Public Safety and Homeland Security Bureau Announces 15-Business Day Filing Window for Cybersecurity Labeling Administrator and Lead Administrator Applications, 84086-84096 [2024-23844]

Download as PDF lotter on DSK11XQN23PROD with RULES1 84086 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations • Is not a significant regulatory action subject to Executive Order 13211 (66 FR 28355, May 22, 2001); and • Is not subject to requirements of Section 12(d) of the National Technology Transfer and Advancement Act of 1995 (15 U.S.C. 272 note) because application of those requirements would be inconsistent with the Clean Air Act. In addition, the SIP is not approved to apply on any Indian reservation land or in any other area where the EPA or an Indian tribe has demonstrated that a tribe has jurisdiction. In those areas of Indian country, the rules do not have Tribal implications and will not impose substantial direct costs on Tribal governments or preempt Tribal law as specified by Executive Order 13175 (65 FR 67249, November 9, 2000). Executive Order 12898 (Federal Actions To Address Environmental Justice in Minority Populations and Low-Income Populations, 59 FR 7629, Feb. 16, 1994) directs Federal agencies to identify and address ‘‘disproportionately high and adverse human health or environmental effects’’ of their actions on minority populations and low-income populations to the greatest extent practicable and permitted by law. The EPA defines environmental justice (EJ) as ‘‘the fair treatment and meaningful involvement of all people regardless of race, color, national origin, or income with respect to the development, implementation, and enforcement of environmental laws, regulations, and policies.’’ The EPA further defines the term fair treatment to mean that ‘‘no group of people should bear a disproportionate burden of environmental harms and risks, including those resulting from the negative environmental consequences of industrial, governmental, and commercial operations or programs and policies.’’ The State did not evaluate environmental justice considerations as part of its SIP submittal; the CAA and applicable implementing regulations neither prohibit nor require such an evaluation. The EPA did not perform an EJ analysis and did not consider EJ in this action. Consideration of EJ is not required as part of this action, and there is no information in the record inconsistent with the stated goal of E.O. 12898 of achieving environmental justice for people of color, low-income populations, and Indigenous peoples. This action is subject to the Congressional Review Act, and the EPA will submit a rule report to each House of the Congress and to the Comptroller General of the United States. This action is not a ‘‘major rule’’ as defined by 5 U.S.C. 804(2). VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 Under section 307(b)(1) of the Clean Air Act, petitions for judicial review of this action must be filed in the United States Court of Appeals for the appropriate circuit by December 20, 2024. Filing a petition for reconsideration by the Administrator of this final rule does not affect the finality of this action for the purposes of judicial review nor does it extend the time within which a petition for judicial review may be filed, and shall not postpone the effectiveness of such rule or action. This action may not be challenged later in proceedings to enforce its requirements. (See section 307(b)(2).) List of Subjects in 40 CFR Part 52 Environmental protection, Administrative practice and procedure, Air pollution control, Carbon monoxide, Incorporation by reference, Nitrogen dioxide, Ozone, Particulate matter, Reporting and recordkeeping requirements, Sulfur dioxide, Volatile organic compounds. Dated: October 14, 2024. Martha Guzman Aceves, Regional Administrator, Region IX. For the reasons stated in the preamble, the Environmental Protection Agency amends part 52, chapter I, title 40 of the Code of Federal Regulations as follows: PART 52—APPROVAL AND PROMULGATION OF IMPLEMENTATION PLANS 1. The authority citation for part 52 continues to read as follows: ■ Authority: 42 U.S.C. 7401 et seq. Subpart F—California 2. Section 52.220 is amended by adding paragraphs (c)(557)(i)(B)(3) and (c)(610)(i)(C) to read as follows: ■ § 52.220 Identification of plan—in part. * * * * * (c) * * * (557) * * * (i) * * * (B) * * * (3) Previously approved on September 28, 2022, in paragraph (c)(557)(i)(B)(1) of this section and now deleted with replacement in paragraph (c)(610)(i)(C)(1) of this section: Rule 11, ‘‘Exemptions From Rule 10 Permit Requirements,’’ revision adopted on July 8, 2020. * * * * * (610) * * * (i) * * * (C) San Diego County Air Pollution Control District. PO 00000 Frm 00022 Fmt 4700 Sfmt 4700 (1) Rule 11, ‘‘Exemptions From Rule 10 Permit Requirements,’’ revision adopted on October 13, 2022. (2) [Reserved] * * * * * [FR Doc. 2024–24223 Filed 10–18–24; 8:45 am] BILLING CODE 6560–50–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 8 [PS Docket Nos. 23–239; FR ID 250049] Public Safety and Homeland Security Bureau Announces 15-Business Day Filing Window for Cybersecurity Labeling Administrator and Lead Administrator Applications Federal Communications Commission. ACTION: Final rule. AGENCY: In this document, the Federal Communications Commission’s (FCC or Commission) Public Safety and Homeland Security Bureau (PSHSB or Bureau) announces a 15-business day filing window for applications from entities seeking designation as a Cybersecurity Labeling Administrator (CLA) and Lead Administrator and also adopt additional requirements for CLA and Lead Administrator applications as well as responsibilities that must be met by the selected Lead Administrator and CLAs. These requirements will provide additional guidance to administrator applicants and further implements the Commission’s IoT labeling program. DATES: Effective date: November 20, 2024, except for amendment 3 (47 CFR 8.220(f)(14)) which is delayed indefinitely until the Office of Management and Budget has completed review under the Paperwork Reduction Act. The Commission will publish a document in the Federal Register announcing that effective date. Comments due date: Written comments on the Paperwork Reduction Act information collection requirements must be submitted by the public, Office of Management and Budget (OMB), and other interested parties on or before December 20, 2024. ADDRESSES: • All hand-delivered or messengerdelivered paper filings: Office of the Secretary, Federal Communications Commission, 9050 Junction Drive, Annapolis Junction, MD 20701. • Commercial overnight deliveries (other than U.S. Postal Service Express Mail and Priority Mail): Office of the SUMMARY: E:\FR\FM\21OCR1.SGM 21OCR1 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations Secretary, Federal Communications Commission, 9050 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service First-Class, Express, and Priority mail: Office of the Secretary, Federal Communications Commission, 45 L Street NE, Washington, DC 20554. • People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to fcc504@fcc.gov or call the Consumer & Governmental Affairs Bureau at 202–418–0530 (voice), 202– 418–0432 (TTY). FOR FURTHER INFORMATION CONTACT: Tara Shostek, Attorney Advisor, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418– 8130, or by email to Tara.Shostek@ fcc.gov. For additional information concerning the Paperwork Reduction Act information collection requirements contained in this document, contact Nicole Ongele, Office of Managing Director, Performance & Program Management, 202–418–2991, or by email to PRA@fcc.gov. SUPPLEMENTARY INFORMATION: This is a summary of the Commission’s document in PS Docket No. 23–239, released September 10, 2024. The full text of this document is available by downloading the text from the Commission’s website at: https:// docs.fcc.gov/public/attachments/DA-24900A1.pdf. The Commission has determined, and the Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget, concurs, that this rule is ‘‘non-major’’ under the Congressional Review Act, 5 U.S.C. 804(2). The Commission will send a copy of this Report & Order to Congress and the Government Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A). lotter on DSK11XQN23PROD with RULES1 Synopsis 1. By this document, the Federal Communications Commission’s (FCC or Commission) Public Safety and Homeland Security Bureau (Bureau) announces a 15-business day filing window for applications from entities seeking designation by the Commission as a Cybersecurity Labeling Administrator (CLA) and Lead Administrator.1 The Bureau also 1 While the Bureau may open additional filing windows at later dates, the Bureau will not accept applications for this initial round of applications that are filed after this filing window closes. However, applicants requiring additional time may, VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 provides determinations regarding application format, filing fees, selection criteria, sharing of expenses, Lead Administrator neutrality, and confidentiality and security requirements in this document. I. Background 2. In March 2024, the Commission established a framework for a voluntary cybersecurity labeling program for consumer wireless Internet of Things (IoT) products (IoT Labeling Program), which includes selecting third party administrators to support the program. The Commission delegated authority to the Bureau to open an initial filing window to receive applications from entities seeking authority to be recognized as a CLA and those seeking to be recognized as the Lead Administrator (see Cybersecurity Labeling for Internet of Things, 89 FR 61242 (July 30, 2024) (IoT Labeling Order)).2 CLAs will be authorized by the Commission to certify use of the FCC IoT Label, which includes the U.S. government certification mark (U.S. Cyber Trust Mark), by manufacturers whose products are found to be in compliance with the Commission’s IoT cybersecurity labeling program rules. The Lead Administrator will, among other duties, act as liaison between the Commission and CLAs, conduct stakeholder outreach to identify and/or develop and recommend to the Bureau technical standards and testing procedures for at least one class of IoT products, and in collaboration with CLAs, the FCC, and other stakeholders, develop and execute a plan for a consumer education campaign. II. CLA and Lead Administrator Applications A. Format of CLA and Lead Administrator Applications 3. In a public notice released in June, 2024 the Bureau proposed that applications be submitted in narrative format via email and sought comment on this tentative determination (see Public Safety and Homeland Security Bureau Requests Comment on Implementation of the Cybersecurity Labeling for Internet of Things Program, 89 FR 58312 (July 18, 2024), at 58313 (June 2024 IoT Labeling Public Notice)). We continue to believe that the in accordance with § 1.46 of the Commission’s rules, request an extension of time for up to 10 additional calendar days to complete their applications. 2 The IoT Labeling Order also delegated authority to the Bureau to open additional filing windows or otherwise accept additional applications for authority to be recognized by the Bureau as a CLA when and as the Bureau determines it is necessary. PO 00000 Frm 00023 Fmt 4700 Sfmt 4700 84087 information to be submitted by entities applying to be a CLA or Lead Administrator lends itself to a narrative discussion of their qualifications and adopt the narrative format proposed. While ioXt argues that a fillable form would better ensure uniformity among applications, we believe the evaluation criteria and CLA/Lead Administrator responsibilities in the IoT Labeling Order are specific enough to allow for tailored applicant responses and comparative evaluation by the Commission at this time. In addition, as outlined by the Wi-Fi Alliance, ‘‘. . . a narrative format will better allow CLA applicants to describe in detail their expertise, the types of cybersecurity assessments in which they are involved, and how those activities and other qualifications will enable them to perform the CLA role. Because all these attributes are imperative to the performance of CLA responsibilities, a narrative will best allow the Commission to assess applicant qualifications.’’ UL Solutions also supports a narrative-format application, noting that this format will allow applicants to provide the detailed information needed to support their applications. TÜV SÜD also commented that email is functional, and that a fillable form, while helpful for clarification, should also include a narrative text field so applicants can add relevant information. One commenter, ioXt, expressed concern that a ‘‘narrative email’’ may require additional communication between staff and applicants to obtain all necessary information to evaluate an application. We note that an enumeration of the evaluation criteria, and additional application instructions, including a ‘‘Frequently Asked Questions’’ link, are also provided below in this document and will provide further guidance to applicants. Further, the Bureau has considered and anticipates that staff may need to respond to applicant questions during the application review process and has designated staff for that purpose below. 4. Entities applying to be a CLA or the Lead Administrator must file a narrative explanation of their qualifications to the Office of the Secretary.3 Consistent with the record, we determine that CLA and Lead Administrator applications and supporting documentation shall be treated as presumptively confidential. Each page of the application must be clearly and conspicuously labeled 3 As stated in the 2024 IoT Labeling Public Notice, the Bureau may re-evaluate the need for a fillable form and seek additional comment on this issue after this CLA application filing window closes. E:\FR\FM\21OCR1.SGM 21OCR1 84088 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations ‘‘CONFIDENTIAL, NOT FOR PUBLIC INSPECTION.’’ As we expect applications will contain commercially sensitive and proprietary information that the Commission routinely treats as confidential, applications shall remain presumptively confidential, regardless of disposition of the application. We decline to publish applications as a matter of course, including for those entities selected as CLAs or the Lead Administrator. We disagree with commenters who argue that the value of understanding CLA methodologies outweighs confidentiality protections, as Commission evaluators will still have the opportunity to review the applicant’s testing methodologies submitted to the agency. Maintaining the presumptive confidentiality of CLA and Lead Administrator applications, including those applications that are approved by the Bureau, will provide applicants with assurances that the commercially sensitive business information they submit in conjunction with their voluntary participation in the FCC’s Program will not be publicly disclosed.4 We believe maintaining the presumptive confidentiality of these applications will encourage additional entities to submit applications for these voluntary roles. Thus, in announcing the entities selected as CLAs and Lead Administrator, we only plan to make public the entity’s name and their contact information. 5. While the Bureau will review the narrative applications received via email, we seek to leverage existing procedures, including records management, by building on a framework for the filing of confidential materials that the Commission has used in the past. Consistent with that historical approach, applicants must file the application and supporting materials with the Office of the Secretary either via hand or messenger delivery, by commercial overnight courier, or First-Class or overnight U.S. Postal Service mail. A copy must be sent to the Bureau via email as a password protected .pdf file to CyberTrustMark@ fcc.gov. Additional instructions on submitting applications are provided below. lotter on DSK11XQN23PROD with RULES1 B. FCC Filing Fees for CLA and Lead Administrator Applications 6. In the June 2024 IoT Labeling Public Notice, the Bureau sought 4 As NCTA’s comments recognize, to the extent that Commission records ‘‘would be subject to disclosure under the Freedom of Information Act,’’ the Commission would have an obligation to make that available in accordance with that law and the Commission’s implementing rules. NCTA Comments at 9. See also, e.g., 47 CFR 0.461. VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 comment on whether a filing with the Commission by an entity that is seeking to be a CLA or Lead Administrator constitutes an application under section 8 of the Communications Act, and if so, whether an existing FCC fee category would cover such applications or if a new application fee category should be established. In addition, the Bureau sought comment on what fee the Commission should charge in connection with such a filing, if applicable. Commenters do not opine on whether it is appropriate to charge application fees. The Association of Home Appliance Manufacturers (AHAM), however, explains that if fees are charged, they ‘‘should not be cost prohibitive to the point where it unnecessarily limits those entities that wish to apply.’’ TÜV SÜD does not comment on whether a fee should be assessed, but does indicate that if a fee is assessed, the Commission should set a new fee category. 7. In this instance, our IoT Labeling Program derives in part from our authority to hold and utilize a registered certification mark. In reviewing applications to be a CLA or Lead Administrator, we therefore are not acting solely under our Communications Act authority, but also to protect our registered certification mark. Given this dual role, at this time, we do not believe that the nature of our review of the applications is such that they should be subject to an application fee.5 We recognize that the process for applying to be a CLA or Lead Administrator may evolve with time. As such, we do not wholly foreclose adopting application fees in the future. Given these facts coupled with the lack of support in the record, the Bureau will not assess FCC application fees on CLA and Lead Administrator applications at this time. C. Bureau Selection of Cybersecurity Label Administrators and the Lead Administrator 8. The Bureau declines to expand the CLA and Lead Administrator selection criteria beyond what is set out in the IoT Labeling Order. In the June 2024 IoT Public Notice, the Bureau sought comment on whether there are additional areas of expertise or specific requirements a CLA applicant should be required to demonstrate in addition to those listed in the Order. The Bureau also asked what additional criteria, if any, the Bureau should take into consideration during the Lead 5 The decision in section II.B of this document is made in conjunction with the Office of Managing Director (OMD). PO 00000 Frm 00024 Fmt 4700 Sfmt 4700 Administrator selection process, as well as safeguards the Bureau might adopt to ensure the stakeholder process remains competitively neutral and whether all selection criteria should be weighted the same. 9. NCTA suggests that ‘‘when selecting a Lead Administrator, the Bureau should consider candidates’ ability to maintain the Program’s integrity when translating the substantive technical security requirements into recommended standards and test procedures, and do so without creating unnecessary deterrents for manufacturer participation in the Program.’’ We agree that a Lead Administrator’s maintenance of the Program’s integrity during the 90-day stakeholder process and resulting recommendations is very important to the success of the Program. However, the Bureau finds that the criteria outlined in the IoT Labeling Order are sufficient to ensure the selected Lead Administrator has the technical experience and the high integrity expected of an entity supporting an FCC program. This position is supported by UL Solutions, which states the ‘‘[IoT Labeling Order] did not neglect any important considerations for assessing the qualifications of organizations to serve as CLAs or as the Lead Administrator.’’ We believe that the public/private partnership and close collaboration between industry and other stakeholders contemplated in the IoT Labeling Order, along with the Commission’s oversight, will ensure that there are adequate guardrails to maintain the Program’s integrity in this regard. 10. NCTA also encourages the Bureau to evaluate Lead Administrator applications for their ability to avoid conflicts of interest, including any relationships the Lead Administrator applicant may have that could create the appearance of impropriety or a conflict of interest, such as complaints from manufacturers, and suggests evaluating whether Lead Administrator applicants have the financial resources to avoid such conflicts going forward. We disagree that it is necessary to take additional measures when evaluating applications for this purpose. Existing application criteria require an applicant to describe their organization structure, including an explanation of how it will avoid personal and organizational conflict when processing applications, and demonstrate implementation of controls to eliminate actual or potential conflicts of interests (both personal and organizational), to remain impartial and unbiased. In addition, the Future of E:\FR\FM\21OCR1.SGM 21OCR1 lotter on DSK11XQN23PROD with RULES1 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations Privacy Forum urges the Bureau to ‘‘consider requiring program administrators to possess relevant privacy expertise as well as cybersecurity expertise.’’ We agree that privacy is an integral aspect of cybersecurity, and note that existing application criteria require applicants to possess both privacy and cybersecurity expertise, including demonstrated expert knowledge of the National Institute of Standards and Technology (NIST) cybersecurity guidance and recommended criteria and labeling program approaches, which include privacy among their core cybersecurity capabilities. 11. We also note that the Wi-Fi Alliance recommends that in addition to demonstrating their ‘‘[e]xpert knowledge of FCC rules and procedures associated with product compliance testing and certification,’’ CLA applicants also demonstrate their experience in this area. Wi-Fi Alliance recognizes that while a lack of current experience with developing and implementing security standards should not be disqualifying, it would serve the public interest for the Bureau to include this ‘‘additional requirement, particularly concerning specific IoT products where cybersecurity standards have already been developed and tested.’’ The Wi-Fi Alliance encourages the Bureau to give a preference to CLA applicants with this experience. The Bureau declines to require applicants to demonstrate previous experience with FCC rules and procedures associated with product compliance testing and certification as a condition precedent to being an approved CLA or give preference to CLA applicants with this experience. In particular, applicants are always encouraged to provide any additional information that helps demonstrate their expertise or experience under the relevant criteria and, providing examples of an applicant’s experience where applicable, in general, will provide more information from which the Bureau can evaluate an application. Additionally, CTIA proposes criteria for evaluating CLA applications to include a minimum of 5–10 years of experience managing a cyber certification program and proven experience in running or participating in a working group on cybersecurity standards. While we agree that this set of criteria can be useful to demonstrate a ‘‘proven track record,’’ we are concerned that requiring such specific criteria may unnecessarily exclude applicants that otherwise may have appropriate knowledge and VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 expertise. Therefore, we decline to adopt this recommendation. 12. We conclude that we will maintain the criteria as set out in the IoT Labeling Order for the initial round of CLA and Lead Administrator applications. The Bureau, jointly with OMD and, to the extent necessary, Office of General Counsel, will receive and review administrators’ applications for compliance with each criteria set forth in the IoT Labeling Order and to best ensure the success of the program. We note that UL Solutions recommends certain requirements be defined in greater detail to avoid subjective determinations, but we believe that the IoT Labeling Order provided a comprehensive list of required criteria that covers the breadth of expertise and capabilities necessary to select a CLA and Lead Administrator at this early stage of the program and is neutral toward applicants. Further, as noted above, applicants are not limited to providing the required criteria listed in the IoT Labeling Order, but have the flexibility to offer additional expertise or selection criteria they believe are pertinent and support their application (e.g., expected costs/budget for Lead Administrator to carry out their responsibilities, information to support their ability to carry out the respective responsibilities, etc.). Should the Bureau conclude that it would be appropriate to open subsequent filing windows, we may seek comment on, and consider adoption of, additional selection criteria at that time. 13. As discussed in the IoT Labeling Order, authorizing one or more CLAs subject to Commission oversight to handle the routine administration of the program will help to ensure its timely and consistent rollout, and independent third-party CLAs will bring trust, consistency, and an impartial level playing field to the IoT Labeling Program and will provide the required expertise for the administration of the program. Leveraging the expertise of multiple existing program managers and using pre-existing systems and processes that meet our program specifications will minimize administrative delay and ensure the Commission effectively utilizes the expertise of those entities who have made investments in their own cybersecurity labeling programs. Entities that have experience working with manufacturers and IoT conformity and standards testing, as required in the criteria adopted in the IoT Labeling Order, will also best be able to promote an efficient and timely rollout of the IoT Labeling Program. PO 00000 Frm 00025 Fmt 4700 Sfmt 4700 84089 14. We disagree with CTIA’s suggestion that the Bureau adopt a flexible approach with respect to International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 17065 accreditation requirements for CLAs with a certain level of experience to avoid unnecessary costs and delays. CTIA posits that ‘‘[accreditation] can be costly and time-consuming to obtain and is unnecessary for prospective CLAs that have demonstrated track records in managing similar certification programs.’’ Instead, CTIA proposes for entities with at least 5–10 years of experience running certification programs, ISO/IEC 17065 accreditation should be optional. In contrast, A2LA submits that the ‘‘ISO/IEC 17065 accreditation requirement will be of benefit to the FCC and the consumers it serves by providing necessary risk mitigation . . . Claiming a certain number of years’ experience is not equivalent to demonstrating technical competence or compliance.’’ The IoT Labeling Order and accompanying rules require that all CLAs obtain ISO/IEC 17065 accreditation to the Commission’s scope within six months of the effective date of the adopted standards and testing procedures. The Commission previously determined that ‘‘leveraging accredited industry bodies to perform conformity assessments will ‘speed the establishment of the program and increase the program’s ultimate quality.’ ’’ As such, we decline to adopt CTIA’s suggested exemption. Alternatively, CTIA recommends an 18month grace period to obtain such accreditation, for entities that have a proven track record of successfully managing a certification program. The Commission recognized it would take time for selected CLAs to obtain ISO/ IEC 17065 accreditation and for that reason found it appropriate to conditionally approve CLAs and allow an additional six months for selected administrators to obtain accreditation. While we decline to adopt a blanket 18month grace period, we are mindful that some entities may require more than six months to obtain accreditation. We think the Commission’s existing rule waiver procedure is an appropriate and sufficient vehicle for CLAs that cannot meet the accreditation deadline to request a waiver of the rule along with their requested extension period. 15. We also disagree with CTA’s suggestion that conditional approval of CLA applications will allow CLAs to certify products to use the FCC IoT Label before obtaining ISO/IEC 17065 accreditation to the Commission’s E:\FR\FM\21OCR1.SGM 21OCR1 84090 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations scope.6 The Commission indicated that CLA applications will be conditionally approved in order to expedite initial deployment of the FCC’s program. However, CLAs that have not demonstrated that they have received ISO/IEC 17065 accreditation to the Commission’s scope will not be recognized and approved by the Bureau to receive applications or otherwise approved to authorize use the FCC IoT Label. 16. It is premature for the Bureau to address the specific scope of the Commission’s accreditation program as the standards and testing procedures have not yet been adopted. However, we emphasize that each CLA will be required to obtain ISO/IEC 17065 accreditation to the FCC scope before it will be recognized by the Commission as an entity authorized to certify a product as being compliant with FCC IoT Labeling Program rules and authorize use of the FCC IoT Label consistent with the IoT Labeling Order. lotter on DSK11XQN23PROD with RULES1 D. Lead Administrator Expenses Shared Among CLAs 17. The June 2024 IoT Labeling Public Notice sought recommendations for an effective mechanism for CLAs to share the Lead Administrator’s expenses. Parties are generally in agreement that Lead Administrator startup costs will be higher than the Lead Administrator’s ongoing costs once the program is stood up and should be reflected in the CLA’s cost sharing obligations. UL Solutions recommends an initial standup fee for the Lead Administrator and a percertificate fee going forward. The Wi-Fi Alliance recommends the Lead Administrator submit to the Bureau a claim for expenses incurred in the performance of its duties, which if approved, would be shared proportionally among the CLAs, with the proportionality being based on the annual number of products the CLA certifies to use the FCC IoT Label. The Wi-Fi Alliance notes that Lead Administrator expenses subject to sharing by the CLAs should be limited to those ‘‘that are unique to the Lead Administrator as Lead Administrator,’’ and not related to its activities as a CLA. 18. The Bureau recognizes that the Lead Administrator’s expenses incurred 6 CTA also recommends the Bureau similarly conditionally approve CyberLABs to begin testing products before they become accredited and provide CyberLABs a 6-month grace period to obtain accreditation, which the Bureau declines to do. CyberLABs are not authorized by the Commission to begin testing products for compliance with the IoT Labeling Program until after they have obtained the appropriate accreditation to the Commission’s scope and have been recognized by the Lead Administrator. VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 as a result of the performance of its duties under this program must be reasonable and accurately reflect its actual costs. In addition, it is also important to ensure each CLA shares in the Lead Administrator’s costs as required by the IoT Labeling Order and that the costs shared reflect the Lead Administrator’s actual and reasonable expenses incurred as a result of performance of its Lead Administrator duties and only those expenses incurred in its capacity as Lead Administrator. To ensure this occurs, the Lead Administrator is required to implement internal controls adequate to ensure its operations maintain best practices to protect against improper payments and to prevent fraud, waste, and abuse in its handling of funds. Once selected, the Lead Administrator will also submit to the Bureau and OMD, an estimate of its forward-looking costs including, separately, program stand-up costs and ongoing program costs to perform the Lead Administrator duties for the Lead Administrator’s upcoming calendar year, which will be reviewed by CLAs, PSHSB, and OMD for reasonableness, and if determined to be reasonable by PSHSB and OMD, will be used to estimate the overall CLA cost sharing obligation.7 19. Consistent with the IoT Labeling Order, each CLA will share in these Lead Administrator costs, however, we decline to establish the methodology for such cost sharing and instead rely on CLAs and the Lead Administrator to determine the sharing methodology, which should be reasonable and equitable and will be subject to ongoing oversight by the Commission. Further, we require the Lead Administrator to submit to the Bureau and OMD, an annual, independently audited, statement of program expenditures and monies received from the CLAs due before the end of the calendar year. The Bureau will provide further guidance on CLA cost sharing once the CLAs and the Lead Administrator have been selected. E. Lead Administrator Neutrality 20. Neutral Treatment of CLAs and Other Stakeholders. In the IoT Labeling Order, the Commission recognized the competitive implications of an entity being both the Lead Administrator and a CLA. The June 2024 IoT Labeling 7 CTIA, and others, point out the need for federal funding to support core aspects of the program, such as consumer education. NCTA argues the Federal government should lead the consumer education campaign, which would reduce the burden on the Lead Administrator and CLAs. However, both of these recommendations are beyond the Bureau’s delegation of authority and the scope of this document. PO 00000 Frm 00026 Fmt 4700 Sfmt 4700 Public Notice sought comment on what safeguards, if any, the Bureau should adopt to ensure Lead Administrator neutrality as a potential competitor of other CLAs. The Bureau also asked whether there are additional safeguards, beyond those contemplated in the IoT Labeling Order, the Bureau should adopt to ensure the stakeholder engagement process and related recommendations the Lead Administrator makes to the Commission (e.g., standards and testing criteria and label design) are consensus-based and competitively neutral. 21. Commenters emphasize the importance of ensuring Lead Administrator neutrality to prevent actual, as well as perceptions of, unfair economic advantage by the Lead Administrator over other CLAs, and support adopting reasonable safeguards to do so. We share ioXt’s concern that if the Lead Administrator gained an economic advantage by passing on fees to other CLAs, for example, CLAs would have to raise their prices, which would pass on the costs to the manufacturers, and then on to consumers. In order to ensure impartiality, A2LA recommends considering ISO/IEC 17065 requirements, which describe a mechanism (often a committee) for safeguarding impartiality and assuring a competitively neutral environment between the Lead Administrator, CLAs, and other stakeholders. TÜV SÜD also recommends that Lead Administrator neutrality be evaluated on a yearly basis, with the possibility of triggering an investigation by the Commission and revocation of Lead Administrator designation. Infineon suggests requiring a ‘‘firewall’’ to separate the Lead Administrator from its role as CLA, similar to those instituted by law firms to avoid conflicts between multiple clients’ interests. Somos, Inc. recommends applying relevant rules from its role as the North American Numbering Plan Administrator to the Lead Administrator, including impartial allocation of resources, transparency, non-discrimination, avoidance of conflicts of interest, and compliance with regulations. 22. We agree that ensuring Lead Administrator neutrality ‘‘is critical to maximizing the Program’s credibility and fostering trust among stakeholders,’’ and we believe the IoT Labeling Order sufficiently addresses the concerns raised in the record. We note that the requirement that the Lead Administrator be accredited to ISO/IEC 17065 will ensure that the entity is appropriately aligned with those impartiality mechanisms. Further, we require all CLA applicants, including those E:\FR\FM\21OCR1.SGM 21OCR1 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations lotter on DSK11XQN23PROD with RULES1 applying to be the Lead Administrator, to demonstrate implementation of controls to eliminate actual or potential conflicts of interests, including remaining impartial and unbiased. The Bureau will evaluate such applications to ensure rigorous compliance with these criteria. We also note that approval of the Lead Administrator may be subject to withdrawal by the Commission upon a determination of just cause, and this includes failing to follow those impartiality requirements. The Lead Administrator must be committed to neutrality and impartiality, consistent with the IoT Labeling Order. Because we anticipate those measures will be sufficient, we are not persuaded of the need to adopt additional requirements at this time. 23. Finally, CTA proposes asking prospective CyberLABs and CLAs to attest that they meet the requirements in the (draft) CTA–2119 Scheme Assessment Framework, as an industry consensus standard to preserve neutrality when assessing applicant entities. We decline to adopt this requirement at this time, given that the draft CTA–2119 Framework has not undergone public notice and comment. However, we may reconsider this proposal at a later date, once the Labeling Program’s standards and testing procedures have been finalized.8 24. Transparency in 90-day Stakeholder Process. As an initial matter, we emphasize that the IoT Labeling Order requires the Lead Administrator to ‘‘provide equitable recommendations to the Commission to encourage the broadest possible participation of CLAs within the parameters of the FCC’s rules.’’ Therefore, while we believe it is premature to adopt additional rules in this regard, we note that UL Solutions emphasizes the importance of transparency in the stakeholder collaboration process, stating that the Lead Administrator should invite a wide variety of stakeholders and ensure they all have sufficient opportunity to have their views heard and participate in manageable working groups. Further, UL Solutions states that recommendations made to the Commission should also include dissenting views and how those dissenting views were addressed, which would be considered in the final rules adopted by the Commission. UL 8 CTA also proposes applying the CTA–2119 Scheme Assessment Framework as a uniform way to evaluate whether a scheme recommended by the Lead Administrator-led working group meets the NISTIR 8425 criteria required in the IoT Labeling Order. We similarly decline to adopt this proposal at this time. VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 Solutions also recommends the importance of a clear and transparent process to shield the Lead Administrator from accusations or perceptions of bias when recognizing accredited CyberLABs. TÜV SÜD similarly proposes safeguards, such as a mandatory consultation round before making critical decisions regarding recommendations to the Commission. 