Minimum Standards for Driver's Licenses and Identification Cards Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile Driver's Licenses, 60056-60104 [2023-18582]

Download as PDF 60056 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules Please do not submit comments to these addresses. SUPPLEMENTARY INFORMATION: DEPARTMENT OF HOMELAND SECURITY 6 CFR Part 37 Public Participation and Request for Comments [Docket No. TSA–2023–0002] RIN 1652–AA76 Minimum Standards for Driver’s Licenses and Identification Cards Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile Driver’s Licenses Transportation Security Administration, Department of Homeland Security. ACTION: Notice of proposed rulemaking. AGENCY: The Transportation Security Administration (TSA) is proposing to amend the REAL ID regulations to waive, on a temporary and State-byState basis, the regulatory requirement that mobile or digital driver’s licenses or identification cards (collectively ‘‘mobile driver’s licenses’’ or ‘‘mDLs’’) must be compliant with REAL ID requirements to be accepted by Federal agencies for official purposes, as defined by the REAL ID Act, when full enforcement of the REAL ID Act and regulations begins on May 7, 2025. DATES: Interested persons are invited to submit comments on or before October 16, 2023. ADDRESSES: You may submit comments, identified by the TSA docket number to this rulemaking, to the Federal Docket Management System (FDMS), a government-wide, electronic docket management system. To avoid duplication, please use only one of the following methods: • Electronic Federal eRulemaking Portal: https://www.regulations.gov. Follow the online instructions for submitting comments. • Mail: Docket Management Facility (M–30), U.S. Department of Transportation, 1200 New Jersey Avenue SE, West Building Ground Floor, Room W12–140, Washington, DC 20590–0001. The Department of Transportation (DOT), which maintains and processes TSA’s official regulatory dockets, will scan the submission and post it to FDMS. • Fax: (202) 493–2251. See the SUPPLEMENTARY INFORMATION section for format and other information about comment submissions. FOR FURTHER INFORMATION CONTACT: George Petersen, Senior Program Manager, REAL ID Program, Enrollment Services and Vetting Programs, Transportation Security Administration; telephone: (571) 227–2215; email: george.petersen@tsa.dhs.gov. lotter on DSK11XQN23PROD with PROPOSALS3 SUMMARY: VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 TSA invites interested persons to participate in this NPRM by submitting written comments, including relevant data. Comments that will provide the most assistance to TSA will reference a specific portion of this proposed rule, explain the reason for any suggestion or recommended change, and include data, information, or authority that supports such suggestion or recommended change. Submitting Comments With each comment, please identify the docket number at the beginning of your comments. You may submit comments and material electronically, by mail, or fax as provided under ADDRESSES, but please submit your comments and material by only one means. If you submit comments by mail or in person, submit them in an unbound format, no larger than 8.5 by 11 inches, suitable for copying and electronic filing. If you would like TSA to acknowledge receipt of comments submitted by mail, include with your comments a selfaddressed, stamped postcard or envelope on which the docket number appears and we will mail it to you. All comments, except those that include confidential or SSI 1 will be posted to https://www.regulations.gov, and will include any personal information you have provided. Should you wish your personally identifiable information redacted prior to filing in the docket, please clearly indicate this request in your submission. TSA will consider all comments that are in the docket on or before the closing date for comments and will consider comments filed late to the extent practicable. The docket is available for public inspection before and after the comment closing date. Handling of Confidential or Proprietary Information and SSI Submitted in Public Comments Do not submit comments that include trade secrets, confidential commercial or financial information, or SSI to the public regulatory docket. Please submit 1 ‘‘Sensitive Security Information’’ or ‘‘SSI’’ is information obtained or developed in the conduct of security activities, the disclosure of which would constitute an unwarranted invasion of privacy, reveal trade secrets or privileged or confidential information, or be detrimental to the security of transportation. The protection of SSI is governed by 49 CFR part 1520. PO 00000 Frm 00002 Fmt 4701 Sfmt 4702 such comments separately from other comments on the rulemaking. Comments containing this type of information should be appropriately marked as containing such information and submitted by mail to the address listed in the FOR FURTHER INFORMATION CONTACT section. TSA will take the following actions for all submissions containing SSI: • TSA will not place comments containing SSI in the public docket and will handle them with applicable safeguards and restrictions on access. • TSA will hold documents containing SSI, confidential business information, or trade secrets in a separate file to which the public does not have access, and place a note in the public docket explaining that commenters have submitted such documents. • TSA may include a redacted version of the comment in the public docket. • TSA will treat requests to examine or copy information that is not in the public docket as any other request under the Freedom of Information Act (5 U.S.C. 552) and the Department of Homeland Security (DHS) Freedom of Information Act regulation found in 6 CFR part 5. Reviewing Comments in the Docket Please be aware that anyone is able to search the electronic form of all comments in any of our dockets by the name of the individual, association, business entity, labor union, etc., who submitted the comment. For more about privacy and the docket, review the Privacy and Security Notice for the FDMS at https://www.regulations.gov/ privacy-notice, as well as the System of Records Notice DOT/ALL 14—Federal Docket Management System (73 FR 3316, January 17, 2008) and the System of Records Notice DHS/ALL 044— eRulemaking (85 FR 14226, March 11, 2020). You may review TSA’s electronic public docket at https:// www.regulations.gov. In addition, DOT’s Docket Management Facility provides a physical facility, staff, equipment, and assistance to the public. To obtain assistance or to review comments in TSA’s public docket, you may visit this facility between 9 a.m. and 5 p.m., Monday through Friday, excluding legal holidays, or call (202) 366–9826. This DOT facility is located in the West Building Ground Floor, Room W12–140 at 1200 New Jersey Avenue SE, Washington, DC 20590. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules Availability of Rulemaking Document You can find an electronic copy of this rulemaking using the internet by accessing the Government Publishing Office’s web page at https:// www.govinfo.gov/app/collection/FR/ to view the daily published Federal Register edition or accessing the Office of the Federal Register’s web page at https://www.federalregister.gov. Copies are also available by contacting the individual identified for ‘‘General Questions’’ in the FOR FURTHER INFORMATION CONTACT section. Abbreviations and Terms Used in This Document AAMVA—American Association of Motor Vehicle Administrators CA/Browser Forum—Certification Authority Browser Forum CISA—Cybersecurity and Infrastructure Security Agency DHS—U.S. Department of Homeland Security DID—Decentralized Identifiers FIPS—Federal Information Processing Standards HSM—Hardware security module IEC—International Electrotechnical Commission ISO—International Organization for Standardization mDL—mobile driver’s licenses and mobile identification cards NIST—National Institute for Standards and Technology NPRM—Notice of proposed rulemaking PUB—Publication RFI—Request for Information SP—Special Publication TSA—Transportation Security Administration VC—Verifiable Credentials VCDM—Verifiable Credentials Data Model W3C—World Wide Web Consortium lotter on DSK11XQN23PROD with PROPOSALS3 Table of Contents I. Executive Summary A. Purpose of the Regulatory Action B. Overview of the Proposed Rule C. Need for a Multi-Phased Rulemaking II. Background A. REAL ID Act, Regulations, and Applicability to mDLs B. Request for Information C. mDL Overview D. Current and Emerging Industry Standards and Government Guidelines for mDLs E. DHS Involvement in mDLs III. Summary of the Proposed Rule A. Overview B. Specific Provisions C. Impacted Stakeholders D. Use Cases Affected by This Proposed Rule IV. Discussion of Public Comments in the RFI V. Consultation With States, NonGovernmental Organizations, and the Department of Transportation VI. Regulatory Analyses A. Economic Impact Analyses B. Paperwork Reduction Act VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 C. Federalism (E.O. 13132) D. Customer Service (E.O. 14058) E. Energy Impact Analysis (E.O. 13211) F. Environmental Analysis VII. Specific Questions I. Executive Summary A. Purpose of the Regulatory Action This proposed rule is part of an incremental, multi-phased rulemaking that will culminate in the promulgation of comprehensive requirements for State issuance of REAL ID 2-compliant mobile driver’s licenses and mobile identification cards (collectively ‘‘mDLs’’). In this first phase, TSA is proposing two changes to the current regulations in 6 CFR part 37, ‘‘REAL ID Driver’s Licenses and Identification Cards.’’ First, TSA is proposing to add definitions for, among others, mobile driver’s licenses and mobile identification cards. These definitions provide a precise explanation of those terms as referenced in the REAL ID Act, which applies to only State-issued driver’s licenses and state-issued identification cards.3 Any other types of identification cards, such as those issued by a Federal agency, or commercial, educational, or non-profit entity, are beyond the scope of the Act and regulations. The definition of ‘‘mDL’’ as used in this rulemaking is limited to the REAL Act and regulations and should not be confused with ‘‘mDLs’’ as defined by other entities, or with State-issued mDLs that are not intended to comply with the REAL ID Act. Second, TSA is proposing to establish a temporary waiver process that would permit Federal agencies to accept mDLs for official purposes,4 as defined in the REAL ID Act and regulations, on an interim basis when enforcement begins 2 The REAL ID Act of 2005, Division B of the FY05 Emergency Supplemental Appropriations Act, as amended, Public Law 109–13, 119 Stat. 302. Effective May 22, 2023, authority to administer the REAL ID program was delegated from the Secretary of Homeland Security to the Adminstrator of TSA pursuant to DHS Delegation No. 7060.2.1. 3 See id. section 201 (defining a ‘‘driver’s license’’ to include ‘‘driver’s licenses stored or accessed via electronic means, such as mobile or digital driver’s licenses, which have been issued in accordance with regulations prescribed by the Secretary’’; mirroring definition for ‘‘identification card’’). 4 The REAL ID Act defines official purposes as including but not limited to accessing Federal facilities, boarding federally regulated commercial aircraft, entering nuclear power plants, and any other purposes that the Secretary shall determine. See id. Notably, because the Secretary has not determined any other official purposes, the REAL ID Act and regulations do not apply to Federal acceptance of driver’s licenses and identification cards for other purposes, such as applying for Federal benefits programs, submitting immigration documents, or other Federal programs. PO 00000 Frm 00003 Fmt 4701 Sfmt 4702 60057 on May 7, 2025,5 but only if all of the following conditions are met: (1) the mDL holder has been issued a valid and unexpired REAL ID-compliant physical driver’s license or identification card from the same State that issued the mDL; (2) TSA has determined the issuing State to be REAL ID-compliant; and (3) TSA has issued a waiver to the State. To qualify for the waiver, this proposed rule would require States to submit an application demonstrating that they meet specified requirements, drawn from 19 industry and government standards guidelines. The rulemaking proposes to incorporate by reference (IBR) those standards and guidelines, which cover technical areas such as mDL communication, digital identity, encryption, cybersecurity, and network/ information system security and privacy. As noted above, this proposed rule is part of an incremental rulemaking that would temporarily permit Federal agencies to accept mDLs for official purposes until TSA issues a subsequent rule that would set comprehensive requirements for mDLs. TSA believes it is premature to issue such requirements before the May 7, 2025, deadline due to the need for emerging industry standards and government guidelines to be finalized (discussed in more detail in Part II.D., below). The need for this rulemaking arises from TSA’s desire to accommodate and foster the rapid pace of mDL innovation, while ensuring the intent of the REAL ID Act and regulations are met. Secure driver’s licenses and identification cards are a vital component of our national security framework. The REAL ID Act of 2005 addressed the 9/11 Commission’s recommendation that the Federal Government ‘‘set standards for the issuance of sources of identification, such as driver’s licenses.’’ Under the REAL ID Act and regulations, a Federal agency may not accept for any official purpose a State-issued driver’s license or identification card, either physical or an mDL, that does not meet specified requirements, as detailed in the REAL ID regulations (see part II.A., below, for more discussion on these requirements). Although the current regulatory provisions do not include requirements that would enable States to issue REAL ID-compliant mDLs, several States are already investing significant resources to develop mDLs based on varying and often proprietary standards, many of which may lack the security, privacy, 5 88 FR 14473 (Mar. 9, 2023); DHS Press Release, DHS Announces Extension of REAL ID Full Enforcement Deadline (Dec. 5, 2022), https:// www.dhs.gov/news/2022/12/05/dhs-announcesextension-real-id-full-enforcement-deadline. E:\FR\FM\30AUP3.SGM 30AUP3 lotter on DSK11XQN23PROD with PROPOSALS3 60058 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules and interoperability features necessary for Federal acceptance for official purposes. The rulemaking would encourage the development of mDLs with a higher level of security, privacy, and interoperability. Absent the proposed rule, individual States may choose insufficient mDL security and privacy safeguards that fail to meet the security purposes of REAL ID requirements and the privacy needs of users. The proposed rule would address these considerations by enabling TSA to grant a waiver to States whose mDLs TSA determines provide sufficient safeguards for security and privacy, pending completion of emerging standards. Without timely guidance from the Federal government regarding potential requirements for developing a REAL ID-compliant mDL, States risk investing in mDLs that are not aligned with emerging industry standards and government guidelines that may be IBR’d in a future rulemaking. States, therefore, may become locked-in to existing solutions and could face a substantial burden to redevelop products acceptable to Federal agencies under this future rulemaking. Many stakeholders have already expressed these concerns to TSA. In response to an April 2021 Department of Homeland Security (DHS) Request for Information (RFI),6 issued to inform a future rulemaking that would set technical requirements and security standards for mDLs, one commenter cautioned that the absence of a common standard ‘‘could lead to fragmentation of the market, a decrease in trust, noninteroperable solutions, and a global diminishing benefit of the mDL concept.’’ 7 Similarly, another commenter warned that ‘‘[w]ithout clear, uniform, flexible standards that will encourage widespread public and private sector use of mDLs, mDLs will likely create confusion and struggle to gain a foothold in being accepted.’’ 8 Although this proposed rule would not set standards for the issuance of REAL ID-compliant mDLs, it does establish minimum requirements that States must meet to be granted a waiver. These proposed minimum standards and requirements would ensure that States’ investments in mDLs provide minimum privacy and security safeguards consistent with information currently known to the TSA. 6 See 86 FR 20320 (April 19, 2021). by American Association of Motor Vehicle Administrators. 8 Comment by DocuSign. 7 Comment VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 B. Overview of the Proposed Rule As further discussed in part II.A., below, mDLs cannot be accepted by Federal agencies for official purposes when REAL ID full enforcement begins on May 7, 2025, unless 6 CFR part 37 is amended to address mDLs. This proposed rule would establish a process for waiving, on a temporary and Stateby-State basis, the current prohibition on Federal acceptance of mDLs for official purposes, and enable Federal agencies to accept mDLs on an interim basis while the industry matures to a point sufficient to enable TSA to develop more comprehensive mDL regulatory requirements. The current regulations prohibit Federal agencies from accepting noncompliant driver’s licenses and identification cards, including both physical cards and mDLs, when REAL ID enforcement begins on May 7, 2025. Any modification of this regulatory provision must occur through rulemaking (or legislation). Until and unless TSA promulgates comprehensive mDL regulations that enable States to develop and issue REAL ID-compliant mDLs, mDLs cannot be developed to comply with REAL ID, and Federal agencies therefore cannot accept mDLs for official purposes after REAL ID enforcement begins on May 7, 2025. The proposed rule would allow the Federal government to accept mDLs on an interim basis, but only if all of the following conditions are met: (1) the mDL holder has been issued a valid and unexpired REAL ID-compliant physical driver’s license or identification card, (2) TSA has determined the issuing State to be REAL ID-compliant, and (3) TSA has issued a waiver to such State based on that State’s compliance with minimum privacy, safety, and interoperability requirements proposed in this rulemaking. Please see Part II.A., below, for an explanation of the REAL ID requirement that both cards and issuing States must be REAL ID compliant. C. Need for a Multi-Phased Rulemaking TSA recognizes both that regulations can influence long-term industry research and investment decisions and that premature regulations can distort the choices of technologies adopted, which can be costly to undo. As noted above, there are clear reasons for TSA to issue requirements for mDLs. First, there is a growing demand for and interest in mDLs due to their potential benefits of increased convenience, security, and privacy. Second, to meet this demand, States are beginning to invest in the infrastructure and PO 00000 Frm 00004 Fmt 4701 Sfmt 4702 programs to issue mDLs. Third, in the absence of Federal regulations and guidelines as outlined in this rulemaking, States may make unsuitable investments and issue mDLs that Federal agencies cannot accept. Fourth, adoption and use of mDLs could be thwarted if current regulations are not amended to accommodate mDLs when REAL ID enforcement begins on May 7, 2025. At the same time, however, TSA believes it is premature to issue final, comprehensive requirements for mDLs given the rapid pace of innovation in this nascent market, and the multiple emerging industry and government standards and guidelines necessary to ensure mDL privacy and security that are still in development. From comments submitted in response to the RFI, TSA recognizes that technology and stakeholder positions in this industry are diverse and evolving. TSA also conducted a comprehensive analysis of industry and Government standards and guidance, and the types of technology currently available. Based on this analysis, a few international industry standards applicable to mDLs are available,9 while most are years away from publication. Accordingly, TSA has concluded that it is premature to promulgate comprehensive requirements for mDLs while those standards are emerging, because of the risk of unintended consequences, such as chilling innovation and competition in the marketplace, and ‘‘locking-in’’ stakeholders to certain technologies. Although TSA believes it is premature to establish comprehensive requirements at this time, TSA believes it is appropriate to use its regulatory authority to establish a waiver process with clear standards and requirements to facilitate the acceptance of mDLs while the industry matures and moves to accepted standards. Therefore, TSA has decided to proceed with a multiphased rulemaking approach. Initial efforts focused on research and gathering information from interested stakeholders, commencing with publication of the pre-rulemaking RFI that was intended to inform any subsequent rulemaking. ‘‘Phase 1,’’ the current phase, would establish a temporary waiver process. This waiver process would enable secure use of mDLs when REAL ID enforcement begins on May 7, 2025, while providing TSA additional operational experience and data from TSA, which will accept mDLs during the waiver period before eventually issuing comprehensive regulations. The proposed rule is 9 See E:\FR\FM\30AUP3.SGM Part II.D. 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules intended to serve as a regulatory bridge for this emerging technology. Following publication of industry standards currently under development, TSA anticipates conducting a ‘‘Phase 2’’ rulemaking that would repeal the temporary waiver provisions, including appendix A to subpart A of the part (discussed in Part III.B.4.iv., below) established in Phase 1 and establish more comprehensive requirements enabling States to issue mDLs that comply with REAL ID requirements. At this time, TSA anticipates the Phase 2 rulemaking would IBR pertinent parts of some emerging standards (pending review of those final, published documents) regarding specific requirements for security, privacy, and interoperability, and distinguish between existing regulatory requirements that apply only to mDLs versus physical cards. Comments received in Phase 1, experience and data gained from temporary Federal mDL acceptance under a waiver, TSA testing of mDL acceptance at TSA airport security checkpoints, and publication of emerging standards, will inform the Phase 2 rulemaking. As one commenter 10 urged, DHS is taking ‘‘a slow and careful approach’’ to regulation in order to fully understand the implications of mDLs. This iterative rulemaking approach supports Executive Order (E.O.) 14058 of December 13, 2021 (Transforming Federal Customer Experience and Service Delivery to Rebuild Trust in Government), by using ‘‘technology to modernize Government and implement services that are simple to use, accessible, equitable, protective, transparent, and responsive for all people of the United States.’’ 11 As highlighted above and discussed in more detail below, allowing acceptance of mDLs issued by States that meet the waiver requirements would enable the public to more immediately realize potential benefits of mDLs, including greater convenience, security, and privacy. See Part II.C.4, below, for more discussion on these benefits. lotter on DSK11XQN23PROD with PROPOSALS3 II. Background A. REAL ID Act, Regulations, and Applicability to mDLs The REAL ID Act of 2005 sets minimum requirements for State-issued driver’s licenses and identification cards accepted by Federal agencies for official purposes, including accessing Federal facilities, boarding federally regulated commercial aircraft, entering nuclear 10 See comment from Electronic Privacy Information Center. 11 Published at 86 FR 71357 (Dec. 16, 2021). VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 power plants, and any other purposes that the Secretary shall determine.12 The Act defines ‘‘driver’s licenses’’ and ‘‘identification cards’’ strictly as Stateissued documents,13 and the implementing regulations, 6 CFR part 37, further refine the definition of ‘‘identification card’’ as ‘‘a document made or issued by or under the authority of a State Department of Motor Vehicles or State office with equivalent function.’’ 14 Therefore, the REAL ID Act and regulations do not apply to identification cards that are not made or issued under a State authority, such as cards issued by a Federal agency or any commercial, educational, or non-profit entity. On January 29, 2008, DHS published a final rule implementing the Act’s requirements.15 That rule included both a State compliance deadline 16 and a schedule describing when individuals must obtain a compliant driver’s license or identification card intended for use for official purposes.17 DHS refers to these two deadlines as ‘‘State-based’’ and ‘‘card-based’’ enforcement, respectively (or ‘‘full enforcement’’ collectively). For State-based enforcement, 6 CFR 37.65(a) prohibits Federal agencies from accepting cards issued by States and territories that are not compliant with the REAL ID standards.18 DHS incrementally enforced the State-based deadline in phases, with the last phase beginning January 22, 2018. Since this date, many Federal agencies have accepted all valid driver’s licenses and identification cards issued by REAL ID-compliant States or States with an extension or under compliance review from DHS. Card-based enforcement begins on May 7, 2025.19 On this date, Federal agencies will be prohibited from accepting for official purposes a State12 The REAL ID Act of 2005—Division B of the FY05 Emergency Supplemental Appropriations Act, as amended, Public Law 109–13, 119 Stat. 302. 13 Id. at sec. 201. 14 6 CFR 37.3. 15 Minimum Standards for Driver’s Licenses and Identification Cards Acceptable by Federal Agencies for Official Purposes; Final Rule, 73 FR 5272 (Jan. 29, 2008); codified at 6 CFR part 37 (2008 final rule). DHS subsequently issued six other final rules and interim final rules amending the regulations, including changes to compliance deadlines and State extension submission dates. See 74 FR 49308 (Sep. 28, 2009), 74 FR 68477 (Dec. 28, 2009) (final rule, stay), 76 FR 12269 (Mar. 7, 2011), 79 FR 77836 (Dec. 29, 2014); 84 FR 55017 (Oct. 15, 2019); 86 FR 23237 (May 3, 2021). In addition to final rules, DHS also published two Information Collection Requests in the Federal Register in 2016 and 2022. See 81 FR 8736 (Feb. 22, 2016) and 87 FR 23878 (Apr. 21, 2022). 16 See 6 CFR 37.51(a). 17 See 6 CFR 37.5(b). 18 See 6 CFR 37.65(a). 19 See 6 CFR 37.5(b). PO 00000 Frm 00005 Fmt 4701 Sfmt 4702 60059 or territory-issued driver’s license or identification card for official purposes unless the card is compliant with the REAL ID Act and regulations.20 On December 21, 2020, Congress passed the REAL ID Modernization Act 21 to amend the REAL ID Act to reflect new technologies that did not exist when the law was enacted more than 15 years ago. Among other updates,22 the REAL ID Modernization Act clarified that mDLs are subject to REAL ID requirements by amending the definitions of ‘‘driver’s license’’ and ‘‘identification card’’ to specifically include mDLs that have been issued in accordance with regulations prescribed by the Secretary.23 The REAL ID regulations therefore must be updated to distinguish which existing requirements in 6 CFR 37 apply to mDLs versus physical cards, and to include additional requirements to ensure that mDLs meet equivalent levels of security currently imposed on REAL IDcompliant physical cards and are otherwise secure. An mDL cannot be REAL ID-compliant until TSA establishes REAL ID requirements in regulations and States issue mDLs compliant with those requirements. As a result of this requirement, mDLs must also be REAL ID-compliant to be accepted when card-based enforcement begins on May 7, 2025. B. Request for Information In April 2021, DHS issued an RFI announcing DHS’s intent to commence future rulemaking to set the minimum technical requirements and security standards for mDLs to enable Federal agencies to accept mDLs for official purposes. The RFI requested comments and information to inform DHS’s rulemaking.24 In June 2021, DHS held a public meeting to provide an additional forum for comment.25 In response to comments at the public meeting concerning the importance of public access to an industry-developed standard referenced in the RFI, DHS subsequently published a notification in the Federal Register to facilitate access to the standard.26 DHS also conducted 20 See id. ID Modernization Act, Title X of Division U of the Consolidated Appropriations Act, 2021, Public Law 116–260, 134 Stat. 2304. 22 TSA is conducting a separate rulemaking to implement other sections of the REAL ID Modernization Act. 23 Sec. 1001 of the REAL ID Modernization Act, Title X of Division U of the Consolidated Appropriations Act, 2021, Public Law 116–260, 134 Stat. 2304. 24 86 FR 20320 (April 19, 2021). 25 86 FR 31987 (June 16, 2021). 26 86 FR 51625 (Sept. 16, 2021). 21 REAL E:\FR\FM\30AUP3.SGM 30AUP3 60060 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules extensive outreach and engagement with affected stakeholders, including States, industry, and individuals. DHS also conducted a roundtable discussion on privacy considerations with nonprofit organizations representing varied interests. The RFI requested comments on 13 specific topics, including: potential security risks arising from mDL usage and mitigating solutions, potential privacy concerns or benefits associated with mDL transactions, the maturity of certain industry standards and the appropriateness of DHS’s adoption of them, costs to individuals to obtain mDLs, and various technical topics associated with mDL issuance and communications. In response, DHS received about 60 comments. Please see Part IV, below, for a detailed discussion of the comments received, which are also referenced throughout this preamble. C. mDL Overview 1. mDLs Generally Driven by increasing public demand for more convenient, secure, and privacy-enhancing forms of identification, many States have invested significantly and rapidly in recent years to develop mDL technology. An mDL is generally recognized as the digital representation of an individual’s identity information contained on a State-issued physical driver’s license or identification card.27 lotter on DSK11XQN23PROD with PROPOSALS3 27 A technical description of mDLs as envisioned by the American Association of Motor Vehicle Administrators may be found at https:// www.aamva.org/Mobile-Drivers-License/. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 An mDL may be stored on a diverse range of portable or mobile electronic devices, such as smartphones, smartwatches, and storage devices containing memory. Like a physical card, mDL data originates from identity information about an individual that is maintained in the database of a State driver’s licensing agency. Unlike physical driver’s licenses that are read and verified visually through human inspection of physical security features, an mDL is read and verified electronically using a device known simply as a ‘‘reader’’ (discussed in Part II.C.2., below). Physical cards employ physical security features to deter fraud and tampering, such as ‘‘easily identifiable visual or tactile [security] features’’ on the surface of a card.28 An mDL, in contrast, combats fraud through the use of digital security features that are not recognizable through human inspection. For example, mDLs usually rely on digital security through use of asymmetric cryptography/public key infrastructure (PKI). As discussed in the RFI,29 Asymmetric cryptography generates a pair of encryption ‘‘keys’’ to encrypt and decrypt protected data. One key, a ‘‘public key,’’ is distributed publicly, while the other key, a ‘‘private key,’’ is held by the State driver’s licensing agency (i.e., a Department of Motor Vehicles, or ‘‘DMV’’). When a DMV issues an mDL to an individual (see Fig. 1, below, communication no. 1), the DMV uses its private key to digitally ‘‘sign’’ the mDL data. A Federal agency validates the integrity of the 28 6 CFR 37.15(c) and 37.17(h). 86 FR 20320, 20324 (April 19, 2021). 29 See PO 00000 Frm 00006 Fmt 4701 Sfmt 4702 mDL data by obtaining the DMV’s public key to verify the digital signature (see Fig. 1: mDL Secure Communications). Private keys and digital signatures are elements of data encryption that protect against unauthorized access, tampering, and fraud. Generally, mDL-based identity verification under REAL ID would involve a triad of secure communications between a State driver’s licensing agency, an mDL holder, and a Federal agency. Specifically, and as shown in Fig. 1, below, the following three communications would occur: (1) Issuance and Updates: the DMV would issue or ‘‘provision’’ an mDL onto a mobile device of the person requesting the mDL (who then becomes the mDL holder), (2) Data Transfer: the mDL holder would authorize release of relevant data from the device to a Federal agency, which would use a reader to retrieve data, and (3) Validation: the Federal agency would use a reader, to confirm that the data originated from the issuing DMV and is unchanged, by verifying the DMV’s public key. Although not depicted in Fig. 1, the Federal agency would also validate (via human inspection or facial matching software) that the mDL belongs to the individual presenting it by comparing the individual’s live appearance to the photo retrieved by the reader. Standardized communication interfaces are necessary to enable Federal agencies to exchange information with all 56 U.S. States and territories that issue mDLs. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 Any Federal agency that chooses to accept mDLs for REAL ID official purposes would need to procure and use readers to validate an mDL holder’s identity data from their mobile device and establish trust that the mDL is secure by using private-public key data encryption. Non-Federal agencies, such as State agencies, businesses, and other entities who choose to accept mDLs for uses beyond the scope of REAL ID are not governed by the REAL ID Act or regulations and therefore would make their own independent decisions concerning reading mDLs and reader procurement.30 The reader would confirm that the mDL holder’s identity data is valid by performing the following steps: establishing a secure digital connection with an mDL holder’s mobile device, receiving the required mDL information for identity verification, verifying its authenticity and integrity by validating the driver’s licensing agency’s digital signature of the mDL data, and confirming that the mobile device possesses the unique device key corresponding to the mDL at the time of issuance. 30 Non-Federal agencies and other entities who choose to accept mDLs for uses beyond the scope of REAL ID should also recognize the need for a reader to ensure the validity of the mDL. Any verifying entity can validate in the same manner as a Federal agency if they implement the standardized communication interface requirements specified in this proposed rule, which would require investment to develop the necessary IT infrastructure and related proceses. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 An mDL reader can take multiple forms, ranging from software to hardware. In its simplest form, an mDL reader can be an app installed on a smartphone or other mobile device. A reader could also be a dedicated device. This is expected to be a low-cost solution that could be added to existing smartphones carried by a verifying entity’s employee. While reader development is ongoing in the industry, TSA understands that companies are already beginning to offer verification apps for free on their commercial app stores. As reader technology continues to evolve, there will likely be wide range of reader options with various capabilities and associated price points.31 3. State mDL Issuance As noted above, mDL-issuance is proliferating rapidly among States, with nearly half of all States piloting, issuing, or considering mDLs. As of the date of 31 Readers for mDLs have specific requirements and at this time are not interchangeable with readers for other types of Federal cards, such as the Transportation Worker Identification Credential (TWIC). Although TSA is evaluating some mDLs at select airport security checkpoints (see Part II.E.), cost estimates for readers used in the evaluations are not available because those readers are noncommercially available prototypes designed specifically for integration into TSA-specific IT infrastructure that few, if any, other Federal agencies use. In addition, mDL readers are evolving and entities who accept mDLs would participate voluntarily. Accordingly, associated reader costs are not quantified at this time but TSA intends to gain a greater understanding of any costs to procure reader equipment as the technology continues to evolve. PO 00000 Frm 00007 Fmt 4701 Sfmt 4702 this NPRM, at least eight States (Arizona, Colorado, Delaware, Louisiana, Maryland, Mississippi, Oklahoma, and Utah) are issuing mDLs, and three States (Florida, Iowa, and Virginia) are currently piloting or have piloted mDLs. Additionally, at least 17 States (California, District of Columbia, Georgia, Hawaii, Illinois, Indiana, Kentucky, Michigan, Missouri, New Jersey, New York, North Dakota, Pennsylvania, Puerto Rico, Tennessee, Texas, and Wyoming) have indicated they are studying mDLs or considering enabling legislation. Based on its analysis of the current environment, TSA believes that States are issuing mDLs using widely varying technology solutions, resulting in a fragmented environment rather than a common standard for issuance and use. The various States issuing or piloting mDLs are believed to be using technology solutions provided by multiple vendors, and it is not clear whether such technological diversity provides the safeguards and interoperability necessary for Federal acceptance. For example, in September 2021 and March 2022, Apple announced 32 that it was working with 13 States (Arizona, Colorado, Connecticut, Georgia, Hawaii, Iowa, Kentucky, Maryland, Mississippi, Ohio, 32 https://www.apple.com/newsroom/2021/09/ apple-announces-first-states-to-adopt-driverslicenses-and-state-ids-in-wallet/; https:// www.apple.com/newsroom/2022/03/applelaunches-the-first-drivers-license-and-state-id-inwallet-with-arizona/. E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.005</GPH> 2. mDL Readers 60061 60062 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules Oklahoma, Puerto Rico, and Utah) to enable their mDLs to be provisioned into Apple’s Wallet app. Google and GET Group North America have made similar announcements.33 States choosing a variety of technology solutions, which could result in nonstandard, non-compatible technologies, which raises additional questions concerning the Federal government’s ability to accept the mDLs for Federal purposes. Although detailed mDL adoption statistics are unavailable, anecdotal information and fragmented reporting indicates that mDLs are rapidly gaining public acceptance. For example, Louisiana has recently reported that over one million residents (representing more than 20% of its population) have installed Louisiana’s mDL app on their mobile devices. lotter on DSK11XQN23PROD with PROPOSALS3 4. Potential Benefits of mDLs An mDL has potential benefits for all stakeholders. For Federal agencies that require REAL ID-compliant IDs for official purposes, mDLs may provide efficiency and security enhancements. Compared to physical cards, which rely on manual inspection of physical security features on the surface of a card designed to deter tampering and fraud, mDLs rely on digital security features that are immune to many vulnerabilities of physical security features. For individuals, some commenters noted that mDLs may provide a more secure, convenient, privacy-enhancing, and ‘‘touchless’’ method of identity verification compared to physical IDs.34 Among other privacy-enhancing features, the holder of an mDL could control what data fields are released. For example, if an mDL is used for identity purposes with a Federal agency, the holder could restrict the agency to receiving only the data necessary and required by the agency to verify the individual’s identity. Potential hygiene benefits also derive from the contactfree method of ID verification enabled by mDLs. An mDL holder may transmit data to a verifying Federal agency’s mDL reader by hovering their mDL above the reader, potentially eliminating any physical contact with the individual’s mobile device thereby reducing germ transmission. 33 https://support.google.com/wallet/answer/ 12436402?hl=en; https://getgroupna.com/getmobile-id-is-now-accepted-at-tsa-precheck/. 34 See, e.g., comments submitted by: Applied Recognition, Bredemarket, Hiday, Mothershed, Muller, State of Connecticut, DHS of Motor Vehicles, Secure Technology Alliance, U.S. Travel Association. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 D. Current and Emerging Industry Standards and Government Guidelines for mDLs The nascence of mDLs and absence of standardized mDL-specific requirements provide an opportunity for industry and government to develop standards and guidelines to close this void. TSA is aware of multiple such documents, both published and under development, from both Federal and non-government sources. This section discusses standards and guidelines that form the basis of many of the requirements proposed in this rulemaking, as well as additional documents that may inform the upcoming Phase 2 rulemaking. As discussed in Part III.B.8, below, this rulemaking proposes to amend § 37.4 by incorporating by reference into part 37 nineteen standards and guidelines. All proposed incorporation by reference material is available for inspection at DHS Headquarters in Washington DC, please email requesttoreviewstandards@ hq.dhs.gov. The material may also be obtained from its publisher, as discussed below. 1. American Association of Motor Vehicle Administrators In September 2022, the American Association of Motor Vehicle Administrators published mDL Implementation Guidelines (AAMVA Guidelines). Mobile Driver’s License (mDL) Implementation Guidelines Version 1.2 (Jan. 2023), American Association of Motor Vehicle Administrators, 4401 Wilson Boulevard, Suite 700, Arlington, VA 22203, available at https://aamva.org/getmedia/ b801da7b-5584-466c-8aebf230cef6dda5/mDL-ImplementationGuidelines-Version-1-2_final.pdf. The Guidelines are available to the public for free at the link provided above. The AAMVA Guidelines adapt industry standard ISO/IEC 18013–5:2021 (discussed in Part II.D.4., below), for State driver’s licensing agencies through the addition of more stringent and more specific recommendations, as the ISO/ IEC standard has been developed for international purposes and may not meet all purposes and needs of States and the Federal Government. For example, Part 3.2 of the AAMVA Guidelines modify and expand the data elements specified in ISO/IEC 18013– 5:2021, in order to enable the mDL to indicate the REAL ID compliance status of the companion physical card, as well as to ensure interoperability necessary for Federal acceptance. AAMVA has added data fields for DHS Compliance and DHS Temporary Lawful Status. These additional fields provide the PO 00000 Frm 00008 Fmt 4701 Sfmt 4702 digital analog to the requirements for data fields for physical cards defined in 6 CFR 37.17(n) 35 and 37.21(e) 36 respectively. As discussed generally in Part III.B, below, § 37.10(a)(1) and (4) of this proposed rule would require a State to explain, as part of its application for a waiver, how the State issues mDLs that are compliant with specified requirements of the AAMVA Guidelines. 2. Certification Authority Browser Forum The Certification Authority Browser Forum (CA/Browser Forum) is an organization of vendors of hardware and software used in the production and use of publicly trusted certificates. These certificates are used by forum members, non-member vendors, and governments to establish the security and trust mechanisms for public key infrastructure-enabled systems. The CA/ Browser Forum has published two sets of requirements applicable for any implementers of PKI, including States that are seeking to deploy Certificate Systems that must be publicly trusted and used by third parties: • Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates v. 1.8.6 (December 14, 2022), available at https://cabforum.org/wp-content/ uploads/CA-Browser-Forum-BR1.8.6.pdf, and • Network and Certificate System Security Requirements v. 1.7 (April 5, 2021), available at https://cabforum.org/ wp-content/uploads/CA-BrowserForum-Network-Security-Guidelinesv1.7.pdf. CA/Browser Forum, 815 Eddy St, San Francisco, CA 94109, (415) 436– 9333. These documents are available to the public for free at the links provided above. To issue mDLs that can be trusted by Federal agencies, each issuing State must establish a certificate system, including a root certification authority that is under control of the issuing State. TSA believes the CA/Browser Forum requirements for publicly trusted certificates have been proven to be an effective model for securing online transactions. As discussed generally in Part III.B.4, below, appendix A to 35 Section 37.17(n) provides, ‘‘The card shall bear a DHS-approved security marking on each driver’s license or identification card that is issued reflecting the card’s level of compliance as set forth in § 37.51 of this Rule.’’ 36 Section 37.21(e) provides, ‘‘Temporary or limited-term driver’s licenses and identification cards must clearly indicate on the face of the license and in the machine readable zone that the license or card is a temporary or limited-term driver’s license or identification card.’’ E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules subpart A of the part, sections 1, 2, and 4–8, require compliance with specified requirements of the CA/Browser Forum Baseline Requirements and/or Network and Certificate System Requirements. Section 37.4 of this proposed rule would IBR these CA/Browser Forum references. 3. Cybersecurity Guidelines DHS and the Cybersecurity and Infrastructure Security Agency (CISA) have published two guidelines which are relevant to the operations of States’ mDL issuance systems: • National Cyber Incident Response Plan (Dec. 2016), available at https:// www.cisa.gov/uscert/sites/default/files/ ncirp/National_Cyber_Incident_ Response_Plan.pdf, and • CISA Cybersecurity Incident & Vulnerability Response Playbooks (Nov. 2021), available at https://www.cisa.gov/ sites/default/files/publications/Federal_ Government_Cybersecurity_Incident_ and_Vulnerability_Response_ Playbooks_508C.pdf. Cybersecurity and Infrastructure Security Agency, Mail Stop 0380, 245 Murray Lane, Washington, DC 20528– 0380, (888) 282–0870. These guidelines, available for free at the links provided above, provide details on best practices for management of systems during a cybersecurity incident, providing recommendations on incident and vulnerability response. Management of cybersecurity incidents and vulnerabilities are critical to maintenance of a State’s mDL issuance information technology (IT) infrastructure. As discussed generally in Part III.B.4, below, appendix A to subpart A of the part, section 8, requires compliance with specified requirements of the DHS National Cyber Incident Response Plan and the CISA Cybersecurity Incident & Vulnerability Response Playbooks. Section 37.4 of this proposed rule would IBR these DHS and CISA standards. lotter on DSK11XQN23PROD with PROPOSALS3 4. ISO/IEC Standards and Technical Specifications Two international standards-setting organizations, the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC),37 are jointly drafting 37 ISO is an independent, non-governmental international organization with a membership of 164 national standards bodies. ISO creates documents that provide requirements, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. The IEC publishes consensus-based international standards and manages conformity assessment systems for electric and electronic products, systems and services, collectively known VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 two series of multi-part International Standards and Technical Specifications.38 Series ISO/IEC 18013, Personal identification—ISO-compliant driving licence Parts 5–7, are specific to mDLs, and series ISO/IEC 23220 Cards and security devices for personal identification—Building blocks for identity management via mobile devices, Parts 1–6, concern digital identity (of which mDLs are a subset). DHS TSA has participated in the development of both Series as a nonvoting member of the United States national body member of the Joint Technical Committee.39 Together, both Series would establish standardized interfaces that would enable the mDL communications triad (see Part II.C.1., above) as follows: (1) State driver’s licensing agency and the mDL holder (Series 23220), (2) mDL Holder and a verifying entity (Series 18013), and (3) verifying entity and State licensing agency (Series 18013). In September 2021, ISO and IEC published international standard ISO/ IEC 18013, Part 5, entitled, ‘‘Personal identification—ISO-compliant driving licence.’’ ISO/IEC 18013–5:2021, Personal identification—ISO-compliant driving licence—Part 5: Mobile driving licence (mDL) application (Sept. 2021), International Organization for Standardization, Chemin de Blandonnet 8, CP 401, 1214 Vernier, Geneva, Switzerland, +41 22 749 01 11, www.iso.org/contact-iso.html.40 Section 37.4 of this rulemaking proposes to IBR this standard, which is available from as ‘‘electrotechnology.’’ ISO and IEC standards are voluntary and do not include contractual, legal or statutory obligations. ISO and IEC standards contain both mandatory requirements and optional recommendations, and those who choose to implement the standards must adopt the mandatory requirements. 38 ISO defines an International Standard as ‘‘provid[ing] rules, guidelines or characteristics for activities or for their results, aimed at achieving the optimum degree of order in a given context. It can take many forms. Apart from product standards, other examples include: test methods, codes of practice, guideline standards and management systems standards.’’ www.iso.org/deliverablesall.html. In contrast, ISO defines a ‘‘Technical Specification’’ as ‘‘address[ing] work still under technical development, or where it is believed that there will be a future, but not immediate, possibility of agreement on an International Standard. A Technical Specification is published for immediate use, but it also provides a means to obtain feedback. The aim is that it will eventually be transformed and republished as an International Standard.’’ www.iso.org/deliverables-all.html. 39 A member of the TSA serves as DHS’s representative to the Working Group. 40 Forthcoming Part 6 of Series ISO/IEC 18013, ‘‘mDL test methods,’’ is a technical specification that will enable testing of mDLs and readers to certify conformance with ISO/IEC 18013–5:2021. TSA anticipates a draft of this standard may be completed by the end of 2023, and the final document may publish at the end of 2024. PO 00000 Frm 00009 Fmt 4701 Sfmt 4702 60063 DHS as discussed above. In addition, the American National Standards Institute (ANSI), a private organization not affiliated with DHS, will provide public access 41 to ISO/IEC 18013– 5:2021 until October 16, 2023. Standard ISO/IEC 18013–5:2021 standardizes the interface between an mDL and an entity seeking to read an individual’s mDL for identify verification purposes, and sets full operational and communication requirements for both mDLs and mDL readers. This standard applies to ‘‘attended’’ mode verification, in which both the mDL holder and an officer or agent of a verifying entity are physically present together during the time of identity verification.42 DHS received numerous comments in response to the RFI concerning the appropriateness of this standard as a starting point for future regulatory requirements.43 Many comments received in response to the RFI noted that standard ISO/IEC 18013– 5:2021, which published in Sept. 2021, provides a sufficient baseline for secure Federal acceptance.44 After carefully 41 ANSI advises interested persons to visit the following website to obtain access: https:// www.surveymonkey.com/r/DQVJYMK. This link will direct interested persons to a nongovernment website that is not within the Federal government’s control and may not follow the same privacy, security, or accessibility policies as Federal government websites. ANSI requires individuals to complete an online license agreement form, which will ask for name, professional affiliation, and email address, before it grants access to any standards. ANSI will provide access on a view-only basis, meaning copies of the document cannot be downloaded or modified. Individuals who access non-governmental sites to view available standards are subject to the policies of the owner of the website. For access to non-final draft standards, please contact ISO/IEC using the information provided earlier. 42 Part 7 of Series ISO/IEC 18013, entitled ‘‘mDL add-on function,’’ is an upcoming technical specification that will standardize interfaces for ‘‘unattended’’ mode verification, in which the mDL holder and officer/agent of the verifying agency are not physically present together, and the identity verification is conducted remotely. Unattended identity verification is not currently considered a REAL ID use case. 43 See, e.g., comments submitted by: American Association of Motor Vehicle Administrators; American Civil Liberties Union, Electronic Frontier Foundation, and Electronic Privacy Information Center; Apple; Association for Convenience & Fuel Retailing; CBN Secure Technologies; FaceTec; Florida DHS of Highway Safety and Motor Vehicles; IDEMIA; Maryland DHS of Transportation, Motor Vehicle Administration; National Immigration Law Center and Undersigned Organizations; Secure Technology Alliance; State of Connecticut, DHS of Motor Vehicles; Underwriters Laboratories; Verifiable Credentials Policy Committee, Blockchain Advocacy Coalition. All comments are available at https://www.regulations.gov/docket/ DHS-2020-0028. 44 See comments submitted by American Association of Motor Vehicle Administrators; Florida DHS of Highway Safety and Motor Vehicles; Maryland DHS of Transportation, Motor Vehicle Administration; State of Connecticut, DHS of Motor Vehicles. E:\FR\FM\30AUP3.SGM 30AUP3 lotter on DSK11XQN23PROD with PROPOSALS3 60064 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules considering all comments received, TSA believes ISO/IEC 18013–5:2021 is critical to enabling the interoperability, security, and privacy necessary for wide acceptance of mDLs by Federal agencies for official purposes. As discussed in Part III.B, below, this NPRM proposes to IBR this standard into part 37. Specifically, § 37.8 of the proposed rule would require Federal agencies to validate an mDL as required by standard ISO/IEC 18013–5:2021, and § 37.10(a)(4) would require a State to explain, as part of its application for a waiver, how the State issues mDLs that are interoperable with this standard to provide the security necessary for Federal acceptance. The ISO/IEC 23220 Series of Technical Specifications, ‘‘Cards and security devices for personal identification—Building blocks for identity management via mobile devices,’’ cover international digital IDs broadly and are applicable to mDLs. ISO/IEC 23220: Cards and security devices for personal identification— Building blocks for identity management via mobile devices, International Organization for Standardization, Chemin de Blandonnet 8, CP 401, 1214 Vernier, Geneva, Switzerland, +41 22 749 01 11, www.iso.org/contact-iso.html. This Series consists of six Parts, with Parts 3, 5, and 6 being relevant to mDLs and the forthcoming Phase 2 rulemaking. More specifically, Series 23220 would establish the following critical requirements for ‘‘provisioning’’ 45 an mDL, which refers to the various steps required for a State driver’s licensing agency to securely place an mDL onto a mobile device: • Part 3, ‘‘Protocols and services for installation and issuing phase,’’ covers data function calls and formatting that States will use to communicate (e.g., provision, refresh, revoke) with a mobile device. • Part 5, ‘‘Trust models and confidence level assessment,’’ covers trust framework and provisioning, including confidence levels, identity proofing, binding, identity resolution, evidence validation, evidence verification, and holder authentication. • Part 6, ‘‘Mechanism for use of certification on trustworthiness of secure area,’’ primarily covers device 45 The initial step of provisioning requires proving that an mDL applicant owns the mobile device onto which the mDL will be stored. Next, a trusted connection would be established between the licensing agency and the target device. Finally, the licensing agency would use this connection to securely transmit and update mDL data on the device. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 security requirements and trust of the secure areas in mobile devices. TSA anticipates that Series ISO/IEC 23220 will define critical requirements for the interface between a State driver’s licensing agency and mobile device. However, none of Parts 3, 5, and 6 of Series 23220 have published. TSA understands that drafts of Parts 3 and 5 may publish in late 2023, and final publication is possible by the end of 2024; publication dates for Part 6 are unknown, but a draft is anticipated in 2024. DHS received many comments in response to the RFI cautioning, however, that standard ISO/IEC 23220, Parts 3, 5, and 6, are not sufficiently mature to inform regulatory requirements.46 Given the evolving stage of Series ISO/IEC 23220 and comments to the RFI, TSA believes it is premature to rely on this Series to inform this proposed rulemaking and thus is not proposing to IBR them in this NPRM. TSA may consider adopting requirements of pertinent Parts of this standard in the upcoming Phase 2 rulemaking, pending review of the final published documents. 5. National Institute for Standards and Technology i. Digital Identity Guidelines The National Institute for Standards and Technology (NIST) has published Digital Identity Guidelines, NIST SP 800–63–3, that cover technical requirements for Federal agencies implementing digital identity. NIST Special Publication 800–63–3, Digital Identity Guidelines (June 2017), National Institute of Standards and Technology, U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, available at https://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-633.pdf. The Digital Identity Guidelines, available for free at the link provided above, define technical requirements in each of the areas of identity proofing, registration, user authentication, and related issues. Because TSA is not aware of a common industry standard for mDL provisioning that is appropriate for official REAL ID purposes today, TSA views the current NIST Digital Guidelines as critical to informing waiver application requirements for States regarding provisioning (discussed in detail in Part III.B.4., below). As discussed generally in Part III.B.4, below, under proposed rule text 46 See comments submitted by American Civil Liberties Union, Electronic Frontier Foundation, and Electronic Privacy Information Center; IDEMIA; Maryland DHS of Transportation, Motor Vehicle Administration; Underwriters Laboratories. PO 00000 Frm 00010 Fmt 4701 Sfmt 4702 § 37.10(a)(2), which requires compliance with appendix A to subpart A of the part, a State must explain, as part of its application for a waiver, how the State issues mDLs that are compliant with NIST SP 800–63–3 to provide the security for mDL IT infrastructure necessary for Federal acceptance. Section 37.4 of this proposed rule would IBR NIST SP 800–63–3. NIST has also published Digital Identity Guidelines Authentication and Lifecycle Management, NIST SP 800– 63B, as a part of NIST SP 800–63–3. NIST Special Publication 800–63B, Digital Identity Guidelines: Authentication and Lifecycle Management (June 2017), National Institute of Standards and Technology, U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, available at https://nvlpubs.nist.gov/nistpubs/ specialpublications/nist.sp.800-63b.pdf. This document provides technical requirements for Federal agencies implementing digital identity services. The standard focuses on the authentication of subjects interacting with government systems over open networks, establishing that a given claimant is a subscriber who has been previously authenticated and establishes three authenticator assurance levels. As discussed generally in Part III.B.4, below, proposed rule text § 37.10(a)(2) requires compliance with appendix A to subpart A of the part, which would require a State to explain, as part of its application for a waiver, how the State manages its mDL issuance infrastructure using authenticators at assurance levels provided in NIST SP 800–63B. Section 37.4 of this proposed rule would incorporate by reference NIST SP 800–63B. NIST is developing a revision to the Digital Identity Guidelines, SP 800–63– 4, which is expected to impact key issues related to mDL processes. This publication and its companion volumes NIST SP 800–63A Rev. 4, SP 800–63B Rev. 4, and SP 800–63C Rev. 4, provide technical guidelines for the implementation of digital identity services. Initial public drafts of this suite published in December 2022, and final drafts may publish in early 2024. The full suite of draft NIST Digital Identity Guidelines, NIST SP 800–63–4, are available for free as follows: • NIST SP 800–63–4, Digital Identity Guidelines, Initial Public Draft (December 2022), available at https:// nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-634.ipd.pdf. • NIST SP 800–63A Rev. 4 Digital Identity Guidelines: Enrollment and E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 Identity Proofing, Initial Public Draft (December 2022), available at https:// nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-63A4.ipd.pdf; • NIST SP 800–63B Rev. 4 Digital Identity Guidelines: Authentication and Lifecycle Management, Initial Public Draft (December 2022), available at https://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-63B4.ipd.pdf; • NIST SP 800–63C Rev. 4 Digital Identity Guidelines: Federation and Assertions, Initial Public Draft (December 2022), available at https:// nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-63C4.ipd.pdf. National Institute of Standards and Technology, U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. The final versions of these publications may be candidates for incorporation by reference (pending review of the final published documents) in the forthcoming Phase 2 rulemaking. ii. Federal Information Processing Standards NIST also maintains the Federal Information Processing Standards (FIPS) which relate to the specific protocols and algorithms necessary to securely process data. This suite of standards includes: • NIST FIPS PUB 140–3, Security Requirements for Cryptographic Modules (March 22, 2019), available at https://nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.140-3.pdf, • NIST FIPS PUB 180–4, Secure Hash Standard (SHS) (August 4, 2015), available at https://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.180-4.pdf, • NIST FIPS PUB 186–5, Digital Signature Standard (DSS) (February 3, 2023), available at https:// nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.186-5.pdf, • NIST FIPS PUB 197, Advanced Encryption Standard (AES) (November 26, 2001) available at https:// nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.197.pdf, • NIST FIPS PUB 198–1, The KeyedHash Message Authentication Code (HMAC) (July 16, 2008) available at https://nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.198-1.pdf, and • NIST FIPS PUB 202, SHA–3 Standard: Permutation-Based Hash and Extendable-Output Functions (August 4, 2015) available at https:// nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.202.pdf. National Institute of Standards and Technology, U.S. Department of VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. This suite of FIPS standards, available for free at the links provided above, are critical to the transactions required for mDLs, and any Federal systems which interact with or are used to verify a mDL for REAL ID official purposes will be required to use the algorithms and protocols defined. As discussed generally in Part III.B, below, § 37.10(a)(4) requires compliance with specified requirements of NIST FIPS PUB 180–4, 186–5, 197, 198–1, and 202, and appendix A to subpart A of the part, section 5, requires compliance with FIPS PUB 140–3. Section 37.4 of this proposed rule would incorporate by reference the suite of FIPS standards discussed above. iii. Security and Privacy Controls for Information Systems and Organizations; Key Management NIST has published several guidelines to protect the security and privacy of information systems: • NIST SP 800–53 Rev. 5, Security and Privacy Controls for Information Systems and Organizations (September 2020), available at https:// nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.80053r5.pdf. • NIST SP 800–57 Part 1, Rev. 5, Recommendation for Key Management: Part 1—General (May 2020), available at https://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.80057pt1r5.pdf. • NIST SP 800–57 Part 2, Rev. 1, Recommendation for Key Management: Part 2—Best Practices for Key Management Organizations (May 2019), available at https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-57pt2r1.pdf. • NIST SP 800–57 Part 3, Rev. 1, Recommendation for Key Management, Part 3: Application-Specific Key Management Guidance (January 2015) available at https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-57Pt3r1.pdf. National Institute of Standards and Technology, U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. All of these documents are available for free at the links provided above. Collectively, NIST SP 800–53 Rev. 5 and NIST SP 800–57 provide relevant controls for States regarding mDL security and privacy covering a broad range of topics related to the administration of a certificate system including: access management; certificate life-cycle policies; operational controls for facilities and personnel; technical security controls; PO 00000 Frm 00011 Fmt 4701 Sfmt 4702 60065 and vulnerability management such as threat detection, incident response, and recovery planning. Due to the sensitive nature of State Certificate System processes and the potential for significant harms to security if confidentiality, integrity, or availability of the certificate systems is compromised, the minimum risk controls specified in appendix A to subpart A of the part require compliance with the NIST SP 800–53 Rev. 5 ‘‘high baseline’’ as set forth in that document, as well as compliance with the specific risk controls described in the appendix. In addition, and as discussed generally in Part III.B, below: appendix A to subpart A of the part, secs. 1–8, require compliance with NIST SP 800–53 Rev. 5; secs. 1 and 5 require compliance with NIST SP 800–57 Part 1, Rev. 5; sec. 1 requires compliance with NIST SP 800– 57 Part 2 Rev. 1; and sec. 1 requires compliance with NIST SP 800–57 Part 3, Rev. 1. Section 37.4 of this proposed rule would incorporate by reference NIST SP 800–53 Rev. 5 and the full suite of NIST SP 800–57 references discussed above. iv. Cybersecurity Framework NIST has published the Framework for Improving Critical Infrastructure Cybersecurity v. 1.1 (April 16, 2018), National Institute of Standards and Technology, U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, available at https://nvlpubs.nist.gov/nistpubs/ CSWP/NIST.CSWP.04162018.pdf. This document, available for free at the link provided above, provides relevant information for cybersecurity for States issuing mDLs. As discussed generally in Part III.B., below, certain requirements from the NIST Cybersecurity Framework have been adopted in appendix A to subpart A of the part, secs. 1,2, 5–8. Section 37.4 of this proposed rule would incorporate by reference the NIST Cybersecurity Framework. 