Taking Additional Steps To Address the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities, 5698-5735 [2024-01580]
Download as PDF
5698
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
DEPARTMENT OF COMMERCE
15 CFR Part 7
[Docket No. 240119–0020]
RIN 0694–AJ35
Taking Additional Steps To Address
the National Emergency With Respect
to Significant Malicious Cyber-Enabled
Activities
Bureau of Industry and
Security, Department of Commerce.
ACTION: Proposed rule; request for
comments.
AGENCY:
The Executive order of
January 19, 2021, ‘‘Taking Additional
Steps To Address the National
Emergency With Respect to Significant
Malicious Cyber-Enabled Activities,’’
directs the Secretary of Commerce
(Secretary) to propose regulations
requiring U.S. Infrastructure as a Service
(IaaS) providers of IaaS products to
verify the identity of their foreign
customers, along with procedures for
the Secretary to grant exemptions; and
authorize special measures to deter
foreign malicious cyber actors’ use of
U.S. IaaS products. The Executive order
of October 30, 2023, ‘‘Safe, Secure, and
Trustworthy Development and Use of
Artificial Intelligence,’’ further directs
the Secretary to propose regulations that
require providers of certain IaaS
products to submit a report to the
Secretary when a foreign person
transacts with that provider or reseller
to train a large Artificial Intelligence
(AI) model with potential capabilities
that could be used in malicious cyberenabled activity. The Department of
Commerce (Department) issues this
notice of proposed rulemaking (NPRM)
to solicit comment on proposed
regulations to implement those
Executive orders.
DATES: Comments must be received
April 29, 2024.
ADDRESSES: All comments must be
submitted by one of the following
methods:
• By the Federal eRulemaking Portal:
https://www.regulations.gov at docket
number DOC–2021–0007.
• By email directly to:
IaaScomments@bis.doc.gov. Include
‘‘E.O. 13984/E.O. 14110: NPRM’’ in the
subject line.
• Instructions: Comments sent by any
other method or to any other address or
individual, or received after the end of
the comment period, may not be
considered. For those seeking to submit
confidential business information (CBI),
please clearly mark such submissions as
CBI and submit by email or via the
ddrumheller on DSK120RN23PROD with PROPOSALS3
SUMMARY:
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
Federal eRulemaking Portal, as
instructed above. Each CBI submission
must also contain a summary of the CBI,
clearly marked as public, in sufficient
detail to permit a reasonable
understanding of the substance of the
information for public consumption.
Such summary information will be
posted on regulations.gov.
FOR FURTHER INFORMATION CONTACT:
Kellen Moriarty, U.S. Department of
Commerce, telephone: (202) 482–1329,
email: IaaScomments@bis.doc.gov. For
media inquiries: Jeremy Horan, Office of
Congressional and Public Affairs,
Bureau of Industry and Security, U.S.
Department of Commerce: OCPA@
bis.doc.gov.
SUPPLEMENTARY INFORMATION:
I. Background
IaaS products offer customers the
ability to run software and store data on
servers offered for rent or lease without
having to assume the direct
maintenance and operating costs of
those servers. Foreign malicious cyber
actors have utilized U.S. IaaS products
to commit intellectual property and
sensitive data theft, to engage in covert
espionage activities, and to threaten
national security by targeting U.S.
critical infrastructure. After carrying out
such illicit activity, these actors can
quickly move to replacement
infrastructure offered by U.S. IaaS
providers of U.S. IaaS products (‘‘U.S.
IaaS providers’’). The temporary
registration and ease of replacement for
such services makes it more difficult for
the government to track malicious
actors. Additionally, the ability of
malicious actors to use foreign-person
resellers of U.S. IaaS products (‘‘foreign
resellers’’), who might not track
identity, hinders law enforcement’s
ability to obtain identifying information
about malicious actors through service
of compulsory legal process. This shift
in adversary tradecraft also challenges
the U.S. Government’s ability to identify
victims of malicious cyber activity and
enable specific network defense and
remediation efforts. Furthermore, the
emergence of large-scale computing
infrastructure—to which U.S. IaaS
providers and foreign resellers provide
access as a service, and which foreign
malicious actors could use to train large
AI models that can assist or automate
their malicious cyber activity—has
raised considerable concern about the
identities of entities that transact with
providers to engage in certain AI
training runs.
To address these threats, the President
issued E.O. 13984, ‘‘Taking Additional
Steps To Address the National
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
Emergency With Respect to Significant
Malicious Cyber-Enabled Activities,’’
which provides the Department with
authority to require U.S. IaaS providers
to verify the identity of foreign users of
U.S. IaaS products, to issue standards
and procedures that the Department
may use to make a finding to exempt
IaaS providers from such a requirement,
to impose recordkeeping obligations
with respect to foreign users of U.S. IaaS
products, and to limit certain foreign
actors’ access to U.S. IaaS products in
appropriate circumstances. The
President subsequently issued E.O.
14110, ‘‘Safe, Secure, and Trustworthy
Development and Use of Artificial
Intelligence,’’ which calls for the
Department to require U.S. IaaS
providers to ensure that their foreign
resellers verify the identity of foreign
users. E.O. 14110 also provides the
Department with authority to require
U.S. IaaS providers submit a report to
the Department whenever a foreign
person transacts with them to train a
large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity.
II. Introduction
E.O. 13984 and E.O. 14110 draw upon
the President’s authority from the
Constitution and laws of the United
States, including the International
Emergency Economic Powers Act
(IEEPA) (50 U.S.C. 1701 et seq.), the
National Emergencies Act (NEA) (50
U.S.C. 1601, et seq.), and 3 U.S.C. 301.
Section 1 of E.O. 13984 requires the
Secretary to propose, for notice and
comment, regulations that mandate that
U.S. IaaS providers verify the identity of
foreign persons that sign up for or
maintain accounts that access or utilize
U.S. IaaS providers’ IaaS products or
services (Accounts or Account)—that is,
a know-your-customer program or
Customer Identification Program (CIP).
Under E.O. 13984, such a program must
set forth the minimum standards for
IaaS providers to verify the identity of
a foreign person connected with the
opening of an Account or the
maintenance of an existing Account.
The proposed regulations must include
the types of documentation and
procedures required to verify the
identity of any foreign persons acting as
a lessee or sub-lessee of these products
or services; the records that IaaS
providers must securely maintain
regarding a foreign person that obtains
an Account; and methods of limiting all
third-party access to this collected
information, except insofar as such
access is otherwise consistent with E.O.
13984 and allowed under applicable
law. Moreover, the proposed regulations
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
must consider the type of Account,
methods of opening an Account, and the
types of identifying information already
available to IaaS providers that help
accomplish the objectives of identifying
foreign malicious cyber actors using any
such products while also avoiding an
undue burden on U.S. IaaS providers.
They must also allow the Secretary,
after consultation with the heads of
various Federal agencies, to exempt any
IaaS providers or any specific type of
Account or lessee from the requirements
of any regulation issued pursuant to this
section, including due to a finding that
the IaaS provider, Account, or lessee
complies with security best practices to
otherwise deter abuse of IaaS products.
Section 2 of E.O. 13984 requires the
proposed regulations to allow the
Secretary to use, as necessary, one of
two special measures included in E.O.
13984 to require U.S. IaaS providers to
prohibit or limit access to Accounts that
foreign malicious cyber actors use to
conduct malicious cyber-enabled
activity. E.O. 13984 authorizes these
measures if the Secretary, in
consultation with heads of appropriate
Federal agencies, finds that reasonable
grounds exist to conclude that either: (i)
a foreign jurisdiction has a significant
number of foreign persons offering U.S.
IaaS products that are, in turn, used for
malicious cyber-enabled activities, or a
significant number of foreign persons
directly obtaining U.S. IaaS products
and using them in malicious cyberenabled activities; or (ii) a foreign
person has established a pattern of
conduct of offering U.S. IaaS products
that are used for malicious cyberenabled activities or directly obtaining
U.S. IaaS products for use in malicious
cyber-enabled activities. As further
explained below, the Department would
conduct an investigation before making
any such finding under section 2 of E.O.
13894.
One special measure the Secretary
could take would be to prohibit or
impose conditions on opening or
maintaining an Account with any IaaS
provider by: (a) a foreign person located
in a foreign jurisdiction that has a
significant number of foreign persons
offering U.S. IaaS products that are used
for malicious cyber-enabled activities;
or (b) on behalf of such a foreign person.
The second special measure would
allow the Secretary to prohibit or
impose conditions on opening or
maintaining an Account in the United
States by any IaaS provider for, or on
behalf of, a foreign person found to be
offering U.S. IaaS products that are used
for malicious cyber-enabled activities or
on accounts opened directly by foreign
persons who are known to obtain U.S.
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
IaaS products for malicious cyberenabled activities.
Section 4.2(c) of E.O. 14110 requires
the Secretary to propose regulations
requiring U.S. IaaS providers to submit
to the Department a report when a
foreign person transacts with the IaaS
provider to train a large AI model with
potential capabilities that could be used
in malicious cyber-enabled activity. The
report, at a minimum, must include the
identity of the foreign person and the
existence of a training run that meets
the criteria set forth in this section, as
well as any other information specified
in regulation. This section of E.O. 14110
also instructs the Secretary to determine
the set of technical conditions that a
large AI model must possess in order to
have the potential capabilities that
could be used in malicious cyberenabled activity and to update that
determination as necessary and
appropriate.
Section 4.2(c) of this E.O. also
requires that U.S. IaaS providers
prohibit any foreign reseller of their U.S.
IaaS product from providing those
products unless such foreign reseller
submits to the U.S. IaaS provider a
report, which the U.S. IaaS provider
must provide to the Department,
detailing each instance in which a
foreign person transacts with the foreign
reseller to use the U.S. IaaS product to
train a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity. In
accordance with this requirement,
section 4.2(d) requires the proposed
regulations to require U.S. IaaS
providers to ensure that foreign resellers
of U.S. IaaS products verify the identity
of any foreign person that obtains an
IaaS account from the foreign resellers.
The Department is directed to set forth
the minimum standards that a U.S. IaaS
provider must require of their foreign
resellers to verify the identity of a
foreign person who opens an account or
maintains an existing account with a
foreign reseller.
III. Comments on the Advanced Notice
of Proposed Rulemaking
On September 24, 2021, the
Department published in the Federal
Register an advanced notice of proposed
rulemaking (ANPRM), 86 FR 53018
(Sep. 24, 2021), soliciting comments on
how the Department should implement
various provisions of sections 1 and 2 of
E.O. 13984, described above, and
section 5 of E.O. 13894, which defines
several key terms as they relate to the
proposed regulations. The Department
received twenty-one (21) comments to
the ANPRM, which are available on the
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
5699
public rulemaking docket at https://
www.regulations.gov.
This section summarizes the
comments received in response to the
ANPRM and explains the Department’s
proposed regulations to implement
sections 1, 2, and 5 of E.O. 13984. The
proposed rule text incorporates many of
the suggestions the Department received
in response to the ANPRM, as set out in
more detail below.
(1) Definitions
The Department sought comments on
the terms ‘‘United States person’’ and
‘‘United States Infrastructure as a
Service Provider.’’ The commenters who
responded to this question argued that
the term ‘‘United States person’’ should
not be interpreted to include foreign
subsidiaries of a U.S. IaaS provider, as
this extension would exceed the scope
of E.O. 13984. Commenters differed
about how broadly to interpret the term
‘‘United States Infrastructure as a
Service Provider.’’ Many requested the
Department to interpret this term as
broadly as possible to capture as much
potential foreign malicious cyber
activity as possible. Others believed the
Department should interpret the
definition narrowly to avoid implicating
cloud service providers who offer other
cloud-based services, such as Platform
as a Service (PaaS) and Software as a
Service (SaaS) offerings, but do not offer
IaaS products. This proposed rule
reflects the Department’s consideration
of all relevant comments.
(2) Customer Identification Program
Regulations and Relevant Exemptions
In the ANPRM, the Department
sought information about how to
implement requirements for companies
to verify a foreign person’s identity
upon the opening of an Account and
while maintaining an existing Account.
The Department sought comments on
verification procedures and
recordkeeping requirements the
Department should consider including
in regulations.
Many commenters expressed support
for implementing data retention and
recordkeeping requirements, as directed
by E.O. 13984, across a broad spectrum
of U.S. IaaS providers’ products or
services to capture a large portion of
malicious cyber-enabled activity on
these platforms. While commenters
generally supported requiring U.S. IaaS
providers to verify the identity of all
prospective customers, some suggested
that any regulation the Department
promulgates in response to E.O. 13984
will be ineffective, as malicious cyber
actors are savvy enough to avoid
identity verification.
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
5700
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Other commenters requested that the
Department’s proposed regulations
allow U.S. IaaS providers to adopt riskbased approaches to verify the identity
of their customers. These approaches,
they argued, would allow IaaS providers
flexibility to adjust their CIPs to meet
new threats and vulnerabilities as they
arise. Most commenters agreed that the
Department should consider the costs
and benefits of these requirements for
U.S. IaaS providers and expressed
concern that the costs of compliance
would be substantial. As discussed
further below, the Department has
proposed standards and procedures that
take into consideration the size,
complexity, and risk profile of the IaaS
provider and its product offerings.
The Department requested comments
on current practices, if any, that U.S.
IaaS providers use to verify the identity
of their customers and the burden that
any new regulations would impose on
these IaaS providers. Commenters
reported that there is no uniform set of
data that U.S. IaaS providers collect
before opening an Account for a
customer, but email addresses and
payment methods are normally
required. Most commenters indicated
that any requirements in this proposed
regulation would impose burdens on
U.S. IaaS providers, and that the
Department should weigh this burden
against the anticipated benefit any
regulations mandating identity
verification would have on national
security. The Department acknowledges
that this rulemaking will impose
compliance costs for at least some U.S.
IaaS providers and has addressed these
costs in the regulatory impact analysis
included in the preamble of this
proposed rule.
The Department asked about the
impact any proposed regulations would
have on data protection and security,
especially considering the European
Union General Data Protection
Regulation (GDPR) and the California
Consumer Privacy Act (CCPA). Many
commenters encouraged the Department
to propose regulations that would
enable U.S. law enforcement officials to
gain access to data stored by domain
name registries and registrars that has
proven more difficult since the
enactment of the GDPR. Others focused
on ensuring that the processing of
customers’ data to carry out the
provisions of any proposed regulation
would be consistent with the GDPR or
CCPA. Still others requested that any
proposed regulation not frustrate
ongoing negotiations to open the flow of
data between foreign countries and the
United States. The Department
acknowledges these comments and has
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
sought to ensure these proposed
regulations are consistent with national
and international obligations, either
because the specific information
requested is not protected, or because
the need for data collection falls into
relevant exemptions.
The Department sought comments on
how to implement the authority, granted
by section 1(c) of E.O. 13984, to provide
exemptions from the requirements of
any regulations issued pursuant to E.O.
13894. Many commenters expressed
hope that the Department could
promulgate best practices for IaaS
providers to adopt or strive to meet in
order to avoid compliance costs
associated with any proposed
regulations. Others asked the
Department to tailor these regulations to
apply only to those products and
services most used by foreign malicious
cyber actors. The Department is
proposing procedures for IaaS providers
to obtain exemptions from the CIP
requirements. Under these procedures, a
U.S. IaaS provider seeking to obtain an
exemption for itself, a specific type of
account or lessee, or its foreign reseller,
would provide a written submission to
the Secretary outlining its program to
comply with security best practices to
deter the abuse of U.S. IaaS products. A
finding by the Secretary that the
program incorporates such best
practices would exempt an IaaS
provider from the CIP requirements in
section 1(a) of E.O. 13984.
Some commenters urged the
Department not to include exemptions,
believing this practice to be contrary to
the intent of E.O. 13984 to address the
use of U.S. IaaS products for malicious
cyber-enabled activities. In these
proposed regulations, the Department
has endeavored to provide a pathway to
enable U.S. IaaS providers to apply for
an exemption where such exemption is
warranted while still accomplishing the
policy goals of E.O. 13984. The
Department welcomes comments and
feedback on its proposed approach, as
well as on potential standards and best
practices that could deter the abuse of
U.S. IaaS products by malicious actors.
(3) Special Measures Restrictions
In the ANPRM, the Department
sought comments on procedures the
Secretary should use to decide when
and how to impose a special measure.
The Department asked what sources of
information the Secretary should
consider, how the Secretary should
publish any findings, how long the
special measure’s effects should last,
and how to determine which special
measure to invoke.
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
Commenters encouraged the
Department to consider how to leverage
existing authorities and procedures,
such as the Department’s existing
authority to prohibit certain Information
and Communications Technology and
Services (ICTS) transactions or the
Department of the Treasury’s Office of
Foreign Assets Control’s (OFAC)
sanctions procedures, to minimize the
burden of these special measures. Other
commenters indicated that the threat of
these special measures will result in lost
U.S. business, as foreign persons may
move to IaaS products and services
furnished from companies
headquartered in foreign countries. Still
others expressed doubt that these
special measures would accomplish
their intended purpose.
In crafting these proposed regulations
regarding special measures, the
Department looked to a variety of
sources, including OFAC’s sanction
procedures, and has sought to minimize
the costs to U.S. businesses while still
meeting the requirements of E.O. 13984.
IV. Proposed Rule and Request for
Comments
Following consideration of the
comments received in response to the
ANPRM, the Department is proposing
regulations to implement sections 1, 2,
and 5 of E.O. 13984 and the applicable
provisions of E.O. 14110. The
provisions implementing E.O. 13984
would apply to U.S. IaaS providers that
offer U.S. IaaS products, as defined in
E.O. 13984 and this proposed rule.
‘‘U.S. IaaS providers’’ includes any U.S.
person that offers IaaS products, to
include both direct providers of U.S.
IaaS products and any of their U.S.
resellers.
To implement section 1 of E.O. 13984,
the Department proposes to require
providers to verify the identity of
foreign customers. To implement
section 2 of E.O. 13984, the Department
proposes procedures for the Secretary’s
decision-making process regarding
whether and how to issue
determinations about special measures.
Regarding the definitions in section 5 of
E.O. 13984, the Department proposes
interpretations of terms defined in the
E.O. and proposes definitions for several
additional key terms.
To implement section 4.2(c) of E.O.
14110, the Department proposes
regulations related to foreign resellers of
U.S. IaaS products that would apply to
U.S. IaaS providers as defined in E.O.
13984 and this proposed rule. The
Department uses ‘‘foreign reseller’’ to
mean any foreign person who has
established an account with a U.S. IaaS
provider to provide IaaS products
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS3
subsequently, in whole or in part, to a
third party.
To implement section 4.2(c) of this
E.O., the Department proposes a process
for U.S IaaS providers to report to the
Department when they have knowledge
they will engage or have engaged in a
transaction with a foreign person that
could allow that foreign person to train
a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity. To
implement section 4.2(d) of this E.O.,
the Department proposes regulations
that would require U.S. IaaS providers
to require foreign resellers of their U.S.
IaaS products to verify the identity of
foreign persons who open or maintain
an account with a foreign reseller.
The Department proposes definitions
for terms used within E.O. 14110,
including a definition for a ‘‘large AI
model with potential capabilities that
could be used in malicious cyberenabled activity.’’ Based on this
definition, the Secretary will determine,
as required by E.O. 14110, the set of
technical conditions that a large AI
model must possess in order to have the
potential capabilities that could be used
in malicious cyber-enabled activity.
That determination will be a binding
interpretation of what constitutes a
‘‘large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity.’’ As
this area of technology is fast
developing, and as directed by E.O.
14110, the Secretary will update, as
‘‘necessary and appropriate,’’ the initial
determination of which set of technical
conditions meet the definition. The
Department will publish these binding
updates to the technical condition
determinations in the Federal Register.
The Department requests comments on
all aspects of this proposed rule.
(1) Definitions
This proposed rule adopts several
definitions found in section 5 of E.O.
13984, including ‘‘entity,’’ ‘‘foreign
jurisdiction,’’ ‘‘foreign person,’’
‘‘Infrastructure as a Service Account,’’
‘‘Infrastructure as a Service product,’’
‘‘Malicious cyber-enabled activities,’’
‘‘person,’’ ‘‘Reseller Account,’’ ‘‘United
States person,’’ and ‘‘U.S. Infrastructure
as a Service product.’’ In addition, this
proposed rule clarifies the definition of
‘‘U.S. Infrastructure as a Service
provider’’ found in section 5 of E.O.
13984. The proposed rule also adopts
several definitions found in section 3 of
E.O. 14110, including ‘‘artificial
intelligence’’ or ‘‘AI,’’ ‘‘AI model,’’ ‘‘AI
system,’’ ‘‘dual-use foundation model,’’
‘‘foreign reseller,’’ ‘‘generative AI,’’
‘‘integer operation,’’ ‘‘machine
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
learning,’’ and ‘‘model weight.’’ Finally,
the Department proposes several
definitions of key terms in this rule,
including ‘‘customer’’ and ‘‘beneficial
owner,’’ as well as definitions for terms
such as ‘‘availability,’’ ‘‘confidentiality,’’
‘‘Customer Identification Program,’’
‘‘Department,’’ ‘‘disassociability,’’
‘‘foreign beneficial owner,’’ ‘‘foreign
customer,’’ ‘‘foreign reseller,
‘‘individual,’’ ‘‘integrity,’’ ‘‘knowledge,’’
‘‘large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity,’’
‘‘manageability,’’ ‘‘predictability,’’
‘‘privacy-preserving data sharing and
analytics,’’ ‘‘Red Flag,’’ ‘‘reseller,’’ ‘‘riskbased,’’ ‘‘Secretary,’’ ‘‘threat landscape,’’
‘‘training,’’ ‘‘training run,’’ and ‘‘United
States reseller.’’ Some of the proposed
definitions are discussed below,
although the Department welcomes
comments on all definitions in this
proposed rule.
A. Availability
The Department proposes to define
‘‘availability’’ as ensuring timely and
reliable access to and use of information
and information systems by an
authorized person or system, including
resources provided as part of a product
or service.
B. Beneficial Owner
E.O. 13984 requires verification of the
identity of foreign persons that obtain
accounts, and it defines ‘‘person’’ as ‘‘an
individual or entity.’’ Therefore, the
Department proposes to require U.S.
IaaS providers to collect the same
identifying information and verify the
identity of beneficial owners of
Accounts owned or maintained by
entities. Under the proposed rule, a
beneficial owner is defined as an
individual who either: (1) exercises
substantial control over a Customer, or
(2) owns or controls at least 25 percent
of the ownership interests of a
Customer. The Department seeks
comments on these definitions,
including the meaning of ‘‘substantial
control.’’
C. Confidentiality
The Department proposes to define
‘‘confidentiality’’ as preserving
authorized restrictions on information
access and disclosure, including means
for protecting personal privacy and
proprietary information.
D. Customer Identification Program
The Department proposes to define
‘‘Customer Identification Program’’ as a
program created by a U.S. IaaS provider
or foreign reseller that dictates how the
IaaS provider will collect identifying
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
5701
information about its customers, how
the IaaS provider will verify the identity
of its foreign customers, store and
maintain identifying information, and
notify its customers about the disclosure
of identifying information.
E. Department
The Department proposes to define
‘‘Department’’ as the United States
Department of Commerce.
F. Disassociability
The Department proposes to define
‘‘disassociability’’ as enabling the
processing of data or events without
association to individuals or devices
beyond the operational requirements of
the system.
G. Foreign Beneficial Owner
The Department proposes to define
‘‘foreign beneficial owner’’ as a
beneficial owner that is not a United
States person.
H. Foreign Customer
The Department proposes to define
‘‘foreign customer’’ as a customer that is
not a United States person.
I. Foreign Reseller
The Department proposes to adopt the
definition from E.O. 14110 and define
‘‘foreign reseller’’ to mean a foreign
person who has established an IaaS
Account to provide IaaS subsequently,
in whole or in part, to a third party. This
is consistent with the definition for
foreign reseller included in E.O. 14110.
J. Individual
The Department proposes to define
‘‘individual’’ as any natural person.
K. Infrastructure as a Service Product
This proposed definition adopts the
E.O. 13984 definition for ‘‘Infrastructure
as a Service product’’, which is any
product or service offered to a
consumer, including complimentary or
‘‘trial’’ offerings, that provides
processing, storage, networks, or other
fundamental computing resources, and
with which the consumer is able to
deploy and run software that is not
predefined, including operating systems
and applications. The consumer
typically does not manage or control
most of the underlying hardware but has
control over the operating systems,
storage, and any deployed applications.
The term is inclusive of ‘‘managed’’
products or services, in which the
provider is responsible for some aspects
of system configuration or maintenance,
and ‘‘unmanaged’’ products or services,
in which the provider is only
responsible for ensuring that the
E:\FR\FM\29JAP3.SGM
29JAP3
5702
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
product is available to the consumer.
The term is also inclusive of
‘‘virtualized’’ products and services, in
which the computing resources of a
physical machine are split between
virtualized computers accessible over
the internet (e.g., ‘‘virtual private
servers’’), and ‘‘dedicated’’ products or
services in which the total computing
resources of a physical machine are
provided to a single person (e.g.,
‘‘baremetal’’ servers).
The Department believes that this
expansive definition will allow for
regulations to apply to a broad range of
IaaS product offerings that can be used
by foreign malicious cyber actors to
carry out attacks on the United States or
United States persons. Note that this
definition includes all service offerings
for which a consumer does not manage
or control the underlying hardware, but
rather contracts with a third party to
provide access to this hardware. This
definition would capture services such
as content delivery networks, proxy
services, and domain name resolution
services. It does not, however, capture
domain name registration services for
which a consumer registers a specific
domain name with a third party, as that
third party does not provide any
processing, storage, network, or other
fundamental computing resource to the
consumer. The Department seeks
comment on the categories of products
or services that fall within this
definition.
ddrumheller on DSK120RN23PROD with PROPOSALS3
L. Integrity
The Department proposes to define
‘‘integrity’’ as guarding against improper
information modification or destruction
and includes ensuring information nonrepudiation and authenticity.
M. Knowledge
The Department proposes to define
‘‘knowledge’’ as knowledge of a
circumstance (the term may be a variant,
such as ‘‘know,’’ ‘‘reason to know,’’ or
‘‘reason to believe’’) including not only
positive knowledge that the
circumstance exists or is substantially
certain to occur, but also an awareness
of a high probability of its existence or
future occurrence. Such awareness is
inferred from evidence of the conscious
disregard of facts known to a person and
is also inferred from a person’s willful
avoidance of facts. This definition is
similar to that in the Department’s
Export Administration Regulations.
N. Large AI Model With Potential
Capabilities That Could Be Used in
Malicious Cyber-Enabled Activity
The Department proposes to define
‘‘large AI model with potential
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
capabilities that could be used in
malicious cyber-enabled activity’’ as any
AI model with the technical conditions
of a dual-use foundation model, or that
otherwise has technical parameters of
concern, that has capabilities that could
be used to aid or automate aspects of
malicious cyber-enabled activity,
including but not limited to social
engineering attacks, vulnerability
discovery, denial-of-service attacks, data
poisoning, target selection and
prioritization, disinformation or
misinformation generation and/or
propagation, and remote command-andcontrol, as necessary and appropriate of
cyber operations. The Department seeks
comment on this proposed definition.
E.O. 14110 also instructs the Secretary
to determine and to update, ‘‘as
necessary and appropriate,’’ the set of
technical conditions for a ‘‘large AI
model to have potential capabilities that
could be used in malicious cyberenabled activity.’’ Based on the above
definition, the Secretary will make this
initial determination and any necessary
and appropriate updates to it which the
Department will publish in the Federal
Register. Such technical conditions may
include the compute used to pre-train
the model exceeding a specified
quantity.
The Department seeks comment on
the proposed definition, as well as on
the Secretarial process for determining
and, because of rapidly advancing
technology, updating the set of specific
technical conditions necessary for a
large AI model to meet the definition
and have the potential capabilities that
could be used in malicious cyberenabled activities.
O. Manageability
The Department proposes to define
‘‘manageability’’ as providing the
capability for granular administration of
data, including alteration, deletion, and
selective disclosure.
R. Red Flag
The Department proposes to define
‘‘Red Flag’’ as a pattern, practice, or
specific activity that indicates the
possible existence of malicious cyberenabled activities.
S. Reseller
The Department proposes to define
‘‘reseller’’ as a person that maintains a
Reseller Account.
T. Risk-Based
The Department proposes to define
‘‘risk-based’’ as based on an assessment
of the relevant risks, including those
presented by the various types of service
offerings maintained by an IaaS
provider, the methods used to open an
Account, the varying types of
identifying information available to an
IaaS provider, and an IaaS provider’s
customer base.
U. Secretary
The Department proposes to define
‘‘Secretary’’ as the Secretary of
Commerce or the Secretary’s designee.
V. Threat Landscape
The Department proposes to define
‘‘threat landscape’’ as the broad
environment of geopolitical, economic,
and technological factors that must be
evaluated when developing risk-based
procedures that enable an IaaS provider
to form a reasonable belief of the true
identity of each Account owner and
beneficial owner to deter facilitating
significant malicious cyber-enabled
activities.
W. Training or Training Run
The Department proposes to define
‘‘training’’ or ‘‘training run’’ as any
process by which an AI model learns
from data through the use of computing
power.
Q. Privacy-Preserving Data Sharing and
Analytics
X. United States Infrastructure as a
Service Product
The Department proposes to clarify
the E.O.’s definition of ‘‘United States
Infrastructure as a Service product.’’
The E.O. defines this term as ‘‘any
Infrastructure as a Service Product
owned by any United States person or
operated within the territory of the
United States of America.’’ The
Department considers Reseller Accounts
as IaaS products.
The Department proposes to define
‘‘privacy-preserving data sharing and
analytics’’ as the use of privacyenhancing technologies to achieve
disassociability, predictability,
manageability, and confidentiality when
performing analytics on data.
Y. United States Infrastructure as a
Service Provider
E.O. 13984 defines ‘‘United States
Infrastructure as a Service provider’’ as
‘‘any United States Person that offers
any Infrastructure as a Service product.’’
The Department notes that this
P. Predictability
The Department proposes to define
‘‘predictability’’ as enabling reliable
assumptions by individuals, owners,
and operators about data and their
processing by a system, product, or
service.
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS3
definition of ‘‘United States
Infrastructure as a Service provider’’
includes any United States person that
is a direct provider of U.S. IaaS products
and any of their U.S. resellers. The
Department proposes to consider U.S.
resellers of U.S. IaaS products as IaaS
providers subject to these proposed
regulations.
In response to the ANPRM, several
commenters suggested that the
Department clarify whether this term
includes foreign subsidiaries of United
States persons. Specifically, these
commenters believed including foreign
subsidiaries of United States persons in
this definition would exceed the scope
of the E.O., which focuses on threats to
the United States from U.S. IaaS
products, not those offered by foreign
subsidiaries. The Department proposes
to clarify that a foreign subsidiary of a
U.S. IaaS provider is not considered to
be a ‘‘United States Infrastructure as a
Service provider.’’
E.O. 13984 requires the Secretary to
propose regulations to require providers
to ‘‘verify the identity of a foreign
person in connection with the opening
of an Account or the maintenance of an
existing Account.’’ It requires that any
regulations set out the types of
documentation or procedures ‘‘required
to verify the identity of any foreign
person acting as a lessee or sub-lessee of
these products or services.’’ The
Department proposes to consider U.S.
resellers of U.S. IaaS products as U.S.
IaaS providers subject to these proposed
regulations.
(2) Customer Identification Program
Regulations and Relevant Exemptions
Under this proposed rule, U.S. IaaS
providers and their foreign resellers
would maintain CIPs, perform effective
customer verification, and maintain
identifying information about their
foreign customers, which is critical to
combating malicious cyber-enabled
activities. The Department proposes to
require that all U.S. IaaS providers
implement their own CIPs, require CIPs
of their foreign resellers, and report to
the Department on these CIPs. The
Department will consider allowing U.S.
IaaS providers an adjustment period to
implement some provisions of this
proposed regulation and notify the
Department accordingly, and anticipates
that compliance would be required
within one year of the date of
publication of any final rule.
Accordingly, the Department
proposes to require IaaS providers
develop their own risk-based CIP.
Taking into consideration the different
types of IaaS Accounts, the different
methods used to open the Accounts,
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
and the types of information available to
identify foreign malicious cyber actors,
while avoiding the imposition of an
undue burden on providers, the
Department proposes to allow each
provider to create a CIP that matches its
unique service offerings and customer
bases. Provided that IaaS providers meet
certain minimum requirements in their
CIPs, providers can create CIPs that are
flexible and minimally burdensome to
their business operations.
The Department proposes to require
U.S. resellers of U.S. IaaS Accounts to
establish CIPs and identity verification
procedures to be used any time they act
as a reseller for U.S. IaaS products. The
CIPs of such U.S. resellers would be
subject to the minimum standards in
this proposed rule. U.S. resellers would
be responsible for establishing the
identity of their potential customers,
including all prospective beneficial
owners of these Accounts, and
determining whether they are U.S.
persons. U.S. resellers would also be
responsible for verifying the identity of
their foreign customers under this
proposed rule. The Department requests
comments on whether resellers that are
small businesses might find it more
difficult to develop a CIP. The
Department proposes to allow U.S.
resellers, by agreement with a U.S. IaaS
provider, to reference, use, rely on, or
adopt the CIPs created by the U.S. IaaS
provider to help minimize any
compliance burdens on the reseller. The
Department further seeks comments on
whether resellers currently request
identifying information from their
customers and how these resellers verify
the identity of their prospective foreign
customers.
The Department seeks comments on
whether to require IaaS providers to
conduct third-party or internal audits to
confirm their compliance with CIP
requirements in the proposed rule. The
Department also seeks comments on
whether the Department should receive
and approve all CIPs. The Department
additionally seeks comments on
whether the rulemaking should require
U.S. IaaS providers to submit Red Flags
either to the Department or to another
relevant department or agency. Below,
the Department explains additional
specific requirements for CIPs.
A. Data Collection Requirements
Under the proposed rule, each CIP
must include procedures that U.S. IaaS
providers and their foreign resellers will
use to collect information from all
covered existing and prospective
customers, that is, those who have
applied for an account. At a minimum,
the following data would be collected:
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
5703
a customer’s name, address, the means
and source of payment for each
customer’s Account, email addresses
and telephone numbers, and internet
protocol (IP) addresses used for access
or administration of the Account. IaaS
providers may alter their CIPs to require
additional information from prospective
customers that is necessary to verify the
identity of any foreign person, but all
CIPs must, at a minimum, collect the
previously listed data. The Department
proposes omitting a requirement for
collecting and verifying national
identification numbers because, based
on public feedback, the Department
believes that national identification
number verification would be unduly
burdensome and would not be
necessary to verify identity. The
Department seeks comments on whether
other forms of identification, such as
digital or technology-based
identification, should be included as an
acceptable means by which IaaS
providers may verify customers’
identities, and if companies have
privacy-protecting or privacy-enhancing
technologies to verify this same
information or other alternatives that
can effectively achieve identity
verification.
The Department believes that many
U.S. IaaS providers and their foreign
resellers already collect this information
from their customers, and that the
proposed rule would set a baseline for
data collection that would help all
providers effectively verify and
document the identities of their
customers. The Department seeks
comments on the costs and burdens
associated with this proposed
requirement and whether the
Department should include additional
data collection in a baseline
requirement for CIPs. The Department
proposes a requirement that providers
make a written description of their CIPs
available for inspection by the
Department, which may identify
specific shortcomings for providers to
resolve. The Department seeks comment
on this proposal.
The Department is proposing to
require that CIPs account for the
collection of identifying information
about the actual Account owner and all
beneficial owners of the Account.
Specifically, the proposed required
description of the CIP would specify
how providers would ensure that all
beneficial owners of an Account at its
inception and any new beneficial owner
added to the Account undergo the same
identification procedures as the person
opening the Account. The Department
seeks comment on this approach.
E:\FR\FM\29JAP3.SGM
29JAP3
5704
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
B. Prospective Customers From the
United States
E.O. 13984 addresses threats to U.S.