25. While we do not adopt additional guardrails at this stage, we reiterate the position in the IoT Labeling Order that the Lead Administrator should ensure participation from a wide variety of stakeholders and consider various resources when developing the IoT Labeling Program recommendations. As noted above, ISO/IEC 17065 accreditation is required for all CLAs, including the Lead Administrator, and adherence to that standard requires the convener of working groups to develop recommendations (here, the Lead Administrator), and achieve a balanced representation of interests, such that no single interest predominates. We agree that transparency in the 90-day stakeholder process is of the highest importance and the Bureau expects to provide additional guidelines on that process when it announces the selection of CLAs and the Lead Administrator. F. Confidentiality and Security Requirements 26. The Bureau adopts its proposal from the June 2024 IoT Labeling Public Notice that manufacturer applications submitted to CLAs are presumptively confidential and CLAs are required to maintain this confidentiality. CLAs will be required to maintain the confidentiality of non-public information received as part of an application for authority to use the FCC IoT Label, and must implement appropriate administrative, technical, procedural, and physical safeguards to protect the confidentiality of information received by the CLA and protect against the unauthorized disclosure and unauthorized use of nonpublic information received as a result of its participation in the FCC IoT Labeling Program. 27. We agree with commenters that the program would benefit from a presumption of confidentiality for filings and related information provided to CLAs from applicants seeking use of the FCC IoT Label, which would encourage manufacturer participation and protect proprietary technology and trade secrets. We disagree with commenters that such a presumption of confidentiality is not necessary due to the public-facing nature of the label. While this is true for product PO 00000 Frm 00027 Fmt 4700 Sfmt 4700 84091 information required to be disclosed in the registry if approval is granted, this would not be the case for products that are denied authorization to bear the FCC IoT Label. In addition, as discussed above, we expect that applications submitted to the Commission by CLAs will also continue to be treated as presumptively confidential. We emphasize here that information submitted by manufacturers to CLAs, the Lead Administrator, and/or CyberLABs, in the course of seeking authority to use the FCC IoT Label, including but not limited to applications and test reports, and information submitted to the Lead Administrator by a lab seeking recognition as a CyberLAB (i.e., authorized to conduct conformance testing under the Commission’s IoT Labeling Program) are not agency records of the Commission. Only information submitted to the Commission, such as submissions in furtherance of applications by entities seeking authority from the Commission to be a CLA and/or Lead Administrator, are records of the Commission. 28. In the June 2024 IoT Labeling Public Notice, the Bureau tentatively concluded that the requirements of the Federal Information Security Modernization Act of 2014 (FISMA) apply to the Lead Administrator and CLAs.9 Some commenters oppose a FISMA requirement, stating that it would ‘‘strongly discourage CLAs from applying to the program,’’ and that FISMA has not been applied by other agencies supporting analogous programs, such as the Health and Human Services Department’s Office of the National Coordinator’s (ONC) certification program for health IT products. While we acknowledge these concerns, alone, they are not dispositive for not applying FISMA. 29. FISMA was enacted to ensure that each federal agency develops, documents, and implements an agencywide program to secure federal information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. Given this scope, we reconsider our tentative conclusion to apply FISMA to CLAs and the Lead Administrator and determine that, as presently contemplated, neither the CLAs nor the Lead Administrator 9 The June 2024 IoT Labeling Public Notice also asks whether ‘‘. . . the registry operator(s) [should] as appropriate, be required to implement adequate security, privacy, and availability controls to meet FISMA low/moderate standards, or a commercial equivalent?’’ The Bureau recognizes the importance of the registry’s security requirements, and will address these issues in a future Public Notice addressing the structure of the Registry’s Application Programming Interface (API). E:\FR\FM\21OCR1.SGM 21OCR1 lotter on DSK11XQN23PROD with RULES1 84092 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations will operate an information system on behalf of the agency. That is so because the Commission has no plans to establish any interconnection between its systems and the Lead Administrator’s or CLA’s information systems; indeed, the FCC does not expect to routinely request, obtain access to, otherwise collect, use, process, or maintain the data or information held by the Lead Administrator or the CLAs, excepting for investigative purposes. Moreover, although the Lead Administrator will receive information from CLAs and applicant manufacturers necessary for it to carry out its responsibilities under the FCC’s program, and CLAs will receive and evaluate applications and supporting data from applicant manufacturers, this, without more, does not mean that the Lead Administrator or CLAs are managing their information systems ‘‘on behalf of’’ the FCC. 30. Nevertheless, we agree with NCTA that ‘‘[c]lear guidelines, safeguards, and protocols for handling confidential information should be established to prevent unauthorized disclosure’’ and believe that other mature security frameworks may be applied to CLAs and the Lead Administrator to reduce the risk of unauthorized access, use, disclosure, disruption, modification, or destruction of program data. Accordingly, we require that all CLAs and the Lead Administrator create, update, and implement cybersecurity risk management plans. Such a cybersecurity risk management plan must identify the cyber risks that the entity faces, the controls used to mitigate those risks, and the steps taken to ensure that these controls are applied effectively to their operations. The plans must also describe how each entity employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of its information and information systems. These requirements are consistent with the National Cyber Strategy and are in keeping with a whole-of-government effort to ‘‘establish cybersecurity requirements to support national security and public safety.’’ We expect that creating, updating, and implementing a cybersecurity risk management plan will help protect each CLA and the Lead Administrator from serious national security threats. 31. We note that, under this approach, each entity has flexibility to structure its cybersecurity risk management plan in a manner that is tailored to its operations after consideration of a variety of factors, provided that the plan demonstrates that the entity is taking VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 affirmative steps to analyze security risks and improve its security posture. We further note that an entity could successfully demonstrate satisfaction with this requirement by following an established risk management framework, such as the NIST Cybersecurity Framework (CSF) or Risk Management Framework (RMF). CLAs and the Lead Administrator security plans should be informed by established cybersecurity best practices such as the standards and controls set forth in the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Cross-sector Performance Goals and Objectives (CISA CPGs), ISO/IEC 27001, NIST Special Publication 800–53 (rev 5), or the Center for Internet Security Critical Security Controls (CIS Controls) version 7.1 or later. These frameworks are designed to be scalable and adaptable to the needs and capabilities of companies both large and small, are well understood by industry, and are flexible. CTIA and CTA argue compliance with a commercial equivalent framework to FISMA, such as ISO 27001 can ‘‘take a year or more at a cost upwards of $100,000.’’ However, these cost and timelines would not apply to this program, because while we require entities to implement security plans reflecting standards and controls, such as ISO/IEC 27001, we do not specifically require a CLA or the Lead Administrator to be certified to ISO/IEC 27001. Moreover, we expect that many entities in the industry that might seek to be CLAs or the Lead Administrator will have adopted plans along the lines we require here and may have obtained such certifications in the ordinary course of business. And in any event, we find that any costs that might be incurred by an entity seeking to be a CLA or Lead Administrator are outweighed by the benefits that will redound to such entities themselves, the industry more broadly, and U.S. national security from our requiring such entities to take these steps to protect the confidentiality, integrity, and availability of the information they hold—including from other entities in the industry—and the information systems they maintain. We expect risk management plans to contribute to the CLAs’ and the Lead Administrator’s existing internal security practices that maintain the confidentiality, integrity, availability of all information received in support of this program without significantly increasing the time or costs of participation.10 10 We expect CLA and Lead Administrator applicants to address these internal security PO 00000 Frm 00028 Fmt 4700 Sfmt 4700 32. We additionally require each applicant seeking to serve as a CLA or Lead Administrator to submit with its application an attestation that it already has created and implemented—or upon selection will create and implement—a cybersecurity risk management plan as described above—which will demonstrate compliance with these requirements as well as the entity’s cybersecurity expertise and capabilities, knowledge of NIST’s cybersecurity guidance, and knowledge of federal law and guidance governing the security and privacy of information systems. We also require that CLAs and the Lead Administrator make such cybersecurity risk management plans available to the Commission upon request. Access to cybersecurity risk management plans will allow the Commission to confirm whether plans are being regularly updated, to review a specific plan as needed, or to proactively review a sample of plans to confirm they sufficiently identify the cybersecurity risks to the Lead Administrator and CLAs in this program. In such circumstances, cybersecurity risk management plans would be presumptively confidential. III. Who May Apply 33. Any domestic, independent,11 non-governmental entity eligible to enter into a licensing agreement with the FCC may apply for the role of CLA and/or Lead Administrator; 12 however, an applicant cannot be owned or controlled by, or affiliated with, any entity that produces equipment on the FCC Covered List or is otherwise prohibited from participating in the IoT Labeling Program, to include companies named on the Department of Commerce’s Entity List and the Department of Defense’s List of Chinese Military Companies. IV. Application Procedures A. Applications for Cybersecurity Label Administrator (CLA) 34. Applicants seeking the role of CLA must demonstrate the following: practices in their applications to the Commission, which will be enforceable under the Commission’s rules. 11 Here, ‘‘independent’’ means the applicant is not affiliated with or a subsidiary of another CLA/ Lead Administrator applicant. It also means that the applicant is a disinterested third-party outside of a prospective manufacturer’s control that is applying for authority to use the FCC IoT Label. 12 The IoT Labeling Order declined to require that a CLA be a non-profit, stating that a for-profit or non-profit organization could possess the requisite qualifications and carry out the CLA duties effectively. We note that Congress, from time to time, adopts appropriation riders that preclude federal agencies from entering into agreements with certain entities. E:\FR\FM\21OCR1.SGM 21OCR1 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations lotter on DSK11XQN23PROD with RULES1 a. Applicant is not owned or controlled by or affiliated 13 with any entity identified on the Commission’s Covered List, or is otherwise prohibited from participating in the IoT Labeling Program,14 including being an entity identified on the Department of Commerce’s Entity List or on the Department of Defense’s List of Chinese Military Companies; b. Applicant is not owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration’s System for Award Management; c. Description of Applicant’s organization structure; 15 d. Implementation of controls to eliminate actual or potential conflicts of interests (both personal and organizational), particularly with regard to commercially sensitive information, to include but not limited to, remaining impartial and unbiased and prevent Applicant from giving preferential treatment to certain applications particularly with regard to applicants from entities with whom the CLA has a business relationship (e.g., application line jumping or same level of scrutiny when reviewing the application) and from implementing heightened scrutiny of applications from entities not members or otherwise aligned with the CLA; 16 e. Description of the process(es) Applicant will use to evaluate applications seeking authority to use the FCC IoT Label; 17 13 For purposes of the Commission’s IoT labeling program, an affiliate is defined as a person that (directly or indirectly) owns or controls, is owned or controlled by, or is under common ownership or control with, another person. The term own means to own an equity interest (or the equivalent thereof) of more than 10 percent. 14 The Order includes this catchall for entities otherwise prohibited from participating in the program, to include those listed in 47 CFR 8.204 and those considered a ‘‘foreign adversary’’ country as defined by the Department of Commerce. 15 In describing its organizational structure, an Applicant may describe its relevant expertise, processes, and key personnel that would support the CLA IoT Labeling Program requirements and responsibilities. 16 In addition to demonstrating the relevant controls in place to avoid conflicts of interest, Applicants may also provide prior experience in avoiding personal and organizational conflict (e.g., history of, processes for, working with, certification labs on an equitable basis. 17 Applicants may describe existing data systems, personnel and other resources, processes (e.g., record-keeping etc.) in place or to be developed, for reviewing, accepting or denying applications to use the FCC IoT label in accordance with ISO/IEC 17065. VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 f. Cybersecurity expertise and capabilities, in addition to industry knowledge of IoT generally, and IoT Labeling requirements; g. Expert knowledge of NIST’s cybersecurity guidance, including but not limited to NIST’s recommended criteria and labeling program approaches for cybersecurity labeling of consumer IoT products; h. Expert knowledge of FCC rules and procedures associated with product compliance testing and certification; 18 i. Knowledge of Federal law and guidance governing the security and privacy of agency information systems; and j. The ability to securely handle large volumes of information, including a description of Applicant’s related internal security practices. 35. Applicants seeking the role of CLA must also commit to complying with the obligations of CLAs under the IoT Labeling Order and the Commission’s rules, including but not limited to the following: 19 a. Obtaining accreditation pursuant to all of the requirements associated with ISO/IEC 17065 with the forthcoming FCC program scope; 20 b. The ability (e.g., appropriate testing equipment, and personnel with the necessary technical expertise and training) to conduct post-market surveillance activities, such as audits, in accordance with ISO/IEC 17065; c. Implementation of a process for receiving complaints alleging an IoT product does not support the cybersecurity criteria conveyed by the Cyber Trust Mark and referring those complaints to the Lead Administrator; d. Collaborating with the Lead Administrator and other stakeholders to develop those items to be submitted to the Commission within 90 days of election of the Lead Administrator, and listed in 47 CFR 8.221(a)(4); and e. Being an active participant in the consumer education campaign led by 18 For example, Applicants may describe their experience with the FCC’s Equipment Authorization Program or another FCC-run compliance program. 19 CLAs must also comply with all requirements enumerated in 47 CFR 8.220. 20 E.g., For purposes of conditional approval, applicants may meet this requirement by demonstrating they are certified to ISO/IEC 17065 under another scope. Alternatively, Applicants may outline a plan to receive ISO/IEC 17065 accreditation within six months of the effective date of the standards and testing procedures to be adopted under the forthcoming FCC program scope and demonstrate that their current or planned product testing processes align with ISO/IEC 17065. Each CLA must obtain 17065 accreditation to the FCC scope before it will be recognized by the Commission and authorized to begin processing applications to certify use of the FCC IoT Label. PO 00000 Frm 00029 Fmt 4700 Sfmt 4700 84093 and in coordination with the Lead Administrator. 36. In addition to the above requirements for CLA applications, Lead Administrator applicants must demonstrate the following: a. Description of Applicant’s previous experience in IoT cybersecurity; 21 b. Description of Applicant’s previous roles, if any, in IoT labeling; 22 c. Description of Applicant’s capacity (e.g., available resources, systems, infrastructure etc.), and commitment to execute the following Lead Administrator duties: 23 i. Interfacing with the Commission on behalf of CLAs, which includes but is not limited to, submitting to the Bureau all complaints alleging a product bearing the FCC IoT Label does not meet the requirements of the Commission’s labeling program; ii. Conducting stakeholder outreach, coordinating with CLAs and other stakeholders, and moderating stakeholder meetings; iii. Accepting, reviewing, and approving or denying applications from labs seeking recognition as a lab authorized to perform the conformity testing necessary to support an application for authority to affix the FCC IoT Label, and maintaining a publicly available list of Lead Administrator-recognized labs and a publicly available list of labs that have lost their recognition; iv. Within 90 days of selection as Lead Administrator, in collaboration with the CLAs and other stakeholders (e.g., cyber experts from industry, government, and academia) submitting to the Bureau: (a) Recommendations identifying and/ or developing the technical standards and testing procedures for the Commission to consider with regard to at least one class of IoT products eligible for the IoT Labeling Program; (b) A recommendation on how often a given class of IoT products must renew their request for authority to bear the FCC IoT Label, which may be dependent on the type of product, and that such a recommendation be submitted in connection with the relevant standards recommendations for an IoT product or class of IoT products; 21 Where an Applicant describes previous experience or roles in IoT cybersecurity or IoT labeling, it may also describe how it expects to apply such previous experience to meet the Lead Administrator responsibilities. 22 E.g., Applicant may show a history of certifying IoT devices to a specific set of cybersecurity requirements. Alternatively, Applicant may show a history of certifying non-IoT devices to a designated cybersecurity scope. 