Federal Communications Commission FCC 24-26
Before the
Federal Communications Commission
Washington, D.C. 20554
In the Matter of
Cybersecurity Labeling for Internet of Things
)
)
)
)
PS Docket No. 23-239
REPORT AND ORDER
AND
FURTHER NOTICE OF PROPOSED RULEMAKING
Adopted: March 14, 2024 Released: March 15, 2024
Comment Date: (30 days after date of publication in the Federal Register)
Reply Comment Date: (60 days after date of publication in the Federal Register)
By the Commission: Chairwoman Rosenworcel and Commissioners Starks, Simington, and Gomez
issuing separate statements.
TABLE OF CONTENTS
Heading Paragraph #
I. INTRODUCTION...................................................................................................................................1
II. BACKGROUND.....................................................................................................................................3
A. The Internet of Things (IoT) Landscape...........................................................................................3
B. Public and Private IoT Security Efforts ............................................................................................5
III. REPORT AND ORDER........................................................................................................................11
A. Voluntary IoT Labeling Program....................................................................................................11
B. Eligible Devices or Products...........................................................................................................14
C. Oversight and Management of the IoT Labeling Program .............................................................40
1. Fostering Close Public-Private Collaboration..........................................................................40
2. Cybersecurity Label Administrators (CLAs) ...........................................................................47
3. Responsibilities of the Lead Administrator and CLAs.............................................................51
4. Selecting CLAs and Revoking Authority to Grant Applications to Use the FCC IoT
Label.........................................................................................................................................59
D. CyberLABs, CLA-Run Labs, and In-House Testing Labs .............................................................65
E. Two-Step Process for Obtaining Authority to Use the FCC IoT Label..........................................81
1. Product Testing by an Accredited and Recognized Lab ..........................................................82
2. Filing an Application with a CLA............................................................................................87
F. Consumer IoT Product Cybersecurity Criteria and Standards........................................................96
G. The FCC IoT Label (Cyber Trust Mark and QR Code)................................................................106
H. Registry .........................................................................................................................................111
I. Continuing Obligations of Entities Authorized to Use the FCC IoT Label..................................122
J. Audits, Post-Market Surveillance, and Enforcement....................................................................125
K. International Reciprocal Recognition of the Cyber Trust Mark ...................................................133
L. Consumer Education.....................................................................................................................137
M. Cost/Benefit Analysis ...................................................................................................................143
IV. LEGAL AUTHORITY........................................................................................................................152
Federal Communications Commission FCC 24-26
2
V. FURTHER NOTICE OF PROPOSED RULEMAKING....................................................................162
VI. PROCEDURAL MATTERS...............................................................................................................167
VII. ORDERING CLAUSES ....................................................................................................................179
APPENDIX A – FINAL RULES
APPENDIX B – FINAL REGULATORY FLEXIBILITY ANALYSIS
APPENDIX C – INITIAL REGULATORY FLEXIBILITY ANALYSIS
I. INTRODUCTION
1. Consumers rely heavily on Internet-connected products to help them manage many
aspects of day-to-day life, including home safety, health, recreation, and personal convenience. With this
convenience, however, comes risk. Internet of Things (IoT) products are susceptible to a wide range of
relatively common security vulnerabilities that are increasingly exploited by cybercriminals who are
invading people’s privacy and threatening national security. With this Report and Order (Order), the
Commission takes prompt and decisive measures to strengthen the nation’s cybersecurity posture by
adopting a voluntary cybersecurity labeling program for wireless Internet of Things products.
1
The
Commission’s IoT Labeling Program will provide consumers with an easy-to-understand and quickly
recognizable FCC IoT Label that includes the U.S. government certification mark (referred to as the
Cyber Trust Mark) that provides assurances regarding the baseline cybersecurity of an IoT product,
together with a QR code that directs consumers to a registry with specific information about the product.
Consumers who purchase an IoT product that bears the FCC IoT Label can be assured that their product
meets the minimum cybersecurity standards of the IoT Labeling Program, which in turn will strengthen
the chain of connected IoT products in their own homes and as part of a larger national IoT ecosystem.
Today’s Order will help consumers make better purchasing decisions, raise consumer confidence with
regard to the cybersecurity of the IoT products they buy to use in their homes and their lives, and
encourage manufacturers of IoT products to develop products with security-by-design principles in mind.
2
2. In the following Order, we set forth the framework by which the IoT Labeling Program
will operate. We focus the IoT Labeling Program initially on IoT “products,” which we define to include
one or more IoT devices and additional product components necessary to use the IoT device beyond basic
operational features. Recognizing that a successful voluntary IoT Labeling Program will require close
partnership and collaboration between industry, the federal government, and other stakeholders, we adopt
an administrative framework for the IoT Labeling Program that capitalizes on the existing public, private,
and academic sector work in this space, while ensuring the integrity of the IoT Labeling Program through
oversight by the Commission.
1
See Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, FCC 23-65, Notice of Proposed
Rulemaking (Aug. 10, 2023) (IoT Labeling NPRM); see also Exec. Order No. 14028, Improving the Nation’s
Cybersecurity, 86 Fed. Reg. 26633 (May 12, 2021) (IoT Executive Order). The IoT Labeling Program has also been
referred to as the “U.S. Cyber Trust Mark program.” See Press Release, White House, Biden-�Harris
Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers
(July 18, 2023), https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-
administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/
[https://perma.cc/BR9A-JU59].
2
See Cybersecurity & Infrastructure Security Agency, Secure-by-Design, Shifting the Balance of Cybersecurity
Risk: Principles and Approaches for Secure by Design Software, (Oct. 25, 2023), https://www.cisa.gov/resources-
tools/resources/secure-by-design [https://perma.cc/8NPX-YR4A] (urging software manufacturers “to take urgent
steps necessary to ship products that are secure by design and revamp their design and development programs to
permit only secure by design products to be shipped to customers”).
Federal Communications Commission FCC 24-26
3
II. BACKGROUND
A. The Internet of Things (IoT) Landscape
3. Consumer IoT products communicate over wired and wireless networks using a varying
array of technologies, each of which presents its own set of security challenges.
3
In August 2023, the
Commission adopted a Notice of Proposed Rulemaking (IoT Labeling NPRM) proposing a voluntary
program for IoT labeling that would provide consumers with easily understood, accessible information on
the relative security of an IoT device or product.
4
The record received in response to the IoT Labeling
NPRM reflects that cybersecurity threats to IoT products present a significant risk, as nefarious actors try
to take advantage of insecure consumer IoT products. For example, Distributed Denial of Service
(DDoS) attacks using exploited IoT products continue to increase, “with DDoS attacks ‘originating from
insecure IoT devices increase[ing] five-fold’ over 2022 and 2023.”
5
These attacks can disrupt services
that consumers rely on.
6
As noted in the record, all types of IoT consumer products are subject to attack,
with commenters explaining that “[o]nce-harmless devices like printers and baby monitors can be
conscripted into botnets that conduct massive [DDoS] attacks.”
7
Some IoT products have even shipped
with malware in them.
8
Further, consumer IoT products may face attacks not readily anticipated by
consumers, with Consumer Reports explaining how IoT products can be manipulated by hackers using
electromagnetic interference (EMI) “to duplicate sounds that can lead to a hacker activating a smart
speaker.”
9
The record cites the impacts insecure IoT devices have on consumers, highlighting that
“nearly one-quarter of users with 20 or more devices in a household have experienced two or more data
security breaches in the past year.”
10
4. Consumers are concerned about the security of their IoT products, but they generally do
not have access to convenient information on the security risk of these products prior to purchasing one.
As highlighted by the Electronic Privacy Information Center (EPIC), readily available security
information for consumers is lacking before purchasing IoT products, because the security and privacy
information “is often buried within in-box instruction manuals consumers cannot access until after
3
See Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, FCC 23-65, Notice of Proposed
Rulemaking, para. 3 (2023) (IoT Labeling NPRM).
4
IoT Labeling NPRM at 1-2, paras. 1-2.
5
Comcast Corporation Comments at 9 (Comcast) (citing Press Release, Nokia, Nokia Threat Intelligence Report
Finds Malicious IoT Botnet Activity Has Sharply Increased (June 7, 2023), https://www.nokia.com/about-
us/news/releases/2023/06/07/nokia-threat-intelligence-report-finds-malicious-iot-botnet-activity-has-sharply-
increased/#:~:text=Espoo%2C%20Finland%20%E2%80%93%20The%20latest%20Nokia,fivefold%20over%20the
%20past%20year%2C [https://perma.cc/5KHF-CM86]).
6
See, e.g., Jake Frankenfield, Denial-of-Service (DoS) Attack: Examples and Common Targets, Investopedia (May
24, 2023), https://www.investopedia.com/terms/d/denial-service-attack-dos.asp [https://perma.cc/9AK9-ND28] (“In
October 2016, a DDoS attack was carried out on a domain name system (DNS) provider, Dyn… The attack on Dyn
flooded its servers with overwhelming traffic, creating a massive web outage and shutting down over 80 websites,
including major sites like Twitter (now X), Amazon, Spotify, Airbnb, PayPal, and Netflix.”).
7
CTA Comments at 2.
8
Sead Fadilpašić, These Popular Android TV Boxes are Reportedly Shipping Laced with Malware, techradar (May
21, 2023), https://www.techradar.com/news/these-popular-android-tv-boxes-are-laced-with-malware
[https://perma.cc/32JX-R8T5].
9
Consumer Reports Comments at 4; see also Forrest McKee Comments at 1 (describing the ““Near Ultrasonic
Inaudible Trojan Attack,” which utilizes audio signals between 16 and 22 kHz, typically beyond the average adult's
hearing range, to discreetly issue malicious commands to devices.”).
10
NTCA – The Rural Broadband Association Comments at 2 (NTCA) (citing Susanne Hupfer, Michael Steinhart,
Shiny New Devices May Bring Joy, But Who’s Protecting Consumer Data?, Deloitte Insights (Jan. 23, 2023)).
Federal Communications Commission FCC 24-26
4
purchase.”
11
Further, research conducted by Consumer Reports indicates that more than half of
consumers surveyed were concerned about the information collected by connected devices.
12
Consumer
Reports research also found that more than half of surveyed consumers did not feel informed about the
security of the data collected by IoT devices.
13
A majority of consumers surveyed by Consumer Reports
felt that the data collected and with whom it was shared was important for them to know, and that it was
the responsibility of manufacturers to provide this information to the consumer.
14
Consumer Reports also
found widespread consumer uncertainty and distrust on topics such as the length of time the manufacturer
would provide software updates and whether the company stored consumer information.
15
Consumer
Reports concluded that “[c]onsumers clearly value information from manufacturers as to how their data
gets used and stored, how long a product will receive security updates and how good a manufacturer’s
security practices are, but have no consistent way to find that information, and aren’t sure if the info
provided is trustworthy.”
16
Our IoT Labeling Program is intended to provide consumers with that missing
piece.
B. Public and Private IoT Security Efforts
5. As the Commission observed in the IoT Labeling NPRM, significant work has already
been conducted in the realm of IoT cybersecurity.
17
Because the context of the Commission’s action in
11
Electronic Privacy Information Center (EPIC) Reply at 5.
12
Letter from Stacey Higginbotham, Policy Fellow, Consumer Reports, to Marlene H. Dortch, Secretary, FCC, PS
Docket No. 23-239, Attach. CR IoT Security Label Summer Research at 4 (filed Dec. 13, 2023) (Consumer Reports
Summer Research).
13
Consumer Reports Summer Research at 4.
14
Id. at 4-5.
15
Id. at 5-6.
16
Id. at 8.
17
We observe that the National Institute of Standards and Technology (NIST) issued several guidelines on
cybersecurity for Internet-connected devices, stressing an engineering-based approach that builds security systems
directly into IoT technology. See, NIST, Systems Security Engineering: Considerations for a Multidisciplinary
Approach in the Engineering of Trustworthy Secure System, NIST Special Pub. 800-160 (2016),
https://doi.org/10.6028/NIST.SP.800-160 [https://perma.cc/4ASG-MQB2]; see also NIST, NISTIR 8259,
Foundational Cybersecurity Activities for IoT Device Manufacturers at 15 (2020),
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259.pdf [https://perma.cc/82CX-WXQ7]. The Department of
Homeland Security (DHS) also previously released its own cybersecurity policy for IoT devices, delineating six
strategic principles that it believes will help stakeholders stop unauthorized intruders from tampering with connected
devices. See U.S. Dept. of Homeland Security, Strategic Principles for Securing the Internet of Things (IoT),
Version 1.0 (Nov. 15, 2016), https://www.dhs.gov/securingtheIoT [https://perma.cc/GG86-4UCH]. NIST and the
National Telecommunications and Information Administration (NTIA) developed a risk management framework for
addressing cybersecurity issues. See NIST, Framework for Improving Critical Infrastructure Cybersecurity (2014),
https://www.nist.gov/system/files/documents/cyberframework/cybersecurity-framework-021214.pdf
[https://perma.cc/C6M7-Z7V2]. The Communications Security, Reliability, and Interoperability Council IV
(CSRIC IV) developed a segment-specific analysis of the application of the Cybersecurity Framework, as well as
recommendations for voluntary efforts to address cybersecurity concerns. See CSRIC IV, Working Group 4,
Cybersecurity Risk Management and Best Practices, Final Report (2015),
https://transition.fcc.gov/pshs/advisory/csric4/CSRIC_IV_WG4_Final_Report_031815.pdf [https://perma.cc/4P5E-
5NKR]. In addition, the Commission’s Technical Advisory Council issued its report on applying security to
consumer IoT devices. See Federal Communications Commission Technical Advisory Council (FCC TAC),
Cybersecurity Working Group, Technical Considerations White Paper (2015),
https://transition.fcc.gov/oet/tac/tacdocs/reports/2015/FCC-TAC-Cyber-IoT-White-Paper-Rel1.1-2015.pdf
[https://perma.cc/L3JD-FEVB]; see also Press Release, FTC, FTC Report on Internet of Things Urges Companies to
Adopt Best Practices to Address Consumer Privacy and Security Risks (Jan. 27, 2015), https://www.ftc.gov/news-
events/news/press-releases/2015/01/ftc-report-internet-things-urges-companies-adopt-best-practices-address-
(continued….)
Federal Communications Commission FCC 24-26
5
this Order is widely informed by government actions to date and the significant work of industry and
academia, we reiterate here background information also found in the IoT Labeling NPRM, and highlight
more recent and ongoing efforts to address IoT security labeling across both private and public sectors.
We previously noted the progress of international efforts with respect to IoT labeling, such as the
publication of an assessment methodology for IoT security provisions to assist assessors of IoT products
for Singapore’s Cybersecurity Labeling Scheme.
18
More recently, in September 2023, Japan announced
its intention to “strengthen research collaboration” with the National Institute for Standards and
Technology (NIST) and to work with the U.S. to ensure the interoperability of the IoT labeling scheme
Japan is developing.
19
In addition, recognizing the importance of international cooperation to strengthen
cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA) and thirteen international
partners released guidance for software manufacturers to consider in making products secure by design.
20
CISA has also taken significant steps to provide consumers with tools to help them keep their families’
online activities secure through CISA’s Secure Our World program.
21
On January 30, 2024, the U.S. also
entered into a Joint CyberSafe Products Action Plan with the European Union, aiming to advance
technical cooperation in support of mutual recognition of their respective evolving IoT cybersecurity
programs.
22
6. The Commission further observed in the IoT Labeling NPRM the efforts to address IoT
security across the U.S. government.
23
In May 2021, the IoT Executive Order emphasized the importance
of IoT cybersecurity, noting the “persistent and increasingly sophisticated malicious cyber campaigns that
threaten the public sector, the private sector, and ultimately the American people’s security and
privacy.”
24
Securing the Internet of Things forms a significant pillar in the National Cybersecurity
consumer-privacy-security [https://perma.cc/M99B-JKJ3] (proposing privacy and cybersecurity best practices
associated with IoT); U.S. Dept. of Health and Human Services, Radio Frequency Wireless Technology in
Medical Devices: Guidance for Industry and Food and Drug Administration Staff (2013),
http://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocuments/ucm077272.p
df [https://perma.cc/WW47-7CYU] (guidance to the industry on considerations for the safe and effective
development and use of RF technology in medical devices).
18
See Cyber Security Agency of Singapore, Cybersecurity Labelling Scheme for IoT Publications No. 4,
Assessment Methodology v.1.0, CCCSP-151-4 (2023), https://www.csa.gov.sg/docs/default-source/our-
programmes/certification-and-labelling-scheme/cls/publications/-pub-ccc-sp-151-4-cls(iot)-assessment-
methodology-v1.0.pdf?sfvrsn=7661147f_1 [https://perma.cc/CT9A-Z69E]. In October 2020, the Cyber Security
Agency of Singapore launched its baseline cybersecurity requirements for IoT devices and products and updated its
program effective September 22, 2023. Cyber Security Agency of Singapore, Updates, https://www.csa.gov.sg/our-
programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme/updates [https://perma.cc/QP6R-
WFUY] (last visited Feb. 13, 2024).
19
Press Release, Ministry of Economy, Trade and Industry, Joint Statement of the Japan-U.S. Economic Policy
Consultative Committee at 6 (Nov. 14, 2023), https://www.meti.go.jp/press/2023/11/20231116006/20231116006-
1.pdf [https://perma.cc/GN7U-PYP4].
20
Cybersecurity & Infrastructure Security Agency, Secure by Design | Shifting the Balance of Cybersecurity Risk:
principles and Approaches for Secure by Design Software (Oct. 25, 2023), https://www.cisa.gov/resources-
tools/resources/secure-by-design [https://perma.cc/NZ3Z-CMKF].
21
Cybersecurity & Infrastructure Security Agency, Secure Our World, https://www.cisa.gov/secure-our-world
[https://perma.cc/P2J7-M5YQ] (last visited Jan. 12, 2024).
22
Press Release, European Commission, EU-US Joint Statement on CyberSafe Product Action Plan (Jan. 31, 2024),
https://digital-strategy.ec.europa.eu/en/library/eu-us-joint-statement-cybersafe-products-action-plan
[https://perma.cc/8D78-H97V].
23
IoT Labeling NPRM at 5, para. 6.
24
IoT Executive Order at 26633.
Federal Communications Commission FCC 24-26
6
Strategy.
25
Pursuant to the “Modernizing Federal Government Cybersecurity” section of the IoT
Executive Order,
26
the Office of Management and Budget (OMB), as part of its annual guidance on
compliance with information security and privacy management requirements, directed federal agencies to
inventory IoT devices and initiate a process to establish best practices for IoT security across the federal
government.
27
7. The Commission also observed the significant work of NIST,
28
including the NIST
Cybersecurity White Paper
29
which details recommended criteria and potential labeling program
approaches for cybersecurity labeling of consumer IoT products. The White Paper was informed by
existing consumer product labeling programs, input provided by diverse stakeholders, public and private,
gained from public workshops and comments filed in response to draft documents. The White Paper also
relied heavily on the NIST Internal Report (NISTIR) 8259 family of documents (NISTIR 8259, NISTIR
8259A, and NISTIR 8259B),
30
which define the IoT cybersecurity capability core baseline. The core
baseline is a set of foundational cybersecurity capabilities that manufacturers can use to identify the
cybersecurity capabilities their customers may expect in IoT devices.
31
8. In September 2022, NIST released the Profile of the IoT Core Baseline for Consumer IoT
Products (NISTIR 8425).
32
NISTIR 8425, which is built on NISTIR 8259A and NISTIR 8259B, identifies
cybersecurity capabilities commonly needed for the consumer IoT sector and provides guidance for what
consumers (including businesses as consumers) should consider when purchasing IoT products.
33
In
NISTIR 8425, NIST describes a potential program that would educate the public on IoT cybersecurity
capabilities, thereby allowing and enabling consumers in the marketplace to make informed choices about
25
White House, National Cybersecurity Strategy at 20 (2023), https://www.whitehouse.gov/wp-
content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf [https://perma.cc/AZY7-KY9L]; see also IoT
Cybersecurity Improvement Act of 2020, 15 U.S.C. §§ 278g-3a to 278g-3e (establishes minimum cybersecurity
requirements for IoT technology procured by the U.S. government and directs federal agencies to only procure
devices that comply with NIST guidelines (NIST SP 800-213 and 213A) and establishes vulnerability reporting
requirements for products sold to the U.S. government).
26
IoT Executive Order at 26635-26637.
27
OMB, Memorandum for the Heads of Executive Departments and Agencies at 5, 7 (2023),
https://www.whitehouse.gov/wp-content/uploads/2023/12/M-24-04-FY24-FISMA-Guidance.pdf
[https://perma.cc/X3RZ-B7GQ].
28
IoT Labeling NPRM at 5-6, para. 7.
29
NIST, Recommended Criteria for Cybersecurity Labeling for Consumer Internet of Things (IoT) Products (2022),
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.02042022-2.pdf [https://perma.cc/D59M-BZWD] (NIST
Cybersecurity White Paper).
30
NIST, NISTIR 8259, Foundational Cybersecurity Activities for IoT Device Manufacturers (2020),
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259.pdf [https://perma.cc/RZE8-SDRZ]; NIST, NISTIR 8259A,
IoT Device Cybersecurity Capability Core Baseline (2020),
https://nvlpubs.nist.gov/nistpubs/ir/2020/NIST.IR.8259A.pdf [https://perma.cc/C9AK-2PGA]; NIST, NISTIR
8259B, IoT Non-Technical Supporting Capability Core Baseline (2021)
https://nvlpubs.nist.gov/nistpubs/ir/2021/NIST.IR.8259B.pdf [https://perma.cc/6KJK-D2NB]; see also NIST, NIST
Cybersecurity for IoT Program, NISTIR 8259 Series (Nov. 16, 2021) https://www.nist.gov/itl/applied-
cybersecurity/nist-cybersecurity-iot-program/nistir-8259-series [https://perma.cc/8HKR-XDH2].
31
NIST, NISTIR 8425, Profile of the IoT Core Baseline for Consumer IoT Products at 1 (2022),
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8425.pdf [https://perma.cc/X8PK-4TV7] (NISTIR 8425).
32
NIST, NIST IoT Cybersecurity Program Releases Two New Documents (Sept. 20, 2022)
https://csrc.nist.gov/News/2022/nist-iot-cybersecurity-program-nist-irs-8425-8431 [https://perma.cc/6748-XXXX].
33
NISTIR 8425 at 2-5.
Federal Communications Commission FCC 24-26
7
their IoT purchases.
34
From all of these efforts, NIST has identified key elements of a labeling program
that encourage innovation while remaining practical and not burdensome. Most recently, in December
2023, NIST published an IoT Product Component Requirements Essay discussing possible standards that
may be related to the NISTIR 8425 outcomes. In the essay, NIST notes that “[c]ybersecurity of IoT
devices, though critical, is incomplete if cybersecurity of other IoT product components is not considered
as well since the IoT device and other IoT product components will be a system.”
35
NIST also clarified
that the “cybersecurity technical and non-technical outcomes defined in the NISTIR 8425 consumer
profile apply to IoT products and not just IoT devices.”
36
9. As the Commission acknowledged in the IoT Labeling NPRM,
37
NIST’s essential work in
this arena coupled with the significant private sector contributions and innovations in developing
cybersecurity certification programs, Commission experience guiding compliance assessment programs,
38
and prior Commission action in this space,
39
provide the building blocks for our development and
adoption of this IoT Labeling Program. We continue to consider closely the work of NIST in support of
our IoT labeling efforts.
10. The private sector has also taken measures to promote IoT security. As we noted in the
IoT Labeling NPRM, for example, the Consumer Technology Association (CTA) has convened an IoT
working group tasked with supporting the advancement of the consumer IoT industry,
40
and produced a
white paper addressing the current regulatory approach to IoT.
41
The record also references additional
34
See id. at 16; see also NIST, Consumer Cybersecurity Labeling Pilots: The Approach and Contributions (May 24,
2022), https://www.nist.gov/itl/executive-order-14028-improving-nations-cybersecurity/consumer-cybersecurity-
labeling-pilots [https://perma.cc/7TGC-PXVJ].
35
NIST, Identifying Standards and Guidance for a Consumer IoT Product Development Handbook (2023),
https://www.nist.gov/system/files/documents/2023/11/30/FINAL_IoT%20Product%20Requirements%20Discussion
%20Essay_20231129.pdf [https://perma.cc/UG83-72FJ] (NIST IoT Product Component Requirements Essay).
36
Id.
37
IoT Labeling NPRM at 6, para. 8.
38
See, e.g., 47 CFR pt. 2, Subpart J (equipment authorization); 47 CFR § 20.19 (hearing aid compatibility); 47 CFR
§§ 2.1091, 2.1093 (radiofrequency radiation exposure); 47 CFR pt. 68 (connection of terminal equipment to the
telephone network).
39
See Spectrum Requirements for the Internet of Things, ET Docket No. 21-353, Notice of Inquiry, 36 FCC Rcd
14165 (2021); Supply Chain NOI, 36 FCC Rcd 10578, (2021); Report and Order, Order, and Further Notice of
Proposed Rulemaking, FCC 22-84 (Nov. 11, 2022); Revision of Part 15 of the Commission’s Rules to Permit
Unlicensed National Information Infrastructure (U-NII) Devices in the 5 GHz Band, ET Docket No. 13-49, First
Report and Order, 29 FCC Rcd 4127, 4143, para. 54 (2014).
40
Consumer Technology Association CES, IoT Working Group, https://www.cta.tech/Membership/Member-
Groups/IoT-Working-Group [https://perma.cc/9ULY-PJ6E] (last visited Nov. 24, 2023).
41
ANSI/CTA, Standard Baseline Cybersecurity Standard for Devices and Device Systems ANSI/CTA-2088-A
(2022), https://shop.cta.tech/products/https-cdn-cta-tech-cta-media-media-shop-standards-2020-ansi-cta-2088-a-
final-pdf [https://perma.cc/8ES6-VN3B]; see also Consumer Technology Association, Smart Policy to Secure our
Smart Future: How to Promote a Secure Internet of Things for Consumers (2021),
https://shop.cta.tech/collections/research/products/smart-policy-to-secure-our-smart-future-how-to-promote-a-
secure-internet-of-things-for-consumershttps://shop.cta.tech/collections/research/products/smart-policy-to-secure-
our-smart-future-how-to-promote-a-secure-internet-of-things-for-consumers [https://perma.cc/BRM2-CR5A] (CTA
Cybersecurity White Paper); Supply Chain NOI, 36 FCC Rcd 10578, para. 104 (seeking comment on the CTA
Cybersecurity White Paper). CTA has also convened with various organizations to discuss IoT baseline security
capabilities. See Council to Secure the Digital Economy, The C2 Consensus on IoT Device Security Baseline
Capabilities (2019), https://csde.org/wp-content/uploads/2019/09/CSDE_IoT-C2-Consensus-Report_FINAL.pdf
[https://perma.cc/2GVK-GFM6]; Council to Secure the Digital Economy, The C2 Consensus on IoT Device
Security Baseline Capabilities – 2021 Supplement (2021), https://csde.org/wp-content/uploads/2021/04/C2-Tech-
Report_2021_final.pdf [https://perma.cc/U45C-DGYT]; IoT Labeling NPRM at 4, para. 5.
Federal Communications Commission FCC 24-26
8
efforts undertaken by our industry partners to address IoT vulnerabilities. For example, Comcast notes
how their “Comcast Xfinity PKI system (xPKI) provides individual identity to millions of IoT devices on
a daily basis through secure automation and standards compliance.”
42
Samsung highlights that, in order
to function with their “SmartThings platform and receive the ‘Works with SmartThings’ certification, all
devices must pass (1) functional testing for seamless interoperability and (2) security testing for secure
connections.”
43
It is against these multiple efforts as a backdrop that we take action today to leverage,
unify, and elevate efforts to date within a common programmatic framework.
III. REPORT AND ORDER
A. Voluntary IoT Labeling Program
11. Today, we establish a voluntary IoT Labeling Program for wireless consumer IoT
products. While participation is voluntary, those that choose to participate must comply with the
requirements of the IoT Labeling Program to receive authority to utilize the FCC IoT Label bearing the
Cyber Trust Mark. The IoT Labeling NPRM sought comment on whether the proposed IoT Labeling
Program should be voluntary,
44
reasoning that “success of a cybersecurity labeling program will be
dependent upon a willing, close partnership and collaboration between the federal government, industry,
and other stakeholders.”
45
The record shows substantial support for a voluntary approach.
46
CEDIA
suggests that IoT Labeling Program must be voluntary “for the program to gain momentum in the
marketplace.”
47
AIM, Inc. suggests that the voluntary aspect of the IoT Labeling Program “will help
drive adoption of the label by device producers.”
48
Further, commenters suggest that a voluntary program
will ensure the broadest reach, most efficiency, and widest access to a diversity of IoT technologies.
49
We agree that a voluntary program will help drive adoption of the IoT Labeling Program, so that a
willing, close partnership can be achieved. We also agree with the record that flexible, voluntary, risk-
based best practices are the hallmarks of IoT security as it exists today and as it is being developed around
the world.
50
Additionally, we acknowledge the view that “consumer labeling is a difficult undertaking in
any context,”
51
especially in the evolving area of cybersecurity, and that the “best approach is to start the
Program with something achievable and effective.”
52
We concur that willing participation will allow the
IoT Labeling Program to be more easily achievable than requiring participation in a novel program. With
the added imprimatur of a U.S. government certification mark, the IoT Labeling Program will help
42
Comcast Comments at 4.
43
Samsung Comments at 2.
44
IoT Labeling NPRM at 6, para. 9.
45
Id.
46
USTelecom at 2; CTIA Comments at 15; NCTA Comments at 4; Samsung Electronics America Comments at 5
(Samsung); Comcast Comments at 1; see also Open Voice Network Comments at 4 (OVON); Alliance for
Automotive Innovation Comments at 2 (Auto Innovators; Plumbing Manufacturers International Comments at 2
(PMI); Custom Electronic Design & Installation Association Reply at 3 (CEDIA); Infineon Technologies Americas
Corp. Reply at 2-3 (Infineon); EPIC Reply at 4.
47
CEDIA Reply at 3.
48
AIM, Inc. Comments at 3 (AIM).
