Critical infrastructure data sought

The private sector can voluntarily submit critical infrastructure information to the Homeland Security Department with a new program designed to protect such information.

Starting Feb. 20, the Protected Critical Infrastructure Information (PCII) program will collect sensitive data about physical and cyber infrastructure according to regulations that will be posted online Feb. 19 and published in the Federal Register the following day. Public comment on the regulations could last up to 90 days.

Robert Liscouski, DHS' assistant secretary for infrastructure protection, said by partnering with the private sector and making the program voluntary, the federal government can find vulnerabilities and nuances that the private sector knows best.

"The partnership's important to us because the government can't afford to buy the expertise that we need to understand those vulnerabilities at the nuance level if they have access to it," he said.

Fred Herr, PCII's program manager, said the private sector isn't required to submit anything to the federal government under the program. But DHS officials cited the public good as a reason why companies and nongovernment organizations might share such information voluntarily. The information will be kept confidential, because any data that passes all program requirements will be exempt from the Freedom of Information Act and cannot be accessed by third parties or state and local governments for civil litigation, officials said.

However, if companies provided false statements or submitted information they knew to be wrong, they would be subject to federal felony statutes.

Information submitted will be available initially to DHS' Information Analysis and Infrastructure Protection Directorate, where the PCII program office resides. DHS officials plan to eventually share that data with other authorized personnel in federal, state and local agencies. Officials did not describe how or when other agencies and governments could access the data, although it probably would be accessed through existing secure networks, officials said.

Officials said that data given to DHS must meet a number of requirements:

* The submitting entity must ask for protection.

* The submitter must certify that the material is voluntarily provided.

* The submitter must certify that it's not submitted in lieu of meeting a federal requirement or regulation.

* The submitter must certify that it meets the definition of critical infrastructure information specified under the Critical Infrastructure Information Act of 2002.

"If it meets all those requirements we then will label it protected infrastructure information, PCII," Herr said. "If it doesn't meet those requirements, we'll go back to the submitting entity and ask them for additional justification


  • Defense
    Ryan D. McCarthy being sworn in as Army Secretary Oct. 10, 2019. (Photo credit: Sgt. Dana Clarke/U.S. Army)

    Army wants to spend nearly $1B on cloud, data by 2025

    Army Secretary Ryan McCarthy said lack of funding or a potential delay in the JEDI cloud bid "strikes to the heart of our concern."

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

Stay Connected


Sign up for our newsletter.

I agree to this site's Privacy Policy.