23 Applicant may demonstrate relevant past experience, or otherwise provide a detailed plan to meet, each of the duties listed. E:\FR\FM\21OCR1.SGM 21OCR1 84094 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations lotter on DSK11XQN23PROD with RULES1 (c) A recommendation on procedures for post market surveillance by the CLAs; (d) Recommendations on the design of the FCC IoT Label, including but not limited to labeling design and placement (e.g., size and white spaces, product packaging) and whether to include the product support end date on labels for certain products or category of products; and (e) Recommendations with regard to updates to the registry including whether the registry should be in additional languages, and if so, to recommend specific languages for inclusion. d. Recommending appropriate modifications to the IoT Labeling Program standards and testing procedures within 45 days of publication of updates or changes to the NIST guidelines, or adoption by NIST of new guidelines, to stay aligned with NIST guidelines; e. Developing, in collaboration with CLAs and other stakeholders, a consumer education campaign, submitting the consumer education plan to the Bureau, and participating in consumer education; f. Receiving complaints about the Labeling Program, including but not limited to consumer complaints about the registry and coordinating with manufacturers to resolve any technical problems associated with consumers accessing the information in the registry; g. Facilitating coordination between CLAs; and h. Submitting to the Commission any other reports upon request of the Commission or as required by Commission rule. i. Any additional information Applicant believes demonstrates why they should be designated the Lead Administrator. C. Required Certification Statements 37. All applications MUST include the following certification statements under penalty of perjury or they will be dismissed: a. Applicant certifies that all statements made in this application and in the exhibits, attachments, or documents incorporated by reference are material, are part of this application, and are true, complete, correct, and made in good faith, see 47 CFR 1.17, 8.220, 8.221. b. Applicant certifies that neither the Applicant nor any other party to the application is subject to a denial of Federal benefits pursuant to § 5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 862, because of a conviction for VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 possession or distribution of a controlled substance. See 47 CFR 1.2002(b) for the definition of ‘‘party to the application’’ as used in this certification. c. The Applicant certifies that it is not delinquent on any debts to the Commission, see 47 CFR 1.1910. d. Applicant acknowledges that willful false statements made on the application or on any attachments are punishable by fine and/or imprisonment (18 U.S.C. 1001) and/or forfeiture (47 U.S.C. 503). D. The Application Must Be Signed and Dated 38. The Application must be signed and dated by the individual authorized to sign on behalf of the Applicant. FAILURE TO SIGN THE APPLICATION MAY RESULT IN DISMISSAL OF THE APPLICATION. E. Application Submission 39. The Bureau expects CLA and Lead Administrator applications and supporting documentation to be filed confidentially. Each page of the application must be clearly and conspicuously labeled ‘‘CONFIDENTIAL, NOT FOR PUBLIC INSPECTION.’’ Applicant must file an original and one copy of each filing and supporting materials with the Office of the Secretary. All filings must reference PS Docket No. 23–239 and be addressed to the Commission’s Secretary, Office of the Secretary, Federal Communications Commission. Filings can be sent by hand or messenger delivery by commercial overnight courier, or FirstClass or overnight U.S. Postal Service mail. • All hand-delivered or messengerdelivered paper filings for the Commission’s Secretary are accepted between 8:00 a.m. and 4:00 p.m. at 9050 Junction Drive, Annapolis Junction, MD 20701. All hand deliveries must be held together with rubber bands or fasteners. Any envelopes and boxes must be disposed of before entering the building. • Commercial overnight deliveries (other than U.S. Postal Service Express Mail and Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD 20701. • U.S. Postal Service First-Class, Express, and Priority mail must be sent to 45 L Street NE, Washington, DC 20554. 40. An electronic version of the application and supporting material is required to be submitted to FCC staff as a .pdf file via email to CyberTrustMark@ fcc.gov. The document must be password protected and the password communicated in a separate email to PO 00000 Frm 00030 Fmt 4700 Sfmt 4700 CyberTrustMark@fcc.gov. Submissions may be broken into multiple emails when necessary. 41. Applications should be received by the Commission as soon as possible, but no later than October 1, 2024. Applicants requiring additional time may request an extension of time for up to 10 additional calendar days to complete their applications. Applications received after October 1, 2024 from an entity that has not been approved an extension of time, will not be accepted and will be dismissed. Procedures for submitting applications are set forth below. F. Additional Instructions To Assist With CLA and/or Lead Administrator Applications • Instructions. General filing instructions can be found in Appendix A of the Commission’s Public Notice, DA–24–900, released September 10, at this link: https://docs.fcc.gov/public/ attachments/DA-24-900A1.pdf. • Frequently Asked Questions (FAQs). The FAQs are available at https://www.fcc.gov/CyberTrustMark. • FCC Notice Required by the Paperwork Reduction Act. The FCC Notice Required by the Paperwork Reduction Act can be found in Appendix D of the Commission’s Public Notice, DA–24–900, released September 10, at this link: https://docs.fcc.gov/ public/attachments/DA-24-900A1.pdf. • Privacy Act Statement. The Privacy Act Statement can be found in Appendix E of the Commission’s Public Notice, DA–24–900, released September 10, at this link: https://docs.fcc.gov/ public/attachments/DA-24-900A1.pdf. • Requirement for an FCC Registration Number (FRN). We remind all applicants that they must have an FRN to file their applications. An FRN is the 10-digit number assigned to all individuals and entities that transact business with the Commission, and it must be provided any time an applicant submits or updates their application. • Applicant Does Not Have an FRN. If an applicant does not have an FRN, the applicant must obtain an FRN through the Commission Registration System (CORES) web page at https:// apps.fcc.gov/cores/userLogin.do. Æ For additional assistance, submit a help request at https://www.fcc.gov/ wireless/available-support-services or call the FRN Help Desk at (877) 480– 3201 (Monday–Friday, 8 a.m.–6 p.m. ET). Æ If the applicant has further questions, an email can be sent to CyberTrustMark@FCC.gov. E:\FR\FM\21OCR1.SGM 21OCR1 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations • Applicant has an FRN. If an applicant has an FRN, the applicant must use that FRN with its application. Æ The applicant should not obtain a new FRN if Applicant already has an FRN. Æ An applicant can identify its FRN by accessing records the Commission’s Registration Systems (CORES) and click ‘‘Search’’. Individuals can search by name, or contact related information. Business organizations can search by name, Employer Identification Number (EIN), or contact-related information. lotter on DSK11XQN23PROD with RULES1 V. Next Steps 42. After the application filing window closes October 1, 2024, the Bureau will review and evaluate properly filed applications. The Bureau’s selection of CLAs and a Lead Administrator will be announced by public notice. The Public Notice will describe the next steps for selected entities, including but not limited to the execution of a licensing agreement and/ or other appropriate documentation governing the details of the CLAs’ and Lead Administrator’s responsibilities and relationship to the Commission. VI. Procedural Matters 43. Regulatory Flexibility Act. The Regulatory Flexibility Act of 1980, as amended (RFA), requires that an agency prepare a regulatory flexibility analysis for notice and comment rulemakings, unless the agency certifies that ‘‘the rule will not, if promulgated, have a significant economic impact on a substantial number of small entities.’’ Accordingly, we have prepared a Supplemental Final Regulatory Flexibility Analysis (Supplemental FRFA) concerning the possible impact of the rule changes contained in this document on small entities. The Supplemental FRFA is set forth in Appendix C the Commission’s Public Notice, DA–24–900, released September 10, at this link: https://docs.fcc.gov/ public/attachments/DA-24-900A1.pdf. 44. Paperwork Reduction Act. This document contains modified information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104–13. It will be submitted to the Office of Management and Budget (OMB) for review under Section 3507(d) of the PRA. OMB, the general public, and other Federal agencies will be invited to comment on the new or modified information collection requirements contained in this proceeding. In addition, we note that pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107–198, see 44 U.S.C. 3506(c)(4), we previously sought VerDate Sep<11>2014 18:15 Oct 18, 2024 Jkt 265001 specific comment on how the Commission might further reduce the information collection burden for small business concerns with fewer than 25 employees. 45. In this present document, we have assessed the effects of requiring CLAs to develop and implement a cybersecurity risk management plan identifying the cyber risks that the entity faces, the controls used to mitigate those risks, and the steps taken to ensure that these controls are applied effectively to their operations. The plans must also describe how the CLA employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of its information and information systems and find that Since applying to be a CLA is voluntary, small entities who do not apply to be a CLA will not be subject to any new or modified reporting, recordkeeping, or other compliance obligations. Small entities that choose to apply to be a CLA, and whose applications are approved by the Bureau, will incur recordkeeping and reporting as well as other obligations to comply with the requirements we adopt in this document. We find that, for the FCC’s IoT Labeling Program to have meaning for consumers, CLA requirements must be uniform for both small businesses and other entities. Thus, significance of program integrity, and building confidence among consumers that devices and products containing the Cyber Trust Mark label can be trusted to be cyber secure, necessitates adherence by all entities participating in the IoT Labeling Program to the same rules regardless of size. VII. Ordering Clauses 46. Accordingly, it is ordered that pursuant to the authority contained in sections 1, 2, 4(i), 4(n), 302, 303(r), 312, 333, and 503 of the Communications Act of 1934, as amended, this document is hereby adopted. 47. It is further ordered that the amendments of the Commission’s Rules as set forth in Appendix B are adopted, effective 30 days after publication in the Federal Register, except for the amendment to 47 CFR 8.220(f)(14). The amendment to 47 CFR 8.220(f)(14), which may contain modified information collection requirements, will not become effective until OMB completes any review that the Public Safety and Homeland Security Bureau determines is required under the Paperwork Reduction Act. The Public Safety and Homeland Security Bureau will announce effective dates for this section by publication in the Federal PO 00000 Frm 00031 Fmt 4700 Sfmt 4700 84095 Register and by subsequent Public Notice. 48. It is further ordered that the Commission’s Office of the Secretary shall send a copy of this document, including the Supplemental Final Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. 49. It is further ordered that the Office of the Managing Director, Performance Program Management, shall send a copy of this document in a report to be sent to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). List of Subjects in 47 CFR Part 8 Communications, Consumer protection, Cybersecurity, Electronic products, Internet, Labeling, Product testing and certification, Telecommunications. Federal Communications Commission. Marlene Dortch, Secretary. Final Rule For the reasons set forth above, part 8 of title 47 of the Code of Federal Regulations is amended as follows: PART 8—SAFEGUARDING AND SECURING THE INTERNET 1. The authority citation for part 8 continues to read as follows: ■ Authority: 47 U.S.C. 151, 152, 153, 154, 163, 201, 202, 206, 207, 208, 209, 216, 217, 257, 301, 302a, 303, 304, 307, 309, 312, 316, 332, 403, 501, 503, 522, 1302, 1753. Subpart B—Cybersecurity Labeling Program for IoT Products 2. Amend § 8.220 by adding paragraphs (f)(12) and (13) to read as follows: ■ § 8.220 Requirements for CLAs. * * * * * (f) * * * (12) A CLA shall share the Lead Administrator’s expenses incurred as a result of the Lead Administrator’s performance of its duties under the FCC IoT Labeling Program. (i) The Lead Administrator expenses subject to sharing by CLAs are those expenses determined to be reasonable by the Public Safety and Homeland Security Bureau and the Office of Managing Director. (ii) A CLA shall share Lead Administrator expenses pursuant to a methodology agreed to by the CLAs and the Lead Administrator subject to ongoing oversight by the Commission. E:\FR\FM\21OCR1.SGM 21OCR1 84096 Federal Register / Vol. 89, No. 203 / Monday, October 21, 2024 / Rules and Regulations (13) A CLA shall maintain the confidentiality of non-public information received as part of an application for authority to use the FCC IoT Label, and will implement appropriate administrative, technical, procedural, and physical safeguards to protect the confidentiality of information received by the CLA and protect against the unauthorized disclosure and unauthorized use of nonpublic information received as a result of its participation in the FCC IoT Labeling Program. * * * * * ■ 3. Delayed indefinitely, amend § 8.220 by adding paragraph (f)(14) to read as follows: § 8.220 Requirements for CLAs. * * * * * (f) * * * (14) A CLA shall create, update, and implement a cybersecurity risk management plan identifying the cyber risks that the entity faces, the controls used to mitigate those risks, and the steps taken to ensure that these controls are applied effectively to their operations. The plan must also describe how the CLA employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of its information and information systems. The CLA’s cybersecurity risk management plan must be available to the Commission upon request. * * * * * ■ 4. Amend § 8.221 by adding paragraphs (a)(11) through (14) to read as follows: lotter on DSK11XQN23PROD with RULES1 (a) * * * (11) Create, update, and implement a cybersecurity risk management plan identifying the cyber risks that the entity faces, the controls used to mitigate those risks, and the steps taken to ensure that these controls are applied effectively to their operations. The plan must also describe how the Lead Administrator employs its organizational resources and processes to ensure the confidentiality, integrity, and availability of its information and information systems. The Lead Administrator’s cybersecurity risk management plan must be available to the Commission upon request; (12) Submit to the Public Safety and Homeland Security Bureau and the Office of the Managing Director, an estimate of its forward-looking costs including, separately, program stand-up costs and ongoing program costs to 18:15 Oct 18, 2024 Jkt 265001 [FR Doc. 2024–23844 Filed 10–18–24; 8:45 am] BILLING CODE 6712–01–P FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 22–405; FCC 24–105; FR ID 250466] Rules for FM Terrestrial Digital Audio Broadcasting Systems CFR 73.404 and 73.406 in the Federal Register. FOR FURTHER INFORMATION CONTACT: Albert Shuldiner, Chief, Media Bureau, Audio Division, (202) 418–2721, Albert.Shuldiner@fcc.gov; Thomas Nessinger, Senior Counsel, Media Bureau, Audio Division, (202) 418– 2709, Thomas.Nessinger@fcc.gov. For additional information concerning the Paperwork Reduction Act (PRA) information collection requirements contained in this document, contact Cathy Williams at (202) 418–2918, Cathy.Williams@fcc.gov. This is a summary of the Commission’s First Report and Order (First R&O), MB Docket No. 22–405; FCC 24–105, adopted on September 24, 2024, and released on September 25, 2024. The full text of this document will be available via the FCC’s Electronic Comment Filing System (ECFS), https:// www.fcc.gov/cgb/ecfs/. Documents will be available electronically in ASCII, Microsoft Word, and/or Adobe Acrobat. Alternative formats are available for people with disabilities (braille, large print, electronic files, audio format), by sending an email to fcc504@fcc.gov or calling the Commission’s Consumer and Governmental Affairs Bureau at (202) 418–0530 (voice), (202) 418–0432 (TTY). SUPPLEMENTARY INFORMATION: AGENCY: Paperwork Reduction Act of 1995 Analysis In this document, the Federal Communications Commission (Commission) adopts rules to allow digital FM broadcast radio stations to operate with different power levels on the upper and lower digital sidebands, by notification to the Commission. The rule changes will facilitate greater digital FM radio coverage without interfering with adjacent-channel FM broadcast stations. The intended effect is to advance the broader adoption of digital FM broadcasting by authorizing digital FM broadcasters to implement such asymmetric sideband operation by simple notification to the Commission, rather than by requesting experimental authorization as is the current practice. DATES: This final rule is effective November 20, 2024, except for the amendments in instruction 4 (47 CFR 74.404) and instruction 5 (47 CFR 74.406), which are delayed indefinitely. The Commission will announce the effective date of the rule changes to 47 This document may contain new or modified information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104–13. All such new or modified information collections will be submitted to the Office of Management and Budget (OMB) for review under section 3507(d) of the PRA, 44 U.S.C. 3507(d). OMB, the general public, and other Federal agencies are invited to comment on any new or modified information collection requirements contained in this proceeding. In addition, we note that pursuant to the Small Business Paperwork Relief Act of 2002 (Pub. L. 107–198, 116 Stat 729 (2002) (codified at 44 U.S.C. 3506(c)(4)). the Commission previously sought specific comment on how it might further reduce the information collection burden for small business concerns with fewer than 25 employees. In the First R&O, the Commission assessed the effects of the required collection of information on these small entities. Federal Communications Commission. ACTION: Final rule. SUMMARY: § 8.221 Requirements for the Lead Administrator. VerDate Sep<11>2014 perform the Lead Administrator duties for the Lead Administrator’s upcoming calendar year, which will be reviewed by the Cybersecurity Labeling Administrators, Public Safety and Homeland Security Bureau, and the Office of the Managing Director for reasonableness, and if reasonable, will be used to estimate the overall CLA cost sharing obligation; (13) Implement internal controls adequate to ensure its operations maintain best practices to protect against improper payments and to prevent fraud, waste, and abuse in its handling of funds; and (14) Submit to the Public Safety and Homeland Security Bureau and the Office of the Managing Director, an annual, independently audited, statement of program expenditures and monies received from the CLAs due before the end of the Lead Administrator’s calendar year. * * * * * PO 00000 Frm 00032 Fmt 4700 Sfmt 4700 E:\FR\FM\21OCR1.SGM 21OCR1