49
Consumer Technology Association Reply at 3 (CTA) (citing Association of Home Manufacturers Comments at 2
(AHAM)); Consumer Technology Association Comments at 4 (CTA); CTIA – The Wireless Association Comments
at 15 (CTIA); National Association of Manufacturers Comments at 2 (NAM); NTCA Comments at 4;
Telecommunications Industry Association Comments at 2 (TIA); USTelecom – The Broadband Association
Comments at 11-12 (USTelecom); Widelity Comments at 1-4; Wi-Fi Alliance Comments at 10.
50
CTIA Comments at 15.
51
CTIA Reply at 1.
52
Infineon Reply at 2.
Federal Communications Commission FCC 24-26
9
distinguish products in the marketplace that meet minimum requirements and provide options to
consumers.
12. We reject arguments that mandating participation in the IoT Labeling Program is
necessary.
53
While we recognize that a voluntary IoT Labeling Program may cause concern that smaller
businesses with limited resources may choose not to participate,
54
we believe the strong stakeholder
engagement and collaboration that we expect to result from willing participation, and which is vital to
establishing this new program, outweighs these risks. Further, while we acknowledge that, at least in the
near term, allowing the IoT Labeling Program to be voluntary “could limit its adoption and impact,”
55
we
believe this risk is outweighed by the benefits that a voluntary program will garner, such as speed to
market to hasten impact, efficiency of resources, and the likelihood that consumer demand will drive
widespread adoption over time.
13. In adopting the IoT Labeling Program with the parameters discussed in this Order, we
are establishing a collaborative effort between the federal government and relevant stakeholders in
industry and the private sector. We emphasize that this Order is intended to provide the high-level
programmatic structure that is reasonably necessary to establish the IoT Labeling Program and create the
requirements necessary for oversight by the Commission, while leveraging the extensive work, labeling
schemes, processes and relationships that have already been developed in the private sector. We also note
that there is further development to be done by the private sector and other federal agencies to implement
the IoT Labeling Program and, as discussed below, expects many of the details not expressly addressed in
this Order will be resolved through these separate efforts and by the authorities the Commission delegates
to the Public Safety and Homeland Security Bureau (PSHSB or the Bureau).
B. Eligible Devices or Products
14. As explained herein, today’s Order initially establishes the IoT Labeling Program for
wireless consumer IoT products. We do not, however, foreclose the possibility of expanding the IoT
Labeling Program in the future. In the IoT Labeling NPRM, we sought comment on the scope of devices
or products for sale in the United States that should be eligible for inclusion in the IoT Labeling Program,
asking what would provide the most value to consumers.
56
We sought comment on whether the IoT
Labeling Program should include IoT “devices” or “products,”
57
and proposed that those eligible should
include intentional radiators that generate and emit radio frequency (RF) energy by radiation or
induction.
58
Additionally, the IoT Labeling NPRM sought comment on whether to focus on consumer IoT
or to include enterprise IoT.
59
15. As described below, the record supports adopting an IoT Labeling Program that
encompasses consumer-focused IoT products. We focus our IoT Labeling Program initially on consumer
IoT products, rather than enterprise or industrial IoT products. Because medical devices regulated by the
U.S. Food and Drug Administration (FDA) already are subject to statutory and regulatory cybersecurity
requirements under other federal laws more specifically focused on such devices, we do not include such
53
Paul Cabral Comments at 1; Bryce Gilchrist Comments at 1; Kenneth Johnson Comments at 1; see also Internet
Safety Labs Comments at 2 (recommending that the IoT Labeling Program become mandatory over time).
54
See Michael Ravnitzky Comments at 1 (Ravnitzky).
55
Id.
56
IoT Labeling NPRM at 6, para. 10.
57
Id. at 8, para. 13.
58
Id. at 7, para. 12.
59
Id. at 8, para. 16.
Federal Communications Commission FCC 24-26
10
devices in our IoT Labeling Program. In addition, we exclude from this program motor vehicles
60
and
motor vehicle equipment
61
given that the National Highway Traffic Safety Administration (NHTSA) “has
the authority to promulgate motor vehicle safety regulations on cybersecurity and has enforcement
authority to secure recalls of motor vehicles and motor vehicle equipment with a safety-related defect,
including one involving cybersecurity flaws.”
62
We also exclude from our IoT Labeling program any
communications equipment on the Covered List that the Commission maintains pursuant to the Secure
and Trusted Communications Networks Act and equipment produced by certain other entities as
discussed below. Finally, our initial IoT Labeling Program will focus on wireless consumer IoT devices
consistent with the core of our section 302 authority governing the interference potential of devices that
emit radio frequency energy—and thus we exclude wired IoT devices at this time.
16. Definition of IoT Devices. Although we focus our IoT Labeling program on IoT
“products,” to lay a foundation we must first address the definition of IoT “devices” because this
definition is a building block of the IoT “product” definition. In this respect, we adopt the modified
version of the NIST definition of “IoT device” that the Commission proposed in the IoT Labeling
NPRM.
63
Specifically, the IoT Labeling NPRM proposed defining an IoT device to include (1) an
Internet-connected device capable of intentionally emitting RF energy that has at least one transducer
(sensor or actuator) for interacting directly with the physical world, coupled with (2) at least one network
interface (e.g., Wi-Fi, Bluetooth) for interfacing with the digital world.
64
This definition builds on NIST’s
definition by adding “Internet-connected” as a requirement, because “a key component of IoT is the usage
of standard Internet protocols for functionality.”
65
The modified definition adopted today also adds that a
device must be “capable of intentionally emitting RF energy,” because aspects of the Commission’s
authority recognizes the particular risks of harmful interference associated with such devices. It should be
noted that we direct the Label Administrator to collaborate with Cybersecurity Label Administrators
(CLAs) and other stakeholders (e.g., cyber experts from industry, government, and academia) as
60
Motor Vehicle “means a vehicle driven or drawn by mechanical power and manufactured primarily for use on
public streets, roads, and highways, but does not include a vehicle operated only on a rail line.” 49 U.S.C. §§
30102(7).
61
Motor Vehicle Equipment “means - (A) any system, part, or component of a motor vehicle as originally
manufactured; (B) any similar part or component manufactured or sold for replacement or improvement of a system,
part, or component, or as an accessory or addition to a motor vehicle; or (C) any device or an article or apparel,
including a motorcycle helmet and excluding medicine or eyeglasses prescribed by a licensed practitioner, that – (i)
is not a system, part, or component of a motor vehicle; and (ii) is manufactured, sold, delivered, or offered to be sold
for use on public streets, roads, and highways with the apparent purpose of safeguarding users of motor vehicles
against risk of accident, injury, or death.” 49 U.S.C. §§ 30102(8).
62
Letter from Tara Hairston, Senior Director – Technology Policy, Alliance for Automotive Innovation, to Marlene
H. Dortch, Secretary, FCC, PS Docket No. 23-239, at 9 (filed March 8, 2024) (Auto Innovators Ex Parte) (noting
the NHTSA Cyber Best Practices for Motor Vehicles leverages the NIST framework); Letter from J. David
Grossman, Vice President, Regulatory Affairs and Mike Bergman, Vice President, Technology & Standards,
Consumer Technology Association, to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, at 9 (filed March
4, 2024) (CTA March Ex Parte).
63
IoT Labeling NPRM at 7, para. 11.
64
Id.
65
Id. (citing NISTIR 8425 at 23). As with the NIST definition, our definition specifically “excludes common
general purpose computing equipment (e.g., personal computers, smartphones) as well as routers.” NIST White
Paper at page 3, note 3. See also Letter from David Valdez, Vice President, Privacy & Cybersecurity Policy, CTIA,
to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, at 1-2 (filed March 6, 2024) (CTIA Ex Parte); Letter
from Katie McAuliffe, Senior Director, Telecom Policy, Information Technology Industry Council, to Marlene H.
Dortch, Secretary, FCC, PS Docket No. 23-239, at 2 (filed March 7, 2024) (ITI Ex Parte); Letter from Grace
Burkard, Director of Operations, ioXt Alliance, to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, at 2
(filed March 7, 2024) (ioXt Ex Parte).
Federal Communications Commission FCC 24-26
11
appropriate and recommend within 45 days of publication of updates or changes to NIST guidelines, or
adoption by NIST of new guidelines, to the FCC any appropriate modifications to the Labeling Program
standards and testing procedures to stay aligned with the NIST guidelines.
66
17. The record supports this reasoning. For example, Consumer Reports states that “[i]f
you’re going to sell a device where some of the benefits come from having a cloud connection, an app,
and connectivity, then those must also be secured.”
67
Consumer Reports provides further support for the
Commission’s reasoning by noting that “connectivity may be so central to the functionality of the device
that it may no longer be able to operate safely [without it].”
68
TIC Council Americas similarly “agrees
that ‘internet-connected’ should be included in the definition of IoT devices.”
69
We agree with these
arguments and adopt the modified IoT device definition requiring “Internet-connected” device element to
assure consumers that the functionality of the IoT device or product displaying the Cyber Trust Mark is
reasonably secure as well. As noted by ioXt Alliance, including “Internet-connected” in the definition of
IoT makes “sense if the program focuses on IoT products instead of devices because not all IoT devices
are ‘internet-connected.’”
70
Because the IoT Labeling Program will be focused on the broader category of
IoT consumer products and not devices, including “Internet-connected” in the definition of IoT device is
further justified.
18. We disagree with commenters who argue the Commission should adopt the NIST
definition of a device without change.
71
We acknowledge that the record indicates some concern
regarding the Internet-connected element of the Commission’s proposed definition; however, we find
these concerns to be misplaced. TIC Council Americas, for example, supports adding “Internet-
connected” to the definition, but argues that “there are devices that are able to connect to non-internet
connected networks, and that those devices should not be excluded from the program.”
72
While we do not
foreclose the possibility of expanding the IoT Labeling Program to devices on non-internet connected
networks in the future, we focus initially on the more common category of Internet-connected consumer
IoT products. Others argue that “Internet-connected” is too “situational,”
73
with a concern that the device
might become “disconnected from the internet and, therefore, no longer be an ‘IoT device.’”
74
We do not
agree that “Internet-connected device” must be interpreted so narrowly as to exclude from the IoT
Labeling Program devices that may become disconnected from the Internet. “Internet-connected,” in
terms of the IoT Labeling Program, applies to the functional capability of the device; if the device is
capable of being connected to the Internet, the fact that it may not be connected at any given point in time
does not exclude its eligibility for participation in the IoT Labeling Program. Further, any potential
concerns arising from requiring an IoT device be “Internet-connected” for inclusion in the IoT Labeling
Program are outweighed by the benefit of giving consumers further assurance that the security of their
IoT device or product extends to the connected functionality that a consumer expects when making such a
purchase. In this respect, including “Internet-connected” in the definition of IoT device also recognizes
the highest risk functional component of an IoT device that distinguishes “smart” devices from other
devices a consumer may use, and allows the Cyber Trust Mark to more effectively support consumer
expectations.
66
See infra para. 53.
67
Consumer Reports Comments at 6.
68
Id. at 26.
69
TIC Council Americas Comments at 3.
70
ioXt Alliance Comments at 7-8.
71
Connectivity Standards Alliance Comments at 3 (CSA); AIM Comments at 2.
72
TIC Council Americas Comments at 3.
73
CSA Comments at 2.
74
Id.
Federal Communications Commission FCC 24-26
12
19. The record also supports adding an RF energy-emitting element to the IoT device
definition, acknowledging the Commission’s authority under Section 302 governing the interference
potential of devices that emit RF energy and can cause harmful interference to radio communications.
75
We reject the argument that limiting the definition to RF-emitting devices may lead to marketplace
confusion if a product does not bear the Cyber Trust Mark due solely to its lack of RF energy emissions.
76
In the first instance, we note the need to launch an achievable IoT Labeling Program consistent with the
Commission’s core authority. We also note that the benefits that a focus on wireless products will have in
elevating the overall cybersecurity posture of the IoT ecosystem, especially in view of the record
indicating that the majority of IoT devices are wireless,
77
outweigh the risks associated with concerns
regarding marketplace confusion. In any case, there will be a number of products – both wired and
wireless – that do not bear the Cyber Trust Mark while uptake occurs. We also anticipate that consumer
education in this space will help alleviate these concerns.
20. We further disagree with the view that the capability of a device to emit RF radiation is
“unrelated to the general, far-ranging cybersecurity concerns the Commission is confronting in this
proceeding.”
78
Instead, we agree with Comcast that interference caused by a [distributed denial of
service] attack raises “the same policy concerns and has the same practical effect as interference caused
by traditional means.”
79
EPIC explains how hackers exploit unpatched vulnerabilities to attack a large
number of wireless devices, and turning them into signal jammers to take down mobile networks.
80
The
record thus bears out our view that cybersecurity vulnerabilities in wireless IoT devices could cause
harmful interference to radio communications. Given Congress’ direction to the Commission in Section
302 of the Act to guard against the interference potential of wireless devices, requiring the element of
“emitting RF energy interference” in the IoT device definition for the initial iteration of the IoT Labeling
Program focuses on that core Commission authority without ruling out future action regarding wired IoT
devices.
81
Further, while we acknowledge that devices that unintentionally or incidentally emit RF
radiation may also pose interference potential, we find that a focus initially on “intentional” radiators
provides the ability of a nascent program to target products with the highest risk profile from among those
that emit RF energy.
21. Definition of IoT Products. We adopt the NIST definition of an “IoT product.”
82
Specifically, the IoT Labeling NPRM’s proposed definition of IoT product is an “IoT device and any
additional product components (e.g., backend, gateway, mobile app) that are necessary to use the IoT
device beyond basic operational features.”
83
The record supports adopting the IoT product definition
developed by NIST, with Garmin International, Inc. (Garmin) noting that a fundamental purpose of the
75
Comcast Comments at 13 (“Specifically, the text and history of Section 302 strongly support the arguments set
forth in the NPRM that the Commission has the authority to move forward with the program.”); CTA Comments at
8 (“Therefore, the Commission’s proposal to establish rules … for this voluntary labeling program fall within the
scope of the FCC’s Section 302 authorities.”).
76
CSA Comments at 3; see also AIM Comments at 2 (noting potential confusion from limiting the NIST definition).
We also note that for now, we are limiting the class of devices eligible for the Cyber Trust Mark to wireless
intentional radiators, as discussed in para. 37, infra.
77
Consumer Reports Reply at 3 (explaining that “wireless devices are the majority of IoT devices.”).
78
USTelecom Comments at 13; see also CTIA Reply at 4 (“Attacks that seek to weaponize radiofrequency
interference, while theoretically possible, are not a major risk.”).
79
Comcast Comments at 15.
80
EPIC Reply at 5.
81
We discuss further below our initial focus of the IoT Labeling Program on wireless devices. See infra paras. 37-
39.
82
IoT Labeling NPRM at 8, para. 13.
83
Id.
Federal Communications Commission FCC 24-26
13
IoT Labeling Program “is to inform consumers regarding device security as they evaluate potential IoT
purchases. . . . [T]his purpose is best achieved by focusing on ‘consumer IoT products’ as defined by
NIST in NISTIR 8425.”
84
Additionally, Kaiser Permanente states that adopting the NIST definition of
IoT products will “promote consistency across federal agency programs and related industry norms and
requirements.”
85
Further, the Information Technology Industry Council (ITI) explained that the
“Commission’s implementation of the program will be more successful if it aligns as closely as possible
to the definitions, processes and procedures already outlined by NIST.”
86
We agree with these
commenters, in that adopting NIST’s IoT product definition will allow for consistency in the treatment of
programmatic elements across the federal government, and allow the Commission to appropriately
leverage the work existing in this space to promote the IoT Labeling Program’s success. We also note
that no commenters opposed the NIST definition of IoT products. For purposes of the IoT Labeling
Program, when discussing IoT products and their “components” in this Order, we are using the NISTIR
8425 scoping definition of “components.” We believe that this definition allows the IoT Labeling
Program to address the most relevant “package” components expected by consumers to be securable
when making purchasing decisions, and encompasses the appropriate level of “component” pieces to
address the functionalities that generate the most salient cybersecurity risks.
87
This view is supported by
the record, with CTA providing a proposed testing framework where “all individual components provided
by the manufacturer should be in scope for testing,” including all components of the IoT product “that are
necessary for the device to function in a normal use case scenario.”
88
22. IoT Devices vs. IoT Products. We find that the IoT Labeling Program should apply to
“IoT products” as defined above, rather than being limited only to “IoT devices.” In the IoT Labeling
NPRM, the Commission noted that it was important to ensure that the IoT Labeling Program “would be
sufficiently inclusive to be of value to consumers.”
89
Since the Commission’s adoption of the IoT
Labeling NPRM, NIST has provided clarity in this realm by stating “the cybersecurity technical and non-
technical outcomes defined in the NISTIR 8425 consumer profile apply to IoT products and not just IoT
devices.”
90
In addition, in reviewing the record, we believe applying the IoT Labeling Program to IoT
products instead of IoT devices alone achieves these priorities because only by addressing the full
functionality of a consumer product (i.e., one or more IoT devices and any additional product components
(e.g., backend, gateway, mobile app) that are necessary to use the IoT device, beyond basic operational
features) “including data communications links to components outside this scope but excluding those
external components and any external third-party components that are outside the manufacturer’s
control”
91
will provide consumers the necessary scope to satisfy the basic security expectation of the
84
Garmin International, Inc. Comments at 6 (Garmin); see also Everything Set, Inc. Comments at 3 (“We believe
the cybersecurity labeling program should be focused on IoT products consistent with the NIST definition.”).
85
Kaiser Permanente Comments at 2.
86
Information Technology Industry Council Comments at 4 (ITI).
87
For purposes of the IoT Labeling Program, the NISTIR 8425 scoping definition of “components” falls into three
main types: Specialty networking/gateway hardware (e.g., a hub within the system where the IoT device is used);
Companion application software (e.g., a mobile app for communicating with the IoT device); and Backends (e.g., a
cloud service, or multiple services, that may store and/or process data from the IoT device). See NISTIR 8425 at 2.
Our use of this scoping definition of “components” is intended only to apply to the IoT Labeling program. We note
that Commission rules use the term “components” in a variety or contexts and different rule provisions, and we are
not intending to affect the use of that term in those other contexts.
88
Letter from J. David Grossman, Vice President, Regulatory Affairs, CTA, to Marlene H. Dortch, Secretary, FCC,
PS Docket No. 23-239, at 9 (filed Feb. 8, 2024) (CTA Ex Parte).
89
IoT Labeling NPRM at 6, para. 10.
90
NIST IoT Product Component Requirements Essay at 1.
91
CTA March Ex Parte Appx B, at 1.
Federal Communications Commission FCC 24-26
14
consumer and effectuate a discernable increase in the cybersecurity posture of the IoT ecosystem at
large.
92
23. There is significant support in the record for an IoT product focus for the IoT Labeling
Program.
93
As explained by UL Solutions, applying the IoT Labeling Program to IoT products is
necessary since “most IoT devices sold to consumers cannot be meaningfully used without additional
components.”
94
The Cybersecurity Coalition further supports this position by saying “IoT devices are
typically part of a broader ecosystem of components that can have their own security issues, requiring
‘IoT cybersecurity’ to extend beyond individual devices to be effective.”
95
ITI notes an IoT product focus
benefits consumers because it “will appropriately capture the relevant devices/components of the product
that could be vulnerable to attack (and are always included in an IoT product, as NIST points out).”
96
Applying the IoT Labeling Program to IoT products further benefits consumers by promoting consumer
safety because it “encourages manufacturers to prioritize security across all components, ultimately
leading to safer and more reliable IoT experiences for consumers.”
97
Additionally, the record indicates
that “the entire service which includes cloud infrastructure as well as apps or other ways to control or
manage the device by the user, and not simply the physical device itself, is critical for an assessment of
safety and security.”
98
Further, focusing on IoT products aligns not only with the technical requirements
of NISTIR 8425, but also “emerging requirements in Europe and the UK, such as the EU [Cyber
Resilience Act], and EU Directives on consumer protections EU 2019/770, 771.”
99
We agree and will
apply the IoT Labeling Program to consumer IoT products, which provides for the greatest level of
consumer benefit by prioritizing cybersecurity across the entirety of the consumer product, as compared
to just the device, which is able to perform its full functionality only when working in conjunction with
other product components.
24. We disagree with Samsung, CTIA, LG Electronics, and CTA, who advocate focusing on
IoT devices instead of IoT products.
100
Samsung and CTIA argue that cybersecurity standards for devices
are more mature than standards for products,
101
and CTA argues that applying the FCC IoT Label to
92
We recognize that the amount of control manufacturers have over third-party components may vary depending on
specific circumstances. If manufacturers have the ability to control third-party components through a contractual
basis or other means, we expect they will undertake a good faith effort to do so.
93
See, e.g., Cybersecurity Coalition Comments at 3; UL Solutions Comments at 2; IEEE 802 LAN/MAN Standards
Committee at 3; ITI Comments at 2; International Speech and Communication Association Special Interest Group:
Security and Privacy in Speech Communication Comments at 2 (ISCA); Consumer Reports Comments at 6 (“The
definition of an IoT device must include all elements of an IoT system.”); Connected Consumer Device Security
Council (CCDS) Comments at 1-2.
94
UL Solutions Comments at 2.
95
Cybersecurity Coalition Comments at 3.
96
ITI Comments at 3.
97
ISCA Comments at 2.
98
Everything Set, Inc. Comments at 3.
99
Letter from Dr. Amit Elazari, CEO and Co-Founder, OpenPolicy, to Marlene H. Dortch, Secretary, FCC, PS
Docket No. 23-239, at 4 (filed Jan. 24, 2024).
100
Samsung Comments at 4; CTIA Comments at 21; LG Electronics USA Inc. Comments at 1 (LG Electronics);
CTA Comments at 14.
101
See, e.g., Samsung Comments at 4 (“However, given the relative maturity of IoT device cybersecurity criteria
and standards, the Commission should focus the scope of the Program initially on IoT devices….”); see also CTIA
Comments at 21 (“Because many frameworks and resources in the market, including the NISTIR 8259 series upon
which the Commission seeks to build the program, are focused on device-level criteria, widening the scope of the
program to encompass the entire IoT “product” would create significant complications….”).
Federal Communications Commission FCC 24-26
15
products would be more complex than devices.
102
LG Electronics expresses concern that expanding to
products “would require device manufacturers to attest to the security of product components that are
outside of their control.”
103
We do not agree that these rationales support limiting application of the IoT
Labeling Program only to devices, rather than products. First, applying the IoT Labeling Program
narrowly to IoT devices would run counter to NIST’s guidance and considerable work in this space, upon
which the Commission has relied for the basis for the IoT Labeling Program proposal. NIST’s Profile of
the IoT Core Baseline for Consumer IoT Products (NISTIR 8425), discussed above, provides
fundamental IoT guidelines and applies to the broader product category,
104
and the more recent NIST IoT
Product Component Requirements Essay clearly states that the outcomes listed in NISTIR 8425 apply to
consumer IoT products and not just IoT devices.
105
25. Further, regarding the notion that the IoT Labeling Program should be focused on IoT
devices because existing standards for IoT devices are more readily available or achievable in the near
term, we counter that the record shows existing IoT device standards can be leveraged to support
assessing IoT products as well. As noted by commenter ITI, existing IoT industry standards “capture
similar baseline themes” to the NIST criteria.
106
In view of these similarities, the IoT Labeling Program
can leverage these existing standards for IoT devices as building blocks, and tailor them in view of the
IoT products being assessed. Accordingly, the need to realize the benefits of a product-level label weigh
in favor of taking a small amount of time to get to product-based standards by leveraging existing device
standards.
26. We also reject the argument that because “cybersecurity frameworks and testing
programs have been developed to focus on device-level—rather than product-level—assessment” that a
device-level IoT Labeling Program is the appropriate outcome.
107
We note, for example, that ITI
recommends recognizing IoT security assessments from our international partners, such as IoT
assessments under the Cybersecurity Labelling Scheme (CLS) by Singapore’s Cyber Security Agency,
which assesses the overall IoT product, and not just a single device included in the IoT product.
108
In this
regard, the ability to recognize international efficiencies for IoT Labeling Program participants would be
hindered by limiting the Cyber Trust Mark to the device level, as Singapore’s CLS (and other evolving
international standards) focus on product-level assessments.
27. Finally, applying the IoT Labeling Program to products enhances value to consumers
without requiring manufacturers to be responsible for products or devices that are outside of their control.
The record shows that a consumer’s expectation of security extends to the entire IoT product they
purchase. This consumer expectation is evidenced in the record by ITI, clarifying that “because
consumers purchase, interact with, and view IoT merchandise not as component parts but as complete
physical product . . . Consumers are primarily concerned with the entire physical product they are
102
CTA Comments at 14.
103
LG Electronics Comments at 1.
104
See generally NISTIR 8425.
105
NIST IoT Product Component Requirements Essay at 1.
106
ITI Comments at 6.
107
Letter from David Valdez, Vice President, Privacy & Cybersecurity Policy, CTIA, to Marlene H. Dortch,
Secretary, FCC, PS Docket No. 23-239, at 4 (filed Jan. 8, 2024) (CTIA Ex Parte).
108
ITI Comments at 6; Singapore Cyber Security Agency, Cybersecurity Labelling Scheme for IoT Publication No.
2 at 10 (Sept. 2023), https://www.csa.gov.sg/docs/default-source/our-programmes/certification-and-labelling-
scheme/cls/publications/-pub-ccc-sp-151-2-cls(iot)-scheme-specifications-v1.3.pdf?sfvrsn=5c9ace5f_1
[https://perma.cc/3C2J-QWXE] (requiring the testing lab to “determine if the firmware and companion mobile
application of the Device Under Test (DUT) is free from common software errors such as buffer overflown [sic],
known vulnerabilities in any of the third-party libraries being used, and known malware.” [emphasis added]).
Federal Communications Commission FCC 24-26
16
purchasing.”
109
Additionally, as noted by UL Solutions, “most IoT devices sold to consumers cannot be
meaningfully used without additional components.”
110
In view of this need, a manufacturer seeking
authority to affix the FCC IoT Label is expected to secure the whole IoT product, including the product’s
internal communication links connecting the different parts of the product to each other as well as the
product’s communication links that connect the IoT product to the outside world. We do not require
manufacturers to be responsible for third-party products or devices (including apps) that are outside of
their control;
111
however, where a manufacturer allows third-party apps, for example, to connect to and
they allow that application to control their IoT product, such manufacturer is responsible for the security
of that connection link and the app if such app resides on the IoT product. Further, we agree with CTIA
that if “a [p]roduct [c]omponent also support[s] other IoT Products through alternative features and
interfaces, these alternative features and interfaces may, through risk-assessment, be considered as
separate from and not part of the IoT Product for purposes of authorization.”
112
Moreover, NIST
enumerates the dangers of an IoT device-only focus, establishing that the “additional product components
have access to the IoT device and the data it creates and uses-making them potential attack vectors that
could impact the IoT device, customer, and others,”
113
and that “these additional components can
introduce new or unique risks to the IoT product.”
114
Consumer expectations that the FCC IoT Label
would apply to the entirety of the product purchased is further highlighted by Consumer Reports,
explaining that “If everything is sold within a box, then everything in the box should be approved to use
the mark.”
115
Consumer Reports also notes that “[i]f the labeling programs were only to address the
physical device and not other system components, consumers would likely be deceived as to the scope
and efficacy of the program.”
116
The record is adamant that the “Cyber Trust Mark must be trusted by
consumers to be successful.”
117
In view of the record, securing only a portion of an IoT product by just
assessing a single IoT device included in the IoT product, instead of assessing the devices and
components that comprise the IoT product holistically, could deceive consumers and go against consumer
expectation that the technology being brought into their homes is reasonably secure. We weigh heavily
the likelihood for consumer confusion should the device-only approach be taken, and accordingly we
apply this consumer IoT Labeling Program to IoT products and not just IoT devices.
28. In sum, although there are relative advantages and disadvantages with either a narrow
focus on IoT devices or a broader focus on IoT products, on balance we are persuaded to focus our initial
IoT Labeling Program on IoT products. As explained above, we find commenters’ concerns about
encompassing full IoT products in our IoT Labeling Program to be overstated. At the same time, we see
significant shortcomings with a narrower focus just on IoT devices. Weighing the totality of these
considerations, we are persuaded that targeting the IoT Labeling Program on IoT products is the best
approach at this time.
109
ITI Comments at 4.
110
UL Solutions Comments at 2.
111
To further clarify, nothing in this item prohibits manufacturers from allowing product owners from installing the
software of their choice, from disabling security features, or from replacing or modifying components of a product,
including the firmware and software. An IoT manufacturer cannot be held responsible for the owner’s decision to
make such changes, just as a traditional product manufacturer cannot be responsible for the actions of a consumer
who modifies the core mechanisms of a product and thereby risks rendering it unsafe. However, we reiterate that in
order to be authorized to use the FCC IoT Label, manufacturers must meet the requirements of the program.
112
CTA March Ex Parte, Appx B at 2.
113
NISTIR 8425 at 3.
114
Id.
115
Consumer Reports Comments at 6.
116
Id.
117
Whirlpool Corporation Comments at 6 (Whirlpool).
Federal Communications Commission FCC 24-26
17
29. Consumer IoT Products vs. Enterprise IoT Products. The IoT Labeling NPRM sought
comment on whether we should focus the IoT Labeling Program on IoT products intended for consumer
use or include products intended for industrial or business use.
118
Specifically, the IoT Labeling NPRM
noted that “IoT devices and products have proliferated not only in the non-enterprise space, but also in the
workplace from office settings to field settings, from medical settings to industrial settings.”
119
The IoT
Labeling Program we adopt today applies to the labeling of consumer IoT products that are intended for
consumer use,
120
and does not include products that are primarily intended to be used in manufacturing,
healthcare, industrial control, or other enterprise applications. While we do not foreclose expansion of the
IoT Labeling Program at a later date, this initial scope will provide value to consumers most efficiently
and expediently, without added complexity from the enterprise environment.
30. The record supports the IoT Labeling Program having a consumer IoT focus, with
support provided by UL Solutions, the Cybersecurity Coalition, and the Connectivity Standards Alliance,
among others.
121
The FDA also suggests that IoT outside of the consumer scope may need “[g]reater and
more tailored controls,” suggesting that different considerations might attend IoT with a purpose outside
of that in the routine consumer realm.
122
Additionally, commenters highlight the differing security needs
of consumer and enterprise products.