6. W3C Standards In its RFI, DHS specifically sought comments on industry standards that could inform future regulatory requirements.47 DHS received multiple comments 48 concerning standards being developed by the World Wide Web Consortium (W3C), which is a 47 86 FR 20320 at 20325–26. comments submitted by American Civil Liberties Union, Electronic Frontier Foundation, and Electronic Privacy Information Center; Association for Convenience & Fuel Retailing; CBN Secure Technologies; Indico.tech and Lorica Identity; Mastercard; Muller; OpenID Foundation; UL; Verifiable Credentials Policy Committee, Blockchain Advocacy Coalition. 48 See E:\FR\FM\30AUP3.SGM 30AUP3 lotter on DSK11XQN23PROD with PROPOSALS3 60066 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules standards-development organization that develops open standards for the World Wide Web. Similar to its involvement with ISO, DHS has participated in the development of these standards as a non-voting member in the W3C Credential Community Group. While TSA is not proposing to IBR these W3C standards in this NPRM, TSA understands that W3C is developing two standards concerning digital identification that, like the ISO/ IEC Series of standards discussed above, may be relevant to the Phase 2 rulemaking. The W3C standards are ‘‘Verifiable Credentials Data Model v1.1’’ (VCDM v1.1) and ‘‘Decentralized Identifiers v1.0’’ (DID v1.0). Verifiable Credentials Data Model v1.1 (March 3, 2022), W3C/MIT, 105 Broadway, Room 7–134, Cambridge, MA 02142, available at www.w3.org/TR/vc-data-model/; Decentralized Identifiers (DIDs) v1.0 (July 19, 2022), W3C/MIT, 105 Broadway, Room 7–134, Cambridge, MA 02142, available at www.w3.org/TR/didcore/. These documents are available to the public for free at the links provided above. DHS has participated in the development of these standards as a non-voting member in the W3C Credential Community Group. In March 2022, the W3C published VCDM v1.1. A ‘‘Verifiable Credential’’ (VC) is a form of digital identification, developed under this standard, with features that enable a verifying entity to confirm its authenticity.49 This standard defines elements of a data model that enables using a digital identity in online transactions. The standard appears to provide broad requirements that enable issuance of diverse types of secure digital identification using varying data fields (e.g., name, date of birth), data types (e.g., text, numeric values, length of data string), and methods of digital security. Although the standard sets forth specifications for the data model generally, TSA understands the standard does not provide specific requirements to implement security and privacy protections for the data model. Instead, references to these topics appear to be largely non-binding, informative guidance. For example, the standard requires that the VC contain at least one encryption mechanism to detect tampering (such as a digital signature), but does not set forth any specific mechanisms that are acceptable.50 Similarly, although the standard encourages the use of mechanisms to enable a VC holder to selectively release only certain data to a verifying entity, it does not specify 49 See 50 See VCDM sections 1 and 2. VCDM sections 4.7 and 8.1. VerDate Sep<11>2014 18:44 Aug 29, 2023 acceptable implementation mechanisms.51 In July 2022, W3C published complementary standard DID v1.0, which specifies the essential requirements to enable the use of diverse types of digital identification in online transactions. A ‘‘DID,’’ is a unique identifier used in online transactions that, for example, enables VC holders to authenticate themselves. A DID can be used in a blockchain system. Like the VCDM standard, DHS understands that the DIDs standard includes non-binding guidance, but no prescriptive specifications, concerning security and privacy. In their current forms, TSA understands that the W3C VCDM standard and DID standard focus on the use of digital identification in unattended mode internet transactions, which is different from the attended, inperson REAL ID transactions contemplated for mDLs under this rulemaking. In addition, the current versions of the W3C standards do not set forth specific requirements concerning security and privacy or an mDL-specific data model, which may impede States from developing standardized, interoperable mDLs. Several commenters also expressed similar concerns.52 TSA is not aware of any State pursuing an mDL with the VCDM model as the sole data model. However, TSA understands that W3C’s work is ongoing, and future revisions may set forth security, privacy requirements, interoperability requirements, and a standardized data model needed for in-person REAL ID identity verification. In addition, given the breadth of the VCDM and DID, it may be possible in the future to develop a VCDM-based mDL that conforms to both W3C recommendations and the ISO/IEC standards simultaneously, providing full ecosystem interoperability. As stated above, TSA is not proposing to IBR these W3C Standards in this NPRM. TSA understands that the standards and guidelines discussed above in this Part II.D. are the most comprehensive and relevant references governing mDLs today. TSA also acknowledges that many additional standards and guidelines are in development covering diverse types of digital identification that can be issued and verified by different entities, both government and commercial. These emerging documents are expected to concisely synthesize the large body of existing work from NIST and standards-development 51 See 52 See Jkt 259001 PO 00000 VCDM sections 5.8 and 7.8. comments submitted by Muller and UL. Frm 00012 Fmt 4701 Sfmt 4702 organizations, and will provide standardized mechanisms for mDLs. After carefully evaluating comments concerning emerging industry standards and closely observing ongoing development, TSA does not endorse any emerging standards at this time. TSA will continue to monitor development, and the future Phase 2 rulemaking may incorporate by reference pertinent parts of emerging standards (pending review of final published documents) that TSA believes are appropriate for Federal acceptance of mDLs for REAL ID official purposes. E. DHS and TSA Involvement in mDLs DHS and TSA have been actively participating in the mDL and digital identity space for many years to keep pace with industry developments. DHS has been participating in industry standards-development activities by serving as a non-voting member on working groups of the ISO/IEC and the W3C that are developing mDL/digital identity standards and technical specifications. Concurrently, DHS and TSA have been collaborating with industry to test the use of mDLs at various TSA security checkpoints. In 2022, TSA, under its collaboration with Apple (see Part II.C.3., above), launched a limited initiative that enables Arizona, Maryland, and Colorado residents to test the use of mDLs provisioned into the Apple Wallet app at select airport security checkpoints.53 On May 18, 2023, TSA announced acceptance of Georgia mDLs provisioned into the Apple Wallet app at select airport security checkpoints.54 Similarly, on March 1, 2023 and June 1, 2023, TSA announced acceptance of Utah-issued mDLs provisioned into the GET Mobile ID app, and Maryland-issued mDLs provisioned into the Google Wallet app, respectively, at select airports.55 Utah 53 See TSA Biometrics Technology website, https://www.tsa.gov/biometrics-technology; Press Release, TSA, TSA enables Arizona residents to use mobile driver’s license or state ID for verification at Phoenix Sky Harbor International Airport (Mar. 23, 2022), available at https://www.tsa.gov/news/press/ releases/2022/03/23/tsa-enables-arizona-residentsuse-mobile-drivers-license-or-state-id; Press Release, TSA, TSA enables Maryland residents to use mobile driver’s license or state ID for verification at Baltimore/Washington International and Reagan National Airports (May 25, 2022), available at https://www.tsa.gov/news/press/releases/2022/05/ 25/tsa-enables-maryland-residents-use-mobiledrivers-license-or-state. 54 Press release, TSA, TSA enables Georgia residents to use mobile driver’s license or state ID for verification at ATL (May 18, 2023), available at https://www.tsa.gov/news/press/releases/2023/05/ 18/tsa-enables-georgia-residents-use-mobile-driverslicense-or-state-id 55 Press Release, TSA, TSA using state-of-the art identity verification technology, accepting mobile driver licenses at SLC security checkpoint (Mar. 9, E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules utilizes a third-party mDL app produced by GET Group North America. DHS and TSA anticipate additional collaborations with other States and vendors in the future. These programs enable States, industry, and the Federal government to evaluate mDLs and ensure that they provide the security, privacy, and interoperability necessary for future, full-scale acceptance at Federal agencies for official purposes as defined in the REAL ID Act. III. Summary of the Proposed Rule lotter on DSK11XQN23PROD with PROPOSALS3 A. Overview In addition to revising definitions applicable to the REAL ID Act to incorporate mDLs, this rule proposes changes to 6 CFR part 37 that would enable TSA to grant a temporary waiver to States that TSA determines issue mDLs consistent with specified TSA requirements concerning security, privacy, and interoperability. This rule would enable Federal agencies, at their discretion, to accept for REAL ID official purposes, mDLs issued by a State that has been granted a waiver. The proposed rule would apply only to Federal agency acceptance of Stateissued mDLs as defined in this proposed rule for REAL ID official purposes, but not other forms of digital identification, physical driver’s licenses or physical identification cards, or non-REAL ID purposes. Any temporary waiver issued by TSA would be valid for a period of 3 years from the date of issuance. The waiver enabled by this rulemaking would be repealed when TSA publishes a Phase 2 rule that would set forth comprehensive requirements for mDLs. To obtain a waiver, a State would be required to submit an application, supporting data, and other documentation to establish that their mDLs meet TSA-specified criteria (discussed in Part III.B.4., below) concerning security, privacy, and interoperability. If the Secretary determines, upon evaluation of a State’s application and supporting documents, that a State’s mDL could be securely accepted under the terms of a waiver, the Secretary may issue such State a certificate of waiver. TSA intends to work with each State applying for a waiver on a case-by-case basis to ensure that its mDLs meet the minimum requirements necessary to obtain a 2023), available at https://www.tsa.gov/news/press/ releases/2023/03/09/tsa-using-state-art-identityverification-technology-accepting; Press Release, TSA, TSA now accepts mobile IDs in Google Wallet on Android mobile devices, starting with the State of Maryland (June 1, 2023), available at https:// www.tsa.gov/news/press/releases/2023/06/01/tsanow-accepts-mobile-ids-google-wallet-androidmobile-devices. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 waiver. This rulemaking would establish the full process for a State to apply for a waiver, including instructions for submitting the application and responding to subsequent communications from TSA as necessary, specific information and documents that a State must provide with its application, and requirements concerning timing, issuance of decisions, requests for reconsideration, and terms, conditions, and limitations related to waivers. To assist States that are considering applying for a waiver, TSA has developed guidelines, entitled, ‘‘Mobile Driver’s License Waiver Application Guidance,’’ which provide non-binding recommendations of some ways that States can meet the application requirements set forth in this rulemaking.56 TSA cautions, however, that the waiver enabled by this rulemaking is not a commitment by Federal agencies to accept mDLs issued by a State to whom TSA has granted a waiver. Federal agencies exercise full discretion over their identity verification policies, which may be subject to change. A Federal agency that accepts mDLs may suddenly halt acceptance for reasons beyond the agency’s control, such as suspension or termination of a waiver, technical issues with IT systems, or a loss of resources to support mDLs. In such instances, an mDL holder seeking to use an mDL for REAL ID official purposes (including boarding commercially regulated aircraft or access to Federal facilities) may be denied such uses. To avoid this issue, TSA strongly urges all mDL holders to carry their physical REAL ID cards in addition to their mDLs. This will ensure that mDL holders are not disenfranchised from REAL ID uses if a Federal agency does not accept mDLs. Indeed, TSA has long advised that passengers who choose to present mDLs in TSA checkpoint testing must continue to have their physical cards readily available in the event that a TSA 56 The specific measures and practices discussed in the DHS Waiver Application Guidance are neither mandatory nor necessarily the ‘‘preferred solution’’ for complying with the requirements proposed in the rule. Rather, they are examples of measures and practices that a State issuer of mDLs may choose to consider as part of its overall strategy to issue mDLs. States have the ability to choose and implement other measures to meet these requirements based on factors appropriate to that State, so long as DHS determines that the measures implemented provide the levels of security and data integrity necessary for Federal acceptance of mDLs for official purposes as defined in the REAL ID Act and 6 CFR part 37. As provided in proposed § 37.10(c) of 6 CFR part 37, DHS may periodically update the Guidance as necessary to recommend mitigations of evolving threats to security, privacy, or data integrity. PO 00000 Frm 00013 Fmt 4701 Sfmt 4702 60067 officer requires such identification.57 TSA also recommends to Federal agencies that they regularly inform the public, in a form and manner of their choosing, of their mDL acceptance policies. TSA urges the public to view mDLs not as a replacement of physical REAL ID cards, but as a complement to them. B. Specific Provisions 1. Definitions TSA proposes adding new definitions to subpart A, § 37.3. In particular, new definitions for ‘‘mobile driver’s license’’ and ‘‘mobile identification card’’ are necessary because the current regulations predated the emergence of mDL technology and, therefore, does not define these terms. Additionally, the definitions reflect changes made by the REAL ID Modernization Act, which amended the definitions of ‘‘driver’s license’’ and ‘‘identification card’’ to specifically include ‘‘mobile or digital driver’s licenses’’ and ‘‘mobile or digital identification cards.’’ The proposed definitions in this rule would provide a more precise definition of ‘‘mobile driver’s license’’ and ‘‘mobile identification card’’ by clarifying that those forms of identification require a mobile electronic device to store the identification information, as well as an electronic device to read that information. TSA also proposes adding a new definition of ‘‘mDL’’ that collectively refers to mobile versions of both State-issued driver’s licenses and State-issued identification cards as defined in the REAL ID Act. TSA also proposes adding additional definitions to explain terms used in § 37.10(a) and appendix A to subpart A to the part. For example, the proposed rule would add new defintions for ‘‘digital certificates’’ and ‘‘certificate systems,’’ which are necessary elements of risk controls for the IT systems that States use to issue mDLs. In addition, the rulemaking proposes adding a definition for ‘‘certificate policy,’’ which forms the governance framework for the State’s certificate systems. A State must develop, maintain, and execute a certificate policy to comply with the requirements set forth in appendix A to subpart A of the part. 2. TSA Issuance of Temporary Waiver From § 37.5(b) and State Eligibility Criteria TSA proposes adding to subpart A new § 37.7, entitled ‘‘Temporary waiver for mDLs; State eligibility,’’ to establish the availability of a temporary waiver 57 See, e.g., https://www.tsa.gov/real-id (see FAQ for ‘‘Does TSA accept mobile driver’s licenses?’’). E:\FR\FM\30AUP3.SGM 30AUP3 60068 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 for a State to exempt its mDLs from meeting the card-based compliance requirement of § 37.5(b). Section 37.7(a) authorizes TSA to issue a temporary certificate of waiver to States that submit an application for a waiver that demonstrates compliance with application criteria set forth in § 37.10(a) and (b). This waiver would only apply to mDLs, not physical cards, and would not waive the requirement in § 37.5(b) regarding State-based compliance or any other requirements in the regulations. Issuance of a certificate of waiver to a State would permit Federal agencies to continue accepting for official purposes mDLs issued by those States when REAL ID enforcement begins on May 7, 2025. The mere issuance of a waiver to a State, however, does not obligate any Federal agency to accept an mDL issued by such State; each Federal agency retains discretion to determine its own policies regarding identification, including whether to accept mDLs. To be eligible for consideration for a waiver, a State must meet the criteria set forth in proposed § 37.7(b). These criteria require that the issuing State: is in full compliance with REAL ID requirements; has submitted an application demonstrating that the State issues mDLs that provide security, privacy, and interoperability necessary for Federal acceptance; and issues mDLs only to individuals who have been issued a valid and unexpired REAL IDcompliant physical driver’s license or identification card. TSA’s determination of whether a State satisfies the eligibility criteria would be based on TSA’s evaluation of the information provided by the State in its application (see Part III.B.4., below), as well as other information available to TSA. 3. Requirements for Federal Agencies That Accept mDLs TSA proposes adding to subpart A new § 37.8, entitled ‘‘Requirements for Federal agencies accepting mDLs issued by States with temporary waiver.’’ This section proposes that any Federal agency that elects to accept mDLs for REAL ID official purposes must meet three requirements in proposed new § 37.8. First, a Federal agency must confirm that the State holds a valid certificate of waiver. Agencies would make this confirmation by verifying that the State’s name appears in a list of States to whom TSA has granted a waiver. TSA would publish this list on the REAL ID website at www.dhs.gov/ real-id/mDL (as provided in § 37.9(b)(1)). Second, Federal agencies must use an mDL reader to retrieve mDL data from an individual’s mobile device, VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 and validate that the data is authentic and unchanged. To retrieve and validate mDL data, Federal agencies must follow the processes required by industry standard ISO/IEC 18013–5:2021. Finally, if a State discovers that acceptance of a State’s mDL is likely to cause imminent or serious threats to the security, privacy, or data integrity, the State must notify TSA at www.dhs.gov/ real-id/mDL within 72 hours of such discovery. Examples of such triggering events include cyber-attacks and other events that cause serious harm to a State’s mDL issuance system. TSA would consider whether such information warrants suspension of that State’s waiver under § 37.9(e)(4)(i)(B) (see discussion in Part III.B.6., below). If TSA elects not to issue a suspension, Federal agencies would continue to exercise their own discretion regarding continuing acceptance of mDLs. 4. Requirements for States Seeking to Apply for a Waiver TSA proposes adding to subpart A new § 37.9, which would set forth a process for a State to request a temporary certificate of waiver established in new § 37.7. As provided in § 37.9(a), a State seeking a waiver must file a complete application as set forth in § 37.10(a) and (b), following instructions that would be available at www.dhs.gov/real-id/mDL. Section 37.10(a) and (b) would set forth all information, documents, and data that a State must include in its application for a waiver. TSA is proposing that if TSA determines that the means that a State implements to comply with the requirements in § 37.10(a) and (b) provide the requisite levels of security, privacy, and data integrity for Federal acceptance of mDLs for official purposes, TSA would grant such State a waiver. TSA does not, however, propose prescribing specific means (other than the requirements specified in appendix A to subpart A of the part, which is discussed further in Part III.B.4.iv, below) that a State must implement. Instead, States would retain broad discretion to choose and implement measures to meet these requirements based on factors appropriate to that State. (i) Application Requirements As set forth in § 37.10(a)(1) through (4), a State would be required to establish in its application how it issues mDL under the specified criteria for security, privacy, and interoperability suitable for acceptance by Federal agencies, as follows: • Paragraph (a)(1) would set forth requirements for mDL provisioning. PO 00000 Frm 00014 Fmt 4701 Sfmt 4702 • Paragraph (a)(2) would specify requirements for managing State Certificate Systems, which are set forth in appendix A to subpart A of the part. • Paragraph (a)(3) would require a State to demonstrate how it protects personally identifiable information of individuals during the mDL provisioning process. • Paragraph (a)(4) would require a State to establish: how it issues mDLs that are interoperable with requirements set forth in standard ISO/IEC 18013– 5:2021; that the State uses only those algorithms for encryption,58 secure hash function,59 and digital signatures that are specified in ISO/IEC 18013–5:2021, and in NIST FIPS PUB 180–4, 186–5, 197, 198–1, and 202; and how the State complies with the ‘‘AAMVA mDL data element set’’ as defined in the AAMVA mDL Guidelines v. 1.2, Section 3.2 (see Part II.D., above, for a detailed discussion of those references). (ii) Audit Requirements Section 37.10(b) would require a State to submit an audit report prepared by an independent auditor verifying the accuracy of the information provided by the State in response to § 37.10(a), as follows: • Paragraph (1) would set forth specific experience, qualifications, and accreditations that an auditor must meet. • Paragraph (2) would require a State to provide information demonstrating the absence of a potential conflict of interest of the auditing entity. (iii) Waiver Application Guidance As set forth in § 37.10(c), TSA proposes to publish ‘‘Mobile Driver’s License Waiver Application Guidance,’’ in the Federal Register and on the REAL ID website at www.dhs.gov/real-id/mDL to assist States in completing their applications. The proposed guidance document is available for review at www.regulations.gov/docket/TSA–2023– 0002. TSA is accepting comments on the guidance along with this proposed rule. This guidance would provide TSA’s recommendations for some ways that States can meet the requirements in § 37.10(a)(1). The guidance would not establish legally enforceable 58 Encryption refers to the process of cryptographically transforming data into a form in a manner that conceals the data’s original meaning to prevent it from being read. Decryption is the process of restoring encrypted data to its original state. [IETF RFC 4949, Internet Security Glossary, Version 2, August 2007] 59 A function that processes an input value creating a fixed-length output value using a method that is not reversible (i.e., given the output value of a function it is computationally impractical to find the function’s corresponding input value). E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 requirements for a States applying for a waiver. Instead, the guidance would provide non-binding examples of measures and practices that a State may choose to consider as part of its overall strategy to issue mDLs. States continue to exercise discretion to select processes not included in the Guidance. Given the rapidly-evolving cyber threat landscape, however, TSA may periodically update its guidance to provide additional information regarding newly-published standards or other sources, or recommend mitigations of newly discovered risks to the mDL ecosystem. TSA would publish updated guidance in the Federal Register and on the REAL ID website at www.dhs.gov/real-id/mDL, and would provide a copy to all States that have applied for or been issued a certificate of waiver. Updates to guidance will not impact issued waivers or pending applications. (iv) Appendix A to Subpart A: Requirements for State mDL Issuance Systems Appendix A to subpart A of the part sets forth fundamental requirements to ensure the security and integrity of State mDL issuance processes. More specifically, these requirements concern the creation, issuance, use, revocation, and destruction of the State’s certificate systems and cryptographic keys. The appendix consists of requirements in eight categories: (1) Certificate Authority Certificate Life Cycle Policy, (2) Certificate Authority Access Management, (3) Facility, Management, and Operational Controls, (4) Personnel Security Controls, (5) Technical Security Controls, (6) Threat Detection, (7) Logging, and (8) Incident Response and Recovery Plan. Adherence to these requirements ensures that States issue mDLs in a standardized manner with security and integrity to establish the trust necessary for Federal acceptance for official purposes. • Certificate Authority Certificate Life Cycle Policy requirements (appendix A, sec. 1) ensure that a State issuing an mDL creates and manages a formal process which follows standardized management and protections of digital certificates. These requirements must be implemented in full compliance with the references cited in the appendix: the CA Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, CA Browser Forum Network and Certificate System Security Requirement, NIST Cybersecurity Framework, NIST SP 800–53 Rev. 5, NIST SP 800–57, and NIST SP 800–53B. • Certificate Authority Access Management requirements (appendix A, VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 sec. 2) set forth policies and processes for States concerning, for example, restricting access to mDL issuance systems, policies for multi-factor authentication, defining the scope and role of personnel, and Certificate System architecture which separates and isolates Certificate System functions to defined security zones. These requirements must be implemented in full compliance with the references cited in the appendix: CA Browser Forum Network and Certificate System Security Requirements, NIST Cybersecurity Framework, NIST 800–53 Rev. 5, NIST SP 800–63–3, and NIST SP 800–63B. • Under the requirements concerning Facility, Management, and Operational Controls (appendix A, sec. 3), States must provide specified controls protecting facilities where Certificate Systems reside from unauthorized access, environmental damage, physical breaches, and risks from foreign ownership, control, or influence. These requirements must be implemented in full compliance with the references cited in the appendix: NIST SP 800–53 Rev. 5. • Personnel security controls (appendix A, sec. 4) require States to establish policies to control insider threat risks to Certificate Systems and facilities. Such policies must include establish screening criteria for personnel who access Certificate Systems, postemployment access termination, updates to personnel security policy, training, records retention schedules, among other policies. These requirements must be implemented in full compliance with the references cited in the appendix: NIST SP 800–53 Rev. 5 and CA Browser Forum Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. • Technical security controls (appendix A, sec. 5) specify requirements to protect Certificate System networks. In addition, States are required to protect private cryptographic keys of Issuing Authority Root Certificates using hardware security modules of Level 3 or higher and Document Signer private cryptographic keys in hardware security modules of Level 2 and higher. Other controls are specified regarding Certificate System architecture and cryptographic key generation processes. These requirements must be implemented in full compliance with the references cited in the appendix: CA Browser Forum Network and Certificate System Security Requirements, CA Browser Forum Baseline Requirements for the Issuance and Management of PO 00000 Frm 00015 Fmt 4701 Sfmt 4702 60069 Publicly-Trusted Certificates, NIST Cybersecurity Framework, NIST SP 800–53 Rev. 5, NIST SP 800–57, and NIST FIPS 140–3. • Under requirements for threat detection (appendix A, sec. 6), States must implement controls to monitor and log evolving threats to various mDL issuance infrastructure, including digital certificate, issuance, and support systems. These requirements must be implemented in full compliance with the references cited in the appendix: CA Browser Forum Network and Certificate System Security Requirements, CISA Cybersecurity Incident & Vulnerability Response Playbooks, NIST Cybersecurity Framework, NIST SP 800–53 Rev. 5. • Logging controls (appendix A, sec. 7) require States to record various events concerning Certificate Systems, including the management of cryptographic keys, digital certificate lifecycle events. The controls set forth detailed requirements concerning specific types of events that must be logged, as well as timeframes for maintaining such logs. These requirements must be implemented in full compliance with the references cited in the appendix: CA Browser Forum Baseline Requirements for the Issuance and Management of PubliclyTrusted Certificates, NIST Cybersecurity Framework, and NIST SP 800–53 Rev. 5. • Finally, section 8 of appendix A requires States to implement policies to respond to and recover from security incidents. States must act on logged events, issue alerts to relevant personnel, respond to alerts within a specified time period, perform vulnerability scans, among other things. In particular, States must provide written notice to TSA at www.dhs.gov/ real-id/mDL within 72 hours of discovery of a significant cyber incident or breach that could compromise the integrity of a Certificate System. These requirements must be implemented in full compliance with the references cited in the appendix: CA Browser Forum Network and Certificate System Security Requirements, CISA Cybersecurity Incident & Vulnerability Response Playbooks, CISA National Cyber Incident Response Plan; NIST SP 800–53 Rev. 5, NIST Cybersecurity Framework. TSA invites comment on all aspects of the waiver application requirements and costs of compliance, including the Waiver Application Guidance, appendix A to subpart A to the part, the appropriateness of requiring compliance with the specified standards and guidelines and any alternate standards that should be considered, and other recommendations E:\FR\FM\30AUP3.SGM 30AUP3 60070 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 that commenters believe TSA should consider. 5. Decisions on Applications for Waiver Section 37.9(b) would establish a timeline and process for TSA to issue decisions on a waiver application. Under this paragraph, TSA would endeavor to provide States a decision on initial applications within 60 days, but not longer than 90 days. TSA would provide three types of written notice via email: approved, insufficient, or denied. If TSA approves a State’s application for a waiver, TSA would memorialize that decision by issuing a certificate of waiver to that State, and including the State in a list of State-mDLs approved for Federal use, published by TSA on the REAL ID website at www.dhs.gov/ real-id/mDL. A certificate of waiver would specify the date that the waiver becomes effective, the expiration date, and any other terms and conditions with which a State must comply, as provided under proposed § 37.9(d). A State seeking to renew its certificate beyond the expiration date must reapply for a waiver, as provided in § 37.9(e)(6). If TSA determines that an application is insufficient, did not respond to certain information required in § 37.10(a) or (b), or contains other deficiencies, TSA would provide an explanation of such deficiencies and allow the State an opportunity address the deficiencies within the timeframe specified in § 37.9(b)(2). TSA would permit States to submit multiple amended applications if necessary, with the intent of working with States individually to enable their mDLs to comply with the requirements of § 37.10(a) and (b). If TSA denies an application, TSA would provide the specific grounds for the basis of the denial and afford the State an opportunity to submit a new application. As stated in § 37.9(c), TSA would also provide a State an opportunity to seek reconsideration of a denied application. Instructions for seeking reconsideration would be provided by TSA on the REAL ID website at www.dhs.gov/real-id/mDL. An adverse decision upon reconsideration would be considered a final agency action. As provided in § 37.9(c), however, a State whose request for reconsideration has been denied may submit a new application for a waiver. 6. Limitations, Suspension, and Termination of Certificate of Waiver Section 37.9(e) would set forth various restrictions on a certificate of waiver. Specifically, in paragraph (e)(1) of this section, TSA proposes that a VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 certificate of waiver would be valid for a period of three years from the date of issuance. Paragraph (e)(2) proposes that a State must report to TSA if, after it receives a waiver, it makes significant modifications to its mDL issuance processes that differ in a material way from information that the State provided in its application. If the State makes such modifications, it would be required to report such changes 60 days before implementing the changes. This requirement is intended to apply to changes that may undermine the bases on which TSA granted a waiver. The reporting requirement is not intended to apply to routine, low-level changes, such as systems maintenance and software updates and patches. Paragraph (e)(3) would require a State that is issued a waiver to comply with all requirements specified in §§ 37.51(a) and 37.9(d)(3). Section 37.9(e)(4) sets forth processes for suspension of certificates of waiver. As provided in proposed § 37.9(e)(4)(i)(A), TSA may suspend the validity of a certificate of waiver if TSA determines that a State: • fails to comply with any terms and conditions (see § 37.9(d)(3)) specified in the certificate of waiver; • fails to comply with reporting requirements (see § 37.9(e)(2)); or • issues mDLs in a manner that is not consistent with the information the State provided in its application for a waiver under § 37.10(a) and (b). Before suspending a waiver for these reasons, TSA will provide such State written notice via email that it intends to suspend its waiver, along with an explanation of the reasons, information on how the State may address the deficiencies, and a timeline for the State to respond and for TSA to reply to the State, as set forth in § 37.9(e)(4)(ii). DHS may withdraw the notice of suspension, request additional information, or issue a final suspension. If TSA issues a final suspension of a State’s certificate of waiver, DHS will remove the name of that State from the list of mDLs approved for Federal acceptance for official purposes. TSA additionally may suspend a State’s waiver at any time upon discovery that Federal acceptance of a State’s mDL is likely to cause imminent or serious threats to the security, privacy, or data integrity of any Federal agency, as proposed by § 37.9(e)(4)(i)(B). Suspension would apply to all Federal agencies and would not be agencyspecific. Examples of such triggering events include cyber-attacks and other events that cause serious harm to a State’s mDL issuance systems. If a State discovers a significant cyber incident PO 00000 Frm 00016 Fmt 4701 Sfmt 4702 that it believes could compromise the integrity of its mDL issuance systems, sec. 8.6 of appendix A to subpart A of the part would require States to provide written notice to TSA, at www.dhs.gov/ real-id/mDL, of such incident within 72 hours of discovery. If TSA determines such suspension is necessary, TSA will provide written notice via email to each State whose certificate of waiver is affected, as soon as practicable after discovery of the triggering event, providing an explanation for the suspension, as well as an estimated timeframe for resumption of the validity of the certificate of waiver. It is TSA’s intent to work with States to resolve the conditions that could lead to suspension and avoid issuing a final suspension. If TSA issues a final suspension of any State’s certificate of waiver, TSA will temporarily remove the name of that State from the list of mDLs approved for Federal acceptance for official purposes. A State receiving a final suspension may apply for a new certificate of waiver by submitting a new application. Under § 37.9(e)(5), TSA may terminate a certificate of waiver for serious or egregious violations. More specifically, TSA may terminate a waiver if TSA determines that a State: • does not comply with REAL ID requirements in § 37.51(a); • is committing an egregious violation of any terms and conditions (see § 37.9(d)(3)) specified in the certificate of waiver and is unwilling to cure such violation; • is committing an egregious violation of reporting requirements (see § 37.9(e)(2)) and is unwilling to cure such violation; or • provided false information in its waiver application. Before terminating a certificate of waiver, TSA would provide written notice via email of intent to terminate, including findings supporting the termination and an opportunity to present information. As specified, a State would have 7 days to respond to the notice, and TSA would respond via email within 30 days. TSA may withdraw the notice of termination, request additional information, or issue a final termination. If TSA issues a final termination of a State’s certificate of waiver, TSA will remove the name of that State from the list of mDLs approved for Federal acceptance for official purposes. A State whose certificate of waiver has been terminated may apply for a new certificate of waiver by submitting a new application. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 7. Effect of a Status of Waiver on REAL ID Compliance Section 37.9(f) clarifies that the status of a State’s certificate of waiver, including the status of an application for a waiver, has no bearing on TSA’s determination of that State’s compliance or non-compliance with any other section of this part. A certificate of waiver that TSA has issued to a State is not a determination that the State is in compliance with any other section in this part. Similarly, an application for a waiver that TSA has deemed insufficient or denied, or a certificate of waiver TSA has suspended, terminated, or expired, is not a determination that the State is not in compliance with any other section in this part. lotter on DSK11XQN23PROD with PROPOSALS3 8. Incorporation by Reference TSA proposes adding to subpart A, § 37.4, the following industry standards and government guidelines that this rulemaking proposes to incorporate by reference (discussed in detail in Part II.D., above): • AAMVA Æ Mobile Driver’s License (mDL) Implementation Guidelines, Version 1.2 (Jan. 2023); • CA/Browser Forum Æ Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.8.6 (Dec. 14, 2022), Æ Network and Certificate System Security Requirements, Version 1.7 (Apr. 5, 2021); • CISA Æ Cybersecurity Incident & Vulnerability Response Playbooks (Nov. 2021), Æ National Cyber Incident Response Plan (Dec. 2016); • ISO/IEC Æ ISO/IEC 18013–5:2021, Personal identification—ISO-compliant driving licence—Part 5: Mobile driving licence (mDL) application, Edition 1 (Sept. 2021); • NIST Æ FIPS PUB 140–3, Security Requirements for Cryptographic Modules (Mar. 22, 2019), Æ FIPS PUB 180–4, Secure Hash Standard (SHS) (Aug. 2015), Æ FIPS PUB 186–5, Digital Signature Standard (DSS) (Feb. 2023), Æ FIPS PUB 197, Advanced Encryption Standard (AES) (Nov. 26, 2001), Æ FIPS PUB 198–1, The Keyed-Hash Message Authentication Code (HMAC) (July 2008), Æ FIPS PUB 202, SHA–3 Standard: Permutation-Based Hash and Extendable-Output Functions (Aug. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 2015), Æ SP 800–53, Security and Privacy Controls for Information Systems and Organizations, Rev. 5 (Sept. 2020), Æ SP 800–57 Part 1, Recommendation for Key Management: Part 1— General, Rev. 5 (May 2020), Æ SP 800–57 Part 2, Recommendation for Key Management: Part 2—Best Practices for Key Management Organization, Rev. 1 (May 2019), Æ SP 800–57 Part 3, Recommendation for Key Management: Part 3: Application-Specific Key Management Guidance, Rev. 1 (Jan. 2015), Æ SP 800–63–3, Digital Identity Guidelines, (June 2017), Æ SP 800–63B, Digital Identity Guidelines Authentication and Lifecycle Management (June 2017), and Æ Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 (Apr. 16, 2018). C. Impacted Stakeholders The proposed changes would apply to State driver’s licensing agencies issuing mDLs that seek a temporary waiver from TSA for its mDLs. The waiver would enable Federal agencies to accept such mDLs for official purposes, defined in the REAL ID Act as accessing Federal facilities, entering nuclear power plants, boarding federally regulated commercial aircraft, and any other purposes that the Secretary shall determine. Any Federal agency that chooses to accept mDLs for official purposes must procure a reader in order to receive an individual’s identity data. This proposed rule does not impose any requirements on: • States that do not seek a waiver for mDLs; • Non-State issuers of other forms of digital identification; or • Federal agencies to accept mDLs. A State seeking a waiver for Federal acceptance of its mDLs for official purposes would be required to file with TSA a complete application and supporting documents. An application form and instructions would be published by TSA in a form and manner prescribed by TSA, such as a TSAspecified website. Through the application, the State would be required to demonstrate how its mDLs meet the requirements for a waiver set forth in § 37.10(a) and (b). D. Use Cases Affected by This Proposed Rule The scope of this proposed rule is confined strictly to Federal acceptance of mDLs for official purposes, defined PO 00000 Frm 00017 Fmt 4701 Sfmt 4702 60071 by the REAL ID regulations as accessing Federal facilities, entering nuclear power plants, and boarding federally regulated commercial aircraft. Any other purpose is beyond the scope of this rulemaking. For example, a waiver issued under this proposed rule would not apply to any of the following: • mDL acceptance by Federal agencies for non-REAL ID official uses (e.g., applying for Federal benefits); • mDL acceptance by non-Federal agencies (e.g., State agencies, businesses, private persons); • Commercial transactions; or • Physical driver’s licenses or identification cards. Nothing in this proposed rule would require Federal agencies to accept mDLs; each Federal agency retains the discretion to determine its identification policies. Additionally, nothing in this proposed rule would require a State to seek a waiver or issue mDLs. IV. Discussion of Public Comments in the RFI As discussed in Part II.B., above, DHS issued an RFI 60 on April 19, 2021, and requested comments from the public to be submitted by June 18, 2021. In addition, DHS and TSA held a virtual public meeting on June 30, 2021, to provide an additional forum for public comments, and extended the RFI comment period until July 30, 2021, to permit additional comments following the public meeting.61 Approximately 100 persons attended the public meeting. In response to discussion at the public meeting and comments to the RFI concerning the importance of access to the primary industry standard referenced in the RFI, ISO/IEC 18013– 5:2021, DHS facilitated public access to the standard by publishing a notification 62 in the Federal Register on September 16, 2021, providing instructions to the public to gain access to the standard without cost. Approximately 30 persons requested and received access. Additionally, DHS reopened the comment period until October 18, 2021. With the comment period extension and reopening, DHS provided a total RFI comment period of 180 days. DHS received roughly 60 comments to the RFI from a diverse group of stakeholders, including advocacy groups representing varied interests, individuals, State government agencies, trade associations, and industry. An analysis of comments received showed that topics of interest to stakeholders 60 86 FR 20320. FR 31987. 62 86 FR 51625. 61 86 E:\FR\FM\30AUP3.SGM 30AUP3 60072 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 concerned: the need for standardization and/or Federal guidance,63 potential benefits to the public from mDLs generally,64 and the appropriateness of ISO/IEC standards as a starting point for regulatory requirements.65 Input received from these stakeholders, as it relates to the focus of this NPRM, is included and referenced throughout this proposed rule. In addition to the issues already discussed, many commenters raised concerns about potential privacy risks depending on the mode of data transfer. For background, an mDL reader can retrieve an individual’s data under two different modes of operation: a ‘‘device retrieval’’ mode (also known as ‘‘offline’’) in which data is retrieved directly from an mDL holder’s mobile device, and a ‘‘server retrieval’’ mode (also known as ‘‘online’’) in which the data is retrieved from a State driver’s licensing agency.66 In its RFI, DHS noted that it was considering both modes of operation for Federal acceptance for official purposes, and specifically sought comments on the security and privacy risks, and mitigating solutions for both modes.67 DHS received numerous comments from advocacy groups, industry, and States concerning potential privacy risks posed specifically by server retrieval mode.68 Chief among these concerns was the potential for mDL usage to be tracked. TSA has observed that security and 63 See, e.g., comments submitted by: American Association of Motor Vehicles Administrators; CBN Secure Technologies; DocuSign; FaceTec; IDmachines; Maryland DHS of Transportation, Motor Vehicle Administration; National Conference of State Legislatures; State of Connecticut, DHS of Motor Vehicles; U.S. Travel Association. 64 See, e.g., comments submitted by: Applied Recognition; Bredemarket; Hiday; IDmachines; Mothershed; Muller; State of Connecticut, DHS of Motor Vehicles; U.S. Travel Association. 65 See, e.g., comments submitted by: American Association of Motor Vehicle Administrators; American Civil Liberties Union, Electronic Frontier Foundation, and Electronic Privacy Information Center; Apple; Association for Convenience & Fuel Retailing; CBN Secure Technologies; FaceTec; Florida DHS of Highway Safety and Motor Vehicles; IDEMIA; Maryland DHS of Transportation, Motor Vehicle Administration; National Immigration Law Center and Undersigned Organizations; Secure Technology Alliance; State of Connecticut, DHS of Motor Vehicles; Underwriters Laboratories; Verifiable Credentials Policy Committee, Blockchain Advocacy Coalition. 66 86 FR 20323–24. 67 86 FR 20326. 68 See, e.g., comments submitted by American Association of Motor Vehicle Administrators; American Civil Liberties Union, Electronic Frontier Foundation, and Electronic Privacy Information Center; Association for Convenience and Fuel Retailing; Better Identity Coalition; Electronic Privacy Information Center; IDEMIA; National Immigration Law Center, and Undersigned Organizations; and Verifiable Credentials Policy Committee—Blockchain Advocacy Coalition. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 privacy protections to mitigate such concerns are evolving and unsettled, and after careful consideration of commenters’ concerns, TSA does not believe server retrieval mode is appropriate for Federal acceptance for official purposes at this time. TSA will continue monitoring industry developments and may update its conclusions in the Phase 2 rulemaking, if warranted. DHS also received comments on other topics, including non-REAL ID use cases such as commercial transactions and technical information on various topics. As noted above, a waiver issued under the proposed rule would not address use of an mDL for commercial transactions or any other non-Federal purposes not covered by the REAL ID Act or regulations. In general, mDL acceptance by Federal agencies for nonREAL ID official purposes, mDL acceptance by non-Federal agencies, and mDL use in commercial transactions go beyond the scope of the REAL ID Act’s official purposes. Although not the focus of this proposal, TSA may examine some of these issues through its on-going mDL efforts, such as mDL collaborations with industry, which could inform future regulatory proposals. To support this interest, TSA appreciates stakeholders’ perspectives on these topics. V. Consultation With States, NonGovernmental Organizations, and the Department of Transportation Under section 205 of the REAL ID Act, issuance of REAL ID regulations must be conducted in consultation with the Secretary of Transportation and the States. During the development of this NPRM, DHS and TSA consulted with the Department of Transportation and other Federal agencies with an interest in this rulemaking. DHS and TSA also consulted with State officials via AAMVA. In addition, DHS and TSA met with various non-governmental organizations, including civil rights and privacy advocacy groups. Stakeholder input, informed by extensive outreach, was critical to informing this NPRM. VI. Regulatory Analyses A. Economic Impact Analyses 1. Regulatory Impact Analysis Summary Changes to Federal regulations must undergo several economic analyses. First, E.O. 12866 of September 30, 1993 (Regulatory Planning and Review),69 as supplemented by E.O. 13563 of January 18, 2011 (Improving Regulation and 69 Published PO 00000 at 58 FR 51735 (Oct. 4, 1993). Frm 00018 Fmt 4701 Sfmt 4702 Regulatory Review),70 and amended by E.O. 14094 of April 6, 2023 (Modernizing Regulatory Review) 71 directs Federal agencies to propose or adopt a regulation only upon a reasoned determination that the benefits of the intended regulation justify its costs. Second, the Regulatory Flexibility Act of 1980 (RFA) 72 requires agencies to consider the economic impact of regulatory changes on small entities. Third, the Trade Agreement Act of 1979 73 prohibits agencies from setting standards that create unnecessary obstacles to the foreign commerce of the United States. Fourth, the Unfunded Mandates Reform Act of 1995 74 (UMRA) requires agencies to prepare a written assessment of the costs, benefits, and other effects of proposed or final rules that include a Federal mandate likely to result in the expenditure by State, local, or tribal governments, in the aggregate, or by the private sector, of $100 million or more (adjusted for inflation) in any one year. 2. Assessments Required by E.O. 12866 and E.O. 13563 E.O. 12866 and E.O. 13563 direct agencies to assess the costs and benefits of available regulatory alternatives and, if regulation is necessary, select regulatory approaches that maximize net benefits (including potential economic, environmental, public health and safety effects, distributive impacts, and equity). Under E.O. 12866, as amended by E.O. 14094, agencies must also determine whether a regulatory action is significant.75 These requirements were supplemented by E.O. 13563, which emphasizes the importance of quantifying both costs 70 Published at 76 FR 3821 (Jan. 21, 2011). at 88 FR 21879 (April 6, 2023). 72 Public Law 96–354, 94 Stat. 1164 (Sept. 19, 1980) (codified at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory Enforcement Fairness Act of 1996 (SBREFA)). 73 Public Law 96–39, 93 Stat. 144 (July 26, 1979) (codified at 19 U.S.C. 2531–2533). 74 Public Law 104–4, 109 Stat. 66 (Mar. 22, 1995) (codified at 2 U.S.C. 1181–1538). 75 See section 1(b) of E.O. 14094, revising section 3(f) of E.O. 12866. Section 3(f) of E.O. 12866 defines a ‘‘significant regulatory action’’ as any regulatory action that is likely to result in a rule that: (1) has an annual effect on the economy of $200 million or more or adversely affects in a material way the economy; a sector of the economy; productivity; competition; jobs; the environment; public health or safety; or State, local, territorial, or tribal governments or communities (also referred to as economically significant); (2) creates serious inconsistency or otherwise interferes with an action taken or planned by another agency; (3) materially alters the budgetary impacts of entitlements, grants, user fees, or loan programs or the rights and obligations of recipients thereof; or (4) raises novel legal or policy issues arising out of legal mandates, the President’s priorities, or the principles set forth in the E.O. 71 Published E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 and benefits, of reducing costs, of harmonizing rules, and of promoting flexibility. In conducting these analyses, TSA has made the following determinations: (a) While TSA attempts to quantify costs where available, TSA primarily discusses the costs and benefits of this rulemaking in qualitative terms. At present, mDLs are part of an emerging and evolving industry with an elevated level of uncertainty surrounding costs and benefits. Nonetheless, TSA anticipates the rulemaking would not result in an effect on the economy of $200 million or more in any year of the analysis. The rulemaking would not adversely affect the economy, interfere with actions taken or planned by other agencies, or generally alter the budgetary impact of any entitlements. (b) TSA has not prepared an Initial Regulatory Flexibility Analysis (IRFA) and, pursuant to 5 U.S.C. 605(b), the Secretary certifies that the proposed rule would not have a significant economic impact on a substantial number of small entities. The proposed rule would only directly regulate the fifty States, the District of Columbia, and the five U.S. territories who voluntarily participate in the mDL waiver process, who under the RFA are not considered small entities. (c) TSA has determined that the NPRM imposes no significant barriers to international trade as defined by the Trade Agreement Act of 1979; and (d) TSA has determined that the NPRM does not impose an unfunded VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 mandate on State, local, or tribal governments, such that a written statement would be required under the UMRA, as its annual effect on the economy does not exceed the $100 million threshold (adjusted for inflation) in any year of the analysis. TSA has prepared an analysis of its estimated costs and benefits, summarized in the following paragraphs, and in the OMB Circular A– 4 Accounting Statement. When estimating the cost of a rulemaking, agencies typically estimate future expected costs imposed by a regulation over a period of analysis. For this proposed rule’s period of analysis, TSA uses a 10-year period of analysis to estimate costs. This proposed rule would establish a temporary waiver process that would permit Federal agencies to accept mDLs for official purposes, as defined in the REAL ID Act, when full enforcement of the REAL ID Act and regulations begins on May 7, 2025. Federal agencies would be able to accept mDLs for official purposes on an interim basis, provided that: (1) the mDL holder has been issued a valid and unexpired REAL IDcompliant physical driver’s license or identification card from the same State that issued the mDL; (2) TSA has determined the issuing State to be REAL ID-compliant; and (3) TSA has issued a waiver to the State. Federal agencies that opt to accept mDLs for official purposes must also procure a mDL PO 00000 Frm 00019 Fmt 4701 Sfmt 4702 60073 reader in order to validate the identity of the mDL holder. As part of the application process for the mDL waiver, States would be required to submit to TSA an application, including supporting data, and other documentation necessary to establish that their mDLs meet specified criteria concerning security, privacy, and interoperability. The criteria concerning security, privacy, and interoperability would not change absent a subsequent rulemaking. When REAL ID Act and regulations enforcement begins on May 7, 2025, Federal agencies will be prohibited from accepting noncompliant driver’s licenses and identification cards, including both physical cards and mDLs, for official purposes. In the following paragraph TSA summarizes the estimated costs of the proposed rule on the affected parties: States, TSA, mDL users, and relying parties (Federal agencies that voluntarily choose to accept mDLs for official purposes). TSA has also identified other non-quantified impacts to affected parties. As Table 1 displays, TSA estimates the 10-year total cost of the proposed rule to be $826.8 million undiscounted, $695.6 million discounted at 3 percent, and $562.0 million discounted at 7 percent. The total cost to States comprises approximately 98 percent of the total quantified costs of the proposed rule. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 States incur costs to familiarize themselves with the requirements of the proposed rule, purchase access to an industry standard, submit their mDL VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 waiver application, submit an mDL waiver reapplication, and comply with mDL application criteria requirements. As displayed in Table 2, the 10-year cost PO 00000 Frm 00020 Fmt 4701 Sfmt 4702 to States is $813.7 million undiscounted, $684.2 million discounted at 3 percent, and $552.4 million discounted at 7 percent. E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.006</GPH> 60074 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 mDL readers, and mDL training. As displayed in Table 3, the 10-year cost to TSA is $9.84 million undiscounted, $8.62 million discounted at 3 percent, PO 00000 Frm 00021 Fmt 4701 Sfmt 4702 and $7.35 million discounted at 7 percent. E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.007</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 TSA incurs costs associated with reviewing mDL waiver applications and mDL waiver renewals, purchasing access to industry standards, procuring 60075 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 Relying parties represent Federal agencies that elect to accept a mDLs for official purposes. Per the proposed rule, relying parties would be required to use a mDL reader to retrieve and validate mDL data. As a result, relying parties would incur costs to procure mDL VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 readers should they voluntarily choose to accept mDLs for official purposes. TSA is also considered a relying party, but due to the particular impact to TSA related to the requirement for REAL ID related to boarding federally regulated commercial aircraft, those impacts are PO 00000 Frm 00022 Fmt 4701 Sfmt 4702 discussed separately. As displayed in Table 4, the 10-year cost to relying parties is $3.29 million undiscounted, $2.74 million discounted at 3 percent, and $2.19 million discounted at 7 percent. E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.008</GPH> 60076 TSA has also identified other nonquantified impacts to the affected entities. States may incur costs to: monitor and study mDL technology as it evolves; resolve the underlying issues that could lead to a suspension or termination of a mDL waiver; report serious threats to security, privacy, or data integrity; report material changes to mDL issuance processes; remove conflicts of interest with a third-party auditor; and request reconsideration of a denied mDL waiver application. TSA may incur costs to: investigate circumstances that could lead to suspension or termination of a State’s mDL waiver; provide notice to States, relying parties, and the public related to mDL waiver suspensions or terminations; develop an IT solution that maintains an up-to-date list of States with valid mDL waivers; and resolve a request for reconsideration of a denied mDL waiver application. mDL users may incur costs with additional application requirements to obtain a mDL. Relying parties may incur costs to resolve any security or privacy issue with the mDL reader; report serious threats to security, privacy, or data integrity; verifying the list of States with VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 valid mDL waivers; train personnel to verify mDLs; and update the public on identification policies. TSA believes that States implementing a mDL, absent the rulemaking, would still comply with the AAMVA mDL Implementation Guidelines (hereafter referred to as the ‘‘AAMVA Guidelines’’). Many of the requirements of the mDL application criteria are already contained within the AAMVA Guidelines. This includes mDL application criteria concerning: data encryption; authentication; device identification keys; user identity verification; applicant presentation; REAL ID compliant physical card; data record; records retention; privacy; and interoperability. Only the mDL application criteria related to escalated review and infrastructure security/ issuance are not contained with the AAMVA Guidelines. Operating under the assumption that States interested in mDLs would comply with the AAMVA Guidelines, TSA assumes the application criteria that overlap with the AAMVA Guidelines would otherwise be incurred and thus not included as a cost of the proposed rule. However, TSA requests comment on this assumption PO 00000 Frm 00023 Fmt 4701 Sfmt 4702 60077 and any cost information associated with the mDL application criteria. This proposed rule would establish mDL application criteria that would serve as an interim mDL standard for those States choosing to issue mDLs that can be accepted for official purposes. TSA’s application criteria may help guide States in their development of mDL technologies which would provide a shared standard that could potentially improve efficiency while also promoting higher security, privacy, and interoperability safeguards. The application criteria set requirements establishing security and privacy protections to safeguard an mDL holder’s identity data. They also set interoperability requirements to ensure secure transactions with Federal agencies. States, via their mDL waiver application, must establish that their mDLs meet the application criteria thus helping to ensure adequate security and privacy protections are in place. Absent the proposed rule, individual States may choose insufficient security and privacy safeguards for mDL technologies that fail to meet the intended security purposes of REAL ID and the privacy needs of users. E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.009</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 60078 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules mDLs themselves may provide additional security benefits by offering a more secure verification of an individual’s identity and authentication of an individual’s credential compared to physical cards. In general, mDLs use a cryptographic protocol that ensures the mDL was obtained through a trusted authority, such as a State’s Department of Motor Vehicles.76 This same protocol may prevent the alteration of mDLs and reduce the threat of counterfeit credentials.77 mDLs also offer increased protection of personal identifiers by preventing over-collection of information. mDLs may possess the ability to share only those attributes necessary to validate the user identity with the relying party.78 When using a physical card, the user has no ability to limit the information that is shared, lotter on DSK11XQN23PROD with PROPOSALS3 76 Secure Technology Alliance’s Mobile Driver’s License Workshop Showcases mDLs Role in the Future of Identification. December 14, 2021. https://www.securetechalliance.org/securetechnology-alliances-mobile-drivers-licenseworkshop-showcases-mdls-role-in-the-future-ofidentification/. 77 Ibid. 78 Mobile ID can bring both convenience and citizen privacy. July 15, 2021. https:// www.biometricupdate.com/202107/mobile-id-canbring-both-convenience-and-citizen-privacy. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 regardless of the amount of information required for verification. TSA’s mDL application criteria can help guide State development and investment in mDLs. The mDL application criteria would foster a level of standardization that would potentially reduce complexity by limiting individual State nuances while also ensuring interoperability across States and with the Federal Government. This increased interoperability reduces implementation costs by limiting the need for different protocols or mechanisms to accept mDLs from individual States. Identification of mDL application criteria that can be used across States would result in efficiency gains through multiple States pursuing similar objectives, goals, and solutions. Establishing application criteria early in the technology development process has the potential to align development activities across disparate efforts. Early guidance might also reduce re-work or modifications required in future regulations thus saving time and resources redesigning systems and functionality to adhere to subsequent Federal guidelines. Furthermore, the mDL application criteria may potentially encourage PO 00000 Frm 00024 Fmt 4701 Sfmt 4702 investment in mDLs and the pooling of resources to develop mDL technology capabilities across States and address common concerns or issues. Such collaboration, or unity of effort, can help spread research and development risk and reduce inefficiencies that may arise from States working independently. Greater clarity over mDL regulations, with the proposed rule part of an incremental, multi-phased rulemaking approach, may spur new entrants (States and technology companies) into the mDL ecosystem. The proposed rule, would allow Federal agencies to continue to accept mDLs for official purposes when REAL ID enforcement begins. This would avoid the sudden halting of mDL acceptance when REAL ID enforcement begins which would reverse trends in providing for a more customer-friendly screening experience. The experience and insight learned through the mDL waiver process could also be used to inform future standards and rulemaking. 3. OMB A–4 Statement The OMB A–4 Accounting Statement presents annualized costs and qualitative benefits of the proposed rule. BILLING CODE 9110–05–P E:\FR\FM\30AUP3.SGM 30AUP3 BILLING CODE 9110–05–C 4. Alternatives Considered In addition to the proposed rule, or the ‘‘preferred alternative’’, TSA also VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 considered four alternative regulatory options. The first alternative (Alternative 1) represents the status quo, or no change relative to the proposed creation of a PO 00000 Frm 00025 Fmt 4701 Sfmt 4702 60079 mDL waiver. This represents a scenario without a rulemaking or a waiver process to enable mDL acceptance for official Federal purposes. Under this alternative, States would continue to E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.010</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules lotter on DSK11XQN23PROD with PROPOSALS3 60080 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules develop mDLs in a less structured manner while waiting for relevant guiding standards to be published which would likely result in dissimilar mDL implementation and technology characteristics. This alternative was not selected because it does not address the market failures associated with a lack of common standards, such as increased complexity of mDL use across States, and may result in larger costs in the long run when formal mDL standards are finalized. The second alternative (Alternative 2) features the same requirements of the proposed rule, including an mDL waiver process, but allows for an auto acceptance of certain State waivers that are ‘‘low-risk.’’ TSA would identify mDLs from States who have fulfilled the proposed rule’s minimum requirements prior to applying for the waiver and have sufficiently demonstrated (e.g., via TSA initiative or recent evaluation by a trusted party) to TSA that their mDL systems present adequate interoperability and low security and privacy risk. The auto acceptance provision would allow Federal agencies to immediately (or conditionally) accept those ‘‘low-risk’’ mDLs for official purposes pending final approval of the respective State mDL waiver applications. However, TSA rejects this alternative because TSA believes the emerging technology underlying mDLs is insufficiently established to accept the security, privacy, and interoperability of States’ mDL systems without an evaluation by TSA or another trusted party. In addition, a similar presumptive eligibility process is not available for other aspects of REAL ID and such an action would not reduce the burden on States or TSA to comply with any framework DHS develops. Under the third alternative (Alternative 3), TSA would establish more comprehensive requirements than those in the proposed rule to ensure mDLs comply with the REAL ID Act. States would be required to adopt the more comprehensive requirement to issue valid mDLs that can be accepted for official purposes. These technical requirements could include specific standards related to mDL issuance, provisioning, verification, readers, privacy, and other security measures. TSA rejects this alternative because promulgating more comprehensive requirements for mDLs is premature, as both industry standards and technology used by States are still evolving. Restrictive requirements could stifle innovation by forcing all stakeholders to pivot toward compliance. This could impede TSA from identifying and VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 implementing a more efficient regulatory approach in the future. Finally, under the fourth alternative (Alternative 4), instead of a waiver process, TSA would first establish minimum requirements for issuing REAL ID compliant mDLs before TSA later sets more comprehensive requirements as additional guidance and standards become available in the mid- and long-term. The interim minimum requirements would consist of the same requirements for security, privacy, and interoperability, based on nineteen industry and government standards and guidelines, described in the proposed rule to guide waiver applications. Alternative 4 effectively would codify standards that may become obsolete in the near future, as existing standards are revised, emerging standards publish, and new cyber threats proliferate. TSA rejects this alternative because establishing minimum requirements that may become obsolete in the near future may limit the ability for TSA to revise standards quickly and would increase the security and privacy risks of accepting mDLs. In addition, costs under Alternative 4 would roughly be similar to costs under the proposed rule, as both options would require audits and other compliance costs. TSA requests comments as to whether finalizing these minimum requirements for REAL ID compliance would be preferable to the temporary waiver process described in this proposal. Specifically, TSA seeks comment on whether Alternative 4 would realize higher benefits, either quantitative or qualitative, for States and the public, than the waiver process described in this proposal. TSA also seeks comment on costs to the affected entities to comply with the minimum requirements. 5. Regulatory Flexibility Act Assessment The Regulatory Flexibility Act (RFA) of 1980, as amended,79 was enacted by Congress to ensure that small entities (small businesses, small not-for-profit organizations, and small governmental jurisdictions) would not be unnecessarily or disproportionately burdened by Federal regulations. Section 605 of the RFA allows an agency to certify a rule in lieu of preparing an analysis if the regulations are not expected to have a significant economic impact on a substantial number of small entities. 79 Public Law 96–354, 94 Stat. 1164 (Sept. 19, 1980) (codified at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory Enforcement Fairness Act of 1996 (SBREFA)). PO 00000 Frm 00026 Fmt 4701 Sfmt 4702 In accordance with the RFA, TSA has not prepared a Regulatory Flexibility Analysis and pursuant to 5 U.S.C. 605(b), the Secretary certifies that the proposed rule would not have a significant economic impact on a substantial number of small entities. The proposed rule would directly impact States that voluntarily choose to apply for a waiver that would permit mDLs issued by those States to be accepted for official Federal purposes. 6. International Trade Impact Assessment The Trade Agreement Act of 1979 prohibits Federal agencies from establishing any standards or engaging in related activities that create unnecessary obstacles to the foreign commerce of the United States. The Trade Agreement Act does not consider legitimate domestic objectives, such as essential security, as unnecessary obstacles. The statute also requires that international standards be considered and, where appropriate, that they be the basis for U.S. standards. TSA has assessed the potential effect of this proposed rule and has determined this rule would not have an adverse impact on international trade. 7. Unfunded Mandates Reform Act Assessment Title II of the Unfunded Mandates Reform Act of 1995 (UMRA), Public Law 104–4, establishes requirements for Federal agencies to assess the effects of their regulatory actions on State, local, and tribal governments and the private sector. Under sec. 202 of the UMRA, TSA generally must prepare a written Statement, including a cost-benefit analysis, for proposed and final rules with ‘‘Federal mandates’’ that may result in expenditures by State, local, and tribal governments in the aggregate or by the private sector of $100 million or more (adjusted for inflation) in any one year. Before TSA promulgates a rule for which a written statement is required, sec. 205 of the UMRA generally requires TSA to identify and consider a reasonable number of regulatory alternatives and adopt the least costly, most cost-effective, or least burdensome alternative that achieves the objectives of the rulemaking. The provisions of sec. 205 do not apply when they are inconsistent with applicable law. Moreover, sec. 205 allows TSA to adopt an alternative other than the least costly, most cost-effective, or least burdensome alternative if the final rule provides an explanation why that alternative was not adopted. Before TSA establishes any regulatory requirements that may E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules significantly or uniquely affect small governments, including tribal governments, it must develop under sec. 203 of the UMRA a small government agency plan. The plan must provide for notifying potentially affected small governments, enabling officials of affected small governments to have meaningful and timely input in the development of TSA regulatory proposals with significant Federal intergovernmental mandates, and informing, educating, and advising small governments on compliance with the regulatory requirements. When adjusted for inflation, the threshold for expenditures becomes $177.1 million in 2022 dollars. TSA has determined that this proposed rule does not contain a Federal mandate that may result in expenditures that exceed that amount either for State, local, and tribal governments in the aggregate in any one year. TSA will publish a final analysis, including its response to public comments, when it publishes a final rule. B. Paperwork Reduction Act lotter on DSK11XQN23PROD with PROPOSALS3 The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.) requires that TSA consider the impact of paperwork and other information collection burdens imposed on the public. Under the provisions of PRA section 3507(d), DHS must obtain approval from the Office of Management and Budget (OMB) for each collection of information it conducts, sponsors, or requires through regulations. This proposed rule would call for a collection of information under the PRA. Accordingly, TSA has submitted to OMB the proposed rule and this analysis, including the sections relating to collections of information. See 5 CFR 1320.11(a). As defined in 5 CFR 1320.3(c), ‘‘collection of information’’ includes reporting, recordkeeping, monitoring, posting, labeling, and other VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 similar actions. This section provides the description of the information collection and of those who must collect the information as well as an estimate of the total annual time burden. The proposed rule establishes a process for States to apply to TSA for a temporary waiver. Such a request is voluntary but would require the submission of an mDL waiver application, resubmission of an mDL waiver application deemed insufficient or denied, and reapplication for a mDL waiver when the term of the mDL waiver expires. All of these items would be considered new information collections. TSA uses the current State of mDL implementation to inform its estimate on how many State entities would request a mDL waiver during the period of analysis.80 All 50 States, the District of Columbia, and five territories (collectively referred to as States hereafter) are eligible to apply for a mDL waiver as discussed in the proposed rule. However, DHS assumes that not all States would apply for the mDL waiver. TSA assumes 15 States would apply for a mDL waiver in Year 1 of the analysis, 10 States in Year 2, and five States in Year 3.81 Following the State submission of its mDL waiver application, TSA determines if the application is approved, insufficient, or denied. States are allowed to amend an insufficient or denied mDL waiver application and resubmit to TSA review. TSA assumes that all submissions would initially be deemed insufficient due to the mDL waiver criteria being new and with mDLs an emerging technology. Nonetheless, TSA intends 80 Eight States currently provide mDLs. Roughly 20 States have taken steps towards mDL implementation, including seven States participating in the TSA mobile ID evaluation program without a current mDL solution. 81 Each State would submit one mDL waiver application. PO 00000 Frm 00027 Fmt 4701 Sfmt 4702 60081 to work individually with interested States to meet the mDL criteria to maximize the likelihood of receiving a waiver. Based on these assumptions, TSA estimates all initial mDL waiver applications would be deemed insufficient and that 90 percent of States would resubmit their mDL waiver applications.82 A State’s mDL waivers would be valid for three years. Therefore, States granted a mDL waiver in Year 1 would need to reapply in Year 4 which is beyond the scope of this particular information collection. TSA technology subject matter experts estimate that the mDL waiver application would take, on average, 20 hours to complete. TSA also estimates that mDL waiver resubmissions would take 25 percent of the initial mDL waiver application time which equates to 5 hours.83 Finally, TSA estimates that mDL waiver reapplications would take 75 percent of the initial mDL waiver application time which equates to 15 hours.84 These hour burden estimates are combined with the number of collection activities to calculate the total and average time burden associated with the proposed rule. TSA estimates the proposed rule’s total three-year burden for mDL waiver applications, mDL waiver resubmissions, and mDL waiver reapplications is 57 responses and 735 hours. TSA estimates an average yearly burden of 19 responses and 245 hours. Details of the calculation can be found in Table 6. 82 DHS assumes that 10 percent of applications deemed insufficient would no longer pursue a mDL waiver due to the level of effort involved to become sufficient and wait until the mDL environment is more fully developed. 83 mDL Waiver Resubmission burden = 20 hours [initial mDL waiver application burden] × 0.25 = 5 hours. 84 mDL Waiver Renewal burden = 20 hours [initial mDL waiver application burden] × (1 ¥ 0.25) = 15 hours. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules In addition, States TSA incur costs associated with independent entity audits of their mDL infrastructure. DHS estimates this cost at $32,500 per submission.85 States would incur this cost for the initial mDL waiver application and mDL waiver reapplication. As there are no reapplications anticipated for this information collection request, TSA multiplies the annual average number of mDL waiver applications from Table 6 above (10) and the independent entity audit cost of $32,500 for a total mDL waiver application cost of $325,000. C. Federalism (E.O. 13132) A rule has implications for federalism under E.O. 13132 of August 6, 1999 (Federalism) if it has a substantial direct effect on State or local governments and would either preempt State law or impose a substantial direct cost of compliance on them. TSA analyzed this proposed rule under this order and determined it does not have these implications for federalism. lotter on DSK11XQN23PROD with PROPOSALS3 D. Customer Service (E.O. 14058) E.O. 14058 of December 13, 2021 (Transforming Federal Customer Experience and Service Delivery to Rebuild Trust in Government), is focused on enhancing the of technology ‘‘to modernize Government and implement services that are simple to use, accessible, equitable, protective, transparent, and responsive for all people of the United States.’’ The Secretary of Homeland Security has specifically committed to testing the use of innovative technologies at airport security checkpoints to reduce passenger wait times. This proposed rule supports this commitment. Using 85 TSA technology subject matter experts assume estimate a range of audit costs between $5,000 and $60,000. DHS uses the midpoint of this range as the point estimate. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 mDLs to establish identity at airport security checkpoints is intended to provide the public with increased convenience, security, privacy, and health benefits from ‘‘contact-free’’ identity verification. In 2022, DHS began a limited initiative to evaluate some mDLs to determine the viability of using an mDLs as a form of identification at an airport security checkpoint. E. Energy Impact Analysis (E.O. 13211) TSA analyzed this proposed rule under E.O. 13211 of May 18, 2001 (Actions Concerning Regulations That Significantly Affected Energy Supply, Distribution or Use), and determined that it is not a ‘‘significant energy action’’ under that E.O. and is not likely to have a significant adverse effect on the supply, distribution, or use of energy. Therefore, this rulemaking does not require a Statement of Energy Effects. F. Environmental Analysis TSA reviews proposed actions to determine whether the National Environmental Policy Act (NEPA) applies to them and, if so, what degree of analysis is required. DHS Directive 023–01 Rev. 01 (Directive) and Instruction Manual 023–01–001–01 Rev. 01 (Instruction Manual) establish the procedures that DHS and its components use to comply with NEPA and the Council on Environmental Quality (CEQ) regulations for implementing NEPA, 40 CFR parts 1500 through 1508. The CEQ regulations allow Federal agencies to establish, with CEQ review and concurrence, categories of actions (‘‘categorical exclusions’’) which experience has shown do not individually or cumulatively have a significant effect on the human environment and, therefore, do not require an Environmental Assessment PO 00000 Frm 00028 Fmt 4701 Sfmt 4702 (EA) or Environmental Impact Statement (EIS). See 40 CFR 1507.3(b)(2)(ii), 1508.4. DHS has determined that this action will not have a significant effect on the human environment. This action is covered by categorical exclusion number A3(d) in DHS Management Directive 023–01 Rev. 01. VII. Specific Questions While commenters are asked to comment on this proposal in its entirety, TSA specifically requests comments in response to the following questions. Commenters are encouraged to address issues that may not be discussed below based upon their knowledge of the issues and implications. In providing your comments, please follow the instructions in the Commenter Instructions section above. 1. Applications for waivers. Provide comments on: a. The estimated cost and time required for States to complete and submit applications for waivers, including the initial mDL waiver application, resubmission, and reapplication; b. The estimated number of States and territories that would submit a waiver application, and when those States and territories would submit a waiver application; c. The percentage of States that would receive a decision of approved, insufficient, or denied; d. The percentage of States receiving a decision of insufficient that would resubmit an amended application; and e. The assumption that TSA would approve all resubmitted applications. 2. Application Criteria. Provide comments on: a. The costs States may incur to demonstrate compliance with the criteria to apply for a waiver as required by proposed § 37.10(a) and appendix A E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.011</GPH> 60082 lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules to subpart A of the part, including the costs and availability of any professional services required; b. The appropriateness of the application requirements set forth in proposed § 37.10(a) and appendix A to subpart A of the part; c. The impact that the Initial Public Versions of Revision 4 of NIST SP 800– 63, NIST SP 800–63A, NIST SP 800– 63B, and NIST SP 800–63C may have on the requirements set forth in proposed § 37.10(a) and appendix A to subpart A of the part, including States’ ability to demonstrate compliance with the criteria to apply for a waiver as required by proposed § 37.10(a) and appendix A to subpart A of the part. 3. Audit report. Provide comments on requiring States to submit a report of an audit as required in proposed § 37.10(b), which report would require verifying the materials that a State would provide in its application for a waiver as required by proposed § 37.10(a), including: a. The appropriateness of requiring an audit to be conducted by a recognized independent entity; b. The appropriateness of requiring an auditor to hold an active Certified Public Accountant license in the State that is seeking a waiver; c. The appropriateness of requiring an auditor to be experienced with information systems security audits, including whether such auditors should have different or additional experience; d. The appropriateness of requiring the auditor to be accredited by the State seeking a waiver; e. The appropriateness of requiring an auditor to hold a current and active American Institute of Certified Public Accountants (AICPA) Certified Information Technology Professional (CITP) credential or ISACA (F/K/A Information Systems Audit and Control Association) Certified Information System Auditor certification; f. The availability of auditors who meet the criteria specified in proposed § 37.10(b)(1); g. The estimated cost and time incurred by States to obtain a report by the auditor; and h. Any other considerations relating to auditing. 4. DHS Mobile Driver’s License Waiver Application Guidance. Provide comments on the ‘‘Mobile Driver’s License Waiver Application Guidance,’’ available at www.dhs.gov/real-id/mDL. 5. Waiver validity period. DHS is considering a three-year validity period for waivers. Provide comments on the appropriateness of a three-year validity period for waivers and on alternate validity periods. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 6. Mobile driver’s license readers. Provide comment on the costs to procure mDL reader equipment, estimated reader usage by Federal agencies, States, and businesses, and the functional form of such reader equipment. 7. mDL acceptance. Provide comment on the number of Federal agencies other than TSA DHS and DHS component agencies that voluntarily choose to accept mDLs for official purposes for identity verification, including: a. The number and types of locations where mDLs will be accepted; and b. The number of individuals that are expected to obtain mDLs. 8. Costs to individuals. Provide comment on costs incurred by mDL users, including costs associated with obtaining an mDL. 9. TSA invites public comments on Alternative 4, including, but not limited to, costs to the affected entities to comply with the minimum standards, benefits of the alternative compared to the preferred alternative, and risks to security and privacy of accepting mDLs based on the minimum requirements. List of Subjects in 6 CFR Part 37 Document security, Driver’s licenses, Identification cards, Incorporation by reference, Licensing and registration, Motor vehicle administrations, Motor vehicle safety, Motor vehicles, Personally identifiable information, Physical security, Privacy, Reporting and recordkeeping requirements, Security measures. The Proposed Amendments For the reasons set forth in the preamble, the Transportation Security Administration is proposing to amend part 37 of title 6, Code of Federal Regulations, to read as follows: PART 37—REAL ID DRIVER’S LICENSES AND IDENTIFICATION CARDS 1. The authority citation for part 37 continues to read as follows: ■ Authority: 49 U.S.C. 30301 note; 6 U.S.C. 111, 112. Subpart A—General 2. Amend § 37.3 by adding the definitions for ‘‘A Root Certificate Authority,’’ ‘‘Administration,’’ ‘‘Certificate Authority,’’ ‘‘Certificate Management System,’’ ‘‘Certificate Policy,’’ ‘‘Certificate System,’’ ‘‘Critical Security Event,’’ ‘‘Delegated Third Party,’’ ‘‘Delegated Third Party System,’’ ‘‘Denial of Service,’’ ‘‘Digital Certificates,’’ ‘‘Digital Signatures,’’ ‘‘Distributed Denial of Service,’’ ■ PO 00000 Frm 00029 Fmt 4701 Sfmt 4702 60083 ‘‘Execution Environment,’’ ‘‘Front End System,’’ ‘‘Hardware security module,’’ ‘‘High Security Zone,’’ ‘‘Identity Proofing,’’ ‘‘Identity verification,’’ ‘‘Internal Support System,’’ ‘‘Issuing Authority,’’ ‘‘Issuing Authority Certificate Authority,’’ ‘‘Issuing System,’’ ‘‘mDL,’’ ‘‘Mobile driver’s license,’’ ‘‘Mobile identification card,’’ ‘‘Multi-Factor Authentication,’’ ‘‘Online Certificate Status Protocol,’’ ‘‘Penetration Test,’’ ‘‘Public Key Infrastructure,’’ ‘‘Rich Execution Environment,’’ ‘‘Root Certificate Authority System,’’ ‘‘Secure Element,’’ ‘‘Secure hardware,’’ ‘‘Secure Key Storage Device,’’ ‘‘Secure Zone,’’ ‘‘Security Support System,’’ ‘‘Sole Control,’’ ‘‘State Root Certificate,’’ ‘‘System,’’ ‘‘Trusted Execution Environment,’’ ‘‘Trusted Role,’’ ‘‘Virtual Local Area Network,’’ ‘‘Vulnerability,’’ ‘‘Vulnerability scanning,’’ and ‘‘Zone’’ in alphabetical order to read as follows: § 37.3 Definitions. * * * * * A Root Certificate Authority is the State Certificate Authority whose public encryption key establishes the basis of trust for all other Digital Certificates issued by a State. Administration means management actions performed on Certificate Systems by a person in a Trusted Role. * * * * * Certificate Authority means an issuer of Digital Certificates that are used to certify the identity of parties in a digital transaction. Certificate Management System means a system used by a State or Delegated Third Party to process, approve issuance of, or store Digital Certificates or Digital Certificate status information, including the database, database server, and storage. Certificate Policy means the set of rules and documents that forms a State’s governance framework in which Digital Certificates, Certificate Systems, and cryptographic keys are created, issued, managed, and used. Certificate System means the system used by a State or Delegated Third Party to provide services related to Public Key Infrastructure for digital identities. * * * * * Critical Security Event means detection of an event, a set of circumstances, or anomalous activity that could lead to a circumvention of a Zone’s security controls or a compromise of a Certificate System’s integrity, including excessive login attempts, attempts to access prohibited resources, Denial of Service or Distributed Denial of Service attacks, E:\FR\FM\30AUP3.SGM 30AUP3 lotter on DSK11XQN23PROD with PROPOSALS3 60084 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules attacker reconnaissance, excessive traffic at unusual hours, signs of unauthorized access, system intrusion, or an actual compromise of component integrity. * * * * * Delegated Third Party means a natural person or legal entity that is not the State and that operates any part of a Certificate System under the State’s legal authority. Delegated Third Party System means any part of a Certificate System used by a Delegated Third Party while performing the functions delegated to it by the State. Denial of Service means the prevention of authorized access to resources or the delaying of time-critical operations. * * * * * Digital Certificates identify the parties involved in an electronic transaction, and contain information necessary to validate Digital Signatures. Digital Signatures are mathematical algorithms used to validate the authenticity and integrity of a message. Distributed Denial of Service means a Denial of Service attack where numerous hosts perform the attack. * * * * * Execution Environment means a place within a device processer where active application’s code is processed. * * * * * Front End System means a system with a public IP address, including a web server, mail server, DNS server, jump host, or authentication server. * * * * * Hardware security module means a physical computing device that safeguards and manages cryptographic keys and provides cryptographic processing. High Security Zone means a physical location where a State’s or Delegated Third Party’s private key or cryptographic hardware is located. * * * * * Identity Proofing refers to a series of steps that the State executes to prove the identity of a person. Identity verification is the confirmation that identity data belongs to its purported holder. * * * * * Internal Support System means a system which operates on a State’s internal network and communicates with the Certificate System to provide business services related to mDL management. Issuing Authority means the State that issues a mobile driver’s license or mobile identification card. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 Issuing Authority Certificate Authority means a Certificate Authority operated by or on behalf of an Issuing Authority or a State’s Root Certificate Authority. Issuing System means a system used to sign mDLs, digital certificates, mobile security objects, or validity status information. * * * * * mDL means mobile driver’s licenses and mobile identification cards, collectively. Mobile driver’s license means a driver’s license that is stored on a mobile electronic device and read electronically. Mobile identification card means an identification card, issued by a State, that is stored on a mobile electronic device and read electronically. Multi-Factor Authentication means an authentication mechanism consisting of two or more of the following independent categories of credentials (i.e., factors) to verify the user’s identity for a login or other transaction means something you know (knowledge factor), something you have (possession factor), and something you are (inherence factor). * * * * * Online Certificate Status Protocol means an online protocol used to determine the status of a Digital Certificate. * * * * * Penetration Test means a process that identifies and attempts to exploit vulnerabilities in systems through the active use of known attack techniques, including the combination of different types of exploits, with a goal of breaking through layers of defenses and reporting on unpatched vulnerabilities and system weaknesses. * * * * * Public Key Infrastructure means a structure where a Certificate Authority uses Digital Certificates for issuing, renewing, and revoking digital credentials. * * * * * Rich Execution Environment, also known as a ‘‘normal execution environment,’’ means the area inside a device processor that runs an operating system. Root Certificate Authority System means a system used to create a State’s Root Certificate or to generate, store, or sign with the private key associated with a State Root Certificate. * * * * * Secure Element means a tamperresistant secure hardware component which is used in a device to provide the security, confidentiality, and multiple PO 00000 Frm 00030 Fmt 4701 Sfmt 4702 application environment required to support various business models. Secure hardware means hardware provided on a mobile device for key management and trusted computation such as a Secure Element (SE) or Trusted Execution Environment. Secure Key Storage Device means a device certified as meeting the specified FIPS 140–3 Level 2 overall, Level 3 physical, or Common Criteria (EAL 4+). Secure Zone means an area (physical or logical) protected by physical and logical controls that appropriately protect the confidentiality, integrity, and availability of Certificate Systems. Security Support System means a system used to provide security support functions, which may include authentication, network boundary control, audit logging, audit log reduction and analysis, vulnerability scanning, and intrusion detection (hostbased intrusion detection, networkbased intrusion detection). * * * * * Sole Control means a condition in which logical and physical controls are in place to ensure the Administration of a Certificate System can only be performed by a State or Delegated Third Party. * * * * * State Root Certificate means a public Digital Certificate of a Root Certificate Authority operated by or on behalf of a State. System means one or more pieces of equipment or software that stores, transforms, or communicates data. * * * * * Trusted Execution Environment means an Execution Environment that runs alongside but isolated from a Rich Execution Environment and has the security capabilities necessary to protect designated applications. Trusted Role means an employee or contractor of a State or Delegated Third Party who has authorized access to or control over a Secure Zone or High Security Zone. * * * * * Virtual Local Area Network means a broadcast domain that is partitioned and isolated within a network. Vulnerability means a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. Vulnerability scanning means a technique used to identify host attributes and associated Vulnerabilities. Zone means a subset of Certificate Systems created by the logical or physical partitioning of systems from other Certificate Systems. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 3. Amend § 37.4 by adding paragraphs (a)(2), (b)(2), and (d) through (f) to read as follows: ■ § 37.4 Incorporation by reference. lotter on DSK11XQN23PROD with PROPOSALS3 * * * * * (a) * * * (2) ISO/IEC 18013–5:2021, Personal identification—ISO-compliant driving license—Part 5: Mobile driving license (mDL) application, Edition 1 (September 2021); IBR approved for §§ 37.8; 37.10(a); appendix A to this subpart. (b) * * * (2) Mobile Driver’s License (mDL) Implementation Guidelines, Version 1.2 (January 2023); IBR approved for § 37.10(a); appendix A to this subpart. * * * * * (d) Certification Authority Browser Forum (CA/Browser Forum), 815 Eddy St, San Francisco, CA 94109, (415) 436– 9333, questions@cabforum.org, www.cabforum.org. (1) Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.8.6 (December 14, 2022), https:// cabforum.org/wp-content/uploads/CABrowser-Forum-BR-1.8.6.pdf; IBR approved for appendix A to this subpart. (2) Network and Certificate System Security Requirements, Version 1.7 (April 5, 2021), https://cabforum.org/ wp-content/uploads/CA-BrowserForum-Network-Security-Guidelinesv1.7.pdf; IBR approved for appendix A to this subpart A. (e) Cybersecurity and Infrastructure Security Agency, Mail Stop 0380, Department of Homeland Security, 245 Murray Lane, Washington, DC 20528– 0380, central@cisa.gov, (888) 282–0870, www.cisa.gov. (1) Cybersecurity Incident & Vulnerability Response Playbooks (November 2021), https://www.cisa.gov/ sites/default/files/publications/Federal_ Government_Cybersecurity_Incident_ and_Vulnerability_Response_ Playbooks_508C.pdf; IBR approved for appendix A to this subpart. (2) National Cyber Incident Response Plan (December 2016), Department of Homeland Security, https:// www.cisa.gov/uscert/sites/default/files/ ncirp/National_Cyber_Incident_ Response_Plan.pdf; IBR approved for appendix A to this subpart. (f) National Institute of Standards and Technology, 100 Bureau Drive, Gaithersburg, MD 20899, (301) 975– 2000, www.nist.gov. (1) Federal Information Processing Standard (FIPS) Publication (PUB) 140– 3, Security Requirements for Cryptographic Modules (March 22, 2019), https://nvlpubs.nist.gov/ VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 nistpubs/FIPS/NIST.FIPS.140-3.pdf; IBR approved for appendix A to this subpart. (2) FIPS PUB 180–4, Secure Hash Standard (SHS) (August 2015), https:// nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.180-4.pdf; IBR approved for § 37.10(a). (3) FIPS PUB 186–5, Digital Signature Standard (DSS) (Feb. 2023), https:// nvlpubs.nist.gov/nistpubs/FIPS/ NIST.FIPS.186-5.pdf; IBR approved for § 37.10(a). (4) FIPS PUB 197, Advanced Encryption Standard (AES) (Nov. 26, 2001), https://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.197.pdf; IBR approved for § 37.10(a). (5) FIPS PUB 198–1, The Keyed-Hash Message Authentication Code (HMAC) (July 2008), https://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.198-1.pdf; IBR approved for § 37.10(a). (6) FIPS PUB 202, SHA–3 Standard: Permutation-Based Hash and Extendable-Output Functions (August 2015), https://nvlpubs.nist.gov/ nistpubs/FIPS/NIST.FIPS.202.pdf; IBR approved for § 37.10(a). (7) Special Publication (SP) 800–53, Security and Privacy Controls for Information Systems and Organizations, Rev. 5 (September 2020), https:// nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.800-53 Rev. 5.pdf; IBR approved for appendix A to this subpart. (8) SP 800–57 Part 1, Recommendation for Key Management: Part 1—General, Rev. 5, Elaine Barker (May 2020), https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-57pt1r5.pdf; IBR approved for appendix A to this subpart. (9) SP 800–57 Part 2, Recommendation for Key Management: Part 2—Best Practices for Key Management Organization, Rev. 1, Elaine and William C. Barker (May 2019), https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-57pt2r1.pdf; IBR approved for appendix A to this subpart A. (10) SP 800–57 Part 3, Recommendation for Key Management: Part 3: Application-Specific Key Management Guidance, Rev. 1, Elaine Barker and Quynh Dang (January 2015), https://nvlpubs.nist.gov/nistpubs/ SpecialPublications/NIST.SP.80057Pt3r1.pdf; IBR approved for appendix A to this subpart. (11) SP 800–63–3, Digital Identity Guidelines, Paul A. Grassi et al. (June 2017), https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-63-3.pdf; IBR approved for appendix A to this subpart. PO 00000 Frm 00031 Fmt 4701 Sfmt 4702 60085 (12) SP 800–63B, Digital Identity Guidelines Authentication and Lifecycle Management, Paul A. Grassi et al. (June 2017), https://nvlpubs.nist.gov/ nistpubs/SpecialPublications/ NIST.SP.800-63b.pdf; IBR approved for appendix A to this subpart. (13) Framework for Improving Critical Infrastructure Cybersecurity Version 1.1 (April 16, 2018), https:// nvlpubs.nist.gov/nistpubs/CSWP/ NIST.CSWP.04162018.pdf; IBR approved for appendix A to this subpart. ■ 4. Add § 37.7 to read as follows: § 37.7 Temporary waiver for mDLs; State eligibility. (a) Generally. TSA may issue a temporary certificate of waiver that exempts mDLs issued by a State from meeting the requirements in § 37.5(b), when the State meets the requirements of § 37.10(a) and (b). (b) State eligibility. A State may be eligible for a waiver only if, after considering all information provided by a State under § 37.10(a) and (b), TSA determines that— (1) The State is in full compliance with all applicable REAL ID requirements as defined in subpart E of this part; (2) Information provided by the State under § 37.10(a) and (b) sufficiently demonstrates that the State’s mDL provides the security, privacy, and interoperability necessary for acceptance by Federal agencies; and (3) The State issues mDLs only to individuals who have been issued a valid and unexpired REAL ID-compliant physical driver’s license or identification card issued by that State. ■ 5. Add § 37.8 to read as follows: § 37.8 Requirements for Federal agencies accepting mDLs issued by States with temporary waiver. Notwithstanding § 37.5(b), Federal agencies may accept an mDL for REAL ID official purposes issued by a State that has a valid certificate of waiver issued by TSA under § 37.7(a). A Federal agency that elects to accept mDLs under this section must— (a) Confirm the State holds a valid certificate of waiver consistent with § 37.7(a) by verifying that the State appears in a list of mDLs approved for Federal use, available as provided in § 37.9(b)(1); (b) Use an mDL reader to retrieve and validate mDL data as required by standard ISO/IEC 18013–5:2021 (incorporated by reference; see § 37.4); and (c) Upon discovery that acceptance of a State’s mDL is likely to cause E:\FR\FM\30AUP3.SGM 30AUP3 60086 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules imminent or serious threats to the security, privacy, or data integrity, the agency’s senior official responsible for REAL ID compliance, or equivalent function, must report such discovery to DHS at www.dhs.gov/real-id/mDL within 72 hours of such discovery. ■ 6. Add § 37.9 to read as follows: lotter on DSK11XQN23PROD with PROPOSALS3 § 37.9 Applications for temporary waiver for mDLs. (a) Application process. Each State requesting a temporary waiver must file with TSA a complete application as set forth in § 37.10(a) and (b). Application filing instructions, may be obtained from DHS at www.dhs.gov/real-id/mDL. (b) Decisions. TSA will provide written notice via email to States within 60 days, to the extent practicable, but in no event longer than 90 days, indicating that TSA has made one of the following decisions: (1) Approved. Upon approval of an application for a temporary waiver, TSA will issue a certificate of waiver to the State, and publish the State’s name in a list of mDLs approved for Federal use at www.dhs.gov/real-id/mDL. (2) Insufficient. Upon determination that an application for a temporary waiver is incomplete or otherwise deficient, TSA will provide the State an explanation of deficiencies, and an opportunity to address any deficiencies and submit an amended application. States will have 60 days to respond to the notice, and TSA will respond via email within 30 days. (3) Denied. Upon determination that an application for a waiver fails to meet criteria specified in § 37.10(a) and (b), TSA will provide the State specific grounds on which the denial is based, and provide the State an opportunity to seek reconsideration as provided in paragraph (c) of this section. (c) Reconsideration. (1) States will have 90 days to file a request for reconsideration of a denied application. The State must explain what corrective action it intends to implement to correct any defects cited in the denial or, alternatively, explain why the denial is incorrect. Instructions on how to file a request for reconsideration for denied applications may be obtained from TSA at www.dhs.gov/real-id/mDL. TSA will notify States of its final determination within 60 days of receipt of a State’s request for reconsideration. (2) An adverse decision upon reconsideration is a final agency action. A State whose request for reconsideration has been denied may submit a new application at any time following the process set forth in paragraph (a) of this section. VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 (d) Terms and conditions. A certificate of waiver will specify— (1) The effective date of the waiver; (2) The expiration date of the waiver; and (3) Any additional terms or conditions as necessary. (e) Limitations; suspension; termination—(1) Validity period. A certificate of waiver is valid for a period of 3 years from the date of issuance. (2) Reporting requirements. If a State, after it has been granted a certificate of waiver, makes any significant additions, deletions, or modifications to its mDL issuance processes, other than routine systems maintenance and software updates, that differ materially from the information the State provided in response to § 37.10(a) and (b) under which the waiver was granted, the State must provide written notice of such changes to TSA at www.dhs.gov/real-id/ mDL 60 days before implementing such additions, deletions, or modifications. (3) Compliance. A State that is issued a certificate of waiver under this section must comply with all applicable REAL ID requirements in § 37.51(a), and with all terms and conditions specified in paragraph (d)(3) of this section. (4) Suspension. (i) TSA may suspend the validity of a certificate of waiver for any of the following reasons: (A) Failure to comply. TSA determines that a State has failed to comply with paragraph (d)(3) or (e)(2) of this section, or has issued mDLs in a manner not consistent with the information provided under § 37.10(a) or (b); or (B) Threats to security, privacy, and data integrity. TSA reserves the right to suspend a certificate of waiver at any time upon discovery that Federal acceptance of a State’s mDL is likely to cause imminent or serious threats to the security, privacy, or data integrity of any Federal agency. In such instances, TSA will provide written notice via email to each affected State as soon as practicable after discovery of the triggering event, including reasons for suspension, an explanation of any corrective actions a State must take to resume validity of its certificate of waiver. (ii) Before suspending a certificate of waiver under paragraph (e)(4)(i)(A) of this section, TSA will provide to such State written notice via email of intent to suspend, including an explanation of deficiencies and instructions on how the State may cure such deficiencies. States will have 30 days to respond to the notice, and TSA will respond via email within 30 days. TSA’s response would include one of the following: withdrawal of the notice, a request for PO 00000 Frm 00032 Fmt 4701 Sfmt 4702 additional information, or a final suspension. (iii) If TSA issues a final suspension, TSA will temporarily remove the State from the list of mDLs approved for Federal acceptance for official purposes. TSA will continue to work with a State to whom TSA has issued a final suspension to resume validity of its existing certificate of waiver. A State that has been issued a final suspension may seek a new certificate of waiver by submitting a new application following the process set forth in paragraph (a) of this section. (5) Termination. (i) DHS may terminate a certificate of waiver at an earlier date than specified in paragraph (d)(2) of this section if TSA determines that a State— (A) Does not comply with applicable REAL ID requirements in § 37.51(a); (B) Is committing an egregious violation of requirements specified under paragraph (d)(3) or (e)(2) of this section that the State is unwilling to cure; or (C) Provided false information in support of its waiver application. (ii) Before terminating a certificate of waiver, TSA will provide the State written notice via email of intent to terminate, including findings on which the intended termination is based, together with a notice of opportunity to present additional information. States must respond to the notice within 7 days, and TSA will reply via email within 30 days. TSA’s response would include one of the following: withdrawal of the notice, a request for additional information, or a final termination. (iii) If TSA issues a final termination, TSA will remove the State from the list of mDLs approved for Federal acceptance for official purposes. A State whose certificate of waiver has been terminated may seek a new waiver by submitting a new application following the process set forth in paragraph (a) of this section. (6) Reapplication. A State seeking extension of a certificate of waiver after expiration of its validity period must file a new application under paragraph (a) of this section. (f) Effect of status of certificate of waiver. (1) Issuance of a certificate of waiver is not a determination of compliance with any other section in this part. (2) An application for certificate of waiver that TSA has deemed insufficient or denied, or a certificate of waiver that TSA has deemed suspended, terminated, or expired, is not a determination of non-compliance with any other section in this part. E:\FR\FM\30AUP3.SGM 30AUP3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules ■ 7. Add § 37.10 to read as follows: lotter on DSK11XQN23PROD with PROPOSALS3 § 37.10 Application criteria for issuance of temporary waiver for mDLs; audit report; waiver application guidance. (a) Application criteria. A State requesting a certificate of waiver must establish in its application that the mDLs for which the State seeks a waiver are issued with controls sufficient to resist compromise and fraud attempts, provide privacy protections sufficient to safeguard an mDL holder’s identity data, and provide interoperability for secure acceptance by Federal agencies under the terms of a certificate of waiver. To demonstrate compliance with such requirements, a State must provide information, documents, and/or data sufficient to explain the means, which includes processes, methodologies, or policies, that the State has implemented to comply with requirements in this paragraph (a). (1) Provisioning. For both remote and in-person provisioning, a State must explain the means it uses to address or perform the following— (i) Data encryption. Securely encrypt mDL data and an mDL holder’s Personally Identifiable Information when such data is transferred during provisioning, and when stored on the State’s system(s) and on mDL holders’ mobile devices. (ii) Escalated review. Review repeated failed attempts at provisioning, resolve such failures, and establish criteria to determine when the State will deny provisioning an mDL to a particular mDL applicant. (iii) Authentication. Confirm that an mDL applicant has control over the mobile device to which an mDL is being provisioned at the time of provisioning. (iv) Device identification keys. Confirm that the mDL applicant possesses the mDL device private key bound to the mDL during provisioning. (v) User identity verification. Prevent an individual from falsely matching with the licensing agency’s records, including portrait images, of other individuals. (vi) Applicant presentation. Prevent physical and digital presentation attacks by detecting the liveness of an individual and any alterations to the individual’s appearance during remote and in-person provisioning. (vii) REAL ID compliant physical card. Issue mDLs only to residents who have been issued by that State a valid and unexpired REAL ID compliant physical driver’s license or physical identification card. (viii) Data record. Issue mDLs using data, including portrait image, of an individual that matches corresponding VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 data in the database of the issuing State’s driver’s licensing agency for that individual. (ix) Records retention. Manage mDL records and related records, consistent with requirements set forth in the American Association of Motor Vehicle Administrator (AAMVA) Mobile Driver’s License (mDL) Implementation Guidelines (incorporated by reference; see § 37.4). (2) Issuance. A State must explain the means it uses to manage the creation, issuance, use, revocation, and destruction of the State’s certificate systems and keys in full compliance with the requirements set forth in appendix A to this subpart. (3) Privacy. A State must explain the means it uses to protect Personally Identifiable Information during processing, storage, and destruction of mDL records and provisioning records. (4) Interoperability. A State must explain the means it uses to issue mDLs that are interoperable with standard ISO/IEC 18013–5:2021 and the ‘‘AAMVA mDL data element set’’ defined in the American Association of Motor Vehicle Administrator (AAMVA) Mobile Driver’s License (mDL) Implementation Guidelines v. 1.1 (incorporated by reference; see § 37.4) as follows: (i) A State must issue mDLs using the data model defined in ISO/IEC 18103– 5:2021 section 7 (incorporated by reference; see § 37.4), using the document type ‘‘org.iso.18013.5.1.mDL,’’ and using the name space ‘‘org.iso.18013.5.1’’. States must include the following mDL data elements defined as mandatory in Table 5: ‘‘family_name’’, ‘‘given_name’’, ‘‘birth_date’’, ‘‘issue_date’’, ‘‘expiry_ date’’, ‘‘issuing_authority’’, ‘‘document_ number’’, ‘‘portrait’’, and must include the following mDL data elements defined as optional in Table 5: ‘‘sex’’, ‘‘resident_address’’, ‘‘portrait_capture_ date’’, ‘‘signature_usual_mark’’. (ii) States must use the AAMVA mDL data element set defined in American Association of Motor Vehicle Administrator (AAMVA) Mobile Driver’s License (mDL) Implementation Guidelines v. 1.2, Section 3.2 (incorporated by reference; see § 37.4), using the namespace ‘‘org.iso.18013.5.1.aamva’’ and must include the following data elements in accordance with the AAMVA mDL Implementation Guidelines v1.2 (incorporated by reference; see § 37.4): ‘‘DHS_compliance’’, and ‘‘DHS_ temporary_lawful_status’’. (iii) States must use only encryption algorithms, secure hashing algorithms, and digital signing algorithms as PO 00000 Frm 00033 Fmt 4701 Sfmt 4702 60087 defined by ISO/IEC 18103–5:2021, Section 9 and Annex B (incorporated by reference; see § 37.4), and which are included in the following NIST Federal Information Processing Standards (FIPS): NIST FIPS PUB 180–4, NIST FIPS PUB 186–5, NIST FIPS PUB 197, NIST FIPS PUB 198–1, and NIST FIPS PUB 202 (incorporated by reference; see § 37.4). (b) Audit report. States must include with their applications a report of an audit that verifies the information provided under paragraph (a) of this section. (1) The audit must be conducted by a recognized independent entity— (i) Holding an active Certified Public Accountant license in the issuing State; (ii) Experienced with information systems security audits; (iii) Accredited by the issuing State; and (iv) Holding a current and active American Institute of Certified Public Accountants (AICPA) Certified Information Technology Professional (CITP) credential or ISACA (F/K/A Information Systems Audit and Control Association) Certified Information System Auditor (CISA) certification. (2) States must include information about the entity conducting the audit that identifies— (i) Any potential conflicts of interest; and (ii) Mitigation measures or other divestiture actions taken to avoid conflicts of interest. (c) Waiver application guidance—(1) Generally. TSA will publish ‘‘Mobile Driver’s License Waiver Application Guidance’’ to facilitate States’ understanding of the requirements set forth in paragraph (a) of this section. The non-binding Guidance will include recommendations and examples of possible implementations for illustrative purposes only. TSA will publish the Guidance on the REAL website at www.dhs.gov/real-id/mDL. (2) Updates. TSA may periodically update its Waiver Application Guidance as necessary to provide additional information or recommendations to mitigate evolving threats to security, privacy, or data integrity. TSA will publish updated Guidance in the Federal Register and at www.dhs.gov/ real-id/mDL, and provide a copy to all States that have applied for or been issued a certificate or waiver. ■ 8. Add appendix A to subpart A to read as follows: E:\FR\FM\30AUP3.SGM 30AUP3 60088 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules Appendix A to Subpart A of Part 37— Mobile Driver’s License Issuance Infrastructure Requirements lotter on DSK11XQN23PROD with PROPOSALS3 A State that issues mDLs for acceptance by Federal agencies for official purposes as VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 specified in the REAL ID Act must implement the requirements set forth in this appendix in full compliance with the cited references as set forth in the following table. All the standards identified in the following table are incorporated by reference, see PO 00000 Frm 00034 Fmt 4701 Sfmt 4702 § 37.4. If a State utilizes the services of a Delegated Third Party, the State must ensure the Delegated Third Party complies with all applicable requirements of this appendix for the services provided. BILLING CODE 9110–05–P E:\FR\FM\30AUP3.SGM 30AUP3 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00035 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60089 EP30AU23.012</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00036 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.013</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60090 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00037 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60091 EP30AU23.014</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00038 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.015</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60092 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00039 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60093 EP30AU23.016</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00040 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.017</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60094 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00041 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60095 EP30AU23.018</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00042 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.019</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60096 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00043 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60097 EP30AU23.020</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00044 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.021</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60098 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00045 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60099 EP30AU23.022</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00046 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.023</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60100 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00047 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60101 EP30AU23.024</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules VerDate Sep<11>2014 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00048 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.025</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 60102 VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00049 Fmt 4701 Sfmt 4725 E:\FR\FM\30AUP3.SGM 30AUP3 60103 EP30AU23.026</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules 60104 Federal Register / Vol. 88, No. 167 / Wednesday, August 30, 2023 / Proposed Rules Dated: August 17, 2023. David P. Pekoske, Administrator. [FR Doc. 2023–18582 Filed 8–28–23; 4:15 pm] VerDate Sep<11>2014 18:44 Aug 29, 2023 Jkt 259001 PO 00000 Frm 00050 Fmt 4701 Sfmt 9990 E:\FR\FM\30AUP3.SGM 30AUP3 EP30AU23.027</GPH> lotter on DSK11XQN23PROD with PROPOSALS3 BILLING CODE 9110–05–C

