← All FR Documents
Final Rule

Cybersecurity Labeling for Internet of Things

In Plain English

What is this Federal Register notice?

This is a final rule published in the Federal Register by Federal Communications Commission. Final rules have completed the public comment process and establish legally binding requirements.

Is this rule final?

Yes. This rule has been finalized. It has completed the notice-and-comment process required under the Administrative Procedure Act.

Who does this apply to?

Consult the full text of this document for specific applicability provisions. The affected parties depend on the regulatory scope defined within.

When does it take effect?

This document has been effective since August 29, 2024.

Why it matters: This final rule establishes 20 enforceable obligations affecting applicable regulations.

Document Details

Document Number2024-14148
TypeFinal Rule
PublishedJul 30, 2024
Effective DateAug 29, 2024
RIN-
Docket IDPSHSB: PS Docket No. 23-239
Text FetchedYes

Agencies & CFR References

CFR References:
None

Linked CFR Parts

PartNameAgency
No linked CFR parts

Paired Documents

TypeProposedFinalMethodConf
No paired documents

External Links

📋 Extracted Requirements 20 total

Detailed Obligation Breakdown 20
Actor Type Action Timing
applicant MUST labeling program -
entity MUST testing and certification -
grantee MAY report the results of such investigation to the Commissi results of such within 20 days
regulated entity MUST testing of products seeking a grant of authorization to u grant of authorization -
applicant MUST provide a written and signed declaration to the CLA that written and signed -
regulated entity MUST review of CLA decisions that are submitted to the Federa decisions that are -
entity MUST labeling requirements -
applicant MUST process on behalf of the applicant applicant -
applicant MUST provide a written attestation: written attestation -
entity MUST demonstrate knowledge of Federal law and guidance governing t -
entity MUST demonstrate an ability to securely handle large volumes of in ability to securely -
applicant MUST_NOT prohibited pursuant to § 8 -
grantee MUST maintain the records listed as follows: records listed as -
entity MUST demonstrate implementation of controls to eliminate actual or -
person MUST test data submitted to the CLA shall be signed by the submitted to the -
grantee MUST report to the CLA describing the actions taken to correc CLA describing the within 30 days
organization MUST perform such accreditation based on ISO/IEC 17011 (incorp -
organization MUST submit the information in paragraphs (e)(1) through (9) information in paragraphs -
applicant MUST use the FCC IoT Label FCC IoT Label prior to grant of authorization to use the FCC IoT Label, then the applicant shall provide a new declaration as required by paragraph (c)
entity MUST limited to NIST's recommended criteria and labeling progr and labeling progr -

Requirements extracted once from immutable Federal Register document. View all extracted requirements →

Full Document Text (42,987 words · ~215 min read)