123
For example, UL Solutions notes that “IoT products intended for
commercial or industrial settings are exposed to different types of threats than consumer products and
often carry higher risk if breach, which necessitates different requirements.”
124
CSA also highlights that
“[e]nterprise device security approaches are often customized and vary based on the specific needs of the
business.”
125
We agree that applying the IoT Labeling Program to consumer IoT products will reduce
complexity, which will bolster the likelihood of success when starting the new IoT Labeling Program.
31. ISCA supports including enterprise IoT, stating that a broader scope will ensure the IoT
Labeling Program remains flexible to the extent that the boundary between consumer and enterprise IoT
is blurring.
126
Further, ISCA and Abhishek Bhattacharyya note that attackers have more to gain from
targeting enterprise settings.
127
While there are considerable threat vectors and vulnerabilities associated
118
IoT Labeling NPRM at 8, para. 16.
119
Id.
120
Some of the IoT devices and products that are intended for consumer use include smart thermostats, smart lights,
smart locks, smart cameras, smart watches and fitness trackers. See Philips Healthcare Comments at 2 (listing smart
doorbells and smart thermostats as examples of consumer IoT products).
121
UL Solutions Comments at 2; Cybersecurity Coalition Comments at 4 (“The Commission should leverage [the]
existing work on consumer IoT and not delay implementation of a consumer-focused label by attempting to cover
non-consumer products as well . . . .”); CSA Comments at iii; Consumer Reports Comments at 9 (“[B]idirectional
communications devices that interact with an enterprise, medical, or utility network” should be outside the scope of
the IoT Labeling Program.); see also ioXt Alliance Reply at 4; IEEE 802 LAN/MAN Standards Committee
Comments at 3; Medical Imaging & Technology Alliance Comments at 2; National Electronic Manufacturers
Association Comments at 5 (NEMA); Garmin Comments at 9; TIC Council Americas Comments at 3; ITI
Comments at 2. But see Kaiser Permanente Comments at 2-3 (arguing the Commission should include devices and
products used by consumers, corporations and organizations across all industries, but exclude devices and products
identified to pose an unacceptable risk to national security).
122
Center for Devices and Radiological Health, U.S. Food and Drug Administration Comments at 5 (FDA).
123
See, e.g., UL Solutions Comments at 2; CSA Comments at 5.
124
UL Solutions Comments at 2.
125
CSA Comments at 5.
126
ISCA Comments at 2.
127
Id.; Abhishek Bhattacharyya Comments at 1.
Federal Communications Commission FCC 24-26
18
with all classes of IoT products,
128
we agree with Everything Set, Inc., that focusing the IoT Labeling
Program on household use of IoT products will be more useful and have greater impact, given that
enterprises tend to have more time, resources, and expertise to devote to network security.
129
They note
further that many small- and medium-sized businesses also buy consumer devices, so a consumer-focused
Cyber Trust Mark would be of utility to them, as well.
130
We believe in the near term that a consumer
focus will provide the most initial impact, and create a level of recognition and trust in the Cyber Trust
Mark itself as the IoT Labeling Program progresses that could be leveraged to enterprise IoT at a later
time, and we therefore defer consideration of the IoT Labeling Program’s expansion.
32. Exclusion of Certain Devices/Products. As an initial matter, we exclude from the IoT
Labeling Program medical devices regulated by the U.S. Food and Drug Administration (FDA).
131
The
Center for Devices and Radiological Health (within the FDA) expresses concern that the Commission’s
labeling IoT Labeling Program may lack controls and minimum criteria that it believes are necessary for
IoT medical devices.
132
In addition, the FDA is concerned that including medical devices in the IoT
Labeling Program may cause consumer confusion and “potentially creates conflict where product
manufacturers attempt to both qualify for the Cyber Trust Mark and comply with existing statutory and
regulatory cybersecurity requirements under other federal laws, such as the Federal Food, Drug, and
Cosmetic Act (FD&C Act).”
133
These considerations persuade us to exclude FDA-regulated medical
devices from our IoT Labeling Program, consistent with commenters’ recommendations. In addition, we
exclude from this program motor vehicles
134
and motor vehicle equipment
135
given that the National
128
There are many types IoT devices and products, which may be divided into various categories or classes based on
their purpose, application, and functionality. These classes of IoT devices and products include smart home (e.g.,
smart thermostats, smart lights, smart locks, smart cameras), wearables (e.g., fitness trackers, smart watches), and
Healthcare (e.g., remote patient monitoring devices, smart medical equipment). It is worth noting that not all IoT
devices or products are created equal, in terms of features, security and the level of risk they present. Additionally,
from security standpoint, an IoT product that is appropriate for consumer or home use may not be suitable for
industrial or enterprise environment. These differences suggest the need for different security standards that
distinguish between low-risk, medium-risk and high-risk applications. Our approach to identifying the specific
cybersecurity standards to apply enables us to appropriately account for that in the case of particular wireless
consumer products (or categories of such products) in our initial implementation of the IoT Labeling Program.
129
Everything Set, Inc. Comments at 3.
130
Id.
131
See, e.g., FDA Comments at 1; Consumer Reports Comments at 15 (arguing the Commission’s labeling program
should not supersede the Consolidated Appropriations Act of 2023, which includes cybersecurity rules covering
medical devices, including connected consumer devices such as thermometers or CPAP machines); Kevin Fu
Comments at 1 (recommending the program explicitly exclude FDA-regulated medical devices from its scope “to
prevent a weakening of the more rigorous FDA expectations of cybersecurity engineering”); Phillips Healthcare
Comments at 2 (stating FDA requirements often go beyond what would be required in the proposed FCC program
and that including medical devices in this labeling program would create confusion among users by providing an
incorrect signal that an FDA-cleared medical device without the Cyber Trust Mark does not maintain high
cybersecurity standards); NTCA Reply at 4.
132
FDA Comments at 1.
133
Id.
134
Motor Vehicle “means a vehicle driven or drawn by mechanical power and manufactured primarily for use on
public streets, roads, and highways, but does not include a vehicle operated only on a rail line.” 49 U.S.C. §§
30102(7).
135
Motor Vehicle Equipment “means - (A) any system, part, or component of a motor vehicle as originally
manufactured; (B) any similar part or component manufactured or sold for replacement or improvement of a system,
part, or component, or as an accessory or addition to a motor vehicle; or (C) any device or an article or apparel,
including a motorcycle helmet and excluding medicine or eyeglasses prescribed by a licensed practitioner, that – (i)
is not a system, part, or component of a motor vehicle; and (ii) is manufactured, sold, delivered, or offered to be sold
(continued….)
Federal Communications Commission FCC 24-26
19
Highway Traffic Safety Administration (NHTSA) “has the authority to promulgate motor vehicle safety
regulations on cybersecurity and has enforcement authority to secure recalls of motor vehicles and motor
vehicle equipment with a safety-related defect, including one involving cybersecurity flaws.”
136
33. Exclusion of Devices/Products Produced by Certain Entities. We adopt the following
measures to promote national security in connection with the IoT Labeling Program. The IoT Labeling
NPRM proposed to exclude from the IoT Labeling Program (1) any communications equipment on the
Covered List maintained by the Commission pursuant to section 2 of the Secure and Trusted
Communications Networks Act (STCNA);
137
(2) any IoT device produced by an entity identified on the
Covered List (i.e., an entity named or any of its subsidiaries or affiliates) as producing “covered”
equipment; and (3) any device or product from a company named on certain other lists maintained by
other federal agencies that represent the findings of a national security review.
138
We now adopt all of
these prohibitions as they relate to our decision to focus the IoT Labeling Program on consumer IoT
products. Thus, any communications equipment identified on the Covered List, now or in the future, will
be ineligible for the IoT Labeling Program, and any such product will be denied approval to use the Cyber
Trust Mark. Furthermore, any additional products produced by an entity identified on the Covered List as
producing “covered” equipment, or any product containing devices or product components produced by
such an entity, will be ineligible for the IoT Labeling Program; this would include products that may not
fit within the definition of “communications equipment” under STCNA.
139
Only entities identified on the
Covered List as producers of “covered” equipment—not those on the Covered List only because of their
“covered” services—are subject to this prohibition.
140
In addition, we adopt the proposal that IoT devices
or products containing devices manufactured by companies named on the Department of Commerce’s
Entity List,
141
named on the Department of Defense’s List of Chinese Military Companies,
142
or
for use on public streets, roads, and highways with the apparent purpose of safeguarding users of motor vehicles
against risk of accident, injury, or death.” 49 U.S.C. §§ 30102(8).
136
Auto Innovators Ex Parte (noting the NHTSA Cyber Best Practices for Motor Vehicles leverages the NIST
framework); CTA March Ex Parte.
137
The Secure and Trusted Communications Networks Act of 2019 requires the Commission to publish a list of
“covered” communications equipment that, among others, “poses an unacceptable risk to the national security of the
United States or the security and safety of United States persons.” Secure and Trusted Communications Networks
Act of 2019, Pub. L. No. 116-124, 133 Stat. 158, § 1603(b)(1) (2020) (codified as amended at 47 U.S.C. §§ 1601–
1609). As of March 14, 2024, the Covered List includes telecommunications and video surveillance equipment
produced by Huawei Technologies Company, ZTE Corporation, Hangzhou Hikvision Digital Technology Company,
Dahua Technology Company, and by any of these entities’ subsidiaries or affiliates. See FCC, List of Equipment
and Services Covered By Section 2 of The Secure Networks Act (Oct. 6, 2023),
https://www.fcc.gov/supplychain/coveredlist [https://perma.cc/7EJ4-SDCE].
138
IoT Labeling NPRM at 9, para. 18.
139
See 47 U.S.C. § 1608(4); 47 CFR § 1.50001(c).
140
As of March 14, 2024, this includes Huawei Technologies Company, ZTE Corporation, Hangzhou Hikvision
Digital Technology Company, Dahua Technology Company, and their subsidiaries and affiliates. See FCC, List of
Equipment and Services Covered By Section 2 of The Secure Networks Act (Oct. 6, 2023),
https://www.fcc.gov/supplychain/coveredlist [https://perma.cc/7EJ4-SDCE].
141
See Bureau of Industry and Security, U.S. Department of Commerce, Supplement No. 4 to Part 744 – Entity List
(2023), https://www.bis.doc.gov/index.php/documents/regulations-docs/2326-supplement-no-4-to-part-744-entity-
list-4/file [https://perma.cc/STW5-B8GW]; see also CTIA Comments at 39-40; Cybersecurity Coalition Comments
at 4; USTelecom Comments at 2 (recommending excluding entities that appear on this list from the labeling
program).
142
See U.S. Department of Defense, Entities Identified as Chinese Military Companies Operating in the United
States in Accordance with Section 1260H of the William M. (“Mac”) Thornberry National Defense Authorization
Act for Fiscal Year 2021 (Public Law 116-283), Tranche 2 (2022),
(continued….)
Federal Communications Commission FCC 24-26
20
suspended or debarred from receiving federal procurements or financial awards, including those
published as ineligible for award on the General Service Administration’s System for Award
Management,
143
will not be authorized to display the FCC IoT Label or participate in the IoT Labeling
Program. Further, we exclude from the IoT Labeling Program any products containing devices produced
or manufactured by these entities. We conclude that inclusion on these lists represents a determination by
an agency charged with making national security determinations that a company’s products lack the
indicia of trustworthiness that the Cyber Trust Mark is intended to represent. Our action here thus
supports and reinforces the steps we have taken in other proceedings to safeguard consumers and
communications networks from equipment that poses an unacceptable risk to national security and that
other federal agencies have taken to identify potential concerns that could seriously jeopardize the
national security and law enforcement interests of the United States.
144
34. With the exception of China’s comments raising the same WTO issue we rejected in the
Report and Order applying the Covered List to the FCC equipment authorization program,
145
the record
overwhelmingly supports excluding from the IoT Labeling Program these products and devices produced
by companies identified on the Covered List.
146
Additionally, USTelecom, CTIA, CTA, Cybersecurity
Coalition and Consumer Reports specifically support excluding from the IoT Labeling Program IoT
devices that are manufactured by companies on the Covered List,
147
but also urge the Commission to
restrict any equipment manufactured by companies on additional federal restricted lists, including those
otherwise banned from federal procurement.
148
Consumer Reports agrees with excluding systems that
https://media.defense.gov/2022/Oct/05/2003091659/-1/-1/0/1260H%20COMPANIES.PDF
[https://perma.cc/5LMA-LZLG]; see also CTIA Comments at 39-40, Cybersecurity Coalition Comments at 4, and
USTelecom Comments at 2 (recommending excluding entities that appear on this list from the labeling program).
143
See U.S. General Services Administration System for Award Management, Exclusion Types,
https://sam.gov/content/entity-information/resources/exclusion-types [https://perma.cc/5L45-LKCJ] (last visited
Feb. 15, 2024); see also CTIA Comments at 39-40 (recommending excluding entities otherwise prohibited from
federal procurement from the labeling program).
144
See, e.g., Protecting Against National Security Threats to the Communications Supply Chain Through FCC
Programs, Third Report and Order, WC Docket No. 18-89 (Jul. 14, 2021); Protecting Against National Security
Threats to the Communications Supply Chain through the Equipment Authorization Program, Protecting Against
National Security Threats to the Communications Supply Chain through the Competitive Bidding Program, Report
and Order, Order, and Further Notice of Proposed Rulemaking, ET Docket No. 21-232 and EA Docket No. 21-233
(Nov. 25, 2022).
145
See Protecting Against National Security Threats to the Communications Supply Chain through the Equipment
Authorization Program, Protecting Against National Security Threats to the Communications Supply Chain through
the Competitive Bidding Program, Report and Order, Order, and Further Notice of Proposed Rulemaking, ET
Docket No. 21-232 and EA Docket No. 21-233, at 255 (Nov. 25, 2022).
146
See ioXt Alliance Comments at 11-12; CTIA Comments at 39-41; NCTA Comments at 8; Somos Comments at
3; Kaiser Permanente Comments at 3; CTA Comments at 26; Consumer Reports Comments at 10; ITI Comments at
5-6; USTelecom Comments at 2,7; Cybersecurity Coalition Comments at 4-5; CTIA Reply Comments at 6. But see
People’s Republic of China Comments at 6 (claiming WTO Article 2.1 requires equally favorable treatment
preventing any restrictions based on the Covered List).
147
USTelecom Comments at 7-8; CTIA Comments at 39-41; CTA Comments at 26; Cybersecurity Coalition
Comments at 4-5; Consumer Reports Comments at 10.
148
See USTelecom Comments at 7-8 (Commission should also exclude devices on the following lists: FY2019
NDAA § 889; FAR § 52.204-25 (ban on federal procurement of certain equipment produced by Huawei, ZTE,
Hytera, Hikvision, Dahua); FY2023 NDAA § 5949 (ban on federal procurement of semiconductor products and
services from SMIC, CXMT, and YMTC); FAR § 52.204-23 (ban on federal procurement of Kaspersky Lab
software and hardware); Bureau of Industry and Security, U.S. Department of Commerce, Supplement No. 4 to Part
744 – Entity List (2023), https://www.bis.doc.gov/index.php/documents/regulations-docs/2326-supplement-no-4-to-
part-744-entity-list-4/file [https://perma.cc/STW5-B8GW]; U.S. Department of Defense, Entities Identified as
(continued….)
Federal Communications Commission FCC 24-26
21
include components included on the Covered List or similar lists from the IoT Labeling Program.
149
Each
of these lists represent the determination by relevant Federal agencies that the entities on the list may pose
a national security threat within their respective areas, and as such we find that we cannot separately
sanction their products as trustworthy via the IoT Labeling Program. While each list is designed to
support specific prohibitions, their use here only excludes their contents from a voluntary program
representing U.S. Government assessment of their security and does not prohibit any other use. Insofar as
the FCC IoT Label reflects the FCC’s signal to consumers about cybersecurity, it is reasonable for the
FCC to take a cautious approach especially for those products for which relevant Federal agencies have
expressed other security concerns.
35. Applicant Declaration Under Penalty of Perjury. To implement the Commission’s goal
of ensuring the Cyber Trust Mark is not affixed to products that pose a risk to national security or a risk to
public safety, we require applicants seeking authorization to use the FCC IoT Label to provide a
declaration under penalty of perjury that all of the following are true and correct:
150
(i) The product for which the applicant seeks to use the FCC IoT Label through cybersecurity
certification meets all the requirements of the IoT Labeling Program.
(ii) The applicant is not identified as an entity producing covered communications equipment on
the Covered List, established pursuant to § 1.50002 of the Commission’s rules.
(iii) The product is not comprised of “covered” equipment on the Covered List.
(iv) The product is not produced by any entity, its affiliates, or subsidiaries identified on the
Department of Commerce’s Entity List, or the Department of Defense’s List of Chinese
Military Companies.
(v) The product is not owned or controlled by or affiliated with any person or entity that has been
suspended or debarred from receiving federal procurements or financial awards, to include all
entities and individuals published as ineligible for award on the General Service
Administration’s System for Award Management.
(vi) The applicant has taken every reasonable measure to create a securable product.
(vii) The applicant will, until the support period end date disclosed in the registry, diligently
identify critical vulnerabilities
151
in our products and promptly issue software updates
correcting them, unless such updates are not reasonably needed to protect against security
failures.
(viii) The applicant will not elsewhere disclaim or otherwise attempt to limit the substantive or
procedural enforceability of this declaration or of any other representations and commitments
made on the FCC IoT Label or made for purposes of acquiring or maintaining authorization
to use it.
36. If any applicant fails to make any of the above disclosures within 20 days after being
notified of its noncompliance, such failure would result in termination of any improperly granted
authorization to use the Label, and/or subject the applicant to other enforcement measures. The applicant
Chinese Military Companies Operating in the United States in Accordance with Section 1260H of the William M.
(“Mac”) Thornberry National Defense Authorization Act for Fiscal Year 2021 (Public Law 116-283), Tranche 2
(2022), https://media.defense.gov/2022/Oct/05/2003091659/-1/-1/0/1260H%20COMPANIES.PDF
[https://perma.cc/5LMA-LZLG]); see also CTIA Comments at 39-41 (recommending entities otherwise banned
from federal procurement should also be excluded from the program); CTA Comments at 26; Cybersecurity
Coalition Comments at 4-5.
149
Consumer Reports Comments at 10.
150
47 CFR § 1.16.
151
A critical vulnerability is one that must be corrected to reasonably protect against security failures.
Federal Communications Commission FCC 24-26
22
is required to update its declaration, or withdraw a not-yet granted application, if any of the applicant’s
circumstances impacting the declarations materially change while the application is pending.
37. Wireless Consumer IoT Devices vs. Wired Consumer IoT Devices. Today’s Order adopts
the IoT Labeling NPRM’s proposal that the IoT Labeling Program apply initially to wireless consumer
IoT devices. This is consistent with the IoT Labeling NPRM proposal to focus the scope of the IoT
Labeling Program on intentional radiators that generate and emit RF energy by radiation or induction and
exclude wired-only IoT devices,
152
noting such devices are encompassed by the Commission’s section
302 authority governing the interference potential of devices that emit RF energy and can cause harmful
interference.
153
We find that this distinction is appropriate, both because of the Commission’s interest in
keeping the scope of the IoT Labeling Program clear and manageable during its debut and because there
is support in the record for wireless intentional radiators as most prevalent types of consumer IoT devices
contemplated in the IoT Labeling NPRM. While we recognize that there are other types of RF devices –
both unintentional and incidental radiators – that are subject to our jurisdiction, we are not including them
in our IoT Labeling Program at this time.
38. We acknowledge there is substantial support in the record for including wired IoT
consumer products within the scope of the IoT Labeling Program. Consumer Reports recommends
including both wired and wireless IoT within the scope of the IoT Labeling Program, pointing out that
wired IoT devices or products are vulnerable to cybersecurity threats just as wireless IoT devices or
products are.
154
Consumer Reports also points out that “while wireless devices are the majority of IoT
devices, there are still almost 700 million wired IoT devices globally, and they are expected to grow by a
10% [compound annual growth rate] through 2027 according to IoT Analytics ‘State of IoT – Spring
2023 Report.’”
155
TÜV SÜD also encourages the Commission to cover both wired and wireless devices
within the scope of the IoT Labeling Program,
156
and AIM emphasizes the importance of the security of
both wired and wireless IoT to the cybersecurity ecosystem.
157
CTA further states that the Commission
should not define the scope of the IoT Labeling Program in such a way as to exclude wired IoT
products.
158
AHAM points out that both wired and wireless IoT are included in the NIST definition.
159
39. While we agree that wired IoT products are susceptible to cyberattacks and similarly pose
security risks to consumers and others, we find it to be in the public interest for the IoT Labeling Program
to start with wireless consumer IoT products in view of the record indicating that “wireless devices are
the majority of IoT devices,”
160
which would indicate that a focus on this product segment will have a
substantial impact on the overall IoT market. The record also supports this approach, with Keysight
Technologies, Inc. concurring that “the program should include consumer RF IoT products initially.”
161
152
IoT Labeling NPRM at 7, para. 12.
153
47 U.S.C. § 302a(a)(1) (“The Commission may, consistent with the public interest, convenience, and necessity,
make reasonable regulations . . . governing the interference potential of devices which in their operation are capable
of emitting radio frequency energy by radiation, conduction, or other means in sufficient degree to cause harmful
interference to radio communications; . . . .”).
154
Consumer Reports Comments at 4.
155
Consumer Reports Reply at 3 (citing Satyajit Sinha, State of IoT: Number of connected IoT devices growing 16%
to 16.7 billion globally (May 24, 2023), https://iot-analytics.com/number-connected-iot-devices/
[https://perma.cc/E2NM-KB4Q]).
156
TÜV SÜD Comments at 2.
157
AIM Comments at 2, 5.
158
CTA Comments at 13.
159
AHAM Comments at 4.
160
Consumer Reports Reply at 3.
161
Keysight Technologies, Inc. Comments at 1 (Keysight).
Federal Communications Commission FCC 24-26
23
Further, we do not agree with arguments that there may be an unintended perception that “[c]reating a
program that would only certify wireless IoT devices would send an improper message that only wireless
IoT devices are secure.”
162
Instead, we believe that beginning with wireless IoT products is both feasible
and can be adopted with more speed, providing more prompt benefit in the marketplace. Further, a more
limited scope will streamline the initial rollout of the IoT Labeling Program, provide focus to the
additional tasks necessary to stand up the program, and lay the groundwork for expansion, and we do not
foreclose consideration including wired IoT products in the future. As such and as discussed below, we
also defer consideration of our legal authority to consider wired products at this time.
163
C. Oversight and Management of the IoT Labeling Program
1. Fostering Close Public-Private Collaboration
40. In the IoT Labeling NPRM, the Commission recognized that for a voluntary IoT Labeling
Program to be successful, it must include a close partnership and collaboration between federal
government, industry, and other stakeholders.
164
The record in this proceeding supports implementation
of the IoT Labeling Program through public-private collaboration that leverages the expertise and existing
frameworks of the federal government, industry, and other stakeholders.
165
The IoT Labeling NPRM
sought comment on adopting NIST’s recommendation that there be one “scheme owner” ultimately
responsible for overseeing and managing the IoT Labeling Program, and whether that entity should be the
Commission. The Commission also sought comment on whether one or more third-party administrator(s)
could be utilized to manage some or all of the IoT Labeling Program functions identified by NIST and, if
so, which functions, and how such third-party administrators should be chosen.
166
Based on the
comments filed regarding oversight and management of the IoT Labeling Program, the Commission finds
it is in the public interest to continue to foster public-private collaboration, including with regard to the
management and administration of the IoT Labeling Program, while ensuring the Commission retains
ultimate control and oversight of the IoT Labeling Program. In this respect, providing a broad, unifying
government oversight framework for existing private labeling schemes and other private efforts in this
context will allow current participants in this ecosystem to capitalize on their existing investments and
relationships in a way that not only promotes the overall effectiveness of the FCC’s IoT Labeling
Program and increases the security of the IoT ecosystem.
41. The Commission adopts the IoT Labeling NPRM proposal that the IoT Labeling Program
be comprised of a single “program owner” responsible for the overall management and oversight of the
IoT Labeling Program, with administrative support from one or more third-party administrators.
167
NIST’s white paper recommends one “scheme owner” responsible for managing the labeling program,
determining its structure and management, and performing oversight to ensure the program is functioning
consistently in keeping with overall objectives.
168
We agree that it is appropriate for a single entity to
perform these functions and find that the Commission will be the program owner of the IoT Labeling
Program, and as such, retains ultimate control over the program, and determines the program’s structure.
CSA highlights support in the record for having the Commission as the program owner, arguing that
“[p]lacing the regulatory authority in the hands of the Commission and providing government-backed
162
Planar Systems, Inc. Comments at 1 (Planar).
163
See infra Section IV.
164
IoT Labeling NPRM at 9, para. 19.
165
CTA Comments at 16; ioXt Alliance Comments at 2; Kaiser Permanente Comments at 4.
166
IoT Labeling NPRM at 10-11, para. 22.
167
Id.
168
NIST Cybersecurity White Paper at 2.
Federal Communications Commission FCC 24-26
24
endorsement may strengthen trust with Consumers.”
169
However, the NIST Cybersecurity White Paper
also recommends the “scheme owner” be responsible for defining the conformity assessment
requirements, developing the label and associated information, and conducting consumer outreach and
education.
170
42. While the Commission as program owner will oversee the elements of the program, the
program will be supported by Cybersecurity Label Administrators (Label Administrators or CLAs) who
will manage certain aspects of the program and authorize use the FCC IoT Label as well as a Lead
Administrator selected by the Bureau from among the CLAs, which will undertake additional duties
including acting as the point of contact between the CLAs and the Commission. In addition, the
Commission believes it is appropriate for a Lead Administrator, in collaboration with the CLAs and other
stakeholders, to identify or develop, and recommend to the Commission for approval, the IoT specific
standards and testing procedures, procedures for post-market surveillance, as well as design and
placement of the label. The Lead Administrator will also be responsible for developing, in coordination
with stakeholders, a consumer education plan and submitting the plan to the Bureau and engaging in
consumer education. Each of these duties are discussed in depth below. The Cybersecurity Coalition
recommends the Commission utilize a single administrator, rather than multiple administrators “to reduce
the likelihood of conflict among administrators and simplify engagement with manufacturers, consumers,
and government agencies.”
171
CTA, on the other hand, contemplates multiple administrators, suggesting
that the Commission may consider leveraging “a consortium of scheme owners[] to ensure that the IoT
Labeling Program is administered and issues are adjudicated in an effective, objective, and timely
fashion.”
172
We agree with CTA’s reasoning, while also acknowledging the Cybersecurity Coalition’s
concern regarding potential conflict. Accordingly, the Bureau will select a Lead Administrator from
among the CLA applicants to address conflicts.
43. As an initial matter, we have looked to the structure of, and experiences with, the
Commission’s equipment authorization program and rules in developing the IoT Labeling Program, as
proposed and discussed in the IoT Labeling NPRM. We emphasize, however, that the IoT Labeling
Program is new and distinct, and it will operate under its own rules and with new authorities specifically
delegated to PSHSB. This is consistent with the record developed in the proceeding, in which many
commenters urged the Commission to keep the equipment authorization and IoT Labeling programs
separate.
173
In addition, several commenters addressed whether obtaining a valid equipment authorization
should be a pre-requisite for obtaining the Cyber Trust Mark,
174
or whether obtaining approval to use the
Cyber Trust Mark would be required as a condition for applying for an equipment authorization.
175
We
169
CSA Reply at 4 (citing American Association for Laboratory Accreditation (A2LA) Comments at 2, TIC
Comments at 3-4, Kaiser Permanente Comments at 3-4, UL Solutions Comments at 2-3, ITI Comments at 6, and
Consumer Reports Comments at 10-12 to support Commission as program owner; Cybersecurity Coalition
Comments at 5-6, and NEMA Comments at 6 as supporting the Commission overseeing and managing the IoT
Labeling Program; and A2LA Comments at 2, 22, TIC Comments at 3-4, and Cybersecurity Coalition Comments at
5-6 as support for its argument that government-backed endorsement strengthening consumer trust).
170
NIST Cybersecurity White Paper at 2.
171
Cybersecurity Coalition Comments at 5.
172
CTA Comments at 23.
173
See, e.g., ITI Comments at 4; Consumer Reports Comments at 35; CTA Reply at 10; Letter from Association of
Home Appliance Manufacturers, Connectivity Standards Alliance, Consumer Technology Association, CTIA
Information Technology, Industry Council, National Electrical Manufacturers Association, Plumbing Manufacturers
International Power Tool Institute, Security Industry Association, Telecommunications Industry Association, U.S.
Chamber of Commerce, and USTelecom, to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, at 1 (Nov.
8, 2023) (Coalition Letter Reply).
174
NCTA Reply at 6; Coalition Letter Reply at 1.
175
TIA Comments at 2; CTA Comments at 9.
Federal Communications Commission FCC 24-26
25
emphasize that our IoT Labeling Program is voluntary, and parties are required to follow the
Commission’s equipment authorization program regardless of whether or not they choose to participate in
the IoT Labeling Program. We also clarify that there is no requirement to complete the equipment
authorization process before qualifying for the Cyber Trust Mark;
176
however, our existing part 2 rules
will continue to prohibit the marketing of a device that does not have a valid equipment authorization.
177
44. We conclude that it is in the public interest and supported in the record to adopt the IoT
Labeling Program structure recommended by NIST, with the modifications discussed above regarding
third-party administrators that are overseen by the Commission as the program owner. This and the
following paragraph preview the remaining roles and responsibilities for the IoT Labeling Program,
which will be developed in depth in the remaining sections of this Order. The Commission also will be
responsible for coordinating mutual recognition of the Cyber Trust Mark with international partners,
coordinating with the Lead Administrator, federal partners, industry, and other stakeholders on consumer
education programs, and performing oversight to ensure the IoT Labeling Program is functioning
properly. In addition, the Commission will specify the data to be included in a consumer-friendly registry
that provides additional information about the security of the products approved to use the Cyber Trust
Mark and is accessible through the QR Code that is required to accompany the Cyber Trust Mark.
Further, the Commission will own and maintain the registration for the Cyber Trust Mark, which may
only be used when the product has been appropriately tested and complies with the Commission’s IoT
Labeling Program requirements.
