{"id":9296,"date":"2024-09-22T23:08:00","date_gmt":"2024-09-22T23:08:00","guid":{"rendered":"https:\/\/journals.law.unc.edu\/ncjolt\/?p=9296"},"modified":"2024-09-24T13:22:18","modified_gmt":"2024-09-24T13:22:18","slug":"inheritingthesplinternet","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/inheritingthesplinternet\/","title":{"rendered":"Inheriting the Splinternet and Decoding its Cybersecurity Sector"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"682\" src=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2024\/09\/right-4926156_1280-7-1024x682.jpg\" alt=\"\" class=\"wp-image-9299\" srcset=\"https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2024\/09\/right-4926156_1280-7-1024x682.jpg 1024w, https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2024\/09\/right-4926156_1280-7-300x200.jpg 300w, https:\/\/journals.law.unc.edu\/ncjolt\/wp-content\/uploads\/sites\/4\/2024\/09\/right-4926156_1280-7.jpg 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>When he invented the Internet, <a href=\"https:\/\/www.washingtonpost.com\/news\/fact-checker\/wp\/2013\/11\/04\/a-cautionary-tale-for-politicians-al-gore-and-the-invention-of-the-internet\/\">Al Gore imagined borderless broadband<\/a> freely flowing without restriction. Okay, maybe Al Gore did not invent the Internet. But that myth sure is memorable folklore. The inconvenient truth, however, is that the Internet evolved into something different. It is now the <a href=\"https:\/\/www.internetsociety.org\/blog\/2022\/03\/what-is-the-splinternet-and-why-you-should-be-paying-attention\/\">Splinternet<\/a>: a balkanized ecosystem where the sands are continually shifting based on geopolitics, security, privacy, nationalism, and layered commercial interests. Whether readers realize it or not, we have inherited the Splinternet. And now, we must do our best to make sense of it.&nbsp;<\/p>\n\n\n\n<p>Cybersecurity is a key piece to this puzzle. <a href=\"https:\/\/www.insurancebusinessmag.com\/us\/news\/cyber\/fbi-sees-a-400-increase-in-reports-of-cyberattacks-%20since-the-start-of-the-pandemic-231939.aspx.\">Sources highlight a 400% increase in cyberattacks<\/a> when work shifted home during the COVID-19 pandemic. Then, from 2020 to 2021, <a href=\"https:\/\/blog.checkpoint.com\/security\/check-point-research-cyber-attacks-increased-50-year-over-year\/\">companies faced 50% more cyberattacks<\/a> with education, healthcare and service providers being most frequently targeted. And costs of those cyberattacks continue to rise. <a href=\"https:\/\/cybersecurityventures.com\/ransomware-report-2021\/\">Cybersecurity Ventures reported<\/a> that ransomware alone cost the worldwide economy $20 billion in 2021, up from $325 million just six years prior. The overall cost of cybercrime, generally, is expected to rise <a href=\"https:\/\/www.statista.com\/chart\/28878\/expected-cost-of-cybercrime-until-2027\/\">from $9.22 trillion in 2023 to $15.63 trillion in 2028<\/a>.&nbsp;<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\u201cthe Splinternet: a balkanized ecosystem where the sands are continually shifting based on geopolitics, security, privacy, nationalism, and layered commercial interests.\u201d<\/p><\/blockquote>\n\n\n\n<p>Countless laws and regulations have sprung up across the globe attempting to curtail the Splinternet\u2019s rising cyber threats. Well-meaning policymakers may have attempted straightforward guidance, but their efforts are causing the Splinternet to continue cracking, fraying, and breaking into shards. The first step in gluing those puzzle pieces back together is understanding the rules making up this section of the Splinternet. Here is a non-exhaustive primer on some important international cyber standards that Splinternet explorers should know.