IaaS products and services by foreign
malicious cyber actors. Section 1 of the
E.O. therefore requires the Department
to propose regulations to require U.S.
IaaS providers to verify the identity of
‘‘a foreign person that obtains an
Account.’’
Therefore, the Department proposes to
require U.S. IaaS providers to verify the
identity of foreign persons who obtain
an Account from providers and to
require the same of their foreign
resellers. Although providers would be
required to create a CIP that includes
the minimum data collection
requirements for all prospective
customers, they would not be required
to verify the identity of customers with
Accounts opened by or on behalf of a
U.S. person, unless a foreign beneficial
owner is added to the Account or the
Account or a portion of the Account is
resold to a foreign person.
The Department seeks comments
about whether the proposed data
collection requirements above would
enable providers to accurately
distinguish foreign current and
prospective customers from others. If
these proposed requirements are
inadequate, what additional required
information should be included in the
CIPs to aid in these efforts? The
Department also seeks comments on the
availability of secure data deletion
standards and whether to require their
implementation for Accounts
determined to be opened, owned, and
accessible exclusively by U.S. persons.
ddrumheller on DSK120RN23PROD with PROPOSALS3
C. Identity Verification
The Department proposes to require
that CIPs include procedures to ensure
that U.S. IaaS providers and their
foreign resellers verify the identity of all
foreign Account owners and foreign
beneficial owners. Under the proposed
rule, providers may craft their own
procedures and methods to verify the
identity of their prospective foreign
customers and beneficial owners,
provided that their CIPs include riskbased procedures that enable the
provider to form a reasonable belief
about the true identity of each customer
and beneficial owner. These procedures
must be based on a provider’s
assessment of the relevant risks,
including those presented by the
various types of service offerings
maintained by the provider, the
methods used to open an Account, the
varying types of identifying information
available to the provider, and the
provider’s customer base. Under the
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
proposed rule, the CIP must establish
whether a provider will use
documentary or non-documentary
verification or a combination of both. It
must establish how a provider will
verify the identity of its customers when
the customer is unable to produce the
requested documents. The Department
believes this flexibility would minimize
the burden placed on providers by these
regulations. The Department seeks
comments on this risk-based approach
to allow providers to form reasonable
beliefs of the true identity of each
customer and beneficial owner and on
what information they would need to
collect to accomplish this.
Under the proposed rule, the CIP
must include steps a provider would
take if it is unable to verify the identity
of any customer, including refusing to
open an Account and/or additional
monitoring pending attempts at
verification. It must further set out the
terms under which a customer may
continue to have access to an Account
while the provider attempts to verify the
identity of the customer, and when a
provider would close an Account after
attempts to verify a customer’s identity
have failed. Additionally, it must
describe measures for redress and issue
management to address situations in
which legitimate customers may fail
identity verification, or in which their
information was compromised and a
fraudulent account established. The
Department seeks comments on whether
to require specific verification methods,
such as email or payment verification,
for all prospective customers. The
Department seeks comments on whether
the Department should allow providers
to grant potential customers access to
Accounts prior to successful identity
verification. The Department seeks
comments on whether including
reference to National Institute of
Standards and Technology (NIST)
Special Publication (SP) 800–63
regarding digital identity guidelines
would help IaaS providers meet
requirements for identity verification.
D. Recordkeeping
The Department proposes to require
U.S. IaaS provider and foreign reseller
of U.S. IaaS product CIPs to include
procedures for maintaining, protecting,
and obtaining access to records of
relevant customer information accessed
in the process of verifying customer
identities. At a minimum, this record
must include a description of the
identity evidence and attributes
provided by the customer when the
customer first attempted to open an
Account, a description of the methods
and results of any measures undertaken
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
to verify customer identity, and a
description of the resolution of any
substantive discrepancy discovered
when verifying the identifying
information. The proposed rule leaves
to IaaS providers the discretion to
design their own recordkeeping
procedures, so long as these procedures
obtain this minimum information.
The Department proposes to require
that CIPs of U.S. IaaS providers and
their foreign reseller include
requirements to securely maintain these
records and describe measures taken to
ensure that the information is secure.
The proposed regulations would require
that IaaS providers limit access to any
records or documents created, retained,
or accessed pursuant to these
regulations by any third parties or IaaS
provider employees without a need-toknow basis for obtaining this access.
However, no such requirement should
be read to limit IaaS providers’ ability
to share security best practices and
threat information with other IaaS
providers, relevant consortia, or the U.S.
Government as needed and consistent
with applicable law. The Department
seeks comments on the feasibility of this
approach and the costs of doing so. The
Department further seeks comments on
whether there currently exist best
practices for the maintenance, storage,
and security of customer identifying
information.
The Department proposes to require
that U.S. IaaS providers retain these
records for a period of two years after
the date upon which an Account was
last accessed or closed. The Department
preliminarily determines that a two-year
period is necessary to allow law
enforcement the ability to gain access to
this information should an Account be
suspected of hosting malicious cyberenabled activity. The Department seeks
comments on the burdens to IaaS
providers of maintaining these records
for two years, and whether there are
alternative ways to allow for both
immediate and long-term access to
customer information should an
Account be used for malicious cyberenabled activity. The Department seeks
comments on whether to require that
CIPs include procedures to address
situations where an Account that has
been inactive for more than two years is
subsequently accessed by a foreign
person, and whether to require that IaaS
providers request that the foreign person
provide the enumerated identifying
information again in these
circumstances.
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS3
E. Ensuring Verification for Foreign
Resellers
As directed in E.O. 14110, the
Department proposes to require that U.S
IaaS providers only initiate or continue
a reseller relationship with foreign
resellers of U.S. IaaS products that
maintain and implement a CIP that
meets the requirements for CIPs of U.S.
IaaS providers in this proposed rule.
The Department recognizes that it will
take U.S. IaaS providers time to educate,
coordinate, and collect information from
their foreign resellers on CIP
requirements and therefore anticipates
allowing U.S. IaaS providers up to one
year to implement such final provisions
and notify the Department accordingly.
Under this proposed rule, U.S. IaaS
providers would be required to furnish
a copy of any foreign reseller’s CIP to
the Department within ten calendar
days following a request for the same
from the Department. The Department
seeks comments on the potential
challenges that U.S. IaaS providers
would face when collecting this
information from their foreign resellers
of U.S. IaaS products. The proposed rule
would also require that, upon receipt of
evidence that indicates the failure of a
foreign reseller to maintain or
implement a CIP or that indicates
malicious cyber-enabled activity, U.S.
IaaS providers must report malicious
cyber-enabled activity and close
accounts associated with the activity
and must terminate the reseller
relationship within 30 calendar days.
The Department seeks comments on the
challenges U.S. IaaS providers would
face in investigating and remediating
malicious cyber activity by foreign
resellers, as well as the contractual
difficulties posed by terminating the
relationship with a non-compliant
foreign reseller. The Department further
seeks comments on the extent to which
there currently exist customer
identification and verification practices
which U.S. IaaS providers require their
foreign resellers to use.
F. Customer Identification Program
Updates and Certifications
The Department proposes to require
that U.S. IaaS providers submit to the
Department certain information about
their CIPs and their foreign resellers’
CIPs, to include procedures on verifying
customer identity and detecting
malicious cyber activity, as well as
information and data on their provision
of IaaS products. The Department
further proposes to require that U.S.
IaaS providers and their foreign resellers
update their CIPs annually to protect
against new cyber threats and
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
vulnerabilities, as well as to increase
efficiency and data security, and to
certify to the Department that such
annual updates have occurred. The
Department proposes that U.S. IaaS
providers must notify the Department of
any updates to their CIP or any CIP of
their foreign resellers. In these annual
certifications, providers would also
attest to the Department that, since the
date of last certification, they have
reviewed their CIPs and updated their
CIPs to account for any changes in their
service offerings and for changes to the
threat landscape. The certification
would include an attestation that the
current CIP complies with the
provisions of the proposed rule. This
attestation would require the provider to
indicate the frequency with which it
was unable to verify the identity of a
foreign customer in the prior calendar
year and record the resolution for each
of those situations. The Department
seeks comments on the usefulness and
feasibility of such attestation and
whether the Department should require
additional information in these
certifications, the procedures for
submission of such certifications, and
whether the Department should require
these certifications more or less
frequently than annually. The
Department seeks comments on whether
there currently exist best practices for
customer identification and verification
that providers can use as a model for
their CIPs.
G. Exemptions
Section 1(c) of E.O. 13984 permits the
Secretary, in accordance with such
standards and procedures as the
Secretary may delineate and, in
consultation with the Secretary of
Defense, the Attorney General, the
Secretary of Homeland Security, and the
Director of National Intelligence, to
exempt any U.S. IaaS provider, or any
specific type of Account or lessee, from
the requirements of any regulation
issued pursuant to the section. Such
standards and procedures may include
a finding by the Secretary that a
provider, Account, or lessee complies
with security best practices to otherwise
deter abuse of IaaS products. Section
4.2(d)(iii) of E.O. 14110 also provides
that the Secretary may ‘‘exempt a
United States IaaS Provider with respect
to any specific foreign reseller of their
United States IaaS Products, or with
respect to any specific type of account
or lessee, from the requirements of any
regulation issued pursuant to this
subsection,’’ that section being related
to CIP requirements for foreign resellers
of U.S. IaaS products.
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
5705
This NPRM proposes standards and
procedures for exemptions from CIP
requirements in §§ 7.302 through 7.305
for U.S. IaaS providers and with regard
to any of their specific foreign resellers.
The regulations propose that providers
seeking an exemption submit a written
request electronically. The Department
anticipates that the final rule would
designate an email address to receive
such requests. The Department seeks
comments on these standards and
procedures in proposed § 7.306. The
Department seeks comment on whether
there exist security best practices to
deter abuse of U.S. IaaS products that
the Secretary may reference in the
future to authorize exemptions from
these regulations, including but not
limited to improving event log
management to generate, safeguard, and
retain logs of IaaS providers’ system and
network events, both to improve
incident detection and to aid in incident
response and recovery activities. The
Department also seeks comments on
whether there are appropriate safe
harbor activities that might form the
basis of an exemption program.
(3) Special Measures Regulations
A. Special Measures Requirements
The Department proposes regulations
to implement the authority provided to
the Secretary to take either of the special
measures enumerated in E.O. 13984,
should the Secretary determine that
reasonable grounds exist for concluding
that a jurisdiction or person outside of
the U.S. ‘‘has any significant number of
foreign persons offering U.S. IaaS
products that are used for malicious
cyber-enabled activities or any
significant number of foreign persons
directly obtaining U.S. IaaS products for
use in malicious cyber-enabled
activities.’’ The Department proposes to
allow the Department to initiate
investigations of its own accord or
accept referrals from other executive
branch agencies or providers to evaluate
evidence about a particular foreign
jurisdiction or person to determine
whether to impose a special measure.
The Department would then assess the
information in its possession and
information available from public and
other sources about a foreign person or
foreign jurisdiction to determine
whether imposing a special measure
would be appropriate. Should the
Secretary determine that the evidence
warrants the imposition of a special
measure, the Secretary would issue a
determination in the Federal Register,
to take effect 30 days after publication,
that would set out the reasonable
grounds for this determination and
E:\FR\FM\29JAP3.SGM
29JAP3
5706
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS3
would indicate which special measure
the Secretary would intend to use.
B. Reasonable Grounds Determination
E.O. 13984 provides that, when
determining whether a particular
foreign jurisdiction ‘‘has any significant
number of foreign persons offering U.S.
IaaS products that are used for
malicious cyber-enabled activities or
any significant number of foreign
persons directly obtaining U.S. IaaS
products for use in malicious cyberenabled activities,’’ the Secretary must
consider, among other relevant
information: (1) evidence that foreign
malicious cyber actors have obtained
U.S. IaaS products in that foreign
jurisdiction, including whether such
actors obtained such U.S. IaaS products
through reseller accounts; (2) the extent
to which that foreign jurisdiction is a
source of malicious cyber-enabled
activities; and (3) whether the U.S. has
a mutual legal assistance treaty with
that foreign jurisdiction, and the
experience of U.S. law enforcement
officials in obtaining information about
activities involving U.S. IaaS products
originating in or routed through such
foreign jurisdiction.
With respect to foreign persons, the
Secretary must assess: (1) the extent to
which a foreign person uses U.S. IaaS
products to conduct, facilitate, or
promote malicious cyber-enabled
activities; (2) the extent to which U.S.
IaaS products offered by a foreign
person are used to facilitate or promote
malicious cyber-enabled activities; (3)
the extent to which U.S. IaaS products
offered by a foreign person are used for
legitimate business purposes in the
jurisdiction; and (4) the extent to which
actions short of the imposition on
special measures are sufficient, with
respect to transactions involving the
foreign person offering U.S. IaaS
products, to guard against malicious
cyber-enabled activities. Finally, the
Secretary may analyze any information
gleaned through the Department’s
existing authority to review ICTS
transactions pursuant to its authority
derived from Executive Order 13873 of
May 17, 2019, ‘‘Securing the
Information and Communications
Technology and Services Supply
Chains’’ (84 FR 22689). The Department
seeks comments on any additional
relevant factors the Secretary should
consider.
C. Choosing a Special Measure
The Department proposes to require
that the Secretary’s investigation
process include consultation with the
agencies referenced in E.O. 13984,
namely the Secretary of State, the
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
Secretary of the Treasury, the Secretary
of Defense, the Attorney General, the
Secretary of Homeland Security, the
Director of National Intelligence, and
other heads of other executive
departments and agencies as the
Secretary deems appropriate, to
determine which special measure to
impose. This consultation would
include a review of the available
evidence to determine whether to
impose a special measure against a
foreign jurisdiction or against a foreign
person; a consideration of whether the
imposition of the special measure
would create a significant competitive
disadvantage, including any undue cost
or burden associated with compliance,
for providers; and a determination of the
extent to which the imposition of a
special measure or the timing of the
special measure would have a
significant adverse effect on legitimate
business activities involving the foreign
jurisdiction or foreign person. Finally,
the determination would include an
assessment of the effect of any special
measure on U.S. supply chains, public
health or safety, national security, law
enforcement investigations, or foreign
policy. The Department seeks comments
on whether additional considerations
should be included before the Secretary
would choose a special measure.
(3) AI Training Reporting Requirements
Section 4.2 (c)(i) of E.O. 14110
instructs the Secretary to ‘‘propose
regulations that require United States
IaaS Providers to submit a report to the
Secretary of Commerce when a foreign
person transacts with that United States
IaaS provider to train a large AI model
with potential capabilities that could be
used in malicious cyber-enabled
activity.’’ Such report shall include, at
a minimum, the identity of the foreign
person and the existence of any training
run of an AI model meeting the criteria
set forth in E.O. 14110 or otherwise
determined by the Secretary, and other
information as identified by the
Secretary. In addition, section 4.2(c)(ii)
of E.O. 14110 directs that U.S. IaaS
providers must be required to prohibit
foreign resellers of their U.S. IaaS
products from providing those products
unless the foreign resellers submit such
reports to the provider, which the
provider must provide to the Secretary.
This proposed rule would require
such providers to report to the
Department information on instances of
training runs by foreign persons for
large AI models with potential
capabilities that could be used in
malicious cyber-enabled activity.
Reportable information includes the
identifying information about the
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
training run (i.e., the customer’s name,
address, the means and source of
payment for the customer’s Account,
email addresses, telephone numbers,
and IP addresses) and the existence of
the training run. The Department
requests comment on what additional
information, if any, the Department
should require providers report.
Section 4.2(c)(iii) instructs the
Secretary to ‘‘determine the set of
technical conditions for a large AI
model to have potential capabilities that
could be used in malicious cyberenabled activity, and revise that
determination as necessary.’’
The Department has proposed that a
model meets the definition of a ‘‘large
AI model with potential capabilities that
could be used in malicious cyberenabled activity’’ if it meets technical
conditions issued by the Department in
interpretive rules published in the
Federal Register. The Department will
update the technical conditions, based
on technological advancements, as
necessary and appropriate, as directed
by E.O. 14110, through interpretive
rules published in the Federal Register.
The Department seeks comment on the
definition of a ‘‘large AI model that
could be used in malicious cyberenabled activity,’’ and on what Red
Flags, if any, the Department should
adopt that would create a presumption
that a foreign person is training a model
with the technical conditions set out in
E.O. 14110.
(4) Compliance and Enforcement
Though issued pursuant to the
President’s authority derived from
IEEPA, E.O. 13984 is silent as to
penalties for noncompliance. The
Department proposes to clarify that any
person who commits a violation of this
proposed rule, if finalized, may be liable
to the United States for civil or criminal
penalties under IEEPA. Although the
Department currently has penalty
provisions under 15 CFR 7.200 for
violations of Final Determinations
issued pursuant to the Department’s
ICTS authorities pursuant to the IEEPA,
the Department believes it is important
to have a new enforcement section
specific to violations of these IaaSrelated provisions. Accordingly, the
Department is adding a section on
enforcement, which lists civil and
criminal penalties, and the acts
particular to these IaaS-related
provisions that will result in those
penalties. For example, the new
enforcement section specifies that it is
a violation to fail to create a CIP, or to
fail to file with the Department a CIP
certification, or fail to seek
reauthorization for such CIPs on an
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
annual basis. It is also a violation to fail
to inform the Department about a
covered IaaS transaction that might
result in a customer obtaining or using
a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity when
an IaaS provider knows or should know
of such transaction.
Regarding penalties for violations,
whether a violation results in a civil or
criminal penalty will depend largely on
the nature of the offense. For example,
intentionally or knowingly violating a
provision of these regulations could
result in criminal penalties, while
unintentional violations are more likely
to result in civil penalties. The
Department seeks comments on this
approach.
V. Classification
a. Executive Order 12866
This rulemaking has been determined
to be a significant action under
Executive Order 12866, as amended by
Executive Order 14094.
ddrumheller on DSK120RN23PROD with PROPOSALS3
b. Regulatory Impact Analysis
As required by Executive Order
12866, and the Regulatory Flexibility
Act, 5 U.S.C. 601, et seq., the
Department of Commerce has prepared
the following regulatory impact analysis
(RIA) and initial regulatory flexibility
analysis (IRFA) for this proposed rule.
disinformation; displace and
disempower workers; stifle competition;
and pose risks to national security.’’ To
address these threats, E.O. 13984
requires the Secretary to propose
regulations ‘‘that require United States
Infrastructure as a Service (IaaS)
providers to verify the identity of a
foreign person that obtains an Account.’’
These regulations must also require U.S.
IaaS providers to verify the identity of
foreign customers, and the E.O.
authorizes the Secretary to limit certain
foreign actors’ access to U.S. IaaS
products. E.O. 14110 adds to these
requirements by requiring the Secretary
to propose regulations that require U.S.
IaaS providers to ensure that foreign
resellers of U.S. IaaS products verify the
identity of any foreign person that
obtains an IaaS Account for the foreign
reseller. These requirements are
necessary to protect the national
security of the United States and the
integrity of the ICTS supply chain.
2. Affected Entities
The proposed rulemaking would
apply to all U.S. providers of U.S. IaaS
products, including resellers.
3. Number of Affected Entities
1. Need for Regulatory Action
The reasons for and need for this
action are summarized in this preamble.
This rule is being proposed pursuant to
E.O. 13984, ‘‘Taking Additional Steps
To Address the National Emergency
With Respect to Significant Malicious
Cyber-Enabled Activities,’’ and E.O.
14110, ‘‘Safe, Secure, and Trustworthy
Development and Use of Artificial
Intelligence.’’ As stated in E.O. 13984,
‘‘Foreign actors use United States IaaS
products for a variety of tasks in
carrying out malicious cyber-enabled
activities, which makes it extremely
difficult for United States officials to
track and obtain information through
legal process before these foreign actors
transition to replacement infrastructure
and destroy evidence of their prior
activities; foreign resellers of United
States [IaaS] products make it easier for
foreign actors to access these products
and evade detection.’’ Furthermore, E.O.
14011 states that ‘‘irresponsible use
could exacerbate societal harms such as
fraud, discrimination, bias, and
The Department estimated both a
lower and upper bound for the number
of entities affected by the proposed rule.
To derive the lower bound estimate, the
Department first identified a core group
of IaaS providers that operate in the
United States. This lower bound
estimate assumes that all United States
IaaS products are sold directly to the
customer and no domestic resellers
supply these products. Based on this
lower bound estimate, the Department
estimates that approximately 25
providers in the United States would be
potentially directly impacted by this
rulemaking.
The upper bound estimate of
potentially impacted entities is based on
the estimated number of resellers who
participate in the sale of U.S. IaaS
products. According to the Census
Bureau, in 2020 there were 1,812 firms
that owned at least one establishment
located within the United States and
operating in North American Industry
Classification System (NAICS) code
517121—Telecommunication Resellers
in the United States.1 While most of
these entities would not likely be
impacted by this proposed rule as they
do not resell IaaS products or services,
the Department uses this figure as the
1 A firm is a business organization consisting of
one or more domestic establishments in the same
geographic area and industry that were specified
under common ownership or control. See: https://
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
5707
upper bound estimate for this impact
statement because it is possible all of
the Telecommunications Resellers could
engage in IaaS product resale. The
Department therefore estimates the
number of entities potentially affected
by this rulemaking would be between 25
and 1,837. Of those firms operating in
the Telecommunications Resellers
industry under NAICS 51721, 99
percent, or 1,791 firms, operate an
enterprise size of 500 or fewer
employees. This data underscores that
the majority of listed entities in this
sector can be classified as small
businesses based on this specific
definition.
4. Administrative Compliance Burden
on U.S. Companies
The Department assessed the
administrative compliance burden on
U.S. companies by estimating the costs
of: (1) learning about the proposed rule;
(2) developing CIPs; (3) implementing
CIPs; (4) updating CIPs; (5) completing
annual certifications; (6) educating
foreign resellers on CIP requirements;
and (7) processing reporting from and
on foreign resellers and foreign
customers. Although the rulemaking
would provide certain regulatory
alternatives for industry, such as the
option to adopt the CIP of another
provider, and exemptions from the CIP
requirement in certain circumstances,
the below analysis assumes that each
company would engage in the
development, implementation, and
updating of a CIP.
The Department also requests public
comment on any of the assumptions and
estimates in this analysis.
i. Learning About the Proposed Rule
The Department expects that
businesses learning about the proposed
rule and its requirements would largely
be accomplished by attorneys and
operations managers. The Department’s
estimate for the cost to businesses of
learning about the rulemaking is further
derived from estimates of the number of
firms potentially impacted by the
rulemaking, the share of potentially
impacted firms likely to devote time and
resources to learning about the
rulemaking, the number of hours
needed to read and learn about the
rulemaking, and the wages of the
employees tasked with learning about
the rulemaking. Table 1 provides a
detailed breakdown of the framework
for estimating these costs.
www.census.gov/programs-surveys/susb/about/
glossary.html.
E:\FR\FM\29JAP3.SGM
29JAP3
5708
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Table 1: Framework for Estimating Costs Associated with Learning about the Proposed
1
Entities potentially
impacted by the
proposed rule
25
1,837
2
Share of potentially
impacted entities likely
to devote time and
resources to learning
about the proposed rule
0.5
0.9
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00012
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
Low estimate is based
on a supply chain
analysis of a core
group of companies
directly affected by
the proposed rule.
High estimate is based
on an analysis of
industries that resell
IaaS roducts.
At the low end we
estimate half of
potentially impacted
entities will devote
time and resources
towards learning about
the proposed rule.
This assumes a large
number of potentially
impacted entities
already collect similar
identifying
information from their
customers. At the high
end we estimate nearl
29JAP3
EP29JA24.004
ddrumheller on DSK120RN23PROD with PROPOSALS3
Rule
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Entities likely to devote
time and resources to
learning about the
proposed rule
Operations manager
hours
13
1,653
2
2
5
Operations manager
hourly wage, doubled to
account for benefits and
overhead ($)
118
118
6
Operations manager cost
per entity ($)
Lawyer hours
236
236
10
10
8
Lawyer hourly wage,
doubled to account for
benefits and overhead
($)
157
157
9
Lawyer cost per entity
($)
Total initial cost per
entity to learn about
proposed rule ($)
Total initial cost to learn
about proposed rule ($)
Annualized cost per
entity over 10 years at
7% rate($)
1,570
1,570
This is an estimate of
how long it is likely to
take a lawyer to read
and understand the
proposed rule.
This is the BLS
estimate for the mean
hourly wage of a
lawyer, doubled to
reflect benefits and
overhead.
Line 7 * Line 8
1,806
1,806
Line 6 + Line 9
22,575
2,985,860
Line 3 * Line 10
240
240
Line 10 is a one-time
cost per firm to learn
about the proposed
rule. Line 12
annualizes that onetime cost over 10
4
7
10
11
ddrumheller on DSK120RN23PROD with PROPOSALS3
12
VerDate Sep<11>2014
all potentially
impacted entities will
devote time and
resources towards
learning about the
proposed rule.
Line 1 * Line 2
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00013
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
This is an estimate of
how long it is likely to
take an operations
manager to read and
understand the
proposed rule.
This is the Bureau of
Labor Statistics (BLS)
estimate for the mean
hourly wage of an
operations manager,
doubled to reflect
benefits and overhead.
Line 4 * Line 5
29JAP3
EP29JA24.005
3
5709
5710
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ii. Developing a CIP
To develop CIPs, companies would
likely be required to assess their
offerings of IaaS products, analyze
relevant cybersecurity risks associated
with these products, evaluate
procedures for customer identity
verification, and develop risk mitigation
strategies.
To estimate the financial impact to
businesses of developing a CIP, the
Department estimated the number of
firms likely impacted by the proposed
rule, the share of potentially impacted
firms likely to devote time and
resources to developing a CIP, the
number of hours needed to develop a
CIP, and the wages of the employees
tasked with developing a CIP. A
detailed breakdown of the framework
for estimating these costs can be found
in table 2.
13
Annualized cost per
entity over 10 years at
3% rate($)
206
206
14
Total annualized costs at
7% discount rate ($)
Total annualized costs at
3% discount rate ($)
3,004
397,308
years at a 7% discount
rate.
Line 10 is a one-time
cost per firm to learn
about the proposed
rule. Line 13
annualizes that onetime cost over 10
years at a 3% discount
rate.
Line 3 * Line 12
2,569
339,839
Line 3 * Line 13
15
Table 2: Framework for Estimating Costs Associated with Developing a CIP
25
1,837
Low estimate is
based on a supply
chain analysis of a
core group of
companies directly
affected by the
proposed rule. High
estimate is based on
an anal sis of
EP29JA24.007
Entities potentially
impacted by the proposed
rule
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00014
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.006
ddrumheller on DSK120RN23PROD with PROPOSALS3
1
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
5711
industries that resell
IaaS products.
2
Share of potentially
impacted entities likely to
devote time and resources
to developing a CIP
0.8
1
3
Entities likely to devote
time and resources to
developing a CIP
Operations manager hours
20
1,837
80
80
5
Operations manager
hourly wage, doubled to
account for benefits and
overhead ($)
118
118
6
Operations manager cost
per entity($)
Total initial cost to
develop a CIP ($)
Annualized cost per entity
over 10 years at 7% rate
9,440
9,440
This is an estimate
of how long it is
likely to take an
operations manager
to develop a CIP.
This is the BLS
estimate for the
mean hourly wage
of an operations
manager, doubled
to reflect benefits
and overhead.
Line 4 * Line 5
188,800
17,341,280
Line 3 * Line 6
1,256
1,256
Line 6 is a one-time
cost per firm to
develop a CIP. Line
8 annualizes that
one-time cost over
10 years at a 7%
discount rate.
7
8
ddrumheller on DSK120RN23PROD with PROPOSALS3
($)
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00015
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.008
4
The Department
estimate that some
entities already
have performed the
work needed to
establish a CIP and
thus will not need
to devote time and
resources to
developing one.
The high-end
estimate assumes
all providers will
have to change
their existing
procedures to come
into compliance
with this proposed
rule.
Line 1 * Line 2
5712
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
iii. Implementing the CIP
Implementation of a CIP would likely
entail: collecting and verifying
identifying information of customers,
maintaining a secure recordkeeping
system, performing due-diligence
checks using government lists of known
malicious cyber actors, and providing
annual reports to the Department. The
proposed rule would also require
entities to monitor aspects of
compliance with their foreign customers
and resellers. The costs estimated for
implementing a CIP would be incurred
annually. To estimate the financial
impact to businesses of implementing a
CIP, the Department estimated the
number of firms potentially impacted by
the proposed rule, the share of
potentially impacted firms likely to
implement a CIP, and the wages of the
employees performing these tasks. A
detailed breakdown of the framework
for estimating these costs can be found
in table 3.
9
Annualized cost per entity
over 10 years at 3% rate
($)
1,074
1,074
10
Total annualized costs at
7% discount rate ($)
Total annualized costs at
3% discount rate($)
25,122
2,307,484
Line 6 is a one-time
cost per firm to
develop a CIP. Line
9 annualizes that
one-time cost over
10 years at a 3%
discount rate.
Line 3 * Line 8
21,488
1,973,716
Line 3 * Line 9
11
Table 3: Framework for Estimating Costs Associated with Implementing a CIP
25
1,837
Low estimate is
based on a supply
chain analysis of a
core group of
companies directly
affected by the
proposed rule. High
estimate is based on
EP29JA24.010
Entities potentially
impacted by the proposed
rule
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00016
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.009
ddrumheller on DSK120RN23PROD with PROPOSALS3
1
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
5713
an analysis of
industries that resell
IaaS products.
Share of potentially
impacted entities likely to
devote time and resources
to implementing a CIP
0.8
1
3
Entities likely to devote
time and resources to
implementing a CIP
Number of new Accounts
subject to the proposed
rule per firm per year
20
1,837
100
1,000
4
Operations manager hours
to perform analysis and
due diligence per new
account
0.3
0.3
6
Total Operations manager
hours to perform analysis
and due diligence per new
account
Operations manager
hourly wage, doubled to
account for benefits and
overhead ($)
33
330
118
118
39
39
This is the BLS
estimate for the
mean hourly wage
of an operations
manager, doubled
to reflect benefits
and overhead.
Line 5 * Line 7
3,894
38,940
Line 4 * Line 8
77,880
71,532,780
Line 3 * Line 9
8
ddrumheller on DSK120RN23PROD with PROPOSALS3
This is an estimate
of the number of
transactions for
each provider likely
to be subject to CIP
requirements in a
given year.
This is an estimate
of the number of
hours we expect
would be needed to
collect customer
identification
information and
verify that
information.
Line 4 * Line 5
5
7
9
10
VerDate Sep<11>2014
We expect all
entities that develop
a CIP will
implement the CIP.
Thus, these
estimates are
identical to those in
table 2.
Line 1 * Line 2
Operations manager cost
per transaction ($)
Operations manager
annual cost per entity($)
Total annual cost($)
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00017
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.011
2
5714
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
iv. Updating the CIP
The proposed rule would require that
affected entities regularly, at least
annually, update their CIPs to account
for new technologies, cybersecurity
vulnerabilities, and changes to their
business. This would likely entail
reviewing the threat landscape from the
previous year and identifying system
vulnerabilities. Table 4 details the
estimated financial impact to businesses
of annually updating a CIP.
Table 4: Framework for Estimating Costs Associated with Updating the CIP
I
Entities potentially
impacted by the
proposed rule
25
2
Share of potentially
impacted entities
likely to devote
time and resources
to updating a CIP
0.8
I
3
Entities likely to
devote time and
resources to
updating a CIP
Number of CIP
updates necessary
annually
20
1,837
I
3
Operations manager
hours to review and
assess service
20
80
Item
'
'
4
ddrumheller on DSK120RN23PROD with PROPOSALS3
5
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00018
Fmt 4701
Sfmt 4725
'Basis for estimate
Low estimate is based on
a supply chain analysis
of a core group of
companies directly
affected by the proposed
rule. High estimate is
based on an analysis of
industries that resell IaaS
products.
We expect all entities
that develop a CIP will
conduct an annual
update. Thus, these
estimates are identical to
those in tables 2 and 3.
Line I * Line 2
Low estimate is based on
the assumption that
businesses are only
updating their CIPs once
annually. High estimate
is based on 2 off-cycle
major changes in the
business and threat
landscape requiring
additional updates.
We estimate 0.5 to 2
weeks, depending on the
complexity of business
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.012
Low Estimate
High
Estimate
1,837
Line
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
6
118
118
Operations manager
cost per update ($)
Lawyer hours to
review CIP updates
2,360
9,440
16
24
9
Lawyer hourly
wage, doubled to
account for benefits
and overhead ($)
157
157
10
Lawyer cost per
update($)
Total cost per
update($)
Annual cost per
entity($)
Total annual cost
($)
2,512
3,768
We estimate
approximately 2-3 days
to review updated CIPs.
This is the BLS estimate
for the mean hourly wage
of a lawyer, doubled to
reflect benefits and
overhead.
Line 8 * Line 9
4,872
13,208
Line 7 + Line 10
4,872
39,624
Line 11 * Line 4
97,440
72,789,288
Line 12 * Line 3
7
8
11
12
13
v. Annual Certifications
The proposed rule would require IaaS
providers to annually certify to the
Department that they have updated their
CIP, that their CIP complies with the
rulemaking, and that they have recorded
the resolution of each situation in which
ddrumheller on DSK120RN23PROD with PROPOSALS3
changes, magnitude of
threats faced, and depth
of customer base.
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
the IaaS provider was unable to verify
the identity of a customer since its last
certification.
The estimated costs of submitting
annual certifications would occur
annually. This estimate for costs is
derived from estimates of the number of
firms impacted by the proposed rule,
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
This is the BLS estimate
for the mean hourly wage
of an operations
manager, doubled to
reflect benefits and
overhead.
Line 5 * Line 6
the share of potentially impacted firms
likely to submit the annual
certifications, and the wages of the
employees performing these tasks. A
detailed breakdown of the framework
for estimating these costs can be found
in table 5.
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.013
offerings, threat
landscape, and
failure to verify
customer identities
Operations manager
hourly wage,
doubled to account
for benefits and
overhead ($)
5715
5716
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Table 5: Framework for Estimating Costs Associated with Annual Certifications
1
Entities
potentially
impacted by the
proposed rule
25
1,837
2
Share of
potentially
impacted entities
likely to devote
time and
resources to
submitting
annual
certifications.
Entities likely to
devote time and
resources to
submitting
annual
certifications.
Operations
manager hours to
.
.
review pnor year
compliance, CIP
updates, and
submit
certification.
Operations
manager hourly
wage, doubled to
account for
benefits and
overhead $
Operations
manager cost per
entit $
0.8
1
20
1,837
Line 1 * Line 2
8
24
118
118
This is an estimate of the
time needed to evaluate the
provider's customer base,
account offerings, and
current vulnerabilities to
prepare the annual
certification.
This is the BLS estimate
for the mean hourly wage
of an operations manager,
doubled to reflect benefits
and overhead.
944
2,832
4
5
ddrumheller on DSK120RN23PROD with PROPOSALS3
6
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00020
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
Line 4 * Line 5
29JAP3
EP29JA24.014
3
Low estimate is based on a
supply chain analysis of a
core group of companies
directly affected by the
proposed rule. High
estimate is based on an
analysis of industries that
resell IaaS roducts.
We expect all entities that
develop a CIP will submit
an Annual Certification.
Thus, these estimates are
identical to those in tables
2 and 3.
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
7
8
9
10
11
12
Total Annual
Operations
manager cost ($)
Lawyer hours to
review annual
recertifi cations
18,880
5,202,384
Line 3 * Line 6
5
5
Lawyer hourly
wage, doubled to
account for
benefits and
overhead ($)
Lawyer cost per
annual
certifications ($)
Total annual
lawyer cost ($)
Total annual cost
157
157
785
785
This is an estimate of the
time needed for a lawyer to
review a provider's annual
certification prior to
submission to the
Department
This is the BLS estimate
for the mean hourly wage
of a lawyer, doubled to
reflect benefits and
overhead.