Agencies

[Federal Register Volume 89, Number 203 (Monday, October 21, 2024)]
[Rules and Regulations]
[Pages 84086-84096]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2024-23844]


=======================================================================
-----------------------------------------------------------------------

FEDERAL COMMUNICATIONS COMMISSION

47 CFR Part 8

[PS Docket Nos. 23-239; FR ID 250049]


Public Safety and Homeland Security Bureau Announces 15-Business 
Day Filing Window for Cybersecurity Labeling Administrator and Lead 
Administrator Applications

AGENCY: Federal Communications Commission.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: In this document, the Federal Communications Commission's (FCC 
or Commission) Public Safety and Homeland Security Bureau (PSHSB or 
Bureau) announces a 15-business day filing window for applications from 
entities seeking designation as a Cybersecurity Labeling Administrator 
(CLA) and Lead Administrator and also adopt additional requirements for 
CLA and Lead Administrator applications as well as responsibilities 
that must be met by the selected Lead Administrator and CLAs. These 
requirements will provide additional guidance to administrator 
applicants and further implements the Commission's IoT labeling 
program.

DATES: 
    Effective date: November 20, 2024, except for amendment 3 (47 CFR 
8.220(f)(14)) which is delayed indefinitely until the Office of 
Management and Budget has completed review under the Paperwork 
Reduction Act. The Commission will publish a document in the Federal 
Register announcing that effective date.
    Comments due date: Written comments on the Paperwork Reduction Act 
information collection requirements must be submitted by the public, 
Office of Management and Budget (OMB), and other interested parties on 
or before December 20, 2024.

ADDRESSES: 
     All hand-delivered or messenger-delivered paper filings: 
Office of the Secretary, Federal Communications Commission, 9050 
Junction Drive, Annapolis Junction, MD 20701.
     Commercial overnight deliveries (other than U.S. Postal 
Service Express Mail and Priority Mail): Office of the

[[Page 84087]]

Secretary, Federal Communications Commission, 9050 Junction Drive, 
Annapolis Junction, MD 20701.
     U.S. Postal Service First-Class, Express, and Priority 
mail: Office of the Secretary, Federal Communications Commission, 45 L 
Street NE, Washington, DC 20554.
     People with Disabilities. To request materials in 
accessible formats for people with disabilities (braille, large print, 
electronic files, audio format), send an email to [email protected] or 
call the Consumer & Governmental Affairs Bureau at 202-418-0530 
(voice), 202-418-0432 (TTY).

FOR FURTHER INFORMATION CONTACT: Tara Shostek, Attorney Advisor, 
Cybersecurity and Communications Reliability Division, Public Safety 
and Homeland Security Bureau, (202) 418-8130, or by email to 
[email protected].
    For additional information concerning the Paperwork Reduction Act 
information collection requirements contained in this document, contact 
Nicole Ongele, Office of Managing Director, Performance & Program 
Management, 202-418-2991, or by email to [email protected].

SUPPLEMENTARY INFORMATION: This is a summary of the Commission's 
document in PS Docket No. 23-239, released September 10, 2024. The full 
text of this document is available by downloading the text from the 
Commission's website at: https://docs.fcc.gov/public/attachments/DA-24-900A1.pdf.
    The Commission has determined, and the Administrator of the Office 
of Information and Regulatory Affairs, Office of Management and Budget, 
concurs, that this rule is ``non-major'' under the Congressional Review 
Act, 5 U.S.C. 804(2). The Commission will send a copy of this Report & 
Order to Congress and the Government Accountability Office pursuant to 
5 U.S.C. 801(a)(1)(A).

Synopsis

    1. By this document, the Federal Communications Commission's (FCC 
or Commission) Public Safety and Homeland Security Bureau (Bureau) 
announces a 15-business day filing window for applications from 
entities seeking designation by the Commission as a Cybersecurity 
Labeling Administrator (CLA) and Lead Administrator.\1\ The Bureau also 
provides determinations regarding application format, filing fees, 
selection criteria, sharing of expenses, Lead Administrator neutrality, 
and confidentiality and security requirements in this document.
---------------------------------------------------------------------------

    \1\ While the Bureau may open additional filing windows at later 
dates, the Bureau will not accept applications for this initial 
round of applications that are filed after this filing window 
closes. However, applicants requiring additional time may, in 
accordance with Sec.  1.46 of the Commission's rules, request an 
extension of time for up to 10 additional calendar days to complete 
their applications.
---------------------------------------------------------------------------

I. Background

    2. In March 2024, the Commission established a framework for a 
voluntary cybersecurity labeling program for consumer wireless Internet 
of Things (IoT) products (IoT Labeling Program), which includes 
selecting third party administrators to support the program. The 
Commission delegated authority to the Bureau to open an initial filing 
window to receive applications from entities seeking authority to be 
recognized as a CLA and those seeking to be recognized as the Lead 
Administrator (see Cybersecurity Labeling for Internet of Things, 89 FR 
61242 (July 30, 2024) (IoT Labeling Order)).\2\ CLAs will be authorized 
by the Commission to certify use of the FCC IoT Label, which includes 
the U.S. government certification mark (U.S. Cyber Trust Mark), by 
manufacturers whose products are found to be in compliance with the 
Commission's IoT cybersecurity labeling program rules. The Lead 
Administrator will, among other duties, act as liaison between the 
Commission and CLAs, conduct stakeholder outreach to identify and/or 
develop and recommend to the Bureau technical standards and testing 
procedures for at least one class of IoT products, and in collaboration 
with CLAs, the FCC, and other stakeholders, develop and execute a plan 
for a consumer education campaign.
---------------------------------------------------------------------------

    \2\ The IoT Labeling Order also delegated authority to the 
Bureau to open additional filing windows or otherwise accept 
additional applications for authority to be recognized by the Bureau 
as a CLA when and as the Bureau determines it is necessary.
---------------------------------------------------------------------------

II. CLA and Lead Administrator Applications

A. Format of CLA and Lead Administrator Applications

    3. In a public notice released in June, 2024 the Bureau proposed 
that applications be submitted in narrative format via email and sought 
comment on this tentative determination (see Public Safety and Homeland 
Security Bureau Requests Comment on Implementation of the Cybersecurity 
Labeling for Internet of Things Program, 89 FR 58312 (July 18, 2024), 
at 58313 (June 2024 IoT Labeling Public Notice)). We continue to 
believe that the information to be submitted by entities applying to be 
a CLA or Lead Administrator lends itself to a narrative discussion of 
their qualifications and adopt the narrative format proposed. While 
ioXt argues that a fillable form would better ensure uniformity among 
applications, we believe the evaluation criteria and CLA/Lead 
Administrator responsibilities in the IoT Labeling Order are specific 
enough to allow for tailored applicant responses and comparative 
evaluation by the Commission at this time. In addition, as outlined by 
the Wi-Fi Alliance, ``. . . a narrative format will better allow CLA 
applicants to describe in detail their expertise, the types of 
cybersecurity assessments in which they are involved, and how those 
activities and other qualifications will enable them to perform the CLA 
role. Because all these attributes are imperative to the performance of 
CLA responsibilities, a narrative will best allow the Commission to 
assess applicant qualifications.'' UL Solutions also supports a 
narrative-format application, noting that this format will allow 
applicants to provide the detailed information needed to support their 
applications. T[Uuml]V S[Uuml]D also commented that email is 
functional, and that a fillable form, while helpful for clarification, 
should also include a narrative text field so applicants can add 
relevant information. One commenter, ioXt, expressed concern that a 
``narrative email'' may require additional communication between staff 
and applicants to obtain all necessary information to evaluate an 
application. We note that an enumeration of the evaluation criteria, 
and additional application instructions, including a ``Frequently Asked 
Questions'' link, are also provided below in this document and will 
provide further guidance to applicants. Further, the Bureau has 
considered and anticipates that staff may need to respond to applicant 
questions during the application review process and has designated 
staff for that purpose below.
    4. Entities applying to be a CLA or the Lead Administrator must 
file a narrative explanation of their qualifications to the Office of 
the Secretary.\3\ Consistent with the record, we determine that CLA and 
Lead Administrator applications and supporting documentation shall be 
treated as presumptively confidential. Each page of the application 
must be clearly and conspicuously labeled

[[Page 84088]]

``CONFIDENTIAL, NOT FOR PUBLIC INSPECTION.'' As we expect applications 
will contain commercially sensitive and proprietary information that 
the Commission routinely treats as confidential, applications shall 
remain presumptively confidential, regardless of disposition of the 
application. We decline to publish applications as a matter of course, 
including for those entities selected as CLAs or the Lead 
Administrator. We disagree with commenters who argue that the value of 
understanding CLA methodologies outweighs confidentiality protections, 
as Commission evaluators will still have the opportunity to review the 
applicant's testing methodologies submitted to the agency. Maintaining 
the presumptive confidentiality of CLA and Lead Administrator 
applications, including those applications that are approved by the 
Bureau, will provide applicants with assurances that the commercially 
sensitive business information they submit in conjunction with their 
voluntary participation in the FCC's Program will not be publicly 
disclosed.\4\ We believe maintaining the presumptive confidentiality of 
these applications will encourage additional entities to submit 
applications for these voluntary roles. Thus, in announcing the 
entities selected as CLAs and Lead Administrator, we only plan to make 
public the entity's name and their contact information.
---------------------------------------------------------------------------

    \3\ As stated in the 2024 IoT Labeling Public Notice, the Bureau 
may re-evaluate the need for a fillable form and seek additional 
comment on this issue after this CLA application filing window 
closes.
    \4\ As NCTA's comments recognize, to the extent that Commission 
records ``would be subject to disclosure under the Freedom of 
Information Act,'' the Commission would have an obligation to make 
that available in accordance with that law and the Commission's 
implementing rules. NCTA Comments at 9. See also, e.g., 47 CFR 
0.461.
---------------------------------------------------------------------------

    5. While the Bureau will review the narrative applications received 
via email, we seek to leverage existing procedures, including records 
management, by building on a framework for the filing of confidential 
materials that the Commission has used in the past. Consistent with 
that historical approach, applicants must file the application and 
supporting materials with the Office of the Secretary either via hand 
or messenger delivery, by commercial overnight courier, or First-Class 
or overnight U.S. Postal Service mail. A copy must be sent to the 
Bureau via email as a password protected .pdf file to 
[email protected]. Additional instructions on submitting 
applications are provided below.

B. FCC Filing Fees for CLA and Lead Administrator Applications

    6. In the June 2024 IoT Labeling Public Notice, the Bureau sought 
comment on whether a filing with the Commission by an entity that is 
seeking to be a CLA or Lead Administrator constitutes an application 
under section 8 of the Communications Act, and if so, whether an 
existing FCC fee category would cover such applications or if a new 
application fee category should be established. In addition, the Bureau 
sought comment on what fee the Commission should charge in connection 
with such a filing, if applicable. Commenters do not opine on whether 
it is appropriate to charge application fees. The Association of Home 
Appliance Manufacturers (AHAM), however, explains that if fees are 
charged, they ``should not be cost prohibitive to the point where it 
unnecessarily limits those entities that wish to apply.'' T[Uuml]V 
S[Uuml]D does not comment on whether a fee should be assessed, but does 
indicate that if a fee is assessed, the Commission should set a new fee 
category.
    7. In this instance, our IoT Labeling Program derives in part from 
our authority to hold and utilize a registered certification mark. In 
reviewing applications to be a CLA or Lead Administrator, we therefore 
are not acting solely under our Communications Act authority, but also 
to protect our registered certification mark. Given this dual role, at 
this time, we do not believe that the nature of our review of the 
applications is such that they should be subject to an application 
fee.\5\ We recognize that the process for applying to be a CLA or Lead 
Administrator may evolve with time. As such, we do not wholly foreclose 
adopting application fees in the future. Given these facts coupled with 
the lack of support in the record, the Bureau will not assess FCC 
application fees on CLA and Lead Administrator applications at this 
time.
---------------------------------------------------------------------------

    \5\ The decision in section II.B of this document is made in 
conjunction with the Office of Managing Director (OMD).
---------------------------------------------------------------------------

C. Bureau Selection of Cybersecurity Label Administrators and the Lead 
Administrator

    8. The Bureau declines to expand the CLA and Lead Administrator 
selection criteria beyond what is set out in the IoT Labeling Order. In 
the June 2024 IoT Public Notice, the Bureau sought comment on whether 
there are additional areas of expertise or specific requirements a CLA 
applicant should be required to demonstrate in addition to those listed 
in the Order. The Bureau also asked what additional criteria, if any, 
the Bureau should take into consideration during the Lead Administrator 
selection process, as well as safeguards the Bureau might adopt to 
ensure the stakeholder process remains competitively neutral and 
whether all selection criteria should be weighted the same.
    9. NCTA suggests that ``when selecting a Lead Administrator, the 
Bureau should consider candidates' ability to maintain the Program's 
integrity when translating the substantive technical security 
requirements into recommended standards and test procedures, and do so 
without creating unnecessary deterrents for manufacturer participation 
in the Program.'' We agree that a Lead Administrator's maintenance of 
the Program's integrity during the 90-day stakeholder process and 
resulting recommendations is very important to the success of the 
Program. However, the Bureau finds that the criteria outlined in the 
IoT Labeling Order are sufficient to ensure the selected Lead 
Administrator has the technical experience and the high integrity 
expected of an entity supporting an FCC program. This position is 
supported by UL Solutions, which states the ``[IoT Labeling Order] did 
not neglect any important considerations for assessing the 
qualifications of organizations to serve as CLAs or as the Lead 
Administrator.'' We believe that the public/private partnership and 
close collaboration between industry and other stakeholders 
contemplated in the IoT Labeling Order, along with the Commission's 
oversight, will ensure that there are adequate guardrails to maintain 
the Program's integrity in this regard.
    10. NCTA also encourages the Bureau to evaluate Lead Administrator 
applications for their ability to avoid conflicts of interest, 
including any relationships the Lead Administrator applicant may have 
that could create the appearance of impropriety or a conflict of 
interest, such as complaints from manufacturers, and suggests 
evaluating whether Lead Administrator applicants have the financial 
resources to avoid such conflicts going forward. We disagree that it is 
necessary to take additional measures when evaluating applications for 
this purpose. Existing application criteria require an applicant to 
describe their organization structure, including an explanation of how 
it will avoid personal and organizational conflict when processing 
applications, and demonstrate implementation of controls to eliminate 
actual or potential conflicts of interests (both personal and 
organizational), to remain impartial and unbiased. In addition, the 
Future of

[[Page 84089]]