45. The Commission will approve qualified Cybersecurity Label Administrators (Label
Administrators or CLAs) to manage certain aspects of the labeling program and be authorized by the
Commission to license the Cyber Trust Mark to manufacturers whose products are in compliance with the
Commission’s IoT cybersecurity labeling rules. The Commission will also select a Lead Administrator,
which will be responsible for carrying out additional administrative responsibilities, including but not
limited to reviewing applications and recognizing qualified and accredited Cybersecurity Testing
Laboratories (CyberLABs) and engaging in consumer education regarding the Cyber Trust Mark. The
Lead Administrator will also collaborate with cyber experts from industry, government, academia and
other relevant sectors if needed to identify, develop, and maintain consumer IoT cybersecurity technical
and conformity assessment standards that are based on NIST standards and guidance, that will be
submitted to PSHSB for consideration and approval, and, subject to any required public notice and
comment, adopted into the Commission’s rules. The standards and testing procedures developed or
identified in collaboration with CLAs and other stakeholders and submitted by the Lead Administrator for
consideration by the Commission will, in turn, be used by accredited
178
testing labs recognized by the
Lead Administrator—whether CyberLABs,
179
a CLA-run lab, or a testing lab internal to a company (in-
house testing lab) for product testing.
176
See Coalition Letter Reply at 1.
177
See 47 CFR pt. 2.
178
The organization(s) accrediting the prospective Label Administrators and testing labs must meet the requirements
and conditions in ISO/IEC 17011. See 47 CFR § 8.218(b)(1); ISO/IEC 17011:2017(E), Conformity assessment—
General requirements for accreditation bodies accrediting conformity assessment bodies, Second Edition,
November 2017, IBR approved for § 8.217.
179
There appeared to be some confusion in the record with the Commission’s use of the term Cybersecurity
Labeling Authorization Bodies. Specifically, the ANSI National Accreditation Board (ANAB) recommended the
Commission reconsider the use of the term “CyberLAB” as the “implication that such organizations are laboratories
could create market confusion.” ANAB Reply at 2. We disagree that the term CyberLAB may be confusing
because these organizations are, in fact, laboratories/testing bodies that will be testing products to determine
compliance with applicable standards. The CyberLABs, however, are not “certification bodies.” Rather, the entity
that will be authorizing an applicant to use the Cyber Trust Mark on their product is the CLA, as described in para.
55, infra. To ensure there is no confusion, the Commission has changed the term from Cybersecurity Labeling
(continued….)
Federal Communications Commission FCC 24-26
26
46. Retaining key overarching functions within the Commission as discussed above will
ensure the effective administration and oversight of this government program and protect the integrity of
the FCC-owned Cyber Trust Mark, while perpetuating, where appropriate, the relevant efforts of the
private sector that meet the goals and requirements of the program. We also agree with CSA that
program ownership by the Commission will increase consumer confidence in the Cyber Trust Mark. In
addition, the clear high-level oversight functions retained for the Commission ensures the Commission
has meaningful decision making control.
180
Here, while the CLA(s) will recommend standards and testing
procedures to be approved by the Commission as well as manage the day-to-day administrative functions
assigned, the Commission will ultimately review, consider, and exercise judgment on whether the
requirements are appropriate to support the Commission’s program, and on how the program is ultimately
administered.
2. Cybersecurity Label Administrators (CLAs)
47. The IoT Labeling NPRM sought comment on how one or more third-party administrators
might be used to manage some or all of the labeling program functions and the best ways for the
Commission to utilize the respective expertise of the Commission, other federal government entities,
industry, and other stakeholders.
181
It also sought comment on how the Commission might select one or
more third-party administrators, what qualifications such administrators should possess, what national
security considerations are relevant to these qualifications, and whether there are existing stakeholders
well-suited to convene the working group the Commission tasks with developing and identifying IoT
security standards.
182
48. We adopt the IoT Labeling NPRM’s proposal that one or more qualified third-party
administrators (Cybersecurity Labeling Administrators or CLAs) be designated by the Commission to
manage certain aspects of the labeling program and be authorized to certify the application of the FCC
IoT Label by manufacturers whose products are found to be in compliance with the Commission’s IoT
cybersecurity labeling rules and regulations.
183
The record supports the Commission’s adoption of a
labeling program that is supported by CLAs.
184
According to TIC Council Americas, involving
independent third-party administrators who verify that labeled products meet the program requirements
will bring trust, consistency, and an impartial level playing field to the Cyber Trust Mark.
185
The
Cybersecurity Coalition, Widelity, and CSA highlight that utilizing experienced third-party administrators
will allow the program to run more efficiently and will provide “the required expertise for the
administration of the program.”
186
CTA and other commenters also assert that the IoT Labeling Program
will be best served if the Commission “leverage[s] the unique expertise and existing certification
“Authorization Bodies” as these terms are reserved for accreditation bodies, to Cybersecurity Testing Laboratories,
reflecting that the function of these labs is for testing and generating reports, and not certifying or issuing a label.
We continue to use the short-form term “CyberLAB” to refer to these testing labs.
180
Consumers' Rsch. v. FCC, 88 F.4th 917, 926 (11th Cir. 2023) (“[A]government agency may delegate statutory
authority to private entities without violating the private nondelegation doctrine so long as (1) the entity “function[s]
subordinately” to the agency, and (2) the agency retains “authority and surveillance over the activities” of the private
entity.”).
181
IoT Labeling NPRM at 11, para. 23.
182
Id. at 11, paras. 23-24.
183
CTA Comments at 10; but see Kaiser Permanente Comments at 3 (supporting use of third parties to play integral
roles in the management and administration of the IoT Labeling Program, subject to the FCC maintaining oversight
of the program and serving as the entity that grants permission to use the Cyber Trust Mark to applicants).
184
See, e.g., CTA Reply at 7; CTA Comments at 16-18; ioXt Alliance Comments at 13; UL Solutions Comments at
6; CTIA Comments at 26-27; Cybersecurity Coalition Comments at 5; ITI Comments at 8.
185
TIC Council Americas Comments at 1.
186
Cybersecurity Coalition Comments at 5-6; Widelity Comments at 3; CSA Comments at 5-6.
Federal Communications Commission FCC 24-26
27
infrastructure offered by well-regarded industry organizations.”
187
AHAM says that “[g]iven the volume
and increasing numbers of IoT products on the market, [the] FCC needs to give manufacturers as many
options as possible as far as obtaining the Cyber Trust mark” and that “third parties will play an important
role in any successful program.”
188
49. CTA supports assigning certain responsibilities to one or more independent, (i.e., neutral)
third-party administrators which it refers to as “Authorized Scheme Owners.” However, the Commission
disagrees with this descriptor insofar as some commenters are confused as to whether the “scheme
owner” is the entity ultimately responsible for the program, or a third-party entity responsible for certain
program administration functions or specified tasks under the ultimate direction of the Commission. To
avoid confusion, the Commission refers to these third-party administrators as CLAs. These CLAs are
neutral third parties independent of the applicant and within the context of a program overseen by the
Commission.
50. We believe that authorizing one or more CLAs to handle the routine administration of the
program will help to ensure a timely and consistent rollout of the program. In particular, several private
entities have already implemented robust IoT cybersecurity labeling programs with established business
processes in place to receive applications from IoT manufacturers and conduct conformity/standards
testing against widely accepted cybersecurity guidelines (e.g., NIST guidelines) or proprietary product
profiles based on the NIST criteria.
189
We anticipate a large number of entities will seek grants of
authorization to use the FCC IoT Label and we are concerned that if we were to adopt a program limited
to a single administrator, there may be bottlenecking delays in the processing of applications and a single
administrator could result in a single point of failure in the program. Allowing multiple CLAs to execute
the role of day-to-day administration of the program will provide for the simultaneous processing of a
significant number of applications, provide redundancy of structure, and potentially foster competition in
this space to better serve those seeking access to the label. In addition, leveraging the expertise of
multiple existing program managers and using pre-existing systems and processes that meet our program
specifications will minimize administrative delay, while promoting an efficient and timely rollout of the
Cyber Trust Mark. This will also ensure that the Commission effectively utilizes the expertise of those
entities who have made investments in their own cybersecurity labeling programs and have experience
working with manufacturers and IoT conformity and standards testing, expediting the ability to provide
consumers with a simple way to understand the relative security of the products and devices they
purchase under a government-backed standard.
3. Responsibilities of the Lead Administrator and CLAs
51. We recognize, however, that there is a need for a common interface between the CLAs
and the Commission to facilitate ease of engagement and to conduct other initial tasks associated with the
launch of the program.
190
We delegate authority to PSHSB to review CLA applications, review CLA
applications that also request consideration for Lead Administrator, select the Lead Administrator and
manage changes in the Lead Administrator.
52. Lead Administrator Duties. The Lead Administrator will undertake the following duties
in addition to the CLA duties outlined below:
187
CTA Comments at 10; see also AHAM Comments at 3; Cybersecurity Coalition Comments at 5; ioXt Alliance
Comments at 13; UL Solutions Comments at 6.
188
AHAM Comments at 3; see also Kaiser Permanente Comments at 3 (“Given the wide scope of IoT devices and
products eligible for the Program, we recommend considering the use of multiple third-party administrators to share
responsibilities and manage the day-to-day details of the application, assessment, granting and maintenance/renewal
processes for defined subsets of IoT devices.”).
189
CTA Comments at 16; ioXt Alliance Comments at 2-3 (referencing the ioXt Certification Program).
190
See ioXt Alliance Comments at 13 (suggesting a lead entity to oversee operation by recommending the FCC
“consider establishing an advisory committee/board to advise on operations of the program.”).
Federal Communications Commission FCC 24-26
28
a. interface with the Commission on behalf of the CLAs, including but not limited to
submitting to the Bureau all complaints alleging a product bearing the FCC IoT Label
does not meet the requirements of the Commission’s labeling program;
b. conduct stakeholder outreach as appropriate;
c. accept, review, and approve or deny applications from labs seeking recognition as a
lab authorized to perform the conformity testing necessary to support an application
for authority to affix the FCC IoT Label,
191
and maintain a publicly available list of
Lead Administrator-recognized labs and a list of labs that have lost their recognition;
d. within 90 days of release of the Public Notice announcing the Lead Administrator
selection, the Lead Administrator shall, in collaboration with CLAs and other
stakeholders (e.g., cyber experts from industry, government, and academia) as
appropriate:
i. submit to the Bureau recommendations identifying and/or developing the
technical standards and testing procedures for the Commission to consider
with regard to at least one class of IoT products eligible for the IoT Labeling
Program. The Bureau will evaluate the recommendations, and if the Bureau
approves of the recommendations, subject to any required public notice and
comment, adopt them into the Commission’s rules;
ii. submit to the Bureau a recommendation on how often a given class of IoT
products must renew their request for authority to bear the FCC IoT Label,
which may be dependent on the type of product, and that such a
recommendation be submitted in connection with the relevant standards
recommendations for an IoT product or class of IoT products;
192
The Bureau
will evaluate the recommendations, and if the Bureau approves of the
recommendations, subject to any required public notice and comment, adopt
them into the Commission’s rules;
iii. submit to the Bureau a recommendation on procedures for post market
surveillance by the CLAs. The Bureau will evaluate the recommendations,
and if the Bureau approves of the recommendations, subject to any required
public notice and comment, adopt them into the Commission’s rules; and
iv. submit to the Bureau recommendations with regard to updates to the registry
including whether the registry should be in additional languages, and if so, to
recommend specific languages for inclusion;
v. submit to the Bureau recommendations on the design of the FCC IoT Label,
including but not limited to labeling design and placement (e.g., size and
white spaces, product packaging, whether to include the product support end
date and other security and privacy information on the label.) The Bureau will
evaluate the recommendations, and if the Bureau approves of the
recommendations, subject to any required public notice and comment, adopt
them into the Commission’s rules.
e. The Lead Administrator shall, in collaboration with CLAs and other stakeholders
191
If the Lead Administrator, in addition to its administrative duties, intends to offer lab testing service (CLA-run
lab), it must submit an application with PSHSB seeking FCC recognition as a lab authorized to perform conformity
testing to support an application for authority to affix the FCC IoT Label. The Lead Administrator is not authorized
to recognize its own cybersecurity testing lab. If approved by PSHSB, the Lead Administrator will add the name of
its lab to the list of recognized labs.
192
See infra para. 124.
Federal Communications Commission FCC 24-26
29
(e.g., cyber experts from industry, government, and academia) as appropriate
recommend within 45 days of publication of updates or changes to NIST guidelines,
or adoption by NIST of new guidelines, to the FCC any appropriate modifications to
the Labeling Program standards and testing procedures to stay aligned with the NIST
guidelines;
f. submit to the Commission reports on CLAs’ post-market surveillance activities and
findings in the format and by the date specified by PSHSB;
g. develop in collaboration with stakeholders a consumer education campaign, submit
the plan to the PSHSB, and participate in consumer education;
193
h. receive complaints about the Labeling Program, including but not limited to
consumer complaints about the registry and coordinate with manufacturers to resolve
any technical problems associated with consumers accessing the information in the
registry;
i. facilitate coordination between CLAs; and
j. submit to the Commission any other reports upon request of the Commission or as
required by Commission rule.
53. Cybersecurity Label Administrator Duties. CLA(s) are responsible for various
administrative duties, including:
a. receive and evaluate applications and supporting data requesting authority to use the
FCC IoT Label on the product subject to the application;
b. grant an application only if it meets all of the Commission’s requirements to use the
FCC IoT Label and authorize the applicant to use the FCC IoT Label on the product
subject to the application;
c. ensure that manufacturers make all required information accessible by the IoT
registry;
d. participate in consumer education campaign in coordination with the Lead
Administrator;
e. perform post-market surveillance activities, such as audits, in accordance with
ISO/IEC 17065
194
and submit periodic reports to the Lead Administrator of their
post-market surveillance activities and findings in the format and by the date
specified by PSHSB; and
f. receive complaints alleging an IoT product does not support the cybersecurity criteria
conveyed by the Cyber Trust Mark and refer these complaints to the Lead
Administrator which will notify PSHSB.
195
54. The record supports the use of CLAs to support a variety of tasks within the program’s
construct. ioXt Alliance supports utilizing CLAs for evaluating and certifying products for the Cyber
193
See infra Section L.
194
See 47 CFR § 8.220(g); ISO/IEC 17065:2012(E), Conformity assessment—Requirements for bodies certifying
products, processes and services, First Edition, 2012–09–15, IBR approved for § 8.220. ISO/IEC 17065:2012,
Conformity Assessment – Requirements for Bodies Certifying Products, Processes and Services,
https://anab.ansi.org/standard/iso-iec-17065/ [https://perma.cc/8LLA-MQ39].
195
This process does not foreclose the ability of consumers to file an informal complaint in accordance with the
Commission’s rules. See 47 CFR §§ 1.716 – 1.719. In the event an informal complaint is filed with the
Commission, the complaint will be forwarded to the Lead Administrator for investigation and/or referral to the
issuing CLA.
Federal Communications Commission FCC 24-26
30
Trust Mark.
196
CTA supports utilizing CLAs to conduct program operations.
197
The Cybersecurity
Coalition and Kaiser Permanente also support utilizing CLAs for managing the day-to-day operations of
the IoT Labeling Program.
198
CSA argues that, “the day-to-day administration of the Cyber Trust Mark
Program should be managed by a Third-Party Administrator, serving as the entity that grants permission
to use the Program trademark to applicants.”
199
In addition, ITI recommends that it should be the
responsibility of the CLA to review or audit self-attestations and that “third-party administrators can and
should play a key role in administering conformity assessment schemes.”
200
CSA and CTIA further
recommend adopting the IoT Labeling NPRM’s proposal that a third-party administrator evaluate,
accredit, or recognize the CyberLABs,
201
and CSA also “recommends that the Commission hire a third-
party administrator to operate the IoT Registry.”
202
Finally, ioXt Alliance recommends that third-party
administrators should also “vet companies and products during the certification process”
203
to determine
which products pose a threat to national security, based on Commission guidance. ioXt Alliance also
notes in its comments that the “label design and associated information should be informed by the
expertise of manufacturers and third-party administrators.”
204
55. Subject to Commission oversight, and consistent with recommendations in the record, the
CLAs will evaluate and grant or deny requests for authority to use the FCC IoT Label on consumer IoT
products in accordance with the IoT Labeling Program. Each administrator will be responsible for
certifying that the consumer IoT products for which it authorizes a manufacturer to apply the FCC IoT
Label are tested by an accredited testing lab, which as discussed further below may be a CyberLAB, the
applicant’s own in-house lab, or a CLA-run lab, and that the testing report demonstrates the product
conforms to all Commission IoT labeling rules. The CLA will track each application it receives
requesting authority to use the FCC IoT Label, and the disposition of all applications, including date of
filing, date of acceptance as complete, the date and reason application is returned to applicant, and date of
grant or denial. The CLAs will review each application they receive to ensure the application and
supporting documents are provided and are sufficient to show the product conforms to all Commission
rules and that it includes a compliance test report generated by an accredited and Lead Administrator-
recognized testing lab (e.g., third-party lab (CyberLAB), applicant’s in-house testing lab, or CLA-run
lab). If the application is deficient, it will not be granted until all necessary conditions are satisfied. If the
application is complete and meets all of the Commission’s requirements, the CLA will issue a
cybersecurity labeling authorization (i.e., cybersecurity certification) approving the applicant to affix the
FCC IoT Label to the identified product.
56. In addition to its role as a CLA, the Lead Administrator must collaborate with CLAs and
other stakeholders (e.g., cyber experts from industry, government, and academia) as appropriate to
develop or identify, and maintain, consumer IoT cybersecurity technical and conformity assessment
standards to be met for each class of IoT product seeking authority to affix the FCC IoT Label on their
product, which the Lead Administrator will submit to PSHSB for consideration and approval and, subject
to any required public notice and comment, adoption into its rules. Adopting standards through
196
ioXt Alliance Comments at 14.
197
See CTA Reply at 4.
198
See Cybersecurity Coalition Comments at 5; Kaiser Permanente Comments at 3.
199
CSA Reply at 5-6 (citing Kaiser Permanente Comments at 3-4; ITI Comments at 6).
200
ITI Comments at 9.
201
CTIA Comments at 26 (citing IoT Labeling NPRM at 12, para. 26).
202
CSA Comments at 15.
203
ioXt Alliance Comments at 12.
204
Id. at 13.
Federal Communications Commission FCC 24-26
31
consensus is supported by the record in this proceeding.
205
The Information Technology Industry Counsel
(ITI) supports the Commission retaining ownership of the IoT Labeling Program and authorizing the
“various industry-led, consensus standards, which can be used to gain approval for the Cyber Trust
Mark.”
206
ITI also notes that using industry-led, consensus standards will also limit the likelihood of legal
challenges.
207
UL Standards & Engagement agrees that the FCC should use a “voluntary consensus-based
standards development process” to create and update standards for the IoT Labeling Program.
208
The U.S.
Chamber of Commerce also supports a consensus-based approach urging the Commission “to track
closely with public-private developments in IoT cybersecurity as well as industry-driven initiatives, such
as the C2 Consensus on IoT Device Security Baseline Capabilities (C2 Consensus)
209
and CTIA’s
cybersecurity certification program for IoT devices.”
210
The Council to Secure the Digital Economy
(CSDE), which is “composed of USTelecom, the Consumer Technology Association (CTA), and 13
global information and communications technology (ICT) companies - has also already convened
technical experts from 19 leading organizations throughout the ICT sector to develop and advance
industry consensus on baseline security capabilities for new devices,”
211
including the C2 Consensus
document, which provides guidance to the public and private sectors on IoT devices security.
212
We agree
with these recommendations that the Commission adopt standards following recommendations based on
an industry-led consensus process, leveraging standards work already in process or completed, which will
provide for the swift development and implementation of the IoT Labeling Program.
57. The Lead Administrator is to base the recommended technical standards and testing
procedures on the NISTIR 8425, Profile of the IoT Core Baseline for Consumer IoT Products. As noted
by ITI, there is “a suite of existing standards that might be leveraged to ensure that the outcomes NIST
outlines can be met.”
213
In addition, NIST’s IoT Product Component Requirements Essay provides a
summary of standards and guidance that NIST has initially identified as applicable to IoT devices and IoT
product components, that the Lead Administrator may determine are applicable to the IoT Labeling
Program.
214
The Lead Administrator should evaluate and leverage existing work for efficiency and speed
to market where appropriate in making its recommendations to the Commission.
58. The Lead Administrator in collaboration with stakeholders as appropriate will identify or
develop IoT cybersecurity standards (or packages of standards) and testing procedures that they determine
205
As below, we emphasize the importance of leveraging existing expertise in this space, and as such adopt as a
criterion for consideration in selecting the lead administrator the ability to convene and develop consensus among
stakeholders.
206
ITI Reply at 5.
207
Id. at 6.
208
UL Standards & Engagement Comments at 1.
209
Council to Secure the Digital Economy, C2 Consensus on IoT Device Security Baseline Capabilities (2019),
https://kvh31b.p3cdn1.secureserver.net/wp-content/uploads/2019/09/CSDE_IoT-C2-Consensus-Report_FINAL.pdf
[https://perma.cc/6HTV-25ZP]; Council to Secure the Digital Economy, The C2 Consensus on IoT Device Security
Baseline Capabilities – 2021 Supplement (2021), https://csde.org/wp-content/uploads/2021/04/C2-Tech-
Report_2021_final.pdf [https://perma.cc/U45C-DGYT].
210
U.S. Chamber of Commerce Comments at 3 (Chamber). The Chamber also argues that “[a]bove all, the
Commission should reach a consensus with industry on fundamental concerns including the scope of covered IoT,
security criteria and standards, conformity assessments, and liability protections.” Chamber Comments at 3.
211
Council to Secure the Digital Economy, The C2 Consensus on IoT Device Security Baseline Capabilities at 1
(2019), https://csde.org/wp-content/uploads/2019/09/CSDE_IoT-C2-Consensus-Report_FINAL.pdf
[https://perma.cc/UG7K-C4RZ].
212
Id.
213
ITI Reply at 5.
214
NIST IoT Product Component Requirements Essay at 3-7.
Federal Communications Commission FCC 24-26
32
can be used to test that a product meets the NISTIR 8425 criteria for each class of products identified by
the working group.
215
The Lead Administrator will submit to the Bureau recommendations on a rolling
basis as they are identified, but shall submit the initial set of recommendations no later than 90-days after
release of the Public Notice selecting the Lead Administrator. We specify a timeframe here to ensure
timeliness of initial standards and prompt launch of the program. Noting the work already ongoing on
these issues,
216
we also find such a timeframe to be reasonably achievable. The proposed standards (or
packages of standards) and testing procedures must be approved by the Commission prior to
implementation. The Commission delegates authority to PSHSB to evaluate and (after any required
public notice and comment) approve (or not approve) the technical standards and testing procedures
proposed by the Lead Administrator for use in the IoT Labeling Program and adopt the approved
standards and testing procedures into the Commission’s rules. The Commission further directs the
Bureau to ensure the standards and testing procedures are relevant and appropriate to support the
Commission’s IoT Labeling Program.
4. Selecting CLAs and Revoking Authority to Grant Applications to Use the FCC IoT
Label
59. Selecting CLAs. Each entity seeking authority to act as a CLA must file an application
with the Commission for consideration by PSHSB,
217
which includes a description of its organization
structure, an explanation of how it will avoid personal and organizational conflict when processing
applications, a description of its processes for evaluating applications seeking authority to use the FCC
IoT Label, and a demonstration of expertise that will be necessary to effectively serve as a CLA
including, but not limited to:
1. Cybersecurity expertise and capabilities in addition to industry knowledge of IoT and IoT
labeling requirements.
2. Expert knowledge of NIST’s cybersecurity guidance, including but not limited to NIST’s
recommended criteria and labeling program approaches for cybersecurity labeling of consumer
IoT products.
3. Expert knowledge of FCC rules and procedures associated with product compliance testing and
certification.
4. Knowledge of Federal law and guidance governing the security and privacy of agency
information systems.
5. Demonstration of ability to securely handle large volumes of information and demonstration of
internal security practices.
6. Accreditation pursuant to all the requirements associated with ISO/IEC 17065
218
with the
215
See, e.g., CTIA Certification, Cybersecurity Certification Program for IoT devices, version 1.3 (July 2020),
https://api.ctia.org/wp-content/uploads/2020/08/CTIA-IoT-Cybersecurity-Program-Management-Document-Ver-
1.3.pdf [https://perma.cc/E8P6-9RV3].
216
See Letter from David Grossman, Vice President, Regulatory Affairs, CTA, to Marlene H. Dortch, Secretary,
FCC, PS Docket No. 23-239, at 1-2 (Feb. 8, 2024).
217
This approach necessitates a mechanism for the Commission to recognize administrators, and we accordingly
adopt a rule doing so. See infra Appx. A, 47 CFR § 8.219. We model our approach on analogous elements of our
equipment authorization rules, with which the Commission and industry have substantial experience, and which
have proven workable in practice. See 47 CFR § 2.949. We delegate to PSHSB and OMD authority to take any
necessary steps, including adoption of additional procedures and any applicable fees (pursuant to any required
public notice and comment), as necessary to ensure compliance with the Communications Act with respect to any
rules adopted here that contemplate the filing of applications directly with the Commission. 47 U.S.C. § 158(c).
218
ISO/IEC 17065:2012(E), Conformity assessment—Requirements for bodies certifying products, processes and
services, First Edition, 2012–09–15, IBR approved for § 8.220. ISO/IEC 17065:2012, Conformity Assessment –
(continued….)
Federal Communications Commission FCC 24-26
33
appropriate scope.
219
We recognize that CLAs cannot obtain accreditation to the FCC scope until
after the Commission adopts standards and testing procedures. As such, the Commission will
accept and conditionally approve CLA applications from entities that meet the other FCC
program requirements and commit to obtain ISO/IEC 17065 accreditation with the appropriate
scope within six (6) months of the effective date by the adopted standards and testing procedures.
CLA approval to authorize use of the FCC IoT Label will be finalized upon receipt and
demonstration to the Commission of ISO/IEC 17065 accreditation with the appropriate scope.
220
7. Demonstrate implementation of controls to eliminate actual or potential conflicts of interests
(including both personal and organizational), particularly with regard to commercially sensitive
information, to include but not limited to, remaining impartial and unbiased and prevent them
from giving preferential treatment to certain applications (e.g., application line jumping) and from
implementing heightened scrutiny of applications from entities not members or otherwise aligned
with the CLA.
8. That the applicant is not owned or controlled by or affiliated
221
with any entity identified on the
Commission’s Covered List or is otherwise prohibited from participating in the IoT Labeling
Program. We will dismiss all CLA applications from an entity (company) identified on the
Commission’s Covered List, the Department of Commerce’s Entity List,
222
and the Department
of Defense’s List of Chinese Military Companies.
223
9. That the applicant is not owned or controlled by or affiliated with any person or entity that has
been suspended or debarred from receiving federal procurements or financial awards, to include
all entities and individuals published as ineligible for award on the General Service
Administration’s System for Award Management.
224
10. In addition to completing the CLA application information, entities seeking to be the Lead
Administrator will submit a description of how they will execute the duties of the Lead
Administrator, including:
a. their previous experience in IoT cybersecurity;
Requirements for Bodies Certifying Products, Processes and Services, https://anab.ansi.org/standard/iso-iec-17065/
[https://perma.cc/8LLA-MQ39].
219
The scope of CLA’s ISO/IEC 17065 certification includes certifying IoT products and devices for compliance
with FCC cybersecurity standards.
220
Consistent with standard practice for accreditation, the organization accrediting the CLAs must be recognized by
the Bureau to perform such accreditation based on International Standard ISO/IEC 17011. ISO/IEC 17011:2017.
221
For purposes of this IoT labeling program an “affiliate” is defined as “a person that (directly or indirectly) owns
or controls, is owned or controlled by, or is under common ownership or control with, another person. For purposes
of this part the term ‘own’ means to own an equity interest (or the equivalent thereof) of more than 10 percent.” See
47 U.S.C. § 153(2).
222
See Bureau of Industry and Security, U.S. Department of Commerce, Supplement No. 4 to Part 744 – Entity List
(2023), https://www.bis.doc.gov/index.php/documents/regulations-docs/2326-supplement-no-4-to-part-744-entity-
list-4/file [https://perma.cc/STW5-B8GW].
223
See Entities Identified as Chinese Military Companies Operating in the United States in Accordance with Section
1260H of the William M. (“Mac”) Thornberry National Defense Authorization Act for Fiscal Year 2021 (Public
Law 116-283), Tranche 2, U.S. Department of Defense (2022),
https://media.defense.gov/2022/Oct/05/2003091659/-1/-1/0/1260H%20COMPANIES.PDF
[https://perma.cc/5LMA-LZLG].
224
See U.S. General Services Administration System for Award Management, Exclusion Types,
https://sam.gov/content/entity-information/resources/exclusion-types [https://perma.cc/5L45-LKCJ] (last visited
Feb. 15, 2024).
Federal Communications Commission FCC 24-26
34
b. what role, if any, they have played in IoT labeling;
c. their capacity to execute the Lead Administrator duties outlined in this Order;
d. how they would engage and collaborate with stakeholders to identify or develop the
Bureau recommendations discussed in this Order;
e. a proposed consumer education campaign; and
f. additional information the applicant believes demonstrates why they should be the Lead
Administrator.
60. For items #7 and #8, we note that the record raises national security considerations when
selecting a Label Administrator. For example, CTIA urges that the Commission “exclude all entities on
the Covered List (not just those included on the list for producing equipment), all entities on the other lists
identified in the IoT Labeling NPRM, as well as entities that are otherwise banned from federal
procurement.”
225
CTIA explains that these broad exclusions for program participation are necessary
because of “the unique nature of the proposed labeling program – namely that it is both government-
administered and voluntary – counsels in favor of painting with a broad brush on national security-based
exclusions.”