Text Preserved
<RULE> FEDERAL COMMUNICATIONS COMMISSION <CFR>47 CFR Subchapter A</CFR> <DEPDOC>[PSHSB: PS Docket No. 23-239; FR ID 210726]</DEPDOC> <SUBJECT>Cybersecurity Labeling for Internet of Things</SUBJECT> <HD SOURCE="HED">AGENCY:</HD> Federal Communications Commission. <HD SOURCE="HED">ACTION:</HD> Final rule. <SUM> <HD SOURCE="HED">SUMMARY:</HD> In this document, the Federal Communications Commission (Commission or FCC) establishes a voluntary cybersecurity labeling program for wireless consumer Internet of Things, or IoT, products. The program will provide consumers with an easy-to-understand and quickly recognizable FCC IoT Label that includes the U.S. Cyber Trust Mark and a QR code linked to a dynamic, decentralized, publicly available registry of more detailed cybersecurity information. This program will help consumers make safer purchasing decisions, raise consumer confidence regarding the cybersecurity of the IoT products they buy, and encourage manufacturers to develop IoT products with security-by-design principles in mind. </SUM> <EFFDATE> <HD SOURCE="HED">DATES:</HD> <E T="03">Effective date:</E> This rule is effective August 29, 2024. <E T="03">Incorporation by reference:</E> The incorporation by reference of certain material listed in the rule is approved by the Director of the Federal Register as of August 29, 2024. <E T="03">Compliance date:</E> Compliance with 47 CFR 8.208, 8.209, 8.212, 8.214, 8.215, 8.217, 8.218, 8.219, 8.220, 8.221, and 8.222 will not be required until the Office of Management and Budget has completed review under the Paperwork Reduction Act. The Commission will publish a document in the <E T="04">Federal Register</E> announcing that compliance date. </EFFDATE> <FURINF> <HD SOURCE="HED">FOR FURTHER INFORMATION CONTACT:</HD> Zoe Li, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418-2490, or by email to <E T="03">Zoe.Li@fcc.gov.</E> For additional information concerning the Paperwork Reduction Act information collection requirements contained in this document, contact Nicole Ongele, Office of Managing Director, Performance and Program Management, 202-418-2991, or by email to <E T="03">PRA@fcc.gov.</E> </FURINF> <SUPLINF> <HD SOURCE="HED">SUPPLEMENTARY INFORMATION:</HD> This is a summary of the Commission's Report and Order, PS Docket No. 23-239, adopted March 14, 2024, and released March 15, 2024. The full text of this document is available by downloading the text from the Commission's website at: <E T="03">https://docs.fcc.gov/public/attachments/FCC-24-26A1.pdf.</E> When the FCC Headquarters reopens to the public, the full text of this document will also be available for public inspection and copying during regular business hours in the FCC Reference Center, 45 L Street NE, Washington, DC 20554. To request this document in accessible formats for people with disabilities ( <E T="03">e.g.,</E> Braille, large print, electronica files, audio format, etc.) or to request reasonable accommodations ( <E T="03">e.g.,</E> accessible format documents, sign language interpreters, CART, etc.), send an email to <E T="03">FCC504@fcc.gov</E> or call the FCC's Consumer and Government Affairs Bureau at (202) 418-0530 (voice), (202) 418-0432 (TTY). <E T="03">Congressional Review Act:</E> The Commission has determined, and the Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget, concurs, that this rule is non-major under the Congressional Review Act, 5 U.S.C. 804(2). The Commission will send a copy of the Order to Congress and the Government Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A). <HD SOURCE="HD1">Synopsis</HD> 1. With the Report and Order (Order), the Commission takes prompt and decisive measures to strengthen the nation's cybersecurity posture by adopting a voluntary cybersecurity labeling program for wireless IoT products. The Commission's IoT Labeling Program will provide consumers with an easy-to-understand and quickly recognizable FCC IoT Label that includes the U.S. Government certification mark (referred to as the U.S. Cyber Trust Mark) that provides assurances regarding the baseline cybersecurity of an IoT product, together with a QR code that directs consumers to a registry with specific information about the product. Consumers who purchase an IoT product that bears the FCC IoT Label can be assured that their product meets the minimum cybersecurity standards of the IoT Labeling Program, which in turn will strengthen the chain of connected IoT products in their own homes and as part of a larger national IoT ecosystem. The Order will help consumers make better purchasing decisions, raise consumer confidence with regard to the cybersecurity of the IoT products they buy to use in their homes and their lives, and encourage manufacturers of IoT products to develop products with security-by-design principles in mind. 2. In the Order, we set forth the framework by which the IoT Labeling Program will operate. We focus the IoT Labeling Program initially on IoT “products,” which we define to include one or more IoT devices and additional product components necessary to use the IoT device beyond basic operational features. Recognizing that a successful voluntary IoT Labeling Program will require close partnership and collaboration between industry, the Federal Government, and other stakeholders, we adopt an administrative framework for the IoT Labeling Program that capitalizes on the existing public, private, and academic sector work in this space, while ensuring the integrity of the IoT Labeling Program through oversight by the Commission. 3. Voluntary IoT Labeling Program. We establish a voluntary IoT Labeling Program for wireless consumer IoT products. While participation is voluntary, those that choose to participate must comply with the requirements of the IoT Labeling Program to receive authority to utilize the FCC IoT Label bearing the Cyber Trust Mark. The <E T="03">IoT Labeling Notice of Proposed Rulemaking (NPRM),</E> 88 FR 58211 (August 25, 2023), sought comment on whether the proposed IoT Labeling Program should be voluntary, reasoning that “success of a cybersecurity labeling program will be dependent upon a willing, close partnership and collaboration between the federal government, industry, and other stakeholders.” The record shows substantial support for a voluntary approach. The Custom Electronic Design & Installation Association (CEDIA) suggests that IoT Labeling Program must be voluntary “for the program to gain momentum in the marketplace.” AIM, Inc. (AIM) suggests that the voluntary aspect of the IoT Labeling Program “will help drive adoption of the label by device producers.” Further, commenters suggest that a voluntary program will ensure the broadest reach, most efficiency, and widest access to a diversity of IoT technologies. We agree that a voluntary program will help drive adoption of the IoT Labeling Program, so that a willing, close partnership can be achieved. We also agree with the record that flexible, voluntary, risk-based best practices are the hallmarks of IoT security as it exists today and as it is being developed around the world. Additionally, we acknowledge the view that “consumer labeling is a difficult undertaking in any context,” especially in the evolving area of cybersecurity, and that the “best approach is to start the Program with something achievable and effective.” We concur that willing participation will allow the IoT Labeling Program to be more easily achievable than requiring participation in a novel program. With the added imprimatur of a U.S. Government certification mark, the IoT Labeling Program will help distinguish products in the marketplace that meet minimum requirements and provide options to consumers. 4. We reject arguments that mandating participation in the IoT Labeling Program is necessary. While we recognize that a voluntary IoT Labeling Program may cause concern that smaller businesses with limited resources may choose not to participate, we believe the strong stakeholder engagement and collaboration that we expect to result from willing participation, and which is vital to establishing this new program, outweighs these risks. Further, while we acknowledge that, at least in the near term, allowing the IoT Labeling Program to be voluntary “could limit its adoption and impact,” we believe this risk is outweighed by the benefits that a voluntary program will garner, such as speed to market to hasten impact, efficiency of resources, and the likelihood that consumer demand will drive widespread adoption over time. 5. In adopting the IoT Labeling Program with the parameters discussed in the <E T="03">Order,</E> we are establishing a collaborative effort between the Federal Government and relevant stakeholders in industry and the private sector. We emphasize that the <E T="03">Order</E> is intended to provide the high-level programmatic structure that is reasonably necessary to establish the IoT Labeling Program and create the requirements necessary for oversight by the Commission, while leveraging the extensive work, labeling schemes, processes and relationships that have already been developed in the private sector. We also note that there is further development to be done by the private sector and other Federal agencies to implement the IoT Labeling Program and, as discussed below, expects many of the details not expressly addressed in the Order will be resolved through these separate efforts and by the authorities the Commission delegates to the Public Safety and Homeland Security Bureau (PSHSB or the Bureau). <HD SOURCE="HD2">A. Eligible Devices or Products</HD> 6. The Order initially establishes the IoT Labeling Program for wireless consumer IoT products. We do not, however, foreclose the ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Preview showing 10k of 289k characters. Full document text is stored and available for version comparison. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
This text is preserved for citation and comparison. View the official version for the authoritative text.