Line 8 * Line 9
15,700
1,442,045
Line 3 * Line 10
34,580
6,644,429
Line 7 + Line 11
5717
($)
ddrumheller on DSK120RN23PROD with PROPOSALS3
The burden of learning about the
proposed rule, and developing,
maintaining, and recertifying CIPs for
foreign resellers would fall upon foreign
entities (the foreign resellers
themselves). However, the Department
recognizes that U.S. IaaS providers
would be part of educating foreign
resellers on regulatory requirements.
U.S. IaaS providers would also need to
collect and submit CIPs from foreign
resellers. The Department anticipates
that foreign resellers of U.S. IaaS
providers would comply with the
regulatory requirements, so does not
anticipate there to be impact beyond the
regulatory costs of compliance (which
will fall to foreign entities), and the
burden on U.S. providers to educate
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
foreign resellers and process foreign
reseller CIPs.
The Department recognizes that
individual costs to industry would vary
according to the number of foreign
resellers connected to a U.S. IaaS
provider. However, the Department is
unable to estimate the potential number
of foreign resellers of U.S. IaaS
products, as this information is business
proprietary information held by the U.S.
IaaS providers. Following the
implementation of CIP reporting
requirements to the Department, the
Department may be able to estimate a
lower bound and upper bound on
potential cost per CIP certification.
However, at this time, due to the
described limitations, the cost estimates
have been made on a programmatic
basis as opposed to a per CIP
certification basis.
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
vii. Educating Foreign Resellers on U.S.
CIP Requirements
U.S. IaaS providers would be required
to ensure their foreign resellers comply
with this proposed rule and to ensure
they receive CIPs from their foreign
resellers. This could involve notifying
their foreign resellers of this proposed
rule’s requirements, advising foreign
resellers on CIP solutions or processes,
and generally educating foreign resellers
about this rulemaking.
This estimate for costs is derived from
estimates of the number of U.S. firms
impacted by the proposed rule, the
share of potentially impacted firms to
educate their foreign resellers, and the
wages of the employees performing
these tasks. A detailed breakdown of the
framework for estimating these costs can
be found in table 6.
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.015
vi. Foreign Reseller Requirements
5718
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Table 6: Framework for Estimating Costs for U.S. IaaS Providers to Educate
VerDate Sep<11>2014
1
Entities potentially
impacted by the proposed
rule
25
1,837
2
Share of potentially
impacted entities likely to
devote time and resources
to educating their foreign
resellers about the proposed
rule
0.25
0.75
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00022
Fmt 4701
Sfmt 4725
Low estimate is based on
a supply chain analysis
of a core group of
companies directly
affected by the proposed
rule. High estimate is
based on an analysis of
industries that resell IaaS
roducts.
The Department
estimates that roughly
half of U.S. IaaS
providers have at least
one foreign reseller and
will conse uentl devote
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.016
ddrumheller on DSK120RN23PROD with PROPOSALS3
Foreign Resellers on U.S. CIP Requirements
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
4
1,378
120
120
This is an estimate of the
number of hours we
expect would be needed
for an operations
manager to educate their
foreign resellers about
the proposed rule and aid
them in developing and
running a program. We
estimate approximately 3
weeks, based on the 2
weeks estimated for an
operations manager to
develop a CIP (table 2),
plus an additional 1
week.
This is the BLS estimate
for the mean hourly wage
of an operations
manager, doubled to
reflect benefits and
overhead.
Line 4 * Line 5
Operations manager hourly
wage, doubled to account
for benefits and overhead
($)
118
118
6
Operations manager cost
oer entitv ($)
Lawyer hours to consult
with operations managers
and foreign resellers about
foreign reseller CIP
requirements
Lawyer hourly wage,
doubled to account for
benefits and overhead ($)
14,160
14,160
10
10
We estimate
approximately 10 hours
of work spread out over
the course of a year.
157
157
Lawyer cost per entity ($)
1,570
1,570
This is the BLS estimate
for the mean hourly wage
of a lawyer, doubled to
reflect benefits and
overhead.
Line 7 * Line 8
8
ddrumheller on DSK120RN23PROD with PROPOSALS3
6
5
7
9
VerDate Sep<11>2014
Entities likely to devote
time and resources to
educating their foreign
resellers about the proposed
rule
Operations manager hours
to educate their foreign
resellers about the proposed
rule
time to educating the
reseller on the provisions
of this proposed rule.
Given that most foreign
reseller arrangements are
not public information,
the Department seeks
comment on this
estimate.
Line 1 * Line 2
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00023
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.017
3
5719
5720
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
The costs to U.S. IaaS providers
associated with processing reporting
from foreign resellers include costs of
collecting and submitting to the
Department upon request the CIPs from
any foreign resellers, as well as any
associated miscellaneous administrative
10
11
12
Total initial costs per entity
to educate foreign resellers
($)
Total initial costs to educate
foreign resellers ($)
Annualized cost per entity
over 10 years at 7% rate ($)
need to process foreign reseller CIPs and
reports on foreign customers using their
U.S. IaaS products in a covered
transaction for large AI model training,
and the wages of the employees
performing these tasks. A detailed
breakdown of the framework for
estimating these costs can be found in
table 7.
15,730
15,730
Line 6 + Line 9
98,313
21,672,008
Line 3 * Line 10
2,093
2,093
13
Annualized cost per entity
over 10 years at 3% rate($)
1,790
1,790
14
Total annualized costs at
7% discount rate ($)
Total annualized costs at
3% discount rate ($)
13,082
2,883,744
Line 10 is a one-time
cost per firm to learn
about the proposed rule.
Line 12 annualizes that
one-time cost over 10
years at a 7% discount
rate.
Line 10 is a one-time
cost per firm to learn
about the proposed rule.
Line 13 annualizes that
one-time cost over 10
years at a 3% discount
rate.
Line 3 * Line 12
11,190
2,466,622
Line 3 * Line 13
15
ddrumheller on DSK120RN23PROD with PROPOSALS3
costs. Processing reporting also would
include U.S. IaaS providers’ activities to
report on any of their foreign customers
using their U.S. IaaS products in a
covered transaction for large AI model
training. These would be annual costs.
This estimate for costs is derived from
estimates of the number of U.S. firms
impacted by the proposed rule, the
share of potentially impacted firms that
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00024
Fmt 4701
Sfmt 4725
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.018
viii. Processing Reporting From Foreign
Resellers and on AI Training Runs
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
5721
Table 7: Framework for Estimating Costs for U.S. IaaS Providers to Process
Reporting from Foreign Resellers and on AI Training Runs
Entities
potentially
impacted by the
proposed rule
25
1,837
2
Share of
potentially
impacted entities
likely to devote
time and
resources to
processing
reporting from
and on foreign
resellers and
foreign customers
0.25
0.75
3
Entities likely to
devote time and
resources to
processmg
reporting from
and on foreign
resellers and
forei n customers
Operations
manager hours to
process reporting
from and on
foreign resellers
and foreign
customers
6
1,378
8
40
Operations
manager hourly
wa e, doubled to
118
118
ddrumheller on DSK120RN23PROD with PROPOSALS3
4
5
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00025
Fmt 4701
Sfmt 4725
Low estimate is based on a
supply chain analysis of a core
group of companies directly
affected by the proposed rule.
High estimate is based on an
analysis of industries that
resell laaS roducts.
The Department estimates that
roughly half of U.S. IaaS
providers have at least one
foreign reseller and will
consequently dedicate time to
processing the reporting from
the reseller(s) pursuant to this
proposed rule. As such, this
calculation is identical to the
one in table 6, and the
Department similarly seeks
comment on this estimate.
Line 1 * Line 2
This is an estimate of the
number of hours we expect
would be needed for an
operations manager to intake,
review, collate, and submit to
the Department the reporting
from foreign resellers. We
estimate approximately 1 day
to 1 week of work spread out
over the course of a year,
depending on the number of
foreign resellers and scope of
their business.
This is the BLS estimate for
the mean hourly wage of an
o erations mana er, doubled
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.019
1
5722
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
5. Potential Economic Impact of the
Proposed Rule
Using the methodology described
above, the Department has broken out
6
7
8
9
10
11
12
the estimated compliance costs—
summarized in tables 8 and 9—
associated with the proposed rule’s
implementation. The cumulative costs
account for
benefits and
overhead ($)
Operations
manager cost per
entitv ($)
Total Annual
Operations
manager cost ($)
Lawyer hours to
advise on
reporting from
and on foreign
resellers and
foreign customers
Lawyer hourly
wage, doubled to
account for
benefits and
overhead ($)
Lawyer cost per
entity($)
Total Annual
Lawver cost ($)
Total annual cost
($)
are estimated to be between $270,672
and $171.7 million.
to reflect benefits and
overhead.
944
4720
Line 4 * Line 5
5,900
6,502,980
Line 3 * Line 6
20
40
157
157
We estimate approximately
0.5-1 week of work spread out
over the course of a year to
support operations managers in
the review and submission to
the Department of foreign
reseller reporting.
This is the BLS estimate for
the mean hourly wage of a
lawyer, doubled to reflect
benefits and overhead.
3,140
6,280
Line 8 * Line 9
19,625
8,652,270
Line 3 * Line 10
25,525
15,155,250
Line 7 + Line 11
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
PO 00000
Frm 00026
Fmt 4701
Sfmt 4725
$3,004
$25,122
$77,880
$97,440
$34,580
$397,308
$2,307,484
$71,532,780
$72,789,288
$6,644,429
$13,082
$2,883,744
$25,525
$276,633
$15,155,250
$171,710,283
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.021
1. Leaming about the proposed rule (annualized at 7%)
2. Developing a CIP (annualized at 7%)
3. Implementing the CIP
4. Updating the CIP
5. Annual Certifications
6. Education on U.S. CIP Requirements (annualized at
7%
7. Processing Reports on and from Foreign Entities
Total (annualized at 7%)
EP29JA24.020
ddrumheller on DSK120RN23PROD with PROPOSALS3
Table 8: Estimates for the Cost of the IaaS Proposed Rule (Annualized at 7%)
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
5723
Table 9: Estimates for the Cost of the IaaS Proposed Rule (Annualized at 3%)
$339,839
$2,569
$1,973,716
$21,488
$77,880 $71,532,780
$97,440 $72,789,288
$6,644,429
$34,580
$2,466,622
$11,190
$25,525 $15,155,250
$170,901,92
$270,672
3
1. Leaming about the proposed rule (annualized at 3%)
2. Developing a CIP (annualized at 3%)
3. Implementing the CIP
4. Updating the CIP
5. Annual Certifications
6. Education on U.S. CIP Requirements (annualized at 3%)
7. Processing Reports on and from Foreign Entities
Total (annualized at 3%)
The ICTS industry, which includes
IaaS products, has become integral to
the daily operations and functionality of
U.S. critical infrastructure, to U.S.
Government operations, and to the U.S.
economy as a whole. As such,
exploitation of vulnerabilities within
the ICTS supply chain can have a
drastic effect on the U.S. national
security. As noted in E.O. 13984,
‘‘foreign malicious cyber actors aim to
harm the United States economy
through the theft of intellectual property
and sensitive data and to threaten
national security by targeting United
States critical infrastructure for
malicious cyber-enabled activities.’’
U.S. entities providing IaaS products,
such as network management or data
storage, can create multiple
opportunities for foreign adversaries to
exploit potential vulnerabilities in the
ICTS ecosystem. These potential
vulnerabilities are often categorized
under the general concepts of threats to
privacy, data integrity, and denial of
service.
As E.O. 13984 highlights, foreign
actors can exploit IaaS product
vulnerabilities to steal critical
intellectual property, health data,
government information, or financial
user information, potentially without
detection. Once detected, the existence
of such vulnerabilities may be extremely
costly or impossible to remedy.
Malicious foreign actors can also
exploit U.S. networks and systems to
facilitate data breaches, potentially
modifying critical files or data streams,
or otherwise impacting the availability
of data across U.S. networks. Such
capabilities could be exercised in areas
as diverse as financial market
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
communications, satellite control
systems, or other sensitive sectors.
Further, a foreign adversary could
target vulnerable IaaS products to
implement denial of service attacks,
potentially causing widespread
disruptions to critical industries.
Without effective attribution, it is
difficult for authorities to take
mitigating actions to trace and prevent
these types of attacks.
These risks, if exploited, could carry
significant economic and social costs to
both the U.S. Government and
consumers. Sophisticated cyber-attacks
are often obfuscated, making it difficult
to establish the exact number of attacks
that have leveraged IaaS product
vulnerabilities against the U.S. ICTS
supply chain. Such attacks, however,
are increasing in frequency, exacting
heavy tolls on U.S. consumers and
businesses. Not only can attacks impact
both sales and productivity, but they
can also enact direct costs on businesses
that must expend significant resources
to remedy vulnerabilities or even pay
ransom to retrieve data lost to attackers.
While the Department is unable to
calculate with certainty the number of
attacks targeting the IaaS industry, the
potential costs from these attacks are
undoubtedly high. Additionally, if the
use of IaaS products is expected to
increase in the future, so too would the
possibility of attacks. While the
Department lacks the data necessary to
determine precisely the monetary
benefits of this proposed rule to
compare with its estimated costs,
significant portions of the U.S. economy
are dependent on resilient ICTS and
IaaS supply chains to function, and any
disruption to these supply chains will
cause significant economic harm to
downstream industries.
PO 00000
Frm 00027
Fmt 4701
Sfmt 4702
7. Regulatory Alternatives
The Department considered several
alternatives to this regulation to reduce
the costs. These are explained in detail
in subpart C, Regulatory Flexibility
Analysis, of this section, below.
A. Regulatory Flexibility Act
In compliance with section 603 of the
Regulatory Flexibility Act (RFA), 5
U.S.C. 601–612, the Department has
prepared an initial regulatory flexibility
analysis (IRFA) for this proposed rule.
The IRFA describes the economic
impacts the proposed action may have
on small entities. The Department seeks
comments on all aspects of the IRFA,
including the categories and numbers of
small entities that may be directly
impacted by this proposed rule.
(1) A description of the reasons why
action by the agency is being
considered. The description of the
reasons why the proposed rule is being
considered is contained earlier in the
preamble and is not repeated here.
(2) A succinct statement of the
objectives of, and legal basis for, the
proposed rule. The Department is
proposing this rule to comply with
Executive Order 13984, ‘‘Taking
Additional Steps To Address the
National Emergency With Respect to
Significant Malicious Cyber-Enabled
Activities’’ (86 FR 6387), and E.O.
14110, ‘‘Safe, Secure, and Trustworthy
Development and Use of Artificial
Intelligence’’ (88 FR 75191). E.O. 13984
directs the Secretary to propose
regulations requiring U.S. IaaS
providers to collect customer
identifying information from
prospective customers and to verify the
identity of all foreign customers. This
E.O. further requires the Secretary to
propose regulations authorizing the
E:\FR\FM\29JAP3.SGM
29JAP3
EP29JA24.022
ddrumheller on DSK120RN23PROD with PROPOSALS3
6. Benefits of the Proposed Rule
ddrumheller on DSK120RN23PROD with PROPOSALS3
5724
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Secretary to utilize one of two special
measures to limit or prohibit specific
IaaS Accounts should the Secretary, in
consultation with various heads of other
Executive agencies, determine that
reasonable grounds exist to conclude
the IaaS Account is being used to
conduct malicious, cyber-enabled
activity. E.O. 14110 also requires the
Secretary to propose regulations that
require U.S. IaaS providers report to the
Department when they transact with a
foreign reseller to train a large AI model
with potential capabilities that could be
used in malicious cyber-enabled
activity.
(3) A description of, and where
feasible, an estimate of the number of
small entities to which the proposed
rule will apply. The proposed rule
would apply to all providers of U.S.
IaaS products, including resellers. The
Department acknowledges that actions
taken pursuant to this proposed rule
may affect small entities or groups that
are not easily categorized at present.
The Department assesses, based on
publicly available information, that the
IaaS market is dominated by four large
providers; however, it is difficult to
ascertain how many small entities, are
present in this market. For resellers,
Survey of U.S. Business Data suggests
that approximately 99 percent of the
roughly 1,800 enterprises categorized as
‘‘Telecommunications Resellers’’ under
NAICS code 517911 have fewer than
500 employees, indicating that the vast
number of those resellers would be
small businesses under the Small
Business Administration (SBA)
threshold for this NAICS code (https://
www.sba.gov/document/support-tablesize-standards). However, the
Department lacks data on the number of
these Telecommunications Resellers
that offer IaaS products.
(4) A description of the projected
reporting, recordkeeping and other
compliance requirements of the
proposed rule, including an estimate of
the classes of small entities that will be
subject to the requirement and the type
of professional skills necessary for
preparation of the report or record. The
proposed rule would impose on all U.S.
IaaS providers of U.S. IaaS products a
new requirement to identity and verify
the identity of all foreign customers. It
would require providers to ensure that
foreign resellers of their U.S. IaaS
products verify the identity of foreign
users. It would require all U.S. IaaS
providers of U.S. IaaS products to report
to the Department information on
instances of training runs by foreign
persons for large AI model with
potential capabilities that could be used
in malicious cyber-enabled activity.
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
Finally, it would require providers to
submit annual certifications attesting to
the Department that they have reviewed
their CIPs and adjusted them to account
for changes to the threat landscape since
their prior certification. The Department
believes this requirement would create
the following recordkeeping obligations:
(i) The proposed rule would require
that the customer identification and
verification requirement be satisfied by
obtaining identification information
from each customer. The provider
would then be required to verify
customer identities through
documentary or non-documentary
methods and to maintain in its records
for two years a description of (i) any
document relied on for verification, (ii)
any such non-documentary methods
and results of such measures
undertaken, and (iii) the resolution of
any substantive discrepancies
discovered in verifying the
identification information. The
Department estimates that the
identification, verification, and
recordkeeping requirements in the
proposed rule would require an IaaS
provider employee twenty (20) minutes,
on average, to fulfill.
(ii) Annual Certifications. The
proposed rule would require that U.S.
IaaS providers of U.S. IaaS products
provide to the Department annual
certifications that indicate that the
provider has updated their customer
identification program to account for
technological advances and the evolving
threat landscape. The Department
estimates it would require eight (8) to
twenty-four (24) hours to review prior
year compliance, complete CIP updates,
and submit certification.
(iii) The proposed rule would require
providers to submit a report to the
Department whenever a foreign person
transacts with them to train a large AI
model with potential capabilities that
could be used in malicious cyberenabled activity. The Department
estimates that an IaaS provider making
a report on such a transaction could take
on average twenty (20) minutes,
depending on the complexity of the
instance.
(5) An identification, to the extent
practicable, of all relevant Federal rules
that may duplicate, overlap or conflict
with the proposed rule. This rulemaking
does not duplicate or conflict with any
Federal rules.
(6) A description of any significant
alternatives to the proposed rule that
accomplish the stated objectives of
Executive Order 13984 and Executive
Order 14110 and applicable statutes
and that would minimize any
PO 00000
Frm 00028
Fmt 4701
Sfmt 4702
significant economic impact of the
proposed rule on small entities.
• No-action alternative: Not
implementing a rule under these
Executive orders (E.O.s) is not a viable
alternative because both E.O.s expressly
direct that the Secretary ‘‘shall propose
for notice and comment regulations’’
given the related national security
concerns associated with malicious
cyber-enabled activities through the use
of U.S. IaaS products.
• Alternative that would categorically
exclude small entities or groups of small
entities: This alternative would not
achieve the national security objectives
of these E.O.s. Due to the nature of ICTS
networks, allowing even small entities
or groups of small entities unregulated
access to IaaS products or services can
allow malicious actors to perpetrate
attacks on the entire network, posing an
undue risk to U.S. critical infrastructure
and the U.S. economy as a whole.
• Preferred alternative: The proposed
rule is the preferred alternative. It
would achieve the objectives of the
E.O.s by requiring IaaS providers to
verify customer identities and
facilitating the implementation of
special measures that would allow the
Secretary to apply a case-by-case, factspecific process to identify, assess, and
address any and all IaaS Accounts that
pose an undue risk to the U.S. national
security. The proposed rule also offers
an exemption program that would offer
providers an alternative to the CIP
requirements to reduce their compliance
burdens, as providers can decide
whether it is less burdensome to
implement a CIP or to apply for an
exemption.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995
(44 U.S.C. 3501 et seq.) (PRA) provides
that an agency generally cannot conduct
or sponsor a collection of information,
and no person is required to respond to
nor be subject to a penalty for failure to
comply with a collection of information
subject to the requirements of the PRA,
unless that collection has obtained
Office of Management and Budget
(OMB) approval and displays a
currently valid OMB Control Number.
This proposed rule contains new
collection-of-information requirements
subject to review and approval by OMB
under the PRA. Specifically, this
proposed rule would require U.S. IaaS
providers of U.S. IaaS products to
develop a written CIP, which dictates
how the provider would collect
identifying information about its
customers, how the provider would
verify the identity of its foreign
customers, store and maintain
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
identifying information, and notify its
customers about the disclosure of
identifying information. Additionally,
the proposed rule would require
providers to report to the Department
information on instances of training
runs by foreign persons for large AI
models with potential capabilities that
could be used in malicious cyberenabled activity. The Department
requests comment on what additional
information, if any, the Department
should require providers report.
Moreover, the proposed rule would
require that U.S. IaaS providers of U.S.
IaaS products submit to the Department
an initial certification, and subsequent
annual certifications, detailing certain
aspects of their CIPs and stating that
they have reviewed their CIP and
adjusted it to account for changes to the
threat landscape since their prior
certification. These certifications would
also include an attestation that the
current CIP complies with the
provisions of the proposed rule. The
attestations would require the provider
to indicate the frequency with which it
was unable to verify the identity of a
foreign customer in the prior calendar
year and the number of times the
provider refused to open an Account.
Alternatively, under the proposed
rule, U.S. IaaS providers of U.S. IaaS
products may seek an exemption from
the CIP requirement by providing a
written submission to the Secretary.
Should the Secretary grant an
exemption on the basis of a finding that
the provider complies with security best
practices to deter abuse of IaaS
products, including that the provider
has established an Abuse of IaaS
Products Deterrence Program, the
provider must thereafter submit annual
notifications to the Department so that
the Department could be assured that it
continues to maintain security best
practices to deter the abuse of U.S. IaaS
products.
Public reporting burden for the
reporting and recordkeeping
requirements are estimated to average
245,229 hours for the initial learning,
developing, and implementing a CIP for
the relevant industry participants (897
respondents * 274 hours, tables 1, 2,
and 3). Thereafter, the Department
estimates a public reporting burden of
84,494 hours to update and annually
certify with the Department a CIP once
it has been developed, as well as
prepare the annual certification (929
respondents * 91 hours, tables 4 and 5).
The Department estimates a public
reporting burden of 127,328 hours for
the relevant industry participants to
educate their foreign resellers on the
proposed rule and process reporting
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
from and on foreign resellers and
foreign customers (692 respondents *
184 hours, tables 6 and 7). These
estimates include the time for reviewing
instructions, searching existing data
sources, gathering the data needed, and
completing and reviewing the collection
of information.
The total estimated cost to the U.S.
Government is $409,200 (500
notifications * 2 staff @GS–12 salary
($102.30/hr) * average of 10 hours each
to review for each notification). The
$102.30 per hour cost estimate for this
information collection is consistent with
the GS-scale salary data for a GS–12 step
5.
The Department requests comments
on the information collection and
recordkeeping requirements associated
with this proposed rule. These
comments will help the Department:
(i) evaluate whether the information
collection is necessary for the proper
performance of our agency’s functions,
including whether the information will
have practical utility;
(ii) evaluate the accuracy of our
estimate of the burden of the
information collection, including the
validity of the methodology and
assumptions used;
(iii) enhance the quality, utility, and
clarity of the information to be
collected; and
(iv) minimize the burden of the
information collection on those who are
to respond (such as through the use of
appropriate automated, electronic,
mechanical, or other technological
collection techniques or other forms of
information technology, e.g., permitting
electronic submission of responses).
C. Unfunded Mandates Reform Act of
1995
This proposed rule would not
produce a Federal mandate (under the
regulatory provisions of title II of the
Unfunded Mandates Reform Act of
1995) for State, local, and tribal
governments or the private sector.
D. Executive Order 13132 (Federalism)
This proposed rule does not contain
policies having federalism implications
requiring preparations of a Federalism
Summary Impact Statement.
E. Executive Order 12630
(Governmental Actions and Interference
With Constitutionally Protected
Property Rights)
This proposed rule does not contain
policies that have takings implications.
PO 00000
Frm 00029
Fmt 4701
Sfmt 4702
5725
F. Executive Order 13175 (Consultation
and Coordination With Indian Tribes)
The Department has analyzed this
proposed rule under Executive Order
13175 and has determined that the
action would not have a substantial
direct effect on one or more Indian
tribes, would not impose substantial
direct compliance costs on Indian tribal
governments, and would not preempt
tribal law.
G. National Environmental Policy Act
The Department has reviewed this
rulemaking action for the purposes of
the National Environmental Policy Act
(42 U.S.C. 4321 et seq.). It has
determined that this proposed rule
would not have a significant impact on
the quality of the human environment.
List of Subjects in 15 CFR Part 7
Administrative practice and
procedure, Business and industry,
Communications, Computer technology,
Critical infrastructure, Executive orders,
Foreign persons, Investigations,
National security, Penalties,
Technology, Telecommunications.
For the reasons set out in the
preamble, 15 CFR part 7 is proposed to
be amended as follows:
PART 7—SECURING THE
INFORMATION AND
COMMUNICATIONS TECHNOLOGY
AND SERVICES SUPPLY CHAIN
1. The authority citation for part 7 is
revised to read as follows:
■
Authority: 50 U.S.C. 1701, et seq.; 50
U.S.C. 1601, et seq.; E.O. 13873, 84 FR 22689,
3 CFR, 2019 Comp., p. 317; E.O. 13984, 86
FR 6837, 3 CFR, 2021 Comp., p. 403.
2. Add subpart D, consisting of
§§ 7.300 through 7.310, to read as
follows:
■
Subpart D—Infrastructure as a Service
Providers’ Responsibility To Verify the
Identity of Their Customers, Special
Measures, and the Use of Their
Products for Large AI Model Training
Sec.
7.300 Purpose and scope.
7.301 Definitions and application.
7.302 Customer Identification Program.
7.303 Foreign reseller requirements.
7.304 Customer Identification Program
reporting requirements.
7.305 Compliance assessments.
7.306 Customer Identification Program
exemptions.
7.307 Special measures for certain foreign
jurisdictions or foreign persons.
7.308 Reporting of large AI model training.
7.309 Enforcement.
7.310 Reporting violations.
E:\FR\FM\29JAP3.SGM
29JAP3
5726
§ 7.300
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Purpose and scope.
Foreign actors may use United States
Infrastructure as a Service (IaaS)
products for a variety of malicious
cyber-enabled activities. In light of these
threats, it is the purpose of this subpart
to:
(a) Require U.S. IaaS providers of U.S.
IaaS products to implement programs to
maintain certain records related to IaaS
Accounts in which foreign persons have
an interest and verify the identity of
such persons, and to require their
foreign resellers to do the same, in order
to facilitate law enforcement requests
for such records and otherwise
implement the provisions of Executive
Order 13984 and Executive Order
14110;
(b) Prevent foreign persons from using
U.S. IaaS products to conduct malicious
cyber-enabled activities; and
(c) Safeguard the national security of
the United States.
ddrumheller on DSK120RN23PROD with PROPOSALS3
§ 7.301
Definitions and application.
For the purposes of this subpart:
Artificial intelligence or AI has the
meaning set forth in 15 U.S.C. 9401(3).
AI model means a component of an
information system that implements AI
technology and uses computational,
statistical, or machine-learning
techniques to produce outputs from a
given set of inputs.
AI system means any data system,
software, hardware, application, tool, or
utility that operates in whole or in part
using AI.
Availability means ensuring timely
and reliable access to and use of
information and information systems by
an authorized person or system,
including resources provided as part of
a product or service.
Beneficial owner means an individual
who either:
(1) Exercises substantial control over
a customer; or
(2) Owns or controls at least 25
percent of the ownership interests of a
customer.
Confidentiality means preserving
authorized restrictions on information
access and disclosure, including means
for protecting personal privacy and
proprietary information.
Customer means any individual or
entity who contracts with an IaaS
provider to create or maintain an IaaS
Account with an IaaS provider.
Customer Identification Program or
CIP means a program created by a
United States IaaS provider of U.S. IaaS
products that dictates how the provider
will collect identifying information
about its customers, how the provider
will verify the identity of its foreign
customers, store and maintain
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
identifying information, and notify its
customers about the disclosure of
identifying information.
Department means the United States
Department of Commerce.
Disassociability means enabling the
processing of data or events without
association to individuals or devices
beyond the operational requirements of
the system.
Dual-use foundation model means:
(1) An AI model that is trained on
broad data; generally uses selfsupervision; contains at least tens of
billions of parameters; is applicable
across a wide range of contexts; and that
exhibits, or could be easily modified to
exhibit, high levels of performance at
tasks that pose a serious risk to security,
national economic security, national
public health or safety, or any
combination of those matters, such as
by:
(i) Substantially lowering the barrier
of entry for non-experts to design,
synthesize, acquire, or use chemical,
biological, radiological, or nuclear
(CBRN) weapons;
(ii) Enabling powerful offensive cyber
operations through automated
vulnerability discovery and exploitation
against a wide range of potential targets
of cyber attacks; or
(iii) Permitting the evasion of human
control or oversight through means of
deception or obfuscation.
(2) Models meet this definition even
if they are provided to end users with
technical safeguards that attempt to
prevent users from taking advantage of
the relevant unsafe capabilities.
Entity means a partnership,
association, trust, joint venture,
corporation, group, subgroup, or other
organization.
Floating-point operation means any
mathematical operation or assignment
involving floating-point numbers, which
are a subset of the real numbers
typically represented on computers by
an integer of fixed precision scaled by
an integer exponent of a fixed base.
Foreign beneficial owner means a
beneficial owner that is not a United
States person.
Foreign customer means a customer
that is not a United States person.
Foreign jurisdiction means any
country, subnational territory, or region,
other than those subject to the civil or
military jurisdiction of the United
States, in which any person or group of
persons exercises sovereign de facto or
de jure authority, including any such
country, subnational territory, or region
in which a person or group of persons
is assuming to exercise governmental
authority whether such a person or
PO 00000
Frm 00030
Fmt 4701
Sfmt 4702
group of persons has or has not been
recognized by the United States.
Foreign person means a person that is
not a United States person.
Foreign reseller or foreign reseller of
U.S. Infrastructure as a Service products
mean a foreign person who has
established an Infrastructure as a
Service Account to provide
Infrastructure as a Service products
subsequently, in whole or in part, to a
third party.
Generative AI means the class of AI
models that emulate the structure and
characteristics of input data in order to
generate derived synthetic content. This
can include images, videos, audio, text,
and other digital content.
Individual means any natural person.
Infrastructure as a Service Account or
Account means a formal business
relationship established to provide IaaS
products to a person in which details of
such transactions are recorded.
Infrastructure as a Service product or
IaaS product means a product or service
offered to a consumer, including
complimentary or ‘‘trial’’ offerings, that
provides processing, storage, networks,
or other fundamental computing
resources, and with which the consumer
is able to deploy and run software that
is not predefined, including operating
systems and applications. The consumer
typically does not manage or control
most of the underlying hardware but has
control over the operating systems,
storage, and any deployed applications.
The term is inclusive of ‘‘managed’’
products or services, in which the
provider is responsible for some aspects
of system configuration or maintenance,
and ‘‘unmanaged’’ products or services,
in which the provider is only
responsible for ensuring that the
product is available to the consumer.
The term is also inclusive of
‘‘virtualized’’ products and services, in
which the computing resources of a
physical machine are split between
virtualized computers accessible over
the internet (e.g., ‘‘virtual private
servers’’), and ‘‘dedicated’’ products or
services in which the total computing
resources of a physical machine are
provided to a single person (e.g., ‘‘baremetal servers’’).
Integer operation means any
mathematical operation or assignment
involving only integers, or whole
numbers expressed without a decimal
point.
Integrity means guarding against
improper information modification or
destruction and includes ensuring
information non-repudiation and
authenticity.
Knowledge has the meaning set out in
15 CFR 772.1.
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity means
any AI model with the technical
conditions of a dual-use foundation
model or otherwise has technical
parameters of concern, that has
capabilities that could be used to aid or
automate aspects of malicious cyberenabled activity, including but not
limited to social engineering attacks,
vulnerability discovery, denial-ofservice attacks, data poisoning, target
selection and prioritization,
disinformation or misinformation
generation and/or propagation, and
remote command-and-control of cyber
operations. A model shall be considered
to be a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity under
this definition if it meets the technical
conditions described in interpretive
rules issued by the Department and
published in the Federal Register.
Machine learning means a set of
techniques that can be used to train AI
algorithms on data to improve
performance at a task or tasks.
Malicious cyber-enabled activities
means activities, other than those
authorized by or in accordance with
U.S. law, that seek to compromise or
impair the confidentiality, integrity, or
availability of computer, information, or
communications systems, networks,
physical or virtual infrastructure
controlled by computers or information
systems, or information resident
thereon.
Manageability means providing the
capability for granular administration of
data, including alteration, deletion, and
selective disclosure.
Model weight means a numerical
parameter within an AI model that
helps determine the model’s outputs in
response to inputs.
Predictability means enabling reliable
assumptions by individuals, owners,
and operators about data and their
processing by a system, product, or
service.
Person means an individual or entity.
Privacy-preserving data sharing and
analytics means the use of privacyenhancing technologies to achieve
disassociability, predictability,
manageability, and confidentiality when
performing analytics on data.
Red Flag means a pattern, practice, or
specific activity that indicates the
possible existence of malicious cyberenabled activities.
Reseller means a person that
maintains a Reseller Account.
Reseller Account means an
Infrastructure as a Service Account
established to provide IaaS products to
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
a person who will then offer those
products subsequently, in whole or in
part, to a third party.
Risk-based means based on an
appropriate assessment of the relevant
risks, including those presented by the
various types of service offerings
maintained by the provider, the
methods used to open an Account, the
varying types of identifying information
available to the provider, and the
provider’s customer base.
Secretary means the Secretary of
Commerce or the Secretary’s designee.
Threat landscape means the broad
environment of geopolitical, economic,
and technological factors that must be
evaluated when developing risk-based
procedures that enable the provider to
form a reasonable belief of the true
identity of each account owner and
beneficial owner to deter facilitating
significant Malicious cyber-enabled
activities.
Training or training run refers to any
process by which an AI model learns
from data using computing power.
Transaction means any transfer of
value including any of the following,
whether proposed or completed: an
exchange of value for a good or service;
a merger, acquisition, or takeover; an
investment; and any other transfer,
agreement, or arrangement, the structure
of which is designed or intended to
evade or circumvent the application of
§ 7.307.
United States Infrastructure as a
Service product or U.S. IaaS product
means any Infrastructure as a Service
product owned by any United States
person or operated within the territory
of the United States.
United States Infrastructure as a
Service provider or U.S. IaaS provider
means any United States person that
offers any Infrastructure as a Service
product.
United States person or U.S. person
means any U.S. citizen, lawful
permanent resident of the United States
as defined by the Immigration and
Nationality Act, entity organized under
the laws of the United States or any
jurisdiction within the United States
(including foreign branches), or any
person located in the United States.
United States Reseller or U.S. Reseller
means a reseller that is a United States
person.
§ 7.302
Customer Identification Program.
(a) In general. Each U.S. IaaS provider
of U.S. IaaS products must maintain and
implement a written Customer
Identification Program (CIP) that meets
the requirements in this section.
(b) Scope of CIP. The CIP must be
appropriate for the IaaS providers’ size,
PO 00000
Frm 00031
Fmt 4701
Sfmt 4702
5727
type of IaaS products offered, and
relevant risks (including those
presented by the various types of service
offerings maintained by the IaaS
providers, the various methods of
opening Accounts, the varying types of
identifying information available, and
the IaaS providers’ customer base) that,
at a minimum, include each of the
requirements of this section. Any IaaS
provider who is only a reseller of U.S.