Agencies

[Federal Register Volume 88, Number 167 (Wednesday, August 30, 2023)]
[Proposed Rules]
[Pages 60056-60104]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2023-18582]



[[Page 60055]]

Vol. 88

Wednesday,

No. 167

August 30, 2023

Part III





Department of Homeland Security





-----------------------------------------------------------------------





6 CFR Part 37





Minimum Standards for Driver's Licenses and Identification Cards 
Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile 
Driver's Licenses; Proposed Rule

Federal Register / Vol. 88 , No. 167 / Wednesday, August 30, 2023 / 
Proposed Rules

[[Page 60056]]


-----------------------------------------------------------------------

DEPARTMENT OF HOMELAND SECURITY

6 CFR Part 37

[Docket No. TSA-2023-0002]
RIN 1652-AA76


Minimum Standards for Driver's Licenses and Identification Cards 
Acceptable by Federal Agencies for Official Purposes; Waiver for Mobile 
Driver's Licenses

AGENCY: Transportation Security Administration, Department of Homeland 
Security.

ACTION: Notice of proposed rulemaking.

-----------------------------------------------------------------------

SUMMARY: The Transportation Security Administration (TSA) is proposing 
to amend the REAL ID regulations to waive, on a temporary and State-by-
State basis, the regulatory requirement that mobile or digital driver's 
licenses or identification cards (collectively ``mobile driver's 
licenses'' or ``mDLs'') must be compliant with REAL ID requirements to 
be accepted by Federal agencies for official purposes, as defined by 
the REAL ID Act, when full enforcement of the REAL ID Act and 
regulations begins on May 7, 2025.

DATES: Interested persons are invited to submit comments on or before 
October 16, 2023.

ADDRESSES: You may submit comments, identified by the TSA docket number 
to this rulemaking, to the Federal Docket Management System (FDMS), a 
government-wide, electronic docket management system. To avoid 
duplication, please use only one of the following methods:
     Electronic Federal eRulemaking Portal: https://www.regulations.gov. Follow the online instructions for submitting 
comments.
     Mail: Docket Management Facility (M-30), U.S. Department 
of Transportation, 1200 New Jersey Avenue SE, West Building Ground 
Floor, Room W12-140, Washington, DC 20590-0001. The Department of 
Transportation (DOT), which maintains and processes TSA's official 
regulatory dockets, will scan the submission and post it to FDMS.
     Fax: (202) 493-2251.
    See the SUPPLEMENTARY INFORMATION section for format and other 
information about comment submissions.

FOR FURTHER INFORMATION CONTACT: George Petersen, Senior Program 
Manager, REAL ID Program, Enrollment Services and Vetting Programs, 
Transportation Security Administration; telephone: (571) 227-2215; 
email: [email protected].
    Please do not submit comments to these addresses.

SUPPLEMENTARY INFORMATION:

Public Participation and Request for Comments

    TSA invites interested persons to participate in this NPRM by 
submitting written comments, including relevant data. Comments that 
will provide the most assistance to TSA will reference a specific 
portion of this proposed rule, explain the reason for any suggestion or 
recommended change, and include data, information, or authority that 
supports such suggestion or recommended change.

Submitting Comments

    With each comment, please identify the docket number at the 
beginning of your comments. You may submit comments and material 
electronically, by mail, or fax as provided under ADDRESSES, but please 
submit your comments and material by only one means. If you submit 
comments by mail or in person, submit them in an unbound format, no 
larger than 8.5 by 11 inches, suitable for copying and electronic 
filing.
    If you would like TSA to acknowledge receipt of comments submitted 
by mail, include with your comments a self-addressed, stamped postcard 
or envelope on which the docket number appears and we will mail it to 
you.
    All comments, except those that include confidential or SSI \1\ 
will be posted to https://www.regulations.gov, and will include any 
personal information you have provided. Should you wish your personally 
identifiable information redacted prior to filing in the docket, please 
clearly indicate this request in your submission. TSA will consider all 
comments that are in the docket on or before the closing date for 
comments and will consider comments filed late to the extent 
practicable. The docket is available for public inspection before and 
after the comment closing date.
---------------------------------------------------------------------------

    \1\ ``Sensitive Security Information'' or ``SSI'' is information 
obtained or developed in the conduct of security activities, the 
disclosure of which would constitute an unwarranted invasion of 
privacy, reveal trade secrets or privileged or confidential 
information, or be detrimental to the security of transportation. 
The protection of SSI is governed by 49 CFR part 1520.
---------------------------------------------------------------------------

Handling of Confidential or Proprietary Information and SSI Submitted 
in Public Comments

    Do not submit comments that include trade secrets, confidential 
commercial or financial information, or SSI to the public regulatory 
docket. Please submit such comments separately from other comments on 
the rulemaking. Comments containing this type of information should be 
appropriately marked as containing such information and submitted by 
mail to the address listed in the FOR FURTHER INFORMATION CONTACT 
section. TSA will take the following actions for all submissions 
containing SSI:
     TSA will not place comments containing SSI in the public 
docket and will handle them with applicable safeguards and restrictions 
on access.
     TSA will hold documents containing SSI, confidential 
business information, or trade secrets in a separate file to which the 
public does not have access, and place a note in the public docket 
explaining that commenters have submitted such documents.
     TSA may include a redacted version of the comment in the 
public docket.
     TSA will treat requests to examine or copy information 
that is not in the public docket as any other request under the Freedom 
of Information Act (5 U.S.C. 552) and the Department of Homeland 
Security (DHS) Freedom of Information Act regulation found in 6 CFR 
part 5.