<\/p>\n\n\n\n<p><strong>A. US Federal Law<\/strong> &#8211; The United States does not have a single unified cybersecurity law. Instead, it takes a sector-by-sector approach, e.g., <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-106publ102\/pdf\/PLAW-106publ102.pdf\">the Gramm-Leach-Bliley Act for financial institutions<\/a> and the <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-104publ191\/pdf\/PLAW-104publ191.pdf\">Health Insurance Portability and Accountability Act (HIPAA)<\/a> for covered healthcare entities. Additionally, agencies like the Federal Trade Commission (FTC) and Securities Exchange Commission (SEC) enforce <a href=\"https:\/\/www.ecfr.gov\/current\/title-16\/chapter-I\/subchapter-C\/part-314\">cybersecurity standards and disclosure rules<\/a>. Under the latest <a href=\"https:\/\/www.ecfr.gov\/current\/title-16\/chapter-I\/subchapter-C\/part-314\">SEC cyber disclosure rule<\/a>, public companies must report \u201cmaterial\u201d cybersecurity incidents within four business days. Speaking of the SEC, it <a href=\"https:\/\/www.akingump.com\/en\/insights\/blogs\/ag-data-dive\/sec-cyber-enforcement-continues-more-scrutiny-of-internal-controls\">recently charged<\/a> a company\u2019s Chief Security Officer with securities fraud because of his allegedly misleading statements about the company\u2019s cyber practices. And, with an apparent \u201cfear of missing out,\u201d the FTC is currently <a href=\"https:\/\/igamingbusiness.com\/tech-innovation\/cybersecurity\/ftc-files-lawsuit-demanding-mgm-cooperation-into-cyberattack-probe\/\">investigating a cyberattack against MGM<\/a> Resorts.<\/p>\n\n\n\n<p><strong>B. US State Law<\/strong> &#8211; Many US. States enforce cybersecurity standards requiring companies to maintain \u201c<a href=\"http:\/\/www.leg.state.fl.us\/Statutes\/index.cfm?App_mode=Display_Statute&amp;URL=0500-0599\/0501\/Sections\/0501.171.html\">reasonable<\/a>\u201d information security programs. Those laws sometimes identify program features or industry recognized standards, and usually include cyber incident <a href=\"https:\/\/www.scstatehouse.gov\/code\/t39c001.php\">reporting obligations<\/a> (most often for personal data breaches).<\/p>\n\n\n\n<p><strong>C. European Union (EU)<\/strong> &#8211; The <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32016L1148\">2016 EU Directive on Network and Information Systems<\/a> (<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32016L1148\">NIS 1<\/a>), and its 2022 replacement (<a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\">NIS 2<\/a>), are the main EU-wide legislation regulating the cybersecurity of critical infrastructure and cloud-based software. Under NIS 1, companies providing certain services to the EU are required to \u201c<a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2016\/1148\/oj\">take appropriate and proportionate<\/a>\u201d cybersecurity measures and report incidents significantly impacting their availability to authorities \u201cwithout undue delay.\u201d In 2022, the EU passed NIS 2 expanding NIS 1\u2019s requirements. Although the practical details depend on how each <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj\">Member State<\/a> implements the law, <a href=\"https:\/\/assets.kpmg.com\/content\/dam\/kpmg\/pl\/pdf\/2023\/10\/kpmg-network-and-information-security-directive-nis2.pdf\">NIS 2 has<\/a>:<\/p>\n\n\n\n<ul><li><strong>Broader coverage<\/strong> regulating more industries and entities than NIS 1;<\/li><li><strong>Stricter baseline security standards <\/strong>such as those around supply chain security assessments, incident handling, and mandatory multifactor authentication;<\/li><li><strong>Tighter incident reporting deadlines<\/strong> whereby in-scope entities will need to notify authorities within 24 hours after discovering a significant incident; and<\/li><li><strong>Mandatory registration requirements<\/strong> for certain regulated entities.<\/li><\/ul>\n\n\n\n<p>Beyond NIS2, the <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2022\/2554\/oj\">EU\u2019s Digital Operational Resilience Act (DORA)<\/a> introduces even stricter cybersecurity requirements on financial entities and their technology vendors operating in the EU.<\/p>\n\n\n\n<p><strong>D. Global Trends<\/strong> &#8211; There are, of course, numerous other cybersecurity regulations around the world. Among observed global trends, an increasing number of jurisdictions \u2013 like India, China, <a href=\"https:\/\/sso.agc.gov.sg\/Acts-Supp\/9-2018\/#:~:text=An%20Act%20to%20require%20or,or%20related%20amendments%20to%20certain\">Singapore<\/a>, and <a href=\"https:\/\/www.cst.gov.sa\/en\/RulesandSystems\/RegulatoryDocuments\/Documents\/CCSPR_EN.pdf\">Saudi Arabia<\/a> &#8211; are using cybersecurity rules to regulate cloud offers in their markets. Those jurisdictions are demanding that certain technologies obtain cybersecurity-related licenses or completely refrain from sending certain data outside the country under the guise of security.