructure.'' \2\ Executive Order 13636, ``Improving Critical
Infrastructure Cybersecurity'' \3\ tasked the Secretary of Commerce to
direct the Director of NIST to lead the development of a framework to
reduce cyber risks to critical infrastructure. A final version of
Framework 1.0 was published on February 12, 2014, after a year-long,
open process involving private and public sector organizations,
including extensive industry input and public comments, and announced
in the Federal Register (79 FR 9167) on February 18, 2014. On December
11, 2015 NIST published a RFI in the Federal Register (80 FR 76934)
seeking information about the variety of ways in which the Framework is
being used to improve cybersecurity risk management, how best practices
for using the Framework are being shared, the relative value of
different parts of the Framework, the possible need for an update of
the Framework, and options for the long-term governance of the
Framework. NIST is extending the comment period announced in the
December 11, 2015 RFI from February 9, 2016 to February 23, 2016 to
allow comments to be submitted during a timeframe in which a variety of
cybersecurity events are scheduled to occur.
---------------------------------------------------------------------------
\1\ Public Law 113-274 (2014): https://www.gpo.gov/fdsys/pkg/PLAW-113publ274/pdf/PLAW-113publ274.pdf
\2\ Id., codified in relevant part at 15 U.S.C. 272(c)(15).
Congress's intent was to codify NIST's role in Executive Order No.
13636: ``Title I would codify certain elements of Executive Order
13636 by directing the National Institute of Standards and
Technology (NIST) to develop a framework of voluntary standards
designed to reduce risks arising from cyberattacks on critical
infrastructure that is privately owned and operated.'' S. Rep. No.
113-270, at 9 (2014).
\3\ Exec. Order No. 13636, Improving Critical Infrastructure
Cybersecurity, 78 FR 11739 (Feb. 19, 2013).
Kevin Kimball,
Chief of Staff.
[FR Doc. 2016-02860 Filed 2-11-16; 8:45 am]
BILLING CODE 3510-13-P