Reviewing Comments in the Docket

    Please be aware that anyone is able to search the electronic form 
of all comments in any of our dockets by the name of the individual, 
association, business entity, labor union, etc., who submitted the 
comment. For more about privacy and the docket, review the Privacy and 
Security Notice for the FDMS at https://www.regulations.gov/privacy-notice, as well as the System of Records Notice DOT/ALL 14--Federal 
Docket Management System (73 FR 3316, January 17, 2008) and the System 
of Records Notice DHS/ALL 044--eRulemaking (85 FR 14226, March 11, 
2020).
    You may review TSA's electronic public docket at https://www.regulations.gov. In addition, DOT's Docket Management Facility 
provides a physical facility, staff, equipment, and assistance to the 
public. To obtain assistance or to review comments in TSA's public 
docket, you may visit this facility between 9 a.m. and 5 p.m., Monday 
through Friday, excluding legal holidays, or call (202) 366-9826. This 
DOT facility is located in the West Building Ground Floor, Room W12-140 
at 1200 New Jersey Avenue SE, Washington, DC 20590.

[[Page 60057]]

Availability of Rulemaking Document

    You can find an electronic copy of this rulemaking using the 
internet by accessing the Government Publishing Office's web page at 
https://www.govinfo.gov/app/collection/FR/ to view the daily published 
Federal Register edition or accessing the Office of the Federal 
Register's web page at https://www.federalregister.gov. Copies are also 
available by contacting the individual identified for ``General 
Questions'' in the FOR FURTHER INFORMATION CONTACT section.

Abbreviations and Terms Used in This Document

AAMVA--American Association of Motor Vehicle Administrators
CA/Browser Forum--Certification Authority Browser Forum
CISA--Cybersecurity and Infrastructure Security Agency
DHS--U.S. Department of Homeland Security
DID--Decentralized Identifiers
FIPS--Federal Information Processing Standards
HSM--Hardware security module
IEC--International Electrotechnical Commission
ISO--International Organization for Standardization
mDL--mobile driver's licenses and mobile identification cards
NIST--National Institute for Standards and Technology
NPRM--Notice of proposed rulemaking
PUB--Publication
RFI--Request for Information
SP--Special Publication
TSA--Transportation Security Administration
VC--Verifiable Credentials
VCDM--Verifiable Credentials Data Model
W3C--World Wide Web Consortium

Table of Contents

I. Executive Summary
    A. Purpose of the Regulatory Action
    B. Overview of the Proposed Rule
    C. Need for a Multi-Phased Rulemaking
II. Background
    A. REAL ID Act, Regulations, and Applicability to mDLs
    B. Request for Information
    C. mDL Overview
    D. Current and Emerging Industry Standards and Government 
Guidelines for mDLs
    E. DHS Involvement in mDLs
III. Summary of the Proposed Rule
    A. Overview
    B. Specific Provisions
    C. Impacted Stakeholders
    D. Use Cases Affected by This Proposed Rule
IV. Discussion of Public Comments in the RFI
V. Consultation With States, Non-Governmental Organizations, and the 
Department of Transportation
VI. Regulatory Analyses
    A. Economic Impact Analyses
    B. Paperwork Reduction Act
    C. Federalism (E.O. 13132)
    D. Customer Service (E.O. 14058)
    E. Energy Impact Analysis (E.O. 13211)
    F. Environmental Analysis
VII. Specific Questions

I. Executive Summary

A. Purpose of the Regulatory Action

    This proposed rule is part of an incremental, multi-phased 
rulemaking that will culminate in the promulgation of comprehensive 
requirements for State issuance of REAL ID \2\-compliant mobile 
driver's licenses and mobile identification cards (collectively 
``mDLs''). In this first phase, TSA is proposing two changes to the 
current regulations in 6 CFR part 37, ``REAL ID Driver's Licenses and 
Identification Cards.'' First, TSA is proposing to add definitions for, 
among others, mobile driver's licenses and mobile identification cards. 
These definitions provide a precise explanation of those terms as 
referenced in the REAL ID Act, which applies to only State-issued 
driver's licenses and state-issued identification cards.\3\ Any other 
types of identification cards, such as those issued by a Federal 
agency, or commercial, educational, or non-profit entity, are beyond 
the scope of the Act and regulations. The definition of ``mDL'' as used 
in this rulemaking is limited to the REAL Act and regulations and 
should not be confused with ``mDLs'' as defined by other entities, or 
with State-issued mDLs that are not intended to comply with the REAL ID 
Act.
---------------------------------------------------------------------------

    \2\ The REAL ID Act of 2005, Division B of the FY05 Emergency 
Supplemental Appropriations Act, as amended, Public Law 109-13, 119 
Stat. 302. Effective May 22, 2023, authority to administer the REAL 
ID program was delegated from the Secretary of Homeland Security to 
the Adminstrator of TSA pursuant to DHS Delegation No. 7060.2.1.
    \3\ See id. section 201 (defining a ``driver's license'' to 
include ``driver's licenses stored or accessed via electronic means, 
such as mobile or digital driver's licenses, which have been issued 
in accordance with regulations prescribed by the Secretary''; 
mirroring definition for ``identification card'').
---------------------------------------------------------------------------

    Second, TSA is proposing to establish a temporary waiver process 
that would permit Federal agencies to accept mDLs for official 
purposes,\4\ as defined in the REAL ID Act and regulations, on an 
interim basis when enforcement begins on May 7, 2025,\5\ but only if 
all of the following conditions are met: (1) the mDL holder has been 
issued a valid and unexpired REAL ID-compliant physical driver's 
license or identification card from the same State that issued the mDL; 
(2) TSA has determined the issuing State to be REAL ID-compliant; and 
(3) TSA has issued a waiver to the State. To qualify for the waiver, 
this proposed rule would require States to submit an application 
demonstrating that they meet specified requirements, drawn from 19 
industry and government standards guidelines. The rulemaking proposes 
to incorporate by reference (IBR) those standards and guidelines, which 
cover technical areas such as mDL communication, digital identity, 
encryption, cybersecurity, and network/information system security and 
privacy.
---------------------------------------------------------------------------

    \4\ The REAL ID Act defines official purposes as including but 
not limited to accessing Federal facilities, boarding federally 
regulated commercial aircraft, entering nuclear power plants, and 
any other purposes that the Secretary shall determine. See id. 
Notably, because the Secretary has not determined any other official 
purposes, the REAL ID Act and regulations do not apply to Federal 
acceptance of driver's licenses and identification cards for other 
purposes, such as applying for Federal benefits programs, submitting 
immigration documents, or other Federal programs.
    \5\ 88 FR 14473 (Mar. 9, 2023); DHS Press Release, DHS Announces 
Extension of REAL ID Full Enforcement Deadline (Dec. 5, 2022), 
https://www.dhs.gov/news/2022/12/05/dhs-announces-extension-real-id-full-enforcement-deadline.
---------------------------------------------------------------------------

    As noted above, this proposed rule is part of an incremental 
rulemaking that would temporarily permit Federal agencies to accept 
mDLs for official purposes until TSA issues a subsequent rule that 
would set comprehensive requirements for mDLs. TSA believes it is 
premature to issue such requirements before the May 7, 2025, deadline 
due to the need for emerging industry standards and government 
guidelines to be finalized (discussed in more detail in Part II.D., 
below).
    The need for this rulemaking arises from TSA's desire to 
accommodate and foster the rapid pace of mDL innovation, while ensuring 
the intent of the REAL ID Act and regulations are met. Secure driver's 
licenses and identification cards are a vital component of our national 
security framework. The REAL ID Act of 2005 addressed the 9/11 
Commission's recommendation that the Federal Government ``set standards 
for the issuance of sources of identification, such as driver's 
licenses.'' Under the REAL ID Act and regulations, a Federal agency may 
not accept for any official purpose a State-issued driver's license or 
identification card, either physical or an mDL, that does not meet 
specified requirements, as detailed in the REAL ID regulations (see 
part II.A., below, for more discussion on these requirements).
    Although the current regulatory provisions do not include 
requirements that would enable States to issue REAL ID-compliant mDLs, 
several States are already investing significant resources to develop 
mDLs based on varying and often proprietary standards, many of which 
may lack the security, privacy,

[[Page 60058]]

and interoperability features necessary for Federal acceptance for 
official purposes. The rulemaking would encourage the development of 
mDLs with a higher level of security, privacy, and interoperability.
    Absent the proposed rule, individual States may choose insufficient 
mDL security and privacy safeguards that fail to meet the security 
purposes of REAL ID requirements and the privacy needs of users. The 
proposed rule would address these considerations by enabling TSA to 
grant a waiver to States whose mDLs TSA determines provide sufficient 
safeguards for security and privacy, pending completion of emerging 
standards. Without timely guidance from the Federal government 
regarding potential requirements for developing a REAL ID-compliant 
mDL, States risk investing in mDLs that are not aligned with emerging 
industry standards and government guidelines that may be IBR'd in a 
future rulemaking. States, therefore, may become locked-in to existing 
solutions and could face a substantial burden to redevelop products 
acceptable to Federal agencies under this future rulemaking.
    Many stakeholders have already expressed these concerns to TSA. In 
response to an April 2021 Department of Homeland Security (DHS) Request 
for Information (RFI),\6\ issued to inform a future rulemaking that 
would set technical requirements and security standards for mDLs, one 
commenter cautioned that the absence of a common standard ``could lead 
to fragmentation of the market, a decrease in trust, non-interoperable 
solutions, and a global diminishing benefit of the mDL concept.'' \7\ 
Similarly, another commenter warned that ``[w]ithout clear, uniform, 
flexible standards that will encourage widespread public and private 
sector use of mDLs, mDLs will likely create confusion and struggle to 
gain a foothold in being accepted.'' \8\
---------------------------------------------------------------------------

    \6\ See 86 FR 20320 (April 19, 2021).
    \7\ Comment by American Association of Motor Vehicle 
Administrators.
    \8\ Comment by DocuSign.
---------------------------------------------------------------------------

    Although this proposed rule would not set standards for the 
issuance of REAL ID-compliant mDLs, it does establish minimum 
requirements that States must meet to be granted a waiver. These 
proposed minimum standards and requirements would ensure that States' 
investments in mDLs provide minimum privacy and security safeguards 
consistent with information currently known to the TSA.

B. Overview of the Proposed Rule

    As further discussed in part II.A., below, mDLs cannot be accepted 
by Federal agencies for official purposes when REAL ID full enforcement 
begins on May 7, 2025, unless 6 CFR part 37 is amended to address mDLs. 
This proposed rule would establish a process for waiving, on a 
temporary and State-by-State basis, the current prohibition on Federal 
acceptance of mDLs for official purposes, and enable Federal agencies 
to accept mDLs on an interim basis while the industry matures to a 
point sufficient to enable TSA to develop more comprehensive mDL 
regulatory requirements.
    The current regulations prohibit Federal agencies from accepting 
non-compliant driver's licenses and identification cards, including 
both physical cards and mDLs, when REAL ID enforcement begins on May 7, 
2025. Any modification of this regulatory provision must occur through 
rulemaking (or legislation). Until and unless TSA promulgates 
comprehensive mDL regulations that enable States to develop and issue 
REAL ID-compliant mDLs, mDLs cannot be developed to comply with REAL 
ID, and Federal agencies therefore cannot accept mDLs for official 
purposes after REAL ID enforcement begins on May 7, 2025. The proposed 
rule would allow the Federal government to accept mDLs on an interim 
basis, but only if all of the following conditions are met: (1) the mDL 
holder has been issued a valid and unexpired REAL ID-compliant physical 
driver's license or identification card, (2) TSA has determined the 
issuing State to be REAL ID-compliant, and (3) TSA has issued a waiver 
to such State based on that State's compliance with minimum privacy, 
safety, and interoperability requirements proposed in this rulemaking. 
Please see Part II.A., below, for an explanation of the REAL ID 
requirement that both cards and issuing States must be REAL ID 
compliant.

C. Need for a Multi-Phased Rulemaking

    TSA recognizes both that regulations can influence long-term 
industry research and investment decisions and that premature 
regulations can distort the choices of technologies adopted, which can 
be costly to undo. As noted above, there are clear reasons for TSA to 
issue requirements for mDLs. First, there is a growing demand for and 
interest in mDLs due to their potential benefits of increased 
convenience, security, and privacy. Second, to meet this demand, States 
are beginning to invest in the infrastructure and programs to issue 
mDLs. Third, in the absence of Federal regulations and guidelines as 
outlined in this rulemaking, States may make unsuitable investments and 
issue mDLs that Federal agencies cannot accept. Fourth, adoption and 
use of mDLs could be thwarted if current regulations are not amended to 
accommodate mDLs when REAL ID enforcement begins on May 7, 2025.
    At the same time, however, TSA believes it is premature to issue 
final, comprehensive requirements for mDLs given the rapid pace of 
innovation in this nascent market, and the multiple emerging industry 
and government standards and guidelines necessary to ensure mDL privacy 
and security that are still in development. From comments submitted in 
response to the RFI, TSA recognizes that technology and stakeholder 
positions in this industry are diverse and evolving. TSA also conducted 
a comprehensive analysis of industry and Government standards and 
guidance, and the types of technology currently available. Based on 
this analysis, a few international industry standards applicable to 
mDLs are available,\9\ while most are years away from publication. 
Accordingly, TSA has concluded that it is premature to promulgate 
comprehensive requirements for mDLs while those standards are emerging, 
because of the risk of unintended consequences, such as chilling 
innovation and competition in the marketplace, and ``locking-in'' 
stakeholders to certain technologies.
---------------------------------------------------------------------------

    \9\ See Part II.D.
---------------------------------------------------------------------------

    Although TSA believes it is premature to establish comprehensive 
requirements at this time, TSA believes it is appropriate to use its 
regulatory authority to establish a waiver process with clear standards 
and requirements to facilitate the acceptance of mDLs while the 
industry matures and moves to accepted standards. Therefore, TSA has 
decided to proceed with a multi-phased rulemaking approach. Initial 
efforts focused on research and gathering information from interested 
stakeholders, commencing with publication of the pre-rulemaking RFI 
that was intended to inform any subsequent rulemaking. ``Phase 1,'' the 
current phase, would establish a temporary waiver process. This waiver 
process would enable secure use of mDLs when REAL ID enforcement begins 
on May 7, 2025, while providing TSA additional operational experience 
and data from TSA, which will accept mDLs during the waiver period 
before eventually issuing comprehensive regulations. The proposed rule 
is

[[Page 60059]]

intended to serve as a regulatory bridge for this emerging technology.
    Following publication of industry standards currently under 
development, TSA anticipates conducting a ``Phase 2'' rulemaking that 
would repeal the temporary waiver provisions, including appendix A to 
subpart A of the part (discussed in Part III.B.4.iv., below) 
established in Phase 1 and establish more comprehensive requirements 
enabling States to issue mDLs that comply with REAL ID requirements. At 
this time, TSA anticipates the Phase 2 rulemaking would IBR pertinent 
parts of some emerging standards (pending review of those final, 
published documents) regarding specific requirements for security, 
privacy, and interoperability, and distinguish between existing 
regulatory requirements that apply only to mDLs versus physical cards. 
Comments received in Phase 1, experience and data gained from temporary 
Federal mDL acceptance under a waiver, TSA testing of mDL acceptance at 
TSA airport security checkpoints, and publication of emerging 
standards, will inform the Phase 2 rulemaking. As one commenter \10\ 
urged, DHS is taking ``a slow and careful approach'' to regulation in 
order to fully understand the implications of mDLs.
---------------------------------------------------------------------------

    \10\ See comment from Electronic Privacy Information Center.
---------------------------------------------------------------------------

    This iterative rulemaking approach supports Executive Order (E.O.) 
14058 of December 13, 2021 (Transforming Federal Customer Experience 
and Service Delivery to Rebuild Trust in Government), by using 
``technology to modernize Government and implement services that are 
simple to use, accessible, equitable, protective, transparent, and 
responsive for all people of the United States.'' \11\ As highlighted 
above and discussed in more detail below, allowing acceptance of mDLs 
issued by States that meet the waiver requirements would enable the 
public to more immediately realize potential benefits of mDLs, 
including greater convenience, security, and privacy. See Part II.C.4, 
below, for more discussion on these benefits.
---------------------------------------------------------------------------

    \11\ Published at 86 FR 71357 (Dec. 16, 2021).
---------------------------------------------------------------------------

II. Background

A. REAL ID Act, Regulations, and Applicability to mDLs

    The REAL ID Act of 2005 sets minimum requirements for State-issued 
driver's licenses and identification cards accepted by Federal agencies 
for official purposes, including accessing Federal facilities, boarding 
federally regulated commercial aircraft, entering nuclear power plants, 
and any other purposes that the Secretary shall determine.\12\ The Act 
defines ``driver's licenses'' and ``identification cards'' strictly as 
State-issued documents,\13\ and the implementing regulations, 6 CFR 
part 37, further refine the definition of ``identification card'' as 
``a document made or issued by or under the authority of a State 
Department of Motor Vehicles or State office with equivalent 
function.'' \14\ Therefore, the REAL ID Act and regulations do not 
apply to identification cards that are not made or issued under a State 
authority, such as cards issued by a Federal agency or any commercial, 
educational, or non-profit entity.
---------------------------------------------------------------------------

    \12\ The REAL ID Act of 2005--Division B of the FY05 Emergency 
Supplemental Appropriations Act, as amended, Public Law 109-13, 119 
Stat. 302.
    \13\ Id. at sec. 201.
    \14\ 6 CFR 37.3.
---------------------------------------------------------------------------

    On January 29, 2008, DHS published a final rule implementing the 
Act's requirements.\15\ That rule included both a State compliance 
deadline \16\ and a schedule describing when individuals must obtain a 
compliant driver's license or identification card intended for use for 
official purposes.\17\ DHS refers to these two deadlines as ``State-
based'' and ``card-based'' enforcement, respectively (or ``full 
enforcement'' collectively). For State-based enforcement, 6 CFR 
37.65(a) prohibits Federal agencies from accepting cards issued by 
States and territories that are not compliant with the REAL ID 
standards.\18\ DHS incrementally enforced the State-based deadline in 
phases, with the last phase beginning January 22, 2018. Since this 
date, many Federal agencies have accepted all valid driver's licenses 
and identification cards issued by REAL ID-compliant States or States 
with an extension or under compliance review from DHS.
---------------------------------------------------------------------------

    \15\ Minimum Standards for Driver's Licenses and Identification 
Cards Acceptable by Federal Agencies for Official Purposes; Final 
Rule, 73 FR 5272 (Jan. 29, 2008); codified at 6 CFR part 37 (2008 
final rule). DHS subsequently issued six other final rules and 
interim final rules amending the regulations, including changes to 
compliance deadlines and State extension submission dates. See 74 FR 
49308 (Sep. 28, 2009), 74 FR 68477 (Dec. 28, 2009) (final rule, 
stay), 76 FR 12269 (Mar. 7, 2011), 79 FR 77836 (Dec. 29, 2014); 84 
FR 55017 (Oct. 15, 2019); 86 FR 23237 (May 3, 2021). In addition to 
final rules, DHS also published two Information Collection Requests 
in the Federal Register in 2016 and 2022. See 81 FR 8736 (Feb. 22, 
2016) and 87 FR 23878 (Apr. 21, 2022).
    \16\ See 6 CFR 37.51(a).
    \17\ See 6 CFR 37.5(b).
    \18\ See 6 CFR 37.65(a).
---------------------------------------------------------------------------

    Card-based enforcement begins on May 7, 2025.\19\ On this date, 
Federal agencies will be prohibited from accepting for official 
purposes a State- or territory-issued driver's license or 
identification card for official purposes unless the card is compliant 
with the REAL ID Act and regulations.\20\
---------------------------------------------------------------------------

    \19\ See 6 CFR 37.5(b).
    \20\ See id.
---------------------------------------------------------------------------

    On December 21, 2020, Congress passed the REAL ID Modernization Act 
\21\ to amend the REAL ID Act to reflect new technologies that did not 
exist when the law was enacted more than 15 years ago. Among other 
updates,\22\ the REAL ID Modernization Act clarified that mDLs are 
subject to REAL ID requirements by amending the definitions of 
``driver's license'' and ``identification card'' to specifically 
include mDLs that have been issued in accordance with regulations 
prescribed by the Secretary.\23\ The REAL ID regulations therefore must 
be updated to distinguish which existing requirements in 6 CFR 37 apply 
to mDLs versus physical cards, and to include additional requirements 
to ensure that mDLs meet equivalent levels of security currently 
imposed on REAL ID-compliant physical cards and are otherwise secure. 
An mDL cannot be REAL ID-compliant until TSA establishes REAL ID 
requirements in regulations and States issue mDLs compliant with those 
requirements. As a result of this requirement, mDLs must also be REAL 
ID-compliant to be accepted when card-based enforcement begins on May 
7, 2025.
---------------------------------------------------------------------------

    \21\ REAL ID Modernization Act, Title X of Division U of the 
Consolidated Appropriations Act, 2021, Public Law 116-260, 134 Stat. 
2304.
    \22\ TSA is conducting a separate rulemaking to implement other 
sections of the REAL ID Modernization Act.
    \23\ Sec. 1001 of the REAL ID Modernization Act, Title X of 
Division U of the Consolidated Appropriations Act, 2021, Public Law 
116-260, 134 Stat. 2304.
---------------------------------------------------------------------------

B. Request for Information

    In April 2021, DHS issued an RFI announcing DHS's intent to 
commence future rulemaking to set the minimum technical requirements 
and security standards for mDLs to enable Federal agencies to accept 
mDLs for official purposes. The RFI requested comments and information 
to inform DHS's rulemaking.\24\ In June 2021, DHS held a public meeting 
to provide an additional forum for comment.\25\ In response to comments 
at the public meeting concerning the importance of public access to an 
industry-developed standard referenced in the RFI, DHS subsequently 
published a notification in the Federal Register to facilitate access 
to the standard.\26\ DHS also conducted

[[Page 60060]]

extensive outreach and engagement with affected stakeholders, including 
States, industry, and individuals. DHS also conducted a roundtable 
discussion on privacy considerations with non-profit organizations 
representing varied interests.
---------------------------------------------------------------------------

    \24\ 86 FR 20320 (April 19, 2021).
    \25\ 86 FR 31987 (June 16, 2021).
    \26\ 86 FR 51625 (Sept. 16, 2021).
---------------------------------------------------------------------------

    The RFI requested comments on 13 specific topics, including: 
potential security risks arising from mDL usage and mitigating 
solutions, potential privacy concerns or benefits associated with mDL 
transactions, the maturity of certain industry standards and the 
appropriateness of DHS's adoption of them, costs to individuals to 
obtain mDLs, and various technical topics associated with mDL issuance 
and communications. In response, DHS received about 60 comments. Please 
see Part IV, below, for a detailed discussion of the comments received, 
which are also referenced throughout this preamble.

C. mDL Overview

1. mDLs Generally
    Driven by increasing public demand for more convenient, secure, and 
privacy-enhancing forms of identification, many States have invested 
significantly and rapidly in recent years to develop mDL technology. An 
mDL is generally recognized as the digital representation of an 
individual's identity information contained on a State-issued physical 
driver's license or identification card.\27\ An mDL may be stored on a 
diverse range of portable or mobile electronic devices, such as 
smartphones, smartwatches, and storage devices containing memory. Like 
a physical card, mDL data originates from identity information about an 
individual that is maintained in the database of a State driver's 
licensing agency.
---------------------------------------------------------------------------

    \27\ A technical description of mDLs as envisioned by the 
American Association of Motor Vehicle Administrators may be found at 
https://www.aamva.org/Mobile-Drivers-License/.
---------------------------------------------------------------------------

    Unlike physical driver's licenses that are read and verified 
visually through human inspection of physical security features, an mDL 
is read and verified electronically using a device known simply as a 
``reader'' (discussed in Part II.C.2., below). Physical cards employ 
physical security features to deter fraud and tampering, such as 
``easily identifiable visual or tactile [security] features'' on the 
surface of a card.\28\ An mDL, in contrast, combats fraud through the 
use of digital security features that are not recognizable through 
human inspection. For example, mDLs usually rely on digital security 
through use of asymmetric cryptography/public key infrastructure (PKI). 
As discussed in the RFI,\29\ Asymmetric cryptography generates a pair 
of encryption ``keys'' to encrypt and decrypt protected data. One key, 
a ``public key,'' is distributed publicly, while the other key, a 
``private key,'' is held by the State driver's licensing agency (i.e., 
a Department of Motor Vehicles, or ``DMV''). When a DMV issues an mDL 
to an individual (see Fig. 1, below, communication no. 1), the DMV uses 
its private key to digitally ``sign'' the mDL data. A Federal agency 
validates the integrity of the mDL data by obtaining the DMV's public 
key to verify the digital signature (see Fig. 1: mDL Secure 
Communications). Private keys and digital signatures are elements of 
data encryption that protect against unauthorized access, tampering, 
and fraud.
---------------------------------------------------------------------------

    \28\ 6 CFR 37.15(c) and 37.17(h).
    \29\ See 86 FR 20320, 20324 (April 19, 2021).
---------------------------------------------------------------------------

    Generally, mDL-based identity verification under REAL ID would 
involve a triad of secure communications between a State driver's 
licensing agency, an mDL holder, and a Federal agency. Specifically, 
and as shown in Fig. 1, below, the following three communications would 
occur: (1) Issuance and Updates: the DMV would issue or ``provision'' 
an mDL onto a mobile device of the person requesting the mDL (who then 
becomes the mDL holder), (2) Data Transfer: the mDL holder would 
authorize release of relevant data from the device to a Federal agency, 
which would use a reader to retrieve data, and (3) Validation: the 
Federal agency would use a reader, to confirm that the data originated 
from the issuing DMV and is unchanged, by verifying the DMV's public 
key. Although not depicted in Fig. 1, the Federal agency would also 
validate (via human inspection or facial matching software) that the 
mDL belongs to the individual presenting it by comparing the 
individual's live appearance to the photo retrieved by the reader. 
Standardized communication interfaces are necessary to enable Federal 
agencies to exchange information with all 56 U.S. States and 
territories that issue mDLs.

[[Page 60061]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.005

2. mDL Readers
    Any Federal agency that chooses to accept mDLs for REAL ID official 
purposes would need to procure and use readers to validate an mDL 
holder's identity data from their mobile device and establish trust 
that the mDL is secure by using private-public key data encryption. 
Non-Federal agencies, such as State agencies, businesses, and other 
entities who choose to accept mDLs for uses beyond the scope of REAL ID 
are not governed by the REAL ID Act or regulations and therefore would 
make their own independent decisions concerning reading mDLs and reader 
procurement.\30\ The reader would confirm that the mDL holder's 
identity data is valid by performing the following steps: establishing 
a secure digital connection with an mDL holder's mobile device, 
receiving the required mDL information for identity verification, 
verifying its authenticity and integrity by validating the driver's 
licensing agency's digital signature of the mDL data, and confirming 
that the mobile device possesses the unique device key corresponding to 
the mDL at the time of issuance.
---------------------------------------------------------------------------

    \30\ Non-Federal agencies and other entities who choose to 
accept mDLs for uses beyond the scope of REAL ID should also 
recognize the need for a reader to ensure the validity of the mDL. 
Any verifying entity can validate in the same manner as a Federal 
agency if they implement the standardized communication interface 
requirements specified in this proposed rule, which would require 
investment to develop the necessary IT infrastructure and related 
proceses.
---------------------------------------------------------------------------

    An mDL reader can take multiple forms, ranging from software to 
hardware. In its simplest form, an mDL reader can be an app installed 
on a smartphone or other mobile device. A reader could also be a 
dedicated device. This is expected to be a low-cost solution that could 
be added to existing smartphones carried by a verifying entity's 
employee. While reader development is ongoing in the industry, TSA 
understands that companies are already beginning to offer verification 
apps for free on their commercial app stores. As reader technology 
continues to evolve, there will likely be wide range of reader options 
with various capabilities and associated price points.\31\
---------------------------------------------------------------------------

    \31\ Readers for mDLs have specific requirements and at this 
time are not interchangeable with readers for other types of Federal 
cards, such as the Transportation Worker Identification Credential 
(TWIC). Although TSA is evaluating some mDLs at select airport 
security checkpoints (see Part II.E.), cost estimates for readers 
used in the evaluations are not available because those readers are 
non-commercially available prototypes designed specifically for 
integration into TSA-specific IT infrastructure that few, if any, 
other Federal agencies use. In addition, mDL readers are evolving 
and entities who accept mDLs would participate voluntarily. 
Accordingly, associated reader costs are not quantified at this time 
but TSA intends to gain a greater understanding of any costs to 
procure reader equipment as the technology continues to evolve.
---------------------------------------------------------------------------

3. State mDL Issuance
    As noted above, mDL-issuance is proliferating rapidly among States, 
with nearly half of all States piloting, issuing, or considering mDLs. 
As of the date of this NPRM, at least eight States (Arizona, Colorado, 
Delaware, Louisiana, Maryland, Mississippi, Oklahoma, and Utah) are 
issuing mDLs, and three States (Florida, Iowa, and Virginia) are 
currently piloting or have piloted mDLs. Additionally, at least 17 
States (California, District of Columbia, Georgia, Hawaii, Illinois, 
Indiana, Kentucky, Michigan, Missouri, New Jersey, New York, North 
Dakota, Pennsylvania, Puerto Rico, Tennessee, Texas, and Wyoming) have 
indicated they are studying mDLs or considering enabling legislation.
    Based on its analysis of the current environment, TSA believes that 
States are issuing mDLs using widely varying technology solutions, 
resulting in a fragmented environment rather than a common standard for 
issuance and use. The various States issuing or piloting mDLs are 
believed to be using technology solutions provided by multiple vendors, 
and it is not clear whether such technological diversity provides the 
safeguards and interoperability necessary for Federal acceptance. For 
example, in September 2021 and March 2022, Apple announced \32\ that it 
was working with 13 States (Arizona, Colorado, Connecticut, Georgia, 
Hawaii, Iowa, Kentucky, Maryland, Mississippi, Ohio,

[[Page 60062]]

Oklahoma, Puerto Rico, and Utah) to enable their mDLs to be provisioned 
into Apple's Wallet app. Google and GET Group North America have made 
similar announcements.\33\ States choosing a variety of technology 
solutions, which could result in non-standard, non-compatible 
technologies, which raises additional questions concerning the Federal 
government's ability to accept the mDLs for Federal purposes.
---------------------------------------------------------------------------

    \32\ https://www.apple.com/newsroom/2021/09/apple-announces-first-states-to-adopt-drivers-licenses-and-state-ids-in-wallet/; 
https://www.apple.com/newsroom/2022/03/apple-launches-the-first-drivers-license-and-state-id-in-wallet-with-arizona/.
    \33\ https://support.google.com/wallet/answer/12436402?hl=en; 
https://getgroupna.com/get-mobile-id-is-now-accepted-at-tsa-precheck/.
---------------------------------------------------------------------------

    Although detailed mDL adoption statistics are unavailable, 
anecdotal information and fragmented reporting indicates that mDLs are 
rapidly gaining public acceptance. For example, Louisiana has recently 
reported that over one million residents (representing more than 20% of 
its population) have installed Louisiana's mDL app on their mobile 
devices.
4. Potential Benefits of mDLs
    An mDL has potential benefits for all stakeholders. For Federal 
agencies that require REAL ID-compliant IDs for official purposes, mDLs 
may provide efficiency and security enhancements. Compared to physical 
cards, which rely on manual inspection of physical security features on 
the surface of a card designed to deter tampering and fraud, mDLs rely 
on digital security features that are immune to many vulnerabilities of 
physical security features. For individuals, some commenters noted that 
mDLs may provide a more secure, convenient, privacy-enhancing, and 
``touchless'' method of identity verification compared to physical 
IDs.\34\ Among other privacy-enhancing features, the holder of an mDL 
could control what data fields are released. For example, if an mDL is 
used for identity purposes with a Federal agency, the holder could 
restrict the agency to receiving only the data necessary and required 
by the agency to verify the individual's identity. Potential hygiene 
benefits also derive from the contact-free method of ID verification 
enabled by mDLs. An mDL holder may transmit data to a verifying Federal 
agency's mDL reader by hovering their mDL above the reader, potentially 
eliminating any physical contact with the individual's mobile device 
thereby reducing germ transmission.
---------------------------------------------------------------------------

    \34\ See, e.g., comments submitted by: Applied Recognition, 
Bredemarket, Hiday, Mothershed, Muller, State of Connecticut, DHS of 
Motor Vehicles, Secure Technology Alliance, U.S. Travel Association.
---------------------------------------------------------------------------

D. Current and Emerging Industry Standards and Government Guidelines 
for mDLs

    The nascence of mDLs and absence of standardized mDL-specific 
requirements provide an opportunity for industry and government to 
develop standards and guidelines to close this void. TSA is aware of 
multiple such documents, both published and under development, from 
both Federal and non-government sources. This section discusses 
standards and guidelines that form the basis of many of the 
requirements proposed in this rulemaking, as well as additional 
documents that may inform the upcoming Phase 2 rulemaking. As discussed 
in Part III.B.8, below, this rulemaking proposes to amend Sec.  37.4 by 
incorporating by reference into part 37 nineteen standards and 
guidelines. All proposed incorporation by reference material is 
available for inspection at DHS Headquarters in Washington DC, please 
email [email protected]. The material may also be 
obtained from its publisher, as discussed below.
1. American Association of Motor Vehicle Administrators
    In September 2022, the American Association of Motor Vehicle 
Administrators published mDL Implementation Guidelines (AAMVA 
Guidelines). Mobile Driver's License (mDL) Implementation Guidelines 
Version 1.2 (Jan. 2023), American Association of Motor Vehicle 
Administrators, 4401 Wilson Boulevard, Suite 700, Arlington, VA 22203, 
available at https://aamva.org/getmedia/b801da7b-5584-466c-8aeb-f230cef6dda5/mDL-Implementation-Guidelines-Version-1-2_final.pdf. The 
Guidelines are available to the public for free at the link provided 
above. The AAMVA Guidelines adapt industry standard ISO/IEC 18013-
5:2021 (discussed in Part II.D.4., below), for State driver's licensing 
agencies through the addition of more stringent and more specific 
recommendations, as the ISO/IEC standard has been developed for 
international purposes and may not meet all purposes and needs of 
States and the Federal Government. For example, Part 3.2 of the AAMVA 
Guidelines modify and expand the data elements specified in ISO/IEC 
18013-5:2021, in order to enable the mDL to indicate the REAL ID 
compliance status of the companion physical card, as well as to ensure 
interoperability necessary for Federal acceptance. AAMVA has added data 
fields for DHS Compliance and DHS Temporary Lawful Status. These 
additional fields provide the digital analog to the requirements for 
data fields for physical cards defined in 6 CFR 37.17(n) \35\ and 
37.21(e) \36\ respectively. As discussed generally in Part III.B, 
below, Sec.  37.10(a)(1) and (4) of this proposed rule would require a 
State to explain, as part of its application for a waiver, how the 
State issues mDLs that are compliant with specified requirements of the 
AAMVA Guidelines.
---------------------------------------------------------------------------

    \35\ Section 37.17(n) provides, ``The card shall bear a DHS-
approved security marking on each driver's license or identification 
card that is issued reflecting the card's level of compliance as set 
forth in Sec.  37.51 of this Rule.''
    \36\ Section 37.21(e) provides, ``Temporary or limited-term 
driver's licenses and identification cards must clearly indicate on 
the face of the license and in the machine readable zone that the 
license or card is a temporary or limited-term driver's license or 
identification card.''
---------------------------------------------------------------------------

2. Certification Authority Browser Forum
    The Certification Authority Browser Forum (CA/Browser Forum) is an 
organization of vendors of hardware and software used in the production 
and use of publicly trusted certificates. These certificates are used 
by forum members, non-member vendors, and governments to establish the 
security and trust mechanisms for public key infrastructure-enabled 
systems. The CA/Browser Forum has published two sets of requirements 
applicable for any implementers of PKI, including States that are 
seeking to deploy Certificate Systems that must be publicly trusted and 
used by third parties:
     Baseline Requirements for the Issuance and Management of 
Publicly[hyphen]Trusted Certificates v. 1.8.6 (December 14, 2022), 
available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.6.pdf, and
     Network and Certificate System Security Requirements v. 
1.7 (April 5, 2021), available at https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf. CA/
Browser Forum, 815 Eddy St, San Francisco, CA 94109, (415) 436-9333.
    These documents are available to the public for free at the links 
provided above.
    To issue mDLs that can be trusted by Federal agencies, each issuing 
State must establish a certificate system, including a root 
certification authority that is under control of the issuing State. TSA 
believes the CA/Browser Forum requirements for publicly trusted 
certificates have been proven to be an effective model for securing 
online transactions. As discussed generally in Part III.B.4, below, 
appendix A to

[[Page 60063]]

subpart A of the part, sections 1, 2, and 4-8, require compliance with 
specified requirements of the CA/Browser Forum Baseline Requirements 
and/or Network and Certificate System Requirements. Section 37.4 of 
this proposed rule would IBR these CA/Browser Forum references.
3. Cybersecurity Guidelines
    DHS and the Cybersecurity and Infrastructure Security Agency (CISA) 
have published two guidelines which are relevant to the operations of 
States' mDL issuance systems:
     National Cyber Incident Response Plan (Dec. 2016), 
available at https://www.cisa.gov/uscert/sites/default/files/ncirp/National_Cyber_Incident_Response_Plan.pdf, and
     CISA Cybersecurity Incident & Vulnerability Response 
Playbooks (Nov. 2021), available at https://www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf.
    Cybersecurity and Infrastructure Security Agency, Mail Stop 0380, 
245 Murray Lane, Washington, DC 20528-0380, (888) 282-0870. These 
guidelines, available for free at the links provided above, provide 
details on best practices for management of systems during a 
cybersecurity incident, providing recommendations on incident and 
vulnerability response. Management of cybersecurity incidents and 
vulnerabilities are critical to maintenance of a State's mDL issuance 
information technology (IT) infrastructure. As discussed generally in 
Part III.B.4, below, appendix A to subpart A of the part, section 8, 
requires compliance with specified requirements of the DHS National 
Cyber Incident Response Plan and the CISA Cybersecurity Incident & 
Vulnerability Response Playbooks. Section 37.4 of this proposed rule 
would IBR these DHS and CISA standards.
4. ISO/IEC Standards and Technical Specifications
    Two international standards-setting organizations, the 
International Organization for Standardization (ISO) and the 
International Electrotechnical Commission (IEC),\37\ are jointly 
drafting two series of multi-part International Standards and Technical 
Specifications.\38\ Series ISO/IEC 18013, Personal identification--ISO-
compliant driving licence Parts 5-7, are specific to mDLs, and series 
ISO/IEC 23220 Cards and security devices for personal identification--
Building blocks for identity management via mobile devices, Parts 1-6, 
concern digital identity (of which mDLs are a subset). DHS TSA has 
participated in the development of both Series as a non-voting member 
of the United States national body member of the Joint Technical 
Committee.\39\ Together, both Series would establish standardized 
interfaces that would enable the mDL communications triad (see Part 
II.C.1., above) as follows: (1) State driver's licensing agency and the 
mDL holder (Series 23220), (2) mDL Holder and a verifying entity 
(Series 18013), and (3) verifying entity and State licensing agency 
(Series 18013).
---------------------------------------------------------------------------

    \37\ ISO is an independent, non-governmental international 
organization with a membership of 164 national standards bodies. ISO 
creates documents that provide requirements, specifications, 
guidelines or characteristics that can be used consistently to 
ensure that materials, products, processes and services are fit for 
their purpose. The IEC publishes consensus-based international 
standards and manages conformity assessment systems for electric and 
electronic products, systems and services, collectively known as 
``electrotechnology.'' ISO and IEC standards are voluntary and do 
not include contractual, legal or statutory obligations. ISO and IEC 
standards contain both mandatory requirements and optional 
recommendations, and those who choose to implement the standards 
must adopt the mandatory requirements.
    \38\ ISO defines an International Standard as ``provid[ing] 
rules, guidelines or characteristics for activities or for their 
results, aimed at achieving the optimum degree of order in a given 
context. It can take many forms. Apart from product standards, other 
examples include: test methods, codes of practice, guideline 
standards and management systems standards.'' www.iso.org/deliverables-all.html. In contrast, ISO defines a ``Technical 
Specification'' as ``address[ing] work still under technical 
development, or where it is believed that there will be a future, 
but not immediate, possibility of agreement on an International 
Standard. A Technical Specification is published for immediate use, 
but it also provides a means to obtain feedback. The aim is that it 
will eventually be transformed and republished as an International 
Standard.'' www.iso.org/deliverables-all.html.
    \39\ A member of the TSA serves as DHS's representative to the 
Working Group.
---------------------------------------------------------------------------