226
We agree with the commenters in the record, and consistent with our reasoning herein
addressing the exclusion of certain products that would raise potential national security concerns, we also
prohibit entities owned or controlled by or affiliated with entities that produce equipment found on the
Covered List, as well as entities specified on the other lists referenced above or those suspended or
debarred from receiving federal procurements or financial awards from being a CLA in view of national
security considerations and to insure the integrity of the IoT Labeling Program. Each of these lists
represent the determination of relevant Federal agencies that the entities on the list may pose a national
security threat within their respective areas, and as such we find that it is not in the public interest to
permit these entities to provide assurances to the American public that products meet minimum
cybersecurity standards. Importantly, we are only excluding the entities of the lists from a voluntary
program under which the FCC approves their capability to oversee cybersecurity certification testing for
purposes of the IoT Label. Insofar as the FCC IoT Label reflects the FCC’s signal to consumers about
cybersecurity, it is reasonable for us to take a cautious approach when approving entities to conduct the
underlying product evaluations when relevant Federal Agencies have expressed security concerns with
the entity.
61. NCTA also suggests that ‘any “foreign entity of concern’ as defined by the CHIPS Act
should be ineligible for certification or recognition as a CyberLAB.”
227
Further, ioXt Alliance
recommends that the Commission “establish rules to ensure CyberLABs are not subject to undue
influence by foreign adversaries.”
228
We agree that it would be problematic for the U.S. to rely on the
determination of entities controlled or affiliated with “foreign adversaries” as to the security of products
approved to use the Cyber Trust Mark, and therefore the FCC will not recognize for purposes of the IoT
Labeling Program any applicant that is an entity, its affiliate, or subsidiary owned or controlled by a
“foreign adversary” country. A “foreign adversary” country is defined in the Department of Commerce’s
rule, 15 CFR § 7.4,
229
and includes China (including Hong Kong), Cuba, Iran, North Korea, Russia, and
225
CTIA Reply at 7.
226
CTIA Comments at 41.
227
NCTA Comments at 8.
228
ioXt Alliance Reply at 6.
229
15 CFR § 7.4 (stating “[t]he Secretary has determined that the following foreign governments or foreign non-
government persons have engaged in a long-term pattern or serious instances of conduct significantly adverse to the
national security of the United States or security and safety of United States persons and, therefore, constitute
foreign adversaries solely for the purposes of the Executive Order, this rule, and any subsequent rule” promulgated
(continued….)
Federal Communications Commission FCC 24-26
35
Maduro Regime. We do not otherwise see a basis to preclude other foreign entities from serving as
CLAs, but at this preliminary stage of establishing the IoT Labeling Program—where no international
agreements are yet in place in this regard, and oversight details continue to be effectuated—we defer
action in this regard. We delegate authority to PSHSB, in consultation with OIA, to evaluate and (after
any appropriate public notice and comment) establish qualification criteria for any entity outside the
United States to be approved to act as a CLA once any appropriate international agreements or other
appropriate prerequisites are in place.
62. We decline to require that a CLA be a non-profit. In the IoT Labeling NPRM, we sought
comment on whether the CLA should be required to be a non-profit entity.
230
The Cybersecurity
Coalition recommends that the CLA be a non-profit entity, but did not elaborate on why, focusing their
comments on having a neutral, independent third-party that followed consistent pricing guidelines and
had industry experience and strong security practices.
231
Researchers from the Northeastern University’s
College of Engineering similarly agreed that the Label Administrator should be a non-profit while
emphasizing that the CLA should not have conflicts of interest.
232
We decline, however, to require that
the CLA be a non-profit organization, recognizing that there may be well-qualified companies that may
be for-profit organizations or non-profit organizations that possess the other relevant qualifications. We
agree with what appear to be the underlying concerns of the record, that the CLA be neutral, have the
knowledge outlined above, (e.g., knowledge regarding FCC rules, IoT cybersecurity standards and testing
procedures), and be free of conflicts.
233
However, we believe that a company that satisfies the above
requirements could carry out the CLA duties without being a non-profit organization. Moreover,
expanding the pool of potential participants should increase the likelihood that a reasonable number of
qualified entities apply to fulfill the specified roles. In addition, the record did not highlight reasons why
a for-profit company would be incapable of fulfilling the role of label administrator.
63. Termination of CLA Authority. To address national security concerns, the authority of
CLAs to grant applications to use the FCC IoT Label under the IoT Labeling Program will automatically
terminate if the CLA subsequently becomes owned or controlled by or affiliated with an entity that
produces equipment found on the Covered List, or otherwise added to any exclusionary list identified in
this item as precluding authorization as a CLA. In addition, a CLA’s authority may also be terminated for
failure to uphold the required competencies or accreditations enumerated above. We delegate authority to
PSHSB, to determine if a CLA’s authority is to be terminated in the latter circumstance, and to terminate
such authorization.
234
PSHSB, may identify such CLA deficiencies itself or receive notice from other
pursuant to the Executive Order); see 15 CFR § 7.2 (“Foreign adversary means any foreign government or foreign
non-government person determined by the Secretary to have engaged in a long-term pattern or serious instances of
conduct significantly adverse to the national security of the United States or security and safety of United States
persons.”); see Executive Order 13873 of May 15, 2019, Securing the Information and Communications Technology
and Services Supply Chain, 84 Fed. Reg. 22689 (May 15, 2019).
230
IoT Labeling NPRM at 11, para. 24.
231
Cybersecurity Coalition Comments at 5.
232
Northeastern University College of Engineering Comments at 3 (“Ideally, administrators should [be a] non-profit
academia-based organization with connections to the industry but no conflict of interest.”).
233
See, e.g., Cybersecurity Coalition Comments at 5; Northeastern University College of Engineering Comments at
3.
234
Because of the public safety importance of a CLA having the requisite qualifications and adhering to our rules
when evaluating requests to use the FCC IoT Label, this process should proceed appropriately expeditiously to
minimize any periods of time where a CLA continues to operate in that capacity once concerns have come to
PSHSB’s attention. In particular, PSHSB shall provide notice to the CLA that the Bureau proposes to terminate the
CLA’s authority and provide the CLA a reasonable opportunity to respond (not more than 20 days) before reaching
a decision on possible termination. PSHSB may suspend the CLA’s ability to issues labeling authorizations during
the pendency of such consideration if appropriate.
Federal Communications Commission FCC 24-26
36
entities, including other agencies, consumers, and industry, that products granted authorization by a CLA
do not accurately reflect the security posture of the product. Products authorized to use the FCC IoT
Label by a disqualified CLA will be subject to the disqualification procedures described further below.
64. CLA Application Filing Window. We delegate authority to the Bureau to issue a Public
Notice opening the initial filing window to receive applications from entities seeking authority to be
recognized as a CLA (and Lead Administrator) under the IoT Labeling Program with instructions on how
to apply and further details on the qualifications required of CLA applicants as well as the decision
criteria used to select applicants. We also delegate to the Bureau authority to open additional filing
windows or otherwise accept additional applications for authority to be recognized by the Bureau as a
CLA when and as the Bureau determines it is necessary. Interested parties must establish they meet the
requirements established in this Order. The Commission notes that it may refer applications to the U.S.
Committee for the Assessment of Foreign Participation in the U.S. Telecommunications Sector (Team
Telecom) for their review and consideration of national security and law-enforcement risks.
235
We further
delegate authority to PSHSB in coordination with the Office of the Managing Director (OMD)
(specifically Office of the Chief Information Officer) and, to the extent necessary, the Office of General
Counsel (OGC) (specifically the Senior Agency Official for Privacy), to receive and review each
application for compliance with the criteria established in this Order. We also delegate to PSHSB
authority to adopt additional criteria and administrative procedures necessary to efficiently select one or
more independent, non-governmental entities, to act as CLA(s) and Lead Administrator. The Lead
Administrator must provide equitable recommendations to the Commission to encourage the broadest
possible participation of CLAs within the parameters of the FCC’s rules.
236
We also delegate to PSHSB
authority to adopt additional criteria and procedures in the event the Lead Administrator must be replaced
or chooses to withdraw from its responsibilities.
237
We delegate authority to PSHSB to release a Public
Notice announcing the CLA(s) selected by the Bureau and next steps for each entity, including but not
limited the execution of appropriate documentation governing the details of the CLA’s responsibilities.
Moreover, we delegate to PSHSB and OMD authority to take any necessary steps, including adoption of
additional procedures and any applicable fees after selection of the CLAs, if necessary to ensure
compliance with the Communications Act or applicable government-wide statutes that are implicated by
the IoT Labeling Program. Finally, we also delegate authority to PSHSB and OMD, in consultation with
OGC, to take any additional actions necessary to preserve the Commission’s rights to the Cyber Trust
Mark under trademark and other applicable laws. Only entities who have followed the procedures
required by PSHSB and OMD and executed relevant required documentation will be authorized by the
Commission to accept and grant applications authorizing the use of the FCC IoT Label, which includes
the Cyber Trust Mark and QR Code.
D. CyberLABs, CLA-Run Labs, and In-House Testing Labs
65. The IoT Labeling NPRM sought comment on how IoT devices or products could
demonstrate compliance with IoT security standards.
238
In the IoT Labeling NPRM, the Commission
proposed the IoT Labeling Program could draw from the Commission’s organizational structure for
approving RF equipment when developing a process for assessing IoT devices and products for
compliance with the IoT cybersecurity standards. In this case, the Commission proposed naming third
235
Process Reform for Executive Branch Review of Certain FCC Applications and Petitions Involving Foreign
Ownership, Order 36 FCC Rcd 14848 (2021).
236
We also agree with CTA in highlighting the importance of PSHSB’s involvement in matters where the Lead
Administrator and CLAs may share vested interests. See Letter from J. David Grossman, Vice President,
Regulatory Affairs, CTA & Mike Bergman, Vice President, Technology & Standards, CTA, to Marlene H. Dortch,
Secretary, FCC, PS Docket No. 23-239, at 3 (filed Mar. 4, 2024).
237
We recognize the potential raised by ioXt Alliance for anticompetitive preferences in recommendations made to
the Bureau if a CLA is chosen as Lead Administrator. See ioXt Ex Parte.
238
IoT Labeling NPRM at 11, para. 25.
Federal Communications Commission FCC 24-26
37
parties with expertise in security and compliance testing to fill this role and proposed to call these entities
CyberLABs.
239
66. The Commission envisioned the role of CyberLABs as assessing IoT devices or products
for compliance against IoT security standards, once developed.
240
The Commission sought comment on
whether the Commission or one of the authorized label administrators would evaluate, accredit, or
recognize the CyberLABs, noting that it was seeking to ensure that CyberLABs have the necessary
expertise and resources to properly test and assess whether IoT devices and products are in compliance
with the IoT security standards.
241
To become accredited and FCC-recognized for the proposed IoT
Labeling Program, the Commission proposed the submission of applications demonstrating the applicant
CyberLAB met the following requirements:
Qualifications: The CyberLAB has technical expertise in cybersecurity testing and
conformity assessment of IoT devices and products.
Resources: The CyberLAB has the necessary equipment, facilities, and personnel to conduct
cybersecurity testing and conformity assessment of IoT devices and products.
Procedures: The CyberLAB has documented procedures for conformity assessment.
Continued competence: Once accredited and recognized, CyberLABs would be periodically
audited and reviewed to ensure they continue to comply with the IoT security standards and
testing procedures.
242
67. We adopt our proposal to accept CyberLABs, in-house labs, and CLA-run labs, to test
and assess IoT products for compliance with the consumer IoT standards that are established pursuant to
the process described above to actualize the outcome of the NIST criteria. Rather than having the
Commission or CLA evaluate or accredit a lab, however, we are persuaded that it is appropriate to
recognize testing labs that have been accredited to ISO/IEC 17025 standards to conduct compliance
testing that would support an application for authority to affix the FCC IoT Label.
243
Consistent with
standard practice for accreditation, the organization accrediting the testing labs must be recognized by the
Bureau to perform such accreditation based on International Standard ISO/IEC 17011.
244
We recognize
that labs cannot be accredited or recognized in the context of this IoT Labeling Program until after the IoT
cybersecurity standards have been approved by the Commission and incorporated into the Commission’s
rules. We delegate authority to PSHSB to publish a Public Notice, subject to any required notice and
comment, outlining the specific standards CyberLABs, in-house labs, and CLA-run labs must meet to be
recognized as qualified to conduct conformity testing to support applications seeking authority to use the
FCC IoT Label. We also find it to be in the public interest for the Lead Administrator to review and
recognize labs that meet these accreditation requirements and make a list of recognized labs publicly
available.
245
239
Id. at 11-12, para. 25.
240
Id.
241
Id. at 12, para. 26.
242
Id.
243
See, e.g., AHAM Comments at 3; CSA Comments at 5-6; CTA Comments at 16-18; CTIA Comments at 26-27;
Cybersecurity Coalition Comments at 5; ITI Comments at 8; and Widelity Comments at 3. We note that our rules
will incorporate certain standards by reference, and we delegate authority to PSHSB to take any additional steps
necessary, including non-substantive edits to the rule text, to effectuate the incorporation by reference.
244
ISO/IEC 17011:2017.
245
To enable the Lead Administrator to compile a reliable and verifiable list, we require accredited CyberLABs to
submit certain information to the Lead Administrator: (1) Laboratory name, location of test site(s), mailing address
and contact information; (2) Name of accrediting organization; (3) Scope of laboratory accreditation; (4) Date of
(continued….)
Federal Communications Commission FCC 24-26
38
68. We agree with CTIA that entities specializing in testing and certification will be valuable
to program participants, and that such entities are likely to have the resources and expertise to evaluate
IoT products in accordance with a standard.
246
CTIA also notes, “a third-party certification model will
help to lend credibility to the program” because CyberLABs can focus on the assessment aspects of the
program in a way that helps ensure the integrity of the IoT Labeling Program.
247
We also agree with CTA
that leveraging accredited industry bodies to perform conformity assessments will “speed the
establishment of the program and increase the program’s ultimate quality.”
248
69. We agree with CSA’s argument that the Commission should adopt a model where
CyberLABs must be ISO/IEC 17025 accredited.
249
CSA notes its confusion as to whether CyberLABs
were intended to be “certification bodies” as defined by ISO/IEC 17065 or “evaluation laboratories” as
defined by ISO/IEC 17025.
250
We clarify that the proposal as envisioned by the IoT Labeling NPRM and
adopted here is for CyberLABs, in-house labs, and CLA-run labs to function as a body responsible for
assessing the security of IoT products
251
(i.e., testing lab). CSA proposes that such bodies hold ISO/IEC
17025 accreditations, as this model has been the basis for mutual recognition agreements in the
cybersecurity industry,
252
and we agree.
70. We note the objection of LG Electronics, which asserts that “[t]he CyberLAB concept
described in the NPRM would almost certainly create a testing bottleneck” that would slow the process,
and deter participation in the IoT Labeling Program.
253
Instead, LG Electronics argues, self-certification
is required to avoid these problems, although LG Electronics concedes that some compliance certification
is required to participate in the IoT Labeling Program.
254
As a nascent program, and as discussed above in
connection with the envisioned process, we do not find it appropriate to adopt at this time a labeling path
that does not include some level of laboratory testing in combination with an application to a CLA to
ensure the product bearing the FCC IoT Label complies with the IoT Labeling Program’s requirements.
However, we recognize the benefits of time, efficiency and cost-savings associated with in-house testing
and will allow the option for applicants to use an in-house testing labs, provided the lab is ISO/IEC 17025
accredited.
71. CyberLABs’ Programmatic Role. CyberLABs will receive requests for conformance
testing from manufacturers seeking to use the FCC IoT Label and will assess and test the products using
the cybersecurity standards developed by industry and approved by the Commission and provide the
applicant with a report of their findings. There was confusion in the record with how the term CyberLAB
expiration of accreditation; (5) Designation number; (6) FCC Registration Number (FRN); (7) A statement as to
whether or not the laboratory performs testing on a contract basis; (8) For laboratories outside the United States,
details of the arrangement under which the accreditation of the laboratory is recognized; and (9) Other information
as requested by the Commission.
246
CTIA Comments at 26.
247
Id. at 27.
248
Id. at 18.
249
CSA Comment at 7.
250
Id. at 6-7.
251
See IoT Labeling NPRM at 11-12, para. 25.
252
CSA Comments at 7.
253
LG Electronics Comments at 2.
254
Id. (“Self-certification would help avoid these problems without compromising program integrity.”); see also
Cybersecurity Coalition Comments at 6 (“The Coalition is concerned that the structure envisioned in [the IoT
labeling NPRM] will be complex, costly, and introduce bottlenecks into the label approval process.”).
Federal Communications Commission FCC 24-26
39
is to be applied.
255
The Commission clarifies that the CyberLABs are laboratories whose role is limited to
conducting compliance tests and generating reports. CyberLABs are not, in the organizational structure
adopted today, either certifying products or issuing authorization to use the FCC IoT Label. While the
IoT Labeling NPRM defined a CyberLAB as an “authorization body” we remove that reference here as
the term “authorization body” might be seen as referring to certification bodies, not laboratories. The role
of CyberLABs is to conduct the required tests and generate test reports for use by the applicant in seeking
CLA authorization to use the FCC IoT Label.
72. In-House Testing Lab. We also adopt an option for manufacturers to use an accredited
and Lead Administrator-recognized in-house testing lab to perform the cybersecurity conformity testing
for their IoT products, provided the in-house lab meets the same vigorous standards as the CyberLABs.
In the IoT Labeling NPRM, the Commission sought comment on whether there is an avenue for “a
comprehensive review that an IoT device or product compl[ies] with the IoT security standards.”
256
We
received significant support in the record for an in-house testing option. Samsung argues that, to
encourage widespread adoption, the Commission must allow manufacturers an option to perform in-house
testing to receive the label.
257
The Cybersecurity Coalition urges the Commission to allow for in-house
testing.
258
We agree that an in-house testing option, for some manufacturers, will be more cost-effective,
encourage participation in the IoT Labeling Program, and when combined with the filing of an application
with a CLA can assure quality and trust in the IoT Labeling Program.
259
However, we do require that in-
house labs meet the same accreditation and recognition requirements as CyberLABs. In this respect,
consumers may be assured that the label achieved on an in-house basis meets the same standards as those
tested elsewhere, promoting consistency and reliance on the IoT Labeling Program generally. We also
expect that ensuring a common baseline testing standard will ultimately aid in the ability to gain
international recognition of the Cyber Trust Mark.
73. CLA-Run Testing Lab. We also recognize that CLAs may also have, or seek to have,
their own in-house labs conduct conformity testing for applicants seeking certification to use the Mark.
The Commission finds no need to limit the number of potential testing facilities by prohibiting CLA-run
labs from also being considered recognized labs. Applicants who wish to do so, may file an application
with an authorized CLA and request the services of the CLA’s accredited and Lead Administrator-
recognized lab. Again, the Commission requires CLA labs to meet the same accreditation and
recognition requirements as CyberLABs. Only after a lab has been accredited by a recognized
accreditation body may the lab file an application with the Lead Administrator seeking to be recognized
as an approved cybersecurity testing lab.
260
As explained by A2LA, “[a]ccreditation is a means of
determining the technical competence of conformity assessment organizations such as laboratories using
255
CSA Comments at 6 (“[CSA] believes that using the new term “CyberLAB” will generate confusion. Because
“CyberLAB” includes “LAB” in the name, Alliance members who read the FCC NPRM thought that the CyberLAB
was an ISO 17025 organization (an “Evaluation Laboratory”). After carefully reviewing paragraph 25, it seems
clear that “CyberLABs” are intended to operate as Certification Bodies, as described in ISO 17065.).
256
IoT Labeling NPRM at 15, para. 32.
257
Samsung Comments at 5.
258
Cybersecurity Coalition at 6.
259
See CSA Comments at 7-8.
260
This approach necessitates a mechanism for the Commission to recognize lab accreditation bodies, and we
accordingly adopt a rule doing so. See infra Appx. A, 47 CFR § 8.218. We model our approach on analogous
elements of our equipment authorization rules, with which the Commission and industry have substantial
experience, and which have proven workable in practice. See 47 CFR § 2.949. We delegate to PSHSB and OMD
authority to take any necessary steps, including adoption of additional procedures and any applicable fees (pursuant
to any required public notice and comment), as necessary to ensure compliance with the Communications Act with
respect to any rules adopted here that contemplate the filing of applications directly with the Commission. 47
U.S.C. § 158(c).
Federal Communications Commission FCC 24-26
40
qualified, third-party accreditation bodies. It assures federal government agencies as well as private
sector organizations that assessments conducted by accreditation bodies are objective and reliable and that
one can have confidence in the data generated by the accredited testing laboratory.”
261
Recognizing that,
whether an IoT product is evaluated by a CyberLAB, CLA-run lab, or an in-house lab there is a need to
ensure equal rigor in the process, this requirement applies to in-house testing labs and third-party testing
labs (CyberLABs and CLA-run labs). For ease of understanding, when we refer to CyberLABs below,
we are including CyberLABs, in-house testing labs, and CLA-run labs.
74. In order to achieve recognition by the Lead Administrator, all labs seeking recognition
under the Commission’s IoT Labeling Program must submit evidence of accreditation in the form of an
attestation from an accreditation body that the prospective lab has demonstrated:
1. Technical expertise in cybersecurity testing and conformity assessment of IoT devices and
products. Compliance with all requirements associated with ISO/IEC 17025. If we determine
that other ISO standards or other relevant requirements are missing, the Commission will provide
guidance to industry on how they may be addressed.
2. Knowledge of FCC rules and procedures associated with IoT cybersecurity compliance testing
and certification.
3. Necessary equipment, facilities, and personnel to conduct cybersecurity testing and conformity
assessment of IoT devices and products.
4. Documented procedures for IoT cybersecurity conformity assessment.
5. Demonstrated implementation of controls to eliminate actual or potential conflicts of interests
(including both personal and organizational), particularly with regard to commercially sensitive
information.
6. That the applicant is not owned or controlled by or affiliated with any entity that produces
equipment on the FCC Covered List or is otherwise prohibited from participating in the IoT
Labeling Program. We will dismiss all applications from a company named on the Department of
Commerce’s Entity List, the Department of Defense’s List of Chinese Military Companies.
7. That the applicant is not owned or controlled by or affiliated with any person or entity that has
been suspended or debarred from receiving federal procurements or financial awards, to include
all entities and individuals published as ineligible for award on the General Service
Administration’s System for Award Management.
75. Once accredited and recognized, the testing labs will be periodically audited and
reviewed by the accreditation body to ensure they continue to comply with the IoT security standards and
testing procedures.
76. Concerning items #6 and #7, national security considerations must be considered when
allowing testing labs to participate because of “the unique nature of the proposed labeling program.”
262
As recommended in the record and consistent with our exclusions as to eligible products and eligibility to
serve as a third-party administrator, all entities owned or controlled by or affiliated with entities that
produce equipment found on the Covered List, as well as entities specified on the other U.S. government
exclusionary lists referenced above are prohibited from serving as a CyberLAB.
263
Each of these lists
represent the determination of relevant Federal agencies that the entities on the list may pose a national
security threat within their respective areas, and as such we find that we cannot give U.S. Government
endorsement to their security testing while claiming they pose such a threat. Insofar as the label reflects
the FCC’s signal to consumers about cybersecurity, it is reasonable for the FCC to take a cautious
261
A2LA Comments at 4.
262
CTIA Comments at 41.
263
CTIA Reply at 7.
Federal Communications Commission FCC 24-26
41
approach especially for those products for which relevant Federal agencies have expressed other security
concerns with the testing lab.
77. NCTA also suggests also suggests that “any ‘foreign entity of concern’ as defined by the
CHIPS Act should be ineligible for certification or recognition as a CyberLAB.”
264
Further, ioXt Alliance
recommends that the Commission “establish rules to ensure CyberLABs are not subject to undue
influence by foreign adversaries.”
265
We agree that it would be problematic for the U.S. to rely on the
determination of entities controlled or affiliated with “foreign adversaries” as to the security of products
approved to use the Cyber Trust Mark, and therefore the Lead Administrator will not recognize for
purposes of the IoT Labeling Program any testing lab that is an entity, its affiliate, or subsidiary owned or
controlled by a “foreign adversary” country. A “foreign adversary” country is defined in the Department
of Commerce’s rule, 15 CFR § 7.4,
266
and includes China (including Hong Kong), Cuba, Iran, North
Korea, Russia, and Maduro Regime. Because of the role CLAs will play in the labeling program, we find
that the concerns related to entities identified as “foreign adversaries” are equally applicable to entities
acting as CLAs as they are testing labs.
267
To avoid these issues, the record suggests requiring testing labs
certify compliance with the Commission’s rules, including the rules pertaining to the Covered List.
268
Accordingly, we find it appropriate that each testing lab must certify to the truth and accuracy of all
information included in its recognition application and immediately update the information if the
information changes.
78. We also note that Garmin advocates even stricter measures on the testing labs, suggesting
that the labs be “located in the U.S.”
269
We decline to require physical location within the U.S. to avoid
“unnecessarily limiting the pool of legitimate CyberLABs approved to conduct testing and conformity
assessment for the Mark.”
270
Further, the record indicates that this stricter approach “would vastly
diminish manufacturers’ abilities to select and access evaluation labs, conduct proper risk management
and promote competition and diversity in the lab market.”
271
Such a restriction might also unduly limit
the ability of legitimate foreign corporations that do not raise national security concerns to participate in
the IoT Labeling Program to the detriment of the goal of elevating the cybersecurity posture of those IoT
devices sold in the U.S. and to promote international recognition of the Cyber Trust Mark. We delegate
authority to the Bureau to adopt any additional criteria or procedures necessary with respect to labs
located outside of the United States.
79. Terminating CyberLAB Testing Authority. To address national security concerns, the
CyberLAB recognition afforded to entities under this IoT Labeling Program will be automatically
terminated for entities that subsequently become affiliated with an entity that is owned or controlled by or
264
NCTA Comments at 8.
265
ioXt Alliance Reply at 6.
266
15 CFR § 7.4 (stating “[t]he Secretary has determined that the following foreign governments or foreign non-
government persons have engaged in a long-term pattern or serious instances of conduct significantly adverse to the
national security of the United States or security and safety of United States persons and, therefore, constitute
foreign adversaries solely for the purposes of the Executive Order, this rule, and any subsequent rule” promulgated
pursuant to the Executive Order); see 15 CFR § 7.2 (“Foreign adversary means any foreign government or foreign
non-government person determined by the Secretary to have engaged in a long-term pattern or serious instances of
conduct significantly adverse to the national security of the United States or security and safety of United States
persons.”); see Executive Order 13873 of May 15, 2019, Securing the Information and Communications Technology
and Services Supply Chain, 84 Fed. Reg. 22689 (May 15, 2019).
267
See supra para. 76.
268
NCTA Comments at 8.
269
Garmin Comments at 15.
270
ioXt Alliance Reply at 6.
271
CTA Comments at 27.
Federal Communications Commission FCC 24-26
42
affiliated with entities that produce equipment placed on the Covered List, or that are otherwise added to
any exclusionary list identified in this item as precluding authorization as a CyberLAB. CyberLAB
testing authority may also be terminated for failure to uphold the required competencies or accreditations
enumerated above. We delegate authority to the Bureau to determine when a CyberLAB’s authority is to
be terminated, and to terminate such authorization.
272
The Bureau may identify such deficiencies itself or
receive notice from other entities, including other agencies, consumers, and industry, that products tested
by a CyberLAB do not accurately reflect the security posture of the product. Products authorized to use
the FCC IoT Label by a disqualified CyberLAB will be subject to the disqualification procedures
described further below.
80. Fees. To fulfill their role, as envisioned by the IoT Labeling NPRM,
273
we authorize
CyberLABs to charge reasonable fees to conduct the tasks adopted today. The IoT Labeling NPRM
proposed a fee calculation methodology adopted by the Commission in the 2020 Application Fee Report
and Order and sought comment on whether any oversight is needed by the Commission over such
charges.
274
We did not receive any comments on the suitability of the approach proposed in the IoT
Labeling NPRM or detailed comments about the degree of oversight the Commission should conduct over
the charges. We recognize the Cybersecurity Coalition’s comments that high fees would deter
participation in the IoT Labeling Program.
275
We anticipate that there will be multiple CyberLABs
authorized through the approach adopted today, and we believe that market competition will ensure fees
are reasonable, competitive, and accessible while covering the costs incurred by the CyberLABs in
performing their designated tasks. We believe this addresses the concerns raised by the Cybersecurity
Coalition and renders the approach proposed in the IoT Labeling NPRM unnecessary. The National
Association of Manufacturers rightly indicates, however, that the fee structure for CyberLABs will
necessitate “robust protections to ensure that CyberLABs focus on the underlying mission of protecting
the public rather than boosting their revenues.”
276
We delegate to the Bureau, in connection with OMD,
to review and reconsider if necessary whether the level and structure of the fees should be regulated by
the Commission.
E. Two-Step Process for Obtaining Authority to Use the FCC IoT Label
81. The Commission adopts a two-step process for a manufacturer seeking authority to use
the FCC IoT Label, which includes (1) product testing by an accredited and Lead Administrator-
recognized lab (e.g., CyberLAB, CLA lab, or an in-house lab) and (2) product label certification by a
CLA. In the IoT Labeling NPRM, the Commission sought comment on the different processes that may
be taken to assess conformity of consumer IoT products and devices to the Commission’s IoT labeling
272
Because of the public safety importance of a CyberLAB having the requisite qualifications and adhering to our
rules when evaluating requests to use the FCC IoT Label, this process should proceed appropriately expeditiously to
minimize any periods of time where a CyberLAB continues to operate in that capacity once concerns have come to
PSHSB’s attention. In particular, PSHSB shall provide notice to the CyberLAB that the Bureau proposes to
terminate the CyberLAB’s authority and provide the CyberLAB a reasonable opportunity to respond (not more than
20 days) before reaching a decision on possible termination. PSHSB may suspend the CLA’s ability conduct
product testing during the pendency of such consideration if appropriate.
273
IoT Labeling NPRM at 20, para. 50. (“We anticipate that . . . third parties in this program may wish to charge for
their services[.]).
274
See id.; Amendment of the Schedule of Application Fees Set Forth in Sections 1.1102 through 1.1109 of the
Commission’s Rules, MD Docket No. 20-270, Report and Order, 35 FCC Rcd 15089, 15127, para. 115-117 (2020).
Application fees are adjusted every two years to reflect changes in the Consumer Price Index. See, e.g., Amendment
of the Schedule of Application Fees Set Forth in Sections 1.1102 through 1.1109 of the Commission’s Rules, MD
Docket No. 20-270, Order, FCC 22-94 (2023).
275
Cybersecurity Coalition Comments at 14.
276
NAM Comments at 4.