Privacy Forum urges the Bureau to ``consider requiring program 
administrators to possess relevant privacy expertise as well as 
cybersecurity expertise.'' We agree that privacy is an integral aspect 
of cybersecurity, and note that existing application criteria require 
applicants to possess both privacy and cybersecurity expertise, 
including demonstrated expert knowledge of the National Institute of 
Standards and Technology (NIST) cybersecurity guidance and recommended 
criteria and labeling program approaches, which include privacy among 
their core cybersecurity capabilities.
    11. We also note that the Wi-Fi Alliance recommends that in 
addition to demonstrating their ``[e]xpert knowledge of FCC rules and 
procedures associated with product compliance testing and 
certification,'' CLA applicants also demonstrate their experience in 
this area. Wi-Fi Alliance recognizes that while a lack of current 
experience with developing and implementing security standards should 
not be disqualifying, it would serve the public interest for the Bureau 
to include this ``additional requirement, particularly concerning 
specific IoT products where cybersecurity standards have already been 
developed and tested.'' The Wi-Fi Alliance encourages the Bureau to 
give a preference to CLA applicants with this experience. The Bureau 
declines to require applicants to demonstrate previous experience with 
FCC rules and procedures associated with product compliance testing and 
certification as a condition precedent to being an approved CLA or give 
preference to CLA applicants with this experience. In particular, 
applicants are always encouraged to provide any additional information 
that helps demonstrate their expertise or experience under the relevant 
criteria and, providing examples of an applicant's experience where 
applicable, in general, will provide more information from which the 
Bureau can evaluate an application. Additionally, CTIA proposes 
criteria for evaluating CLA applications to include a minimum of 5-10 
years of experience managing a cyber certification program and proven 
experience in running or participating in a working group on 
cybersecurity standards. While we agree that this set of criteria can 
be useful to demonstrate a ``proven track record,'' we are concerned 
that requiring such specific criteria may unnecessarily exclude 
applicants that otherwise may have appropriate knowledge and expertise. 
Therefore, we decline to adopt this recommendation.
    12. We conclude that we will maintain the criteria as set out in 
the IoT Labeling Order for the initial round of CLA and Lead 
Administrator applications. The Bureau, jointly with OMD and, to the 
extent necessary, Office of General Counsel, will receive and review 
administrators' applications for compliance with each criteria set 
forth in the IoT Labeling Order and to best ensure the success of the 
program. We note that UL Solutions recommends certain requirements be 
defined in greater detail to avoid subjective determinations, but we 
believe that the IoT Labeling Order provided a comprehensive list of 
required criteria that covers the breadth of expertise and capabilities 
necessary to select a CLA and Lead Administrator at this early stage of 
the program and is neutral toward applicants. Further, as noted above, 
applicants are not limited to providing the required criteria listed in 
the IoT Labeling Order, but have the flexibility to offer additional 
expertise or selection criteria they believe are pertinent and support 
their application (e.g., expected costs/budget for Lead Administrator 
to carry out their responsibilities, information to support their 
ability to carry out the respective responsibilities, etc.). Should the 
Bureau conclude that it would be appropriate to open subsequent filing 
windows, we may seek comment on, and consider adoption of, additional 
selection criteria at that time.
    13. As discussed in the IoT Labeling Order, authorizing one or more 
CLAs subject to Commission oversight to handle the routine 
administration of the program will help to ensure its timely and 
consistent rollout, and independent third-party CLAs will bring trust, 
consistency, and an impartial level playing field to the IoT Labeling 
Program and will provide the required expertise for the administration 
of the program. Leveraging the expertise of multiple existing program 
managers and using pre-existing systems and processes that meet our 
program specifications will minimize administrative delay and ensure 
the Commission effectively utilizes the expertise of those entities who 
have made investments in their own cybersecurity labeling programs. 
Entities that have experience working with manufacturers and IoT 
conformity and standards testing, as required in the criteria adopted 
in the IoT Labeling Order, will also best be able to promote an 
efficient and timely rollout of the IoT Labeling Program.
    14. We disagree with CTIA's suggestion that the Bureau adopt a 
flexible approach with respect to International Organization for 
Standardization/International Electrotechnical Commission (ISO/IEC) 
17065 accreditation requirements for CLAs with a certain level of 
experience to avoid unnecessary costs and delays. CTIA posits that 
``[accreditation] can be costly and time-consuming to obtain and is 
unnecessary for prospective CLAs that have demonstrated track records 
in managing similar certification programs.'' Instead, CTIA proposes 
for entities with at least 5-10 years of experience running 
certification programs, ISO/IEC 17065 accreditation should be optional. 
In contrast, A2LA submits that the ``ISO/IEC 17065 accreditation 
requirement will be of benefit to the FCC and the consumers it serves 
by providing necessary risk mitigation . . . Claiming a certain number 
of years' experience is not equivalent to demonstrating technical 
competence or compliance.'' The IoT Labeling Order and accompanying 
rules require that all CLAs obtain ISO/IEC 17065 accreditation to the 
Commission's scope within six months of the effective date of the 
adopted standards and testing procedures. The Commission previously 
determined that ``leveraging accredited industry bodies to perform 
conformity assessments will `speed the establishment of the program and 
increase the program's ultimate quality.' '' As such, we decline to 
adopt CTIA's suggested exemption. Alternatively, CTIA recommends an 18-
month grace period to obtain such accreditation, for entities that have 
a proven track record of successfully managing a certification program. 
The Commission recognized it would take time for selected CLAs to 
obtain ISO/IEC 17065 accreditation and for that reason found it 
appropriate to conditionally approve CLAs and allow an additional six 
months for selected administrators to obtain accreditation. While we 
decline to adopt a blanket 18-month grace period, we are mindful that 
some entities may require more than six months to obtain accreditation. 
We think the Commission's existing rule waiver procedure is an 
appropriate and sufficient vehicle for CLAs that cannot meet the 
accreditation deadline to request a waiver of the rule along with their 
requested extension period.
    15. We also disagree with CTA's suggestion that conditional 
approval of CLA applications will allow CLAs to certify products to use 
the FCC IoT Label before obtaining ISO/IEC 17065 accreditation to the 
Commission's

[[Page 84090]]

scope.\6\ The Commission indicated that CLA applications will be 
conditionally approved in order to expedite initial deployment of the 
FCC's program. However, CLAs that have not demonstrated that they have 
received ISO/IEC 17065 accreditation to the Commission's scope will not 
be recognized and approved by the Bureau to receive applications or 
otherwise approved to authorize use the FCC IoT Label.
---------------------------------------------------------------------------

    \6\ CTA also recommends the Bureau similarly conditionally 
approve CyberLABs to begin testing products before they become 
accredited and provide CyberLABs a 6-month grace period to obtain 
accreditation, which the Bureau declines to do. CyberLABs are not 
authorized by the Commission to begin testing products for 
compliance with the IoT Labeling Program until after they have 
obtained the appropriate accreditation to the Commission's scope and 
have been recognized by the Lead Administrator.
---------------------------------------------------------------------------

    16. It is premature for the Bureau to address the specific scope of 
the Commission's accreditation program as the standards and testing 
procedures have not yet been adopted. However, we emphasize that each 
CLA will be required to obtain ISO/IEC 17065 accreditation to the FCC 
scope before it will be recognized by the Commission as an entity 
authorized to certify a product as being compliant with FCC IoT 
Labeling Program rules and authorize use of the FCC IoT Label 
consistent with the IoT Labeling Order.

D. Lead Administrator Expenses Shared Among CLAs

    17. The June 2024 IoT Labeling Public Notice sought recommendations 
for an effective mechanism for CLAs to share the Lead Administrator's 
expenses. Parties are generally in agreement that Lead Administrator 
startup costs will be higher than the Lead Administrator's ongoing 
costs once the program is stood up and should be reflected in the CLA's 
cost sharing obligations. UL Solutions recommends an initial standup 
fee for the Lead Administrator and a per-certificate fee going forward. 
The Wi-Fi Alliance recommends the Lead Administrator submit to the 
Bureau a claim for expenses incurred in the performance of its duties, 
which if approved, would be shared proportionally among the CLAs, with 
the proportionality being based on the annual number of products the 
CLA certifies to use the FCC IoT Label. The Wi-Fi Alliance notes that 
Lead Administrator expenses subject to sharing by the CLAs should be 
limited to those ``that are unique to the Lead Administrator as Lead 
Administrator,'' and not related to its activities as a CLA.
    18. The Bureau recognizes that the Lead Administrator's expenses 
incurred as a result of the performance of its duties under this 
program must be reasonable and accurately reflect its actual costs. In 
addition, it is also important to ensure each CLA shares in the Lead 
Administrator's costs as required by the IoT Labeling Order and that 
the costs shared reflect the Lead Administrator's actual and reasonable 
expenses incurred as a result of performance of its Lead Administrator 
duties and only those expenses incurred in its capacity as Lead 
Administrator. To ensure this occurs, the Lead Administrator is 
required to implement internal controls adequate to ensure its 
operations maintain best practices to protect against improper payments 
and to prevent fraud, waste, and abuse in its handling of funds. Once 
selected, the Lead Administrator will also submit to the Bureau and 
OMD, an estimate of its forward-looking costs including, separately, 
program stand-up costs and ongoing program costs to perform the Lead 
Administrator duties for the Lead Administrator's upcoming calendar 
year, which will be reviewed by CLAs, PSHSB, and OMD for 
reasonableness, and if determined to be reasonable by PSHSB and OMD, 
will be used to estimate the overall CLA cost sharing obligation.\7\
---------------------------------------------------------------------------

    \7\ CTIA, and others, point out the need for federal funding to 
support core aspects of the program, such as consumer education. 
NCTA argues the Federal government should lead the consumer 
education campaign, which would reduce the burden on the Lead 
Administrator and CLAs. However, both of these recommendations are 
beyond the Bureau's delegation of authority and the scope of this 
document.
---------------------------------------------------------------------------

    19. Consistent with the IoT Labeling Order, each CLA will share in 
these Lead Administrator costs, however, we decline to establish the 
methodology for such cost sharing and instead rely on CLAs and the Lead 
Administrator to determine the sharing methodology, which should be 
reasonable and equitable and will be subject to ongoing oversight by 
the Commission. Further, we require the Lead Administrator to submit to 
the Bureau and OMD, an annual, independently audited, statement of 
program expenditures and monies received from the CLAs due before the 
end of the calendar year. The Bureau will provide further guidance on 
CLA cost sharing once the CLAs and the Lead Administrator have been 
selected.

E. Lead Administrator Neutrality

    20. Neutral Treatment of CLAs and Other Stakeholders. In the IoT 
Labeling Order, the Commission recognized the competitive implications 
of an entity being both the Lead Administrator and a CLA. The June 2024 
IoT Labeling Public Notice sought comment on what safeguards, if any, 
the Bureau should adopt to ensure Lead Administrator neutrality as a 
potential competitor of other CLAs. The Bureau also asked whether there 
are additional safeguards, beyond those contemplated in the IoT 
Labeling Order, the Bureau should adopt to ensure the stakeholder 
engagement process and related recommendations the Lead Administrator 
makes to the Commission (e.g., standards and testing criteria and label 
design) are consensus-based and competitively neutral.
    21. Commenters emphasize the importance of ensuring Lead 
Administrator neutrality to prevent actual, as well as perceptions of, 
unfair economic advantage by the Lead Administrator over other CLAs, 
and support adopting reasonable safeguards to do so. We share ioXt's 
concern that if the Lead Administrator gained an economic advantage by 
passing on fees to other CLAs, for example, CLAs would have to raise 
their prices, which would pass on the costs to the manufacturers, and 
then on to consumers. In order to ensure impartiality, A2LA recommends 
considering ISO/IEC 17065 requirements, which describe a mechanism 
(often a committee) for safeguarding impartiality and assuring a 
competitively neutral environment between the Lead Administrator, CLAs, 
and other stakeholders. T[Uuml]V S[Uuml]D also recommends that Lead 
Administrator neutrality be evaluated on a yearly basis, with the 
possibility of triggering an investigation by the Commission and 
revocation of Lead Administrator designation. Infineon suggests 
requiring a ``firewall'' to separate the Lead Administrator from its 
role as CLA, similar to those instituted by law firms to avoid 
conflicts between multiple clients' interests. Somos, Inc. recommends 
applying relevant rules from its role as the North American Numbering 
Plan Administrator to the Lead Administrator, including impartial 
allocation of resources, transparency, non-discrimination, avoidance of 
conflicts of interest, and compliance with regulations.
    22. We agree that ensuring Lead Administrator neutrality ``is 
critical to maximizing the Program's credibility and fostering trust 
among stakeholders,'' and we believe the IoT Labeling Order 
sufficiently addresses the concerns raised in the record. We note that 
the requirement that the Lead Administrator be accredited to ISO/IEC 
17065 will ensure that the entity is appropriately aligned with those 
impartiality mechanisms. Further, we require all CLA applicants, 
including those

[[Page 84091]]

applying to be the Lead Administrator, to demonstrate implementation of 
controls to eliminate actual or potential conflicts of interests, 
including remaining impartial and unbiased. The Bureau will evaluate 
such applications to ensure rigorous compliance with these criteria. We 
also note that approval of the Lead Administrator may be subject to 
withdrawal by the Commission upon a determination of just cause, and 
this includes failing to follow those impartiality requirements. The 
Lead Administrator must be committed to neutrality and impartiality, 
consistent with the IoT Labeling Order. Because we anticipate those 
measures will be sufficient, we are not persuaded of the need to adopt 
additional requirements at this time.
    23. Finally, CTA proposes asking prospective CyberLABs and CLAs to 
attest that they meet the requirements in the (draft) CTA-2119 Scheme 
Assessment Framework, as an industry consensus standard to preserve 
neutrality when assessing applicant entities. We decline to adopt this 
requirement at this time, given that the draft CTA-2119 Framework has 
not undergone public notice and comment. However, we may reconsider 
this proposal at a later date, once the Labeling Program's standards 
and testing procedures have been finalized.\8\
---------------------------------------------------------------------------

    \8\ CTA also proposes applying the CTA-2119 Scheme Assessment 
Framework as a uniform way to evaluate whether a scheme recommended 
by the Lead Administrator-led working group meets the NISTIR 8425 
criteria required in the IoT Labeling Order. We similarly decline to 
adopt this proposal at this time.
---------------------------------------------------------------------------

    24. Transparency in 90-day Stakeholder Process. As an initial 
matter, we emphasize that the IoT Labeling Order requires the Lead 
Administrator to ``provide equitable recommendations to the Commission 
to encourage the broadest possible participation of CLAs within the 
parameters of the FCC's rules.'' Therefore, while we believe it is 
premature to adopt additional rules in this regard, we note that UL 
Solutions emphasizes the importance of transparency in the stakeholder 
collaboration process, stating that the Lead Administrator should 
invite a wide variety of stakeholders and ensure they all have 
sufficient opportunity to have their views heard and participate in 
manageable working groups. Further, UL Solutions states that 
recommendations made to the Commission should also include dissenting 
views and how those dissenting views were addressed, which would be 
considered in the final rules adopted by the Commission. UL Solutions 
also recommends the importance of a clear and transparent process to 
shield the Lead Administrator from accusations or perceptions of bias 
when recognizing accredited CyberLABs. T[Uuml]V S[Uuml]D similarly 
proposes safeguards, such as a mandatory consultation round before 
making critical decisions regarding recommendations to the Commission.
    25. While we do not adopt additional guardrails at this stage, we 
reiterate the position in the IoT Labeling Order that the Lead 
Administrator should ensure participation from a wide variety of 
stakeholders and consider various resources when developing the IoT 
Labeling Program recommendations. As noted above, ISO/IEC 17065 
accreditation is required for all CLAs, including the Lead 
Administrator, and adherence to that standard requires the convener of 
working groups to develop recommendations (here, the Lead 
Administrator), and achieve a balanced representation of interests, 
such that no single interest predominates. We agree that transparency 
in the 90-day stakeholder process is of the highest importance and the 
Bureau expects to provide additional guidelines on that process when it 
announces the selection of CLAs and the Lead Administrator.