    In September 2021, ISO and IEC published international standard 
ISO/IEC 18013, Part 5, entitled, ``Personal identification--ISO-
compliant driving licence.'' ISO/IEC 18013-5:2021, Personal 
identification--ISO-compliant driving licence--Part 5: Mobile driving 
licence (mDL) application (Sept. 2021), International Organization for 
Standardization, Chemin de Blandonnet 8, CP 401, 1214 Vernier, Geneva, 
Switzerland, +41 22 749 01 11, www.iso.org/contact-iso.html.\40\ 
Section 37.4 of this rulemaking proposes to IBR this standard, which is 
available from DHS as discussed above. In addition, the American 
National Standards Institute (ANSI), a private organization not 
affiliated with DHS, will provide public access \41\ to ISO/IEC 18013-
5:2021 until October 16, 2023. Standard ISO/IEC 18013-5:2021 
standardizes the interface between an mDL and an entity seeking to read 
an individual's mDL for identify verification purposes, and sets full 
operational and communication requirements for both mDLs and mDL 
readers. This standard applies to ``attended'' mode verification, in 
which both the mDL holder and an officer or agent of a verifying entity 
are physically present together during the time of identity 
verification.\42\ DHS received numerous comments in response to the RFI 
concerning the appropriateness of this standard as a starting point for 
future regulatory requirements.\43\ Many comments received in response 
to the RFI noted that standard ISO/IEC 18013-5:2021, which published in 
Sept. 2021, provides a sufficient baseline for secure Federal 
acceptance.\44\ After carefully

[[Page 60064]]

considering all comments received, TSA believes ISO/IEC 18013-5:2021 is 
critical to enabling the interoperability, security, and privacy 
necessary for wide acceptance of mDLs by Federal agencies for official 
purposes. As discussed in Part III.B, below, this NPRM proposes to IBR 
this standard into part 37. Specifically, Sec.  37.8 of the proposed 
rule would require Federal agencies to validate an mDL as required by 
standard ISO/IEC 18013-5:2021, and Sec.  37.10(a)(4) would require a 
State to explain, as part of its application for a waiver, how the 
State issues mDLs that are interoperable with this standard to provide 
the security necessary for Federal acceptance.
---------------------------------------------------------------------------

    \40\ Forthcoming Part 6 of Series ISO/IEC 18013, ``mDL test 
methods,'' is a technical specification that will enable testing of 
mDLs and readers to certify conformance with ISO/IEC 18013-5:2021. 
TSA anticipates a draft of this standard may be completed by the end 
of 2023, and the final document may publish at the end of 2024.
    \41\ ANSI advises interested persons to visit the following 
website to obtain access: https://www.surveymonkey.com/r/DQVJYMK. 
This link will direct interested persons to a nongovernment website 
that is not within the Federal government's control and may not 
follow the same privacy, security, or accessibility policies as 
Federal government websites. ANSI requires individuals to complete 
an online license agreement form, which will ask for name, 
professional affiliation, and email address, before it grants access 
to any standards. ANSI will provide access on a view-only basis, 
meaning copies of the document cannot be downloaded or modified. 
Individuals who access non-governmental sites to view available 
standards are subject to the policies of the owner of the website. 
For access to non-final draft standards, please contact ISO/IEC 
using the information provided earlier.
    \42\ Part 7 of Series ISO/IEC 18013, entitled ``mDL add-on 
function,'' is an upcoming technical specification that will 
standardize interfaces for ``unattended'' mode verification, in 
which the mDL holder and officer/agent of the verifying agency are 
not physically present together, and the identity verification is 
conducted remotely. Unattended identity verification is not 
currently considered a REAL ID use case.
    \43\ See, e.g., comments submitted by: American Association of 
Motor Vehicle Administrators; American Civil Liberties Union, 
Electronic Frontier Foundation, and Electronic Privacy Information 
Center; Apple; Association for Convenience & Fuel Retailing; CBN 
Secure Technologies; FaceTec; Florida DHS of Highway Safety and 
Motor Vehicles; IDEMIA; Maryland DHS of Transportation, Motor 
Vehicle Administration; National Immigration Law Center and 
Undersigned Organizations; Secure Technology Alliance; State of 
Connecticut, DHS of Motor Vehicles; Underwriters Laboratories; 
Verifiable Credentials Policy Committee, Blockchain Advocacy 
Coalition. All comments are available at https://www.regulations.gov/docket/DHS-2020-0028.
    \44\ See comments submitted by American Association of Motor 
Vehicle Administrators; Florida DHS of Highway Safety and Motor 
Vehicles; Maryland DHS of Transportation, Motor Vehicle 
Administration; State of Connecticut, DHS of Motor Vehicles.
---------------------------------------------------------------------------

    The ISO/IEC 23220 Series of Technical Specifications, ``Cards and 
security devices for personal identification--Building blocks for 
identity management via mobile devices,'' cover international digital 
IDs broadly and are applicable to mDLs. ISO/IEC 23220: Cards and 
security devices for personal identification--Building blocks for 
identity management via mobile devices, International Organization for 
Standardization, Chemin de Blandonnet 8, CP 401, 1214 Vernier, Geneva, 
Switzerland, +41 22 749 01 11, www.iso.org/contact-iso.html. This 
Series consists of six Parts, with Parts 3, 5, and 6 being relevant to 
mDLs and the forthcoming Phase 2 rulemaking. More specifically, Series 
23220 would establish the following critical requirements for 
``provisioning'' \45\ an mDL, which refers to the various steps 
required for a State driver's licensing agency to securely place an mDL 
onto a mobile device:
---------------------------------------------------------------------------

    \45\ The initial step of provisioning requires proving that an 
mDL applicant owns the mobile device onto which the mDL will be 
stored. Next, a trusted connection would be established between the 
licensing agency and the target device. Finally, the licensing 
agency would use this connection to securely transmit and update mDL 
data on the device.
---------------------------------------------------------------------------

     Part 3, ``Protocols and services for installation and 
issuing phase,'' covers data function calls and formatting that States 
will use to communicate (e.g., provision, refresh, revoke) with a 
mobile device.
     Part 5, ``Trust models and confidence level assessment,'' 
covers trust framework and provisioning, including confidence levels, 
identity proofing, binding, identity resolution, evidence validation, 
evidence verification, and holder authentication.
     Part 6, ``Mechanism for use of certification on 
trustworthiness of secure area,'' primarily covers device security 
requirements and trust of the secure areas in mobile devices.
    TSA anticipates that Series ISO/IEC 23220 will define critical 
requirements for the interface between a State driver's licensing 
agency and mobile device. However, none of Parts 3, 5, and 6 of Series 
23220 have published. TSA understands that drafts of Parts 3 and 5 may 
publish in late 2023, and final publication is possible by the end of 
2024; publication dates for Part 6 are unknown, but a draft is 
anticipated in 2024. DHS received many comments in response to the RFI 
cautioning, however, that standard ISO/IEC 23220, Parts 3, 5, and 6, 
are not sufficiently mature to inform regulatory requirements.\46\ 
Given the evolving stage of Series ISO/IEC 23220 and comments to the 
RFI, TSA believes it is premature to rely on this Series to inform this 
proposed rulemaking and thus is not proposing to IBR them in this NPRM. 
TSA may consider adopting requirements of pertinent Parts of this 
standard in the upcoming Phase 2 rulemaking, pending review of the 
final published documents.
---------------------------------------------------------------------------

    \46\ See comments submitted by American Civil Liberties Union, 
Electronic Frontier Foundation, and Electronic Privacy Information 
Center; IDEMIA; Maryland DHS of Transportation, Motor Vehicle 
Administration; Underwriters Laboratories.
---------------------------------------------------------------------------

5. National Institute for Standards and Technology
i. Digital Identity Guidelines
    The National Institute for Standards and Technology (NIST) has 
published Digital Identity Guidelines, NIST SP 800-63-3, that cover 
technical requirements for Federal agencies implementing digital 
identity. NIST Special Publication 800-63-3, Digital Identity 
Guidelines (June 2017), National Institute of Standards and Technology, 
U.S. Department of Commerce, 100 Bureau Drive, Gaithersburg, MD 20899, 
available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf. The Digital Identity Guidelines, available for 
free at the link provided above, define technical requirements in each 
of the areas of identity proofing, registration, user authentication, 
and related issues. Because TSA is not aware of a common industry 
standard for mDL provisioning that is appropriate for official REAL ID 
purposes today, TSA views the current NIST Digital Guidelines as 
critical to informing waiver application requirements for States 
regarding provisioning (discussed in detail in Part III.B.4., below). 
As discussed generally in Part III.B.4, below, under proposed rule text 
Sec.  37.10(a)(2), which requires compliance with appendix A to subpart 
A of the part, a State must explain, as part of its application for a 
waiver, how the State issues mDLs that are compliant with NIST SP 800-
63-3 to provide the security for mDL IT infrastructure necessary for 
Federal acceptance. Section 37.4 of this proposed rule would IBR NIST 
SP 800-63-3.
    NIST has also published Digital Identity Guidelines Authentication 
and Lifecycle Management, NIST SP 800-63B, as a part of NIST SP 800-63-
3. NIST Special Publication 800-63B, Digital Identity Guidelines: 
Authentication and Lifecycle Management (June 2017), National Institute 
of Standards and Technology, U.S. Department of Commerce, 100 Bureau 
Drive, Gaithersburg, MD 20899, available at
    https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf. This document provides technical requirements for Federal 
agencies implementing digital identity services. The standard focuses 
on the authentication of subjects interacting with government systems 
over open networks, establishing that a given claimant is a subscriber 
who has been previously authenticated and establishes three 
authenticator assurance levels. As discussed generally in Part III.B.4, 
below, proposed rule text Sec.  37.10(a)(2) requires compliance with 
appendix A to subpart A of the part, which would require a State to 
explain, as part of its application for a waiver, how the State manages 
its mDL issuance infrastructure using authenticators at assurance 
levels provided in NIST SP 800-63B. Section 37.4 of this proposed rule 
would incorporate by reference NIST SP 800-63B.
    NIST is developing a revision to the Digital Identity Guidelines, 
SP 800-63-4, which is expected to impact key issues related to mDL 
processes. This publication and its companion volumes NIST SP 800-63A 
Rev. 4, SP 800-63B Rev. 4, and SP 800-63C Rev. 4, provide technical 
guidelines for the implementation of digital identity services. Initial 
public drafts of this suite published in December 2022, and final 
drafts may publish in early 2024. The full suite of draft NIST Digital 
Identity Guidelines, NIST SP 800-63-4, are available for free as 
follows:
     NIST SP 800-63-4, Digital Identity Guidelines, Initial 
Public Draft (December 2022), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-4.ipd.pdf.
     NIST SP 800-63A Rev. 4 Digital Identity Guidelines: 
Enrollment and

[[Page 60065]]

Identity Proofing, Initial Public Draft (December 2022), available at 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63A-4.ipd.pdf;
     NIST SP 800-63B Rev. 4 Digital Identity Guidelines: 
Authentication and Lifecycle Management, Initial Public Draft (December 
2022), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63B-4.ipd.pdf;
     NIST SP 800-63C Rev. 4 Digital Identity Guidelines: 
Federation and Assertions, Initial Public Draft (December 2022), 
available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63C-4.ipd.pdf.

National Institute of Standards and Technology, U.S. Department of 
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. The final versions 
of these publications may be candidates for incorporation by reference 
(pending review of the final published documents) in the forthcoming 
Phase 2 rulemaking.
ii. Federal Information Processing Standards
    NIST also maintains the Federal Information Processing Standards 
(FIPS) which relate to the specific protocols and algorithms necessary 
to securely process data. This suite of standards includes:
     NIST FIPS PUB 140-3, Security Requirements for 
Cryptographic Modules (March 22, 2019), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf,
     NIST FIPS PUB 180-4, Secure Hash Standard (SHS) (August 4, 
2015), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf,
     NIST FIPS PUB 186-5, Digital Signature Standard (DSS) 
(February 3, 2023), available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf,
     NIST FIPS PUB 197, Advanced Encryption Standard (AES) 
(November 26, 2001) available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf,
     NIST FIPS PUB 198-1, The Keyed-Hash Message Authentication 
Code (HMAC) (July 16, 2008) available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf, and
     NIST FIPS PUB 202, SHA-3 Standard: Permutation-Based Hash 
and Extendable-Output Functions (August 4, 2015) available at https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf.

National Institute of Standards and Technology, U.S. Department of 
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. This suite of FIPS 
standards, available for free at the links provided above, are critical 
to the transactions required for mDLs, and any Federal systems which 
interact with or are used to verify a mDL for REAL ID official purposes 
will be required to use the algorithms and protocols defined. As 
discussed generally in Part III.B, below, Sec.  37.10(a)(4) requires 
compliance with specified requirements of NIST FIPS PUB 180-4, 186-5, 
197, 198-1, and 202, and appendix A to subpart A of the part, section 
5, requires compliance with FIPS PUB 140-3. Section 37.4 of this 
proposed rule would incorporate by reference the suite of FIPS 
standards discussed above.
iii. Security and Privacy Controls for Information Systems and 
Organizations; Key Management
    NIST has published several guidelines to protect the security and 
privacy of information systems:
     NIST SP 800-53 Rev. 5, Security and Privacy Controls for 
Information Systems and Organizations (September 2020), available at 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf.
     NIST SP 800-57 Part 1, Rev. 5, Recommendation for Key 
Management: Part 1--General (May 2020), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf.
     NIST SP 800-57 Part 2, Rev. 1, Recommendation for Key 
Management: Part 2--Best Practices for Key Management Organizations 
(May 2019), available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf.
     NIST SP 800-57 Part 3, Rev. 1, Recommendation for Key 
Management, Part 3: Application-Specific Key Management Guidance 
(January 2015) available at https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf.

National Institute of Standards and Technology, U.S. Department of 
Commerce, 100 Bureau Drive, Gaithersburg, MD 20899. All of these 
documents are available for free at the links provided above.
    Collectively, NIST SP 800-53 Rev. 5 and NIST SP 800-57 provide 
relevant controls for States regarding mDL security and privacy 
covering a broad range of topics related to the administration of a 
certificate system including: access management; certificate life-cycle 
policies; operational controls for facilities and personnel; technical 
security controls; and vulnerability management such as threat 
detection, incident response, and recovery planning. Due to the 
sensitive nature of State Certificate System processes and the 
potential for significant harms to security if confidentiality, 
integrity, or availability of the certificate systems is compromised, 
the minimum risk controls specified in appendix A to subpart A of the 
part require compliance with the NIST SP 800-53 Rev. 5 ``high 
baseline'' as set forth in that document, as well as compliance with 
the specific risk controls described in the appendix. In addition, and 
as discussed generally in Part III.B, below: appendix A to subpart A of 
the part, secs. 1-8, require compliance with NIST SP 800-53 Rev. 5; 
secs. 1 and 5 require compliance with NIST SP 800-57 Part 1, Rev. 5; 
sec. 1 requires compliance with NIST SP 800-57 Part 2 Rev. 1; and sec. 
1 requires compliance with NIST SP 800-57 Part 3, Rev. 1. Section 37.4 
of this proposed rule would incorporate by reference NIST SP 800-53 
Rev. 5 and the full suite of NIST SP 800-57 references discussed above.
iv. Cybersecurity Framework
    NIST has published the Framework for Improving Critical 
Infrastructure Cybersecurity v. 1.1 (April 16, 2018), National 
Institute of Standards and Technology, U.S. Department of Commerce, 100 
Bureau Drive, Gaithersburg, MD 20899, available at https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf. This document, 
available for free at the link provided above, provides relevant 
information for cybersecurity for States issuing mDLs. As discussed 
generally in Part III.B., below, certain requirements from the NIST 
Cybersecurity Framework have been adopted in appendix A to subpart A of 
the part, secs. 1,2, 5-8. Section 37.4 of this proposed rule would 
incorporate by reference the NIST Cybersecurity Framework.
6. W3C Standards
    In its RFI, DHS specifically sought comments on industry standards 
that could inform future regulatory requirements.\47\ DHS received 
multiple comments \48\ concerning standards being developed by the 
World Wide Web Consortium (W3C), which is a

[[Page 60066]]

standards-development organization that develops open standards for the 
World Wide Web. Similar to its involvement with ISO, DHS has 
participated in the development of these standards as a non-voting 
member in the W3C Credential Community Group.
---------------------------------------------------------------------------

    \47\ 86 FR 20320 at 20325-26.
    \48\ See comments submitted by American Civil Liberties Union, 
Electronic Frontier Foundation, and Electronic Privacy Information 
Center; Association for Convenience & Fuel Retailing; CBN Secure 
Technologies; Indico.tech and Lorica Identity; Mastercard; Muller; 
OpenID Foundation; UL; Verifiable Credentials Policy Committee, 
Blockchain Advocacy Coalition.
---------------------------------------------------------------------------

    While TSA is not proposing to IBR these W3C standards in this NPRM, 
TSA understands that W3C is developing two standards concerning digital 
identification that, like the ISO/IEC Series of standards discussed 
above, may be relevant to the Phase 2 rulemaking. The W3C standards are 
``Verifiable Credentials Data Model v1.1'' (VCDM v1.1) and 
``Decentralized Identifiers v1.0'' (DID v1.0). Verifiable Credentials 
Data Model v1.1 (March 3, 2022), W3C/MIT, 105 Broadway, Room 7-134, 
Cambridge, MA 02142, available at www.w3.org/TR/vc-data-model/; 
Decentralized Identifiers (DIDs) v1.0 (July 19, 2022), W3C/MIT, 105 
Broadway, Room 7-134, Cambridge, MA 02142, available at www.w3.org/TR/did-core/. These documents are available to the public for free at the 
links provided above. DHS has participated in the development of these 
standards as a non-voting member in the W3C Credential Community Group.
    In March 2022, the W3C published VCDM v1.1. A ``Verifiable 
Credential'' (VC) is a form of digital identification, developed under 
this standard, with features that enable a verifying entity to confirm 
its authenticity.\49\ This standard defines elements of a data model 
that enables using a digital identity in online transactions. The 
standard appears to provide broad requirements that enable issuance of 
diverse types of secure digital identification using varying data 
fields (e.g., name, date of birth), data types (e.g., text, numeric 
values, length of data string), and methods of digital security. 
Although the standard sets forth specifications for the data model 
generally, TSA understands the standard does not provide specific 
requirements to implement security and privacy protections for the data 
model. Instead, references to these topics appear to be largely non-
binding, informative guidance. For example, the standard requires that 
the VC contain at least one encryption mechanism to detect tampering 
(such as a digital signature), but does not set forth any specific 
mechanisms that are acceptable.\50\ Similarly, although the standard 
encourages the use of mechanisms to enable a VC holder to selectively 
release only certain data to a verifying entity, it does not specify 
acceptable implementation mechanisms.\51\
---------------------------------------------------------------------------

    \49\ See VCDM sections 1 and 2.
    \50\ See VCDM sections 4.7 and 8.1.
    \51\ See VCDM sections 5.8 and 7.8.
---------------------------------------------------------------------------

    In July 2022, W3C published complementary standard DID v1.0, which 
specifies the essential requirements to enable the use of diverse types 
of digital identification in online transactions. A ``DID,'' is a 
unique identifier used in online transactions that, for example, 
enables VC holders to authenticate themselves. A DID can be used in a 
blockchain system. Like the VCDM standard, DHS understands that the 
DIDs standard includes non-binding guidance, but no prescriptive 
specifications, concerning security and privacy.
    In their current forms, TSA understands that the W3C VCDM standard 
and DID standard focus on the use of digital identification in 
unattended mode internet transactions, which is different from the 
attended, in-person REAL ID transactions contemplated for mDLs under 
this rulemaking. In addition, the current versions of the W3C standards 
do not set forth specific requirements concerning security and privacy 
or an mDL-specific data model, which may impede States from developing 
standardized, interoperable mDLs. Several commenters also expressed 
similar concerns.\52\ TSA is not aware of any State pursuing an mDL 
with the VCDM model as the sole data model. However, TSA understands 
that W3C's work is ongoing, and future revisions may set forth 
security, privacy requirements, interoperability requirements, and a 
standardized data model needed for in-person REAL ID identity 
verification. In addition, given the breadth of the VCDM and DID, it 
may be possible in the future to develop a VCDM-based mDL that conforms 
to both W3C recommendations and the ISO/IEC standards simultaneously, 
providing full ecosystem interoperability. As stated above, TSA is not 
proposing to IBR these W3C Standards in this NPRM.
---------------------------------------------------------------------------

    \52\ See comments submitted by Muller and UL.
---------------------------------------------------------------------------

    TSA understands that the standards and guidelines discussed above 
in this Part II.D. are the most comprehensive and relevant references 
governing mDLs today. TSA also acknowledges that many additional 
standards and guidelines are in development covering diverse types of 
digital identification that can be issued and verified by different 
entities, both government and commercial. These emerging documents are 
expected to concisely synthesize the large body of existing work from 
NIST and standards-development organizations, and will provide 
standardized mechanisms for mDLs. After carefully evaluating comments 
concerning emerging industry standards and closely observing ongoing 
development, TSA does not endorse any emerging standards at this time. 
TSA will continue to monitor development, and the future Phase 2 
rulemaking may incorporate by reference pertinent parts of emerging 
standards (pending review of final published documents) that TSA 
believes are appropriate for Federal acceptance of mDLs for REAL ID 
official purposes.

E. DHS and TSA Involvement in mDLs

    DHS and TSA have been actively participating in the mDL and digital 
identity space for many years to keep pace with industry developments. 
DHS has been participating in industry standards-development activities 
by serving as a non-voting member on working groups of the ISO/IEC and 
the W3C that are developing mDL/digital identity standards and 
technical specifications. Concurrently, DHS and TSA have been 
collaborating with industry to test the use of mDLs at various TSA 
security checkpoints. In 2022, TSA, under its collaboration with Apple 
(see Part II.C.3., above), launched a limited initiative that enables 
Arizona, Maryland, and Colorado residents to test the use of mDLs 
provisioned into the Apple Wallet app at select airport security 
checkpoints.\53\ On May 18, 2023, TSA announced acceptance of Georgia 
mDLs provisioned into the Apple Wallet app at select airport security 
checkpoints.\54\ Similarly, on March 1, 2023 and June 1, 2023, TSA 
announced acceptance of Utah-issued mDLs provisioned into the GET 
Mobile ID app, and Maryland-issued mDLs provisioned into the Google 
Wallet app, respectively, at select airports.\55\ Utah

[[Page 60067]]

utilizes a third-party mDL app produced by GET Group North America. DHS 
and TSA anticipate additional collaborations with other States and 
vendors in the future. These programs enable States, industry, and the 
Federal government to evaluate mDLs and ensure that they provide the 
security, privacy, and interoperability necessary for future, full-
scale acceptance at Federal agencies for official purposes as defined 
in the REAL ID Act.
---------------------------------------------------------------------------

    \53\ See TSA Biometrics Technology website, https://www.tsa.gov/biometrics-technology; Press Release, TSA, TSA enables Arizona 
residents to use mobile driver's license or state ID for 
verification at Phoenix Sky Harbor International Airport (Mar. 23, 
2022), available at https://www.tsa.gov/news/press/releases/2022/03/23/tsa-enables-arizona-residents-use-mobile-drivers-license-or-state-id; Press Release, TSA, TSA enables Maryland residents to use 
mobile driver's license or state ID for verification at Baltimore/
Washington International and Reagan National Airports (May 25, 
2022), available at https://www.tsa.gov/news/press/releases/2022/05/25/tsa-enables-maryland-residents-use-mobile-drivers-license-or-state.
    \54\ Press release, TSA, TSA enables Georgia residents to use 
mobile driver's license or state ID for verification at ATL (May 18, 
2023), available at https://www.tsa.gov/news/press/releases/2023/05/18/tsa-enables-georgia-residents-use-mobile-drivers-license-or-state-id
    \55\ Press Release, TSA, TSA using state-of-the art identity 
verification technology, accepting mobile driver licenses at SLC 
security checkpoint (Mar. 9, 2023), available at https://www.tsa.gov/news/press/releases/2023/03/09/tsa-using-state-art-identity-verification-technology-accepting; Press Release, TSA, TSA 
now accepts mobile IDs in Google Wallet on Android mobile devices, 
starting with the State of Maryland (June 1, 2023), available at 
https://www.tsa.gov/news/press/releases/2023/06/01/tsa-now-accepts-mobile-ids-google-wallet-android-mobile-devices.
---------------------------------------------------------------------------

III. Summary of the Proposed Rule

A. Overview

    In addition to revising definitions applicable to the REAL ID Act 
to incorporate mDLs, this rule proposes changes to 6 CFR part 37 that 
would enable TSA to grant a temporary waiver to States that TSA 
determines issue mDLs consistent with specified TSA requirements 
concerning security, privacy, and interoperability. This rule would 
enable Federal agencies, at their discretion, to accept for REAL ID 
official purposes, mDLs issued by a State that has been granted a 
waiver. The proposed rule would apply only to Federal agency acceptance 
of State-issued mDLs as defined in this proposed rule for REAL ID 
official purposes, but not other forms of digital identification, 
physical driver's licenses or physical identification cards, or non-
REAL ID purposes. Any temporary waiver issued by TSA would be valid for 
a period of 3 years from the date of issuance. The waiver enabled by 
this rulemaking would be repealed when TSA publishes a Phase 2 rule 
that would set forth comprehensive requirements for mDLs.
    To obtain a waiver, a State would be required to submit an 
application, supporting data, and other documentation to establish that 
their mDLs meet TSA-specified criteria (discussed in Part III.B.4., 
below) concerning security, privacy, and interoperability. If the 
Secretary determines, upon evaluation of a State's application and 
supporting documents, that a State's mDL could be securely accepted 
under the terms of a waiver, the Secretary may issue such State a 
certificate of waiver. TSA intends to work with each State applying for 
a waiver on a case-by-case basis to ensure that its mDLs meet the 
minimum requirements necessary to obtain a waiver. This rulemaking 
would establish the full process for a State to apply for a waiver, 
including instructions for submitting the application and responding to 
subsequent communications from TSA as necessary, specific information 
and documents that a State must provide with its application, and 
requirements concerning timing, issuance of decisions, requests for 
reconsideration, and terms, conditions, and limitations related to 
waivers. To assist States that are considering applying for a waiver, 
TSA has developed guidelines, entitled, ``Mobile Driver's License 
Waiver Application Guidance,'' which provide non-binding 
recommendations of some ways that States can meet the application 
requirements set forth in this rulemaking.\56\
---------------------------------------------------------------------------

    \56\ The specific measures and practices discussed in the DHS 
Waiver Application Guidance are neither mandatory nor necessarily 
the ``preferred solution'' for complying with the requirements 
proposed in the rule. Rather, they are examples of measures and 
practices that a State issuer of mDLs may choose to consider as part 
of its overall strategy to issue mDLs. States have the ability to 
choose and implement other measures to meet these requirements based 
on factors appropriate to that State, so long as DHS determines that 
the measures implemented provide the levels of security and data 
integrity necessary for Federal acceptance of mDLs for official 
purposes as defined in the REAL ID Act and 6 CFR part 37. As 
provided in proposed Sec.  37.10(c) of 6 CFR part 37, DHS may 
periodically update the Guidance as necessary to recommend 
mitigations of evolving threats to security, privacy, or data 
integrity.
---------------------------------------------------------------------------

    TSA cautions, however, that the waiver enabled by this rulemaking 
is not a commitment by Federal agencies to accept mDLs issued by a 
State to whom TSA has granted a waiver. Federal agencies exercise full 
discretion over their identity verification policies, which may be 
subject to change. A Federal agency that accepts mDLs may suddenly halt 
acceptance for reasons beyond the agency's control, such as suspension 
or termination of a waiver, technical issues with IT systems, or a loss 
of resources to support mDLs. In such instances, an mDL holder seeking 
to use an mDL for REAL ID official purposes (including boarding 
commercially regulated aircraft or access to Federal facilities) may be 
denied such uses. To avoid this issue, TSA strongly urges all mDL 
holders to carry their physical REAL ID cards in addition to their 
mDLs. This will ensure that mDL holders are not disenfranchised from 
REAL ID uses if a Federal agency does not accept mDLs. Indeed, TSA has 
long advised that passengers who choose to present mDLs in TSA 
checkpoint testing must continue to have their physical cards readily 
available in the event that a TSA officer requires such 
identification.\57\ TSA also recommends to Federal agencies that they 
regularly inform the public, in a form and manner of their choosing, of 
their mDL acceptance policies. TSA urges the public to view mDLs not as 
a replacement of physical REAL ID cards, but as a complement to them.
---------------------------------------------------------------------------

    \57\ See, e.g., https://www.tsa.gov/real-id (see FAQ for ``Does 
TSA accept mobile driver's licenses?'').
---------------------------------------------------------------------------

B. Specific Provisions

1. Definitions
    TSA proposes adding new definitions to subpart A, Sec.  37.3. In 
particular, new definitions for ``mobile driver's license'' and 
``mobile identification card'' are necessary because the current 
regulations predated the emergence of mDL technology and, therefore, 
does not define these terms. Additionally, the definitions reflect 
changes made by the REAL ID Modernization Act, which amended the 
definitions of ``driver's license'' and ``identification card'' to 
specifically include ``mobile or digital driver's licenses'' and 
``mobile or digital identification cards.'' The proposed definitions in 
this rule would provide a more precise definition of ``mobile driver's 
license'' and ``mobile identification card'' by clarifying that those 
forms of identification require a mobile electronic device to store the 
identification information, as well as an electronic device to read 
that information. TSA also proposes adding a new definition of ``mDL'' 
that collectively refers to mobile versions of both State-issued 
driver's licenses and State-issued identification cards as defined in 
the REAL ID Act. TSA also proposes adding additional definitions to 
explain terms used in Sec.  37.10(a) and appendix A to subpart A to the 
part. For example, the proposed rule would add new defintions for 
``digital certificates'' and ``certificate systems,'' which are 
necessary elements of risk controls for the IT systems that States use 
to issue mDLs. In addition, the rulemaking proposes adding a definition 
for ``certificate policy,'' which forms the governance framework for 
the State's certificate systems. A State must develop, maintain, and 
execute a certificate policy to comply with the requirements set forth 
in appendix A to subpart A of the part.
2. TSA Issuance of Temporary Waiver From Sec.  37.5(b) and State 
Eligibility Criteria
    TSA proposes adding to subpart A new Sec.  37.7, entitled 
``Temporary waiver for mDLs; State eligibility,'' to establish the 
availability of a temporary waiver

[[Page 60068]]

for a State to exempt its mDLs from meeting the card-based compliance 
requirement of Sec.  37.5(b). Section 37.7(a) authorizes TSA to issue a 
temporary certificate of waiver to States that submit an application 
for a waiver that demonstrates compliance with application criteria set 
forth in Sec.  37.10(a) and (b). This waiver would only apply to mDLs, 
not physical cards, and would not waive the requirement in Sec.  
37.5(b) regarding State-based compliance or any other requirements in 
the regulations. Issuance of a certificate of waiver to a State would 
permit Federal agencies to continue accepting for official purposes 
mDLs issued by those States when REAL ID enforcement begins on May 7, 
2025. The mere issuance of a waiver to a State, however, does not 
obligate any Federal agency to accept an mDL issued by such State; each 
Federal agency retains discretion to determine its own policies 
regarding identification, including whether to accept mDLs.
    To be eligible for consideration for a waiver, a State must meet 
the criteria set forth in proposed Sec.  37.7(b). These criteria 
require that the issuing State: is in full compliance with REAL ID 
requirements; has submitted an application demonstrating that the State 
issues mDLs that provide security, privacy, and interoperability 
necessary for Federal acceptance; and issues mDLs only to individuals 
who have been issued a valid and unexpired REAL ID-compliant physical 
driver's license or identification card. TSA's determination of whether 
a State satisfies the eligibility criteria would be based on TSA's 
evaluation of the information provided by the State in its application 
(see Part III.B.4., below), as well as other information available to 
TSA.
3. Requirements for Federal Agencies That Accept mDLs
    TSA proposes adding to subpart A new Sec.  37.8, entitled 
``Requirements for Federal agencies accepting mDLs issued by States 
with temporary waiver.'' This section proposes that any Federal agency 
that elects to accept mDLs for REAL ID official purposes must meet 
three requirements in proposed new Sec.  37.8. First, a Federal agency 
must confirm that the State holds a valid certificate of waiver. 
Agencies would make this confirmation by verifying that the State's 
name appears in a list of States to whom TSA has granted a waiver. TSA 
would publish this list on the REAL ID website at www.dhs.gov/real-id/mDL (as provided in Sec.  37.9(b)(1)). Second, Federal agencies must 
use an mDL reader to retrieve mDL data from an individual's mobile 
device, and validate that the data is authentic and unchanged. To 
retrieve and validate mDL data, Federal agencies must follow the 
processes required by industry standard ISO/IEC 18013-5:2021. Finally, 
if a State discovers that acceptance of a State's mDL is likely to 
cause imminent or serious threats to the security, privacy, or data 
integrity, the State must notify TSA at www.dhs.gov/real-id/mDL within 
72 hours of such discovery. Examples of such triggering events include 
cyber-attacks and other events that cause serious harm to a State's mDL 
issuance system. TSA would consider whether such information warrants 
suspension of that State's waiver under Sec.  37.9(e)(4)(i)(B) (see 
discussion in Part III.B.6., below). If TSA elects not to issue a 
suspension, Federal agencies would continue to exercise their own 
discretion regarding continuing acceptance of mDLs.
4. Requirements for States Seeking to Apply for a Waiver
    TSA proposes adding to subpart A new Sec.  37.9, which would set 
forth a process for a State to request a temporary certificate of 
waiver established in new Sec.  37.7. As provided in Sec.  37.9(a), a 
State seeking a waiver must file a complete application as set forth in 
Sec.  37.10(a) and (b), following instructions that would be available 
at www.dhs.gov/real-id/mDL. Section 37.10(a) and (b) would set forth 
all information, documents, and data that a State must include in its 
application for a waiver. TSA is proposing that if TSA determines that 
the means that a State implements to comply with the requirements in 
Sec.  37.10(a) and (b) provide the requisite levels of security, 
privacy, and data integrity for Federal acceptance of mDLs for official 
purposes, TSA would grant such State a waiver. TSA does not, however, 
propose prescribing specific means (other than the requirements 
specified in appendix A to subpart A of the part, which is discussed 
further in Part III.B.4.iv, below) that a State must implement. 
Instead, States would retain broad discretion to choose and implement 
measures to meet these requirements based on factors appropriate to 
that State.
(i) Application Requirements
    As set forth in Sec.  37.10(a)(1) through (4), a State would be 
required to establish in its application how it issues mDL under the 
specified criteria for security, privacy, and interoperability suitable 
for acceptance by Federal agencies, as follows:
     Paragraph (a)(1) would set forth requirements for mDL 
provisioning.
     Paragraph (a)(2) would specify requirements for managing 
State Certificate Systems, which are set forth in appendix A to subpart 
A of the part.
     Paragraph (a)(3) would require a State to demonstrate how 
it protects personally identifiable information of individuals during 
the mDL provisioning process.
     Paragraph (a)(4) would require a State to establish: how 
it issues mDLs that are interoperable with requirements set forth in 
standard ISO/IEC 18013-5:2021; that the State uses only those 
algorithms for encryption,\58\ secure hash function,\59\ and digital 
signatures that are specified in ISO/IEC 18013-5:2021, and in NIST FIPS 
PUB 180-4, 186-5, 197, 198-1, and 202; and how the State complies with 
the ``AAMVA mDL data element set'' as defined in the AAMVA mDL 
Guidelines v. 1.2, Section 3.2 (see Part II.D., above, for a detailed 
discussion of those references).
---------------------------------------------------------------------------

    \58\ Encryption refers to the process of cryptographically 
transforming data into a form in a manner that conceals the data's 
original meaning to prevent it from being read. Decryption is the 
process of restoring encrypted data to its original state. [IETF RFC 
4949, Internet Security Glossary, Version 2, August 2007]
    \59\ A function that processes an input value creating a fixed-
length output value using a method that is not reversible (i.e., 
given the output value of a function it is computationally 
impractical to find the function's corresponding input value).
---------------------------------------------------------------------------

(ii) Audit Requirements
    Section 37.10(b) would require a State to submit an audit report 
prepared by an independent auditor verifying the accuracy of the 
information provided by the State in response to Sec.  37.10(a), as 
follows:
     Paragraph (1) would set forth specific experience, 
qualifications, and accreditations that an auditor must meet.
     Paragraph (2) would require a State to provide information 
demonstrating the absence of a potential conflict of interest of the 
auditing entity.
(iii) Waiver Application Guidance
    As set forth in Sec.  37.10(c), TSA proposes to publish ``Mobile 
Driver's License Waiver Application Guidance,'' in the Federal Register 
and on the REAL ID website at www.dhs.gov/real-id/mDL to assist States 
in completing their applications. The proposed guidance document is 
available for review at www.regulations.gov/docket/TSA-2023-0002. TSA 
is accepting comments on the guidance along with this proposed rule. 
This guidance would provide TSA's recommendations for some ways that 
States can meet the requirements in Sec.  37.10(a)(1). The guidance 
would not establish legally enforceable

[[Page 60069]]

requirements for a States applying for a waiver. Instead, the guidance 
would provide non-binding examples of measures and practices that a 
State may choose to consider as part of its overall strategy to issue 
mDLs. States continue to exercise discretion to select processes not 
included in the Guidance. Given the rapidly-evolving cyber threat 
landscape, however, TSA may periodically update its guidance to provide 
additional information regarding newly-published standards or other 
sources, or recommend mitigations of newly discovered risks to the mDL 
ecosystem. TSA would publish updated guidance in the Federal Register 
and on the REAL ID website at www.dhs.gov/real-id/mDL, and would 
provide a copy to all States that have applied for or been issued a 
certificate of waiver. Updates to guidance will not impact issued 
waivers or pending applications.
(iv) Appendix A to Subpart A: Requirements for State mDL Issuance 
Systems
    Appendix A to subpart A of the part sets forth fundamental 
requirements to ensure the security and integrity of State mDL issuance 
processes. More specifically, these requirements concern the creation, 
issuance, use, revocation, and destruction of the State's certificate 
systems and cryptographic keys. The appendix consists of requirements 
in eight categories: (1) Certificate Authority Certificate Life Cycle 
Policy, (2) Certificate Authority Access Management, (3) Facility, 
Management, and Operational Controls, (4) Personnel Security Controls, 
(5) Technical Security Controls, (6) Threat Detection, (7) Logging, and 
(8) Incident Response and Recovery Plan. Adherence to these 
requirements ensures that States issue mDLs in a standardized manner 
with security and integrity to establish the trust necessary for 
Federal acceptance for official purposes.
     Certificate Authority Certificate Life Cycle Policy 
requirements (appendix A, sec. 1) ensure that a State issuing an mDL 
creates and manages a formal process which follows standardized 
management and protections of digital certificates. These requirements 
must be implemented in full compliance with the references cited in the 
appendix: the CA Browser Forum Baseline Requirements for the Issuance 
and Management of Publicly-Trusted Certificates, CA Browser Forum 
Network and Certificate System Security Requirement, NIST Cybersecurity 
Framework, NIST SP 800-53 Rev. 5, NIST SP 800-57, and NIST SP 800-53B.
     Certificate Authority Access Management requirements 
(appendix A, sec. 2) set forth policies and processes for States 
concerning, for example, restricting access to mDL issuance systems, 
policies for multi-factor authentication, defining the scope and role 
of personnel, and Certificate System architecture which separates and 
isolates Certificate System functions to defined security zones. These 
requirements must be implemented in full compliance with the references 
cited in the appendix: CA Browser Forum Network and Certificate System 
Security Requirements, NIST Cybersecurity Framework, NIST 800-53 Rev. 
5, NIST SP 800-63-3, and NIST SP 800-63B.
     Under the requirements concerning Facility, Management, 
and Operational Controls (appendix A, sec. 3), States must provide 
specified controls protecting facilities where Certificate Systems 
reside from unauthorized access, environmental damage, physical 
breaches, and risks from foreign ownership, control, or influence. 
These requirements must be implemented in full compliance with the 
references cited in the appendix: NIST SP 800-53 Rev. 5.
     Personnel security controls (appendix A, sec. 4) require 
States to establish policies to control insider threat risks to 
Certificate Systems and facilities. Such policies must include 
establish screening criteria for personnel who access Certificate 
Systems, post-employment access termination, updates to personnel 
security policy, training, records retention schedules, among other 
policies. These requirements must be implemented in full compliance 
with the references cited in the appendix: NIST SP 800-53 Rev. 5 and CA 
Browser Forum Baseline Requirements for the Issuance and Management of 
Publicly-Trusted Certificates.
     Technical security controls (appendix A, sec. 5) specify 
requirements to protect Certificate System networks. In addition, 
States are required to protect private cryptographic keys of Issuing 
Authority Root Certificates using hardware security modules of Level 3 
or higher and Document Signer private cryptographic keys in hardware 
security modules of Level 2 and higher. Other controls are specified 
regarding Certificate System architecture and cryptographic key 
generation processes. These requirements must be implemented in full 
compliance with the references cited in the appendix: CA Browser Forum 
Network and Certificate System Security Requirements, CA Browser Forum 
Baseline Requirements for the Issuance and Management of Publicly-
Trusted Certificates, NIST Cybersecurity Framework, NIST SP 800-53 Rev. 
5, NIST SP 800-57, and NIST FIPS 140-3.
     Under requirements for threat detection (appendix A, sec. 
6), States must implement controls to monitor and log evolving threats 
to various mDL issuance infrastructure, including digital certificate, 
issuance, and support systems. These requirements must be implemented 
in full compliance with the references cited in the appendix: CA 
Browser Forum Network and Certificate System Security Requirements, 
CISA Cybersecurity Incident & Vulnerability Response Playbooks, NIST 
Cybersecurity Framework, NIST SP 800-53 Rev. 5.
     Logging controls (appendix A, sec. 7) require States to 
record various events concerning Certificate Systems, including the 
management of cryptographic keys, digital certificate lifecycle events. 
The controls set forth detailed requirements concerning specific types 
of events that must be logged, as well as timeframes for maintaining 
such logs. These requirements must be implemented in full compliance 
with the references cited in the appendix: CA Browser Forum Baseline 
Requirements for the Issuance and Management of Publicly-Trusted 
Certificates, NIST Cybersecurity Framework, and NIST SP 800-53 Rev. 5.
     Finally, section 8 of appendix A requires States to 
implement policies to respond to and recover from security incidents. 
States must act on logged events, issue alerts to relevant personnel, 
respond to alerts within a specified time period, perform vulnerability 
scans, among other things. In particular, States must provide written 
notice to TSA at www.dhs.gov/real-id/mDL within 72 hours of discovery 
of a significant cyber incident or breach that could compromise the 
integrity of a Certificate System. These requirements must be 
implemented in full compliance with the references cited in the 
appendix: CA Browser Forum Network and Certificate System Security 
Requirements, CISA Cybersecurity Incident & Vulnerability Response 
Playbooks, CISA National Cyber Incident Response Plan; NIST SP 800-53 
Rev. 5, NIST Cybersecurity Framework. TSA invites comment on all 
aspects of the waiver application requirements and costs of compliance, 
including the Waiver Application Guidance, appendix A to subpart A to 
the part, the appropriateness of requiring compliance with the 
specified standards and guidelines and any alternate standards that 
should be considered, and other recommendations