IaaS products, may, by agreement with
the initial U.S. IaaS provider, reference,
use, or adopt the initial U.S. IaaS
provider’s CIP for purposes of meeting
the requirements of this section.
(c) Foreign reseller CIP. As specified
in § 7.303(a), U.S. IaaS providers of U.S.
IaaS products must ensure that foreign
resellers of their U.S. IaaS products
maintain and implement a written CIP
that meets the requirements in this
paragraph (c) and paragraphs (d) and (e)
of this section.
(d) Identity verification procedures.
The CIP must include risk-based
procedures for verifying the identity of
each foreign customer to the extent it
enables the U.S. IaaS provider or foreign
reseller of U.S. IaaS products to form a
reasonable belief that it knows the true
identity of each customer.
(1) Customer information required. (i)
The CIP must contain procedures that
enable the U.S. IaaS provider or foreign
reseller of U.S. IaaS products to
determine whether a potential customer
and all beneficial owners are U.S.
persons. If the IaaS provider determines
the potential customer and all beneficial
owners are U.S. persons, this subpart
will not apply to any IaaS Account
opened for use by that U.S. person. U.S.
IaaS providers and foreign resellers of
U.S. IaaS products must exercise
reasonable due diligence to ascertain the
true identity of any customer or
beneficial owner of an Account who
claims to be a U.S. person.
(ii) The CIP must contain procedures
for opening an Account that specify the
identifying information that will be
obtained from each potential customer
and beneficial owner(s) of an Account
that will be used to determine whether
they are U.S. persons. These procedures
must provide U.S. IaaS providers or
foreign resellers of U.S. IaaS products
with a sound basis to verify the true
identity of their customer and beneficial
owners and reflect reasonable due
diligence efforts.
(iii) All U.S. IaaS providers and all of
their foreign resellers of U.S. IaaS
products must obtain, at a minimum,
the following information from any
potential foreign customer or foreign
beneficial owner prior to opening an
Account:
E:\FR\FM\29JAP3.SGM
29JAP3
5728
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
(A) Name, which shall be:
(1) For an individual, full legal name;
ddrumheller on DSK120RN23PROD with PROPOSALS3
or
(2) For an entity, business name,
including all names under which the
business is known to be or has been
doing business.
(B) Address, which shall be:
(1) For an individual, a residential or
business street address and the
location(s) from which the IaaS product
will be used.
(2) For an individual who does not
have a residential or business street
address, an Army Post Office (APO) or
Fleet Post Office (FPO) box number, and
the location(s) from which the IaaS
product will be used.
(3) For an entity, a principal place of
business, or if an entity is not a
business, the address to which inquiries
should be directed, and the location(s)
from which the IaaS product will be
used.
(4) For a person other than an
individual (such as a corporation,
partnership, or trust), the jurisdiction
under whose laws the person is
constituted or organized; and
(5) For a person other than an
individual (such as a corporation,
partnership, or trust), the name(s) of the
beneficial owner(s) of that Account.
(C) Means and source of payment for
the Account including:
(1) Credit card number;
(2) Account number;
(3) Customer identifier;
(4) Transaction identifier;
(5) Virtual currency wallet or wallet
address identifier;
(6) Equivalent payment processing
information, for alternative sources of
payment; or
(7) Any other payment sources or
types used.
(D) Email address.
(E) Telephonic contact information.
(F) internet protocol (IP) addresses
used for access or administration and
the date and time of each such access or
administrative action, related to ongoing
verification of such foreign person’s
ownership or control of such Account.
(2) Customer verification. The CIP
must contain procedures for verifying
the identity of the potential foreign
customer and beneficial owners of the
Account, including by using
information obtained in accordance
with paragraph (d)(1) of this section,
prior to opening the Account. The
procedures must include a documentary
verification method, as provided in
paragraph (d)(2)(i) of this section, a nondocumentary verification method, as
described in paragraph (d)(2)(ii) of this
section or a combination of both
methods.
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
(i) Verification through documents.
For an IaaS provider relying on
documents, the CIP must contain
procedures that set forth the documents
the IaaS provider will use and its
method for ascertaining the documents
are valid.
(ii) Verification through nondocumentary methods. For an IaaS
provider relying on non-documentary
methods, the CIP must contain
procedures that describe the nondocumentary methods the IaaS provider
will use.
(iii) Additional verification for certain
customers. The CIP must address
situations where, based on the IaaS
provider’s risk assessment of a new
Account opened by an entity, the IaaS
provider will obtain further information
about individuals and beneficial owners
of the Account, including signatories, in
order to verify the potential customer’s
identity. This verification method
applies only when the IaaS provider
cannot verify the potential customer’s
identity using the verification methods
described in paragraphs (d)(2)(i) and (ii)
of this section or when the attempted
verification leads the IaaS provider to
doubt the true identity of the potential
customer.
(iv) U.S. person accounts. If the IaaS
provider verifies, through the
procedures outlined in paragraphs
(d)(2)(i) through (iii) of this section, that
the customer and all beneficial owners
are U.S. persons, the Account will not
be subject to any other regulation in this
subpart.
(3) Lack of verification. The CIP must
include procedures for responding to
circumstances in which the U.S. IaaS
provider or foreign reseller of U.S. IaaS
products cannot form a reasonable belief
that it knows the identity of a customer
or beneficial owner. These procedures
should describe:
(i) When the IaaS provider should not
open an Account for the potential
customer;
(ii) The terms under which a customer
may use an Account while the IaaS
provider attempts to verify the identity
of a customer or beneficial owner of the
Account, such as restricted permission
or enhanced monitoring of the Account;
(iii) When the IaaS provider should
close an Account or subject it to other
measures, such as additional
monitoring, permitted to be used under
paragraph (d)(3)(ii) of this section, after
attempts to verify the identity of a
customer or beneficial owner of the
Account have failed; and
(iv) Other measures for account
management or redress for customers
whose identification could not be
PO 00000
Frm 00032
Fmt 4701
Sfmt 4702
verified or whose information may have
been compromised.
(e) Recordkeeping. The CIP must
include procedures for making and
maintaining a record of all information
obtained under the procedures
implementing paragraph (d) of this
section.
(1) Required records. At a minimum,
the record must include for any foreign
customer or beneficial owner buying
from a U.S. IaaS provider or foreign
reseller of U.S. IaaS products:
(i) All identifying information about a
customer or beneficial owner obtained
under paragraph (d) of this section;
(ii) A copy or description of any
document that was relied on under
paragraph (d)(2)(i) of this section;
(iii) A description of any methods and
the results of any measures undertaken
to verify the identity of the customer
and beneficial owners under paragraph
(d)(2)(ii) or (iii) of this section; and
(iv) A description of the resolution of
any substantive discrepancy discovered
when verifying the identifying
information obtained.
(2) Retention of records. U.S. IaaS
providers of U.S. IaaS products must
retain the records required under
paragraph (e)(1) of this section for at
least two years after the date the
Account is closed or the date the
Account was last accessed.
(3) Limits on third-party access to
records created and maintained
pursuant to this subpart. The CIP must
include methods to ensure that records
created and maintained pursuant to this
subpart will not be shared with any
third party, except insofar as such
access is otherwise consistent with this
subpart or lawful. Such methods should
include methods to prevent
unauthorized access to such records by
a third party or employee of the IaaS
provider without a need-to-know,
including encryption and/or other
methods to protect the availability,
integrity, and confidentiality of such
records. However, these limits need not
apply when sharing security best
practices or other threat information
with other U.S. IaaS providers of U.S.
IaaS products, or relevant consortia.
(f) Periodic review. The CIP must
include risk-based procedures for:
(1) Requiring a customer to notify the
IaaS provider when the customer adds
beneficial owners to its account; and
(2) Periodic continued verification of
the accuracy of the information
provided by a customer.
§ 7.303
Foreign reseller requirements.
(a) In general. U.S. IaaS providers that
contract with, enable, or otherwise
allow foreign resellers to resell their
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
U.S. IaaS products will be subject to
certain requirements. Each U.S. IaaS
provider must ensure that any foreign
reseller of its U.S. IaaS products
maintains and implements a written CIP
as specified in paragraph (b) of this
section and must furnish a foreign
reseller’s written CIP upon request from
the Department, as specified in
paragraph (c) of this section.
(b) CIP requirements. Each U.S. IaaS
provider must require that any foreign
reseller of its U.S. IaaS products
maintains and implements a written CIP
that meets the requirements set forth in
§ 7.302(d) through (f).
(c) Collecting and reporting on foreign
reseller CIPs. Each U.S. IaaS provider
must follow procedures related to
reporting on the implementation of CIPs
for each of the U.S. IaaS provider’s
foreign resellers as required in § 7.304(e)
and (f) and according to requirements
described in § 7.304(a) through (d).
(d) Furnishing records. Upon
receiving a request from the Department
for a foreign reseller’s written CIP, the
U.S. IaaS provider of U.S. IaaS products
must provide the foreign reseller’s
written CIP to the Department within
ten calendar days of the Department’s
request.
(e) Investigation, remediation, and
termination of foreign reseller
relationship. A U.S. IaaS provider must
ensure that its foreign resellers maintain
CIPs that comply with the requirements
set forth in § 7.302(c) through (e). A U.S.
IaaS provider must, upon receipt of
evidence that indicates the failure of a
foreign reseller to maintain or
implement a CIP or the lack of goodfaith efforts by the foreign reseller to
prevent the use of U.S. IaaS products for
malicious cyber-enabled activities, take
steps to close the foreign reseller
account and, if relevant, to report the
suspected or actual malicious cyberenabled activity discovered to relevant
authorities according to the procedures
the U.S. IaaS provider has described in
their CIP according to § 7.304(a)(2)(v).
The U.S. IaaS provider must terminate
the reseller relationship within 30
calendar days if the U.S. IaaS provider
has knowledge that the foreign reseller
has not remediated the issues identified
or discovered by the U.S. IaaS provider,
or if the continuation of the reseller
relationship otherwise increases the risk
its U.S. IaaS products may be used for
malicious cyber-enabled activity.
§ 7.304 Customer Identification Program
reporting requirements.
(a) Certification form. Each U.S. IaaS
provider must notify the Department of
implementation of its CIP and, if
relevant, the CIPs of each foreign
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
reseller of its U.S. IaaS products,
through submission of a CIP
certification form, which will include:
(1) A description of:
(i) The mechanisms, services,
software, systems, or tools the IaaS
provider uses to verify the identity of
foreign persons according to criteria
described in § 7.302(d);
(ii) The procedures the IaaS provider
uses to require a customer to notify the
IaaS provider of any changes to the
customer’s ownership—such as adding
or removing beneficial owners—and the
IaaS provider’s process for ongoing
verification of the accuracy of the
information provided by a customer;
(iii) The mechanisms, services,
software, systems, or tools used by the
IaaS provider to detect malicious cyber
activity;
(iv) The IaaS provider’s procedures
for requiring each foreign reseller to
maintain a CIP;
(v) The IaaS provider’s procedures for
identifying when a foreign person
transacts to train a large AI model with
potential capabilities that could be used
in malicious cyber-enabled activity,
pursuant to § 7.308; and
(vi) Name, title, email, and phone
number of the Primary Contact
responsible for managing the CIP;
(2) Information pertaining to the IaaS
provider’s provision of U.S. IaaS
products, including:
(i) A description of the IaaS provider’s
service offerings and customer bases in
foreign jurisdictions;
(ii) The number of employees in IaaS
provision and related services;
(iii) The mechanisms, services,
software, systems, or tools used by the
IaaS provider to detect malicious cyberenabled activity, to include a
description of how the mechanisms,
services, software, systems, or tools are
used;
(iv) The mechanisms, services,
software, systems, or tools used by the
IaaS provider to detect a training run
that could result in the training of a
large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity;
(v) The process the IaaS provider uses
to report any suspected or actual
malicious cyber activity discovered to
relevant authorities;
(vi) The number of IaaS customers;
(vii) The number and locations of the
IaaS provider’s foreign beneficial
owners;
(viii) A list of all foreign resellers of
IaaS products; and
(ix) The number of IaaS customer
accounts held by foreign customers
whose identity has not been verified,
including details on:
PO 00000
Frm 00033
Fmt 4701
Sfmt 4702
5729
(A) The date the IaaS provider
provisioned the account, or accounts,
for each customer whose identity is
unverified;
(B) A description and timeline of
actions the IaaS provider will take to
verify the identity of each customer;
(C) Any other information available to
the IaaS provider on the nature of the
account, or accounts, provided to each
unverified customer;
(D) The date the IaaS provider will
deprovision the accounts if the identity
of the customer continues to be
unverified; and
(E) Steps the IaaS provider will take
to ensure that foreign persons who
failed to verify their identities do not
reestablish new accounts; and
(3) An attestation that the written CIP
of the IaaS provider meets the standards
enumerated in § 7.302.
(b) Annual certification. U.S. IaaS
providers must submit to the
Department certifications of their CIPs
on an annual basis and, if relevant, the
CIPs of each foreign reseller of its U.S.
IaaS products. Annual certifications
may be submitted to the Department at
any time within one year of their
previous notification, but no earlier than
60 calendar days prior to that date.
Annual certifications must include any
updates to the information required in
paragraph (a) of this section. Each
annual certification must also include
attestations that the IaaS provider has:
(1) Reviewed its CIP since the date of
the last certification;
(2) Updated its CIP to account for any
changes in its service offerings since its
last certification;
(3) Updated its CIP to account for any
changes in the threat landscape since its
last certification;
(4) Ensured its CIP complies with this
subpart since its last certification;
(5) Tracked the number of times the
IaaS provider was unable to verify the
identity of any customer since its last
certification; and
(6) Recorded the resolution of each
situation in which the IaaS provider was
unable to verify the identity of a
customer since its last certification.
(c) Irregular updates. Each U.S. IaaS
provider must notify the Department if,
outside of the normal reporting
schedule described in paragraphs (a)
and (b) of this section, a significant
change in business operations or
corporate structure has occurred or a
material change to a CIP has been
implemented, to include, for example, a
material change in the documentary or
non-documentary methods of identity
verification or in the procedures for
handling unverified accounts. Each U.S.
IaaS provider must also notify the
E:\FR\FM\29JAP3.SGM
29JAP3
5730
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
Department when there is a change in
the Primary Contact responsible for the
CIP, or when there is a change in the
Primary Contact responsible for
managing the CIP of one of its foreign
resellers.
(d) New providers. Prior to furnishing
any foreign customer with an IaaS
Account, any newly established U.S.
IaaS provider must notify the
Department of implementation of their
CIP through submission of their CIP
certification form in accordance with
the requirements in paragraphs (a)
through (c) of this section. U.S. IaaS
providers must notify the Department
according to procedures described in
paragraphs (e) and (f) of this section
prior to the provision of U.S. IaaS
products to a new foreign reseller of its
U.S. IaaS products.
(e) Collection of information from
foreign resellers. Each U.S. IaaS
provider of U.S. IaaS products must
collect from its foreign resellers the
information necessary for the initial and
annual reporting requirements in
paragraphs (a) and (b) of this section.
(f) Reporting of information from
foreign resellers. Each U.S. IaaS
provider of U.S. IaaS products must
submit on an annual basis CIP
certification forms for all foreign
resellers’ CIPs, containing the
information specified in paragraph (a) of
this section. Foreign reseller
certifications may be submitted by the
U.S. IaaS provider—in compiled
format—to the Department at any time
within one year of their previous
notification, and no earlier than 60
calendar days prior to that date.
ddrumheller on DSK120RN23PROD with PROPOSALS3
§ 7.305
Compliance assessments.
(a) Government inspection. All U.S.
IaaS providers of U.S. IaaS products
must maintain a written CIP and copies
of the CIPs of any of their foreign
resellers and must provide any copy of
these CIPs to the Department within ten
calendar days of a request from the
Department. If upon inspection the
Department finds a CIP from either a
U.S. IaaS provider or their foreign
reseller fails to meet the requirements in
§ 7.302(b) through (f), then the
Department will notify the relevant IaaS
provider of the specific shortcomings
identified in its CIP or, if necessary, any
required special measures as described
in § 7.307. The IaaS provider shall then
resolve the identified shortcomings
within a reasonable time period, as
determined by the Department, and
shall resubmit its CIP for further
inspection.
(b) In general. The Department will
review information submitted to the
Department in CIP certification forms
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
and compiled foreign reseller CIP
certification forms as described in
§ 7.304. The Department shall, at its sole
discretion as to time and manner,
conduct compliance assessments of U.S.
IaaS providers based on the
Department’s own evaluation of risks
associated with a given CIP, U.S. IaaS
provider, or any of its foreign resellers.
(c) Information available. The
Department will evaluate risk and
conduct compliance assessments based
on available information, including but
not limited to:
(1) Any information provided by U.S.
IaaS provider in CIP certifications;
(2) Any additional information or
communications provided to the
Department;
(3) Any publicly available information
or communications; and
(4) Any information otherwise
obtained by or made available to the
Department.
(d) Evaluating risk. The Department
shall maintain sole discretion to
evaluate risks based on criteria
including, but not limited to:
(1) Assessing whether the services or
products of a U.S. IaaS provider or a
foreign reseller are being used or are
likely to be used:
(i) By foreign malicious cyber actors;
or
(ii) By a foreign person to train a large
AI model with potential capabilities that
could be used in malicious cyberenabled activity; or
(2) The failure of any U.S. IaaS
provider of U.S. IaaS products to:
(i) Submit a CIP certification; or
(ii) Implement measures
recommended by the Department as the
result of a compliance assessment.
(e) Compliance assessments. The
Department shall conduct compliance
assessments of certain U.S. IaaS
providers according to the Department’s
evaluation of risk based on information
described in paragraph (b) of this
section. The Department may:
(1) Conduct compliance assessments
annually or as determined by the
Department based on the Department’s
evaluation of risk of the provider’s CIP;
(2) Conduct follow-up compliance
assessments of providers to ensure
remediation of any findings or
determinations made by the
Department; and
(3) Request an audit of the U.S. IaaS
provider’s CIP processes and
procedures.
(f) Actions. Based on the results of
compliance assessments, the
Department may:
(1) Recommend remediation measures
to be taken by the U.S. IaaS providers
of U.S. IaaS products, including but not
limited to:
PO 00000
Frm 00034
Fmt 4701
Sfmt 4702
(i) Measures to address any risk of
U.S. IaaS products being used in
support of malicious cyber activity or to
train a foreign-owned large AI model
with potential capabilities that could be
used in malicious cyber-enabled
activity; and
(ii) Any special measures the IaaS
provider must take in accordance with
§ 7.307; and
(2) Determine to review a transaction
or class of transactions of an IaaS
provider according to procedures
described in subpart B of this part.
§ 7.306 Customer Identification Program
exemptions.
(a) Exemptions. The Secretary, in
accordance with such standards and
procedures as outlined in this section,
may exempt any U.S. IaaS provider, any
specific type of Account or lessee, or
any specific foreign reseller of a U.S.
IaaS provider’s IaaS products, from the
requirements of this subpart, except
§§ 7.308 and 7.309. Such standards and
procedures will include a finding by the
Secretary that a U.S. IaaS provider, U.S.
IaaS provider’s foreign reseller,
Account, or lessee implements security
best practices to otherwise deter abuse
of IaaS products.
(b) Abuse of IaaS Products Deterrence
Program for IaaS providers. The
Secretary may make a finding that an
IaaS provider complies with security
best practices to deter abuse of IaaS
products, provided that the IaaS
provider has established an Abuse of
IaaS Products Deterrence Program (ADP)
consistent with this paragraph (b) and
has requested a finding in accordance
with the procedures in paragraph (e) of
this section. Such a finding exempts an
IaaS provider from the CIP requirements
in §§ 7.302 and 7.304. The Secretary
may also make a finding that a foreign
reseller of U.S. IaaS products complies
with security best practices to deter
abuse of IaaS products. Such a finding
exempts the U.S. IaaS provider from the
requirements in §§ 7.303 and 7.304 with
regard to that specific foreign reseller.
Each IaaS provider that offers or
maintains one or more Accounts may
develop, document, and implement an
ADP that is designed to detect, prevent,
and mitigate malicious cyber-enabled
activities in connection with their
Accounts and the IaaS Accounts of its
foreign resellers. The ADP must be
appropriate to the size and complexity
of the IaaS provider and the nature and
scope of its product offerings. A U.S.
IaaS provider or foreign reseller ADP
must include reasonable policies and
procedures to:
(1) Identify relevant Red Flags for the
Accounts that the IaaS provider offers or
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
maintains, and incorporate those Red
Flags into its ADP including
considering:
(i) Risk Factors such as:
(A) The types of Accounts it offers or
maintains;
(B) The methods it implements for an
Account to be opened;
(C) The methods it implements for an
Account to be accessed;
(D) The methods it implements to
monitor and assess activities related to
its Accounts; or
(E) Its current or previous experiences
with malicious cyber-enabled activities.
(ii) Sources of Red Flags such as:
(A) Incidents of malicious cyberenabled activities that IaaS providers
have experienced;
(B) Vulnerabilities that could
contribute to malicious cyber-enabled
activities if left unmitigated;
(C) Methods of malicious cyberenabled activities that IaaS providers
have identified; or
(D) Alerts, notifications, or other
warnings about malicious cyber-enabled
activities or improved analytic tools that
the IaaS provider receives, including
through engagement with the
consortium under paragraph (c) of this
section.
(iii) Categories of Red Flags such as:
(A) Presentation of suspicious
personally identifiable information or
identity evidence;
(B) Suspicious or anomalous activity
detected in relation to an Account; or
(C) Notice from customers, victims of
identity theft, law enforcement
authorities, or other persons regarding
possible fraud or abuse conducted in
association with the Account, Account
compromise, a newly identified
vulnerability that may impact an IaaS
product offering if exploited, or identity
theft in connection with Accounts
serviced by the IaaS provider.
(2) Detect Red Flags that have been
incorporated into the ADP, including by
implementing privacy-preserving data
sharing and analytics methods as
feasible.
(3) Respond appropriately to any Red
Flags that are detected to prevent and
mitigate malicious cyber-enabled
activities, which may include:
(i) Monitoring an Account for
evidence of malicious cyber-enabled
activities;
(ii) Contacting the customer;
(iii) Changing any passwords, security
codes, or other security devices that
permit access to an Account;
(iv) Reopening an Account with a new
account number;
(v) Rejecting a request to open a new
Account;
(vi) Closing or suspending an existing
Account;
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
(vii) Allowing only certain trusted
methods of payment;
(viii) Notifying law enforcement; or
(ix) Determining that no response or
a different response is warranted under
the particular circumstances.
(4) Ensure the ADP (including the
relevant Red Flags) is updated regularly
to reflect changes in risks to Accounts,
including factors such as:
(i) The experiences of the IaaS
provider with malicious cyber-enabled
activities;
(ii) Changes in methods of malicious
cyber-enabled activities;
(iii) Changes in methods to detect,
prevent, and mitigate malicious cyberenabled activities;
(iv) Changes in the types of accounts
that the IaaS provider offers or
maintains; and
(v) Changes in the business
arrangements of the IaaS provider
including mergers, acquisitions,
alliances, joint ventures, and service
provider or foreign reseller
arrangements.
(5) Establish procedures for the
ongoing administration of the ADP.
Each IaaS provider implementing an
ADP must provide for the continued
administration of the ADP and must:
(i) Obtain approval of the initial
written ADP from either its board of
directors, an appropriate committee of
the board of directors, or a designated
employee at the level of senior
management;
(ii) Involve the board of directors, an
appropriate committee thereof, or a
designated employee at the level of
senior management in the oversight,
development, implementation, and
administration of the ADP;
(iii) Train staff, as necessary, to
effectively implement the ADP; and
(iv) Exercise appropriate and effective
oversight of reseller arrangements with
respect to detecting and mitigating Red
Flags.
(c) Public-private sector collaboration.
One factor to be considered by the
Department in granting an exemption is
the participation of U.S. IaaS providers
or a foreign reseller of U.S. IaaS
products in a consortium to develop and
maintain privacy-preserving data
sharing and analytics to enable
improved detection and mitigation of
malicious cyber-enabled activities.
Before implementing privacy-preserving
data sharing and analytics, IaaS
providers may initially evaluate
solutions in a test environment which
may be established and maintained by
either industry or the Federal
Government. The consortium will make
available tools and expertise to assist
smaller IaaS providers with conducting
PO 00000
Frm 00035
Fmt 4701
Sfmt 4702
5731
privacy-preserving data sharing and
analytics, as well as providing insights,
policies, and practices for improving
their ADPs under paragraph (a) of this
section. IaaS providers must document
their process and capabilities for
integrating insights and responding to
intelligence generated through
consortium interaction within their ADP
as described in paragraph (a) of this
section.
(d) Investigative cooperation. One
factor to be considered by the
Department in granting an exemption is
voluntary cooperation with law
enforcement, consistent with otherwise
applicable law, to provide forensic
information for investigations of
identified malicious cyber-enabled
activities.
(e) Procedures for requests for
exemptions from CIP requirements. In
consultation with the Secretary of
Defense, the Attorney General, the
Secretary of Homeland Security, and the
Director of National Intelligence, or, as
the Secretary deems appropriate, the
heads of other executive departments
and agencies, the Secretary may make a
finding exempting a U.S. IaaS provider
from the requirements in §§ 7.302,
7.304, and 7.305 if the finding
determines that the U.S. IaaS provider
complies with security best practices to
otherwise deter the abuse of IaaS
products. In consultation with these
same agencies, the Secretary may also
make a finding to exempt a U.S. IaaS
provider with respect to any specific
foreign reseller of their services from the
requirements in §§ 7.303 and 7.304, if
the finding determines that the foreign
reseller, account, or lessee complies
with security best practices to otherwise
deter abuse of United States IaaS
products.
(1) Any U.S. IaaS provider of U.S.
IaaS products seeking to obtain the
Secretary’s finding exempting it or one
of its foreign resellers from CIP
requirements shall initiate the process
by providing a written submission to the
Secretary describing its establishment of
an ADP consistent with paragraph (a) of
this section. Such submission should be
made electronically.
(2) Upon receipt of a written
submission, the Secretary will review
the submission and may request
additional information from the
submitter. Prior to making a finding, the
Secretary will consult with the
Secretary of Defense, the Attorney
General, the Secretary of Homeland
Security, and the Director of National
Intelligence, or their designees.
(3) The Secretary will make a finding
based on an evaluation of the following
factors:
E:\FR\FM\29JAP3.SGM
29JAP3
5732
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
(i) Whether the ADP is an appropriate
size and complexity commensurate with
the nature and scope of product
offerings;
(ii) Whether the Program’s ability to
deter, detect, and respond to Red Flags
is sufficiently robust;
(iii) Whether oversight of reseller
arrangements is effective;
(iv) The extent of cooperation by
providers with law enforcement,
consistent with otherwise applicable
law, to provide forensic information for
investigations of identified malicious
cyber-enabled activities; and
(v) Whether they participate in
public-private collaborative efforts as
described in paragraph (c) of this
section.
(f) Maintenance of exemption. U.S.
IaaS providers of U.S. IaaS products
have a continuing obligation to update
their ADPs in response to the changing
threat landscape and must notify the
Secretary of any significant deviations
or changes to their ADP. U.S. IaaS
providers must also require their foreign
resellers to do the same. All U.S. IaaS
providers must provide information on
such updates by submitting annual
notifications for themselves or any of
their exempt foreign resellers to the
Department to ensure that exemptions
from the CIP requirements continue to
be warranted.
(g) Revocation of exemption. The
exemption from CIP requirements may
be revoked at any time, including to
impose special measures as described in
§ 7.307.
ddrumheller on DSK120RN23PROD with PROPOSALS3
§ 7.307 Special measures for certain
foreign jurisdictions or foreign persons.
(a) International counter-malicious
cyber-enabled activity requirements—(1)
In general. The Secretary may require
U.S. IaaS providers of U.S. IaaS
products to take either of the special
measures described in paragraph (b) of
this section if the Secretary determines
that reasonable grounds exist for
concluding that a foreign jurisdiction or
foreign person is conducting malicious
cyber-enabled activities using U.S. IaaS
products, in accordance with paragraph
(c) of this section.
(2) Evaluation. If the Secretary, based
on the Secretary’s own initiative or
upon referral from other executive
departments and agencies or U.S. IaaS
providers, is informed that reasonable
grounds may exist to apply special
measures to a particular foreign
jurisdiction or foreign person, the
Secretary will evaluate the relevant
factors provided in paragraph (b) of this
section and consult with the heads of
other agencies as appropriate, to
determine whether to impose either of
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
the special measures described in
paragraph (b), and which special
measure the Secretary will impose.
(3) Determination. Upon completion
of the evaluation, the Secretary shall
issue an unclassified written
determination that summarizes the
elements of the evaluation. The
determination shall identify whether the
Secretary established, through the
investigation, that reasonable grounds
exist to determine that:
(i) A foreign jurisdiction has any
significant number of foreign persons
offering U.S. IaaS products that are used
for malicious cyber-enabled activities or
any significant number of foreign
persons directly obtaining U.S. IaaS
products for use in malicious cyberenabled activities; or
(ii) A foreign person has established a
pattern of conduct of offering U.S. IaaS
products that are used for malicious
cyber-enabled activities or directly
obtaining U.S. IaaS products for use in
malicious cyber-enabled activities.
(4) Special measure. The
determination shall also explain how it
is consistent with the terms of Executive
Order 13984 and this subpart. The
special measure will be imposed as soon
as the Secretary issues the
determination.
(5) Duration of special measure. Any
determination by which a special
measure described in paragraphs (b)(1)
and (2) of this section is imposed may
not remain in effect for more than 365
calendar days, except pursuant to the
publication in the Federal Register, on
or before the end of the 365-day period
beginning on the date of the issuance of
such determination, of a notice of
extension finding that the measure
remains necessary for an additional
period of time.
(6) Effective date. No U.S. IaaS
providers shall be required to take any
of the special measures adopted
pursuant to this section earlier than 180
calendar days following the issuance of
determinations.
(7) No limitation on other authorities.
This section shall not be construed as
superseding or otherwise restricting any
other authorities granted to the
Secretary, or to any other agency, by this
subpart or otherwise.
(b) Special measures. The special
measures referred to in paragraph (a) of
this section, with respect to a foreign
jurisdiction or foreign person, are as
follows:
(1) Prohibitions or conditions on
customers, potential customers, or
accounts within certain foreign
jurisdictions. The Secretary may
prohibit or impose conditions on the
opening or maintaining with any U.S.
PO 00000
Frm 00036
Fmt 4701
Sfmt 4702
IaaS provider of an Account, including
a Reseller Account, by any foreign
person located in a foreign jurisdiction
found to have any significant number of
foreign persons offering U.S. IaaS
products used for malicious cyberenabled activities, or by any U.S. IaaS
provider of U.S. IaaS products for or on
behalf of a foreign person.
(2) Prohibitions or conditions on
certain foreign persons. The Secretary
may prohibit or impose conditions on
the opening or maintaining of an
Account, including a Reseller Account,
by any U.S. IaaS provider of U.S. IaaS
products for or on behalf of a foreign
person, if such an Account involves any
such foreign person found to be directly
obtaining or engaged in a pattern of
conduct of obtaining U.S. IaaS products
for use in malicious cyber-enabled
activities or offering U.S. IaaS products
used in malicious cyber-enabled
activities.
(3) Reasonable grounds determination
factors. In making a determination
described in paragraph (a) of this
section, the Secretary shall consider, in
addition to any and all such information
as the Secretary determines to be
relevant, the following potentially
relevant factors:
(i) Factors related to a particular
foreign jurisdiction. (A) Evidence that
foreign malicious cyber actors have
obtained U.S. IaaS products from
persons offering U.S. IaaS products in
that foreign jurisdiction, including
whether such actors obtained such U.S.
IaaS products through foreign resellers;
(B) The extent to which that foreign
jurisdiction is a source of malicious
cyber-enabled activities; and
(C) Whether the United States has a
mutual legal assistance treaty with that
foreign jurisdiction, and the experience
of law enforcement officials and
regulatory officials in obtaining
information about activities involving
U.S. IaaS products originating in or
routed through such foreign
jurisdiction.
(ii) Factors related to a particular
foreign person. (A) The extent to which
a foreign person uses U.S. IaaS products
to conduct, facilitate, or promote
malicious cyber-enabled activities;
(B) The extent to which U.S. IaaS
products offered by a foreign person are
used to facilitate or promote malicious
cyber-enabled activities;
(C) The extent to which U.S. IaaS
products offered by a foreign person are
used for legitimate business purposes in
the foreign jurisdiction; and
(D) The extent to which actions short
of the imposition of special measures
pursuant to this paragraph (b) are
sufficient, with respect to transactions
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
involving the foreign person offering
U.S. IaaS products, to guard against
malicious cyber-enabled activities.
(4) Special measure determination
factors. In selecting which special
measure(s) to take under this section,
the Secretary shall consider:
(i) Whether the imposition of any
special measure would create a
significant competitive disadvantage,
including any undue cost or burden
associated with compliance, for U.S.
IaaS providers;
(ii) The extent to which the
imposition of any special measure(s) or
the timing of any special measure(s)
would have a significant adverse effect
on legitimate business activities
involving the particular foreign
jurisdiction or foreign person; and
(iii) The effect of any special
measure(s) on United States national
security, law enforcement
investigations, U.S. supply chains,
foreign policy, or any serious effect on
U.S. public health or safety.
(c) Consultations and information to
be considered in finding foreign
jurisdictions or foreign persons to be of
primary malicious cyber-enabled
activity concern. In general, in making
a determination described in paragraph
(a) of this section, the Secretary shall
consult with the Secretary of State, the
Secretary of the Treasury, the Secretary
of Defense, the Attorney General, the
Secretary of Homeland Security, the
Director of National Intelligence, and, as
the Secretary deems appropriate, the
heads of other executive departments
and agencies.
(d) Notification of special measures
invoked by the Secretary. Not later than
10 calendar days after the date of any
determination under paragraph (a)(4) of
this section, the Secretary shall notify,
in writing, the Committee on Energy
and Commerce of the U.S. House of
Representatives and the Committee on
Commerce, Science, and Transportation
of the U.S. Senate of any such action.
ddrumheller on DSK120RN23PROD with PROPOSALS3
§ 7.308 Reporting of large AI model
training.
(a) Reporting requirements. (1) In
general, each U.S. IaaS provider must
submit a report to the Department
whenever they have ‘‘knowledge’’ of a
covered transaction, as specified in
paragraph (b) of this section, at the time
specified in paragraph (c) of this
section.
(2) Each U.S. IaaS provider must also
require that their foreign resellers
submit a report whenever they have
‘‘knowledge’’ of a covered transaction,
as specified in paragraph (b) of this
section, at the time specified in
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
paragraph (c) of this section to the U.S.
IaaS provider.
(3) Reports must be submitted to the
Department in the form and manner
specified in paragraph (d) of this section
and, at a minimum, include responses
for each of the requirements of
paragraphs (d)(1)(i) through (ii) of this
section.
(b) Covered transactions. (1)
Transactions that are covered
transactions for the purposes of this
section include:
(i) A transaction by, for, or on behalf
of a foreign person which results or
could result in the training of a large AI
model with potential capabilities that
could be used in malicious cyberenabled activity (see the examples in
paragraphs (b)(3)(i) and (ii) of this
section); or
(ii) A transaction by, for, or on behalf
of a foreign person, in which the
original arrangements provided for in
the terms of the transaction would not
result in a training of a large AI model
with potential capabilities that could be
used in malicious cyber-enabled
activity, but a development or update in
the arrangements means the transaction
now does or could result in the training
of a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity (see
the example in paragraph (b)(3)(iii) of
this section).
(2) A model shall be considered to be
a large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity under
the definition provided in § 7.301 if it
meets the requirements laid out by the
Department in interpretive rules
published in the Federal Register.
(3)(i) Example 1. Corporation A, a
foreign person, proposes to train a
model on the computing infrastructure
of Corporation B, a U.S. IaaS provider,
and signs an agreement with
Corporation B to train the proposed
model. The technical specifications of
the model that Corporation A seeks to
train meet the technical conditions of a
large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity. The
transaction is a covered transaction.