F. Confidentiality and Security Requirements

    26. The Bureau adopts its proposal from the June 2024 IoT Labeling 
Public Notice that manufacturer applications submitted to CLAs are 
presumptively confidential and CLAs are required to maintain this 
confidentiality. CLAs will be required to maintain the confidentiality 
of non-public information received as part of an application for 
authority to use the FCC IoT Label, and must implement appropriate 
administrative, technical, procedural, and physical safeguards to 
protect the confidentiality of information received by the CLA and 
protect against the unauthorized disclosure and unauthorized use of 
non-public information received as a result of its participation in the 
FCC IoT Labeling Program.
    27. We agree with commenters that the program would benefit from a 
presumption of confidentiality for filings and related information 
provided to CLAs from applicants seeking use of the FCC IoT Label, 
which would encourage manufacturer participation and protect 
proprietary technology and trade secrets. We disagree with commenters 
that such a presumption of confidentiality is not necessary due to the 
public-facing nature of the label. While this is true for product 
information required to be disclosed in the registry if approval is 
granted, this would not be the case for products that are denied 
authorization to bear the FCC IoT Label. In addition, as discussed 
above, we expect that applications submitted to the Commission by CLAs 
will also continue to be treated as presumptively confidential. We 
emphasize here that information submitted by manufacturers to CLAs, the 
Lead Administrator, and/or CyberLABs, in the course of seeking 
authority to use the FCC IoT Label, including but not limited to 
applications and test reports, and information submitted to the Lead 
Administrator by a lab seeking recognition as a CyberLAB (i.e., 
authorized to conduct conformance testing under the Commission's IoT 
Labeling Program) are not agency records of the Commission. Only 
information submitted to the Commission, such as submissions in 
furtherance of applications by entities seeking authority from the 
Commission to be a CLA and/or Lead Administrator, are records of the 
Commission.
    28. In the June 2024 IoT Labeling Public Notice, the Bureau 
tentatively concluded that the requirements of the Federal Information 
Security Modernization Act of 2014 (FISMA) apply to the Lead 
Administrator and CLAs.\9\ Some commenters oppose a FISMA requirement, 
stating that it would ``strongly discourage CLAs from applying to the 
program,'' and that FISMA has not been applied by other agencies 
supporting analogous programs, such as the Health and Human Services 
Department's Office of the National Coordinator's (ONC) certification 
program for health IT products. While we acknowledge these concerns, 
alone, they are not dispositive for not applying FISMA.
---------------------------------------------------------------------------

    \9\ The June 2024 IoT Labeling Public Notice also asks whether 
``. . . the registry operator(s) [should] as appropriate, be 
required to implement adequate security, privacy, and availability 
controls to meet FISMA low/moderate standards, or a commercial 
equivalent?'' The Bureau recognizes the importance of the registry's 
security requirements, and will address these issues in a future 
Public Notice addressing the structure of the Registry's Application 
Programming Interface (API).
---------------------------------------------------------------------------

    29. FISMA was enacted to ensure that each federal agency develops, 
documents, and implements an agency-wide program to secure federal 
information systems from unauthorized access, use, disclosure, 
disruption, modification, or destruction. Given this scope, we 
reconsider our tentative conclusion to apply FISMA to CLAs and the Lead 
Administrator and determine that, as presently contemplated, neither 
the CLAs nor the Lead Administrator

[[Page 84092]]

will operate an information system on behalf of the agency. That is so 
because the Commission has no plans to establish any interconnection 
between its systems and the Lead Administrator's or CLA's information 
systems; indeed, the FCC does not expect to routinely request, obtain 
access to, otherwise collect, use, process, or maintain the data or 
information held by the Lead Administrator or the CLAs, excepting for 
investigative purposes. Moreover, although the Lead Administrator will 
receive information from CLAs and applicant manufacturers necessary for 
it to carry out its responsibilities under the FCC's program, and CLAs 
will receive and evaluate applications and supporting data from 
applicant manufacturers, this, without more, does not mean that the 
Lead Administrator or CLAs are managing their information systems ``on 
behalf of'' the FCC.
    30. Nevertheless, we agree with NCTA that ``[c]lear guidelines, 
safeguards, and protocols for handling confidential information should 
be established to prevent unauthorized disclosure'' and believe that 
other mature security frameworks may be applied to CLAs and the Lead 
Administrator to reduce the risk of unauthorized access, use, 
disclosure, disruption, modification, or destruction of program data. 
Accordingly, we require that all CLAs and the Lead Administrator 
create, update, and implement cybersecurity risk management plans. Such 
a cybersecurity risk management plan must identify the cyber risks that 
the entity faces, the controls used to mitigate those risks, and the 
steps taken to ensure that these controls are applied effectively to 
their operations. The plans must also describe how each entity employs 
its organizational resources and processes to ensure the 
confidentiality, integrity, and availability of its information and 
information systems. These requirements are consistent with the 
National Cyber Strategy and are in keeping with a whole-of-government 
effort to ``establish cybersecurity requirements to support national 
security and public safety.'' We expect that creating, updating, and 
implementing a cybersecurity risk management plan will help protect 
each CLA and the Lead Administrator from serious national security 
threats.
    31. We note that, under this approach, each entity has flexibility 
to structure its cybersecurity risk management plan in a manner that is 
tailored to its operations after consideration of a variety of factors, 
provided that the plan demonstrates that the entity is taking 
affirmative steps to analyze security risks and improve its security 
posture. We further note that an entity could successfully demonstrate 
satisfaction with this requirement by following an established risk 
management framework, such as the NIST Cybersecurity Framework (CSF) or 
Risk Management Framework (RMF). CLAs and the Lead Administrator 
security plans should be informed by established cybersecurity best 
practices such as the standards and controls set forth in the 
Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity 
Cross-sector Performance Goals and Objectives (CISA CPGs), ISO/IEC 
27001, NIST Special Publication 800-53 (rev 5), or the Center for 
Internet Security Critical Security Controls (CIS Controls) version 7.1 
or later. These frameworks are designed to be scalable and adaptable to 
the needs and capabilities of companies both large and small, are well 
understood by industry, and are flexible. CTIA and CTA argue compliance 
with a commercial equivalent framework to FISMA, such as ISO 27001 can 
``take a year or more at a cost upwards of $100,000.'' However, these 
cost and timelines would not apply to this program, because while we 
require entities to implement security plans reflecting standards and 
controls, such as ISO/IEC 27001, we do not specifically require a CLA 
or the Lead Administrator to be certified to ISO/IEC 27001. Moreover, 
we expect that many entities in the industry that might seek to be CLAs 
or the Lead Administrator will have adopted plans along the lines we 
require here and may have obtained such certifications in the ordinary 
course of business. And in any event, we find that any costs that might 
be incurred by an entity seeking to be a CLA or Lead Administrator are 
outweighed by the benefits that will redound to such entities 
themselves, the industry more broadly, and U.S. national security from 
our requiring such entities to take these steps to protect the 
confidentiality, integrity, and availability of the information they 
hold--including from other entities in the industry--and the 
information systems they maintain. We expect risk management plans to 
contribute to the CLAs' and the Lead Administrator's existing internal 
security practices that maintain the confidentiality, integrity, 
availability of all information received in support of this program 
without significantly increasing the time or costs of 
participation.\10\
---------------------------------------------------------------------------

    \10\ We expect CLA and Lead Administrator applicants to address 
these internal security practices in their applications to the 
Commission, which will be enforceable under the Commission's rules.
---------------------------------------------------------------------------

    32. We additionally require each applicant seeking to serve as a 
CLA or Lead Administrator to submit with its application an attestation 
that it already has created and implemented--or upon selection will 
create and implement--a cybersecurity risk management plan as described 
above--which will demonstrate compliance with these requirements as 
well as the entity's cybersecurity expertise and capabilities, 
knowledge of NIST's cybersecurity guidance, and knowledge of federal 
law and guidance governing the security and privacy of information 
systems. We also require that CLAs and the Lead Administrator make such 
cybersecurity risk management plans available to the Commission upon 
request. Access to cybersecurity risk management plans will allow the 
Commission to confirm whether plans are being regularly updated, to 
review a specific plan as needed, or to proactively review a sample of 
plans to confirm they sufficiently identify the cybersecurity risks to 
the Lead Administrator and CLAs in this program. In such circumstances, 
cybersecurity risk management plans would be presumptively 
confidential.

III. Who May Apply

    33. Any domestic, independent,\11\ non-governmental entity eligible 
to enter into a licensing agreement with the FCC may apply for the role 
of CLA and/or Lead Administrator; \12\ however, an applicant cannot be 
owned or controlled by, or affiliated with, any entity that produces 
equipment on the FCC Covered List or is otherwise prohibited from 
participating in the IoT Labeling Program, to include companies named 
on the Department of Commerce's Entity List and the Department of 
Defense's List of Chinese Military Companies.
---------------------------------------------------------------------------

    \11\ Here, ``independent'' means the applicant is not affiliated 
with or a subsidiary of another CLA/Lead Administrator applicant. It 
also means that the applicant is a disinterested third-party outside 
of a prospective manufacturer's control that is applying for 
authority to use the FCC IoT Label.
    \12\ The IoT Labeling Order declined to require that a CLA be a 
non-profit, stating that a for-profit or non-profit organization 
could possess the requisite qualifications and carry out the CLA 
duties effectively. We note that Congress, from time to time, adopts 
appropriation riders that preclude federal agencies from entering 
into agreements with certain entities.
---------------------------------------------------------------------------

IV. Application Procedures

A. Applications for Cybersecurity Label Administrator (CLA)

    34. Applicants seeking the role of CLA must demonstrate the 
following:

[[Page 84093]]

    a. Applicant is not owned or controlled by or affiliated \13\ with 
any entity identified on the Commission's Covered List, or is otherwise 
prohibited from participating in the IoT Labeling Program,\14\ 
including being an entity identified on the Department of Commerce's 
Entity List or on the Department of Defense's List of Chinese Military 
Companies;
---------------------------------------------------------------------------

    \13\ For purposes of the Commission's IoT labeling program, an 
affiliate is defined as a person that (directly or indirectly) owns 
or controls, is owned or controlled by, or is under common ownership 
or control with, another person. The term own means to own an equity 
interest (or the equivalent thereof) of more than 10 percent.
    \14\ The Order includes this catchall for entities otherwise 
prohibited from participating in the program, to include those 
listed in 47 CFR 8.204 and those considered a ``foreign adversary'' 
country as defined by the Department of Commerce.
---------------------------------------------------------------------------

    b. Applicant is not owned or controlled by or affiliated with any 
person or entity that has been suspended or debarred from receiving 
federal procurements or financial awards, to include all entities and 
individuals published as ineligible for award on the General Service 
Administration's System for Award Management;
    c. Description of Applicant's organization structure; \15\
---------------------------------------------------------------------------

    \15\ In describing its organizational structure, an Applicant 
may describe its relevant expertise, processes, and key personnel 
that would support the CLA IoT Labeling Program requirements and 
responsibilities.
---------------------------------------------------------------------------

    d. Implementation of controls to eliminate actual or potential 
conflicts of interests (both personal and organizational), particularly 
with regard to commercially sensitive information, to include but not 
limited to, remaining impartial and unbiased and prevent Applicant from 
giving preferential treatment to certain applications particularly with 
regard to applicants from entities with whom the CLA has a business 
relationship (e.g., application line jumping or same level of scrutiny 
when reviewing the application) and from implementing heightened 
scrutiny of applications from entities not members or otherwise aligned 
with the CLA; \16\
---------------------------------------------------------------------------

    \16\ In addition to demonstrating the relevant controls in place 
to avoid conflicts of interest, Applicants may also provide prior 
experience in avoiding personal and organizational conflict (e.g., 
history of, processes for, working with, certification labs on an 
equitable basis.
---------------------------------------------------------------------------

    e. Description of the process(es) Applicant will use to evaluate 
applications seeking authority to use the FCC IoT Label; \17\
---------------------------------------------------------------------------

    \17\ Applicants may describe existing data systems, personnel 
and other resources, processes (e.g., record-keeping etc.) in place 
or to be developed, for reviewing, accepting or denying applications 
to use the FCC IoT label in accordance with ISO/IEC 17065.
---------------------------------------------------------------------------

    f. Cybersecurity expertise and capabilities, in addition to 
industry knowledge of IoT generally, and IoT Labeling requirements;
    g. Expert knowledge of NIST's cybersecurity guidance, including but 
not limited to NIST's recommended criteria and labeling program 
approaches for cybersecurity labeling of consumer IoT products;
    h. Expert knowledge of FCC rules and procedures associated with 
product compliance testing and certification; \18\
---------------------------------------------------------------------------

    \18\ For example, Applicants may describe their experience with 
the FCC's Equipment Authorization Program or another FCC-run 
compliance program.
---------------------------------------------------------------------------

    i. Knowledge of Federal law and guidance governing the security and 
privacy of agency information systems; and
    j. The ability to securely handle large volumes of information, 
including a description of Applicant's related internal security 
practices.
    35. Applicants seeking the role of CLA must also commit to 
complying with the obligations of CLAs under the IoT Labeling Order and 
the Commission's rules, including but not limited to the following: 
\19\
---------------------------------------------------------------------------

    \19\ CLAs must also comply with all requirements enumerated in 
47 CFR 8.220.
---------------------------------------------------------------------------

    a. Obtaining accreditation pursuant to all of the requirements 
associated with ISO/IEC 17065 with the forthcoming FCC program scope; 
\20\
---------------------------------------------------------------------------

    \20\ E.g., For purposes of conditional approval, applicants may 
meet this requirement by demonstrating they are certified to ISO/IEC 
17065 under another scope. Alternatively, Applicants may outline a 
plan to receive ISO/IEC 17065 accreditation within six months of the 
effective date of the standards and testing procedures to be adopted 
under the forthcoming FCC program scope and demonstrate that their 
current or planned product testing processes align with ISO/IEC 
17065. Each CLA must obtain 17065 accreditation to the FCC scope 
before it will be recognized by the Commission and authorized to 
begin processing applications to certify use of the FCC IoT Label.
---------------------------------------------------------------------------

    b. The ability (e.g., appropriate testing equipment, and personnel 
with the necessary technical expertise and training) to conduct post-
market surveillance activities, such as audits, in accordance with ISO/
IEC 17065;
    c. Implementation of a process for receiving complaints alleging an 
IoT product does not support the cybersecurity criteria conveyed by the 
Cyber Trust Mark and referring those complaints to the Lead 
Administrator;
    d. Collaborating with the Lead Administrator and other stakeholders 
to develop those items to be submitted to the Commission within 90 days 
of election of the Lead Administrator, and listed in 47 CFR 
8.221(a)(4); and
    e. Being an active participant in the consumer education campaign 
led by and in coordination with the Lead Administrator.
    36. In addition to the above requirements for CLA applications, 
Lead Administrator applicants must demonstrate the following:
    a. Description of Applicant's previous experience in IoT 
cybersecurity; \21\
---------------------------------------------------------------------------

    \21\ Where an Applicant describes previous experience or roles 
in IoT cybersecurity or IoT labeling, it may also describe how it 
expects to apply such previous experience to meet the Lead 
Administrator responsibilities.
---------------------------------------------------------------------------

    b. Description of Applicant's previous roles, if any, in IoT 
labeling; \22\
---------------------------------------------------------------------------

    \22\ E.g., Applicant may show a history of certifying IoT 
devices to a specific set of cybersecurity requirements. 
Alternatively, Applicant may show a history of certifying non-IoT 
devices to a designated cybersecurity scope.
---------------------------------------------------------------------------

    c. Description of Applicant's capacity (e.g., available resources, 
systems, infrastructure etc.), and commitment to execute the following 
Lead Administrator duties: \23\
---------------------------------------------------------------------------

    \23\ Applicant may demonstrate relevant past experience, or 
otherwise provide a detailed plan to meet, each of the duties 
listed.
---------------------------------------------------------------------------

    i. Interfacing with the Commission on behalf of CLAs, which 
includes but is not limited to, submitting to the Bureau all complaints 
alleging a product bearing the FCC IoT Label does not meet the 
requirements of the Commission's labeling program;
    ii. Conducting stakeholder outreach, coordinating with CLAs and 
other stakeholders, and moderating stakeholder meetings;
    iii. Accepting, reviewing, and approving or denying applications 
from labs seeking recognition as a lab authorized to perform the 
conformity testing necessary to support an application for authority to 
affix the FCC IoT Label, and maintaining a publicly available list of 
Lead Administrator-recognized labs and a publicly available list of 
labs that have lost their recognition;
    iv. Within 90 days of selection as Lead Administrator, in 
collaboration with the CLAs and other stakeholders (e.g., cyber experts 
from industry, government, and academia) submitting to the Bureau:
    (a) Recommendations identifying and/or developing the technical 
standards and testing procedures for the Commission to consider with 
regard to at least one class of IoT products eligible for the IoT 
Labeling Program;
    (b) A recommendation on how often a given class of IoT products 
must renew their request for authority to bear the FCC IoT Label, which 
may be dependent on the type of product, and that such a recommendation 
be submitted in connection with the relevant standards recommendations 
for an IoT product or class of IoT products;

[[Page 84094]]

    (c) A recommendation on procedures for post market surveillance by 
the CLAs;
    (d) Recommendations on the design of the FCC IoT Label, including 
but not limited to labeling design and placement (e.g., size and white 
spaces, product packaging) and whether to include the product support 
end date on labels for certain products or category of products; and
    (e) Recommendations with regard to updates to the registry 
including whether the registry should be in additional languages, and 
if so, to recommend specific languages for inclusion.
    d. Recommending appropriate modifications to the IoT Labeling 
Program standards and testing procedures within 45 days of publication 
of updates or changes to the NIST guidelines, or adoption by NIST of 
new guidelines, to stay aligned with NIST guidelines;
    e. Developing, in collaboration with CLAs and other stakeholders, a 
consumer education campaign, submitting the consumer education plan to 
the Bureau, and participating in consumer education;
    f. Receiving complaints about the Labeling Program, including but 
not limited to consumer complaints about the registry and coordinating 
with manufacturers to resolve any technical problems associated with 
consumers accessing the information in the registry;
    g. Facilitating coordination between CLAs; and
    h. Submitting to the Commission any other reports upon request of 
the Commission or as required by Commission rule.
    i. Any additional information Applicant believes demonstrates why 
they should be designated the Lead Administrator.