Federal Communications Commission FCC 24-26
43
rules.
277
The IoT Labeling NPRM noted that the Commission’s equipment authorization program, as
currently administered, only allows for two authorization procedures: (1) Certification (which requires
the filing of an application) and (2) Supplier’s Declaration of Conformity (SDoC).
278
In the context of
this IoT Labeling Program and as discussed in detail below, we find that in order to ensure the integrity of
this nascent program, that the FCC IoT Label certification process will include a two-step process
involving (1) the use of an accredited and Lead Administrator-recognized laboratory (CyberLAB, CLA
lab, or in-house lab) to test the IoT product for compliance to FCC rules and generate a test report; and (2)
an application to an FCC-recognized CLA (i.e., an accredited certification body) to certify the product as
fully compliant with all relevant FCC IoT Labeling Program rules.
1. Product Testing by an Accredited and Recognized Lab
82. The record is split on the processes the Commission should adopt for manufacturers to
follow when seeking to use the FCC IoT Label, specifically with regard to whether it is necessary for a
third-party to review and verify the product meets all of the IoT Labeling Program requirements,
including product testing, or if the manufacturer should be afforded the opportunity to “self-declare”
compliance and affix the FCC IoT Label without third-party verification.
279
83. UL Solutions, TÜV SÜD, and TIC Council Americas recommend that the Commission
require all applications to be supported by conformity testing conducted by an accredited lab (e.g.,
ISO/IEC 17025 accredited),
280
and submitted to a third-party for verification of compliance with the
Commission’s program requirements.
281
Others argue the Commission should accept a declaration of
277
IoT Labeling NPRM at 15, para. 32; see also ISO/IEC 17000:2004, Conformity assessment - Vocabulary and
general principles, defines conformity assessment as “demonstration that specified requirements relating to a
product, process, system, person or body are fulfilled.” Conformity assessment includes sampling and testing,
inspection, supplier’s declaration of conformity, certification, and management system assessment and registration.
It also includes accreditation of the competence of those activities by a third-party and recognition (usually by a
government agency) of an accreditation program’s capability. ANSI, National Conformity Assessment Principles
for the United States (2007),
https://share.ansi.org/Shared%20Documents/News%20and%20Publications/Brochures/NCAP%20second%20editio
n.pdf [https://perma.cc/2H5E-VSDH].
278
The IoT Labeling NPRM used the SDoC process, self-attestation and self-certification interchangeably.
However, we clarify that the inclusion of these new terms was not an indication of change of policy or regulations to
equipment authorization rules or any FCC rules.
279
As explained by A2LA, “[a] common practice in conformity assessment is self-declaration. This is when
organizations test and inspect their own products and declare that they meet a standard. Caution needs to be
practiced due to the bias inherent in self-declaration. Accreditation is a means of determining the technical
competence of conformity assessment organizations such as laboratories using qualified, third-party accreditation
bodies. It assures federal government agencies as well as private sector organizations that assessments conducted by
accreditation bodies are objective and reliable and that one can have confidence in the data generated by the
accredited testing laboratory.” A2LA Comments at 4.
280
UL Solutions Comments at 2 (supporting conformity testing by an in-house lab, but only where the testing is
aligned to ISO 17025 requirements, which will “enable a standardized approach and level playing field.”); TÜV
SÜD Comments at 3 (opposing allowing manufacturers to perform self-assessments in their internal labs because the
results are not independent); TIC Council Americas Comments at 6 (“[Due to the] higher level of risk associated
with the cybersecurity of IoT products, the complex technical nature of the testing, and the need for consistent and
impartial adherence to the standards for the fidelity of the label and the benefit of the consumer—testing for the
authorization of the use of the label should only be performed by those with the recognized competency to do so.
Self-assessment by manufacturers to the program’s standards should be permitted only where the manufacturer
laboratory has met this bar, such as accreditation to ISO/IEC 17025.”).
281
UL Solutions Comments at 5-6 (explaining that given the high-threat environment in which IoT devices operate
and the potential for digital and physical harms that can result from a cyberattack, requiring assessment by an
independent third-party before a product bears the Cyber Trust Mark “best serves consumers and best enables the
development of a consistent, effective, trustworthy program.”).
Federal Communications Commission FCC 24-26
44
conformity or self-certification,
282
while others recommend the Commission enter into agreements with
each manufacturer to allow the manufacturer to conduct internal conformity testing of its products and
self-certify compliance with the Commission’s program requirements resulting in approval to use the
Cyber Trust Mark without third-party involvement.
283
CTA, for example, contemplates a “Manufacturer
Self-Attestation Process” where manufacturers apply to the Commission for access to a “Mark Self-
Attestation License Agreement” between the manufacturer and the FCC. Under this process, the
manufacturer provides documentation showing how it complies with the NIST Criteria and if the
Commission agrees with the documentation, the parties execute the agreement. The license agreement
will identify the limits of the manufacturer’s license authority, which may be corporate-wide, on a
divisional basis, or for a specific product line.
284
84. To ensure the Cyber Trust Mark retains the highest level of integrity and consumer trust,
we agree with commenters who caution against allowing testing by entities that are not accredited and
recognized. We also agree with Garmin and AHAM, who recommend third-party verification of the
information contained in a manufacturer’s application to use the Cyber Trust Mark.
285
UL Solutions notes
that while the Commission’s equipment authorization process allows some products that pose a low risk
of RF interference to be approved via an SDoC, there is no clear line to be drawn between low-risk and
high-risk connected products when “IoT devices are significant targets for an ever- growing number of
cybersecurity attacks.”
286
In addition, UL Solutions points to the investigation conducted by the
Government Accountability Office (GAO) into the ENERGY STAR program’s initial reliance a
supplier’s declaration of conformity, which GAO found to be unreliable because GAO was able to obtain
UL certification with blatantly non-conforming products.
287
85. The Commission disagrees with commenters who believe the IoT Labeling Program
should offer different methods of conformity assessment based on varying levels of risk and potential
impact on consumers because doing so adds an unnecessary and significant layer of complexity to the
282
Keysight Comments at 2; NAM Comments at 4; Samsung Comments at 5; NCTA Comments at 8-9 (suggesting
“[c]onformity assessment by accredited third-party labs is an effective means to ensure that the Program reflects
high cybersecurity standards,” but if the Commission determines self-certification should be permitted, the self-
certification should match the same administrative requirements and level of testing vigor offered by a CyberLAB
and not afford manufacturers a way to bypass program requirements); CSA Comments at 12 (arguing that self-
attestation or SDoC is critical to the success of the program, and manufacturers should be transparent about their
results and applications should be reviewed by an ISO 17025 accredited entity for completeness and consistency
with the Labeling Program requirements, but the “review should not involve re-testing the device as that would
defeat the purpose of the self-attestation option–to reduce the cost and delay to market for innovative new
products.”).
283
Garmin Comments at 5; CTA Comments at 24 (“The program should prioritize self-assessment and self-approval
processes as the structure underlying a self-attestation option to use the Mark.”).
284
CTA Reply Comments at Annex, A-14 to A-15.
285
See Garmin Comments at 13; see also AHAM Comments at 3 (arguing manufacturers should be permitted to
conduct the required testing and provide a test report to a third-party certifier who reviews the test report and decides
whether to adopt the results and certify that the product meets the Commission’s program requirements and
manufacturers should be able to be qualified as CyberLABs).
286
UL Solutions Comments at 5 (citing e.g., David Paul, IoT Devices See More Than 1.5bn Cyberattacks so Far
This Year (Sept. 13, 2021), https://www.digit.fyi/iot-security-kaspersky-research-attacks/ [https://perma.cc/B7E5-
35BF]; James Coker, Smart home experiences over 12,000 cyber-attacks in a week (July 2, 2021),
https://www.infosecurity-magazine.com/news/smart-home-experiences-cyber/ [https://perma.cc/D6L6-2GLH]; Jill
McKeon, IoT Malware Attack Volume up 123% in Healthcare (July 28, 2022), https://healthitsecurity.com/news/iot-
malware-attack-volume-up-123-in-healthcare).
287
UL Solutions Comments at 5 (citing Government Accountability Office, Energy Star Program, Covert Testing
Shows the Energy Star Program Certification Process Is Vulnerable to Fraud and Abuse, GAO-10-470 (2010),
https://www.gao.gov/assets/files.gao.gov/assets/gao-10-470.pdf [https://perma.cc/9VB5-ZWTA] (GAO Report)).
Federal Communications Commission FCC 24-26
45
process. The Commission recognizes the view of Keysight, NEMA, AIM, Whirlpool, AHAM, Consumer
Reports, Garmin, NAM, ITI, and TIC Council Americas, who support self-attestation as an efficient and
cost effective methodology for applicants to conduct conformity assessments.
288
However, the
Commission agrees with A2LA, which urges caution with self-attestations of conformity “due to the bias
inherent in self-declaration.”
289
We also take into serious consideration the 2010 GAO Report that found
the ENERGY STAR program in effect at that time, which was “primarily a self-certification program
relying on corporate honesty and industry self-policing to protect the integrity of the Energy Star label,”
290
failed to require upfront third-party validation of manufacturers’ self-reported claims of compliance with
the program requirements, which resulted in the certification of bogus products as ENERGY STAR
compliant.
291
ENERGY STAR has since changed the manner in which it certifies products as ENERGY
STAR compliant, stating that in order “[t]o ensure consumer confidence in the ENERGY STAR label and
to protect the investment of ENERGY STAR partners, the U.S. Environmental Protection Agency (EPA)
requires all ENERGY STAR products to be third-party certified. Products are tested in an EPA-
recognized laboratory and reviewed by an EPA-recognized certification body before they can carry the
label.”
292
86. As such, in light of the nascent nature of the IoT Labeling Program, lessons learned in the
ENERGY STAR context, and the need to ensure that the Cyber Trust Mark garners sufficient trust by
consumers to be viewed as providing accurate information and manufacturer participation, we find that
allowing a path to “self-attestation” is not appropriate at this time. While such a path may provide for
prompt time to market for the Cyber Trust Mark itself, the concerns regarding the Mark’s integrity at this
initial stage counsel against “self attestation.” Moreover, we anticipate that the benefits and level of
efficiency afforded manufacturers by the ability to use in-house labs will mitigate the additional process
associated with certification by a CLA, as discussed below.
2. Filing an Application with a CLA
87. We intend for the Cyber Trust Mark to serve as a reliable and trusted way for consumers
to quickly identify those products that meet the Commission’s program requirements. To achieve this,
the Commission must adopt sufficient controls over the IoT Labeling Program to ensure only those
products that meet the Commission’s requirements bear the Cyber Trust Mark. The Commission’s
second step of requiring an application be submitted to a CLA is a significant and important control to
ensure that an independent disinterested third-party outside the manufacturer’s control has reviewed the
manufacturer’s product application and supporting test report and verified that the product complies with
the Commission’s program requirements.
88. The second step of the application process is particularly important because, as discussed
above, the Commission allows the first step (testing) to be completed by an accredited and recognized
CyberLAB, a CLA lab, or the manufacturer’s in-house lab. Requiring the manufacturer to submit an
application with a CLA is an important control, particularly to ensure that all products, including those
products whose conformity testing is conducted, and reports are generated, by the manufacturer’s in-
288
See Coalition Letter Reply at 2; Keysight Comments at 2; NEMA Comments at 5; AIM Comments at 3;
Whirlpool Comments at 4 (supports self-attestation especially for lower risk IoT, but notes self-attestation should be
validated by a third-party to protect the integrity of the program); AHAM Comments at 3; Samsung Comments at 5;
Consumer Reports Comments at 20; Garmin Comments at 12; NAM Comments at 4; ITI Reply at 4; TIC Council
Americas Reply at 1.
289
A2LA Comments at 4; see also Ravnitzky Comments at 1.
290
GAO Report at 8.
291
GAO Report at 7.
292
ENERGY STAR, Third-Party Certification,
https://www.energystar.gov/partner_resources/products_partner_resources/third_party_cert
[https://perma.cc/N6HG-JRKW] (last visited Jan. 16, 2024).
Federal Communications Commission FCC 24-26
46
house lab, are subject to third-party scrutiny and oversight. As such, the Commission requires all entities
seeking to use the FCC IoT Label must submit an application for authority to a CLA to use the FCC IoT
Label that is supported by the appropriate report detailing the conformity testing conducted by a lab that
is both accredited and Lead Administrator-recognized (CyberLAB, CLA lab, or manufacturer’s in-house
lab). Only entities who have received prior authorization from a CLA (i.e., cybersecurity certification)
are authorized to use the FCC IoT Label, which will ensure the IoT Labeling Program retains its
integrity.
293
We further recognize that the CLA may charge a reasonable fee to cover the cost of
reviewing the application and the costs of conducting the other tasks the CLA would perform. We
delegate authority to the Bureau, in connection with OMD, to review and reconsider, if necessary,
whether the level and structure of the fees should be regulated by the Commission.
294
Once the IoT
Labeling Program is established, we may revisit the issue of whether to adopt additional pathways to
obtaining authority to use the FCC IoT Label.
89. The IoT Labeling NPRM sought comment on whether and how one or more third-party
administrators should be utilized to manage the IoT Labeling Program, and whether the Commission
should designate one or more administrators to authorize use of the label.
295
Kaiser Permanente argues
that the Commission should maintain ownership of the application process, as well as oversight and
supervision of third parties administering the IoT Labeling Program.
296
Garmin notes that the application
process described in the IoT Labeling NPRM is unclear and worries that third-party involvement would
require enormous effort, and cautioned that sharing sensitive information with a third-party administrator
itself raises security concerns.
297
However, the record was silent with respect to details about an
application process. We agree that oversight and supervision of the IoT Labeling Program, including
intaking applications, will require effort but believe a CLA is in the best position to streamline that
process and, as noted, ensure the integrity of the process. We will require the CLA to have the ability to
securely handle large volumes of information, which we believe should alleviate Garmin’s concern.
298
We outline the application process to use the FCC IoT Label below.
90. Before being able to display the Cyber Trust Mark, the applicant must determine their
product is an eligible product under our rules; have their product tested by an accredited and Lead
Administrator-recognized CyberLAB, CLA Lab, or manufacturer’s in-house lab; obtain a report of
conformity and compliance from the lab; and submit an application for authority to use the FCC IoT
Label to an FCC-recognized CLA in accordance with their procedures. Using the CLAs’ filing processes,
entities seeking authority to use the FCC IoT Label will file an application to be developed by the Bureau.
Each application must include a report of conformity issued by an accredited CyberLAB, accredited CLA
lab, or accredited in-house lab whose testing and reporting is comparative in rigor to that completed by a
CyberLAB. The CLA will review the application and supporting documentation to ensure it is complete
and in compliance with the Commission’s rules and will either grant or deny the application. If an
application is granted, the CLA will provide the applicant with notification of the grant and authority to
affix the FCC IoT Label to the product granted authorization.
293
In addition to the discussion in the text, we adopt certain rules to support the administration and integrity of the
IoT Labeling Program, including governing the designation of agents for service of process and governing required
signatures. See infra, Appx. A, 47 CFR § 8.208(i), (k). We model our approach on analogous elements of our
equipment authorization rules, with which the Commission and industry have substantial experience, and which
have proven workable in practice. See 47 CFR § 2.911(d)(7), (f).
294
See CTA March Ex Parte Appx. B at 3.
295
IoT Labeling NPRM at 11, para. 23.
296
Kaiser Permanente Comments at 3.
297
Garmin Comments at 12.
298
See supra para. 5959Error! Reference source not found. (requiring CLAs to “[demonstrate] ability to securely
handle large volumes of information and demonstration of internal security practices.”).
Federal Communications Commission FCC 24-26
47
91. Applications that do not meet the Commission’s IoT Labeling Program requirements will
be denied by the CLA. If an application is denied, the CLA will provide the applicant with notification of
the denial and an explanation of why it was denied. An applicant may only re-submit an application for a
denied product if the CLA-identified deficiencies have been corrected. The applicant must indicate on its
application that it is re-submitting the application after it was denied, the name of the CLA that denied the
application, and the CLA’s explanation of why it was denied. Failure to disclose the denial of an
application for the same or substantially similar product will result in denial of the application for that
product and the FCC will take other regulatory and/or legal action it deems appropriate.
92. Grant or denial of an application for authority to use the FCC IoT Label will be made by
the CLA in the first instance. The CLA will return incomplete applications to the applicant or otherwise
contact the applicant regarding the incomplete application, as soon as possible.
93. We delegate authority to the Bureau to issue a Public Notice after any necessary notice
and public comment and after completing any process required under the Paperwork Reduction Act,
providing further details on how to apply for authority to use the FCC IoT Label, including but not
limited to informational elements of the application, additional details on filing requirements (e.g.,
description or photograph of the label and how/where it will be affixed to the product), and how to
request confidential treatment of submitted information. As the Commission anticipated in the NPRM,
299
CLAs may charge reasonable fees for their services and to cover the costs of performing the
administrative duties. The IoT Labeling NPRM proposed to follow the fee calculation methodology
adopted by the Commission in the 2020 Application Fee Report and Order and requested comment on the
proposal and any changes.
300
We did not receive any comments on the suitability of this approach. We
recognize the Cybersecurity Coalition’s comments that high fees would deter participation in the IoT
Labeling Program.
301
We anticipate that there will be multiple administrators authorized through the
approach adopted today, and we believe that market competition will ensure fees are reasonable,
competitive, and accessible while covering the costs incurred by the CLA in performing their designated
tasks. We believe this addresses the concerns raised by the Cybersecurity Coalition and renders the
approach proposed in the IoT Labeling NPRM unnecessary. We therefore reject the NPRM’s proposal.
To the extent that the Lead Administrator may incur costs in performing its duties on behalf of the
program as a whole, we expect these costs to be shared among CLAs as a whole.
302
We delegate to the
Bureau, in connection with OMD, to consider these issues and provide guidance to the CLAs and Lead
Administrator to ensure the fees do not become onerous, as indicated by the record.
303
94. Seeking Review of CLA Decision. Any party aggrieved by an action taken by a CLA
must first seek review from the CLA, which must be filed with the CLA within 60 days from the date of
the CLA’s decision. The CLAs should respond within 10 business days to a request for review.
304
A
party aggrieved by an action taken by a CLA may, after seeking review by the CLA, seek review from the
299
IoT Labeling NPRM at 20, para. 50.
300
Amendment of the Schedule of Application Fees Set Forth in Sections 1.1102 through 1.1109 of the
Commission’s Rules, MD Docket No. 20-270, Report and Order, 35 FCC Rcd 15089, 15127, para. 115-117 (2020).
Application fees are adjusted every two years to reflect changes in the Consumer Price Index. See, e.g., Amendment
of the Schedule of Application Fees Set Forth in Sections 1.1102 through 1.1109 of the Commission’s Rules, MD
Docket No. 20-270, Order, FCC 22-94 (2023).
301
Cybersecurity Coalition Comments at 14.
302
See supra para. 52 (describing the duties of the Lead Administrator). We recognize that many of the duties of the
Lead Administrator benefit all the CLAs and the program as a whole, and we do not suggest that the costs associated
with the duties of the Lead Administrator as described in this Order to be an exhaustive list of the shared costs we
expect to be shared among CLAs as a whole.
303
See Cybersecurity Coalition Comments at 14.
304
See CTA March Ex Parte Appx B at 5 (recommending CLAs respond within 10 days to a request for review.)
Federal Communications Commission FCC 24-26
48
Commission. A request for Commission review must be filed with the Commission within 60 days from
the date the CLA issues a decision on the party’s request for review. Other parties interested in
Commission review of a CLA decision must adhere to the time periods for filing oppositions and replies
set forth in 47 CFR § 1.45.
95. We delegate authority to PSHSB to consider and act upon requests for review of CLA
decisions. Requests for review that raise novel questions of fact, law, or policy will be considered by the
full Commission. An affected party may seek review of a decision issued under delegated authority
pursuant to the rules set forth in part 1 of the Commission’s rules. The Bureau will conduct de novo
review of requests for review of decisions issued by a CLA. The Commission will conduct de novo
review of requests for review of decisions by the CLA that involve novel questions of fact, law, or policy;
provided, however, that the Commission will not conduct de novo review of decisions issued by the
Bureau under delegated authority. The Bureau will, within 45 days, take action in response to a request
for review of CLA decision that is properly before it.
305
The Bureau may extend the time period for
taking action on a request for review of a CLA decision for a period of up to 90 days. The Commission
may also at any time, extend the time period for taking action of a request for review of a CLA decision
pending before the Bureau. The Commission will issue a written decision in response to a request for
review of a CLA decision that involves novel questions of fact, law, or policy within 45 days. The
Commission may extend the time period for taking action on the request for review of a CLA decision.
The Bureau also may extend action on a request for review of an CLA decision for a period of up to
ninety days. While a party seeks review of a CLA decision, they are not authorized to use the FCC IoT
Label until the Commission issues a final decision authorizing their use of the FCC IoT Label.
F. Consumer IoT Product Cybersecurity Criteria and Standards
96. Technical Criteria for Consumer IoT Products. In the IoT Labeling NPRM, the
Commission sought comment on adopting NIST’s recommended IoT criteria (NIST Core Baseline),
which are discussed in detail in NISTIR 8425, as the basis for the IoT Labeling Program.
306
The
Commission also asked whether there are other IoT criteria it should consider and whether there are
separate criteria that should be considered for higher risk IoT devices or classes of devices.
307
We adopt
the IoT Labeling NPRM proposal that the NIST Core Baseline serve as the basis of the IoT Labeling
Program. The NIST Core Baseline is based on product-focused cybersecurity capabilities (also referred
to by NIST as “Outcomes”) rather than specific requirements, which NIST asserts provide the flexibility
needed due to the diverse marketplace of IoT products, and we agree. As outlined in the IoT Labeling
NPRM, the NIST criteria includes the following IoT product capabilities: (1) asset identification; (2)
product configuration; (3) data protection; (4) interface access control; (5) software update; (6)
cybersecurity state awareness; and the following IoT Product Developer Activities: (7) documentation;
(8) information and query reception; (9) information dissemination; and (10) product education and
awareness.
308
97. The record reflects broad support for adoption of the technical criteria presented in
NISTIR 8425. For example, a coalition of industry stakeholders including the Association of Home
Appliance Manufacturers, Connectivity Standards Alliance, Consumer Technology Association, CTIA
305
See Id. (recommending the Bureau respond to appeals within 20 days.)
306
IoT Labeling NPRM at 13, para. 27 (citing Appendix A (describing the NIST criteria)); see also NISTIR 8425.
307
Id.
308
NISTIR 8425 at 4; NIST Cybersecurity White Paper at 4-10 (Feb. 4, 2022); NIST, Report for the Assistant to the
President for National Security Affairs (APNSA) on Cybersecurity Labeling for Consumers: Internet of Things (IoT)
Devices and Software, A summary review of labeling actions called for by Executive Order (EO) 14028: Improving
the Nation’s Cybersecurity at 4 (2022),
https://www.nist.gov/system/files/documents/2022/05/24/Cybersecurity%20Labeling%20for%20Consumers%20un
der%20Executive%20Order%2014028%20on%20Improving%20the%20Nation%27s%20Cybersecurity%20Report
%20%28FINAL%29.pdf [https://perma.cc/PA4J-DD76] (NIST Summary Report).
Federal Communications Commission FCC 24-26
49
Information Technology, Industry Council, National Electrical Manufacturers Association, Plumbing
Manufacturers International Power Tool Institute, Security Industry Association, Telecommunications
Industry Association, U.S. Chamber of Commerce, and USTelecom submitted a letter to the Commission
supporting the establishment of “a voluntary program based on the technical criteria developed by
[NIST], under NISTIR 8425.”
309
UL Solutions supports adoption of the NISTIR 8425 criteria and asserts
that there are several mature standards that can be drawn from that address the NISTIR 8425 criteria, such
as UL 2900, UL 5500, and IEC 62443.
310
98. CTIA supports adoption of the NIST Core Baseline, but urges the Commission not to
prescribe any specific methodologies that testing programs or standards must use, other than to require
that such programs or standards be consistent with NIST Core Baseline.
311
CSA also supports adoption of
the NIST Core Baseline, but urges the Commission to refrain from developing its own standards for
testing.
312
Rather, CSA asserts that they have developed a certification program that meets the
requirements of NISTIR 8425 and other relevant standards documents, including ETSI EN 303 645 and
the Singapore Cybersecurity Labeling Scheme,
313
and CTA indicates that they are working on American
National Standards (ANS) documents that will “[d]efine a Framework that is a standardized and objective
method of applying the Criteria in NISTIR 8425 to a candidate Scheme or to a manufacturer’s proposal
for self-attestation…”
314
Garmin encourages the Commission to consider ETSI 303 645 standards,
315
and
commenters American Certification Body, Inc. and Consumer Reports encourage international standards
such as those developed as a result of the EU Cyber Resiliency Act and UK’s Product Security and
Telecommunications Infrastructure Act.
316
These commenters did not oppose referencing the NIST
criteria.
99. We agree with Infineon, Consumer Reports, and NCTA and adopt NISTIR 8425 as the
basis for the Commission’s IoT Labeling Program.
317
The consumer IoT environment is complicated by a
significant number of different types of consumer IoT products. Adoption of the NIST criteria as the
foundation of the IoT Labeling Program will result in a robust consumer IoT program that is sufficiently
flexible that it can be applied across all types of consumer IoT products. The NIST criteria were
309
Coalition Letter Reply at 1. See also, CSA Comments at 8-9 (“[CSA] recommends prompt adoption of NISTIR
8425 as the basis for the program”); CTIA Comments at 16; CTA Comments at 11; NCTA Comments at 5;
Consumer Reports Comments at 16-17; ioXt Alliance Comments at 6; Cybersecurity Coalition Comments at 7; UL
Solutions Comments at 4; ITI Comments at 7; TechNet Comments at 2; Comcast Comments at 11; Kaiser
Permanente Comments at 3; NTCA Reply at 3; AHAM Comments at 4; Samsung Comments at 3; NYC Cyber
Command Office of Technology & Innovation Comments at 3 (supporting consideration of the Cloud Security
Alliance’s IoT Framework, based on sourced NIST controls) (NYC OTI).
310
See, e.g., UL Solutions Comments at 4.
311
See CTIA Comments at 22.
312
CSA Comments at 10-11.
313
Id.
314
CTA Reply at A-1; see also CTIA Ex Parte.
315
See Garmin Comments at 10.
316
See American Certification Body, Inc. Reply at 1 (encouraging incorporation of international standards such as
the EU Cyber Resiliency Act); Consumer Reports Comments at 18-19 (recommending the UK’s Product Security
and Telecommunications Infrastructure Act).
317
See, e.g., Infineon Comments at 2 (“Infineon recommends that the Commission adhere as closely as possible to
NISTIR 8425, which is one of the best and most widely recognized cybersecurity standards for IoT.”); Consumer
Reports Comments at 18 (The NIST 8425 document creates an excellent starting place for setting the criteria for a
certification program and should be used to develop the framework.”); NCTA Comments as 5-6 (“Building the
Program on the foundation of [NISTIR 8425]’s already-established process and guidance would maintain a
consistent federal approach to IoT security baseline requirements[.]”).
Federal Communications Commission FCC 24-26
50
developed through a multi-year effort between NIST and various stakeholders, and includes significant
industry input and will continue to be updated by NIST as necessary. The Commission agrees with
NIST’s publication, which avers that the following NISTIR 8425 criteria identify the cybersecurity
capabilities that consumers would expect manufacturers to address within the products they buy. NIST
contemplates that most of the criteria concern the IoT product directly and are expected to be satisfied by
software and/or hardware implemented in the IoT product (1-6 below) and other criteria apply to the IoT
product developer (7-10 below).
318
The following is the list of the NIST IoT product capability criteria,
NIST’s brief description of each, and the NIST-identified cybersecurity utility for each:
319
(1) Asset Identification: The product can be uniquely identified by the customer and
other authorized entities and the product uniquely identifies each IoT product
component and maintains an up to date inventory of connected product components
i. Cybersecurity Utility: The ability to identify IoT products and their
components is necessary to support such activities as asset management for
updates, data protection, and digital forensics capabilities for incident
response.
(2) Product Configuration: The configuration of the IoT product is changeable, with an
ability to restore a secure default setting, and changes can only be performed by
authorized individuals, services, and other IoT product components.
i. Cybersecurity Utility: The ability to change aspects of how the IoT product
functions can help customers tailor the IoT product’s functionality to their
needs and goals. Customers can configure their IoT products to avoid
specific threats and risk they know about based on their risk appetite.
(3) Data Protection: The IoT product protects data store across all IoT product
components and transmitted both between IoT product components and outside the
IoT product from unauthorized access, disclosure, and modification.
i. Cybersecurity Utility: Maintaining confidentiality, integrity, and availability
of data is foundational to cybersecurity for IoT products. Customers will
expect that data are protected and that protection of data helps to ensure safe
and intended functionality of the IoT product.
(4) Interface Access Control: The IoT product restricts logical access to local and
network interfaces – and to protocols and services used by those interfaces – to only
authorized individuals, services, and IoT product components.
i. Cybersecurity Utility: Enumerating and controlling access to all internal and
external interfaces to the IoT product will help preserve the confidentiality,
integrity, and availability of the IoT product, its components, and data by
helping prevent unauthorized access and modification.
(5) Software Update: The software of all IoT product components can be updated by
authorized individuals, services, and other IoT product components only by using a
secure and configurable mechanism, as appropriate for each IoT product component.
i. Cybersecurity Utility: Software may have vulnerabilities discovered after the
IoT product has been deployed; software update capabilities can help ensure
secure delivery of security patches.
(6) Cybersecurity State Awareness: The IoT product supports detection of cybersecurity
incidents affecting or affected by IoT product components and the data they store and
318
NISTIR 8425 at 2; NIST Cybersecurity White Paper at 4-10; NIST Summary Report at 4.
319
NISTIR 8425 at 5-10; see also IoT Labeling NPRM at Appendix A.
Federal Communications Commission FCC 24-26
51
transmit.
i. Cybersecurity Utility: Protection of data and ensuring proper functionality
can be supported by the ability to alert the customer when the device starts
operating in unexpected ways, which could mean that unauthorized access is
being attempted, malware has been loaded, botnets have been created, device
software errors have happened, or other types of actions have occurred that
was not initiated by the IoT product user or intended by the developer.