(ii) Example 2. Corporation A, a U.S.
person, makes an equity investment in
Corporation B, a foreign person, and a
portion of that investment is in the form
of credits to use Corporation A’s
computing infrastructure. Corporation A
has reason to believe that Corporation B
intends to use those credits to train a
large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity. The
transaction is a covered transaction.
PO 00000
Frm 00037
Fmt 4701
Sfmt 4702
5733
(iii) Example 3. Corporation A, a U.S.
person, agrees to train an AI model for
Corporation B, a foreign person. At the
outset, the agreed-upon technical
specifications for the model do not meet
the technical conditions of a dual-use
foundation model or a model with
technical conditions of concern.
However, after training commences,
adjustments in the training procedure or
new insights about the model’s
capabilities provide Corporation A with
reason to believe that the model will in
fact have the technical conditions of a
large AI model with potential
capabilities that could be used in
malicious cyber-enabled activity. The
transaction becomes a covered
transaction.
(iv) Example 4. Corporation A, a U.S.
person, agrees to train an AI model for
Corporation B, a foreign person, on a
computing infrastructure co-located in a
facility owned by Corporation C. The
model will have the technical
conditions of a large AI model with
potential capabilities that could be used
in malicious cyber-enabled activity. The
transaction is a covered transaction, and
Corporation A is responsible for
reporting the training run to the
Department.
(c) Timing of reports—(1) Initial U.S.
IaaS provider report. U.S. IaaS providers
shall file with the Department a report
within 15 calendar days of a covered
transaction occurring or the provider or
reseller having ‘‘knowledge’’ that a
covered transaction has occurred.
(2) Initial foreign reseller report. U.S.
IaaS providers must require their foreign
resellers to file with the U.S. IaaS
provider a report within 15 calendar
days of a covered transaction occurring
or the provider or reseller having
‘‘knowledge’’ that a covered transaction
has occurred. The U.S. IaaS provider
must file this report with the
Department within 30 calendar days of
the covered transaction.
(3) Follow-up report. Any U.S. IaaS
provider that receives a request from the
Department for additional information,
as outlined in paragraph (d) of this
section, whether in regard to a covered
transaction of itself or its foreign
reseller, will file a follow-up report
responsive to the request within 15
calendar days of receiving the request
for additional information.
(4) Corrected report. If any report filed
under this section is found to have been
inaccurate when filed, the U.S. IaaS
provider shall file a corrected report in
the form and manner specified in
paragraph (d) of this section within 15
calendar dates after the date on which
the U.S. IaaS provider has ‘‘knowledge’’
of the inaccuracy.
E:\FR\FM\29JAP3.SGM
29JAP3
ddrumheller on DSK120RN23PROD with PROPOSALS3
5734
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
(d) Content, form, and manner of
reports. Each report submitted under
this section shall be filed with the
Department in the form and manner that
the Department shall prescribe in the
forms and instructions for such report,
and each person filing such report shall
certify that the report or application is
true, correct, and complete.
(1) Initial U.S. IaaS provider and
foreign reseller report. An initial report
of an IaaS provider shall include the
following:
(i) Information about the foreign
person. (A) Name of the foreign
customer or foreign beneficial owner of
the customer, which shall be:
(1) For an individual, full legal name;
or
(2) For an entity, business name,
including all names under which the
business is known to be or has been
doing business.
(3) For both individuals and entities,
the ultimate beneficial owner, if it is not
the same as the individual or entity.
(B) Address, which shall be:
(1) For an individual, a residential or
business street address.
(2) For an individual who does not
have a residential or business street
address, an Army Post Office (APO) or
Fleet Post Office (FPO) box number.
(3) For an entity, principal places of
business, or if an entity is not a
business, the address to which inquiries
should be directed, and the location(s)
from which the training request
originates.
(4) For a person other than an
individual (such as a corporation,
partnership, or trust), the jurisdiction
under whose laws the person is
constituted or organized; and
(5) For a person other than an
individual (such as a corporation,
partnership, or trust), the name(s) of the
beneficial owner(s) of that account,
including the ultimate beneficial
owner(s).
(C) Means and source of payment for
the account including:
(1) Credit card number;
(2) Account number;
(3) Customer identifier;
(4) Transaction identifier;
(5) Virtual currency wallet or wallet
address identifier;
(6) Equivalent payment processing
information, for alternative sources of
payment; or
(7) Any other payment sources or
types used.
(D) Email address.
(E) Telephonic contact information.
(F) IP addresses used for access or
administration and the date and time of
each such access or administrative
action, related to ongoing verification of
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
such foreign person’s ownership or
control of such Account.
(ii) Information about the training
run. (A) Estimated number of
computational operations (e.g., integer
operations or floating-point operations)
used in the training run.
(B) Anticipated start date and
completion date of the training run.
(C) Information on training practices,
including the model of the primary AI
used in the training run accelerators.
(D) Information on cybersecurity
practices including:
(1) Policies and procedures for
ensuring secure storage of, and
protecting access to, trained model
weights; and
(2) Any cybersecurity or insider threat
events that have occurred in the last
four years that have resulted in
unauthorized access to model weights
or model source code, or other damages
of major concern.
(2) Follow-up report. A follow-up
report filed pursuant to a request for
additional information in paragraph (c)
of this section shall include all
information responsive to the request.
(3) Corrected report. A corrected
report required to be filed pursuant to
paragraph (c) of this section shall
correct all inaccuracies in the
information previously reported to BIS.
(e) Request for additional information.
Upon receiving an initial report, followup report, or corrected report, BIS may
request that a U.S. IaaS provider or
foreign reseller of U.S. IaaS products
submit additional information
pertaining to activities or risks that
present concerns to U.S. national
security.
(f) Prohibition. No U.S. IaaS provider
shall provide U.S. IaaS products to
foreign resellers, unless the U.S. IaaS
provider has made all reasonable efforts
to ensure that the foreign reseller
complies with the requirements of this
section. Upon receipt of evidence, or
upon discovery of facts and
circumstances that indicate that a
foreign reseller has not complied with
the requirements of this section, the
U.S. IaaS provider shall notify the
foreign reseller of the alleged violation
and request written confirmation and
supporting evidence of compliance,
remediation, or both. Upon subsequent
receipt of evidence, or discovery of facts
and circumstances that indicate the
foreign reseller did not remediate, or
remains out of compliance, the U.S. IaaS
provider must suspend the provision of
U.S. IaaS products to the foreign
reseller, and shall resume provision of
U.S. IaaS products only after the foreign
reseller has provided adequate
assurances to prevent future violations.
PO 00000
Frm 00038
Fmt 4701
Sfmt 4702
§ 7.309
Enforcement.
(a) Prohibitions. The following are
prohibited:
(1) Engaging in, or conspiring to
engage in, any conduct prohibited by
the regulations issued in this part.
(2) Failing to submit reports,
certifications, or recertifications, as
appropriate, or failing to comply with
terms of notices or orders provided by
the Department, and as required by this
subpart.
(3) Failing to implement or maintain
CIPs as required by § 7.302, or
continuing to transact with a foreign
reseller that fails to implement or
maintain a CIP as set forth in § 7.303.
(4) Providing IaaS products to a
foreign person while failing to comply
with any direction, determination, or
condition issued under this part.
(5) Aiding, abetting, counseling,
commanding, inducing, procuring,
permitting, approving, or otherwise
supporting any act prohibited by any
direction, determination, or condition
issued under this part.
(6) Attempting or soliciting a violation
of any direction, determination, or
condition issued under this part.
(7) Failing to implement any
prohibition or suspension as set forth in
§ 7.308.
(8) Making a false or misleading
representation, statement, notification,
or certification, whether directly or
indirectly through any other person, or
falsifying or concealing any material fact
to the Department in connection with
compliance under this part.
(b) Additional obligations. (1) Any
person who makes a representation,
statement, or certification to the
Department relating to the creation or
maintenance of a CIP, reporting required
under the CIP, in a written request for
an exemption, an annual notification
related to exemptions, or in relation to
their own or another entities ADP shall
notify the Department of any material
change to the CIP or to the IaaS
provider’s business, that renders the CIP
unnecessary.
(2) Any person who has been granted,
or has had a foreign reseller granted, an
exemption on the basis of their ADP
shall notify the Department of any
material change to the ADP or to the
IaaS provider’s business that may
impact the ADP.
(3) For purposes of paragraph (a)(8) of
this section, any representation,
statement, or certification, such as
(though not limited to) CIPs, written
request for exemption, or written
statements on ADPs made by any person
shall be deemed to be continuing in
effect until the person notifies the
E:\FR\FM\29JAP3.SGM
29JAP3
Federal Register / Vol. 89, No. 19 / Monday, January 29, 2024 / Proposed Rules
ddrumheller on DSK120RN23PROD with PROPOSALS3
Department in accordance with this
part.
(c) Maximum penalties—(1) Civil
penalty. A civil penalty not to exceed
the amount set forth in section 206 of
IEEPA, 50 U.S.C. 1705, may be imposed
on any person who violates, attempts to
violate, conspires to violate, or
knowingly causes any violation of
paragraph (a) of this section. IEEPA
provides for a maximum civil penalty
not to exceed the greater of $250,000 per
violation, subject to inflationary
adjustment, or an amount that is twice
the amount of the transaction that is the
basis of the violation with respect to
which the penalty is imposed.
(i) Notice of the penalty, including a
written explanation of the penalized
conduct specifying the laws and
regulations allegedly violated and the
amount of the proposed penalty, and
notifying the recipient of a right to make
a written petition within 30 calendar
days as to why a penalty should not be
imposed, shall be served on the notified
party or parties.
(ii) The Secretary shall review any
presentation and issue a final
administrative decision within 30
calendar days of receipt of the petition.
(2) Criminal penalty. A person who
willfully commits, attempts to commit,
or conspires to commit, or aids and
VerDate Sep<11>2014
20:23 Jan 26, 2024
Jkt 262001
abets in the commission of a violation
of paragraph (a) of this section shall,
upon conviction of a violation of IEEPA,
be fined not more than $1,000,000, or if
a natural person, may be imprisoned for
not more than 20 years, or both.
(3) Civil penalty recovery. Any civil
penalties authorized in this section may
be recovered in a civil action brought by
the United States in U.S. district court.
(d) Adjustments to penalty amounts.
(1) The civil penalties provided in
IEEPA are subject to adjustment
pursuant to the Federal Civil Penalties
Inflation Adjustment Act of 1990 (Pub.
L. 101–410, as amended, 28 U.S.C. 2461
note).
(2) The criminal penalties provided in
IEEPA are subject to adjustment
pursuant to 18 U.S.C. 3571.
(e) Other penalities. The penalties
available under this section are without
prejudice to other penalties, civil or
criminal, available under law. Attention
is directed to 18 U.S.C. 1001, which
provides that whoever, in any matter
within the jurisdiction of any
department or agency in the United
States, knowingly and willfully falsifies,
conceals, or covers up by any trick,
scheme, or device a material fact, or
makes any false, fictitious, or fraudulent
statements or representations, or makes
or uses any false writing or document
PO 00000
Frm 00039
Fmt 4701
Sfmt 9990
5735
knowing the same to contain any false,
fictitious, or fraudulent statement or
entry, shall be fined under title 18,
United States Code, or imprisoned not
more than 5 years, or both.
§ 7.310
Reporting violations.
(a) Where to report. If a person learns
of facts or circumstances that indicate a
violation of any of the requirements in
this subpart may have occurred, or are
likely to occur, that person may notify:
Office of Information and
Communications Technology and
Services, Bureau of Industry and
Security, U.S. Department of Commerce,
14th Street and Constitution Avenue
NW, Room A–100, Washington, DC
20230.
(b) Reporting distinguished. The
reporting provisions in paragraph (a) of
this section are not the ‘‘reporting of
violations’’ contained within the Export
Administration Regulations (EAR) in 15
CFR chapter VII, subchapter C, nor the
‘‘voluntary self-disclosure’’ within the
same.
Alan F. Estevez,
Under Secretary of Commerce for Industry
and Security, U.S. Department of Commerce.
[FR Doc. 2024–01580 Filed 1–26–24; 8:45 am]
BILLING CODE 3510–20–P
E:\FR\FM\29JAP3.SGM
29JAP3
Agencies
[Federal Register Volume 89, Number 19 (Monday, January 29, 2024)]
[Proposed Rules]
[Pages 5698-5735]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-01580]
[[Page 5697]]
Vol. 89
Monday,
No. 19
January 29, 2024
Part IV
Department of Commerce
-----------------------------------------------------------------------
15 CFR Part 7
Taking Additional Steps To Address the National Emergency With Respect
to Significant Malicious Cyber-Enabled Activities; Proposed Rule
Federal Register / Vol. 89 , No. 19 / Monday, January 29, 2024 /
Proposed Rules
[[Page 5698]]
-----------------------------------------------------------------------
DEPARTMENT OF COMMERCE
15 CFR Part 7
[Docket No. 240119-0020]
RIN 0694-AJ35
Taking Additional Steps To Address the National Emergency With
Respect to Significant Malicious Cyber-Enabled Activities
AGENCY: Bureau of Industry and Security, Department of Commerce.
ACTION: Proposed rule; request for comments.
-----------------------------------------------------------------------
SUMMARY: The Executive order of January 19, 2021, ``Taking Additional
Steps To Address the National Emergency With Respect to Significant
Malicious Cyber-Enabled Activities,'' directs the Secretary of Commerce
(Secretary) to propose regulations requiring U.S. Infrastructure as a
Service (IaaS) providers of IaaS products to verify the identity of
their foreign customers, along with procedures for the Secretary to
grant exemptions; and authorize special measures to deter foreign
malicious cyber actors' use of U.S. IaaS products. The Executive order
of October 30, 2023, ``Safe, Secure, and Trustworthy Development and
Use of Artificial Intelligence,'' further directs the Secretary to
propose regulations that require providers of certain IaaS products to
submit a report to the Secretary when a foreign person transacts with
that provider or reseller to train a large Artificial Intelligence (AI)
model with potential capabilities that could be used in malicious
cyber-enabled activity. The Department of Commerce (Department) issues
this notice of proposed rulemaking (NPRM) to solicit comment on
proposed regulations to implement those Executive orders.
DATES: Comments must be received April 29, 2024.
ADDRESSES: All comments must be submitted by one of the following
methods:
By the Federal eRulemaking Portal: https://www.regulations.gov at docket number DOC-2021-0007.
By email directly to: [email protected]. Include
``E.O. 13984/E.O. 14110: NPRM'' in the subject line.
Instructions: Comments sent by any other method or to any
other address or individual, or received after the end of the comment
period, may not be considered. For those seeking to submit confidential
business information (CBI), please clearly mark such submissions as CBI
and submit by email or via the Federal eRulemaking Portal, as
instructed above. Each CBI submission must also contain a summary of
the CBI, clearly marked as public, in sufficient detail to permit a
reasonable understanding of the substance of the information for public
consumption. Such summary information will be posted on
regulations.gov.
FOR FURTHER INFORMATION CONTACT: Kellen Moriarty, U.S. Department of
Commerce, telephone: (202) 482-1329, email: [email protected].
For media inquiries: Jeremy Horan, Office of Congressional and Public
Affairs, Bureau of Industry and Security, U.S. Department of Commerce:
[email protected].
SUPPLEMENTARY INFORMATION:
I. Background
IaaS products offer customers the ability to run software and store
data on servers offered for rent or lease without having to assume the
direct maintenance and operating costs of those servers. Foreign
malicious cyber actors have utilized U.S. IaaS products to commit
intellectual property and sensitive data theft, to engage in covert
espionage activities, and to threaten national security by targeting
U.S. critical infrastructure. After carrying out such illicit activity,
these actors can quickly move to replacement infrastructure offered by
U.S. IaaS providers of U.S. IaaS products (``U.S. IaaS providers'').
The temporary registration and ease of replacement for such services
makes it more difficult for the government to track malicious actors.
Additionally, the ability of malicious actors to use foreign-person
resellers of U.S. IaaS products (``foreign resellers''), who might not
track identity, hinders law enforcement's ability to obtain identifying
information about malicious actors through service of compulsory legal
process. This shift in adversary tradecraft also challenges the U.S.
Government's ability to identify victims of malicious cyber activity
and enable specific network defense and remediation efforts.
Furthermore, the emergence of large-scale computing infrastructure--to
which U.S. IaaS providers and foreign resellers provide access as a
service, and which foreign malicious actors could use to train large AI
models that can assist or automate their malicious cyber activity--has
raised considerable concern about the identities of entities that
transact with providers to engage in certain AI training runs.
To address these threats, the President issued E.O. 13984, ``Taking
Additional Steps To Address the National Emergency With Respect to
Significant Malicious Cyber-Enabled Activities,'' which provides the
Department with authority to require U.S. IaaS providers to verify the
identity of foreign users of U.S. IaaS products, to issue standards and
procedures that the Department may use to make a finding to exempt IaaS
providers from such a requirement, to impose recordkeeping obligations
with respect to foreign users of U.S. IaaS products, and to limit
certain foreign actors' access to U.S. IaaS products in appropriate
circumstances. The President subsequently issued E.O. 14110, ``Safe,
Secure, and Trustworthy Development and Use of Artificial
Intelligence,'' which calls for the Department to require U.S. IaaS
providers to ensure that their foreign resellers verify the identity of
foreign users. E.O. 14110 also provides the Department with authority
to require U.S. IaaS providers submit a report to the Department
whenever a foreign person transacts with them to train a large AI model
with potential capabilities that could be used in malicious cyber-
enabled activity.
II. Introduction
E.O. 13984 and E.O. 14110 draw upon the President's authority from
the Constitution and laws of the United States, including the
International Emergency Economic Powers Act (IEEPA) (50 U.S.C. 1701 et
seq.), the National Emergencies Act (NEA) (50 U.S.C. 1601, et seq.),
and 3 U.S.C. 301. Section 1 of E.O. 13984 requires the Secretary to
propose, for notice and comment, regulations that mandate that U.S.
IaaS providers verify the identity of foreign persons that sign up for
or maintain accounts that access or utilize U.S. IaaS providers' IaaS
products or services (Accounts or Account)--that is, a know-your-
customer program or Customer Identification Program (CIP). Under E.O.
13984, such a program must set forth the minimum standards for IaaS
providers to verify the identity of a foreign person connected with the
opening of an Account or the maintenance of an existing Account. The
proposed regulations must include the types of documentation and
procedures required to verify the identity of any foreign persons
acting as a lessee or sub-lessee of these products or services; the
records that IaaS providers must securely maintain regarding a foreign
person that obtains an Account; and methods of limiting all third-party
access to this collected information, except insofar as such access is
otherwise consistent with E.O. 13984 and allowed under applicable law.
Moreover, the proposed regulations
[[Page 5699]]
must consider the type of Account, methods of opening an Account, and
the types of identifying information already available to IaaS
providers that help accomplish the objectives of identifying foreign
malicious cyber actors using any such products while also avoiding an
undue burden on U.S. IaaS providers. They must also allow the
Secretary, after consultation with the heads of various Federal
agencies, to exempt any IaaS providers or any specific type of Account
or lessee from the requirements of any regulation issued pursuant to
this section, including due to a finding that the IaaS provider,
Account, or lessee complies with security best practices to otherwise
deter abuse of IaaS products.
Section 2 of E.O. 13984 requires the proposed regulations to allow
the Secretary to use, as necessary, one of two special measures
included in E.O. 13984 to require U.S. IaaS providers to prohibit or
limit access to Accounts that foreign malicious cyber actors use to
conduct malicious cyber-enabled activity. E.O. 13984 authorizes these
measures if the Secretary, in consultation with heads of appropriate
Federal agencies, finds that reasonable grounds exist to conclude that
either: (i) a foreign jurisdiction has a significant number of foreign
persons offering U.S. IaaS products that are, in turn, used for
malicious cyber-enabled activities, or a significant number of foreign
persons directly obtaining U.S. IaaS products and using them in
malicious cyber-enabled activities; or (ii) a foreign person has
established a pattern of conduct of offering U.S. IaaS products that
are used for malicious cyber-enabled activities or directly obtaining
U.S. IaaS products for use in malicious cyber-enabled activities. As
further explained below, the Department would conduct an investigation
before making any such finding under section 2 of E.O. 13894.
One special measure the Secretary could take would be to prohibit
or impose conditions on opening or maintaining an Account with any IaaS
provider by: (a) a foreign person located in a foreign jurisdiction
that has a significant number of foreign persons offering U.S. IaaS
products that are used for malicious cyber-enabled activities; or (b)
on behalf of such a foreign person. The second special measure would
allow the Secretary to prohibit or impose conditions on opening or
maintaining an Account in the United States by any IaaS provider for,
or on behalf of, a foreign person found to be offering U.S. IaaS
products that are used for malicious cyber-enabled activities or on
accounts opened directly by foreign persons who are known to obtain
U.S. IaaS products for malicious cyber-enabled activities.
Section 4.2(c) of E.O. 14110 requires the Secretary to propose
regulations requiring U.S. IaaS providers to submit to the Department a
report when a foreign person transacts with the IaaS provider to train
a large AI model with potential capabilities that could be used in
malicious cyber-enabled activity. The report, at a minimum, must
include the identity of the foreign person and the existence of a
training run that meets the criteria set forth in this section, as well
as any other information specified in regulation. This section of E.O.
14110 also instructs the Secretary to determine the set of technical
conditions that a large AI model must possess in order to have the
potential capabilities that could be used in malicious cyber-enabled
activity and to update that determination as necessary and appropriate.
Section 4.2(c) of this E.O. also requires that U.S. IaaS providers
prohibit any foreign reseller of their U.S. IaaS product from providing
those products unless such foreign reseller submits to the U.S. IaaS
provider a report, which the U.S. IaaS provider must provide to the
Department, detailing each instance in which a foreign person transacts
with the foreign reseller to use the U.S. IaaS product to train a large
AI model with potential capabilities that could be used in malicious
cyber-enabled activity. In accordance with this requirement, section
4.2(d) requires the proposed regulations to require U.S. IaaS providers
to ensure that foreign resellers of U.S. IaaS products verify the
identity of any foreign person that obtains an IaaS account from the
foreign resellers. The Department is directed to set forth the minimum
standards that a U.S. IaaS provider must require of their foreign
resellers to verify the identity of a foreign person who opens an
account or maintains an existing account with a foreign reseller.
III. Comments on the Advanced Notice of Proposed Rulemaking
On September 24, 2021, the Department published in the Federal
Register an advanced notice of proposed rulemaking (ANPRM), 86 FR 53018
(Sep. 24, 2021), soliciting comments on how the Department should
implement various provisions of sections 1 and 2 of E.O. 13984,
described above, and section 5 of E.O. 13894, which defines several key
terms as they relate to the proposed regulations. The Department
received twenty-one (21) comments to the ANPRM, which are available on
the public rulemaking docket at https://www.regulations.gov.
This section summarizes the comments received in response to the
ANPRM and explains the Department's proposed regulations to implement
sections 1, 2, and 5 of E.O. 13984. The proposed rule text incorporates
many of the suggestions the Department received in response to the
ANPRM, as set out in more detail below.
(1) Definitions
The Department sought comments on the terms ``United States
person'' and ``United States Infrastructure as a Service Provider.''
The commenters who responded to this question argued that the term
``United States person'' should not be interpreted to include foreign
subsidiaries of a U.S. IaaS provider, as this extension would exceed
the scope of E.O. 13984. Commenters differed about how broadly to
interpret the term ``United States Infrastructure as a Service
Provider.'' Many requested the Department to interpret this term as
broadly as possible to capture as much potential foreign malicious
cyber activity as possible. Others believed the Department should
interpret the definition narrowly to avoid implicating cloud service
providers who offer other cloud-based services, such as Platform as a
Service (PaaS) and Software as a Service (SaaS) offerings, but do not
offer IaaS products. This proposed rule reflects the Department's
consideration of all relevant comments.
(2) Customer Identification Program Regulations and Relevant Exemptions
In the ANPRM, the Department sought information about how to
implement requirements for companies to verify a foreign person's
identity upon the opening of an Account and while maintaining an
existing Account. The Department sought comments on verification
procedures and recordkeeping requirements the Department should
consider including in regulations.
Many commenters expressed support for implementing data retention
and recordkeeping requirements, as directed by E.O. 13984, across a
broad spectrum of U.S. IaaS providers' products or services to capture
a large portion of malicious cyber-enabled activity on these platforms.
While commenters generally supported requiring U.S. IaaS providers to
verify the identity of all prospective customers, some suggested that
any regulation the Department promulgates in response to E.O. 13984
will be ineffective, as malicious cyber actors are savvy enough to
avoid identity verification.
[[Page 5700]]
Other commenters requested that the Department's proposed
regulations allow U.S. IaaS providers to adopt risk-based approaches to
verify the identity of their customers. These approaches, they argued,
would allow IaaS providers flexibility to adjust their CIPs to meet new
threats and vulnerabilities as they arise. Most commenters agreed that
the Department should consider the costs and benefits of these
requirements for U.S. IaaS providers and expressed concern that the
costs of compliance would be substantial. As discussed further below,
the Department has proposed standards and procedures that take into
consideration the size, complexity, and risk profile of the IaaS
provider and its product offerings.
The Department requested comments on current practices, if any,
that U.S. IaaS providers use to verify the identity of their customers
and the burden that any new regulations would impose on these IaaS
providers. Commenters reported that there is no uniform set of data
that U.S. IaaS providers collect before opening an Account for a
customer, but email addresses and payment methods are normally
required. Most commenters indicated that any requirements in this
proposed regulation would impose burdens on U.S. IaaS providers, and
that the Department should weigh this burden against the anticipated
benefit any regulations mandating identity verification would have on
national security. The Department acknowledges that this rulemaking
will impose compliance costs for at least some U.S. IaaS providers and
has addressed these costs in the regulatory impact analysis included in
the preamble of this proposed rule.
The Department asked about the impact any proposed regulations
would have on data protection and security, especially considering the
European Union General Data Protection Regulation (GDPR) and the
California Consumer Privacy Act (CCPA). Many commenters encouraged the
Department to propose regulations that would enable U.S. law
enforcement officials to gain access to data stored by domain name
registries and registrars that has proven more difficult since the
enactment of the GDPR. Others focused on ensuring that the processing
of customers' data to carry out the provisions of any proposed
regulation would be consistent with the GDPR or CCPA. Still others
requested that any proposed regulation not frustrate ongoing
negotiations to open the flow of data between foreign countries and the
United States. The Department acknowledges these comments and has
sought to ensure these proposed regulations are consistent with
national and international obligations, either because the specific
information requested is not protected, or because the need for data
collection falls into relevant exemptions.
The Department sought comments on how to implement the authority,
granted by section 1(c) of E.O. 13984, to provide exemptions from the
requirements of any regulations issued pursuant to E.O. 13894. Many
commenters expressed hope that the Department could promulgate best
practices for IaaS providers to adopt or strive to meet in order to
avoid compliance costs associated with any proposed regulations. Others
asked the Department to tailor these regulations to apply only to those
products and services most used by foreign malicious cyber actors. The
Department is proposing procedures for IaaS providers to obtain
exemptions from the CIP requirements. Under these procedures, a U.S.
IaaS provider seeking to obtain an exemption for itself, a specific
type of account or lessee, or its foreign reseller, would provide a
written submission to the Secretary outlining its program to comply
with security best practices to deter the abuse of U.S. IaaS products.
A finding by the Secretary that the program incorporates such best
practices would exempt an IaaS provider from the CIP requirements in
section 1(a) of E.O. 13984.
Some commenters urged the Department not to include exemptions,
believing this practice to be contrary to the intent of E.O. 13984 to
address the use of U.S. IaaS products for malicious cyber-enabled
activities. In these proposed regulations, the Department has
endeavored to provide a pathway to enable U.S. IaaS providers to apply
for an exemption where such exemption is warranted while still
accomplishing the policy goals of E.O. 13984. The Department welcomes
comments and feedback on its proposed approach, as well as on potential
standards and best practices that could deter the abuse of U.S. IaaS
products by malicious actors.
(3) Special Measures Restrictions
In the ANPRM, the Department sought comments on procedures the
Secretary should use to decide when and how to impose a special
measure. The Department asked what sources of information the Secretary
should consider, how the Secretary should publish any findings, how
long the special measure's effects should last, and how to determine
which special measure to invoke.
Commenters encouraged the Department to consider how to leverage
existing authorities and procedures, such as the Department's existing
authority to prohibit certain Information and Communications Technology
and Services (ICTS) transactions or the Department of the Treasury's
Office of Foreign Assets Control's (OFAC) sanctions procedures, to
minimize the burden of these special measures. Other commenters
indicated that the threat of these special measures will result in lost
U.S. business, as foreign persons may move to IaaS products and
services furnished from companies headquartered in foreign countries.
Still others expressed doubt that these special measures would
accomplish their intended purpose.
In crafting these proposed regulations regarding special measures,
the Department looked to a variety of sources, including OFAC's
sanction procedures, and has sought to minimize the costs to U.S.
businesses while still meeting the requirements of E.O. 13984.
IV. Proposed Rule and Request for Comments
Following consideration of the comments received in response to the
ANPRM, the Department is proposing regulations to implement sections 1,
2, and 5 of E.O. 13984 and the applicable provisions of E.O. 14110. The
provisions implementing E.O. 13984 would apply to U.S. IaaS providers
that offer U.S. IaaS products, as defined in E.O. 13984 and this
proposed rule. ``U.S. IaaS providers'' includes any U.S. person that
offers IaaS products, to include both direct providers of U.S. IaaS
products and any of their U.S. resellers.
To implement section 1 of E.O. 13984, the Department proposes to
require providers to verify the identity of foreign customers. To
implement section 2 of E.O. 13984, the Department proposes procedures
for the Secretary's decision-making process regarding whether and how
to issue determinations about special measures. Regarding the
definitions in section 5 of E.O. 13984, the Department proposes
interpretations of terms defined in the E.O. and proposes definitions
for several additional key terms.
To implement section 4.2(c) of E.O. 14110, the Department proposes
regulations related to foreign resellers of U.S. IaaS products that
would apply to U.S. IaaS providers as defined in E.O. 13984 and this
proposed rule. The Department uses ``foreign reseller'' to mean any
foreign person who has established an account with a U.S. IaaS provider
to provide IaaS products
[[Page 5701]]
subsequently, in whole or in part, to a third party.
To implement section 4.2(c) of this E.O., the Department proposes a
process for U.S IaaS providers to report to the Department when they
have knowledge they will engage or have engaged in a transaction with a
foreign person that could allow that foreign person to train a large AI
model with potential capabilities that could be used in malicious
cyber-enabled activity. To implement section 4.2(d) of this E.O., the
Department proposes regulations that would require U.S. IaaS providers
to require foreign resellers of their U.S. IaaS products to verify the
identity of foreign persons who open or maintain an account with a
foreign reseller.
The Department proposes definitions for terms used within E.O.
14110, including a definition for a ``large AI model with potential
capabilities that could be used in malicious cyber-enabled activity.''
Based on this definition, the Secretary will determine, as required by
E.O. 14110, the set of technical conditions that a large AI model must
possess in order to have the potential capabilities that could be used
in malicious cyber-enabled activity. That determination will be a
binding interpretation of what constitutes a ``large AI model with
potential capabilities that could be used in malicious cyber-enabled
activity.'' As this area of technology is fast developing, and as
directed by E.O. 14110, the Secretary will update, as ``necessary and
appropriate,'' the initial determination of which set of technical
conditions meet the definition. The Department will publish these
binding updates to the technical condition determinations in the
Federal Register. The Department requests comments on all aspects of
this proposed rule.
(1) Definitions
This proposed rule adopts several definitions found in section 5 of
E.O. 13984, including ``entity,'' ``foreign jurisdiction,'' ``foreign
person,'' ``Infrastructure as a Service Account,'' ``Infrastructure as
a Service product,'' ``Malicious cyber-enabled activities,''
``person,'' ``Reseller Account,'' ``United States person,'' and ``U.S.
Infrastructure as a Service product.'' In addition, this proposed rule
clarifies the definition of ``U.S. Infrastructure as a Service
provider'' found in section 5 of E.O. 13984. The proposed rule also
adopts several definitions found in section 3 of E.O. 14110, including
``artificial intelligence'' or ``AI,'' ``AI model,'' ``AI system,''
``dual-use foundation model,'' ``foreign reseller,'' ``generative AI,''
``integer operation,'' ``machine learning,'' and ``model weight.''
Finally, the Department proposes several definitions of key terms in
this rule, including ``customer'' and ``beneficial owner,'' as well as
definitions for terms such as ``availability,'' ``confidentiality,''
``Customer Identification Program,'' ``Department,''
``disassociability,'' ``foreign beneficial owner,'' ``foreign
customer,'' ``foreign reseller, ``individual,'' ``integrity,''
``knowledge,'' ``large AI model with potential capabilities that could
be used in malicious cyber-enabled activity,'' ``manageability,''
``predictability,'' ``privacy-preserving data sharing and analytics,''
``Red Flag,'' ``reseller,'' ``risk-based,'' ``Secretary,'' ``threat
landscape,'' ``training,'' ``training run,'' and ``United States
reseller.'' Some of the proposed definitions are discussed below,
although the Department welcomes comments on all definitions in this
proposed rule.
A. Availability
The Department proposes to define ``availability'' as ensuring
timely and reliable access to and use of information and information
systems by an authorized person or system, including resources provided
as part of a product or service.
B. Beneficial Owner
E.O. 13984 requires verification of the identity of foreign persons
that obtain accounts, and it defines ``person'' as ``an individual or
entity.'' Therefore, the Department proposes to require U.S. IaaS
providers to collect the same identifying information and verify the
identity of beneficial owners of Accounts owned or maintained by
entities. Under the proposed rule, a beneficial owner is defined as an
individual who either: (1) exercises substantial control over a
Customer, or (2) owns or controls at least 25 percent of the ownership
interests of a Customer. The Department seeks comments on these
definitions, including the meaning of ``substantial control.''
C. Confidentiality
The Department proposes to define ``confidentiality'' as preserving
authorized restrictions on information access and disclosure, including
means for protecting personal privacy and proprietary information.
D. Customer Identification Program
The Department proposes to define ``Customer Identification
Program'' as a program created by a U.S. IaaS provider or foreign
reseller that dictates how the IaaS provider will collect identifying
information about its customers, how the IaaS provider will verify the
identity of its foreign customers, store and maintain identifying
information, and notify its customers about the disclosure of
identifying information.
E. Department
The Department proposes to define ``Department'' as the United
States Department of Commerce.
F. Disassociability
The Department proposes to define ``disassociability'' as enabling
the processing of data or events without association to individuals or
devices beyond the operational requirements of the system.
G. Foreign Beneficial Owner
The Department proposes to define ``foreign beneficial owner'' as a
beneficial owner that is not a United States person.
H. Foreign Customer
The Department proposes to define ``foreign customer'' as a
customer that is not a United States person.
I. Foreign Reseller
The Department proposes to adopt the definition from E.O. 14110 and
define ``foreign reseller'' to mean a foreign person who has
established an IaaS Account to provide IaaS subsequently, in whole or
in part, to a third party. This is consistent with the definition for
foreign reseller included in E.O. 14110.
J. Individual
The Department proposes to define ``individual'' as any natural
person.
K. Infrastructure as a Service Product
This proposed definition adopts the E.O. 13984 definition for
``Infrastructure as a Service product'', which is any product or
service offered to a consumer, including complimentary or ``trial''
offerings, that provides processing, storage, networks, or other
fundamental computing resources, and with which the consumer is able to
deploy and run software that is not predefined, including operating
systems and applications. The consumer typically does not manage or
control most of the underlying hardware but has control over the
operating systems, storage, and any deployed applications. The term is
inclusive of ``managed'' products or services, in which the provider is
responsible for some aspects of system configuration or maintenance,
and ``unmanaged'' products or services, in which the provider is only
responsible for ensuring that the
[[Page 5702]]
product is available to the consumer. The term is also inclusive of
``virtualized'' products and services, in which the computing resources
of a physical machine are split between virtualized computers
accessible over the internet (e.g., ``virtual private servers''), and
``dedicated'' products or services in which the total computing
resources of a physical machine are provided to a single person (e.g.,
``baremetal'' servers).