[[Page 60070]]

that commenters believe TSA should consider.
5. Decisions on Applications for Waiver
    Section 37.9(b) would establish a timeline and process for TSA to 
issue decisions on a waiver application. Under this paragraph, TSA 
would endeavor to provide States a decision on initial applications 
within 60 days, but not longer than 90 days. TSA would provide three 
types of written notice via email: approved, insufficient, or denied.
    If TSA approves a State's application for a waiver, TSA would 
memorialize that decision by issuing a certificate of waiver to that 
State, and including the State in a list of State-mDLs approved for 
Federal use, published by TSA on the REAL ID website at www.dhs.gov/real-id/mDL. A certificate of waiver would specify the date that the 
waiver becomes effective, the expiration date, and any other terms and 
conditions with which a State must comply, as provided under proposed 
Sec.  37.9(d). A State seeking to renew its certificate beyond the 
expiration date must reapply for a waiver, as provided in Sec.  
37.9(e)(6).
    If TSA determines that an application is insufficient, did not 
respond to certain information required in Sec.  37.10(a) or (b), or 
contains other deficiencies, TSA would provide an explanation of such 
deficiencies and allow the State an opportunity address the 
deficiencies within the timeframe specified in Sec.  37.9(b)(2). TSA 
would permit States to submit multiple amended applications if 
necessary, with the intent of working with States individually to 
enable their mDLs to comply with the requirements of Sec.  37.10(a) and 
(b).
    If TSA denies an application, TSA would provide the specific 
grounds for the basis of the denial and afford the State an opportunity 
to submit a new application. As stated in Sec.  37.9(c), TSA would also 
provide a State an opportunity to seek reconsideration of a denied 
application. Instructions for seeking reconsideration would be provided 
by TSA on the REAL ID website at www.dhs.gov/real-id/mDL. An adverse 
decision upon reconsideration would be considered a final agency 
action. As provided in Sec.  37.9(c), however, a State whose request 
for reconsideration has been denied may submit a new application for a 
waiver.
6. Limitations, Suspension, and Termination of Certificate of Waiver
    Section 37.9(e) would set forth various restrictions on a 
certificate of waiver. Specifically, in paragraph (e)(1) of this 
section, TSA proposes that a certificate of waiver would be valid for a 
period of three years from the date of issuance. Paragraph (e)(2) 
proposes that a State must report to TSA if, after it receives a 
waiver, it makes significant modifications to its mDL issuance 
processes that differ in a material way from information that the State 
provided in its application. If the State makes such modifications, it 
would be required to report such changes 60 days before implementing 
the changes. This requirement is intended to apply to changes that may 
undermine the bases on which TSA granted a waiver. The reporting 
requirement is not intended to apply to routine, low-level changes, 
such as systems maintenance and software updates and patches. Paragraph 
(e)(3) would require a State that is issued a waiver to comply with all 
requirements specified in Sec. Sec.  37.51(a) and 37.9(d)(3).
    Section 37.9(e)(4) sets forth processes for suspension of 
certificates of waiver. As provided in proposed Sec.  37.9(e)(4)(i)(A), 
TSA may suspend the validity of a certificate of waiver if TSA 
determines that a State:
     fails to comply with any terms and conditions (see Sec.  
37.9(d)(3)) specified in the certificate of waiver;
     fails to comply with reporting requirements (see Sec.  
37.9(e)(2)); or
     issues mDLs in a manner that is not consistent with the 
information the State provided in its application for a waiver under 
Sec.  37.10(a) and (b).
    Before suspending a waiver for these reasons, TSA will provide such 
State written notice via email that it intends to suspend its waiver, 
along with an explanation of the reasons, information on how the State 
may address the deficiencies, and a timeline for the State to respond 
and for TSA to reply to the State, as set forth in Sec.  
37.9(e)(4)(ii). DHS may withdraw the notice of suspension, request 
additional information, or issue a final suspension. If TSA issues a 
final suspension of a State's certificate of waiver, DHS will remove 
the name of that State from the list of mDLs approved for Federal 
acceptance for official purposes.
    TSA additionally may suspend a State's waiver at any time upon 
discovery that Federal acceptance of a State's mDL is likely to cause 
imminent or serious threats to the security, privacy, or data integrity 
of any Federal agency, as proposed by Sec.  37.9(e)(4)(i)(B). 
Suspension would apply to all Federal agencies and would not be agency-
specific. Examples of such triggering events include cyber-attacks and 
other events that cause serious harm to a State's mDL issuance systems. 
If a State discovers a significant cyber incident that it believes 
could compromise the integrity of its mDL issuance systems, sec. 8.6 of 
appendix A to subpart A of the part would require States to provide 
written notice to TSA, at www.dhs.gov/real-id/mDL, of such incident 
within 72 hours of discovery. If TSA determines such suspension is 
necessary, TSA will provide written notice via email to each State 
whose certificate of waiver is affected, as soon as practicable after 
discovery of the triggering event, providing an explanation for the 
suspension, as well as an estimated timeframe for resumption of the 
validity of the certificate of waiver.
    It is TSA's intent to work with States to resolve the conditions 
that could lead to suspension and avoid issuing a final suspension. If 
TSA issues a final suspension of any State's certificate of waiver, TSA 
will temporarily remove the name of that State from the list of mDLs 
approved for Federal acceptance for official purposes. A State 
receiving a final suspension may apply for a new certificate of waiver 
by submitting a new application. Under Sec.  37.9(e)(5), TSA may 
terminate a certificate of waiver for serious or egregious violations. 
More specifically, TSA may terminate a waiver if TSA determines that a 
State:
     does not comply with REAL ID requirements in Sec.  
37.51(a);
     is committing an egregious violation of any terms and 
conditions (see Sec.  37.9(d)(3)) specified in the certificate of 
waiver and is unwilling to cure such violation;
     is committing an egregious violation of reporting 
requirements (see Sec.  37.9(e)(2)) and is unwilling to cure such 
violation; or
     provided false information in its waiver application.
    Before terminating a certificate of waiver, TSA would provide 
written notice via email of intent to terminate, including findings 
supporting the termination and an opportunity to present information. 
As specified, a State would have 7 days to respond to the notice, and 
TSA would respond via email within 30 days. TSA may withdraw the notice 
of termination, request additional information, or issue a final 
termination. If TSA issues a final termination of a State's certificate 
of waiver, TSA will remove the name of that State from the list of mDLs 
approved for Federal acceptance for official purposes. A State whose 
certificate of waiver has been terminated may apply for a new 
certificate of waiver by submitting a new application.

[[Page 60071]]

7. Effect of a Status of Waiver on REAL ID Compliance
    Section 37.9(f) clarifies that the status of a State's certificate 
of waiver, including the status of an application for a waiver, has no 
bearing on TSA's determination of that State's compliance or non-
compliance with any other section of this part. A certificate of waiver 
that TSA has issued to a State is not a determination that the State is 
in compliance with any other section in this part. Similarly, an 
application for a waiver that TSA has deemed insufficient or denied, or 
a certificate of waiver TSA has suspended, terminated, or expired, is 
not a determination that the State is not in compliance with any other 
section in this part.
8. Incorporation by Reference
    TSA proposes adding to subpart A, Sec.  37.4, the following 
industry standards and government guidelines that this rulemaking 
proposes to incorporate by reference (discussed in detail in Part 
II.D., above):

 AAMVA
    [cir] Mobile Driver's License (mDL) Implementation Guidelines, 
Version 1.2 (Jan. 2023);
 CA/Browser Forum
    [cir] Baseline Requirements for the Issuance and Management of 
Publicly-Trusted Certificates, Version 1.8.6 (Dec. 14, 2022),
    [cir] Network and Certificate System Security Requirements, Version 
1.7 (Apr. 5, 2021);
 CISA
    [cir] Cybersecurity Incident & Vulnerability Response Playbooks 
(Nov. 2021),
    [cir] National Cyber Incident Response Plan (Dec. 2016);
 ISO/IEC
    [cir] ISO/IEC 18013-5:2021, Personal identification--ISO-compliant 
driving licence--Part 5: Mobile driving licence (mDL) application, 
Edition 1 (Sept. 2021);
 NIST
    [cir] FIPS PUB 140-3, Security Requirements for Cryptographic 
Modules (Mar. 22, 2019),
    [cir] FIPS PUB 180-4, Secure Hash Standard (SHS) (Aug. 2015),
    [cir] FIPS PUB 186-5, Digital Signature Standard (DSS) (Feb. 2023),
    [cir] FIPS PUB 197, Advanced Encryption Standard (AES) (Nov. 26, 
2001),
    [cir] FIPS PUB 198-1, The Keyed-Hash Message Authentication Code 
(HMAC) (July 2008),
    [cir] FIPS PUB 202, SHA-3 Standard: Permutation-Based Hash and 
Extendable-Output Functions (Aug. 2015),
    [cir] SP 800-53, Security and Privacy Controls for Information 
Systems and Organizations, Rev. 5 (Sept. 2020),
    [cir] SP 800-57 Part 1, Recommendation for Key Management: Part 1--
General, Rev. 5 (May 2020),
    [cir] SP 800-57 Part 2, Recommendation for Key Management: Part 2--
Best Practices for Key Management Organization, Rev. 1 (May 2019),
    [cir] SP 800-57 Part 3, Recommendation for Key Management: Part 3: 
Application-Specific Key Management Guidance, Rev. 1 (Jan. 2015),
    [cir] SP 800-63-3, Digital Identity Guidelines, (June 2017),
    [cir] SP 800-63B, Digital Identity Guidelines Authentication and 
Lifecycle Management (June 2017), and
    [cir] Framework for Improving Critical Infrastructure Cybersecurity 
Version 1.1 (Apr. 16, 2018).

C. Impacted Stakeholders

    The proposed changes would apply to State driver's licensing 
agencies issuing mDLs that seek a temporary waiver from TSA for its 
mDLs. The waiver would enable Federal agencies to accept such mDLs for 
official purposes, defined in the REAL ID Act as accessing Federal 
facilities, entering nuclear power plants, boarding federally regulated 
commercial aircraft, and any other purposes that the Secretary shall 
determine. Any Federal agency that chooses to accept mDLs for official 
purposes must procure a reader in order to receive an individual's 
identity data.
    This proposed rule does not impose any requirements on:
     States that do not seek a waiver for mDLs;
     Non-State issuers of other forms of digital 
identification; or
     Federal agencies to accept mDLs.
    A State seeking a waiver for Federal acceptance of its mDLs for 
official purposes would be required to file with TSA a complete 
application and supporting documents. An application form and 
instructions would be published by TSA in a form and manner prescribed 
by TSA, such as a TSA-specified website. Through the application, the 
State would be required to demonstrate how its mDLs meet the 
requirements for a waiver set forth in Sec.  37.10(a) and (b).

D. Use Cases Affected by This Proposed Rule

    The scope of this proposed rule is confined strictly to Federal 
acceptance of mDLs for official purposes, defined by the REAL ID 
regulations as accessing Federal facilities, entering nuclear power 
plants, and boarding federally regulated commercial aircraft. Any other 
purpose is beyond the scope of this rulemaking. For example, a waiver 
issued under this proposed rule would not apply to any of the 
following:
     mDL acceptance by Federal agencies for non-REAL ID 
official uses (e.g., applying for Federal benefits);
     mDL acceptance by non-Federal agencies (e.g., State 
agencies, businesses, private persons);
     Commercial transactions; or
     Physical driver's licenses or identification cards.
    Nothing in this proposed rule would require Federal agencies to 
accept mDLs; each Federal agency retains the discretion to determine 
its identification policies. Additionally, nothing in this proposed 
rule would require a State to seek a waiver or issue mDLs.

IV. Discussion of Public Comments in the RFI

    As discussed in Part II.B., above, DHS issued an RFI \60\ on April 
19, 2021, and requested comments from the public to be submitted by 
June 18, 2021. In addition, DHS and TSA held a virtual public meeting 
on June 30, 2021, to provide an additional forum for public comments, 
and extended the RFI comment period until July 30, 2021, to permit 
additional comments following the public meeting.\61\ Approximately 100 
persons attended the public meeting. In response to discussion at the 
public meeting and comments to the RFI concerning the importance of 
access to the primary industry standard referenced in the RFI, ISO/IEC 
18013-5:2021, DHS facilitated public access to the standard by 
publishing a notification \62\ in the Federal Register on September 16, 
2021, providing instructions to the public to gain access to the 
standard without cost. Approximately 30 persons requested and received 
access. Additionally, DHS reopened the comment period until October 18, 
2021. With the comment period extension and reopening, DHS provided a 
total RFI comment period of 180 days.
---------------------------------------------------------------------------

    \60\ 86 FR 20320.
    \61\ 86 FR 31987.
    \62\ 86 FR 51625.
---------------------------------------------------------------------------

    DHS received roughly 60 comments to the RFI from a diverse group of 
stakeholders, including advocacy groups representing varied interests, 
individuals, State government agencies, trade associations, and 
industry. An analysis of comments received showed that topics of 
interest to stakeholders

[[Page 60072]]

concerned: the need for standardization and/or Federal guidance,\63\ 
potential benefits to the public from mDLs generally,\64\ and the 
appropriateness of ISO/IEC standards as a starting point for regulatory 
requirements.\65\ Input received from these stakeholders, as it relates 
to the focus of this NPRM, is included and referenced throughout this 
proposed rule.
---------------------------------------------------------------------------

    \63\ See, e.g., comments submitted by: American Association of 
Motor Vehicles Administrators; CBN Secure Technologies; DocuSign; 
FaceTec; IDmachines; Maryland DHS of Transportation, Motor Vehicle 
Administration; National Conference of State Legislatures; State of 
Connecticut, DHS of Motor Vehicles; U.S. Travel Association.
    \64\ See, e.g., comments submitted by: Applied Recognition; 
Bredemarket; Hiday; IDmachines; Mothershed; Muller; State of 
Connecticut, DHS of Motor Vehicles; U.S. Travel Association.
    \65\ See, e.g., comments submitted by: American Association of 
Motor Vehicle Administrators; American Civil Liberties Union, 
Electronic Frontier Foundation, and Electronic Privacy Information 
Center; Apple; Association for Convenience & Fuel Retailing; CBN 
Secure Technologies; FaceTec; Florida DHS of Highway Safety and 
Motor Vehicles; IDEMIA; Maryland DHS of Transportation, Motor 
Vehicle Administration; National Immigration Law Center and 
Undersigned Organizations; Secure Technology Alliance; State of 
Connecticut, DHS of Motor Vehicles; Underwriters Laboratories; 
Verifiable Credentials Policy Committee, Blockchain Advocacy 
Coalition.
---------------------------------------------------------------------------

    In addition to the issues already discussed, many commenters raised 
concerns about potential privacy risks depending on the mode of data 
transfer. For background, an mDL reader can retrieve an individual's 
data under two different modes of operation: a ``device retrieval'' 
mode (also known as ``offline'') in which data is retrieved directly 
from an mDL holder's mobile device, and a ``server retrieval'' mode 
(also known as ``online'') in which the data is retrieved from a State 
driver's licensing agency.\66\ In its RFI, DHS noted that it was 
considering both modes of operation for Federal acceptance for official 
purposes, and specifically sought comments on the security and privacy 
risks, and mitigating solutions for both modes.\67\ DHS received 
numerous comments from advocacy groups, industry, and States concerning 
potential privacy risks posed specifically by server retrieval 
mode.\68\ Chief among these concerns was the potential for mDL usage to 
be tracked. TSA has observed that security and privacy protections to 
mitigate such concerns are evolving and unsettled, and after careful 
consideration of commenters' concerns, TSA does not believe server 
retrieval mode is appropriate for Federal acceptance for official 
purposes at this time. TSA will continue monitoring industry 
developments and may update its conclusions in the Phase 2 rulemaking, 
if warranted.
---------------------------------------------------------------------------

    \66\ 86 FR 20323-24.
    \67\ 86 FR 20326.
    \68\ See, e.g., comments submitted by American Association of 
Motor Vehicle Administrators; American Civil Liberties Union, 
Electronic Frontier Foundation, and Electronic Privacy Information 
Center; Association for Convenience and Fuel Retailing; Better 
Identity Coalition; Electronic Privacy Information Center; IDEMIA; 
National Immigration Law Center, and Undersigned Organizations; and 
Verifiable Credentials Policy Committee--Blockchain Advocacy 
Coalition.
---------------------------------------------------------------------------

    DHS also received comments on other topics, including non-REAL ID 
use cases such as commercial transactions and technical information on 
various topics. As noted above, a waiver issued under the proposed rule 
would not address use of an mDL for commercial transactions or any 
other non-Federal purposes not covered by the REAL ID Act or 
regulations. In general, mDL acceptance by Federal agencies for non-
REAL ID official purposes, mDL acceptance by non-Federal agencies, and 
mDL use in commercial transactions go beyond the scope of the REAL ID 
Act's official purposes. Although not the focus of this proposal, TSA 
may examine some of these issues through its on-going mDL efforts, such 
as mDL collaborations with industry, which could inform future 
regulatory proposals. To support this interest, TSA appreciates 
stakeholders' perspectives on these topics.

V. Consultation With States, Non-Governmental Organizations, and the 
Department of Transportation

    Under section 205 of the REAL ID Act, issuance of REAL ID 
regulations must be conducted in consultation with the Secretary of 
Transportation and the States. During the development of this NPRM, DHS 
and TSA consulted with the Department of Transportation and other 
Federal agencies with an interest in this rulemaking. DHS and TSA also 
consulted with State officials via AAMVA. In addition, DHS and TSA met 
with various non-governmental organizations, including civil rights and 
privacy advocacy groups. Stakeholder input, informed by extensive 
outreach, was critical to informing this NPRM.

VI. Regulatory Analyses

A. Economic Impact Analyses

1. Regulatory Impact Analysis Summary
    Changes to Federal regulations must undergo several economic 
analyses. First, E.O. 12866 of September 30, 1993 (Regulatory Planning 
and Review),\69\ as supplemented by E.O. 13563 of January 18, 2011 
(Improving Regulation and Regulatory Review),\70\ and amended by E.O. 
14094 of April 6, 2023 (Modernizing Regulatory Review) \71\ directs 
Federal agencies to propose or adopt a regulation only upon a reasoned 
determination that the benefits of the intended regulation justify its 
costs. Second, the Regulatory Flexibility Act of 1980 (RFA) \72\ 
requires agencies to consider the economic impact of regulatory changes 
on small entities. Third, the Trade Agreement Act of 1979 \73\ 
prohibits agencies from setting standards that create unnecessary 
obstacles to the foreign commerce of the United States. Fourth, the 
Unfunded Mandates Reform Act of 1995 \74\ (UMRA) requires agencies to 
prepare a written assessment of the costs, benefits, and other effects 
of proposed or final rules that include a Federal mandate likely to 
result in the expenditure by State, local, or tribal governments, in 
the aggregate, or by the private sector, of $100 million or more 
(adjusted for inflation) in any one year.
---------------------------------------------------------------------------

    \69\ Published at 58 FR 51735 (Oct. 4, 1993).
    \70\ Published at 76 FR 3821 (Jan. 21, 2011).
    \71\ Published at 88 FR 21879 (April 6, 2023).
    \72\ Public Law 96-354, 94 Stat. 1164 (Sept. 19, 1980) (codified 
at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory 
Enforcement Fairness Act of 1996 (SBREFA)).
    \73\ Public Law 96-39, 93 Stat. 144 (July 26, 1979) (codified at 
19 U.S.C. 2531-2533).
    \74\ Public Law 104-4, 109 Stat. 66 (Mar. 22, 1995) (codified at 
2 U.S.C. 1181-1538).
---------------------------------------------------------------------------

2. Assessments Required by E.O. 12866 and E.O. 13563
    E.O. 12866 and E.O. 13563 direct agencies to assess the costs and 
benefits of available regulatory alternatives and, if regulation is 
necessary, select regulatory approaches that maximize net benefits 
(including potential economic, environmental, public health and safety 
effects, distributive impacts, and equity). Under E.O. 12866, as 
amended by E.O. 14094, agencies must also determine whether a 
regulatory action is significant.\75\ These requirements were 
supplemented by E.O. 13563, which emphasizes the importance of 
quantifying both costs

[[Page 60073]]

and benefits, of reducing costs, of harmonizing rules, and of promoting 
flexibility.
---------------------------------------------------------------------------

    \75\ See section 1(b) of E.O. 14094, revising section 3(f) of 
E.O. 12866. Section 3(f) of E.O. 12866 defines a ``significant 
regulatory action'' as any regulatory action that is likely to 
result in a rule that: (1) has an annual effect on the economy of 
$200 million or more or adversely affects in a material way the 
economy; a sector of the economy; productivity; competition; jobs; 
the environment; public health or safety; or State, local, 
territorial, or tribal governments or communities (also referred to 
as economically significant); (2) creates serious inconsistency or 
otherwise interferes with an action taken or planned by another 
agency; (3) materially alters the budgetary impacts of entitlements, 
grants, user fees, or loan programs or the rights and obligations of 
recipients thereof; or (4) raises novel legal or policy issues 
arising out of legal mandates, the President's priorities, or the 
principles set forth in the E.O.
---------------------------------------------------------------------------

    In conducting these analyses, TSA has made the following 
determinations:
    (a) While TSA attempts to quantify costs where available, TSA 
primarily discusses the costs and benefits of this rulemaking in 
qualitative terms. At present, mDLs are part of an emerging and 
evolving industry with an elevated level of uncertainty surrounding 
costs and benefits. Nonetheless, TSA anticipates the rulemaking would 
not result in an effect on the economy of $200 million or more in any 
year of the analysis. The rulemaking would not adversely affect the 
economy, interfere with actions taken or planned by other agencies, or 
generally alter the budgetary impact of any entitlements.
    (b) TSA has not prepared an Initial Regulatory Flexibility Analysis 
(IRFA) and, pursuant to 5 U.S.C. 605(b), the Secretary certifies that 
the proposed rule would not have a significant economic impact on a 
substantial number of small entities. The proposed rule would only 
directly regulate the fifty States, the District of Columbia, and the 
five U.S. territories who voluntarily participate in the mDL waiver 
process, who under the RFA are not considered small entities.
    (c) TSA has determined that the NPRM imposes no significant 
barriers to international trade as defined by the Trade Agreement Act 
of 1979; and
    (d) TSA has determined that the NPRM does not impose an unfunded 
mandate on State, local, or tribal governments, such that a written 
statement would be required under the UMRA, as its annual effect on the 
economy does not exceed the $100 million threshold (adjusted for 
inflation) in any year of the analysis.
    TSA has prepared an analysis of its estimated costs and benefits, 
summarized in the following paragraphs, and in the OMB Circular A-4 
Accounting Statement. When estimating the cost of a rulemaking, 
agencies typically estimate future expected costs imposed by a 
regulation over a period of analysis. For this proposed rule's period 
of analysis, TSA uses a 10-year period of analysis to estimate costs.
    This proposed rule would establish a temporary waiver process that 
would permit Federal agencies to accept mDLs for official purposes, as 
defined in the REAL ID Act, when full enforcement of the REAL ID Act 
and regulations begins on May 7, 2025. Federal agencies would be able 
to accept mDLs for official purposes on an interim basis, provided 
that: (1) the mDL holder has been issued a valid and unexpired REAL ID-
compliant physical driver's license or identification card from the 
same State that issued the mDL; (2) TSA has determined the issuing 
State to be REAL ID-compliant; and (3) TSA has issued a waiver to the 
State. Federal agencies that opt to accept mDLs for official purposes 
must also procure a mDL reader in order to validate the identity of the 
mDL holder. As part of the application process for the mDL waiver, 
States would be required to submit to TSA an application, including 
supporting data, and other documentation necessary to establish that 
their mDLs meet specified criteria concerning security, privacy, and 
interoperability. The criteria concerning security, privacy, and 
interoperability would not change absent a subsequent rulemaking. When 
REAL ID Act and regulations enforcement begins on May 7, 2025, Federal 
agencies will be prohibited from accepting non-compliant driver's 
licenses and identification cards, including both physical cards and 
mDLs, for official purposes.
    In the following paragraph TSA summarizes the estimated costs of 
the proposed rule on the affected parties: States, TSA, mDL users, and 
relying parties (Federal agencies that voluntarily choose to accept 
mDLs for official purposes). TSA has also identified other non-
quantified impacts to affected parties. As Table 1 displays, TSA 
estimates the 10-year total cost of the proposed rule to be $826.8 
million undiscounted, $695.6 million discounted at 3 percent, and 
$562.0 million discounted at 7 percent. The total cost to States 
comprises approximately 98 percent of the total quantified costs of the 
proposed rule.

[[Page 60074]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.006

    States incur costs to familiarize themselves with the requirements 
of the proposed rule, purchase access to an industry standard, submit 
their mDL waiver application, submit an mDL waiver reapplication, and 
comply with mDL application criteria requirements. As displayed in 
Table 2, the 10-year cost to States is $813.7 million undiscounted, 
$684.2 million discounted at 3 percent, and $552.4 million discounted 
at 7 percent.

[[Page 60075]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.007

    TSA incurs costs associated with reviewing mDL waiver applications 
and mDL waiver renewals, purchasing access to industry standards, 
procuring mDL readers, and mDL training. As displayed in Table 3, the 
10-year cost to TSA is $9.84 million undiscounted, $8.62 million 
discounted at 3 percent, and $7.35 million discounted at 7 percent.

[[Page 60076]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.008

    Relying parties represent Federal agencies that elect to accept a 
mDLs for official purposes. Per the proposed rule, relying parties 
would be required to use a mDL reader to retrieve and validate mDL 
data. As a result, relying parties would incur costs to procure mDL 
readers should they voluntarily choose to accept mDLs for official 
purposes. TSA is also considered a relying party, but due to the 
particular impact to TSA related to the requirement for REAL ID related 
to boarding federally regulated commercial aircraft, those impacts are 
discussed separately. As displayed in Table 4, the 10-year cost to 
relying parties is $3.29 million undiscounted, $2.74 million discounted 
at 3 percent, and $2.19 million discounted at 7 percent.

[[Page 60077]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.009

    TSA has also identified other non-quantified impacts to the 
affected entities. States may incur costs to: monitor and study mDL 
technology as it evolves; resolve the underlying issues that could lead 
to a suspension or termination of a mDL waiver; report serious threats 
to security, privacy, or data integrity; report material changes to mDL 
issuance processes; remove conflicts of interest with a third-party 
auditor; and request reconsideration of a denied mDL waiver 
application. TSA may incur costs to: investigate circumstances that 
could lead to suspension or termination of a State's mDL waiver; 
provide notice to States, relying parties, and the public related to 
mDL waiver suspensions or terminations; develop an IT solution that 
maintains an up-to-date list of States with valid mDL waivers; and 
resolve a request for reconsideration of a denied mDL waiver 
application. mDL users may incur costs with additional application 
requirements to obtain a mDL. Relying parties may incur costs to 
resolve any security or privacy issue with the mDL reader; report 
serious threats to security, privacy, or data integrity; verifying the 
list of States with valid mDL waivers; train personnel to verify mDLs; 
and update the public on identification policies.
    TSA believes that States implementing a mDL, absent the rulemaking, 
would still comply with the AAMVA mDL Implementation Guidelines 
(hereafter referred to as the ``AAMVA Guidelines''). Many of the 
requirements of the mDL application criteria are already contained 
within the AAMVA Guidelines. This includes mDL application criteria 
concerning: data encryption; authentication; device identification 
keys; user identity verification; applicant presentation; REAL ID 
compliant physical card; data record; records retention; privacy; and 
interoperability. Only the mDL application criteria related to 
escalated review and infrastructure security/issuance are not contained 
with the AAMVA Guidelines. Operating under the assumption that States 
interested in mDLs would comply with the AAMVA Guidelines, TSA assumes 
the application criteria that overlap with the AAMVA Guidelines would 
otherwise be incurred and thus not included as a cost of the proposed 
rule. However, TSA requests comment on this assumption and any cost 
information associated with the mDL application criteria.
    This proposed rule would establish mDL application criteria that 
would serve as an interim mDL standard for those States choosing to 
issue mDLs that can be accepted for official purposes. TSA's 
application criteria may help guide States in their development of mDL 
technologies which would provide a shared standard that could 
potentially improve efficiency while also promoting higher security, 
privacy, and interoperability safeguards.
    The application criteria set requirements establishing security and 
privacy protections to safeguard an mDL holder's identity data. They 
also set interoperability requirements to ensure secure transactions 
with Federal agencies. States, via their mDL waiver application, must 
establish that their mDLs meet the application criteria thus helping to 
ensure adequate security and privacy protections are in place. Absent 
the proposed rule, individual States may choose insufficient security 
and privacy safeguards for mDL technologies that fail to meet the 
intended security purposes of REAL ID and the privacy needs of users.

[[Page 60078]]

    mDLs themselves may provide additional security benefits by 
offering a more secure verification of an individual's identity and 
authentication of an individual's credential compared to physical 
cards. In general, mDLs use a cryptographic protocol that ensures the 
mDL was obtained through a trusted authority, such as a State's 
Department of Motor Vehicles.\76\ This same protocol may prevent the 
alteration of mDLs and reduce the threat of counterfeit 
credentials.\77\ mDLs also offer increased protection of personal 
identifiers by preventing over-collection of information. mDLs may 
possess the ability to share only those attributes necessary to 
validate the user identity with the relying party.\78\ When using a 
physical card, the user has no ability to limit the information that is 
shared, regardless of the amount of information required for 
verification.
---------------------------------------------------------------------------

    \76\ Secure Technology Alliance's Mobile Driver's License 
Workshop Showcases mDLs Role in the Future of Identification. 
December 14, 2021. https://www.securetechalliance.org/secure-technology-alliances-mobile-drivers-license-workshop-showcases-mdls-role-in-the-future-of-identification/.
    \77\ Ibid.
    \78\ Mobile ID can bring both convenience and citizen privacy. 
July 15, 2021. https://www.biometricupdate.com/202107/mobile-id-can-bring-both-convenience-and-citizen-privacy.
---------------------------------------------------------------------------

    TSA's mDL application criteria can help guide State development and 
investment in mDLs. The mDL application criteria would foster a level 
of standardization that would potentially reduce complexity by limiting 
individual State nuances while also ensuring interoperability across 
States and with the Federal Government. This increased interoperability 
reduces implementation costs by limiting the need for different 
protocols or mechanisms to accept mDLs from individual States.
    Identification of mDL application criteria that can be used across 
States would result in efficiency gains through multiple States 
pursuing similar objectives, goals, and solutions. Establishing 
application criteria early in the technology development process has 
the potential to align development activities across disparate efforts. 
Early guidance might also reduce re-work or modifications required in 
future regulations thus saving time and resources redesigning systems 
and functionality to adhere to subsequent Federal guidelines.
    Furthermore, the mDL application criteria may potentially encourage 
investment in mDLs and the pooling of resources to develop mDL 
technology capabilities across States and address common concerns or 
issues. Such collaboration, or unity of effort, can help spread 
research and development risk and reduce inefficiencies that may arise 
from States working independently. Greater clarity over mDL 
regulations, with the proposed rule part of an incremental, multi-
phased rulemaking approach, may spur new entrants (States and 
technology companies) into the mDL ecosystem.
    The proposed rule, would allow Federal agencies to continue to 
accept mDLs for official purposes when REAL ID enforcement begins. This 
would avoid the sudden halting of mDL acceptance when REAL ID 
enforcement begins which would reverse trends in providing for a more 
customer-friendly screening experience. The experience and insight 
learned through the mDL waiver process could also be used to inform 
future standards and rulemaking.
3. OMB A-4 Statement
    The OMB A-4 Accounting Statement presents annualized costs and 
qualitative benefits of the proposed rule.
BILLING CODE 9110-05-P

[[Page 60079]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.010

BILLING CODE 9110-05-C
4. Alternatives Considered
    In addition to the proposed rule, or the ``preferred alternative'', 
TSA also considered four alternative regulatory options.
    The first alternative (Alternative 1) represents the status quo, or 
no change relative to the proposed creation of a mDL waiver. This 
represents a scenario without a rulemaking or a waiver process to 
enable mDL acceptance for official Federal purposes. Under this 
alternative, States would continue to

[[Page 60080]]

develop mDLs in a less structured manner while waiting for relevant 
guiding standards to be published which would likely result in 
dissimilar mDL implementation and technology characteristics. This 
alternative was not selected because it does not address the market 
failures associated with a lack of common standards, such as increased 
complexity of mDL use across States, and may result in larger costs in 
the long run when formal mDL standards are finalized.
    The second alternative (Alternative 2) features the same 
requirements of the proposed rule, including an mDL waiver process, but 
allows for an auto acceptance of certain State waivers that are ``low-
risk.'' TSA would identify mDLs from States who have fulfilled the 
proposed rule's minimum requirements prior to applying for the waiver 
and have sufficiently demonstrated (e.g., via TSA initiative or recent 
evaluation by a trusted party) to TSA that their mDL systems present 
adequate interoperability and low security and privacy risk. The auto 
acceptance provision would allow Federal agencies to immediately (or 
conditionally) accept those ``low-risk'' mDLs for official purposes 
pending final approval of the respective State mDL waiver applications. 
However, TSA rejects this alternative because TSA believes the emerging 
technology underlying mDLs is insufficiently established to accept the 
security, privacy, and interoperability of States' mDL systems without 
an evaluation by TSA or another trusted party. In addition, a similar 
presumptive eligibility process is not available for other aspects of 
REAL ID and such an action would not reduce the burden on States or TSA 
to comply with any framework DHS develops.
    Under the third alternative (Alternative 3), TSA would establish 
more comprehensive requirements than those in the proposed rule to 
ensure mDLs comply with the REAL ID Act. States would be required to 
adopt the more comprehensive requirement to issue valid mDLs that can 
be accepted for official purposes. These technical requirements could 
include specific standards related to mDL issuance, provisioning, 
verification, readers, privacy, and other security measures. TSA 
rejects this alternative because promulgating more comprehensive 
requirements for mDLs is premature, as both industry standards and 
technology used by States are still evolving. Restrictive requirements 
could stifle innovation by forcing all stakeholders to pivot toward 
compliance. This could impede TSA from identifying and implementing a 
more efficient regulatory approach in the future.
    Finally, under the fourth alternative (Alternative 4), instead of a 
waiver process, TSA would first establish minimum requirements for 
issuing REAL ID compliant mDLs before TSA later sets more comprehensive 
requirements as additional guidance and standards become available in 
the mid- and long-term. The interim minimum requirements would consist 
of the same requirements for security, privacy, and interoperability, 
based on nineteen industry and government standards and guidelines, 
described in the proposed rule to guide waiver applications. 
Alternative 4 effectively would codify standards that may become 
obsolete in the near future, as existing standards are revised, 
emerging standards publish, and new cyber threats proliferate. TSA 
rejects this alternative because establishing minimum requirements that 
may become obsolete in the near future may limit the ability for TSA to 
revise standards quickly and would increase the security and privacy 
risks of accepting mDLs. In addition, costs under Alternative 4 would 
roughly be similar to costs under the proposed rule, as both options 
would require audits and other compliance costs. TSA requests comments 
as to whether finalizing these minimum requirements for REAL ID 
compliance would be preferable to the temporary waiver process 
described in this proposal. Specifically, TSA seeks comment on whether 
Alternative 4 would realize higher benefits, either quantitative or 
qualitative, for States and the public, than the waiver process 
described in this proposal. TSA also seeks comment on costs to the 
affected entities to comply with the minimum requirements.
5. Regulatory Flexibility Act Assessment
    The Regulatory Flexibility Act (RFA) of 1980, as amended,\79\ was 
enacted by Congress to ensure that small entities (small businesses, 
small not-for-profit organizations, and small governmental 
jurisdictions) would not be unnecessarily or disproportionately 
burdened by Federal regulations. Section 605 of the RFA allows an 
agency to certify a rule in lieu of preparing an analysis if the 
regulations are not expected to have a significant economic impact on a 
substantial number of small entities.
---------------------------------------------------------------------------

    \79\ Public Law 96-354, 94 Stat. 1164 (Sept. 19, 1980) (codified 
at 5 U.S.C. 601 et seq., as amended by the Small Business Regulatory 
Enforcement Fairness Act of 1996 (SBREFA)).
---------------------------------------------------------------------------

    In accordance with the RFA, TSA has not prepared a Regulatory 
Flexibility Analysis and pursuant to 5 U.S.C. 605(b), the Secretary 
certifies that the proposed rule would not have a significant economic 
impact on a substantial number of small entities. The proposed rule 
would directly impact States that voluntarily choose to apply for a 
waiver that would permit mDLs issued by those States to be accepted for 
official Federal purposes.
6. International Trade Impact Assessment
    The Trade Agreement Act of 1979 prohibits Federal agencies from 
establishing any standards or engaging in related activities that 
create unnecessary obstacles to the foreign commerce of the United 
States. The Trade Agreement Act does not consider legitimate domestic 
objectives, such as essential security, as unnecessary obstacles. The 
statute also requires that international standards be considered and, 
where appropriate, that they be the basis for U.S. standards. TSA has 
assessed the potential effect of this proposed rule and has determined 
this rule would not have an adverse impact on international trade.
7. Unfunded Mandates Reform Act Assessment
    Title II of the Unfunded Mandates Reform Act of 1995 (UMRA), Public 
Law 104-4, establishes requirements for Federal agencies to assess the 
effects of their regulatory actions on State, local, and tribal 
governments and the private sector. Under sec. 202 of the UMRA, TSA 
generally must prepare a written Statement, including a cost-benefit 
analysis, for proposed and final rules with ``Federal mandates'' that 
may result in expenditures by State, local, and tribal governments in 
the aggregate or by the private sector of $100 million or more 
(adjusted for inflation) in any one year.
    Before TSA promulgates a rule for which a written statement is 
required, sec. 205 of the UMRA generally requires TSA to identify and 
consider a reasonable number of regulatory alternatives and adopt the 
least costly, most cost-effective, or least burdensome alternative that 
achieves the objectives of the rulemaking. The provisions of sec. 205 
do not apply when they are inconsistent with applicable law. Moreover, 
sec. 205 allows TSA to adopt an alternative other than the least 
costly, most cost-effective, or least burdensome alternative if the 
final rule provides an explanation why that alternative was not 
adopted. Before TSA establishes any regulatory requirements that may

[[Page 60081]]

significantly or uniquely affect small governments, including tribal 
governments, it must develop under sec. 203 of the UMRA a small 
government agency plan. The plan must provide for notifying potentially 
affected small governments, enabling officials of affected small 
governments to have meaningful and timely input in the development of 
TSA regulatory proposals with significant Federal intergovernmental 
mandates, and informing, educating, and advising small governments on 
compliance with the regulatory requirements.
    When adjusted for inflation, the threshold for expenditures becomes 
$177.1 million in 2022 dollars. TSA has determined that this proposed 
rule does not contain a Federal mandate that may result in expenditures 
that exceed that amount either for State, local, and tribal governments 
in the aggregate in any one year. TSA will publish a final analysis, 
including its response to public comments, when it publishes a final 
rule.

