{"id":6734,"date":"2020-04-06T09:34:50","date_gmt":"2020-04-06T09:34:50","guid":{"rendered":"https:\/\/journals.law.unc.edu\/jolt\/?p=6734"},"modified":"2020-09-26T19:03:24","modified_gmt":"2020-09-26T19:03:24","slug":"your-natural-gas-is-not-cyber-secure-a-two-fold-case-for-why-voluntary-natural-gas-pipeline-cybersecurity-guidelines-should-become-mandatory-regulations-overseen-by-the-department-of-energy","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/your-natural-gas-is-not-cyber-secure-a-two-fold-case-for-why-voluntary-natural-gas-pipeline-cybersecurity-guidelines-should-become-mandatory-regulations-overseen-by-the-department-of-energy\/","title":{"rendered":"YOUR NATURAL GAS IS NOT CYBER-SECURE: A TWO-FOLD CASE FOR WHY VOLUNTARY NATURAL GAS PIPELINE CYBERSECURITY GUIDELINES SHOULD BECOME MANDATORY REGULATIONS OVERSEEN BY THE DEPARTMENT OF ENERGY"},"content":{"rendered":"<a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/04\/Labovitz-Final.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\" data-mobile-width=\"500\"  data-scrollbar=\"none\" data-download=\"off\" data-tracking=\"on\" data-newwindow=\"on\" data-pagetextbox=\"off\" data-scrolltotop=\"off\" data-startzoom=\"100\" data-startfpzoom=\"100\" data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Labovitz-Final<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>In the past two decades, the United States has increased the<br>production and use of natural gas to fuel every day American life.<br>This increase has resulted in the construction of millions of miles of<br>natural gas pipelines. While this development has produced a<br>number of benefits, natural gas pipelines have introduced the threat<br>of cyberattacks on natural gas infrastructure. This substantial threat<br>is currently managed by voluntary guidelines promulgated by the<br>Transportation Security Administration (\u201cTSA\u201d). While the private<br>industry is satisfied to maintain the status quo and leave these<br>threats essentially self-regulated, voluntary guidelines are not<br>sufficient to defend against the cybersecurity threats posed to<br>natural gas pipelines. This Recent Development proposes that<br>cybersecurity standards should become mandatory and that the<br>Department of Energy, not TSA, is the proper agency to promulgate<br>mandatory cybersecurity regulations.<\/p>\n\n\n\n<p><strong>Author:\u00a0<\/strong>\u00a0Madeline A Labovitz\u00a0<\/p>\n\n\n\n<p><strong>PDF:<\/strong>&nbsp;<a href=\"http:\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/04\/Labovitz-Final.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">\/\/journals.law.unc.edu\\\/ncjolt\/wp-content\/uploads\/sites\/4\/2020\/04\/Labovitz-Final.pdf<\/a><\/p>\n\n\n\n<p><strong>Volume:<\/strong> Volume 21, Issue 3<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: In the past two decades, the United States has increased theproduction and use of natural gas to fuel every day American life.This increase has resulted in the construction of millions of miles ofnatural gas pipelines. While this development has produced anumber of benefits, natural gas pipelines have introduced the threatof cyberattacks on natural gas <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/articles\/your-natural-gas-is-not-cyber-secure-a-two-fold-case-for-why-voluntary-natural-gas-pipeline-cybersecurity-guidelines-should-become-mandatory-regulations-overseen-by-the-department-of-energy\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5,95],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6734"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=6734"}],"version-history":[{"count":4,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6734\/revisions"}],"predecessor-version":[{"id":8061,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/6734\/revisions\/8061"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=6734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=6734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=6734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}