The Department believes that this expansive definition will allow
for regulations to apply to a broad range of IaaS product offerings
that can be used by foreign malicious cyber actors to carry out attacks
on the United States or United States persons. Note that this
definition includes all service offerings for which a consumer does not
manage or control the underlying hardware, but rather contracts with a
third party to provide access to this hardware. This definition would
capture services such as content delivery networks, proxy services, and
domain name resolution services. It does not, however, capture domain
name registration services for which a consumer registers a specific
domain name with a third party, as that third party does not provide
any processing, storage, network, or other fundamental computing
resource to the consumer. The Department seeks comment on the
categories of products or services that fall within this definition.
L. Integrity
The Department proposes to define ``integrity'' as guarding against
improper information modification or destruction and includes ensuring
information non-repudiation and authenticity.
M. Knowledge
The Department proposes to define ``knowledge'' as knowledge of a
circumstance (the term may be a variant, such as ``know,'' ``reason to
know,'' or ``reason to believe'') including not only positive knowledge
that the circumstance exists or is substantially certain to occur, but
also an awareness of a high probability of its existence or future
occurrence. Such awareness is inferred from evidence of the conscious
disregard of facts known to a person and is also inferred from a
person's willful avoidance of facts. This definition is similar to that
in the Department's Export Administration Regulations.
N. Large AI Model With Potential Capabilities That Could Be Used in
Malicious Cyber-Enabled Activity
The Department proposes to define ``large AI model with potential
capabilities that could be used in malicious cyber-enabled activity''
as any AI model with the technical conditions of a dual-use foundation
model, or that otherwise has technical parameters of concern, that has
capabilities that could be used to aid or automate aspects of malicious
cyber-enabled activity, including but not limited to social engineering
attacks, vulnerability discovery, denial-of-service attacks, data
poisoning, target selection and prioritization, disinformation or
misinformation generation and/or propagation, and remote command-and-
control, as necessary and appropriate of cyber operations. The
Department seeks comment on this proposed definition.
E.O. 14110 also instructs the Secretary to determine and to update,
``as necessary and appropriate,'' the set of technical conditions for a
``large AI model to have potential capabilities that could be used in
malicious cyber-enabled activity.'' Based on the above definition, the
Secretary will make this initial determination and any necessary and
appropriate updates to it which the Department will publish in the
Federal Register. Such technical conditions may include the compute
used to pre-train the model exceeding a specified quantity.
The Department seeks comment on the proposed definition, as well as
on the Secretarial process for determining and, because of rapidly
advancing technology, updating the set of specific technical conditions
necessary for a large AI model to meet the definition and have the
potential capabilities that could be used in malicious cyber-enabled
activities.
O. Manageability
The Department proposes to define ``manageability'' as providing
the capability for granular administration of data, including
alteration, deletion, and selective disclosure.
P. Predictability
The Department proposes to define ``predictability'' as enabling
reliable assumptions by individuals, owners, and operators about data
and their processing by a system, product, or service.
Q. Privacy-Preserving Data Sharing and Analytics
The Department proposes to define ``privacy-preserving data sharing
and analytics'' as the use of privacy-enhancing technologies to achieve
disassociability, predictability, manageability, and confidentiality
when performing analytics on data.
R. Red Flag
The Department proposes to define ``Red Flag'' as a pattern,
practice, or specific activity that indicates the possible existence of
malicious cyber-enabled activities.
S. Reseller
The Department proposes to define ``reseller'' as a person that
maintains a Reseller Account.
T. Risk-Based
The Department proposes to define ``risk-based'' as based on an
assessment of the relevant risks, including those presented by the
various types of service offerings maintained by an IaaS provider, the
methods used to open an Account, the varying types of identifying
information available to an IaaS provider, and an IaaS provider's
customer base.
U. Secretary
The Department proposes to define ``Secretary'' as the Secretary of
Commerce or the Secretary's designee.
V. Threat Landscape
The Department proposes to define ``threat landscape'' as the broad
environment of geopolitical, economic, and technological factors that
must be evaluated when developing risk-based procedures that enable an
IaaS provider to form a reasonable belief of the true identity of each
Account owner and beneficial owner to deter facilitating significant
malicious cyber-enabled activities.
W. Training or Training Run
The Department proposes to define ``training'' or ``training run''
as any process by which an AI model learns from data through the use of
computing power.
X. United States Infrastructure as a Service Product
The Department proposes to clarify the E.O.'s definition of
``United States Infrastructure as a Service product.'' The E.O. defines
this term as ``any Infrastructure as a Service Product owned by any
United States person or operated within the territory of the United
States of America.'' The Department considers Reseller Accounts as IaaS
products.
Y. United States Infrastructure as a Service Provider
E.O. 13984 defines ``United States Infrastructure as a Service
provider'' as ``any United States Person that offers any Infrastructure
as a Service product.'' The Department notes that this
[[Page 5703]]
definition of ``United States Infrastructure as a Service provider''
includes any United States person that is a direct provider of U.S.
IaaS products and any of their U.S. resellers. The Department proposes
to consider U.S. resellers of U.S. IaaS products as IaaS providers
subject to these proposed regulations.
In response to the ANPRM, several commenters suggested that the
Department clarify whether this term includes foreign subsidiaries of
United States persons. Specifically, these commenters believed
including foreign subsidiaries of United States persons in this
definition would exceed the scope of the E.O., which focuses on threats
to the United States from U.S. IaaS products, not those offered by
foreign subsidiaries. The Department proposes to clarify that a foreign
subsidiary of a U.S. IaaS provider is not considered to be a ``United
States Infrastructure as a Service provider.''
E.O. 13984 requires the Secretary to propose regulations to require
providers to ``verify the identity of a foreign person in connection
with the opening of an Account or the maintenance of an existing
Account.'' It requires that any regulations set out the types of
documentation or procedures ``required to verify the identity of any
foreign person acting as a lessee or sub-lessee of these products or
services.'' The Department proposes to consider U.S. resellers of U.S.
IaaS products as U.S. IaaS providers subject to these proposed
regulations.
(2) Customer Identification Program Regulations and Relevant Exemptions
Under this proposed rule, U.S. IaaS providers and their foreign
resellers would maintain CIPs, perform effective customer verification,
and maintain identifying information about their foreign customers,
which is critical to combating malicious cyber-enabled activities. The
Department proposes to require that all U.S. IaaS providers implement
their own CIPs, require CIPs of their foreign resellers, and report to
the Department on these CIPs. The Department will consider allowing
U.S. IaaS providers an adjustment period to implement some provisions
of this proposed regulation and notify the Department accordingly, and
anticipates that compliance would be required within one year of the
date of publication of any final rule.
Accordingly, the Department proposes to require IaaS providers
develop their own risk-based CIP. Taking into consideration the
different types of IaaS Accounts, the different methods used to open
the Accounts, and the types of information available to identify
foreign malicious cyber actors, while avoiding the imposition of an
undue burden on providers, the Department proposes to allow each
provider to create a CIP that matches its unique service offerings and
customer bases. Provided that IaaS providers meet certain minimum
requirements in their CIPs, providers can create CIPs that are flexible
and minimally burdensome to their business operations.
The Department proposes to require U.S. resellers of U.S. IaaS
Accounts to establish CIPs and identity verification procedures to be
used any time they act as a reseller for U.S. IaaS products. The CIPs
of such U.S. resellers would be subject to the minimum standards in
this proposed rule. U.S. resellers would be responsible for
establishing the identity of their potential customers, including all
prospective beneficial owners of these Accounts, and determining
whether they are U.S. persons. U.S. resellers would also be responsible
for verifying the identity of their foreign customers under this
proposed rule. The Department requests comments on whether resellers
that are small businesses might find it more difficult to develop a
CIP. The Department proposes to allow U.S. resellers, by agreement with
a U.S. IaaS provider, to reference, use, rely on, or adopt the CIPs
created by the U.S. IaaS provider to help minimize any compliance
burdens on the reseller. The Department further seeks comments on
whether resellers currently request identifying information from their
customers and how these resellers verify the identity of their
prospective foreign customers.
The Department seeks comments on whether to require IaaS providers
to conduct third-party or internal audits to confirm their compliance
with CIP requirements in the proposed rule. The Department also seeks
comments on whether the Department should receive and approve all CIPs.
The Department additionally seeks comments on whether the rulemaking
should require U.S. IaaS providers to submit Red Flags either to the
Department or to another relevant department or agency. Below, the
Department explains additional specific requirements for CIPs.
A. Data Collection Requirements
Under the proposed rule, each CIP must include procedures that U.S.
IaaS providers and their foreign resellers will use to collect
information from all covered existing and prospective customers, that
is, those who have applied for an account. At a minimum, the following
data would be collected: a customer's name, address, the means and
source of payment for each customer's Account, email addresses and
telephone numbers, and internet protocol (IP) addresses used for access
or administration of the Account. IaaS providers may alter their CIPs
to require additional information from prospective customers that is
necessary to verify the identity of any foreign person, but all CIPs
must, at a minimum, collect the previously listed data. The Department
proposes omitting a requirement for collecting and verifying national
identification numbers because, based on public feedback, the
Department believes that national identification number verification
would be unduly burdensome and would not be necessary to verify
identity. The Department seeks comments on whether other forms of
identification, such as digital or technology-based identification,
should be included as an acceptable means by which IaaS providers may
verify customers' identities, and if companies have privacy-protecting
or privacy-enhancing technologies to verify this same information or
other alternatives that can effectively achieve identity verification.
The Department believes that many U.S. IaaS providers and their
foreign resellers already collect this information from their
customers, and that the proposed rule would set a baseline for data
collection that would help all providers effectively verify and
document the identities of their customers. The Department seeks
comments on the costs and burdens associated with this proposed
requirement and whether the Department should include additional data
collection in a baseline requirement for CIPs. The Department proposes
a requirement that providers make a written description of their CIPs
available for inspection by the Department, which may identify specific
shortcomings for providers to resolve. The Department seeks comment on
this proposal.
The Department is proposing to require that CIPs account for the
collection of identifying information about the actual Account owner
and all beneficial owners of the Account. Specifically, the proposed
required description of the CIP would specify how providers would
ensure that all beneficial owners of an Account at its inception and
any new beneficial owner added to the Account undergo the same
identification procedures as the person opening the Account. The
Department seeks comment on this approach.
[[Page 5704]]
B. Prospective Customers From the United States
E.O. 13984 addresses threats to U.S. IaaS products and services by
foreign malicious cyber actors. Section 1 of the E.O. therefore
requires the Department to propose regulations to require U.S. IaaS
providers to verify the identity of ``a foreign person that obtains an
Account.''
Therefore, the Department proposes to require U.S. IaaS providers
to verify the identity of foreign persons who obtain an Account from
providers and to require the same of their foreign resellers. Although
providers would be required to create a CIP that includes the minimum
data collection requirements for all prospective customers, they would
not be required to verify the identity of customers with Accounts
opened by or on behalf of a U.S. person, unless a foreign beneficial
owner is added to the Account or the Account or a portion of the
Account is resold to a foreign person.
The Department seeks comments about whether the proposed data
collection requirements above would enable providers to accurately
distinguish foreign current and prospective customers from others. If
these proposed requirements are inadequate, what additional required
information should be included in the CIPs to aid in these efforts? The
Department also seeks comments on the availability of secure data
deletion standards and whether to require their implementation for
Accounts determined to be opened, owned, and accessible exclusively by
U.S. persons.
C. Identity Verification
The Department proposes to require that CIPs include procedures to
ensure that U.S. IaaS providers and their foreign resellers verify the
identity of all foreign Account owners and foreign beneficial owners.
Under the proposed rule, providers may craft their own procedures and
methods to verify the identity of their prospective foreign customers
and beneficial owners, provided that their CIPs include risk-based
procedures that enable the provider to form a reasonable belief about
the true identity of each customer and beneficial owner. These
procedures must be based on a provider's assessment of the relevant
risks, including those presented by the various types of service
offerings maintained by the provider, the methods used to open an
Account, the varying types of identifying information available to the
provider, and the provider's customer base. Under the proposed rule,
the CIP must establish whether a provider will use documentary or non-
documentary verification or a combination of both. It must establish
how a provider will verify the identity of its customers when the
customer is unable to produce the requested documents. The Department
believes this flexibility would minimize the burden placed on providers
by these regulations. The Department seeks comments on this risk-based
approach to allow providers to form reasonable beliefs of the true
identity of each customer and beneficial owner and on what information
they would need to collect to accomplish this.
Under the proposed rule, the CIP must include steps a provider
would take if it is unable to verify the identity of any customer,
including refusing to open an Account and/or additional monitoring
pending attempts at verification. It must further set out the terms
under which a customer may continue to have access to an Account while
the provider attempts to verify the identity of the customer, and when
a provider would close an Account after attempts to verify a customer's
identity have failed. Additionally, it must describe measures for
redress and issue management to address situations in which legitimate
customers may fail identity verification, or in which their information
was compromised and a fraudulent account established. The Department
seeks comments on whether to require specific verification methods,
such as email or payment verification, for all prospective customers.
The Department seeks comments on whether the Department should allow
providers to grant potential customers access to Accounts prior to
successful identity verification. The Department seeks comments on
whether including reference to National Institute of Standards and
Technology (NIST) Special Publication (SP) 800-63 regarding digital
identity guidelines would help IaaS providers meet requirements for
identity verification.
D. Recordkeeping
The Department proposes to require U.S. IaaS provider and foreign
reseller of U.S. IaaS product CIPs to include procedures for
maintaining, protecting, and obtaining access to records of relevant
customer information accessed in the process of verifying customer
identities. At a minimum, this record must include a description of the
identity evidence and attributes provided by the customer when the
customer first attempted to open an Account, a description of the
methods and results of any measures undertaken to verify customer
identity, and a description of the resolution of any substantive
discrepancy discovered when verifying the identifying information. The
proposed rule leaves to IaaS providers the discretion to design their
own recordkeeping procedures, so long as these procedures obtain this
minimum information.
The Department proposes to require that CIPs of U.S. IaaS providers
and their foreign reseller include requirements to securely maintain
these records and describe measures taken to ensure that the
information is secure. The proposed regulations would require that IaaS
providers limit access to any records or documents created, retained,
or accessed pursuant to these regulations by any third parties or IaaS
provider employees without a need-to-know basis for obtaining this
access. However, no such requirement should be read to limit IaaS
providers' ability to share security best practices and threat
information with other IaaS providers, relevant consortia, or the U.S.
Government as needed and consistent with applicable law. The Department
seeks comments on the feasibility of this approach and the costs of
doing so. The Department further seeks comments on whether there
currently exist best practices for the maintenance, storage, and
security of customer identifying information.
The Department proposes to require that U.S. IaaS providers retain
these records for a period of two years after the date upon which an
Account was last accessed or closed. The Department preliminarily
determines that a two-year period is necessary to allow law enforcement
the ability to gain access to this information should an Account be
suspected of hosting malicious cyber-enabled activity. The Department
seeks comments on the burdens to IaaS providers of maintaining these
records for two years, and whether there are alternative ways to allow
for both immediate and long-term access to customer information should
an Account be used for malicious cyber-enabled activity. The Department
seeks comments on whether to require that CIPs include procedures to
address situations where an Account that has been inactive for more
than two years is subsequently accessed by a foreign person, and
whether to require that IaaS providers request that the foreign person
provide the enumerated identifying information again in these
circumstances.
[[Page 5705]]
E. Ensuring Verification for Foreign Resellers
As directed in E.O. 14110, the Department proposes to require that
U.S IaaS providers only initiate or continue a reseller relationship
with foreign resellers of U.S. IaaS products that maintain and
implement a CIP that meets the requirements for CIPs of U.S. IaaS
providers in this proposed rule. The Department recognizes that it will
take U.S. IaaS providers time to educate, coordinate, and collect
information from their foreign resellers on CIP requirements and
therefore anticipates allowing U.S. IaaS providers up to one year to
implement such final provisions and notify the Department accordingly.
Under this proposed rule, U.S. IaaS providers would be required to
furnish a copy of any foreign reseller's CIP to the Department within
ten calendar days following a request for the same from the Department.
The Department seeks comments on the potential challenges that U.S.
IaaS providers would face when collecting this information from their
foreign resellers of U.S. IaaS products. The proposed rule would also
require that, upon receipt of evidence that indicates the failure of a
foreign reseller to maintain or implement a CIP or that indicates
malicious cyber-enabled activity, U.S. IaaS providers must report
malicious cyber-enabled activity and close accounts associated with the
activity and must terminate the reseller relationship within 30
calendar days. The Department seeks comments on the challenges U.S.
IaaS providers would face in investigating and remediating malicious
cyber activity by foreign resellers, as well as the contractual
difficulties posed by terminating the relationship with a non-compliant
foreign reseller. The Department further seeks comments on the extent
to which there currently exist customer identification and verification
practices which U.S. IaaS providers require their foreign resellers to
use.
F. Customer Identification Program Updates and Certifications
The Department proposes to require that U.S. IaaS providers submit
to the Department certain information about their CIPs and their
foreign resellers' CIPs, to include procedures on verifying customer
identity and detecting malicious cyber activity, as well as information
and data on their provision of IaaS products. The Department further
proposes to require that U.S. IaaS providers and their foreign
resellers update their CIPs annually to protect against new cyber
threats and vulnerabilities, as well as to increase efficiency and data
security, and to certify to the Department that such annual updates
have occurred. The Department proposes that U.S. IaaS providers must
notify the Department of any updates to their CIP or any CIP of their
foreign resellers. In these annual certifications, providers would also
attest to the Department that, since the date of last certification,
they have reviewed their CIPs and updated their CIPs to account for any
changes in their service offerings and for changes to the threat
landscape. The certification would include an attestation that the
current CIP complies with the provisions of the proposed rule. This
attestation would require the provider to indicate the frequency with
which it was unable to verify the identity of a foreign customer in the
prior calendar year and record the resolution for each of those
situations. The Department seeks comments on the usefulness and
feasibility of such attestation and whether the Department should
require additional information in these certifications, the procedures
for submission of such certifications, and whether the Department
should require these certifications more or less frequently than
annually. The Department seeks comments on whether there currently
exist best practices for customer identification and verification that
providers can use as a model for their CIPs.
G. Exemptions
Section 1(c) of E.O. 13984 permits the Secretary, in accordance
with such standards and procedures as the Secretary may delineate and,
in consultation with the Secretary of Defense, the Attorney General,
the Secretary of Homeland Security, and the Director of National
Intelligence, to exempt any U.S. IaaS provider, or any specific type of
Account or lessee, from the requirements of any regulation issued
pursuant to the section. Such standards and procedures may include a
finding by the Secretary that a provider, Account, or lessee complies
with security best practices to otherwise deter abuse of IaaS products.
Section 4.2(d)(iii) of E.O. 14110 also provides that the Secretary may
``exempt a United States IaaS Provider with respect to any specific
foreign reseller of their United States IaaS Products, or with respect
to any specific type of account or lessee, from the requirements of any
regulation issued pursuant to this subsection,'' that section being
related to CIP requirements for foreign resellers of U.S. IaaS
products.
This NPRM proposes standards and procedures for exemptions from CIP
requirements in Sec. Sec. 7.302 through 7.305 for U.S. IaaS providers
and with regard to any of their specific foreign resellers. The
regulations propose that providers seeking an exemption submit a
written request electronically. The Department anticipates that the
final rule would designate an email address to receive such requests.
The Department seeks comments on these standards and procedures in
proposed Sec. 7.306. The Department seeks comment on whether there
exist security best practices to deter abuse of U.S. IaaS products that
the Secretary may reference in the future to authorize exemptions from
these regulations, including but not limited to improving event log
management to generate, safeguard, and retain logs of IaaS providers'
system and network events, both to improve incident detection and to
aid in incident response and recovery activities. The Department also
seeks comments on whether there are appropriate safe harbor activities
that might form the basis of an exemption program.
(3) Special Measures Regulations
A. Special Measures Requirements
The Department proposes regulations to implement the authority
provided to the Secretary to take either of the special measures
enumerated in E.O. 13984, should the Secretary determine that
reasonable grounds exist for concluding that a jurisdiction or person
outside of the U.S. ``has any significant number of foreign persons
offering U.S. IaaS products that are used for malicious cyber-enabled
activities or any significant number of foreign persons directly
obtaining U.S. IaaS products for use in malicious cyber-enabled
activities.'' The Department proposes to allow the Department to
initiate investigations of its own accord or accept referrals from
other executive branch agencies or providers to evaluate evidence about
a particular foreign jurisdiction or person to determine whether to
impose a special measure. The Department would then assess the
information in its possession and information available from public and
other sources about a foreign person or foreign jurisdiction to
determine whether imposing a special measure would be appropriate.
Should the Secretary determine that the evidence warrants the
imposition of a special measure, the Secretary would issue a
determination in the Federal Register, to take effect 30 days after
publication, that would set out the reasonable grounds for this
determination and
[[Page 5706]]
would indicate which special measure the Secretary would intend to use.
B. Reasonable Grounds Determination
E.O. 13984 provides that, when determining whether a particular
foreign jurisdiction ``has any significant number of foreign persons
offering U.S. IaaS products that are used for malicious cyber-enabled
activities or any significant number of foreign persons directly
obtaining U.S. IaaS products for use in malicious cyber-enabled
activities,'' the Secretary must consider, among other relevant
information: (1) evidence that foreign malicious cyber actors have
obtained U.S. IaaS products in that foreign jurisdiction, including
whether such actors obtained such U.S. IaaS products through reseller
accounts; (2) the extent to which that foreign jurisdiction is a source
of malicious cyber-enabled activities; and (3) whether the U.S. has a
mutual legal assistance treaty with that foreign jurisdiction, and the
experience of U.S. law enforcement officials in obtaining information
about activities involving U.S. IaaS products originating in or routed
through such foreign jurisdiction.
With respect to foreign persons, the Secretary must assess: (1) the
extent to which a foreign person uses U.S. IaaS products to conduct,
facilitate, or promote malicious cyber-enabled activities; (2) the
extent to which U.S. IaaS products offered by a foreign person are used
to facilitate or promote malicious cyber-enabled activities; (3) the
extent to which U.S. IaaS products offered by a foreign person are used
for legitimate business purposes in the jurisdiction; and (4) the
extent to which actions short of the imposition on special measures are
sufficient, with respect to transactions involving the foreign person
offering U.S. IaaS products, to guard against malicious cyber-enabled
activities. Finally, the Secretary may analyze any information gleaned
through the Department's existing authority to review ICTS transactions
pursuant to its authority derived from Executive Order 13873 of May 17,
2019, ``Securing the Information and Communications Technology and
Services Supply Chains'' (84 FR 22689). The Department seeks comments
on any additional relevant factors the Secretary should consider.
C. Choosing a Special Measure
The Department proposes to require that the Secretary's
investigation process include consultation with the agencies referenced
in E.O. 13984, namely the Secretary of State, the Secretary of the
Treasury, the Secretary of Defense, the Attorney General, the Secretary
of Homeland Security, the Director of National Intelligence, and other
heads of other executive departments and agencies as the Secretary
deems appropriate, to determine which special measure to impose. This
consultation would include a review of the available evidence to
determine whether to impose a special measure against a foreign
jurisdiction or against a foreign person; a consideration of whether
the imposition of the special measure would create a significant
competitive disadvantage, including any undue cost or burden associated
with compliance, for providers; and a determination of the extent to
which the imposition of a special measure or the timing of the special
measure would have a significant adverse effect on legitimate business
activities involving the foreign jurisdiction or foreign person.
Finally, the determination would include an assessment of the effect of
any special measure on U.S. supply chains, public health or safety,
national security, law enforcement investigations, or foreign policy.
The Department seeks comments on whether additional considerations
should be included before the Secretary would choose a special measure.
(3) AI Training Reporting Requirements
Section 4.2 (c)(i) of E.O. 14110 instructs the Secretary to
``propose regulations that require United States IaaS Providers to
submit a report to the Secretary of Commerce when a foreign person
transacts with that United States IaaS provider to train a large AI
model with potential capabilities that could be used in malicious
cyber-enabled activity.'' Such report shall include, at a minimum, the
identity of the foreign person and the existence of any training run of
an AI model meeting the criteria set forth in E.O. 14110 or otherwise
determined by the Secretary, and other information as identified by the
Secretary. In addition, section 4.2(c)(ii) of E.O. 14110 directs that
U.S. IaaS providers must be required to prohibit foreign resellers of
their U.S. IaaS products from providing those products unless the
foreign resellers submit such reports to the provider, which the
provider must provide to the Secretary.
This proposed rule would require such providers to report to the
Department information on instances of training runs by foreign persons
for large AI models with potential capabilities that could be used in
malicious cyber-enabled activity. Reportable information includes the
identifying information about the training run (i.e., the customer's
name, address, the means and source of payment for the customer's
Account, email addresses, telephone numbers, and IP addresses) and the
existence of the training run. The Department requests comment on what
additional information, if any, the Department should require providers
report.
Section 4.2(c)(iii) instructs the Secretary to ``determine the set
of technical conditions for a large AI model to have potential
capabilities that could be used in malicious cyber-enabled activity,
and revise that determination as necessary.''
The Department has proposed that a model meets the definition of a
``large AI model with potential capabilities that could be used in
malicious cyber-enabled activity'' if it meets technical conditions
issued by the Department in interpretive rules published in the Federal
Register. The Department will update the technical conditions, based on
technological advancements, as necessary and appropriate, as directed
by E.O. 14110, through interpretive rules published in the Federal
Register. The Department seeks comment on the definition of a ``large
AI model that could be used in malicious cyber-enabled activity,'' and
on what Red Flags, if any, the Department should adopt that would
create a presumption that a foreign person is training a model with the
technical conditions set out in E.O. 14110.
(4) Compliance and Enforcement
Though issued pursuant to the President's authority derived from
IEEPA, E.O. 13984 is silent as to penalties for noncompliance. The
Department proposes to clarify that any person who commits a violation
of this proposed rule, if finalized, may be liable to the United States
for civil or criminal penalties under IEEPA. Although the Department
currently has penalty provisions under 15 CFR 7.200 for violations of
Final Determinations issued pursuant to the Department's ICTS
authorities pursuant to the IEEPA, the Department believes it is
important to have a new enforcement section specific to violations of
these IaaS-related provisions. Accordingly, the Department is adding a
section on enforcement, which lists civil and criminal penalties, and
the acts particular to these IaaS-related provisions that will result
in those penalties. For example, the new enforcement section specifies
that it is a violation to fail to create a CIP, or to fail to file with
the Department a CIP certification, or fail to seek reauthorization for
such CIPs on an
[[Page 5707]]
annual basis. It is also a violation to fail to inform the Department
about a covered IaaS transaction that might result in a customer
obtaining or using a large AI model with potential capabilities that
could be used in malicious cyber-enabled activity when an IaaS provider
knows or should know of such transaction.
Regarding penalties for violations, whether a violation results in
a civil or criminal penalty will depend largely on the nature of the
offense. For example, intentionally or knowingly violating a provision
of these regulations could result in criminal penalties, while
unintentional violations are more likely to result in civil penalties.
The Department seeks comments on this approach.
V. Classification
a. Executive Order 12866
This rulemaking has been determined to be a significant action
under Executive Order 12866, as amended by Executive Order 14094.
b. Regulatory Impact Analysis
As required by Executive Order 12866, and the Regulatory
Flexibility Act, 5 U.S.C. 601, et seq., the Department of Commerce has
prepared the following regulatory impact analysis (RIA) and initial
regulatory flexibility analysis (IRFA) for this proposed rule.
1. Need for Regulatory Action
The reasons for and need for this action are summarized in this
preamble. This rule is being proposed pursuant to E.O. 13984, ``Taking
Additional Steps To Address the National Emergency With Respect to
Significant Malicious Cyber-Enabled Activities,'' and E.O. 14110,
``Safe, Secure, and Trustworthy Development and Use of Artificial
Intelligence.'' As stated in E.O. 13984, ``Foreign actors use United
States IaaS products for a variety of tasks in carrying out malicious
cyber-enabled activities, which makes it extremely difficult for United
States officials to track and obtain information through legal process
before these foreign actors transition to replacement infrastructure
and destroy evidence of their prior activities; foreign resellers of
United States [IaaS] products make it easier for foreign actors to
access these products and evade detection.'' Furthermore, E.O. 14011
states that ``irresponsible use could exacerbate societal harms such as
fraud, discrimination, bias, and disinformation; displace and
disempower workers; stifle competition; and pose risks to national
security.'' To address these threats, E.O. 13984 requires the Secretary
to propose regulations ``that require United States Infrastructure as a
Service (IaaS) providers to verify the identity of a foreign person
that obtains an Account.'' These regulations must also require U.S.
IaaS providers to verify the identity of foreign customers, and the
E.O. authorizes the Secretary to limit certain foreign actors' access
to U.S. IaaS products. E.O. 14110 adds to these requirements by
requiring the Secretary to propose regulations that require U.S. IaaS
providers to ensure that foreign resellers of U.S. IaaS products verify
the identity of any foreign person that obtains an IaaS Account for the
foreign reseller. These requirements are necessary to protect the
national security of the United States and the integrity of the ICTS
supply chain.
2. Affected Entities
The proposed rulemaking would apply to all U.S. providers of U.S.
IaaS products, including resellers.
3. Number of Affected Entities
The Department estimated both a lower and upper bound for the
number of entities affected by the proposed rule. To derive the lower
bound estimate, the Department first identified a core group of IaaS
providers that operate in the United States. This lower bound estimate
assumes that all United States IaaS products are sold directly to the
customer and no domestic resellers supply these products. Based on this
lower bound estimate, the Department estimates that approximately 25
providers in the United States would be potentially directly impacted
by this rulemaking.
The upper bound estimate of potentially impacted entities is based
on the estimated number of resellers who participate in the sale of
U.S. IaaS products. According to the Census Bureau, in 2020 there were
1,812 firms that owned at least one establishment located within the
United States and operating in North American Industry Classification
System (NAICS) code 517121--Telecommunication Resellers in the United
States.\1\ While most of these entities would not likely be impacted by
this proposed rule as they do not resell IaaS products or services, the
Department uses this figure as the upper bound estimate for this impact
statement because it is possible all of the Telecommunications
Resellers could engage in IaaS product resale. The Department therefore
estimates the number of entities potentially affected by this
rulemaking would be between 25 and 1,837. Of those firms operating in
the Telecommunications Resellers industry under NAICS 51721, 99
percent, or 1,791 firms, operate an enterprise size of 500 or fewer
employees. This data underscores that the majority of listed entities
in this sector can be classified as small businesses based on this
specific definition.
---------------------------------------------------------------------------
\1\ A firm is a business organization consisting of one or more
domestic establishments in the same geographic area and industry
that were specified under common ownership or control. See: https://www.census.gov/programs-surveys/susb/about/glossary.html.
---------------------------------------------------------------------------
4. Administrative Compliance Burden on U.S. Companies
The Department assessed the administrative compliance burden on
U.S. companies by estimating the costs of: (1) learning about the
proposed rule; (2) developing CIPs; (3) implementing CIPs; (4) updating
CIPs; (5) completing annual certifications; (6) educating foreign
resellers on CIP requirements; and (7) processing reporting from and on
foreign resellers and foreign customers. Although the rulemaking would
provide certain regulatory alternatives for industry, such as the
option to adopt the CIP of another provider, and exemptions from the
CIP requirement in certain circumstances, the below analysis assumes
that each company would engage in the development, implementation, and
updating of a CIP.
The Department also requests public comment on any of the
assumptions and estimates in this analysis.
i. Learning About the Proposed Rule
The Department expects that businesses learning about the proposed
rule and its requirements would largely be accomplished by attorneys
and operations managers. The Department's estimate for the cost to
businesses of learning about the rulemaking is further derived from
estimates of the number of firms potentially impacted by the
rulemaking, the share of potentially impacted firms likely to devote
time and resources to learning about the rulemaking, the number of
hours needed to read and learn about the rulemaking, and the wages of
the employees tasked with learning about the rulemaking. Table 1
provides a detailed breakdown of the framework for estimating these
costs.
[[Page 5708]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.004
[[Page 5709]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.005
[[Page 5710]]
ii. Developing a CIP
To develop CIPs, companies would likely be required to assess their
offerings of IaaS products, analyze relevant cybersecurity risks
associated with these products, evaluate procedures for customer
identity verification, and develop risk mitigation strategies.
To estimate the financial impact to businesses of developing a CIP,
the Department estimated the number of firms likely impacted by the
proposed rule, the share of potentially impacted firms likely to devote
time and resources to developing a CIP, the number of hours needed to
develop a CIP, and the wages of the employees tasked with developing a
CIP. A detailed breakdown of the framework for estimating these costs
can be found in table 2.
[GRAPHIC] [TIFF OMITTED] TP29JA24.006
[GRAPHIC] [TIFF OMITTED] TP29JA24.007
[[Page 5711]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.008
[[Page 5712]]
iii. Implementing the CIP
Implementation of a CIP would likely entail: collecting and
verifying identifying information of customers, maintaining a secure
recordkeeping system, performing due-diligence checks using government
lists of known malicious cyber actors, and providing annual reports to
the Department. The proposed rule would also require entities to
monitor aspects of compliance with their foreign customers and
resellers. The costs estimated for implementing a CIP would be incurred
annually. To estimate the financial impact to businesses of
implementing a CIP, the Department estimated the number of firms
potentially impacted by the proposed rule, the share of potentially
impacted firms likely to implement a CIP, and the wages of the
employees performing these tasks. A detailed breakdown of the framework
for estimating these costs can be found in table 3.
[GRAPHIC] [TIFF OMITTED] TP29JA24.009
[GRAPHIC] [TIFF OMITTED] TP29JA24.010
[[Page 5713]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.011
[[Page 5714]]
iv. Updating the CIP
The proposed rule would require that affected entities regularly,
at least annually, update their CIPs to account for new technologies,
cybersecurity vulnerabilities, and changes to their business. This
would likely entail reviewing the threat landscape from the previous
year and identifying system vulnerabilities. Table 4 details the
estimated financial impact to businesses of annually updating a CIP.
[GRAPHIC] [TIFF OMITTED] TP29JA24.012
[[Page 5715]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.013
v. Annual Certifications
The proposed rule would require IaaS providers to annually certify
to the Department that they have updated their CIP, that their CIP
complies with the rulemaking, and that they have recorded the
resolution of each situation in which the IaaS provider was unable to
verify the identity of a customer since its last certification.
The estimated costs of submitting annual certifications would occur
annually. This estimate for costs is derived from estimates of the
number of firms impacted by the proposed rule, the share of potentially
impacted firms likely to submit the annual certifications, and the
wages of the employees performing these tasks. A detailed breakdown of
the framework for estimating these costs can be found in table 5.
[[Page 5716]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.014
[[Page 5717]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.015
vi. Foreign Reseller Requirements
The burden of learning about the proposed rule, and developing,
maintaining, and recertifying CIPs for foreign resellers would fall
upon foreign entities (the foreign resellers themselves). However, the
Department recognizes that U.S. IaaS providers would be part of
educating foreign resellers on regulatory requirements. U.S. IaaS
providers would also need to collect and submit CIPs from foreign
resellers. The Department anticipates that foreign resellers of U.S.
IaaS providers would comply with the regulatory requirements, so does
not anticipate there to be impact beyond the regulatory costs of
compliance (which will fall to foreign entities), and the burden on
U.S. providers to educate foreign resellers and process foreign
reseller CIPs.
The Department recognizes that individual costs to industry would
vary according to the number of foreign resellers connected to a U.S.