The following is the list of NIST-identified IoT Product Developer Activities/Non-Technical Supporting
Capabilities and their NIST-identified cybersecurity utility:
320
(7) Documentation: The IoT product developer creates, gathers, and stores information
relevant to cybersecurity of the IoT product and its product components prior to
customer purchase, and throughout the development of a product and its subsequent
lifecycle.
i. Cybersecurity Utility: Generating, capturing, and storing important
information about the IoT product and its development (e.g., assessment of
the IoT product and development practices used to create and maintain it)
can help inform the IoT product developer about the product’s actual
cybersecurity posture.
(8) Information and Query Reception: The IoT product developer has the ability to
receive information relevant to cybersecurity and respond to queries from the
customer and others about information relevant to cybersecurity.
i. Cybersecurity Utility: As IoT products are used by customers, those
customers may have questions or reports of issues that can help improve the
cybersecurity of the IoT product over time.
(9) Information Dissemination: The IoT product developer broadcasts (e.g., to the
public) and distributes (e.g., to the customer or others in the IoT product ecosystem)
information relevant to cybersecurity.
i. Cybersecurity Utility: As the IoT product, its components, threats, and
mitigations change, customers will need to be informed about how to
securely use the IoT product.
(10) Product Education and Awareness: The IoT product developer creates awareness
of and educates customers and others in the IoT product ecosystem about
cybersecurity-related information (e.g., considerations, features) related to the IoT
product and its product components.
i. Cybersecurity Utility: Customers will need to be informed about how to
securely use the device to lead to the best cybersecurity outcomes for the
customers and the consumer IoT product marketplace.
100. Consumer IoT Product Standards. The IoT Labeling NPRM recognized that the
Commission’s “conformity assessment program must be based on IoT security standards and testing
requirements that the IoT devices and products must satisfy to be eligible to receive and use the label.”
321
The IoT Labeling NPRM proposed that standards be developed jointly with industry and other
stakeholders and asked for comments on who should convene these stakeholders and develop standards
that allow for “the consistent and replicable testing necessary to ensure the outcome based NIST IoT
320
NISTIR 8425 at 11-16.
321
IoT Labeling NPRM at 13, para. 28.
Federal Communications Commission FCC 24-26
52
labeling criteria are fulfilled.”
322
The Commission sought comment on whether the Commission or an
outside entity is in the best position to convene these stakeholders. The IoT Labeling NPRM also sought
comment on the relevant industry consensus standards that may already exist and should be considered by
the Commission for the IoT Labeling Program, or whether new standards need to be developed.
101. We find that standards are necessary to administer the IoT Labeling Program in a fair and
equitable manner and to ensure the products with the FCC IoT Label have all been tested to the same
standards to provide consumers with confidence that products bearing the FCC IoT Label include strong
cybersecurity. Commenters generally agree with the adoption of standards based on NIST’s Core
Baseline for Consumer IoT products (NISTIR 8425).
323
We take up the Cybersecurity Coalition’s
recommendation “that the Commission or a designated third-party administrator work with stakeholders
to identify recognized standards that encompass the Core Baseline, or that offer equivalent controls.”
324
NCTA also notes that “Standards Development Organizations (“SDOs”) and specification organizations
are well-established organizations that can develop standards aligned with NIST guidelines and the
Program’s goals.”
325
According to NIST, the NISTIR 8425 “outcomes are guidelines that describe what
is expected… but more specific information may be needed to define how to implement IoT products or
product components so that they meet an outcome. Requirements define how a component can meet an
outcome for a specific use case, context, technology, IoT product component etc. ….”
326
102. We reject CTIA’s recommendation that the Commission refrain from adopting specific
standards and solely rely on the NIST criteria.
327
Rather, the Commission agrees with NIST and
commenters that its criteria are general guidelines that must be further developed into a requirements
document (i.e. standards) and corresponding testing procedures, which will demonstrate how the product
bearing the FCC IoT Label has met the NIST criteria and to ensure consistency of application across a
class of products. ITI adds that the “Commission need not recreate [existing] work or develop its own
standards but can leverage completed standards work for swift development and implementation.”
328
The
integrity of the Cyber Trust Mark requires the Commission to adopt standards that provide for adequate
and consistent testing of products to ensure that all products bearing the FCC IoT Label have
demonstrated conformance to the identified standards that the Commission has approved as compliant
with the NIST criteria. In addition, for the Commission’s IoT Labeling Program to be fairly administered
by the multiple CLAs, all products displaying the FCC’s label must be tested against the same standards
to ensure that all products displaying the FCC IoT Label conform to the Commission’s standards.
103. Commenters such as TÜV SÜD agree that “the main requirement when perform[ing]
testing for compliance is that the test need[s] to be reliable and always offer the same outcome when a
product is tested in the same condition. In the current state of the NIST IoT criteria there is not enough
detail[] in the standard, so there is the need to write a more detail[ed] test method/standard.”
329
UL
Solutions also “supports the use of the NISTIR 8425 criteria as the basis for the IoT Labeling Program.
These criteria help establish a minimum security baseline suitable for consumer IoT products… However,
as noted in paragraphs 27 and 28 [of the IoT Labeling NPRM], these criteria must be defined by minimum
IoT security requirements and standards to enable consistent and replicable product testing.”
330
322
Id.
323
See, e.g., Cybersecurity Coalition Comments at 6; UL Solutions Comments at 4; Samsung Comments at 3.
324
Cybersecurity Coalition Comments at 6-7.
325
NCTA Comments at 6.
326
IoT Product Component Requirements Essay at 1-2 (emphasis in original).
327
CTIA Comments at 16.
328
ITI Reply at 5.
329
TÜV SÜD Comments at 3.
330
UL Solutions Comments at 4.
Federal Communications Commission FCC 24-26
53
Moreover, Somos similarly agrees that leveraging existing standards for device definition and security
guidelines are the fastest, most effective path to the definition of a secure ecosystem, that NIST 8425
standard is the appropriate starting point, and that “existing standards should allow for the Commission to
quickly create its definitions and guidelines.”
331
We agree with the Cybersecurity Coalition that “only
those standards and best practices recognized by the labeling program should be eligible, in order to avoid
the inclusion of non-credible or irrelevant frameworks that may undermine trust in the label.”
332
104. We further determine that, given the existing work in this space, the Commission should
not undertake the initial development of the standards that underpin the NIST Core Baseline. Rather, as
discussed in paragraph 56 above, we direct the Lead Administrator to undertake this task, and delegate
authority to the Bureau to review and approve the consumer IoT cybersecurity standards and testing
procedures that have been identified and/or developed by the Lead Administrator (after any appropriate
public comment) that ensures the product to which a manufacturer seeks to affix the FCC IoT Label
conforms to the NIST criteria. NIST’s IoT Product Component Requirements Essay provides a summary
of standards and guidance that NIST has initially identified as applicable to IoT devices and IoT product
components, that the Lead Administrator may determine are applicable to the IoT Labeling Program.
333
Moreover, the Lead Administrator may also determine existing standards or schemes that exist in the
market already may be readily adaptable and leverage such work to meet the terms of the program.
105. The Commission recognizes that since a “product” for purposes of the IoT Labeling
Program is comprised of at least one IoT device and any additional product components that are necessary
to use the IoT device beyond basic operational features, there may be multiple standards (e.g., a package
of standards) applicable to a single IoT product (e.g., standards applicable to IoT devices; mobile apps;
networking equipment included with IoT devices; and cloud platforms). The Commission does not
anticipate a single standard would be developed or identified to apply to all consumer IoT products.
However, a single package of standards may be developed or identified for each product type or class as
identified by the Lead Administrator and reviewed and approved by the Bureau. We also agree with the
Cybersecurity Coalition that “participants should have discretion to include security features that go
beyond standard requirements . . . So long as the additional security features do not conflict with
conformity with the standard used for eligibility by the labeling program participants, participants should
be encouraged to go beyond baseline requirements.”
334
G. The FCC IoT Label (Cyber Trust Mark and QR Code)
106. We adopt the IoT Labeling NPRM’s proposal to implement a single binary label with
layering.
335
As discussed in the IoT Labeling NPRM, “under a binary label construct, products will either
qualify to carry the label or not qualify (i.e., not be able to carry the label) and ‘layers’ of the label would
include the Commission’s Cyber Trust Mark representing that the product or device has met the
Commission’s baseline consumer IoT cybersecurity standards and a scannable code (e.g., QR Code)
directing the consumer to more detailed information of the particular IoT product.”
336
107. We adopt a binary label because we believe that a label signaling that an IoT product has
met the minimum cybersecurity requirements will be simplest for consumers to understand, especially as
the label is introduced to and established for the public. The Cybersecurity Coalition supports a binary
label, citing the benefits of a simple, consumer friendly nature and its potential to streamline the
331
Somos Reply at 1.
332
Cybersecurity Coalition Comments at 6-7.
333
IoT Product Component Requirements Essay at 3-7.
334
Cybersecurity Coalition Comments at 6-7.
335
IoT Labeling NPRM at 16, para. 35.
336
Id. (internal footnotes omitted).
Federal Communications Commission FCC 24-26
54
purchasing decision for consumers.
337
Similarly, as LG points out, “[l]ike the ENERGY STAR program,
a binary label specifying that a device has met a government standard – in this case for cybersecurity –
will be enough to drive consumers and manufacturers toward more secure products,” while leaving
manufacturers free to separately provide additional cybersecurity information about their products.
338
And the Connectivity Standards Alliance supports the use of a single binary label with layering, as
recommended by NIST, asserting that “[a]cademic studies have validated this approach.”
339
Conversely,
Canada advocates a multi-tiered approach to labeling to “lower barriers to entry into the labelling regime
and facilitate trade and competition by ensuring Micro, Small and Medium Sized Enterprises (MSMEs),
with fewer resources to meet a high level of cybersecurity,” and to “provide the incentives for a greater
number of firms to innovate in IoT products and work on ‘climbing the ladder’ of cybersecurity levels
over time.”
340
Another commenter suggests a multi-tiered label that would have different colors
depending on the length of time the product is supported.
341
Other commenters advocate a multi-tiered
approach that need not be reflected in different Cyber Trust Marks, but in different information available
when a consumer scans the QR code.
342
A study by Carnegie Mellon University indicates that different
types of labels of various complexities have varying levels of effectiveness but does not contest the idea
of a binary label.
343
We also recognize that some international regimes, such as Singapore, use a multi-
tiered label.
344
108. Although one could imagine myriad different approaches to labeling that each have
relative advantages and disadvantages, on balance we are persuaded to rely on a binary label as we begin
our IoT Labeling Program, consistent with NIST’s recommended approach. We agree with the
Cybersecurity Coalition that “the primary value of the IoT . . . labeling program is to better enable
ordinary consumers to distinguish labeled products as likely providing better basic security than unlabeled
products.”
345
We believe a binary label meets this goal by providing a clear indication that products with
the label meet the Commission’s cybersecurity requirements. We anticipate that promoting early
consumer recognition of the FCC IoT Label—which we think is better advanced by a binary label—will,
in turn, make consumers more attuned to cybersecurity issues and more receptive to additional
cybersecurity information that manufacturers elect to provide apart from the FCC IoT Label and
associated QR code. Thus, we believe that our use of a binary label still retains incentives for
manufacturers to innovate and achieve higher levels of cybersecurity. Our approach to determining what
337
Cybersecurity Coalition Comments at 1; see also, e.g., CTA Comments at 32 (“CTA supports the Commission’s
proposal, consistent with NISTIR 8425, to implement a single, binary label with layered information. This approach
will allow consumers to rapidly assess product security at point-of-sale and provide more detailed, up-to-date
information to consumers or subject matter experts conducting a more thorough review of a product’s capabilities.”
(footnote omitted)).
338
LG Electronics Comments at 2.
339
Connectivity Standards Alliance Comments at 13.
340
Government of Canada Comments at 1.
341
Jason Cole Comments at 1.
342
See, e.g., CTIA Comments at 28.
343
See Carnegie Mellon and Duke Researcher Comments at 5.
344
Cyber Security Agency of Singapore, Cybersecurity Labeling Scheme (CLS) for Consumers,
https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme/for-
consumers [https://perma.cc/X3MG-MKZ4] (last visited Jan. 8, 2024); see also, e.g., Government of Canada
Comments at 1 (noting Singapore’s program and advocating “instituting a number of levels of cybersecurity that
firms could choose to meet”); People’s Republic of China Comments at 4-5 (advocating “that the U.S. utilize the
internationally recognized IoT product network security level classification system to further specify the safety level
standards for related products in this [labeling] program, and provide specific requirements for classification
certification and corresponding label information based on the level”).
345
Cybersecurity Coalition Comments at 1.
Federal Communications Commission FCC 24-26
55
cybersecurity standards will be applied also accommodates the potential for different requirements being
necessary to meet the NIST baseline criteria in different contexts.
346
To the extent that any multi-tiered
labeling approach contemplated by commenters would allow manufacturers to obtain a label through
lesser cybersecurity showings, that would be less effective at achieving the goals of our program. And to
the extent that any multi-tiered labeling approach would require manufacturers to make heightened
cybersecurity showings to achieve higher-tier labels, that is unlikely to lower barriers to participation in
the IoT Labeling Program while also risking less understanding and acceptance of the FCC IoT Label by
consumers. Because delay in moving forward with the IoT Labeling Program would have its own costs
in pushing back the potential for benefits to consumers and device security, we also recognize the benefits
of a binary label as more straightforward to implement, at least at the start of our IoT Labeling Program.
Weighing all the relevant considerations, we are persuaded to move forward with a binary label at this
time.
109. We require that products bearing the FCC IoT Label, which includes the Cyber Trust
Mark, must also include the corresponding QR Code. Approval to use the Cyber Trust Mark is
conditioned on the label also bearing the QR Code in accordance with the IoT Labeling Program’s label
standards. In addition, the FCC IoT Label must be easily visible to consumers (e.g., on product
packaging). This approach received considerable support in the record. We agree with USTelecom that
“consumers should not have to open the package to get information because that could impact their ability
to return the product.”
347
Power Tool Institute, Inc. concurs that “[p]lacing a QR Code on the packaging
is preferable to placing it on the device.”
348
Notable pros of using a QR Code are providing “consumers
with detailed information about a device or product,”
349
enhancing the program’s objective by providing
real-time updates.
350
However, some commenters raise concerns with the placement of the QR Code on
the product packaging. Logitech urges the Commission to not require a QR Code in conjunction with the
label, stating that it could crowd packaging, cause consumer confusion, and may cause confusion if
retailers scan the wrong barcode when checking out a customer.
351
We believe that as the label becomes
established and recognized by consumers and retailers, the benefit of providing a QR Code linking to a
registry populated with current information on the IoT product outweighs the potential for consumer
confusion. We also believe the registry will be of value to consumers such that they will want to see it
acknowledged in an easily accessible manner, which will override any potential difficulty retailers may
have with scanning the incorrect code. Moreover, recognizing the realities of inventory turnover against
the need for a cybersecurity label to be dynamic, the use of a QR Code-embedded URL in this context
ensures that (1) if a consumer desires more information about the product than what the label itself
signifies there is a simple means of access; and (2) information associated with the product’s compliance
with the IoT Labeling Program is current. We view these as relevant considerations to purchasing
decisions, which requires easy access to such information “on the spot” rather than requiring a purchaser
to independently seek it out.
110. We direct the Lead Administrator to collaborate with stakeholders as needed to
recommend to the Commission standards for how the FCC IoT Label bearing the Cyber Trust Mark and
the QR Code should be designed (e.g., size and white spaces) and where such a label should be placed.
This should include where the label could be placed on products where consumers may not see product
packaging when shopping or after purchasing (e.g., refrigerators, washing machines, dryers, dishwashers,
etc.) and including where consumers purchase products online. The Lead Administrator and stakeholders
346
See supra paras. 56-58.
347
USTelecom Comments at 8.
348
Power Tool Institute Comments at 3 (PTI).
349
Kaiser Permanente Comments at 4.
350
NYC OTI Comments at 4.
351
Logitech Comments at 3.
Federal Communications Commission FCC 24-26
56
should also examine whether the label design should include the date the manufacturer will stop
supporting the product as well as whether including other security and privacy information (e.g. sensor
data collection)
352
on the label would be useful to consumers. In addition, the Lead Administrator should
address the use of the FCC IoT Label in store displays and advertising.
353
We recognize the current work
being done by industry on an appropriate format for the label, including the Cybersecurity Label Design,
which is part of CTA’s ANSI-accredited standards program.
354
As noted by CTA in its reply comments,
the FCC specifies requirements for the use of the Cyber Trust Mark, but “there are several additional
details needed regarding QR coding and resolution, white space for accurate recognition of QR codes, and
more.”
355
CTA states that the draft ANSI/CTA-2120 details lay out requirements for packaging, and we
encourage the Lead Administrator to review and consider the work CTA’s Cybersecurity Label Design
working group (a subgroup of CTA’s Cybersecurity and Privacy Management Committee) has completed
in this regard.
356
We agree that we should take into consideration the considerable work that has already
been undertaken with respect to labeling design and placement and seek to leverage and benefit from this
expertise by directing the Lead Administrator to seek feedback from a cross-section of relevant
stakeholders who have been working on these issues. We delegate authority to PSHSB to review,
approve (or not approve) the Lead Administrator-recommended labeling design and placement standards
after any required public notice and comment process and if approved incorporate into the Commission’s
Part 8 rules. The provisions of 47 CFR § 2.935(a) (allowing the electronic display of “other information
that the Commission’s rules would otherwise require to be shown on a physical label attached to the
device”) do not apply to the FCC IoT Label.
357
The Cyber Trust Mark may only be used as directed by
352
Letter from Lorrie Cranor, CyLab Director and Bosch Distinguished Professor in Security and Privacy
Technologies, FORE Systems University Professor of Computer Science and Engineering & Public Policy, Carnegie
Mellon University et. al., to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, (March 12, 2024) (CMU
Ex Parte) at para. 2.
353
The issue of where the FCC IoT Label would be placed was raised in the record. We agree that flexibility in
placement is important in instances where the consumer might not see the product’s packaging, such as in larger
appliances, before purchasing the product. See AHAM Comments at 5; NAM Comments at 5. We recognize that
some types of products might be customarily displayed in ways that make a one-size-fits-all approach inappropriate.
As such, we agree with the ioXt Alliance’s suggestion that we consider how the label may be placed in ways that
will be helpful to a consumer, such as through an in-store display, advertisement on a screen, or website. See ioXt
Alliance Comments at 20.
354
CTA Reply at A-7.
355
Id. at A-8
356
Id. at A-7 to A-9.
357
By their term, those rules – which allow certain electronic labeling of “information that the Commission's rules
would otherwise require to be shown on a physical label” – do not apply to a voluntary program that permits the use
of the FCC IoT Label for entities meeting the relevant criteria of that voluntary program. 47 CFR § 2.935(a)
(emphasis added); see also, e.g., Amendment of Parts 0, 1, 2, 15 and 18 of the Commission’s Rules Regarding
Authorization Of Radiofrequency Equipment, ET Docket No. 15-170, First Report and Order, 32 FCC Rcd 8746,
8758, para. 28 (2017) (explaining that the proposed rules “generally would allow a radiofrequency device to
electronically display any labels required by our rules, including the FCC ID required for certified devices, as well
as any warning statements or other information that our rules require to be placed on a physical label on the device”
(emphasis added)); id. at 8763-64, para. 41 (discussing the rules’ application “[i]f the Commission imposes (under
current or future regulations) a requirement that a device physically bear a label with regulatory information”). The
regulatory context also supports that understanding. The E-LABEL Act, which the Commission was implementing
when adopting the relevant rules, likewise appears focused on the general sorts of mandatory labeling requirements
the Commission had in place in 2014. See, e.g., E-LABEL Act, Pub. L. No. 113-197, § 2(1) (2014) (discussing
“physical label requirements” of the sort established by the Commission in 1974 and refined over time); id., § 3
(adopting provisions codified at 47 U.S.C. § 622(a) defining “electronic labeling” as “displaying required labeling
and regulatory information” and focusing on equipment and devices “required under regulations of the Commission
to be authorized by the Commission before the equipment or device may be marketed or sold within the United
(continued….)
Federal Communications Commission FCC 24-26
57
Part 8, notwithstanding 47 CFR § 2.935 or any other rule.
H. Registry
111. We adopt our proposal from the IoT Labeling NPRM that the label include the Cyber
Trust Mark and a QR Code that links to a decentralized publicly available registry containing information
supplied by entities authorized to use the FCC IoT Label (e.g., manufacturers) through a common
Application Programming Interface (API). The registry will include and display consumer-friendly
information about the security of the product. We believe a publicly accessible registry furthers the
Commission’s mission of allowing consumers to understand the cybersecurity capabilities of the IoT
devices they purchase. We also agree that it is important for the registry to be dynamic, so a consumer
can be aware if a product loses authorization to use the FCC IoT Label or if the manufacturer is no longer
providing security updates.
358
There is robust support for the development of a publicly-accessible
registry.
359
We agree with NCTA that “the IoT Registry is foundational to the value and utility of the
Cyber Trust Mark Program.”
360
In the following paragraphs, we establish general parameters for registry
information.
112. In the IoT Labeling NPRM, the Commission proposed a single registry associated with
the IoT Labeling Program and that the QR Code included as part of the FCC IoT Label include a link to
the information about the product on the registry webpage.
361
Today, we adopt a decentralized registry
that contains specific essential information that will be disclosed by the manufacturer, as discussed in
further detail below. This essential information from the manufacturer will be provided to a consumer
accessible application via the registry by utilizing a common API that is secure by design. When a
consumer scans the QR Code, a consumer accessible application will access the registry using the
common API and present the consumer with the information we require to be displayed from the registry.
CTIA points out that a centralized registry containing all the information the Commission conceived in
the IoT Labeling NPRM and by commenters in the record would be inordinately complex and costly.
362
We agree, and endeavor to meet the policy goal of providing a transparent, accessible registry to the
public through more efficient and less complicated means.
113. We agree with the Commission’s assessment in the IoT Labeling NPRM that the
registry’s goal is to assist the public in understanding security-related information about the products that
bear the Cyber trust Mark.
363
CTIA confirms this view, stating “the Commission should focus on the
[registry] as a means to provide consumers with information that is critical to the success of the
program.”
364
CTIA further proposes that we should allow each manufacturer to establish their own
States”). Independently, the Commission’s focus on the types of mandatory label or information disclosure
requirements of the sort imposed under its equipment authorization rules when adopting section 2.935 of the rules
persuades us that those e-labeling rules should not apply to the IoT Labeling Program at this time, given our
conscious decision to make the program “new and distinct,” consistent with commenters’ urging to keep the
equipment authorization and IoT Labeling programs separate. See supra para. 43; see also 47 U.S.C. § 302a(a)
(authorizing the Commission to adopt “reasonable regulations” based on its assessment of “the public interest,
convenience, and necessity); id., § 622(b) (directing the Commission to take “appropriate” action “as necessary”
with respect to e-labeling).
358
Cybersecurity Coalition Comments at 11.
359
CSA Comments at 15; NCTA Comments at 9; Infineon Comments at 2; WiFi Alliance Comments at 2;
USTelecom Comments at 9; AIM Comments at 4; Planar Comments at 2.
360
NCTA Comments at 9.
361
IoT Labeling NPRM at 18, para. 41.
362
CTIA Reply at 10-11.
363
See IoT Labeling NPRM at 18, para. 41.
364
CTIA Reply at 12.
Federal Communications Commission FCC 24-26
58
mechanisms for conveying this information to consumers.
365
However, we acknowledge ioXt’s concern
that a completely manufacturer-driven approach could lead to inconsistencies, inaccuracies, or other
difficulties for the consumer.
366
To balance the need for a workable, streamlined registry that is consistent
for consumers and meets the Commission’s goals while easing the administrative burden inherent in a
centralized registry, we require a common API that would provide access to the following essential
information from the manufacture and display it to the consumer in a simple, uniform way:
367
(1) Product Name;
(2) Manufacturer name;
(3) Date product received authorization (i.e., cybersecurity certification) to affix the
label and current status of the authorization (if applicable);
(4) Name and contact information of the CLA that authorized use of the FCC IoT
Label;
(5) Name of the lab that conducted the conformity testing;
(6) Instructions on how to change the default password (specifically state if the default
password cannot be changed);
(7) Information (or link) for additional information on how to configure the device
securely;
(8) Information as to whether software updates and patches are automatic and how to
access security updates/patches if they are not automatic;
(9) The date until which the entity promises to diligently identify critical
vulnerabilities in the product and promptly issue software updates correcting them,
unless such an update is not reasonably needed to protect against cybersecurity
failures (i.e. the minimum support period); alternatively, a statement that the device
is unsupported and that the purchaser should not rely on the manufacturer to release
security updates;
(10) Disclosure of whether the manufacturer maintains a Hardware Bill of Materials
(HBOM) and/or a Software Bill of Materials (SBOM);
368
and
(11) Additional data elements that the Bureau determines are necessary pursuant to the
delegated authority discussed in paragraph 121 below.
114. To reduce potential burdens and focus on essential information, we pare back the scope
of the registry from what the Commission proposed in the IoT Labeling NPRM. We agree with the
Cybersecurity Coalition that “[t]he primary purpose of the label is to help consumers make informed
purchasing decisions”
369
and include in the registry information that is key to making a purchasing
decision, without overwhelming the consumer.
370
To this end, we agree with commenters who suggest
that including the information proposed in the IoT Labeling NPRM may be too burdensome. NEMA, for
example, expresses concern about the resources required for a registry containing a full catalogue of
365
Id.
366
ioXt Reply at 11.
367
We note that the use of an API as part of the registry was recommended by CSA, the National Retail Foundation,
and Widelity. Along with the benefits of an API that we identify here, the use of an API provides other benefits to
other stakeholders in industry and retailers, while providing stakeholders with information that could assist with
innovation and potential expansion of the registry to provide additional functions. See CSA Comments at 16;
National Retail Foundation Comments at 1-2 (NRF); Widelity Comments at 3.
368
In addition to the declaration, the SBOM and HBOM will be made available upon request by the Commission,
CyberLAB, and/or CLA.
369
Cybersecurity Coalition Comments at 9.
370
CTIA Comments at 31 (“Ultimately, the Commission must ensure that information conveyed to consumers . . .
strikes the right balance between giving consumers valuable information . . . and overloading consumers with
information that will be difficult to maintain and update, confuse consumers, and even tip off bad actors.”).
Federal Communications Commission FCC 24-26
59
devices.
371
CTIA agrees that the IoT registry envisioned by the IoT Labeling NPRM would “impose
significant, unmeetable burdens” for participants and the manager of the registry, and encourages us to
refine our approach.
372
The Cybersecurity Coalition likewise expresses concern over the complexity of
the proposed registry.
373
We agree that the registry be “modest in its goals” and “limited to basic
information that is uniform . . . and pragmatic and useful to the consumer.”
374
We believe that a registry
containing simple, easy to understand information will be most helpful to a consumer making a
purchasing decision, but also see the value in allowing manufacturers to include a second registry page
(following the consumer-focused page) to enable manufacturers to provide additional technical details
designed for researchers, enterprise purchasers, and other expert consumers of the label.
375
Focusing only
on the most critical information will further facilitate the speedy establishment of the IoT Labeling
Program and the registry itself.
115. In the interest of keeping information simple and establishing the database swiftly, we
streamline the elements that should be included in the registry. We do require information about how to
operate the device securely, including information about how to change the password, as it would help
consumers understand the cybersecurity features of the products, how those products are updated or
otherwise maintained by the manufacturer, and the consumer’s role in maintaining the cybersecurity of
the product.
376
We do not require information about whether a product’s security settings are protected
against unauthorized changes as part of the initial rollout of the registry in an attempt to streamline the
registry to address concerns that the registry would be too bulky or unfriendly to consumers. We
recognize the value of ensuring the registry information is accessible to everyone, including those whose
primary language is not English. Accordingly, we direct the Lead Administrator to recommend to the
Bureau whether the registry should be in additional languages and if so, to recommend the specific
languages for inclusion. We delegate authority to the Bureau to consider and adopt requirements in this
regard upon review of these recommendations. As the Association of Home Appliance Manufacturers
points out, the location of the product’s manufacture is redundant with existing legal requirements.
377
We
also do not require labels to include an expiration date at this time as it may not be an applicable
requirement for every product,
378
but we direct the Label Administrator to consider whether to
recommend including the product support end date on labels for certain products, or category of products.
116. While we recognize the value of utilizing the registry to keep consumers informed about
product vulnerabilities, we note CTIA and Garmin’s concerns about listing unpatched vulnerabilities as
not providing value to consumers, discouraging manufacturers from participating in the program, and
tipping off bad actors.
379
We agree that these concerns are significant and do not require detailed
information about vulnerability disclosures in the registry at this time. Rather, we require disclosure only
371
NEMA Comments at 6.
372
CTIA Comments at 29.
373
Cybersecurity Coalition Comments at 11.
374
CTA Reply at 13.
375
Letter from J. David Grossman, Vice President, Regulatory Affairs, CTA & Mike Bergman, Vice President,
Technology & Standards, CTA, to Marlene H. Dortch, Secretary, FCC, PS Docket No. 23-239, Appendix B, at 3
(filed Mar. 4, 2024).
376
See Widelity Comments at 2 (“[A] Registry containing information on IoT . . . and their cybersecurity features
. . . would allow consumers . . . to easily access information on a product’s security features, vulnerabilities, and
updates[.]”); see also Consumer Reports Reply Comments at Appendix A.
377
AHAM Comments at 5; see 16 CFR § 500.5 (“The label of a consumer commodity shall specify conspicuously
the name and place of business of the manufacturer, packer, or distributor.”).
378
IoT Labeling NPRM at 19-20, paras. 47-48; see also infra Section I (describing the record and setting forth tasks
with respect to determining the renewal process).
379
CTIA Comments at 30-32; Garmin Reply at 2.
Federal Communications Commission FCC 24-26
60
of whether a manufacturer maintains an SBOM and HBOM for supply chain security awareness. We
agree with Consumer Reports, NYC Cyber Command Office of Technology and Innovation (NYC OTI),
and the Cybersecurity Coalition that an SBOM should be considered as an element of the registry.