B. Paperwork Reduction Act

    The Paperwork Reduction Act of 1995 (PRA) (44 U.S.C. 3501 et seq.) 
requires that TSA consider the impact of paperwork and other 
information collection burdens imposed on the public. Under the 
provisions of PRA section 3507(d), DHS must obtain approval from the 
Office of Management and Budget (OMB) for each collection of 
information it conducts, sponsors, or requires through regulations. 
This proposed rule would call for a collection of information under the 
PRA. Accordingly, TSA has submitted to OMB the proposed rule and this 
analysis, including the sections relating to collections of 
information. See 5 CFR 1320.11(a). As defined in 5 CFR 1320.3(c), 
``collection of information'' includes reporting, recordkeeping, 
monitoring, posting, labeling, and other similar actions. This section 
provides the description of the information collection and of those who 
must collect the information as well as an estimate of the total annual 
time burden.
    The proposed rule establishes a process for States to apply to TSA 
for a temporary waiver. Such a request is voluntary but would require 
the submission of an mDL waiver application, resubmission of an mDL 
waiver application deemed insufficient or denied, and reapplication for 
a mDL waiver when the term of the mDL waiver expires. All of these 
items would be considered new information collections.
    TSA uses the current State of mDL implementation to inform its 
estimate on how many State entities would request a mDL waiver during 
the period of analysis.\80\ All 50 States, the District of Columbia, 
and five territories (collectively referred to as States hereafter) are 
eligible to apply for a mDL waiver as discussed in the proposed rule. 
However, DHS assumes that not all States would apply for the mDL 
waiver. TSA assumes 15 States would apply for a mDL waiver in Year 1 of 
the analysis, 10 States in Year 2, and five States in Year 3.\81\
---------------------------------------------------------------------------

    \80\ Eight States currently provide mDLs. Roughly 20 States have 
taken steps towards mDL implementation, including seven States 
participating in the TSA mobile ID evaluation program without a 
current mDL solution.
    \81\ Each State would submit one mDL waiver application.
---------------------------------------------------------------------------

    Following the State submission of its mDL waiver application, TSA 
determines if the application is approved, insufficient, or denied. 
States are allowed to amend an insufficient or denied mDL waiver 
application and resubmit to TSA review.
    TSA assumes that all submissions would initially be deemed 
insufficient due to the mDL waiver criteria being new and with mDLs an 
emerging technology. Nonetheless, TSA intends to work individually with 
interested States to meet the mDL criteria to maximize the likelihood 
of receiving a waiver. Based on these assumptions, TSA estimates all 
initial mDL waiver applications would be deemed insufficient and that 
90 percent of States would resubmit their mDL waiver applications.\82\
---------------------------------------------------------------------------

    \82\ DHS assumes that 10 percent of applications deemed 
insufficient would no longer pursue a mDL waiver due to the level of 
effort involved to become sufficient and wait until the mDL 
environment is more fully developed.
---------------------------------------------------------------------------

    A State's mDL waivers would be valid for three years. Therefore, 
States granted a mDL waiver in Year 1 would need to reapply in Year 4 
which is beyond the scope of this particular information collection.
    TSA technology subject matter experts estimate that the mDL waiver 
application would take, on average, 20 hours to complete. TSA also 
estimates that mDL waiver resubmissions would take 25 percent of the 
initial mDL waiver application time which equates to 5 hours.\83\ 
Finally, TSA estimates that mDL waiver reapplications would take 75 
percent of the initial mDL waiver application time which equates to 15 
hours.\84\
---------------------------------------------------------------------------

    \83\ mDL Waiver Resubmission burden = 20 hours [initial mDL 
waiver application burden] x 0.25 = 5 hours.
    \84\ mDL Waiver Renewal burden = 20 hours [initial mDL waiver 
application burden] x (1 - 0.25) = 15 hours.
---------------------------------------------------------------------------

    These hour burden estimates are combined with the number of 
collection activities to calculate the total and average time burden 
associated with the proposed rule. TSA estimates the proposed rule's 
total three-year burden for mDL waiver applications, mDL waiver 
resubmissions, and mDL waiver reapplications is 57 responses and 735 
hours. TSA estimates an average yearly burden of 19 responses and 245 
hours. Details of the calculation can be found in Table 6.

[[Page 60082]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.011

    In addition, States TSA incur costs associated with independent 
entity audits of their mDL infrastructure. DHS estimates this cost at 
$32,500 per submission.\85\ States would incur this cost for the 
initial mDL waiver application and mDL waiver reapplication. As there 
are no reapplications anticipated for this information collection 
request, TSA multiplies the annual average number of mDL waiver 
applications from Table 6 above (10) and the independent entity audit 
cost of $32,500 for a total mDL waiver application cost of $325,000.
---------------------------------------------------------------------------

    \85\ TSA technology subject matter experts assume estimate a 
range of audit costs between $5,000 and $60,000. DHS uses the 
midpoint of this range as the point estimate.
---------------------------------------------------------------------------

C. Federalism (E.O. 13132)

    A rule has implications for federalism under E.O. 13132 of August 
6, 1999 (Federalism) if it has a substantial direct effect on State or 
local governments and would either preempt State law or impose a 
substantial direct cost of compliance on them. TSA analyzed this 
proposed rule under this order and determined it does not have these 
implications for federalism.

D. Customer Service (E.O. 14058)

    E.O. 14058 of December 13, 2021 (Transforming Federal Customer 
Experience and Service Delivery to Rebuild Trust in Government), is 
focused on enhancing the of technology ``to modernize Government and 
implement services that are simple to use, accessible, equitable, 
protective, transparent, and responsive for all people of the United 
States.'' The Secretary of Homeland Security has specifically committed 
to testing the use of innovative technologies at airport security 
checkpoints to reduce passenger wait times. This proposed rule supports 
this commitment. Using mDLs to establish identity at airport security 
checkpoints is intended to provide the public with increased 
convenience, security, privacy, and health benefits from ``contact-
free'' identity verification. In 2022, DHS began a limited initiative 
to evaluate some mDLs to determine the viability of using an mDLs as a 
form of identification at an airport security checkpoint.

E. Energy Impact Analysis (E.O. 13211)

    TSA analyzed this proposed rule under E.O. 13211 of May 18, 2001 
(Actions Concerning Regulations That Significantly Affected Energy 
Supply, Distribution or Use), and determined that it is not a 
``significant energy action'' under that E.O. and is not likely to have 
a significant adverse effect on the supply, distribution, or use of 
energy. Therefore, this rulemaking does not require a Statement of 
Energy Effects.

F. Environmental Analysis

    TSA reviews proposed actions to determine whether the National 
Environmental Policy Act (NEPA) applies to them and, if so, what degree 
of analysis is required. DHS Directive 023-01 Rev. 01 (Directive) and 
Instruction Manual 023-01-001-01 Rev. 01 (Instruction Manual) establish 
the procedures that DHS and its components use to comply with NEPA and 
the Council on Environmental Quality (CEQ) regulations for implementing 
NEPA, 40 CFR parts 1500 through 1508. The CEQ regulations allow Federal 
agencies to establish, with CEQ review and concurrence, categories of 
actions (``categorical exclusions'') which experience has shown do not 
individually or cumulatively have a significant effect on the human 
environment and, therefore, do not require an Environmental Assessment 
(EA) or Environmental Impact Statement (EIS). See 40 CFR 
1507.3(b)(2)(ii), 1508.4. DHS has determined that this action will not 
have a significant effect on the human environment. This action is 
covered by categorical exclusion number A3(d) in DHS Management 
Directive 023-01 Rev. 01.

VII. Specific Questions

    While commenters are asked to comment on this proposal in its 
entirety, TSA specifically requests comments in response to the 
following questions. Commenters are encouraged to address issues that 
may not be discussed below based upon their knowledge of the issues and 
implications. In providing your comments, please follow the 
instructions in the Commenter Instructions section above.
    1. Applications for waivers. Provide comments on:
    a. The estimated cost and time required for States to complete and 
submit applications for waivers, including the initial mDL waiver 
application, resubmission, and reapplication;
    b. The estimated number of States and territories that would submit 
a waiver application, and when those States and territories would 
submit a waiver application;
    c. The percentage of States that would receive a decision of 
approved, insufficient, or denied;
    d. The percentage of States receiving a decision of insufficient 
that would resubmit an amended application; and
    e. The assumption that TSA would approve all resubmitted 
applications.
    2. Application Criteria. Provide comments on:
    a. The costs States may incur to demonstrate compliance with the 
criteria to apply for a waiver as required by proposed Sec.  37.10(a) 
and appendix A

[[Page 60083]]

to subpart A of the part, including the costs and availability of any 
professional services required;
    b. The appropriateness of the application requirements set forth in 
proposed Sec.  37.10(a) and appendix A to subpart A of the part;
    c. The impact that the Initial Public Versions of Revision 4 of 
NIST SP 800-63, NIST SP 800-63A, NIST SP 800-63B, and NIST SP 800-63C 
may have on the requirements set forth in proposed Sec.  37.10(a) and 
appendix A to subpart A of the part, including States' ability to 
demonstrate compliance with the criteria to apply for a waiver as 
required by proposed Sec.  37.10(a) and appendix A to subpart A of the 
part.
    3. Audit report. Provide comments on requiring States to submit a 
report of an audit as required in proposed Sec.  37.10(b), which report 
would require verifying the materials that a State would provide in its 
application for a waiver as required by proposed Sec.  37.10(a), 
including:
    a. The appropriateness of requiring an audit to be conducted by a 
recognized independent entity;
    b. The appropriateness of requiring an auditor to hold an active 
Certified Public Accountant license in the State that is seeking a 
waiver;
    c. The appropriateness of requiring an auditor to be experienced 
with information systems security audits, including whether such 
auditors should have different or additional experience;
    d. The appropriateness of requiring the auditor to be accredited by 
the State seeking a waiver;
    e. The appropriateness of requiring an auditor to hold a current 
and active American Institute of Certified Public Accountants (AICPA) 
Certified Information Technology Professional (CITP) credential or 
ISACA (F/K/A Information Systems Audit and Control Association) 
Certified Information System Auditor certification;
    f. The availability of auditors who meet the criteria specified in 
proposed Sec.  37.10(b)(1);
    g. The estimated cost and time incurred by States to obtain a 
report by the auditor; and
    h. Any other considerations relating to auditing.
    4. DHS Mobile Driver's License Waiver Application Guidance. Provide 
comments on the ``Mobile Driver's License Waiver Application 
Guidance,'' available at www.dhs.gov/real-id/mDL.
    5. Waiver validity period. DHS is considering a three-year validity 
period for waivers. Provide comments on the appropriateness of a three-
year validity period for waivers and on alternate validity periods.
    6. Mobile driver's license readers. Provide comment on the costs to 
procure mDL reader equipment, estimated reader usage by Federal 
agencies, States, and businesses, and the functional form of such 
reader equipment.
    7. mDL acceptance. Provide comment on the number of Federal 
agencies other than TSA DHS and DHS component agencies that voluntarily 
choose to accept mDLs for official purposes for identity verification, 
including:
    a. The number and types of locations where mDLs will be accepted; 
and
    b. The number of individuals that are expected to obtain mDLs.
    8. Costs to individuals. Provide comment on costs incurred by mDL 
users, including costs associated with obtaining an mDL.
    9. TSA invites public comments on Alternative 4, including, but not 
limited to, costs to the affected entities to comply with the minimum 
standards, benefits of the alternative compared to the preferred 
alternative, and risks to security and privacy of accepting mDLs based 
on the minimum requirements.

List of Subjects in 6 CFR Part 37

    Document security, Driver's licenses, Identification cards, 
Incorporation by reference, Licensing and registration, Motor vehicle 
administrations, Motor vehicle safety, Motor vehicles, Personally 
identifiable information, Physical security, Privacy, Reporting and 
recordkeeping requirements, Security measures.

The Proposed Amendments

    For the reasons set forth in the preamble, the Transportation 
Security Administration is proposing to amend part 37 of title 6, Code 
of Federal Regulations, to read as follows:

PART 37--REAL ID DRIVER'S LICENSES AND IDENTIFICATION CARDS

0
1. The authority citation for part 37 continues to read as follows:

    Authority:  49 U.S.C. 30301 note; 6 U.S.C. 111, 112.

Subpart A--General

0
2. Amend Sec.  37.3 by adding the definitions for ``A Root Certificate 
Authority,'' ``Administration,'' ``Certificate Authority,'' 
``Certificate Management System,'' ``Certificate Policy,'' 
``Certificate System,'' ``Critical Security Event,'' ``Delegated Third 
Party,'' ``Delegated Third Party System,'' ``Denial of Service,'' 
``Digital Certificates,'' ``Digital Signatures,'' ``Distributed Denial 
of Service,'' ``Execution Environment,'' ``Front End System,'' 
``Hardware security module,'' ``High Security Zone,'' ``Identity 
Proofing,'' ``Identity verification,'' ``Internal Support System,'' 
``Issuing Authority,'' ``Issuing Authority Certificate Authority,'' 
``Issuing System,'' ``mDL,'' ``Mobile driver's license,'' ``Mobile 
identification card,'' ``Multi-Factor Authentication,'' ``Online 
Certificate Status Protocol,'' ``Penetration Test,'' ``Public Key 
Infrastructure,'' ``Rich Execution Environment,'' ``Root Certificate 
Authority System,'' ``Secure Element,'' ``Secure hardware,'' ``Secure 
Key Storage Device,'' ``Secure Zone,'' ``Security Support System,'' 
``Sole Control,'' ``State Root Certificate,'' ``System,'' ``Trusted 
Execution Environment,'' ``Trusted Role,'' ``Virtual Local Area 
Network,'' ``Vulnerability,'' ``Vulnerability scanning,'' and ``Zone'' 
in alphabetical order to read as follows:


Sec.  37.3  Definitions.

* * * * *
    A Root Certificate Authority is the State Certificate Authority 
whose public encryption key establishes the basis of trust for all 
other Digital Certificates issued by a State.
    Administration means management actions performed on Certificate 
Systems by a person in a Trusted Role.
* * * * *
    Certificate Authority means an issuer of Digital Certificates that 
are used to certify the identity of parties in a digital transaction.
    Certificate Management System means a system used by a State or 
Delegated Third Party to process, approve issuance of, or store Digital 
Certificates or Digital Certificate status information, including the 
database, database server, and storage.
    Certificate Policy means the set of rules and documents that forms 
a State's governance framework in which Digital Certificates, 
Certificate Systems, and cryptographic keys are created, issued, 
managed, and used.
    Certificate System means the system used by a State or Delegated 
Third Party to provide services related to Public Key Infrastructure 
for digital identities.
* * * * *
    Critical Security Event means detection of an event, a set of 
circumstances, or anomalous activity that could lead to a circumvention 
of a Zone's security controls or a compromise of a Certificate System's 
integrity, including excessive login attempts, attempts to access 
prohibited resources, Denial of Service or Distributed Denial of 
Service attacks,

[[Page 60084]]

attacker reconnaissance, excessive traffic at unusual hours, signs of 
unauthorized access, system intrusion, or an actual compromise of 
component integrity.
* * * * *
    Delegated Third Party means a natural person or legal entity that 
is not the State and that operates any part of a Certificate System 
under the State's legal authority.
    Delegated Third Party System means any part of a Certificate System 
used by a Delegated Third Party while performing the functions 
delegated to it by the State.
    Denial of Service means the prevention of authorized access to 
resources or the delaying of time-critical operations.
* * * * *
    Digital Certificates identify the parties involved in an electronic 
transaction, and contain information necessary to validate Digital 
Signatures.
    Digital Signatures are mathematical algorithms used to validate the 
authenticity and integrity of a message.
    Distributed Denial of Service means a Denial of Service attack 
where numerous hosts perform the attack.
* * * * *
    Execution Environment means a place within a device processer where 
active application's code is processed.
* * * * *
    Front End System means a system with a public IP address, including 
a web server, mail server, DNS server, jump host, or authentication 
server.
* * * * *
    Hardware security module means a physical computing device that 
safeguards and manages cryptographic keys and provides cryptographic 
processing.
    High Security Zone means a physical location where a State's or 
Delegated Third Party's private key or cryptographic hardware is 
located.
* * * * *
    Identity Proofing refers to a series of steps that the State 
executes to prove the identity of a person.
    Identity verification is the confirmation that identity data 
belongs to its purported holder.
* * * * *
    Internal Support System means a system which operates on a State's 
internal network and communicates with the Certificate System to 
provide business services related to mDL management.
    Issuing Authority means the State that issues a mobile driver's 
license or mobile identification card.
    Issuing Authority Certificate Authority means a Certificate 
Authority operated by or on behalf of an Issuing Authority or a State's 
Root Certificate Authority.
    Issuing System means a system used to sign mDLs, digital 
certificates, mobile security objects, or validity status information.
* * * * *
    mDL means mobile driver's licenses and mobile identification cards, 
collectively.
    Mobile driver's license means a driver's license that is stored on 
a mobile electronic device and read electronically.
    Mobile identification card means an identification card, issued by 
a State, that is stored on a mobile electronic device and read 
electronically.
    Multi-Factor Authentication means an authentication mechanism 
consisting of two or more of the following independent categories of 
credentials (i.e., factors) to verify the user's identity for a login 
or other transaction means something you know (knowledge factor), 
something you have (possession factor), and something you are 
(inherence factor).
* * * * *
    Online Certificate Status Protocol means an online protocol used to 
determine the status of a Digital Certificate.
* * * * *
    Penetration Test means a process that identifies and attempts to 
exploit vulnerabilities in systems through the active use of known 
attack techniques, including the combination of different types of 
exploits, with a goal of breaking through layers of defenses and 
reporting on unpatched vulnerabilities and system weaknesses.
* * * * *
    Public Key Infrastructure means a structure where a Certificate 
Authority uses Digital Certificates for issuing, renewing, and revoking 
digital credentials.
* * * * *
    Rich Execution Environment, also known as a ``normal execution 
environment,'' means the area inside a device processor that runs an 
operating system.
    Root Certificate Authority System means a system used to create a 
State's Root Certificate or to generate, store, or sign with the 
private key associated with a State Root Certificate.
* * * * *
    Secure Element means a tamper-resistant secure hardware component 
which is used in a device to provide the security, confidentiality, and 
multiple application environment required to support various business 
models.
    Secure hardware means hardware provided on a mobile device for key 
management and trusted computation such as a Secure Element (SE) or 
Trusted Execution Environment.
    Secure Key Storage Device means a device certified as meeting the 
specified FIPS 140-3 Level 2 overall, Level 3 physical, or Common 
Criteria (EAL 4+).
    Secure Zone means an area (physical or logical) protected by 
physical and logical controls that appropriately protect the 
confidentiality, integrity, and availability of Certificate Systems.
    Security Support System means a system used to provide security 
support functions, which may include authentication, network boundary 
control, audit logging, audit log reduction and analysis, vulnerability 
scanning, and intrusion detection (host-based intrusion detection, 
network-based intrusion detection).
* * * * *
    Sole Control means a condition in which logical and physical 
controls are in place to ensure the Administration of a Certificate 
System can only be performed by a State or Delegated Third Party.
* * * * *
    State Root Certificate means a public Digital Certificate of a Root 
Certificate Authority operated by or on behalf of a State.
    System means one or more pieces of equipment or software that 
stores, transforms, or communicates data.
* * * * *
    Trusted Execution Environment means an Execution Environment that 
runs alongside but isolated from a Rich Execution Environment and has 
the security capabilities necessary to protect designated applications.
    Trusted Role means an employee or contractor of a State or 
Delegated Third Party who has authorized access to or control over a 
Secure Zone or High Security Zone.
* * * * *
    Virtual Local Area Network means a broadcast domain that is 
partitioned and isolated within a network.
    Vulnerability means a weakness in an information system, system 
security procedures, internal controls, or implementation that could be 
exploited or triggered by a threat source.
    Vulnerability scanning means a technique used to identify host 
attributes and associated Vulnerabilities.
    Zone means a subset of Certificate Systems created by the logical 
or physical partitioning of systems from other Certificate Systems.

[[Page 60085]]

0
3. Amend Sec.  37.4 by adding paragraphs (a)(2), (b)(2), and (d) 
through (f) to read as follows:


Sec.  37.4  Incorporation by reference.

* * * * *
    (a) * * *
    (2) ISO/IEC 18013-5:2021, Personal identification--ISO-compliant 
driving license--Part 5: Mobile driving license (mDL) application, 
Edition 1 (September 2021); IBR approved for Sec. Sec.  37.8; 37.10(a); 
appendix A to this subpart.
    (b) * * *
    (2) Mobile Driver's License (mDL) Implementation Guidelines, 
Version 1.2 (January 2023); IBR approved for Sec.  37.10(a); appendix A 
to this subpart.
* * * * *
    (d) Certification Authority Browser Forum (CA/Browser Forum), 815 
Eddy St, San Francisco, CA 94109, (415) 436-9333, 
[email protected], www.cabforum.org.
    (1) Baseline Requirements for the Issuance and Management of 
Publicly[hyphen]Trusted Certificates, Version 1.8.6 (December 14, 
2022), https://cabforum.org/wp-content/uploads/CA-Browser-Forum-BR-1.8.6.pdf; IBR approved for appendix A to this subpart.
    (2) Network and Certificate System Security Requirements, Version 
1.7 (April 5, 2021), https://cabforum.org/wp-content/uploads/CA-Browser-Forum-Network-Security-Guidelines-v1.7.pdf; IBR approved for 
appendix A to this subpart A.
    (e) Cybersecurity and Infrastructure Security Agency, Mail Stop 
0380, Department of Homeland Security, 245 Murray Lane, Washington, DC 
20528-0380, [email protected], (888) 282-0870, www.cisa.gov.
    (1) Cybersecurity Incident & Vulnerability Response Playbooks 
(November 2021), https://www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf; IBR approved for appendix A to this subpart.
    (2) National Cyber Incident Response Plan (December 2016), 
Department of Homeland Security, https://www.cisa.gov/uscert/sites/default/files/ncirp/National_Cyber_Incident_Response_Plan.pdf; IBR 
approved for appendix A to this subpart.
    (f) National Institute of Standards and Technology, 100 Bureau 
Drive, Gaithersburg, MD 20899, (301) 975-2000, www.nist.gov.
    (1) Federal Information Processing Standard (FIPS) Publication 
(PUB) 140-3, Security Requirements for Cryptographic Modules (March 22, 
2019), https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.140-3.pdf; IBR 
approved for appendix A to this subpart.
    (2) FIPS PUB 180-4, Secure Hash Standard (SHS) (August 2015), 
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf; IBR 
approved for Sec.  37.10(a).
    (3) FIPS PUB 186-5, Digital Signature Standard (DSS) (Feb. 2023), 
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-5.pdf; IBR 
approved for Sec.  37.10(a).
    (4) FIPS PUB 197, Advanced Encryption Standard (AES) (Nov. 26, 
2001), https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.197.pdf; IBR 
approved for Sec.  37.10(a).
    (5) FIPS PUB 198-1, The Keyed-Hash Message Authentication Code 
(HMAC) (July 2008), https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf; IBR approved for Sec.  37.10(a).
    (6) FIPS PUB 202, SHA-3 Standard: Permutation-Based Hash and 
Extendable-Output Functions (August 2015), https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.202.pdf; IBR approved for Sec.  37.10(a).
    (7) Special Publication (SP) 800-53, Security and Privacy Controls 
for Information Systems and Organizations, Rev. 5 (September 2020), 
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53 
Rev. 5.pdf; IBR approved for appendix A to this subpart.
    (8) SP 800-57 Part 1, Recommendation for Key Management: Part 1--
General, Rev. 5, Elaine Barker (May 2020), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf; IBR approved for 
appendix A to this subpart.
    (9) SP 800-57 Part 2, Recommendation for Key Management: Part 2--
Best Practices for Key Management Organization, Rev. 1, Elaine and 
William C. Barker (May 2019), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt2r1.pdf; IBR approved for appendix 
A to this subpart A.
    (10) SP 800-57 Part 3, Recommendation for Key Management: Part 3: 
Application-Specific Key Management Guidance, Rev. 1, Elaine Barker and 
Quynh Dang (January 2015), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57Pt3r1.pdf; IBR approved for appendix 
A to this subpart.
    (11) SP 800-63-3, Digital Identity Guidelines, Paul A. Grassi et 
al. (June 2017), https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-3.pdf; IBR approved for appendix A to this subpart.
    (12) SP 800-63B, Digital Identity Guidelines Authentication and 
Lifecycle Management, Paul A. Grassi et al. (June 2017), https://
nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63b.pdf; IBR 
approved for appendix A to this subpart.
    (13) Framework for Improving Critical Infrastructure Cybersecurity 
Version 1.1 (April 16, 2018), https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf; IBR approved for appendix A to this subpart.
0
4. Add Sec.  37.7 to read as follows:


Sec.  37.7  Temporary waiver for mDLs; State eligibility.

    (a) Generally. TSA may issue a temporary certificate of waiver that 
exempts mDLs issued by a State from meeting the requirements in Sec.  
37.5(b), when the State meets the requirements of Sec.  37.10(a) and 
(b).
    (b) State eligibility. A State may be eligible for a waiver only 
if, after considering all information provided by a State under Sec.  
37.10(a) and (b), TSA determines that--
    (1) The State is in full compliance with all applicable REAL ID 
requirements as defined in subpart E of this part;
    (2) Information provided by the State under Sec.  37.10(a) and (b) 
sufficiently demonstrates that the State's mDL provides the security, 
privacy, and interoperability necessary for acceptance by Federal 
agencies; and
    (3) The State issues mDLs only to individuals who have been issued 
a valid and unexpired REAL ID-compliant physical driver's license or 
identification card issued by that State.
0
5. Add Sec.  37.8 to read as follows:


Sec.  37.8  Requirements for Federal agencies accepting mDLs issued by 
States with temporary waiver.

    Notwithstanding Sec.  37.5(b), Federal agencies may accept an mDL 
for REAL ID official purposes issued by a State that has a valid 
certificate of waiver issued by TSA under Sec.  37.7(a). A Federal 
agency that elects to accept mDLs under this section must--
    (a) Confirm the State holds a valid certificate of waiver 
consistent with Sec.  37.7(a) by verifying that the State appears in a 
list of mDLs approved for Federal use, available as provided in Sec.  
37.9(b)(1);
    (b) Use an mDL reader to retrieve and validate mDL data as required 
by standard ISO/IEC 18013-5:2021 (incorporated by reference; see Sec.  
37.4); and
    (c) Upon discovery that acceptance of a State's mDL is likely to 
cause

[[Page 60086]]

imminent or serious threats to the security, privacy, or data 
integrity, the agency's senior official responsible for REAL ID 
compliance, or equivalent function, must report such discovery to DHS 
at www.dhs.gov/real-id/mDL within 72 hours of such discovery.
0
6. Add Sec.  37.9 to read as follows:


Sec.  37.9  Applications for temporary waiver for mDLs.

    (a) Application process. Each State requesting a temporary waiver 
must file with TSA a complete application as set forth in Sec.  
37.10(a) and (b). Application filing instructions, may be obtained from 
DHS at www.dhs.gov/real-id/mDL.
    (b) Decisions. TSA will provide written notice via email to States 
within 60 days, to the extent practicable, but in no event longer than 
90 days, indicating that TSA has made one of the following decisions:
    (1) Approved. Upon approval of an application for a temporary 
waiver, TSA will issue a certificate of waiver to the State, and 
publish the State's name in a list of mDLs approved for Federal use at 
www.dhs.gov/real-id/mDL.
    (2) Insufficient. Upon determination that an application for a 
temporary waiver is incomplete or otherwise deficient, TSA will provide 
the State an explanation of deficiencies, and an opportunity to address 
any deficiencies and submit an amended application. States will have 60 
days to respond to the notice, and TSA will respond via email within 30 
days.
    (3) Denied. Upon determination that an application for a waiver 
fails to meet criteria specified in Sec.  37.10(a) and (b), TSA will 
provide the State specific grounds on which the denial is based, and 
provide the State an opportunity to seek reconsideration as provided in 
paragraph (c) of this section.
    (c) Reconsideration. (1) States will have 90 days to file a request 
for reconsideration of a denied application. The State must explain 
what corrective action it intends to implement to correct any defects 
cited in the denial or, alternatively, explain why the denial is 
incorrect. Instructions on how to file a request for reconsideration 
for denied applications may be obtained from TSA at www.dhs.gov/real-id/mDL. TSA will notify States of its final determination within 60 
days of receipt of a State's request for reconsideration.
    (2) An adverse decision upon reconsideration is a final agency 
action. A State whose request for reconsideration has been denied may 
submit a new application at any time following the process set forth in 
paragraph (a) of this section.
    (d) Terms and conditions. A certificate of waiver will specify--
    (1) The effective date of the waiver;
    (2) The expiration date of the waiver; and
    (3) Any additional terms or conditions as necessary.
    (e) Limitations; suspension; termination--(1) Validity period. A 
certificate of waiver is valid for a period of 3 years from the date of 
issuance.
    (2) Reporting requirements. If a State, after it has been granted a 
certificate of waiver, makes any significant additions, deletions, or 
modifications to its mDL issuance processes, other than routine systems 
maintenance and software updates, that differ materially from the 
information the State provided in response to Sec.  37.10(a) and (b) 
under which the waiver was granted, the State must provide written 
notice of such changes to TSA at www.dhs.gov/real-id/mDL 60 days before 
implementing such additions, deletions, or modifications.
    (3) Compliance. A State that is issued a certificate of waiver 
under this section must comply with all applicable REAL ID requirements 
in Sec.  37.51(a), and with all terms and conditions specified in 
paragraph (d)(3) of this section.
    (4) Suspension. (i) TSA may suspend the validity of a certificate 
of waiver for any of the following reasons:
    (A) Failure to comply. TSA determines that a State has failed to 
comply with paragraph (d)(3) or (e)(2) of this section, or has issued 
mDLs in a manner not consistent with the information provided under 
Sec.  37.10(a) or (b); or
    (B) Threats to security, privacy, and data integrity. TSA reserves 
the right to suspend a certificate of waiver at any time upon discovery 
that Federal acceptance of a State's mDL is likely to cause imminent or 
serious threats to the security, privacy, or data integrity of any 
Federal agency. In such instances, TSA will provide written notice via 
email to each affected State as soon as practicable after discovery of 
the triggering event, including reasons for suspension, an explanation 
of any corrective actions a State must take to resume validity of its 
certificate of waiver.
    (ii) Before suspending a certificate of waiver under paragraph 
(e)(4)(i)(A) of this section, TSA will provide to such State written 
notice via email of intent to suspend, including an explanation of 
deficiencies and instructions on how the State may cure such 
deficiencies. States will have 30 days to respond to the notice, and 
TSA will respond via email within 30 days. TSA's response would include 
one of the following: withdrawal of the notice, a request for 
additional information, or a final suspension.
    (iii) If TSA issues a final suspension, TSA will temporarily remove 
the State from the list of mDLs approved for Federal acceptance for 
official purposes. TSA will continue to work with a State to whom TSA 
has issued a final suspension to resume validity of its existing 
certificate of waiver. A State that has been issued a final suspension 
may seek a new certificate of waiver by submitting a new application 
following the process set forth in paragraph (a) of this section.
    (5) Termination. (i) DHS may terminate a certificate of waiver at 
an earlier date than specified in paragraph (d)(2) of this section if 
TSA determines that a State--
    (A) Does not comply with applicable REAL ID requirements in Sec.  
37.51(a);
    (B) Is committing an egregious violation of requirements specified 
under paragraph (d)(3) or (e)(2) of this section that the State is 
unwilling to cure; or
    (C) Provided false information in support of its waiver 
application.
    (ii) Before terminating a certificate of waiver, TSA will provide 
the State written notice via email of intent to terminate, including 
findings on which the intended termination is based, together with a 
notice of opportunity to present additional information. States must 
respond to the notice within 7 days, and TSA will reply via email 
within 30 days. TSA's response would include one of the following: 
withdrawal of the notice, a request for additional information, or a 
final termination.
    (iii) If TSA issues a final termination, TSA will remove the State 
from the list of mDLs approved for Federal acceptance for official 
purposes. A State whose certificate of waiver has been terminated may 
seek a new waiver by submitting a new application following the process 
set forth in paragraph (a) of this section.
    (6) Reapplication. A State seeking extension of a certificate of 
waiver after expiration of its validity period must file a new 
application under paragraph (a) of this section.
    (f) Effect of status of certificate of waiver. (1) Issuance of a 
certificate of waiver is not a determination of compliance with any 
other section in this part.
    (2) An application for certificate of waiver that TSA has deemed 
insufficient or denied, or a certificate of waiver that TSA has deemed 
suspended, terminated, or expired, is not a determination of non-
compliance with any other section in this part.

[[Page 60087]]

0
7. Add Sec.  37.10 to read as follows:


Sec.  37.10  Application criteria for issuance of temporary waiver for 
mDLs; audit report; waiver application guidance.

    (a) Application criteria. A State requesting a certificate of 
waiver must establish in its application that the mDLs for which the 
State seeks a waiver are issued with controls sufficient to resist 
compromise and fraud attempts, provide privacy protections sufficient 
to safeguard an mDL holder's identity data, and provide 
interoperability for secure acceptance by Federal agencies under the 
terms of a certificate of waiver. To demonstrate compliance with such 
requirements, a State must provide information, documents, and/or data 
sufficient to explain the means, which includes processes, 
methodologies, or policies, that the State has implemented to comply 
with requirements in this paragraph (a).
    (1) Provisioning. For both remote and in-person provisioning, a 
State must explain the means it uses to address or perform the 
following--
    (i) Data encryption. Securely encrypt mDL data and an mDL holder's 
Personally Identifiable Information when such data is transferred 
during provisioning, and when stored on the State's system(s) and on 
mDL holders' mobile devices.
    (ii) Escalated review. Review repeated failed attempts at 
provisioning, resolve such failures, and establish criteria to 
determine when the State will deny provisioning an mDL to a particular 
mDL applicant.
    (iii) Authentication. Confirm that an mDL applicant has control 
over the mobile device to which an mDL is being provisioned at the time 
of provisioning.
    (iv) Device identification keys. Confirm that the mDL applicant 
possesses the mDL device private key bound to the mDL during 
provisioning.
    (v) User identity verification. Prevent an individual from falsely 
matching with the licensing agency's records, including portrait 
images, of other individuals.
    (vi) Applicant presentation. Prevent physical and digital 
presentation attacks by detecting the liveness of an individual and any 
alterations to the individual's appearance during remote and in-person 
provisioning.
    (vii) REAL ID compliant physical card. Issue mDLs only to residents 
who have been issued by that State a valid and unexpired REAL ID 
compliant physical driver's license or physical identification card.
    (viii) Data record. Issue mDLs using data, including portrait 
image, of an individual that matches corresponding data in the database 
of the issuing State's driver's licensing agency for that individual.
    (ix) Records retention. Manage mDL records and related records, 
consistent with requirements set forth in the American Association of 
Motor Vehicle Administrator (AAMVA) Mobile Driver's License (mDL) 
Implementation Guidelines (incorporated by reference; see Sec.  37.4).
    (2) Issuance. A State must explain the means it uses to manage the 
creation, issuance, use, revocation, and destruction of the State's 
certificate systems and keys in full compliance with the requirements 
set forth in appendix A to this subpart.
    (3) Privacy. A State must explain the means it uses to protect 
Personally Identifiable Information during processing, storage, and 
destruction of mDL records and provisioning records.
    (4) Interoperability. A State must explain the means it uses to 
issue mDLs that are interoperable with standard ISO/IEC 18013-5:2021 
and the ``AAMVA mDL data element set'' defined in the American 
Association of Motor Vehicle Administrator (AAMVA) Mobile Driver's 
License (mDL) Implementation Guidelines v. 1.1 (incorporated by 
reference; see Sec.  37.4) as follows:
    (i) A State must issue mDLs using the data model defined in ISO/IEC 
18103-5:2021 section 7 (incorporated by reference; see Sec.  37.4), 
using the document type ``org.iso.18013.5.1.mDL,'' and using the name 
space ``org.iso.18013.5.1''. States must include the following mDL data 
elements defined as mandatory in Table 5: ``family_name'', 
``given_name'', ``birth_date'', ``issue_date'', ``expiry_date'', 
``issuing_authority'', ``document_number'', ``portrait'', and must 
include the following mDL data elements defined as optional in Table 5: 
``sex'', ``resident_address'', ``portrait_capture_date'', 
``signature_usual_mark''.
    (ii) States must use the AAMVA mDL data element set defined in 
American Association of Motor Vehicle Administrator (AAMVA) Mobile 
Driver's License (mDL) Implementation Guidelines v. 1.2, Section 3.2 
(incorporated by reference; see Sec.  37.4), using the namespace 
``org.iso.18013.5.1.aamva'' and must include the following data 
elements in accordance with the AAMVA mDL Implementation Guidelines 
v1.2 (incorporated by reference; see Sec.  37.4): ``DHS_compliance'', 
and ``DHS_temporary_lawful_status''.
    (iii) States must use only encryption algorithms, secure hashing 
algorithms, and digital signing algorithms as defined by ISO/IEC 18103-
5:2021, Section 9 and Annex B (incorporated by reference; see Sec.  
37.4), and which are included in the following NIST Federal Information 
Processing Standards (FIPS): NIST FIPS PUB 180-4, NIST FIPS PUB 186-5, 
NIST FIPS PUB 197, NIST FIPS PUB 198-1, and NIST FIPS PUB 202 
(incorporated by reference; see Sec.  37.4).
    (b) Audit report. States must include with their applications a 
report of an audit that verifies the information provided under 
paragraph (a) of this section.
    (1) The audit must be conducted by a recognized independent 
entity--
    (i) Holding an active Certified Public Accountant license in the 
issuing State;
    (ii) Experienced with information systems security audits;
    (iii) Accredited by the issuing State; and
    (iv) Holding a current and active American Institute of Certified 
Public Accountants (AICPA) Certified Information Technology 
Professional (CITP) credential or ISACA (F/K/A Information Systems 
Audit and Control Association) Certified Information System Auditor 
(CISA) certification.
    (2) States must include information about the entity conducting the 
audit that identifies--
    (i) Any potential conflicts of interest; and
    (ii) Mitigation measures or other divestiture actions taken to 
avoid conflicts of interest.
    (c) Waiver application guidance--(1) Generally. TSA will publish 
``Mobile Driver's License Waiver Application Guidance'' to facilitate 
States' understanding of the requirements set forth in paragraph (a) of 
this section. The non-binding Guidance will include recommendations and 
examples of possible implementations for illustrative purposes only. 
TSA will publish the Guidance on the REAL website at www.dhs.gov/real-id/mDL.
    (2) Updates. TSA may periodically update its Waiver Application 
Guidance as necessary to provide additional information or 
recommendations to mitigate evolving threats to security, privacy, or 
data integrity. TSA will publish updated Guidance in the Federal 
Register and at www.dhs.gov/real-id/mDL, and provide a copy to all 
States that have applied for or been issued a certificate or waiver.
0
8. Add appendix A to subpart A to read as follows:

[[Page 60088]]

Appendix A to Subpart A of Part 37--Mobile Driver's License Issuance 
Infrastructure Requirements

    A State that issues mDLs for acceptance by Federal agencies for 
official purposes as specified in the REAL ID Act must implement the 
requirements set forth in this appendix in full compliance with the 
cited references as set forth in the following table. All the 
standards identified in the following table are incorporated by 
reference, see Sec.  37.4. If a State utilizes the services of a 
Delegated Third Party, the State must ensure the Delegated Third 
Party complies with all applicable requirements of this appendix for 
the services provided.
BILLING CODE 9110-05-P

[[Page 60089]]

[GRAPHIC] [TIFF OMITTED] TP30AU23.012


[[Page 60090]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.013


[[Page 60091]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.014


[[Page 60092]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.015


[[Page 60093]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.016


[[Page 60094]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.017


[[Page 60095]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.018


[[Page 60096]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.019


[[Page 60097]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.020


[[Page 60098]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.021


[[Page 60099]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.022


[[Page 60100]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.023


[[Page 60101]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.024


[[Page 60102]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.025


[[Page 60103]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.026


[[Page 60104]]


[GRAPHIC] [TIFF OMITTED] TP30AU23.027


    Dated: August 17, 2023.
David P. Pekoske,
Administrator.

[FR Doc. 2023-18582 Filed 8-28-23; 4:15 pm]
BILLING CODE 9110-05-C


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.