IaaS provider. However, the Department is unable to estimate the
potential number of foreign resellers of U.S. IaaS products, as this
information is business proprietary information held by the U.S. IaaS
providers. Following the implementation of CIP reporting requirements
to the Department, the Department may be able to estimate a lower bound
and upper bound on potential cost per CIP certification. However, at
this time, due to the described limitations, the cost estimates have
been made on a programmatic basis as opposed to a per CIP certification
basis.
vii. Educating Foreign Resellers on U.S. CIP Requirements
U.S. IaaS providers would be required to ensure their foreign
resellers comply with this proposed rule and to ensure they receive
CIPs from their foreign resellers. This could involve notifying their
foreign resellers of this proposed rule's requirements, advising
foreign resellers on CIP solutions or processes, and generally
educating foreign resellers about this rulemaking.
This estimate for costs is derived from estimates of the number of
U.S. firms impacted by the proposed rule, the share of potentially
impacted firms to educate their foreign resellers, and the wages of the
employees performing these tasks. A detailed breakdown of the framework
for estimating these costs can be found in table 6.
[[Page 5718]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.016
[[Page 5719]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.017
[[Page 5720]]
viii. Processing Reporting From Foreign Resellers and on AI Training
Runs
The costs to U.S. IaaS providers associated with processing
reporting from foreign resellers include costs of collecting and
submitting to the Department upon request the CIPs from any foreign
resellers, as well as any associated miscellaneous administrative
costs. Processing reporting also would include U.S. IaaS providers'
activities to report on any of their foreign customers using their U.S.
IaaS products in a covered transaction for large AI model training.
These would be annual costs.
This estimate for costs is derived from estimates of the number of
U.S. firms impacted by the proposed rule, the share of potentially
impacted firms that need to process foreign reseller CIPs and reports
on foreign customers using their U.S. IaaS products in a covered
transaction for large AI model training, and the wages of the employees
performing these tasks. A detailed breakdown of the framework for
estimating these costs can be found in table 7.
[GRAPHIC] [TIFF OMITTED] TP29JA24.018
[[Page 5721]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.019
[[Page 5722]]
5. Potential Economic Impact of the Proposed Rule
Using the methodology described above, the Department has broken
out the estimated compliance costs--summarized in tables 8 and 9--
associated with the proposed rule's implementation. The cumulative
costs are estimated to be between $270,672 and $171.7 million.
[GRAPHIC] [TIFF OMITTED] TP29JA24.020
[GRAPHIC] [TIFF OMITTED] TP29JA24.021
[[Page 5723]]
[GRAPHIC] [TIFF OMITTED] TP29JA24.022
6. Benefits of the Proposed Rule
The ICTS industry, which includes IaaS products, has become
integral to the daily operations and functionality of U.S. critical
infrastructure, to U.S. Government operations, and to the U.S. economy
as a whole. As such, exploitation of vulnerabilities within the ICTS
supply chain can have a drastic effect on the U.S. national security.
As noted in E.O. 13984, ``foreign malicious cyber actors aim to harm
the United States economy through the theft of intellectual property
and sensitive data and to threaten national security by targeting
United States critical infrastructure for malicious cyber-enabled
activities.''
U.S. entities providing IaaS products, such as network management
or data storage, can create multiple opportunities for foreign
adversaries to exploit potential vulnerabilities in the ICTS ecosystem.
These potential vulnerabilities are often categorized under the general
concepts of threats to privacy, data integrity, and denial of service.
As E.O. 13984 highlights, foreign actors can exploit IaaS product
vulnerabilities to steal critical intellectual property, health data,
government information, or financial user information, potentially
without detection. Once detected, the existence of such vulnerabilities
may be extremely costly or impossible to remedy.
Malicious foreign actors can also exploit U.S. networks and systems
to facilitate data breaches, potentially modifying critical files or
data streams, or otherwise impacting the availability of data across
U.S. networks. Such capabilities could be exercised in areas as diverse
as financial market communications, satellite control systems, or other
sensitive sectors.
Further, a foreign adversary could target vulnerable IaaS products
to implement denial of service attacks, potentially causing widespread
disruptions to critical industries. Without effective attribution, it
is difficult for authorities to take mitigating actions to trace and
prevent these types of attacks.
These risks, if exploited, could carry significant economic and
social costs to both the U.S. Government and consumers. Sophisticated
cyber-attacks are often obfuscated, making it difficult to establish
the exact number of attacks that have leveraged IaaS product
vulnerabilities against the U.S. ICTS supply chain. Such attacks,
however, are increasing in frequency, exacting heavy tolls on U.S.
consumers and businesses. Not only can attacks impact both sales and
productivity, but they can also enact direct costs on businesses that
must expend significant resources to remedy vulnerabilities or even pay
ransom to retrieve data lost to attackers. While the Department is
unable to calculate with certainty the number of attacks targeting the
IaaS industry, the potential costs from these attacks are undoubtedly
high. Additionally, if the use of IaaS products is expected to increase
in the future, so too would the possibility of attacks. While the
Department lacks the data necessary to determine precisely the monetary
benefits of this proposed rule to compare with its estimated costs,
significant portions of the U.S. economy are dependent on resilient
ICTS and IaaS supply chains to function, and any disruption to these
supply chains will cause significant economic harm to downstream
industries.
7. Regulatory Alternatives
The Department considered several alternatives to this regulation
to reduce the costs. These are explained in detail in subpart C,
Regulatory Flexibility Analysis, of this section, below.
A. Regulatory Flexibility Act
In compliance with section 603 of the Regulatory Flexibility Act
(RFA), 5 U.S.C. 601-612, the Department has prepared an initial
regulatory flexibility analysis (IRFA) for this proposed rule. The IRFA
describes the economic impacts the proposed action may have on small
entities. The Department seeks comments on all aspects of the IRFA,
including the categories and numbers of small entities that may be
directly impacted by this proposed rule.
(1) A description of the reasons why action by the agency is being
considered. The description of the reasons why the proposed rule is
being considered is contained earlier in the preamble and is not
repeated here.
(2) A succinct statement of the objectives of, and legal basis for,
the proposed rule. The Department is proposing this rule to comply with
Executive Order 13984, ``Taking Additional Steps To Address the
National Emergency With Respect to Significant Malicious Cyber-Enabled
Activities'' (86 FR 6387), and E.O. 14110, ``Safe, Secure, and
Trustworthy Development and Use of Artificial Intelligence'' (88 FR
75191). E.O. 13984 directs the Secretary to propose regulations
requiring U.S. IaaS providers to collect customer identifying
information from prospective customers and to verify the identity of
all foreign customers. This E.O. further requires the Secretary to
propose regulations authorizing the
[[Page 5724]]
Secretary to utilize one of two special measures to limit or prohibit
specific IaaS Accounts should the Secretary, in consultation with
various heads of other Executive agencies, determine that reasonable
grounds exist to conclude the IaaS Account is being used to conduct
malicious, cyber-enabled activity. E.O. 14110 also requires the
Secretary to propose regulations that require U.S. IaaS providers
report to the Department when they transact with a foreign reseller to
train a large AI model with potential capabilities that could be used
in malicious cyber-enabled activity.
(3) A description of, and where feasible, an estimate of the number
of small entities to which the proposed rule will apply. The proposed
rule would apply to all providers of U.S. IaaS products, including
resellers. The Department acknowledges that actions taken pursuant to
this proposed rule may affect small entities or groups that are not
easily categorized at present. The Department assesses, based on
publicly available information, that the IaaS market is dominated by
four large providers; however, it is difficult to ascertain how many
small entities, are present in this market. For resellers, Survey of
U.S. Business Data suggests that approximately 99 percent of the
roughly 1,800 enterprises categorized as ``Telecommunications
Resellers'' under NAICS code 517911 have fewer than 500 employees,
indicating that the vast number of those resellers would be small
businesses under the Small Business Administration (SBA) threshold for
this NAICS code (https://www.sba.gov/document/support-table-size-standards). However, the Department lacks data on the number of these
Telecommunications Resellers that offer IaaS products.
(4) A description of the projected reporting, recordkeeping and
other compliance requirements of the proposed rule, including an
estimate of the classes of small entities that will be subject to the
requirement and the type of professional skills necessary for
preparation of the report or record. The proposed rule would impose on
all U.S. IaaS providers of U.S. IaaS products a new requirement to
identity and verify the identity of all foreign customers. It would
require providers to ensure that foreign resellers of their U.S. IaaS
products verify the identity of foreign users. It would require all
U.S. IaaS providers of U.S. IaaS products to report to the Department
information on instances of training runs by foreign persons for large
AI model with potential capabilities that could be used in malicious
cyber-enabled activity. Finally, it would require providers to submit
annual certifications attesting to the Department that they have
reviewed their CIPs and adjusted them to account for changes to the
threat landscape since their prior certification. The Department
believes this requirement would create the following recordkeeping
obligations:
(i) The proposed rule would require that the customer
identification and verification requirement be satisfied by obtaining
identification information from each customer. The provider would then
be required to verify customer identities through documentary or non-
documentary methods and to maintain in its records for two years a
description of (i) any document relied on for verification, (ii) any
such non-documentary methods and results of such measures undertaken,
and (iii) the resolution of any substantive discrepancies discovered in
verifying the identification information. The Department estimates that
the identification, verification, and recordkeeping requirements in the
proposed rule would require an IaaS provider employee twenty (20)
minutes, on average, to fulfill.
(ii) Annual Certifications. The proposed rule would require that
U.S. IaaS providers of U.S. IaaS products provide to the Department
annual certifications that indicate that the provider has updated their
customer identification program to account for technological advances
and the evolving threat landscape. The Department estimates it would
require eight (8) to twenty-four (24) hours to review prior year
compliance, complete CIP updates, and submit certification.
(iii) The proposed rule would require providers to submit a report
to the Department whenever a foreign person transacts with them to
train a large AI model with potential capabilities that could be used
in malicious cyber-enabled activity. The Department estimates that an
IaaS provider making a report on such a transaction could take on
average twenty (20) minutes, depending on the complexity of the
instance.
(5) An identification, to the extent practicable, of all relevant
Federal rules that may duplicate, overlap or conflict with the proposed
rule. This rulemaking does not duplicate or conflict with any Federal
rules.
(6) A description of any significant alternatives to the proposed
rule that accomplish the stated objectives of Executive Order 13984 and
Executive Order 14110 and applicable statutes and that would minimize
any significant economic impact of the proposed rule on small entities.
No-action alternative: Not implementing a rule under these
Executive orders (E.O.s) is not a viable alternative because both E.O.s
expressly direct that the Secretary ``shall propose for notice and
comment regulations'' given the related national security concerns
associated with malicious cyber-enabled activities through the use of
U.S. IaaS products.
Alternative that would categorically exclude small
entities or groups of small entities: This alternative would not
achieve the national security objectives of these E.O.s. Due to the
nature of ICTS networks, allowing even small entities or groups of
small entities unregulated access to IaaS products or services can
allow malicious actors to perpetrate attacks on the entire network,
posing an undue risk to U.S. critical infrastructure and the U.S.
economy as a whole.
Preferred alternative: The proposed rule is the preferred
alternative. It would achieve the objectives of the E.O.s by requiring
IaaS providers to verify customer identities and facilitating the
implementation of special measures that would allow the Secretary to
apply a case-by-case, fact-specific process to identify, assess, and
address any and all IaaS Accounts that pose an undue risk to the U.S.
national security. The proposed rule also offers an exemption program
that would offer providers an alternative to the CIP requirements to
reduce their compliance burdens, as providers can decide whether it is
less burdensome to implement a CIP or to apply for an exemption.
B. Paperwork Reduction Act
The Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.) (PRA)
provides that an agency generally cannot conduct or sponsor a
collection of information, and no person is required to respond to nor
be subject to a penalty for failure to comply with a collection of
information subject to the requirements of the PRA, unless that
collection has obtained Office of Management and Budget (OMB) approval
and displays a currently valid OMB Control Number.
This proposed rule contains new collection-of-information
requirements subject to review and approval by OMB under the PRA.
Specifically, this proposed rule would require U.S. IaaS providers of
U.S. IaaS products to develop a written CIP, which dictates how the
provider would collect identifying information about its customers, how
the provider would verify the identity of its foreign customers, store
and maintain
[[Page 5725]]
identifying information, and notify its customers about the disclosure
of identifying information. Additionally, the proposed rule would
require providers to report to the Department information on instances
of training runs by foreign persons for large AI models with potential
capabilities that could be used in malicious cyber-enabled activity.
The Department requests comment on what additional information, if any,
the Department should require providers report. Moreover, the proposed
rule would require that U.S. IaaS providers of U.S. IaaS products
submit to the Department an initial certification, and subsequent
annual certifications, detailing certain aspects of their CIPs and
stating that they have reviewed their CIP and adjusted it to account
for changes to the threat landscape since their prior certification.
These certifications would also include an attestation that the current
CIP complies with the provisions of the proposed rule. The attestations
would require the provider to indicate the frequency with which it was
unable to verify the identity of a foreign customer in the prior
calendar year and the number of times the provider refused to open an
Account.
Alternatively, under the proposed rule, U.S. IaaS providers of U.S.
IaaS products may seek an exemption from the CIP requirement by
providing a written submission to the Secretary. Should the Secretary
grant an exemption on the basis of a finding that the provider complies
with security best practices to deter abuse of IaaS products, including
that the provider has established an Abuse of IaaS Products Deterrence
Program, the provider must thereafter submit annual notifications to
the Department so that the Department could be assured that it
continues to maintain security best practices to deter the abuse of
U.S. IaaS products.
Public reporting burden for the reporting and recordkeeping
requirements are estimated to average 245,229 hours for the initial
learning, developing, and implementing a CIP for the relevant industry
participants (897 respondents * 274 hours, tables 1, 2, and 3).
Thereafter, the Department estimates a public reporting burden of
84,494 hours to update and annually certify with the Department a CIP
once it has been developed, as well as prepare the annual certification
(929 respondents * 91 hours, tables 4 and 5). The Department estimates
a public reporting burden of 127,328 hours for the relevant industry
participants to educate their foreign resellers on the proposed rule
and process reporting from and on foreign resellers and foreign
customers (692 respondents * 184 hours, tables 6 and 7). These
estimates include the time for reviewing instructions, searching
existing data sources, gathering the data needed, and completing and
reviewing the collection of information.
The total estimated cost to the U.S. Government is $409,200 (500
notifications * 2 staff @GS-12 salary ($102.30/hr) * average of 10
hours each to review for each notification). The $102.30 per hour cost
estimate for this information collection is consistent with the GS-
scale salary data for a GS-12 step 5.
The Department requests comments on the information collection and
recordkeeping requirements associated with this proposed rule. These
comments will help the Department:
(i) evaluate whether the information collection is necessary for
the proper performance of our agency's functions, including whether the
information will have practical utility;
(ii) evaluate the accuracy of our estimate of the burden of the
information collection, including the validity of the methodology and
assumptions used;
(iii) enhance the quality, utility, and clarity of the information
to be collected; and
(iv) minimize the burden of the information collection on those who
are to respond (such as through the use of appropriate automated,
electronic, mechanical, or other technological collection techniques or
other forms of information technology, e.g., permitting electronic
submission of responses).
C. Unfunded Mandates Reform Act of 1995
This proposed rule would not produce a Federal mandate (under the
regulatory provisions of title II of the Unfunded Mandates Reform Act
of 1995) for State, local, and tribal governments or the private
sector.
D. Executive Order 13132 (Federalism)
This proposed rule does not contain policies having federalism
implications requiring preparations of a Federalism Summary Impact
Statement.
E. Executive Order 12630 (Governmental Actions and Interference With
Constitutionally Protected Property Rights)
This proposed rule does not contain policies that have takings
implications.
F. Executive Order 13175 (Consultation and Coordination With Indian
Tribes)
The Department has analyzed this proposed rule under Executive
Order 13175 and has determined that the action would not have a
substantial direct effect on one or more Indian tribes, would not
impose substantial direct compliance costs on Indian tribal
governments, and would not preempt tribal law.
G. National Environmental Policy Act
The Department has reviewed this rulemaking action for the purposes
of the National Environmental Policy Act (42 U.S.C. 4321 et seq.). It
has determined that this proposed rule would not have a significant
impact on the quality of the human environment.
List of Subjects in 15 CFR Part 7
Administrative practice and procedure, Business and industry,
Communications, Computer technology, Critical infrastructure, Executive
orders, Foreign persons, Investigations, National security, Penalties,
Technology, Telecommunications.
For the reasons set out in the preamble, 15 CFR part 7 is proposed
to be amended as follows:
PART 7--SECURING THE INFORMATION AND COMMUNICATIONS TECHNOLOGY AND
SERVICES SUPPLY CHAIN
0
1. The authority citation for part 7 is revised to read as follows:
Authority: 50 U.S.C. 1701, et seq.; 50 U.S.C. 1601, et seq.;
E.O. 13873, 84 FR 22689, 3 CFR, 2019 Comp., p. 317; E.O. 13984, 86
FR 6837, 3 CFR, 2021 Comp., p. 403.
0
2. Add subpart D, consisting of Sec. Sec. 7.300 through 7.310, to read
as follows:
Subpart D--Infrastructure as a Service Providers' Responsibility To
Verify the Identity of Their Customers, Special Measures, and the
Use of Their Products for Large AI Model Training
Sec.
7.300 Purpose and scope.
7.301 Definitions and application.
7.302 Customer Identification Program.
7.303 Foreign reseller requirements.
7.304 Customer Identification Program reporting requirements.
7.305 Compliance assessments.
7.306 Customer Identification Program exemptions.
7.307 Special measures for certain foreign jurisdictions or foreign
persons.
7.308 Reporting of large AI model training.
7.309 Enforcement.
7.310 Reporting violations.
[[Page 5726]]
Sec. 7.300 Purpose and scope.
Foreign actors may use United States Infrastructure as a Service
(IaaS) products for a variety of malicious cyber-enabled activities. In
light of these threats, it is the purpose of this subpart to:
(a) Require U.S. IaaS providers of U.S. IaaS products to implement
programs to maintain certain records related to IaaS Accounts in which
foreign persons have an interest and verify the identity of such
persons, and to require their foreign resellers to do the same, in
order to facilitate law enforcement requests for such records and
otherwise implement the provisions of Executive Order 13984 and
Executive Order 14110;
(b) Prevent foreign persons from using U.S. IaaS products to
conduct malicious cyber-enabled activities; and
(c) Safeguard the national security of the United States.
Sec. 7.301 Definitions and application.
For the purposes of this subpart:
Artificial intelligence or AI has the meaning set forth in 15
U.S.C. 9401(3).
AI model means a component of an information system that implements
AI technology and uses computational, statistical, or machine-learning
techniques to produce outputs from a given set of inputs.
AI system means any data system, software, hardware, application,
tool, or utility that operates in whole or in part using AI.
Availability means ensuring timely and reliable access to and use
of information and information systems by an authorized person or
system, including resources provided as part of a product or service.
Beneficial owner means an individual who either:
(1) Exercises substantial control over a customer; or
(2) Owns or controls at least 25 percent of the ownership interests
of a customer.
Confidentiality means preserving authorized restrictions on
information access and disclosure, including means for protecting
personal privacy and proprietary information.
Customer means any individual or entity who contracts with an IaaS
provider to create or maintain an IaaS Account with an IaaS provider.
Customer Identification Program or CIP means a program created by a
United States IaaS provider of U.S. IaaS products that dictates how the
provider will collect identifying information about its customers, how
the provider will verify the identity of its foreign customers, store
and maintain identifying information, and notify its customers about
the disclosure of identifying information.
Department means the United States Department of Commerce.
Disassociability means enabling the processing of data or events
without association to individuals or devices beyond the operational
requirements of the system.
Dual-use foundation model means:
(1) An AI model that is trained on broad data; generally uses self-
supervision; contains at least tens of billions of parameters; is
applicable across a wide range of contexts; and that exhibits, or could
be easily modified to exhibit, high levels of performance at tasks that
pose a serious risk to security, national economic security, national
public health or safety, or any combination of those matters, such as
by:
(i) Substantially lowering the barrier of entry for non-experts to
design, synthesize, acquire, or use chemical, biological, radiological,
or nuclear (CBRN) weapons;
(ii) Enabling powerful offensive cyber operations through automated
vulnerability discovery and exploitation against a wide range of
potential targets of cyber attacks; or
(iii) Permitting the evasion of human control or oversight through
means of deception or obfuscation.
(2) Models meet this definition even if they are provided to end
users with technical safeguards that attempt to prevent users from
taking advantage of the relevant unsafe capabilities.
Entity means a partnership, association, trust, joint venture,
corporation, group, subgroup, or other organization.
Floating-point operation means any mathematical operation or
assignment involving floating-point numbers, which are a subset of the
real numbers typically represented on computers by an integer of fixed
precision scaled by an integer exponent of a fixed base.
Foreign beneficial owner means a beneficial owner that is not a
United States person.
Foreign customer means a customer that is not a United States
person.
Foreign jurisdiction means any country, subnational territory, or
region, other than those subject to the civil or military jurisdiction
of the United States, in which any person or group of persons exercises
sovereign de facto or de jure authority, including any such country,
subnational territory, or region in which a person or group of persons
is assuming to exercise governmental authority whether such a person or
group of persons has or has not been recognized by the United States.
Foreign person means a person that is not a United States person.
Foreign reseller or foreign reseller of U.S. Infrastructure as a
Service products mean a foreign person who has established an
Infrastructure as a Service Account to provide Infrastructure as a
Service products subsequently, in whole or in part, to a third party.
Generative AI means the class of AI models that emulate the
structure and characteristics of input data in order to generate
derived synthetic content. This can include images, videos, audio,
text, and other digital content.
Individual means any natural person.
Infrastructure as a Service Account or Account means a formal
business relationship established to provide IaaS products to a person
in which details of such transactions are recorded.
Infrastructure as a Service product or IaaS product means a product
or service offered to a consumer, including complimentary or ``trial''
offerings, that provides processing, storage, networks, or other
fundamental computing resources, and with which the consumer is able to
deploy and run software that is not predefined, including operating
systems and applications. The consumer typically does not manage or
control most of the underlying hardware but has control over the
operating systems, storage, and any deployed applications. The term is
inclusive of ``managed'' products or services, in which the provider is
responsible for some aspects of system configuration or maintenance,
and ``unmanaged'' products or services, in which the provider is only
responsible for ensuring that the product is available to the consumer.
The term is also inclusive of ``virtualized'' products and services, in
which the computing resources of a physical machine are split between
virtualized computers accessible over the internet (e.g., ``virtual
private servers''), and ``dedicated'' products or services in which the
total computing resources of a physical machine are provided to a
single person (e.g., ``bare-metal servers'').
Integer operation means any mathematical operation or assignment
involving only integers, or whole numbers expressed without a decimal
point.
Integrity means guarding against improper information modification
or destruction and includes ensuring information non-repudiation and
authenticity.
Knowledge has the meaning set out in 15 CFR 772.1.
[[Page 5727]]
Large AI model with potential capabilities that could be used in
malicious cyber-enabled activity means any AI model with the technical
conditions of a dual-use foundation model or otherwise has technical
parameters of concern, that has capabilities that could be used to aid
or automate aspects of malicious cyber-enabled activity, including but
not limited to social engineering attacks, vulnerability discovery,
denial-of-service attacks, data poisoning, target selection and
prioritization, disinformation or misinformation generation and/or
propagation, and remote command-and-control of cyber operations. A
model shall be considered to be a large AI model with potential
capabilities that could be used in malicious cyber-enabled activity
under this definition if it meets the technical conditions described in
interpretive rules issued by the Department and published in the
Federal Register.
Machine learning means a set of techniques that can be used to
train AI algorithms on data to improve performance at a task or tasks.
Malicious cyber-enabled activities means activities, other than
those authorized by or in accordance with U.S. law, that seek to
compromise or impair the confidentiality, integrity, or availability of
computer, information, or communications systems, networks, physical or
virtual infrastructure controlled by computers or information systems,
or information resident thereon.
Manageability means providing the capability for granular
administration of data, including alteration, deletion, and selective
disclosure.
Model weight means a numerical parameter within an AI model that
helps determine the model's outputs in response to inputs.
Predictability means enabling reliable assumptions by individuals,
owners, and operators about data and their processing by a system,
product, or service.
Person means an individual or entity.
Privacy-preserving data sharing and analytics means the use of
privacy-enhancing technologies to achieve disassociability,
predictability, manageability, and confidentiality when performing
analytics on data.
Red Flag means a pattern, practice, or specific activity that
indicates the possible existence of malicious cyber-enabled activities.
Reseller means a person that maintains a Reseller Account.
Reseller Account means an Infrastructure as a Service Account
established to provide IaaS products to a person who will then offer
those products subsequently, in whole or in part, to a third party.
Risk-based means based on an appropriate assessment of the relevant
risks, including those presented by the various types of service
offerings maintained by the provider, the methods used to open an
Account, the varying types of identifying information available to the
provider, and the provider's customer base.
Secretary means the Secretary of Commerce or the Secretary's
designee.
Threat landscape means the broad environment of geopolitical,
economic, and technological factors that must be evaluated when
developing risk-based procedures that enable the provider to form a
reasonable belief of the true identity of each account owner and
beneficial owner to deter facilitating significant Malicious cyber-
enabled activities.
Training or training run refers to any process by which an AI model
learns from data using computing power.
Transaction means any transfer of value including any of the
following, whether proposed or completed: an exchange of value for a
good or service; a merger, acquisition, or takeover; an investment; and
any other transfer, agreement, or arrangement, the structure of which
is designed or intended to evade or circumvent the application of Sec.
7.307.
United States Infrastructure as a Service product or U.S. IaaS
product means any Infrastructure as a Service product owned by any
United States person or operated within the territory of the United
States.
United States Infrastructure as a Service provider or U.S. IaaS
provider means any United States person that offers any Infrastructure
as a Service product.
United States person or U.S. person means any U.S. citizen, lawful
permanent resident of the United States as defined by the Immigration
and Nationality Act, entity organized under the laws of the United
States or any jurisdiction within the United States (including foreign
branches), or any person located in the United States.
United States Reseller or U.S. Reseller means a reseller that is a
United States person.
Sec. 7.302 Customer Identification Program.
(a) In general. Each U.S. IaaS provider of U.S. IaaS products must
maintain and implement a written Customer Identification Program (CIP)
that meets the requirements in this section.
(b) Scope of CIP. The CIP must be appropriate for the IaaS
providers' size, type of IaaS products offered, and relevant risks
(including those presented by the various types of service offerings
maintained by the IaaS providers, the various methods of opening
Accounts, the varying types of identifying information available, and
the IaaS providers' customer base) that, at a minimum, include each of
the requirements of this section. Any IaaS provider who is only a
reseller of U.S. IaaS products, may, by agreement with the initial U.S.
IaaS provider, reference, use, or adopt the initial U.S. IaaS
provider's CIP for purposes of meeting the requirements of this
section.
(c) Foreign reseller CIP. As specified in Sec. 7.303(a), U.S. IaaS
providers of U.S. IaaS products must ensure that foreign resellers of
their U.S. IaaS products maintain and implement a written CIP that
meets the requirements in this paragraph (c) and paragraphs (d) and (e)
of this section.
(d) Identity verification procedures. The CIP must include risk-
based procedures for verifying the identity of each foreign customer to
the extent it enables the U.S. IaaS provider or foreign reseller of
U.S. IaaS products to form a reasonable belief that it knows the true
identity of each customer.
(1) Customer information required. (i) The CIP must contain
procedures that enable the U.S. IaaS provider or foreign reseller of
U.S. IaaS products to determine whether a potential customer and all
beneficial owners are U.S. persons. If the IaaS provider determines the
potential customer and all beneficial owners are U.S. persons, this
subpart will not apply to any IaaS Account opened for use by that U.S.
person. U.S. IaaS providers and foreign resellers of U.S. IaaS products
must exercise reasonable due diligence to ascertain the true identity
of any customer or beneficial owner of an Account who claims to be a
U.S. person.
(ii) The CIP must contain procedures for opening an Account that
specify the identifying information that will be obtained from each
potential customer and beneficial owner(s) of an Account that will be
used to determine whether they are U.S. persons. These procedures must
provide U.S. IaaS providers or foreign resellers of U.S. IaaS products
with a sound basis to verify the true identity of their customer and
beneficial owners and reflect reasonable due diligence efforts.
(iii) All U.S. IaaS providers and all of their foreign resellers of
U.S. IaaS products must obtain, at a minimum, the following information
from any potential foreign customer or foreign beneficial owner prior
to opening an Account:
[[Page 5728]]
(A) Name, which shall be:
(1) For an individual, full legal name; or
(2) For an entity, business name, including all names under which
the business is known to be or has been doing business.
(B) Address, which shall be:
(1) For an individual, a residential or business street address and
the location(s) from which the IaaS product will be used.
(2) For an individual who does not have a residential or business
street address, an Army Post Office (APO) or Fleet Post Office (FPO)
box number, and the location(s) from which the IaaS product will be
used.
(3) For an entity, a principal place of business, or if an entity
is not a business, the address to which inquiries should be directed,
and the location(s) from which the IaaS product will be used.
(4) For a person other than an individual (such as a corporation,
partnership, or trust), the jurisdiction under whose laws the person is
constituted or organized; and
(5) For a person other than an individual (such as a corporation,
partnership, or trust), the name(s) of the beneficial owner(s) of that
Account.
(C) Means and source of payment for the Account including:
(1) Credit card number;
(2) Account number;
(3) Customer identifier;
(4) Transaction identifier;
(5) Virtual currency wallet or wallet address identifier;
(6) Equivalent payment processing information, for alternative
sources of payment; or
(7) Any other payment sources or types used.
(D) Email address.
(E) Telephonic contact information.
(F) internet protocol (IP) addresses used for access or
administration and the date and time of each such access or
administrative action, related to ongoing verification of such foreign
person's ownership or control of such Account.
(2) Customer verification. The CIP must contain procedures for
verifying the identity of the potential foreign customer and beneficial
owners of the Account, including by using information obtained in
accordance with paragraph (d)(1) of this section, prior to opening the
Account. The procedures must include a documentary verification method,
as provided in paragraph (d)(2)(i) of this section, a non-documentary
verification method, as described in paragraph (d)(2)(ii) of this
section or a combination of both methods.
(i) Verification through documents. For an IaaS provider relying on
documents, the CIP must contain procedures that set forth the documents
the IaaS provider will use and its method for ascertaining the
documents are valid.
(ii) Verification through non-documentary methods. For an IaaS
provider relying on non-documentary methods, the CIP must contain
procedures that describe the non-documentary methods the IaaS provider
will use.
(iii) Additional verification for certain customers. The CIP must
address situations where, based on the IaaS provider's risk assessment
of a new Account opened by an entity, the IaaS provider will obtain
further information about individuals and beneficial owners of the
Account, including signatories, in order to verify the potential
customer's identity. This verification method applies only when the
IaaS provider cannot verify the potential customer's identity using the
verification methods described in paragraphs (d)(2)(i) and (ii) of this
section or when the attempted verification leads the IaaS provider to
doubt the true identity of the potential customer.
(iv) U.S. person accounts. If the IaaS provider verifies, through
the procedures outlined in paragraphs (d)(2)(i) through (iii) of this
section, that the customer and all beneficial owners are U.S. persons,
the Account will not be subject to any other regulation in this
subpart.
(3) Lack of verification. The CIP must include procedures for
responding to circumstances in which the U.S. IaaS provider or foreign
reseller of U.S. IaaS products cannot form a reasonable belief that it
knows the identity of a customer or beneficial owner. These procedures
should describe:
(i) When the IaaS provider should not open an Account for the
potential customer;
(ii) The terms under which a customer may use an Account while the
IaaS provider attempts to verify the identity of a customer or
beneficial owner of the Account, such as restricted permission or
enhanced monitoring of the Account;
(iii) When the IaaS provider should close an Account or subject it
to other measures, such as additional monitoring, permitted to be used
under paragraph (d)(3)(ii) of this section, after attempts to verify
the identity of a customer or beneficial owner of the Account have
failed; and
(iv) Other measures for account management or redress for customers
whose identification could not be verified or whose information may
have been compromised.
(e) Recordkeeping. The CIP must include procedures for making and
maintaining a record of all information obtained under the procedures
implementing paragraph (d) of this section.
(1) Required records. At a minimum, the record must include for any
foreign customer or beneficial owner buying from a U.S. IaaS provider
or foreign reseller of U.S. IaaS products:
(i) All identifying information about a customer or beneficial
owner obtained under paragraph (d) of this section;
(ii) A copy or description of any document that was relied on under
paragraph (d)(2)(i) of this section;
(iii) A description of any methods and the results of any measures
undertaken to verify the identity of the customer and beneficial owners
under paragraph (d)(2)(ii) or (iii) of this section; and
(iv) A description of the resolution of any substantive discrepancy
discovered when verifying the identifying information obtained.
(2) Retention of records. U.S. IaaS providers of U.S. IaaS products
must retain the records required under paragraph (e)(1) of this section
for at least two years after the date the Account is closed or the date
the Account was last accessed.
(3) Limits on third-party access to records created and maintained
pursuant to this subpart. The CIP must include methods to ensure that
records created and maintained pursuant to this subpart will not be
shared with any third party, except insofar as such access is otherwise
consistent with this subpart or lawful. Such methods should include
methods to prevent unauthorized access to such records by a third party
or employee of the IaaS provider without a need-to-know, including
encryption and/or other methods to protect the availability, integrity,
and confidentiality of such records. However, these limits need not
apply when sharing security best practices or other threat information
with other U.S. IaaS providers of U.S. IaaS products, or relevant
consortia.
(f) Periodic review. The CIP must include risk-based procedures
for:
(1) Requiring a customer to notify the IaaS provider when the
customer adds beneficial owners to its account; and
(2) Periodic continued verification of the accuracy of the
information provided by a customer.
Sec. 7.303 Foreign reseller requirements.
(a) In general. U.S. IaaS providers that contract with, enable, or
otherwise allow foreign resellers to resell their
[[Page 5729]]
U.S. IaaS products will be subject to certain requirements. Each U.S.
IaaS provider must ensure that any foreign reseller of its U.S. IaaS
products maintains and implements a written CIP as specified in
paragraph (b) of this section and must furnish a foreign reseller's
written CIP upon request from the Department, as specified in paragraph
(c) of this section.
(b) CIP requirements. Each U.S. IaaS provider must require that any
foreign reseller of its U.S. IaaS products maintains and implements a
written CIP that meets the requirements set forth in Sec. 7.302(d)
through (f).
(c) Collecting and reporting on foreign reseller CIPs. Each U.S.
IaaS provider must follow procedures related to reporting on the
implementation of CIPs for each of the U.S. IaaS provider's foreign
resellers as required in Sec. 7.304(e) and (f) and according to
requirements described in Sec. 7.304(a) through (d).
(d) Furnishing records. Upon receiving a request from the
Department for a foreign reseller's written CIP, the U.S. IaaS provider
of U.S. IaaS products must provide the foreign reseller's written CIP
to the Department within ten calendar days of the Department's request.
(e) Investigation, remediation, and termination of foreign reseller
relationship. A U.S. IaaS provider must ensure that its foreign
resellers maintain CIPs that comply with the requirements set forth in
Sec. 7.302(c) through (e). A U.S. IaaS provider must, upon receipt of
evidence that indicates the failure of a foreign reseller to maintain
or implement a CIP or the lack of good-faith efforts by the foreign
reseller to prevent the use of U.S. IaaS products for malicious cyber-
enabled activities, take steps to close the foreign reseller account
and, if relevant, to report the suspected or actual malicious cyber-
enabled activity discovered to relevant authorities according to the
procedures the U.S. IaaS provider has described in their CIP according
to Sec. 7.304(a)(2)(v). The U.S. IaaS provider must terminate the
reseller relationship within 30 calendar days if the U.S. IaaS provider
has knowledge that the foreign reseller has not remediated the issues
identified or discovered by the U.S. IaaS provider, or if the
continuation of the reseller relationship otherwise increases the risk
its U.S. IaaS products may be used for malicious cyber-enabled
activity.
Sec. 7.304 Customer Identification Program reporting requirements.