C. Required Certification Statements

    37. All applications MUST include the following certification 
statements under penalty of perjury or they will be dismissed:
    a. Applicant certifies that all statements made in this application 
and in the exhibits, attachments, or documents incorporated by 
reference are material, are part of this application, and are true, 
complete, correct, and made in good faith, see 47 CFR 1.17, 8.220, 
8.221.
    b. Applicant certifies that neither the Applicant nor any other 
party to the application is subject to a denial of Federal benefits 
pursuant to Sec.  5301 of the Anti-Drug Abuse Act of 1988, 21 U.S.C. 
862, because of a conviction for possession or distribution of a 
controlled substance. See 47 CFR 1.2002(b) for the definition of 
``party to the application'' as used in this certification.
    c. The Applicant certifies that it is not delinquent on any debts 
to the Commission, see 47 CFR 1.1910.
    d. Applicant acknowledges that willful false statements made on the 
application or on any attachments are punishable by fine and/or 
imprisonment (18 U.S.C. 1001) and/or forfeiture (47 U.S.C. 503).

D. The Application Must Be Signed and Dated

    38. The Application must be signed and dated by the individual 
authorized to sign on behalf of the Applicant. FAILURE TO SIGN THE 
APPLICATION MAY RESULT IN DISMISSAL OF THE APPLICATION.

E. Application Submission

    39. The Bureau expects CLA and Lead Administrator applications and 
supporting documentation to be filed confidentially. Each page of the 
application must be clearly and conspicuously labeled ``CONFIDENTIAL, 
NOT FOR PUBLIC INSPECTION.'' Applicant must file an original and one 
copy of each filing and supporting materials with the Office of the 
Secretary. All filings must reference PS Docket No. 23-239 and be 
addressed to the Commission's Secretary, Office of the Secretary, 
Federal Communications Commission. Filings can be sent by hand or 
messenger delivery by commercial overnight courier, or First-Class or 
overnight U.S. Postal Service mail.
     All hand-delivered or messenger-delivered paper filings 
for the Commission's Secretary are accepted between 8:00 a.m. and 4:00 
p.m. at 9050 Junction Drive, Annapolis Junction, MD 20701. All hand 
deliveries must be held together with rubber bands or fasteners. Any 
envelopes and boxes must be disposed of before entering the building.
     Commercial overnight deliveries (other than U.S. Postal 
Service Express Mail and Priority Mail) must be sent to 9050 Junction 
Drive, Annapolis Junction, MD 20701.
     U.S. Postal Service First-Class, Express, and Priority 
mail must be sent to 45 L Street NE, Washington, DC 20554.
    40. An electronic version of the application and supporting 
material is required to be submitted to FCC staff as a .pdf file via 
email to [email protected]. The document must be password 
protected and the password communicated in a separate email to 
[email protected]. Submissions may be broken into multiple emails 
when necessary.
    41. Applications should be received by the Commission as soon as 
possible, but no later than October 1, 2024. Applicants requiring 
additional time may request an extension of time for up to 10 
additional calendar days to complete their applications. Applications 
received after October 1, 2024 from an entity that has not been 
approved an extension of time, will not be accepted and will be 
dismissed. Procedures for submitting applications are set forth below.

F. Additional Instructions To Assist With CLA and/or Lead Administrator 
Applications

     Instructions. General filing instructions can be found in 
Appendix A of the Commission's Public Notice, DA-24-900, released 
September 10, at this link: https://docs.fcc.gov/public/attachments/DA-24-900A1.pdf.
     Frequently Asked Questions (FAQs). The FAQs are available 
at https://www.fcc.gov/CyberTrustMark.
     FCC Notice Required by the Paperwork Reduction Act. The 
FCC Notice Required by the Paperwork Reduction Act can be found in 
Appendix D of the Commission's Public Notice, DA-24-900, released 
September 10, at this link: https://docs.fcc.gov/public/attachments/DA-24-900A1.pdf.
     Privacy Act Statement. The Privacy Act Statement can be 
found in Appendix E of the Commission's Public Notice, DA-24-900, 
released September 10, at this link: https://docs.fcc.gov/public/attachments/DA-24-900A1.pdf.
     Requirement for an FCC Registration Number (FRN). We 
remind all applicants that they must have an FRN to file their 
applications. An FRN is the 10-digit number assigned to all individuals 
and entities that transact business with the Commission, and it must be 
provided any time an applicant submits or updates their application.
     Applicant Does Not Have an FRN. If an applicant does not 
have an FRN, the applicant must obtain an FRN through the Commission 
Registration System (CORES) web page at https://apps.fcc.gov/cores/userLogin.do.
    [cir] For additional assistance, submit a help request at https://www.fcc.gov/wireless/available-support-services or call the FRN Help 
Desk at (877) 480-3201 (Monday-Friday, 8 a.m.-6 p.m. ET).
    [cir] If the applicant has further questions, an email can be sent 
to [email protected].

[[Page 84095]]

     Applicant has an FRN. If an applicant has an FRN, the 
applicant must use that FRN with its application.
    [cir] The applicant should not obtain a new FRN if Applicant 
already has an FRN.
    [cir] An applicant can identify its FRN by accessing records the 
Commission's Registration Systems (CORES) and click ``Search''. 
Individuals can search by name, or contact related information. 
Business organizations can search by name, Employer Identification 
Number (EIN), or contact-related information.

V. Next Steps

    42. After the application filing window closes October 1, 2024, the 
Bureau will review and evaluate properly filed applications. The 
Bureau's selection of CLAs and a Lead Administrator will be announced 
by public notice. The Public Notice will describe the next steps for 
selected entities, including but not limited to the execution of a 
licensing agreement and/or other appropriate documentation governing 
the details of the CLAs' and Lead Administrator's responsibilities and 
relationship to the Commission.

VI. Procedural Matters

    43. Regulatory Flexibility Act. The Regulatory Flexibility Act of 
1980, as amended (RFA), requires that an agency prepare a regulatory 
flexibility analysis for notice and comment rulemakings, unless the 
agency certifies that ``the rule will not, if promulgated, have a 
significant economic impact on a substantial number of small 
entities.'' Accordingly, we have prepared a Supplemental Final 
Regulatory Flexibility Analysis (Supplemental FRFA) concerning the 
possible impact of the rule changes contained in this document on small 
entities. The Supplemental FRFA is set forth in Appendix C the 
Commission's Public Notice, DA-24-900, released September 10, at this 
link: https://docs.fcc.gov/public/attachments/DA-24-900A1.pdf.
    44. Paperwork Reduction Act. This document contains modified 
information collection requirements subject to the Paperwork Reduction 
Act of 1995 (PRA), Public Law 104-13. It will be submitted to the 
Office of Management and Budget (OMB) for review under Section 3507(d) 
of the PRA. OMB, the general public, and other Federal agencies will be 
invited to comment on the new or modified information collection 
requirements contained in this proceeding. In addition, we note that 
pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 
107-198, see 44 U.S.C. 3506(c)(4), we previously sought specific 
comment on how the Commission might further reduce the information 
collection burden for small business concerns with fewer than 25 
employees.
    45. In this present document, we have assessed the effects of 
requiring CLAs to develop and implement a cybersecurity risk management 
plan identifying the cyber risks that the entity faces, the controls 
used to mitigate those risks, and the steps taken to ensure that these 
controls are applied effectively to their operations. The plans must 
also describe how the CLA employs its organizational resources and 
processes to ensure the confidentiality, integrity, and availability of 
its information and information systems and find that Since applying to 
be a CLA is voluntary, small entities who do not apply to be a CLA will 
not be subject to any new or modified reporting, recordkeeping, or 
other compliance obligations. Small entities that choose to apply to be 
a CLA, and whose applications are approved by the Bureau, will incur 
recordkeeping and reporting as well as other obligations to comply with 
the requirements we adopt in this document. We find that, for the FCC's 
IoT Labeling Program to have meaning for consumers, CLA requirements 
must be uniform for both small businesses and other entities. Thus, 
significance of program integrity, and building confidence among 
consumers that devices and products containing the Cyber Trust Mark 
label can be trusted to be cyber secure, necessitates adherence by all 
entities participating in the IoT Labeling Program to the same rules 
regardless of size.

VII. Ordering Clauses

    46. Accordingly, it is ordered that pursuant to the authority 
contained in sections 1, 2, 4(i), 4(n), 302, 303(r), 312, 333, and 503 
of the Communications Act of 1934, as amended, this document is hereby 
adopted.
    47. It is further ordered that the amendments of the Commission's 
Rules as set forth in Appendix B are adopted, effective 30 days after 
publication in the Federal Register, except for the amendment to 47 CFR 
8.220(f)(14). The amendment to 47 CFR 8.220(f)(14), which may contain 
modified information collection requirements, will not become effective 
until OMB completes any review that the Public Safety and Homeland 
Security Bureau determines is required under the Paperwork Reduction 
Act. The Public Safety and Homeland Security Bureau will announce 
effective dates for this section by publication in the Federal Register 
and by subsequent Public Notice.
    48. It is further ordered that the Commission's Office of the 
Secretary shall send a copy of this document, including the 
Supplemental Final Regulatory Flexibility Analysis, to the Chief 
Counsel for Advocacy of the Small Business Administration.
    49. It is further ordered that the Office of the Managing Director, 
Performance Program Management, shall send a copy of this document in a 
report to be sent to Congress and the Government Accountability Office 
pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A).

List of Subjects in 47 CFR Part 8

    Communications, Consumer protection, Cybersecurity, Electronic 
products, Internet, Labeling, Product testing and certification, 
Telecommunications.

Federal Communications Commission.
Marlene Dortch,
Secretary.

Final Rule

    For the reasons set forth above, part 8 of title 47 of the Code of 
Federal Regulations is amended as follows:

PART 8--SAFEGUARDING AND SECURING THE INTERNET

0
1. The authority citation for part 8 continues to read as follows:

    Authority:  47 U.S.C. 151, 152, 153, 154, 163, 201, 202, 206, 
207, 208, 209, 216, 217, 257, 301, 302a, 303, 304, 307, 309, 312, 
316, 332, 403, 501, 503, 522, 1302, 1753.

Subpart B--Cybersecurity Labeling Program for IoT Products

0
2. Amend Sec.  8.220 by adding paragraphs (f)(12) and (13) to read as 
follows:


Sec.  8.220  Requirements for CLAs.

* * * * *
    (f) * * *
    (12) A CLA shall share the Lead Administrator's expenses incurred 
as a result of the Lead Administrator's performance of its duties under 
the FCC IoT Labeling Program.
    (i) The Lead Administrator expenses subject to sharing by CLAs are 
those expenses determined to be reasonable by the Public Safety and 
Homeland Security Bureau and the Office of Managing Director.
    (ii) A CLA shall share Lead Administrator expenses pursuant to a 
methodology agreed to by the CLAs and the Lead Administrator subject to 
ongoing oversight by the Commission.

[[Page 84096]]

    (13) A CLA shall maintain the confidentiality of non-public 
information received as part of an application for authority to use the 
FCC IoT Label, and will implement appropriate administrative, 
technical, procedural, and physical safeguards to protect the 
confidentiality of information received by the CLA and protect against 
the unauthorized disclosure and unauthorized use of non-public 
information received as a result of its participation in the FCC IoT 
Labeling Program.
* * * * *

0
3. Delayed indefinitely, amend Sec.  8.220 by adding paragraph (f)(14) 
to read as follows:


Sec.  8.220  Requirements for CLAs.

* * * * *
    (f) * * *
    (14) A CLA shall create, update, and implement a cybersecurity risk 
management plan identifying the cyber risks that the entity faces, the 
controls used to mitigate those risks, and the steps taken to ensure 
that these controls are applied effectively to their operations. The 
plan must also describe how the CLA employs its organizational 
resources and processes to ensure the confidentiality, integrity, and 
availability of its information and information systems. The CLA's 
cybersecurity risk management plan must be available to the Commission 
upon request.
* * * * *

0
4. Amend Sec.  8.221 by adding paragraphs (a)(11) through (14) to read 
as follows:


Sec.  8.221  Requirements for the Lead Administrator.

    (a) * * *
    (11) Create, update, and implement a cybersecurity risk management 
plan identifying the cyber risks that the entity faces, the controls 
used to mitigate those risks, and the steps taken to ensure that these 
controls are applied effectively to their operations. The plan must 
also describe how the Lead Administrator employs its organizational 
resources and processes to ensure the confidentiality, integrity, and 
availability of its information and information systems. The Lead 
Administrator's cybersecurity risk management plan must be available to 
the Commission upon request;
    (12) Submit to the Public Safety and Homeland Security Bureau and 
the Office of the Managing Director, an estimate of its forward-looking 
costs including, separately, program stand-up costs and ongoing program 
costs to perform the Lead Administrator duties for the Lead 
Administrator's upcoming calendar year, which will be reviewed by the 
Cybersecurity Labeling Administrators, Public Safety and Homeland 
Security Bureau, and the Office of the Managing Director for 
reasonableness, and if reasonable, will be used to estimate the overall 
CLA cost sharing obligation;
    (13) Implement internal controls adequate to ensure its operations 
maintain best practices to protect against improper payments and to 
prevent fraud, waste, and abuse in its handling of funds; and
    (14) Submit to the Public Safety and Homeland Security Bureau and 
the Office of the Managing Director, an annual, independently audited, 
statement of program expenditures and monies received from the CLAs due 
before the end of the Lead Administrator's calendar year.
* * * * *
[FR Doc. 2024-23844 Filed 10-18-24; 8:45 am]
BILLING CODE 6712-01-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.