<\/p>\n\n\n\n<p><strong>E. Future Key Developments to Watch<\/strong> &#8211; While not yet enforceable, developing laws and regulations may fundamentally impact cybersecurity compliance.<\/p>\n\n\n\n<ul><li>The <a href=\"https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/2471\/text\">US Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA)<\/a> commands the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to develop and implement regulations requiring critical infrastructure entities to rapidly report cyber incidents and ransomware payments. CIRCIA\u2019s first set of <a href=\"https:\/\/www.federalregister.gov\/documents\/2024\/04\/04\/2024-06526\/cyber-incident-reporting-for-critical-infrastructure-act-circia-reporting-requirements\">draft regulations<\/a> were issued for notice and comment on April 4, 2024.<\/li><li>The <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cyber-resilience-act\">Draft EU Cyber Resilience Act<\/a> mandates that \u201cproducts with digital elements\u201d perform a \u201ccyber risk assessment\u201d before entering the EU market along with strict security incident and vulnerability reporting. The legislation is <a href=\"https:\/\/www.insideprivacy.com\/cybersecurity-2\/the-cyber-resilience-act-is-one-step-closer-to-becoming-law\/\">expected to be finalized sometime in 2024<\/a>, and fully enforceable three years later.<\/li><\/ul>\n\n\n\n<p>Cybersecurity laws and regulations will continue to evolve. The idea of a free-flowing Internet now resembles Al Gore\u2019s political career: a 90s relic. We are stuck with the Splinternet. But, hopefully with the help of this article, Splinternet sojourners can glue enough fragments together as building blocks towards a more robust cybersecurity compliance plan.<\/p>\n\n\n\n<p><strong>Mike Serra<\/strong><\/p>\n\n\n\n<p>Mike Serra is Senior Counsel, Cyber &amp; National Security, at a global technology company where he plays a key role in advising product teams on emerging and existing cybersecurity and national security regulations worldwide, and developing implementation plans to meet compliance obligations and customer expectations in these areas. He is also a thought leader in legal issues related to cybersecurity and technology, having spoken at the RSA cybersecurity conference and published articles about hot topics in cyber law in the Yale Journal of Law &amp; Technology\u2019s online blog and the Michigan Bar Journal. Outside of work, Mike enjoys following college football, playing ice hockey, and trying to be a \u201ccool dad.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When he invented the Internet, Al Gore imagined borderless broadband freely flowing without restriction. Okay, maybe Al Gore did not invent the Internet. But that myth sure is memorable folklore. The inconvenient truth, however, is that the Internet evolved into something different. It is now the Splinternet: a balkanized ecosystem where the sands are continually <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/inheritingthesplinternet\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":4,"featured_media":9297,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[567,299,566,276,564],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/9296"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=9296"}],"version-history":[{"count":5,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/9296\/revisions"}],"predecessor-version":[{"id":9301,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/9296\/revisions\/9301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media\/9297"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=9296"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=9296"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=9296"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}