(a) Certification form. Each U.S. IaaS provider must notify the
Department of implementation of its CIP and, if relevant, the CIPs of
each foreign reseller of its U.S. IaaS products, through submission of
a CIP certification form, which will include:
(1) A description of:
(i) The mechanisms, services, software, systems, or tools the IaaS
provider uses to verify the identity of foreign persons according to
criteria described in Sec. 7.302(d);
(ii) The procedures the IaaS provider uses to require a customer to
notify the IaaS provider of any changes to the customer's ownership--
such as adding or removing beneficial owners--and the IaaS provider's
process for ongoing verification of the accuracy of the information
provided by a customer;
(iii) The mechanisms, services, software, systems, or tools used by
the IaaS provider to detect malicious cyber activity;
(iv) The IaaS provider's procedures for requiring each foreign
reseller to maintain a CIP;
(v) The IaaS provider's procedures for identifying when a foreign
person transacts to train a large AI model with potential capabilities
that could be used in malicious cyber-enabled activity, pursuant to
Sec. 7.308; and
(vi) Name, title, email, and phone number of the Primary Contact
responsible for managing the CIP;
(2) Information pertaining to the IaaS provider's provision of U.S.
IaaS products, including:
(i) A description of the IaaS provider's service offerings and
customer bases in foreign jurisdictions;
(ii) The number of employees in IaaS provision and related
services;
(iii) The mechanisms, services, software, systems, or tools used by
the IaaS provider to detect malicious cyber-enabled activity, to
include a description of how the mechanisms, services, software,
systems, or tools are used;
(iv) The mechanisms, services, software, systems, or tools used by
the IaaS provider to detect a training run that could result in the
training of a large AI model with potential capabilities that could be
used in malicious cyber-enabled activity;
(v) The process the IaaS provider uses to report any suspected or
actual malicious cyber activity discovered to relevant authorities;
(vi) The number of IaaS customers;
(vii) The number and locations of the IaaS provider's foreign
beneficial owners;
(viii) A list of all foreign resellers of IaaS products; and
(ix) The number of IaaS customer accounts held by foreign customers
whose identity has not been verified, including details on:
(A) The date the IaaS provider provisioned the account, or
accounts, for each customer whose identity is unverified;
(B) A description and timeline of actions the IaaS provider will
take to verify the identity of each customer;
(C) Any other information available to the IaaS provider on the
nature of the account, or accounts, provided to each unverified
customer;
(D) The date the IaaS provider will deprovision the accounts if the
identity of the customer continues to be unverified; and
(E) Steps the IaaS provider will take to ensure that foreign
persons who failed to verify their identities do not reestablish new
accounts; and
(3) An attestation that the written CIP of the IaaS provider meets
the standards enumerated in Sec. 7.302.
(b) Annual certification. U.S. IaaS providers must submit to the
Department certifications of their CIPs on an annual basis and, if
relevant, the CIPs of each foreign reseller of its U.S. IaaS products.
Annual certifications may be submitted to the Department at any time
within one year of their previous notification, but no earlier than 60
calendar days prior to that date. Annual certifications must include
any updates to the information required in paragraph (a) of this
section. Each annual certification must also include attestations that
the IaaS provider has:
(1) Reviewed its CIP since the date of the last certification;
(2) Updated its CIP to account for any changes in its service
offerings since its last certification;
(3) Updated its CIP to account for any changes in the threat
landscape since its last certification;
(4) Ensured its CIP complies with this subpart since its last
certification;
(5) Tracked the number of times the IaaS provider was unable to
verify the identity of any customer since its last certification; and
(6) Recorded the resolution of each situation in which the IaaS
provider was unable to verify the identity of a customer since its last
certification.
(c) Irregular updates. Each U.S. IaaS provider must notify the
Department if, outside of the normal reporting schedule described in
paragraphs (a) and (b) of this section, a significant change in
business operations or corporate structure has occurred or a material
change to a CIP has been implemented, to include, for example, a
material change in the documentary or non-documentary methods of
identity verification or in the procedures for handling unverified
accounts. Each U.S. IaaS provider must also notify the
[[Page 5730]]
Department when there is a change in the Primary Contact responsible
for the CIP, or when there is a change in the Primary Contact
responsible for managing the CIP of one of its foreign resellers.
(d) New providers. Prior to furnishing any foreign customer with an
IaaS Account, any newly established U.S. IaaS provider must notify the
Department of implementation of their CIP through submission of their
CIP certification form in accordance with the requirements in
paragraphs (a) through (c) of this section. U.S. IaaS providers must
notify the Department according to procedures described in paragraphs
(e) and (f) of this section prior to the provision of U.S. IaaS
products to a new foreign reseller of its U.S. IaaS products.
(e) Collection of information from foreign resellers. Each U.S.
IaaS provider of U.S. IaaS products must collect from its foreign
resellers the information necessary for the initial and annual
reporting requirements in paragraphs (a) and (b) of this section.
(f) Reporting of information from foreign resellers. Each U.S. IaaS
provider of U.S. IaaS products must submit on an annual basis CIP
certification forms for all foreign resellers' CIPs, containing the
information specified in paragraph (a) of this section. Foreign
reseller certifications may be submitted by the U.S. IaaS provider--in
compiled format--to the Department at any time within one year of their
previous notification, and no earlier than 60 calendar days prior to
that date.
Sec. 7.305 Compliance assessments.
(a) Government inspection. All U.S. IaaS providers of U.S. IaaS
products must maintain a written CIP and copies of the CIPs of any of
their foreign resellers and must provide any copy of these CIPs to the
Department within ten calendar days of a request from the Department.
If upon inspection the Department finds a CIP from either a U.S. IaaS
provider or their foreign reseller fails to meet the requirements in
Sec. 7.302(b) through (f), then the Department will notify the
relevant IaaS provider of the specific shortcomings identified in its
CIP or, if necessary, any required special measures as described in
Sec. 7.307. The IaaS provider shall then resolve the identified
shortcomings within a reasonable time period, as determined by the
Department, and shall resubmit its CIP for further inspection.
(b) In general. The Department will review information submitted to
the Department in CIP certification forms and compiled foreign reseller
CIP certification forms as described in Sec. 7.304. The Department
shall, at its sole discretion as to time and manner, conduct compliance
assessments of U.S. IaaS providers based on the Department's own
evaluation of risks associated with a given CIP, U.S. IaaS provider, or
any of its foreign resellers.
(c) Information available. The Department will evaluate risk and
conduct compliance assessments based on available information,
including but not limited to:
(1) Any information provided by U.S. IaaS provider in CIP
certifications;
(2) Any additional information or communications provided to the
Department;
(3) Any publicly available information or communications; and
(4) Any information otherwise obtained by or made available to the
Department.
(d) Evaluating risk. The Department shall maintain sole discretion
to evaluate risks based on criteria including, but not limited to:
(1) Assessing whether the services or products of a U.S. IaaS
provider or a foreign reseller are being used or are likely to be used:
(i) By foreign malicious cyber actors; or
(ii) By a foreign person to train a large AI model with potential
capabilities that could be used in malicious cyber-enabled activity; or
(2) The failure of any U.S. IaaS provider of U.S. IaaS products to:
(i) Submit a CIP certification; or
(ii) Implement measures recommended by the Department as the result
of a compliance assessment.
(e) Compliance assessments. The Department shall conduct compliance
assessments of certain U.S. IaaS providers according to the
Department's evaluation of risk based on information described in
paragraph (b) of this section. The Department may:
(1) Conduct compliance assessments annually or as determined by the
Department based on the Department's evaluation of risk of the
provider's CIP;
(2) Conduct follow-up compliance assessments of providers to ensure
remediation of any findings or determinations made by the Department;
and
(3) Request an audit of the U.S. IaaS provider's CIP processes and
procedures.
(f) Actions. Based on the results of compliance assessments, the
Department may:
(1) Recommend remediation measures to be taken by the U.S. IaaS
providers of U.S. IaaS products, including but not limited to:
(i) Measures to address any risk of U.S. IaaS products being used
in support of malicious cyber activity or to train a foreign-owned
large AI model with potential capabilities that could be used in
malicious cyber-enabled activity; and
(ii) Any special measures the IaaS provider must take in accordance
with Sec. 7.307; and
(2) Determine to review a transaction or class of transactions of
an IaaS provider according to procedures described in subpart B of this
part.
Sec. 7.306 Customer Identification Program exemptions.
(a) Exemptions. The Secretary, in accordance with such standards
and procedures as outlined in this section, may exempt any U.S. IaaS
provider, any specific type of Account or lessee, or any specific
foreign reseller of a U.S. IaaS provider's IaaS products, from the
requirements of this subpart, except Sec. Sec. 7.308 and 7.309. Such
standards and procedures will include a finding by the Secretary that a
U.S. IaaS provider, U.S. IaaS provider's foreign reseller, Account, or
lessee implements security best practices to otherwise deter abuse of
IaaS products.
(b) Abuse of IaaS Products Deterrence Program for IaaS providers.
The Secretary may make a finding that an IaaS provider complies with
security best practices to deter abuse of IaaS products, provided that
the IaaS provider has established an Abuse of IaaS Products Deterrence
Program (ADP) consistent with this paragraph (b) and has requested a
finding in accordance with the procedures in paragraph (e) of this
section. Such a finding exempts an IaaS provider from the CIP
requirements in Sec. Sec. 7.302 and 7.304. The Secretary may also make
a finding that a foreign reseller of U.S. IaaS products complies with
security best practices to deter abuse of IaaS products. Such a finding
exempts the U.S. IaaS provider from the requirements in Sec. Sec.
7.303 and 7.304 with regard to that specific foreign reseller. Each
IaaS provider that offers or maintains one or more Accounts may
develop, document, and implement an ADP that is designed to detect,
prevent, and mitigate malicious cyber-enabled activities in connection
with their Accounts and the IaaS Accounts of its foreign resellers. The
ADP must be appropriate to the size and complexity of the IaaS provider
and the nature and scope of its product offerings. A U.S. IaaS provider
or foreign reseller ADP must include reasonable policies and procedures
to:
(1) Identify relevant Red Flags for the Accounts that the IaaS
provider offers or
[[Page 5731]]
maintains, and incorporate those Red Flags into its ADP including
considering:
(i) Risk Factors such as:
(A) The types of Accounts it offers or maintains;
(B) The methods it implements for an Account to be opened;
(C) The methods it implements for an Account to be accessed;
(D) The methods it implements to monitor and assess activities
related to its Accounts; or
(E) Its current or previous experiences with malicious cyber-
enabled activities.
(ii) Sources of Red Flags such as:
(A) Incidents of malicious cyber-enabled activities that IaaS
providers have experienced;
(B) Vulnerabilities that could contribute to malicious cyber-
enabled activities if left unmitigated;
(C) Methods of malicious cyber-enabled activities that IaaS
providers have identified; or
(D) Alerts, notifications, or other warnings about malicious cyber-
enabled activities or improved analytic tools that the IaaS provider
receives, including through engagement with the consortium under
paragraph (c) of this section.
(iii) Categories of Red Flags such as:
(A) Presentation of suspicious personally identifiable information
or identity evidence;
(B) Suspicious or anomalous activity detected in relation to an
Account; or
(C) Notice from customers, victims of identity theft, law
enforcement authorities, or other persons regarding possible fraud or
abuse conducted in association with the Account, Account compromise, a
newly identified vulnerability that may impact an IaaS product offering
if exploited, or identity theft in connection with Accounts serviced by
the IaaS provider.
(2) Detect Red Flags that have been incorporated into the ADP,
including by implementing privacy-preserving data sharing and analytics
methods as feasible.
(3) Respond appropriately to any Red Flags that are detected to
prevent and mitigate malicious cyber-enabled activities, which may
include:
(i) Monitoring an Account for evidence of malicious cyber-enabled
activities;
(ii) Contacting the customer;
(iii) Changing any passwords, security codes, or other security
devices that permit access to an Account;
(iv) Reopening an Account with a new account number;
(v) Rejecting a request to open a new Account;
(vi) Closing or suspending an existing Account;
(vii) Allowing only certain trusted methods of payment;
(viii) Notifying law enforcement; or
(ix) Determining that no response or a different response is
warranted under the particular circumstances.
(4) Ensure the ADP (including the relevant Red Flags) is updated
regularly to reflect changes in risks to Accounts, including factors
such as:
(i) The experiences of the IaaS provider with malicious cyber-
enabled activities;
(ii) Changes in methods of malicious cyber-enabled activities;
(iii) Changes in methods to detect, prevent, and mitigate malicious
cyber-enabled activities;
(iv) Changes in the types of accounts that the IaaS provider offers
or maintains; and
(v) Changes in the business arrangements of the IaaS provider
including mergers, acquisitions, alliances, joint ventures, and service
provider or foreign reseller arrangements.
(5) Establish procedures for the ongoing administration of the ADP.
Each IaaS provider implementing an ADP must provide for the continued
administration of the ADP and must:
(i) Obtain approval of the initial written ADP from either its
board of directors, an appropriate committee of the board of directors,
or a designated employee at the level of senior management;
(ii) Involve the board of directors, an appropriate committee
thereof, or a designated employee at the level of senior management in
the oversight, development, implementation, and administration of the
ADP;
(iii) Train staff, as necessary, to effectively implement the ADP;
and
(iv) Exercise appropriate and effective oversight of reseller
arrangements with respect to detecting and mitigating Red Flags.
(c) Public-private sector collaboration. One factor to be
considered by the Department in granting an exemption is the
participation of U.S. IaaS providers or a foreign reseller of U.S. IaaS
products in a consortium to develop and maintain privacy-preserving
data sharing and analytics to enable improved detection and mitigation
of malicious cyber-enabled activities. Before implementing privacy-
preserving data sharing and analytics, IaaS providers may initially
evaluate solutions in a test environment which may be established and
maintained by either industry or the Federal Government. The consortium
will make available tools and expertise to assist smaller IaaS
providers with conducting privacy-preserving data sharing and
analytics, as well as providing insights, policies, and practices for
improving their ADPs under paragraph (a) of this section. IaaS
providers must document their process and capabilities for integrating
insights and responding to intelligence generated through consortium
interaction within their ADP as described in paragraph (a) of this
section.
(d) Investigative cooperation. One factor to be considered by the
Department in granting an exemption is voluntary cooperation with law
enforcement, consistent with otherwise applicable law, to provide
forensic information for investigations of identified malicious cyber-
enabled activities.
(e) Procedures for requests for exemptions from CIP requirements.
In consultation with the Secretary of Defense, the Attorney General,
the Secretary of Homeland Security, and the Director of National
Intelligence, or, as the Secretary deems appropriate, the heads of
other executive departments and agencies, the Secretary may make a
finding exempting a U.S. IaaS provider from the requirements in
Sec. Sec. 7.302, 7.304, and 7.305 if the finding determines that the
U.S. IaaS provider complies with security best practices to otherwise
deter the abuse of IaaS products. In consultation with these same
agencies, the Secretary may also make a finding to exempt a U.S. IaaS
provider with respect to any specific foreign reseller of their
services from the requirements in Sec. Sec. 7.303 and 7.304, if the
finding determines that the foreign reseller, account, or lessee
complies with security best practices to otherwise deter abuse of
United States IaaS products.
(1) Any U.S. IaaS provider of U.S. IaaS products seeking to obtain
the Secretary's finding exempting it or one of its foreign resellers
from CIP requirements shall initiate the process by providing a written
submission to the Secretary describing its establishment of an ADP
consistent with paragraph (a) of this section. Such submission should
be made electronically.
(2) Upon receipt of a written submission, the Secretary will review
the submission and may request additional information from the
submitter. Prior to making a finding, the Secretary will consult with
the Secretary of Defense, the Attorney General, the Secretary of
Homeland Security, and the Director of National Intelligence, or their
designees.
(3) The Secretary will make a finding based on an evaluation of the
following factors:
[[Page 5732]]
(i) Whether the ADP is an appropriate size and complexity
commensurate with the nature and scope of product offerings;
(ii) Whether the Program's ability to deter, detect, and respond to
Red Flags is sufficiently robust;
(iii) Whether oversight of reseller arrangements is effective;
(iv) The extent of cooperation by providers with law enforcement,
consistent with otherwise applicable law, to provide forensic
information for investigations of identified malicious cyber-enabled
activities; and
(v) Whether they participate in public-private collaborative
efforts as described in paragraph (c) of this section.
(f) Maintenance of exemption. U.S. IaaS providers of U.S. IaaS
products have a continuing obligation to update their ADPs in response
to the changing threat landscape and must notify the Secretary of any
significant deviations or changes to their ADP. U.S. IaaS providers
must also require their foreign resellers to do the same. All U.S. IaaS
providers must provide information on such updates by submitting annual
notifications for themselves or any of their exempt foreign resellers
to the Department to ensure that exemptions from the CIP requirements
continue to be warranted.
(g) Revocation of exemption. The exemption from CIP requirements
may be revoked at any time, including to impose special measures as
described in Sec. 7.307.
Sec. 7.307 Special measures for certain foreign jurisdictions or
foreign persons.
(a) International counter-malicious cyber-enabled activity
requirements--(1) In general. The Secretary may require U.S. IaaS
providers of U.S. IaaS products to take either of the special measures
described in paragraph (b) of this section if the Secretary determines
that reasonable grounds exist for concluding that a foreign
jurisdiction or foreign person is conducting malicious cyber-enabled
activities using U.S. IaaS products, in accordance with paragraph (c)
of this section.
(2) Evaluation. If the Secretary, based on the Secretary's own
initiative or upon referral from other executive departments and
agencies or U.S. IaaS providers, is informed that reasonable grounds
may exist to apply special measures to a particular foreign
jurisdiction or foreign person, the Secretary will evaluate the
relevant factors provided in paragraph (b) of this section and consult
with the heads of other agencies as appropriate, to determine whether
to impose either of the special measures described in paragraph (b),
and which special measure the Secretary will impose.
(3) Determination. Upon completion of the evaluation, the Secretary
shall issue an unclassified written determination that summarizes the
elements of the evaluation. The determination shall identify whether
the Secretary established, through the investigation, that reasonable
grounds exist to determine that:
(i) A foreign jurisdiction has any significant number of foreign
persons offering U.S. IaaS products that are used for malicious cyber-
enabled activities or any significant number of foreign persons
directly obtaining U.S. IaaS products for use in malicious cyber-
enabled activities; or
(ii) A foreign person has established a pattern of conduct of
offering U.S. IaaS products that are used for malicious cyber-enabled
activities or directly obtaining U.S. IaaS products for use in
malicious cyber-enabled activities.
(4) Special measure. The determination shall also explain how it is
consistent with the terms of Executive Order 13984 and this subpart.
The special measure will be imposed as soon as the Secretary issues the
determination.
(5) Duration of special measure. Any determination by which a
special measure described in paragraphs (b)(1) and (2) of this section
is imposed may not remain in effect for more than 365 calendar days,
except pursuant to the publication in the Federal Register, on or
before the end of the 365-day period beginning on the date of the
issuance of such determination, of a notice of extension finding that
the measure remains necessary for an additional period of time.
(6) Effective date. No U.S. IaaS providers shall be required to
take any of the special measures adopted pursuant to this section
earlier than 180 calendar days following the issuance of
determinations.
(7) No limitation on other authorities. This section shall not be
construed as superseding or otherwise restricting any other authorities
granted to the Secretary, or to any other agency, by this subpart or
otherwise.
(b) Special measures. The special measures referred to in paragraph
(a) of this section, with respect to a foreign jurisdiction or foreign
person, are as follows:
(1) Prohibitions or conditions on customers, potential customers,
or accounts within certain foreign jurisdictions. The Secretary may
prohibit or impose conditions on the opening or maintaining with any
U.S. IaaS provider of an Account, including a Reseller Account, by any
foreign person located in a foreign jurisdiction found to have any
significant number of foreign persons offering U.S. IaaS products used
for malicious cyber-enabled activities, or by any U.S. IaaS provider of
U.S. IaaS products for or on behalf of a foreign person.
(2) Prohibitions or conditions on certain foreign persons. The
Secretary may prohibit or impose conditions on the opening or
maintaining of an Account, including a Reseller Account, by any U.S.
IaaS provider of U.S. IaaS products for or on behalf of a foreign
person, if such an Account involves any such foreign person found to be
directly obtaining or engaged in a pattern of conduct of obtaining U.S.
IaaS products for use in malicious cyber-enabled activities or offering
U.S. IaaS products used in malicious cyber-enabled activities.
(3) Reasonable grounds determination factors. In making a
determination described in paragraph (a) of this section, the Secretary
shall consider, in addition to any and all such information as the
Secretary determines to be relevant, the following potentially relevant
factors:
(i) Factors related to a particular foreign jurisdiction. (A)
Evidence that foreign malicious cyber actors have obtained U.S. IaaS
products from persons offering U.S. IaaS products in that foreign
jurisdiction, including whether such actors obtained such U.S. IaaS
products through foreign resellers;
(B) The extent to which that foreign jurisdiction is a source of
malicious cyber-enabled activities; and
(C) Whether the United States has a mutual legal assistance treaty
with that foreign jurisdiction, and the experience of law enforcement
officials and regulatory officials in obtaining information about
activities involving U.S. IaaS products originating in or routed
through such foreign jurisdiction.
(ii) Factors related to a particular foreign person. (A) The extent
to which a foreign person uses U.S. IaaS products to conduct,
facilitate, or promote malicious cyber-enabled activities;
(B) The extent to which U.S. IaaS products offered by a foreign
person are used to facilitate or promote malicious cyber-enabled
activities;
(C) The extent to which U.S. IaaS products offered by a foreign
person are used for legitimate business purposes in the foreign
jurisdiction; and
(D) The extent to which actions short of the imposition of special
measures pursuant to this paragraph (b) are sufficient, with respect to
transactions
[[Page 5733]]
involving the foreign person offering U.S. IaaS products, to guard
against malicious cyber-enabled activities.
(4) Special measure determination factors. In selecting which
special measure(s) to take under this section, the Secretary shall
consider:
(i) Whether the imposition of any special measure would create a
significant competitive disadvantage, including any undue cost or
burden associated with compliance, for U.S. IaaS providers;
(ii) The extent to which the imposition of any special measure(s)
or the timing of any special measure(s) would have a significant
adverse effect on legitimate business activities involving the
particular foreign jurisdiction or foreign person; and
(iii) The effect of any special measure(s) on United States
national security, law enforcement investigations, U.S. supply chains,
foreign policy, or any serious effect on U.S. public health or safety.
(c) Consultations and information to be considered in finding
foreign jurisdictions or foreign persons to be of primary malicious
cyber-enabled activity concern. In general, in making a determination
described in paragraph (a) of this section, the Secretary shall consult
with the Secretary of State, the Secretary of the Treasury, the
Secretary of Defense, the Attorney General, the Secretary of Homeland
Security, the Director of National Intelligence, and, as the Secretary
deems appropriate, the heads of other executive departments and
agencies.
(d) Notification of special measures invoked by the Secretary. Not
later than 10 calendar days after the date of any determination under
paragraph (a)(4) of this section, the Secretary shall notify, in
writing, the Committee on Energy and Commerce of the U.S. House of
Representatives and the Committee on Commerce, Science, and
Transportation of the U.S. Senate of any such action.
Sec. 7.308 Reporting of large AI model training.
(a) Reporting requirements. (1) In general, each U.S. IaaS provider
must submit a report to the Department whenever they have ``knowledge''
of a covered transaction, as specified in paragraph (b) of this
section, at the time specified in paragraph (c) of this section.
(2) Each U.S. IaaS provider must also require that their foreign
resellers submit a report whenever they have ``knowledge'' of a covered
transaction, as specified in paragraph (b) of this section, at the time
specified in paragraph (c) of this section to the U.S. IaaS provider.
(3) Reports must be submitted to the Department in the form and
manner specified in paragraph (d) of this section and, at a minimum,
include responses for each of the requirements of paragraphs (d)(1)(i)
through (ii) of this section.
(b) Covered transactions. (1) Transactions that are covered
transactions for the purposes of this section include:
(i) A transaction by, for, or on behalf of a foreign person which
results or could result in the training of a large AI model with
potential capabilities that could be used in malicious cyber-enabled
activity (see the examples in paragraphs (b)(3)(i) and (ii) of this
section); or
(ii) A transaction by, for, or on behalf of a foreign person, in
which the original arrangements provided for in the terms of the
transaction would not result in a training of a large AI model with
potential capabilities that could be used in malicious cyber-enabled
activity, but a development or update in the arrangements means the
transaction now does or could result in the training of a large AI
model with potential capabilities that could be used in malicious
cyber-enabled activity (see the example in paragraph (b)(3)(iii) of
this section).
(2) A model shall be considered to be a large AI model with
potential capabilities that could be used in malicious cyber-enabled
activity under the definition provided in Sec. 7.301 if it meets the
requirements laid out by the Department in interpretive rules published
in the Federal Register.
(3)(i) Example 1. Corporation A, a foreign person, proposes to
train a model on the computing infrastructure of Corporation B, a U.S.
IaaS provider, and signs an agreement with Corporation B to train the
proposed model. The technical specifications of the model that
Corporation A seeks to train meet the technical conditions of a large
AI model with potential capabilities that could be used in malicious
cyber-enabled activity. The transaction is a covered transaction.
(ii) Example 2. Corporation A, a U.S. person, makes an equity
investment in Corporation B, a foreign person, and a portion of that
investment is in the form of credits to use Corporation A's computing
infrastructure. Corporation A has reason to believe that Corporation B
intends to use those credits to train a large AI model with potential
capabilities that could be used in malicious cyber-enabled activity.
The transaction is a covered transaction.
(iii) Example 3. Corporation A, a U.S. person, agrees to train an
AI model for Corporation B, a foreign person. At the outset, the
agreed-upon technical specifications for the model do not meet the
technical conditions of a dual-use foundation model or a model with
technical conditions of concern. However, after training commences,
adjustments in the training procedure or new insights about the model's
capabilities provide Corporation A with reason to believe that the
model will in fact have the technical conditions of a large AI model
with potential capabilities that could be used in malicious cyber-
enabled activity. The transaction becomes a covered transaction.
(iv) Example 4. Corporation A, a U.S. person, agrees to train an AI
model for Corporation B, a foreign person, on a computing
infrastructure co-located in a facility owned by Corporation C. The
model will have the technical conditions of a large AI model with
potential capabilities that could be used in malicious cyber-enabled
activity. The transaction is a covered transaction, and Corporation A
is responsible for reporting the training run to the Department.
(c) Timing of reports--(1) Initial U.S. IaaS provider report. U.S.
IaaS providers shall file with the Department a report within 15
calendar days of a covered transaction occurring or the provider or
reseller having ``knowledge'' that a covered transaction has occurred.
(2) Initial foreign reseller report. U.S. IaaS providers must
require their foreign resellers to file with the U.S. IaaS provider a
report within 15 calendar days of a covered transaction occurring or
the provider or reseller having ``knowledge'' that a covered
transaction has occurred. The U.S. IaaS provider must file this report
with the Department within 30 calendar days of the covered transaction.
(3) Follow-up report. Any U.S. IaaS provider that receives a
request from the Department for additional information, as outlined in
paragraph (d) of this section, whether in regard to a covered
transaction of itself or its foreign reseller, will file a follow-up
report responsive to the request within 15 calendar days of receiving
the request for additional information.
(4) Corrected report. If any report filed under this section is
found to have been inaccurate when filed, the U.S. IaaS provider shall
file a corrected report in the form and manner specified in paragraph
(d) of this section within 15 calendar dates after the date on which
the U.S. IaaS provider has ``knowledge'' of the inaccuracy.
[[Page 5734]]
(d) Content, form, and manner of reports. Each report submitted
under this section shall be filed with the Department in the form and
manner that the Department shall prescribe in the forms and
instructions for such report, and each person filing such report shall
certify that the report or application is true, correct, and complete.
(1) Initial U.S. IaaS provider and foreign reseller report. An
initial report of an IaaS provider shall include the following:
(i) Information about the foreign person. (A) Name of the foreign
customer or foreign beneficial owner of the customer, which shall be:
(1) For an individual, full legal name; or
(2) For an entity, business name, including all names under which
the business is known to be or has been doing business.
(3) For both individuals and entities, the ultimate beneficial
owner, if it is not the same as the individual or entity.
(B) Address, which shall be:
(1) For an individual, a residential or business street address.
(2) For an individual who does not have a residential or business
street address, an Army Post Office (APO) or Fleet Post Office (FPO)
box number.
(3) For an entity, principal places of business, or if an entity is
not a business, the address to which inquiries should be directed, and
the location(s) from which the training request originates.
(4) For a person other than an individual (such as a corporation,
partnership, or trust), the jurisdiction under whose laws the person is
constituted or organized; and
(5) For a person other than an individual (such as a corporation,
partnership, or trust), the name(s) of the beneficial owner(s) of that
account, including the ultimate beneficial owner(s).
(C) Means and source of payment for the account including:
(1) Credit card number;
(2) Account number;
(3) Customer identifier;
(4) Transaction identifier;
(5) Virtual currency wallet or wallet address identifier;
(6) Equivalent payment processing information, for alternative
sources of payment; or
(7) Any other payment sources or types used.
(D) Email address.
(E) Telephonic contact information.
(F) IP addresses used for access or administration and the date and
time of each such access or administrative action, related to ongoing
verification of such foreign person's ownership or control of such
Account.
(ii) Information about the training run. (A) Estimated number of
computational operations (e.g., integer operations or floating-point
operations) used in the training run.
(B) Anticipated start date and completion date of the training run.
(C) Information on training practices, including the model of the
primary AI used in the training run accelerators.
(D) Information on cybersecurity practices including:
(1) Policies and procedures for ensuring secure storage of, and
protecting access to, trained model weights; and
(2) Any cybersecurity or insider threat events that have occurred
in the last four years that have resulted in unauthorized access to
model weights or model source code, or other damages of major concern.
(2) Follow-up report. A follow-up report filed pursuant to a
request for additional information in paragraph (c) of this section
shall include all information responsive to the request.
(3) Corrected report. A corrected report required to be filed
pursuant to paragraph (c) of this section shall correct all
inaccuracies in the information previously reported to BIS.
(e) Request for additional information. Upon receiving an initial
report, follow-up report, or corrected report, BIS may request that a
U.S. IaaS provider or foreign reseller of U.S. IaaS products submit
additional information pertaining to activities or risks that present
concerns to U.S. national security.
(f) Prohibition. No U.S. IaaS provider shall provide U.S. IaaS
products to foreign resellers, unless the U.S. IaaS provider has made
all reasonable efforts to ensure that the foreign reseller complies
with the requirements of this section. Upon receipt of evidence, or
upon discovery of facts and circumstances that indicate that a foreign
reseller has not complied with the requirements of this section, the
U.S. IaaS provider shall notify the foreign reseller of the alleged
violation and request written confirmation and supporting evidence of
compliance, remediation, or both. Upon subsequent receipt of evidence,
or discovery of facts and circumstances that indicate the foreign
reseller did not remediate, or remains out of compliance, the U.S. IaaS
provider must suspend the provision of U.S. IaaS products to the
foreign reseller, and shall resume provision of U.S. IaaS products only
after the foreign reseller has provided adequate assurances to prevent
future violations.
Sec. 7.309 Enforcement.
(a) Prohibitions. The following are prohibited:
(1) Engaging in, or conspiring to engage in, any conduct prohibited
by the regulations issued in this part.
(2) Failing to submit reports, certifications, or recertifications,
as appropriate, or failing to comply with terms of notices or orders
provided by the Department, and as required by this subpart.
(3) Failing to implement or maintain CIPs as required by Sec.
7.302, or continuing to transact with a foreign reseller that fails to
implement or maintain a CIP as set forth in Sec. 7.303.
(4) Providing IaaS products to a foreign person while failing to
comply with any direction, determination, or condition issued under
this part.
(5) Aiding, abetting, counseling, commanding, inducing, procuring,
permitting, approving, or otherwise supporting any act prohibited by
any direction, determination, or condition issued under this part.
(6) Attempting or soliciting a violation of any direction,
determination, or condition issued under this part.
(7) Failing to implement any prohibition or suspension as set forth
in Sec. 7.308.
(8) Making a false or misleading representation, statement,
notification, or certification, whether directly or indirectly through
any other person, or falsifying or concealing any material fact to the
Department in connection with compliance under this part.
(b) Additional obligations. (1) Any person who makes a
representation, statement, or certification to the Department relating
to the creation or maintenance of a CIP, reporting required under the
CIP, in a written request for an exemption, an annual notification
related to exemptions, or in relation to their own or another entities
ADP shall notify the Department of any material change to the CIP or to
the IaaS provider's business, that renders the CIP unnecessary.
(2) Any person who has been granted, or has had a foreign reseller
granted, an exemption on the basis of their ADP shall notify the
Department of any material change to the ADP or to the IaaS provider's
business that may impact the ADP.
(3) For purposes of paragraph (a)(8) of this section, any
representation, statement, or certification, such as (though not
limited to) CIPs, written request for exemption, or written statements
on ADPs made by any person shall be deemed to be continuing in effect
until the person notifies the
[[Page 5735]]
Department in accordance with this part.
(c) Maximum penalties--(1) Civil penalty. A civil penalty not to
exceed the amount set forth in section 206 of IEEPA, 50 U.S.C. 1705,
may be imposed on any person who violates, attempts to violate,
conspires to violate, or knowingly causes any violation of paragraph
(a) of this section. IEEPA provides for a maximum civil penalty not to
exceed the greater of $250,000 per violation, subject to inflationary
adjustment, or an amount that is twice the amount of the transaction
that is the basis of the violation with respect to which the penalty is
imposed.
(i) Notice of the penalty, including a written explanation of the
penalized conduct specifying the laws and regulations allegedly
violated and the amount of the proposed penalty, and notifying the
recipient of a right to make a written petition within 30 calendar days
as to why a penalty should not be imposed, shall be served on the
notified party or parties.
(ii) The Secretary shall review any presentation and issue a final
administrative decision within 30 calendar days of receipt of the
petition.
(2) Criminal penalty. A person who willfully commits, attempts to
commit, or conspires to commit, or aids and abets in the commission of
a violation of paragraph (a) of this section shall, upon conviction of
a violation of IEEPA, be fined not more than $1,000,000, or if a
natural person, may be imprisoned for not more than 20 years, or both.
(3) Civil penalty recovery. Any civil penalties authorized in this
section may be recovered in a civil action brought by the United States
in U.S. district court.
(d) Adjustments to penalty amounts. (1) The civil penalties
provided in IEEPA are subject to adjustment pursuant to the Federal
Civil Penalties Inflation Adjustment Act of 1990 (Pub. L. 101-410, as
amended, 28 U.S.C. 2461 note).
(2) The criminal penalties provided in IEEPA are subject to
adjustment pursuant to 18 U.S.C. 3571.
(e) Other penalities. The penalties available under this section
are without prejudice to other penalties, civil or criminal, available
under law. Attention is directed to 18 U.S.C. 1001, which provides that
whoever, in any matter within the jurisdiction of any department or
agency in the United States, knowingly and willfully falsifies,
conceals, or covers up by any trick, scheme, or device a material fact,
or makes any false, fictitious, or fraudulent statements or
representations, or makes or uses any false writing or document knowing
the same to contain any false, fictitious, or fraudulent statement or
entry, shall be fined under title 18, United States Code, or imprisoned
not more than 5 years, or both.
Sec. 7.310 Reporting violations.
(a) Where to report. If a person learns of facts or circumstances
that indicate a violation of any of the requirements in this subpart
may have occurred, or are likely to occur, that person may notify:
Office of Information and Communications Technology and Services,
Bureau of Industry and Security, U.S. Department of Commerce, 14th
Street and Constitution Avenue NW, Room A-100, Washington, DC 20230.
(b) Reporting distinguished. The reporting provisions in paragraph
(a) of this section are not the ``reporting of violations'' contained
within the Export Administration Regulations (EAR) in 15 CFR chapter
VII, subchapter C, nor the ``voluntary self-disclosure'' within the
same.
Alan F. Estevez,
Under Secretary of Commerce for Industry and Security, U.S. Department
of Commerce.
[FR Doc. 2024-01580 Filed 1-26-24; 8:45 am]
BILLING CODE 3510-20-P