380
We
also note that Garmin’s concern is with disclosing the specific contents of an SBOM to the public, which
“could reveal confidential business relationships with companies, as well as provide a roadmap for
attackers,”
381
but this is not what we require here. Requiring participating manufacturers to disclose only
the maintenance of an SBOM and HBOM, rather than the contents therein, indicates an added level of
software and hardware security while also protecting potentially sensitive information. Further, while we
agree with CTA that a searchable registry would have value for the public,
382
we are mindful of the
resources, costs, and time involved with creating a registry that is searchable by each of the elements
identified in the IoT Labeling NPRM.
383
In limiting the registry as we have, we address the concerns that
the registry may be too complex to administer in the initial iteration of the IoT Labeling Program. As
discussed above, the decentralized, API-driven registry we adopt today addresses the complexity concerns
raised in the record. We cabin our initial vision of the registry and direct the Bureau, as described further
below, to consider ways to make the initial design of the registry modest, with potential to scale the
registry as the IoT Labeling Program grows.
117. In this respect, we note that NIST’s research suggests that “future work should be done to
examine potential issues of including an expiry date on a label.”
384
NIST cited studies conducted by the
UK government that consumers were confused about what the expiration date meant, and an Australian
government study in which consumers thought the device would stop working after that date.
385
The UK
research did conclude, however, that continued manufacturer support was important to survey
participants.
386
Consumer Reports suggested an expiration date, if present, should be tied to an end-of-
support date rather than a renewal date.
387
NIST’s research into the importance of support dates to
consumers coupled with the potential confusion of expiration dates and the support from the record lead
us to conclude an expiration date is not warranted. We do find, however, that the disclosure of a
minimum support period and end date for the support period for the device is appropriate and will provide
meaningful information to consumers on the manufacturer’s commitment to provide patches or other
support – a vital issue in a dynamic threat environment.
388
To ensure that information about this support
380
Consumer Reports Comments at 3; NYC OTI Comments at 5; Cybersecurity Coalition Comments at 10-12; see
also FDA Comments at 4 (noting that submission of a software bill of materials to the Secretary is required for
FDA-regulated medical devices).
381
Garmin Reply at 3.
382
CTA Comments at 34.
383
See Letter from Stacey Higginbotham, Policy Fellow, Consumer Reports, to Marlene H. Dortch, Secretary, FCC,
PS Docket No. 23-239 (Dec. 13, 2023) referencing Consumer Reports, CR Cyber Trust Mark IoT Security Registry
Design Proposal at 5, n.5 (Dec. 12, 2023) (Consumer Reports Registry Design Proposal) (describing a site capable
of searching by product identifiers and manufacturers as “more sophisticated” and suggesting that initial design of
the registry should not be overly complex).
384
Julie M. Haney & Susanne M. Furman, Smart Home Device Loss of Support: Consumer Perspectives and
Preferences at 503, NIST (2023), https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=936232
[https://perma.cc/EL5G-TSL5] (NIST Consumer Perspectives Research).
385
NIST Consumer Perspectives Research at 503.
386
NIST Consumer Perspectives Research at 498 (describing the importance of security updates for different types
of devices, where between 77% and 90% of participants “strongly agree or agree” that security updates were
important depending on the device type).
387
Consumer Reports Comments at 33.
388
See CSA Comments at 21-22; Letter from Grace Burkard, Director of Operations, ioXt Alliance, to Marlene H.
Dortch, Secretary, FCC, PS Docket No. 23-239 (Dec. 14, 2023) at 2; see also Letter from Marco Peraza, Legal
(continued….)
Federal Communications Commission FCC 24-26
61
period remains accurate, and to encourage manufacturers to support their products for longer periods,
manufacturers shall be able to extend the support period in the registry through a mechanism to be
determined by the Lead Administrator, but which should be expeditious and require no further
disclosures.
118. While we identify the defined set of data that is consistent across all manufacturers, we
believe the information contained in the registry for a particular IoT product or product class may also
depend on the standards and testing procedures adopted for each particular IoT product. As such, in the
near term, we expect there will be additional registry data elements that are specific to an IoT product, or
classes of IoT products, that are not yet ripe for decision in this Order. We also recognize that some of
the information recommended by NIST in its consumer education recommendations, discussed in further
detail below, may be valuable for consumers to see in the registry.
389
Accordingly, while we provide a
baseline of necessary information that must be displayed for an IoT product in the registry, regardless of
class the IoT product belongs to, we delegate authority to the Bureau to determine, subject to any required
public notice and comment processes, whether any additional disclosure fields, such as the
manufacturer’s access control protections (e.g., information about passwords, multi-factor authentication),
whether or not the data is encrypted while in motion and at rest (including in the home, app, and cloud),
patch policies and security or privacy information
390
are necessary, and if so, what should they be.
119. We disagree with commenters, such as LG, who suggest that manufacturers should have
discretion over whether to include additional privacy and/or security information through a QR Code,
URL, or other scannable mechanism insofar as it would require additional information in the registry.
391
LG Electronics, though supportive of adding a variety of data to the registry, acknowledges it is unclear
how much detail or what types of information would be of value to a consumer.
392
We believe that
allowing discretion over what information is included in the registry may overcrowd it, or engender
consumer confusion. Rather, uniform registry elements will provide greater consistency for consumers
and adoption of uniform registry elements is supported by the record.
393
We make clear, however, that we
do not otherwise restrict what information manufacturers may include or reference on their product
packaging, so long as it does not interfere with or undermine the display of the FCC IoT Label.
120. We recognize that a decentralized registry relying on data derived through an API from
manufacturers will require some oversight to ensure that the registry, when accessed by consumers using
QR Codes, functions as described and displays the required information about individual products. We
direct the Lead Administrator to receive and address any technical issues that arise in connection with
displaying the registry through the QR Code, the associated API, and consumer complaints with respect
to the registry. CSA recommends that the Commission engage a third-party with operating the registry
Advisor, FCC, on behalf of Hacker News Members, to PS Docket No. 23-239 (Sept. 14, 2023) (during the Hacker
News website public Q&A and discussion session commenters generally support a requirement that manufacturers
be required to support their devices for a minimum period; vendors should disclose the period for which they
support a device; and certain classes of devices should have a mandatory minimum support period.).
389
See infra Section L.
390
See Consumer Reports Comments at 23; CMU Ex Parte at para. 3.
391
See LG Electronics Comments at 2 (“[A]lthough LG supports the NPRM’s proposal to implement a single binary
label, manufacturers should have discretion over whether to provide additional security or privacy information
through a QR Code, URL, or other scannable mechanism.”).
392
Id.
393
Cybersecurity Coalition Comments at 9-10; Planar Comments at 2 (describing the European Product Registry for
Energy Labeling as a model where “[c]overed products sold [that] bear [the label] contain[] a QR code that leads the
consumer to a webpage with full details about the product’s energy consumption”).
Federal Communications Commission FCC 24-26
62
for cost and efficiency reasons.
394
CTA agrees that the Commission should use a third-party to host and
manage the registry due to the resources required to establish the registry.
395
We agree that, given the
structure of the registry as we adopt it today, the Lead Administrator is in the best position to interface
with manufacturers to ensure the smooth operation of the registry.
121. We also recognize that for a registry of this magnitude to be effectively and timely rolled
out requires significant input and coordination with industry partners. To determine how the registry
should be structured to best meet the goals of the IoT Labeling Program as we adopt it today, we direct
the Bureau to seek comment and consider, as part of a public process, the technical details involved with
the operation of the registry. We delegate authority to the Bureau to adopt a Public Notice, subject to any
required public notice and comment, establishing the structure of the registry; identifying the common
API; how the API should be structured; how the API should be used; how the queried data will be
displayed to the consumer; how manufacturers need to maintain and implement the API in connection
with its interactions with the registry; what, if any, additional disclosure fields would be most beneficial
to consumers in the future, as discussed above;
396
how the data in the registry returned by the API should
be presented to the consumer; how the costs involved in maintaining the registry will be handled; how
often the registry should be updated;
397
whether to require the manufacturer to list the product sensors,
what data is collected, if the data is shared with third parties, or security or privacy issues and if data
should be replicated;
398
and whether data should be replicated in multiple repositories – by the relevant
CLA(s) or vendors, for example – and publicly accessible via a single query point; and any other
technical information needed to establish the registry as we adopt today. The Bureau should consider
how to reduce burdens on manufacturers in supporting the decentralized registry. We delegate authority
to PSHSB in coordination with, at a minimum, OMD (specifically the Office of the Chief Information
Officer) and, to the extent necessary OGC (specifically the Senior Agency Official for Privacy) to identify
and impose any applicable security or privacy requirements arising from Federal law or Federal guidance
for the registry and to approve or modify the recommendations regarding the functional elements of the
registry listed above. We further delegate authority to PSHSB to publish a Public Notice, subject to any
required public notice and comment, adopting and incorporating into the Commission’s rules any
additional requirements or procedures necessary to implement the Cyber Trust Mark registry.
I. Continuing Obligations of Entities Authorized to Use the FCC IoT Label
122. We adopt the proposal in the IoT Labeling NPRM that applicants must renew their
authority to use the FCC IoT Label. Entities authorized to use the FCC IoT Label are required to ensure
the product bearing the FCC IoT Label continue to comply with the Commission’s program requirements.
We disagree with CCDS that no renewals should be required and the product should simply bear the last
date of testing. Such an approach could severely impair consumer trust in the label, especially if a
product bearing the FCC IoT Label is being sold as new but is far out of date as to its initial achievement
of the Mark.
123. For those that support some interval of renewal, the record is divided with respect to
394
CSA Comments at 15-16 (“The Alliance recommends that the Commission hire a third-party administrator to
operate the IoT registry because this will likely result in a more cost-effective and efficient solution[.]”).
395
CTA Comments at 38.
396
See NCTA Ex Parte at 4 recommending changes to the data elements be consistent with the IoT Labeling
program’s policies, especially that such changes be intelligible and useful to the average (i.e., non-expert, non-
technical) consumer, and otherwise necessary to advance the objectives of the IoT Labeling Program.
397
See, e.g., Consumer Reports Summer Research at 4 (“Consumers are interested in the security of their connected
devices and the data those devices collect about them.”); Consumer Reports Comments at 6 (“The FCC needs to
establish a mechanism to ensure the registry stays up to date.”).
398
See CMU Ex Parte at para. 2 (recommending consumers should “be informed about the sensors on the device
and the type of information being collected and how that information will be used.”)
Federal Communications Commission FCC 24-26
63
whether IoT Labeling Program applicants should file for renewal each year, as proposed in the IoT
Labeling NPRM.
399
Consumer Reports and TÜV SÜD agree that annual renewal is appropriate.
400
AHAM feels that an annual renewal application as the Commission proposed was unnecessary, or at
minimum “unnecessarily rigid.”
401
AHAM posits that a requirement to renew should only be triggered
when a significant or substantive change is made to either the standard the manufacturer certifies to, or a
significant design change to the product.
402
Similarly, more durable IoT products (such as smart
appliances) may need to be renewed less frequently.
403
NAM argues that annual renewals are unnecessary
for products that pose a limited risk.
404
Kaiser Permanente believes higher-risk devices should be updated
annually, and otherwise renewal should occur every three years.
405
CCDS argues no annual testing is
necessary, and the product should simply have the date it was authorized to bear the label that signals the
product was compliant as of the initial date.
406
CSA suggests limiting the need for annual testing, but
suggests some kind of annual reporting should be required.
407
We observe that other certifying bodies,
such as ioXt, require annual renewal for products they certify and allow incentives for early renewal.
408
Based on the record, we recognize the degrees of nuance attendant to the different types of products at
issue. We agree with the notion that certain IoT products, depending on their lifespan and risk level, may
need different standards for renewal to achieve the FCC IoT Label.
124. We task the Lead Administrator to collaborate with stakeholders and provide
recommendations to PSHSB on how often a given class of IoT products must renew their request for
authority to bear the FCC IoT Label, which may be dependent on the type of product, and that such a
recommendation be submitted in connection with the relevant standards recommendations for an IoT
product or class of products. In doing so, consideration should be given as to whether annual continuous
compliance reports are acceptable for purposes of renewing, and how to effectively balance the need for
industry flexibility and the need to ensure that consumers have up-to-date information about the product
they are considering purchasing. Consideration should also be given to the fees incurred as part of a
renewal process, as we agree with Kaiser Permanente that renewal fees must not be unduly burdensome
or cost-prohibitive.
409
We emphasize that renewals should occur frequently enough that a consumer can
be sure that a product bearing the FCC IoT Label has reasonable cybersecurity protections in place, and
some process must be in place to ensure accountability, even if annual testing is not required. We
delegate authority to PSHSB to review, approve (if appropriate) and, subject to any required public notice
and comment, adopt into the Commission’s rules, the proposals from the Lead Administrator for renewal
of authority to bear the FCC IoT Label.
410
J. Audits, Post-Market Surveillance, and Enforcement
125. We adopt the IoT Labeling NPRM’s proposal to rely on a combination of administrative
remedies and civil litigation to address non-compliance and direct the CLA(s) to conduct post-market
399
IoT Labeling NPRM at 19, para. 47.
400
Consumer Reports Comments at 19; TÜV SÜD Comments at 2.
401
AHAM Comments at 4.
402
Id.; Whirlpool Comments at 5; CTA Reply at 7.
403
AHAM Comments at 4-5.
404
NAM Comments at 5.
405
Kaiser Permanente Comments at 2.
406
CCDS Comments at 5.
407
CSA Comments at 19.
408
ioXt Comments at 23.
409
Kaiser Permanente Comments at 5.
410
See e.g., NCTA Ex Parte at 3-4 (recommending renewal under certain circumstances).
Federal Communications Commission FCC 24-26
64
surveillance. The IoT Labeling NPRM sought comment on how to enforce program requirements to
ensure the integrity of the Cyber Trust Mark is maintained.
411
We asked whether non-Commission
entities should conduct random audits and/or market surveillance, who those entities should be, and what
audit requirements should be included.
412
We also sought comment on what enforcement measures would
be appropriate to address fraudulent uses of the FCC IoT Label.
413
The purpose of this IoT Labeling
Program is to provide reasonable assurances to the consumer that the products they bring into their homes
have at least a minimum level of cybersecurity. The success of the IoT Labeling Program hinges on the
label retaining its integrity as a trusted consumer resource. This requires vigorous review and
enforcement to ensure that products bearing the Cyber Trust Mark are in compliance with the program
standards. We further observe that the ISO/IEC 17065 standards require CLAs to perform appropriate
post-market surveillance activities. We adopt post-market surveillance and civil enforcement,
accordingly.
126. We find support in the record that the “Mark must be trusted by consumers to be
successful”
414
and “to gain consumer confidence and incentivize cybersecurity, the label must be backed
by a robust enforcement program.”
415
We agree with the EPIC’s position that weak enforcement may
result in unmet consumer expectations regarding a product’s actual level of cybersecurity and “allow bad
actors to take advantage of the goodwill created by the cybersecurity program,”
416
and take up its
recommendation of independent, post-market audits accordingly.
417
Whirlpool also supports regular
market surveillance to find instances of unapproved use of the Cyber Trust Mark, as well as products that
may have been certified but no longer meet program requirements.
418
Whirlpool states that surveillance
“should include random auditing… as well as sampling of some established percentage on a regular basis
of certified products/devices.”
419
The American Association for Laboratory Accreditation supports
adopting the product surveillance standards established for TCBs and in the EPA’s ENERGY STAR
program.
420
We also agree with commenters who indicate that the Commission, CLAs, and possibly the
Federal Trade Commission (FTC) should be able to receive complaints of noncompliant displays of the
Cyber Trust Mark, which could result in auditing.
421
We delegate authority to the Bureau, in coordination
with the Consumer and Governmental Affairs Bureau, to determine the process for receiving and
responding to complaints. CTA and Planar Systems also support random auditing.
422
We agree that
random audits, in addition to regular post-market surveillance will best serve to maintain consumer
411
IoT Labeling NPRM at 20-21, para. 51.
412
Id.
413
Id.
414
Whirlpool Comments at 6.
415
EPIC Reply at 26.
416
Id. at 27.
417
Id. at 27-31.
418
See Whirlpool Comments at 6.
419
Id.
420
A2LA Comments at 2; see also OET Knowledge Database, TCB Post-Market Surveillance (Apr. 26, 2022),
https://apps.fcc.gov/kdb/GetAttachment.html?id=dQfN6tcMcj%2FrEmjHGZ%2B3dw%3D%3D&desc=610077%20
D01%20TCB%20Post%20Market%20Surveillance%20v06r02&tracking_number=20540 [https://perma.cc/FA7K-
ZXSR] (outlining post-market surveillance responsibilities of TCBs) (TCB Post-Market Surveillance).
421
See Cybersecurity Coalition Comments at 14; EPIC Reply at 33.
422
CTA Comments at 25; Planar Comments at 2.
Federal Communications Commission FCC 24-26
65
confidence in the Cyber Trust Mark.
423
127. Post-market surveillance. We agree with the Cybersecurity Coalition that post-market
surveillance of products receiving the Cyber Trust Mark should be a principal enforcement mechanism,
424
and find that CLAs are in the best position to conduct post-market surveillance and random auditing, in
accordance with ISO/IEC 17065. These activities are based on type testing a certain number of samples
of the total number of product types which the CLA has certified. In addition, each CLA must be
prepared to receive and address post-market surveillance from the public. If a CLA determines that a
product fails to comply with the technical regulations for that product, the CLA will immediately notify
the grantee and the Lead Administrator in writing. The grantee will have 20 days to provide a report to
the CLA describing actions taken to correct the deficiencies.
425
Continued deficiency after 20 days will
result in termination of the grantee’s approval to display the Cyber Trust Mark. A grantee’s approval to
display the Cyber Trust Mark may also be terminated subject to the 20 day cure period for false
statements or representations found in their application or associated materials or if other conditions come
to the attention of a CLA which would warrant initial refusal to authorize use of the FCC Label. Such
terminations will protect the integrity of the FCC IoT Label and encourage accurate representations and
disclosures in application materials that will enhance the reliability of the Labeling Program’s operation,
more generally.
128. We believe it is appropriate for the Lead Administrator, in collaboration with the CLAs
and other stakeholders, to identify or develop, and recommend to the Commission for approval, the post
market surveillance activities and procedures that CLAs will use for performing post-market surveillance.
The recommendations should include specific requirements such as the number and types of samples that
a CLA must test and the requirement that grantees submit, upon request by PSHSB or a CLA, a sample
directly to the CLA to be evaluated for compliance at random or as needed.
426
We delegate authority to
the Bureau to review the recommendations and, subject to any required public notice and comment,
incorporate post market procedures into the Commission’s rules. We also delegate authority to the
Bureau to establish requirements (subject to any required public notice and comment) regarding post-
market surveillance of products in any instances where the CLA that granted the authorization of the
product is not available to conduct such post-market surveillance. The document will also address
procedures to be followed if a grantee’s approval to display the Cyber Trust Mark is terminated based on
mandatory post-market surveillance or notice from the public, including disqualification from the IoT
Labeling Program and potential further investigation into other products related to the manufacturer or the
CyberLAB, as discussed below. Finally, the Lead Administrator will submit periodic reports to PSHSB
of the CLAs’ post-market surveillance activities and findings in the format and by the date specified by
PSHSB.
129. The IoT Labeling NPRM sought comment on disqualification for nonconformity,
referencing the Department of Energy’s ENERGY STAR program, which sets out contractual
423
To enable a meaningful audit process it will be important to be able to review certain key records, which we
consequently will require grantees to retain records regarding the original design and specifications and all changes
that have been made to the relevant consumer IoT product that may affect compliance with the IoT Labeling
Program requirements; a record of the procedures used for production inspection and testing; and a record of the test
results that demonstrate compliance. See infra Appx. A, 47 CFR § 8.215. We model our approach on analogous
elements of our equipment authorization rules, with which the Commission and industry have substantial
experience, and which have proven workable in practice. See 47 CFR § 2.938(a), (f).
424
Cybersecurity Coalition Comments at 14; see also Ricardiam DAO LLC Comments at 1 (listing regular periodic
security audits as a key component for the program).
425
ioXt Ex Parte.
426
If necessary to accommodate the volume of auditing, a CLA may outsource some post-market surveillance
testing to a recognized CyberLAB, but retains responsibility for the final review. See e.g., TCB Post-Market
Surveillance, Section E(2) at 3 (describing a similar process for outsourcing post-market testing for the Equipment
Authorization program).
Federal Communications Commission FCC 24-26
66
Disqualification Procedures, including a 20 day period to dispute before a formal disqualification decision
and what steps an ENERGY STAR partner must take after being formally disqualified (e.g., removing
references to ENERGY STAR in the product labeling, marketing).
427
The IoT Labeling NPRM asked
whether the IoT Labeling Program should adopt a similar process.
428
We agree with EPIC and Planar
Systems in supporting a “cure period [to] give[] good actors the opportunity to fix any issues without
incurring penalties”
429
and “ to address any discovered non-conformance as long as the manufacturer is
acting in good faith.”
430
Here, we adopt a cure period of 20 days, which is in line with the ENERGY
STAR program.
431
130. EPIC also supports adopting disqualification procedures similar to ENERGY STAR’s for
non-compliance, including ceasing shipments of units displaying the label, ceasing the labeling of
associated units, removing references to the label from marketing materials, and covering or removing
labels on noncompliant units within the brand owner’s control.
432
It notes that the EPA also conducts
retail store level assessments to identify mislabeled products and argues that a robust enforcement
mechanism should include all of these actions.
433
We delegate to the Bureau to consider whether such
requirements should follow from termination of authority.
131. In addition, we find that a combination of enforcement procedures for non-compliance
are available, including administrative remedies under the Communications Act and civil litigation
trademark infringement or breach of contract.
434
Administrative remedies may include, but are not limited
to, show cause orders, forfeitures, consent decrees, cease and desist orders, and penalties.
435
The
Commission will pursue all available means to prosecute entities who improperly or fraudulently use the
FCC IoT Label, which may include, but are not limited to, enforcement actions, legal claims of deceptive
practices prosecuted through the FTC,
436
and legal claims for trademark infringement or breach of
contract. The record supports both administrative remedies to address consumer harm and civil
427
IoT Labeling NPRM at 20-21, para. 51; see also ENERGY STAR, Disqualification Procedures ENERGY STAR®
Products (Feb. 28, 2018),
https://www.energystar.gov/sites/default/files/asset/document/Disqualification_Procedures_0.pdf
[https://perma.cc/V4EX-3P8N] (Disqualification Procedures).
428
IoT Labeling NPRM at 20-21, para. 51.
429
Id.
430
Planar Comments at 2.
431
See Disqualification Procedures at 1. But see ioXt Ex Parte at 3 (citing e.g., European Telecommunications
Standards Institute (ETSI), Coordinated Vulnerability Disclosure (CVD),
https://www.etsi.org/standards/coordinated-vulnerability-disclosure (noting “ETSI aims to resolve all valid
vulnerabilities within 90 days of reporting though it may take longer for complicated fixes.”) (last visited Mar. 5,
2024)). Given our interest in ensuring that deficiencies are cured in a timely manner and consistent with the
ENERGY STAR program, we believe 20 days is a sufficient period of time.
432
EPIC Reply at 27-31.
433
Id. at 31.
434
IoT Labeling NPRM at 20-21, para. 51.
435
Id. See, e.g., Sound Around, Inc., Notice of Apparent Liability for Forfeiture, FCC 20-46 (2023) (proposing a
$1.2 million penalty for marketing 33 unauthorized RF devices in violation of Section 302 and Section 2.803(b)(1)
of the Communications Act of 1934).
436
In addition, to further help safeguard the integrity of the IoT Labeling Program and the FCC IoT Label, we codify
a rule that prohibits any person from, in any advertising matter, brochure, etc., using or making reference to the FCC
IoT Label or the Cyber Trust Mark in a deceptive or misleading manner. See infra, Appx. A, 47 CFR § 8.213(b).
We model our approach on analogous elements of our equipment authorization rules, with which the Commission
and industry have substantial experience, and which have proven workable in practice. See 47 CFR § 2.927(c).
Federal Communications Commission FCC 24-26
67
enforcement actions for false use of the FCC IoT Label.
437
We assert that this combination of
enforcement mechanisms are best suited to protect consumer trust in the Cyber Trust Mark and
incentivize participant compliance.
132. Cyber Trust Mark Demonstrates Adherence to Widely Accepted Industry Cybersecurity
Standards. While we decline to preempt state law, we find that approval to use the Cyber Trust Mark on
a particular product is an indicator of reasonableness and demonstrates adherence to widely accepted
industry cybersecurity standards. The IoT Labeling NPRM asked whether the label represented an
“indicium of reasonableness” that may serve as a defense or a safe harbor against liability for damages as
a result of a cyber incident, while making clear that it did not intend for the IoT Labeling Program to
preempt existing laws.
438
While several commenters support Commission preemption of state laws,
439
as
well as adoption of liability protections for devices approved to display the Cyber Trust Mark,
440
we
decline to preempt state law and decline to implement a legal safe harbor beyond reiterating the
Commission’s view that achievement of FCC IoT Label is an indicium of reasonableness for entities
whose products are compromised despite being approved to use the Cyber Trust Mark. We recognize that
a more fulsome safe harbor provision may indeed incentivize participation in the IoT Labeling Program,
as the U.S. Chamber of Commerce urges.
441
However, on this record we are not persuaded that it would
be feasible or prudent for the Commission to make liability pronouncements as to laws or standards
outside the Commission’s purview as would be necessary for a broader safe harbor in the absence of
preemption. As EPIC observes, such a safe harbor could also decrease consumer trust in the label.
442
In
addition, several states have adopted legal safe harbors for entities that implement reasonable security
measures (e.g., voluntarily adopt recognized best practices such as NIST’s and implement written security
programs), and we defer to the states to determine whether approval to use the Cyber Trust Mark meets
these State requirements. Given the uncertain interplay between qualification to use the Cyber Trust
Mark and various state law regimes, coupled with the risk that such a safe harbor could decrease
consumer trust in the label, we decline to preempt state liability requirements at this time.
K. International Reciprocal Recognition of the Cyber Trust Mark
133. The Commission sought comment in the IoT Labeling NPRM on how the Commission
should coordinate and engage with international bodies maintaining their own labeling programs, and
whether to engage in mutual recognition of international labels.
443
We note the robust record highlighting
the immense value to manufacturers of IoT products in international harmonization of cybersecurity
437
See, e.g., EPIC Reply at 33 (“Such administrative remedies could include requiring the company to notify
impacted consumers, corrective advertising, and financial penalties … [and] we encourage the FCC to take
enforcement action or refer the matter to the Federal Trade Commission (FTC) to prosecute under its authority to
combat deceptive acts or practices”).
438
IoT Labeling NPRM at 21, para. 52.
439
PMI Comments at 2 (supporting preemption for those states with cybersecurity requirements); CTIA Comments
at 36; CTIA Reply at 9 (citing NAM Comments at 6 (“The FCC . . . should limit liability and enhance consistency
by providing for preemption of state-level laws and requirements for products participating in the program, and
clarifying that the program’s legal safe harbor protects companies from potential liability associated with current or
future state requirements.”)); USTelecom Comments at 11 (urging the Commission to “use its platform as a leading
voice in this space to encourage federal preemption,” because “[o]pening enforcement to the states will likely cause
confusion and inconsistency in application and enforcement”).
440
Chamber Comments at 4; AHAM Comments at 6; Samsung Comments at 5-6; NAM Comments at 6.
441
Chamber Comments at 2.
442
EPIC Reply at 35. See also Consumer Reports Comments at 28-39 (“[A] safe harbor would mean little in
practice, as the company would in any case be required to prove that it had performed all the requisite elements of a
robust security program.”).
443
IoT Labeling NPRM at 23, para. 55.
Federal Communications Commission FCC 24-26
68
standards.
444
We agree with Widelity that “IoT devices are often manufactured and sold globally. As
supply chains evolve, a consistent set of standards will support the rapid growth of innovation and
security.”
445
We further agree with Consumer Reports that “mutual recognition should only occur when
the other program to be recognized has standards as stringent or more stringent” than the IoT Labeling
Program.
446
134. We recognize several other countries already have an established national cyber IoT
labeling program, including Singapore,
447
Finland,
448
and Germany.
449
The record cites to these programs
and highlights their features for consideration in developing the IoT Labeling Program.
450
For example,
the record explains how Singapore’s CLS takes reference from the EN 303 645 standards developed by
the European Telecommunications Standards Institute (ETSI).
451
We note that other commenters have
also recommended use of the ETSI EN 303 645 standards.
452
Further, the record provides Finland’s IoT
labeling database as an example for developing our IoT registry.
453
Several other countries have
government activity around IoT devices or products.
454
For example, Canada has a cybersecurity
certification program for small and medium-sized organizations.
455
As another example, South Korea has
a IoT security certification system justified under Article 48-6 of their "Act on Promotion of Information
and Communications Network Utilization and Information Protection" statute.
456
135. We also observe continuing developments in IoT security across the globe for
consideration.
457
The European Union Agency for Cybersecurity (ENISA) is currently developing a
444
See Widelity Comments at 4; Whirlpool Comments at 4-5; AHAM Comments at 4; PTI Comments at 2;
American Certification Body, Inc. Reply at 1; Coalition Letter Reply at 2.
445
Widelity Comments at 4.
446
Consumer Reports Comments at 40.
447
Cyber Security Agency of Singapore, Cybersecurity Labeling Scheme (CLS), https://www.csa.gov.sg/our-
programmes/certification-and-labelling-schemes/cybersecurity-labelling-scheme [https://perma.cc/Z5MR-4TTS]
(last visited Dec. 29, 2023).
448
Finnish Transport and Communications Agency National Cyber Security Centre, Cybersecurity,
https://tietoturvamerkki.fi/en [https://perma.cc/NF8D-CL97] (last visited Dec. 29, 2023).
449
Federal Office for Information Security, IT Security Label,
https://www.bsi.bund.de/EN/Themen/Verbraucherinnen-und-Verbraucher/IT-SiK-fuer-Verbraucher/IT-SiK-fuer-
Verbraucher_node.html [https://perma.cc/NS3G-LRFG ] (last visited Dec. 29, 2023).
450
ITI Comments at 6; CSA Comments at 10; TÜV SÜD Comments at 4.
451
ITI Comments at 6.
452
Garmin Comments at 10; EPIC Reply at 12.
453
TÜV SÜD Comments at 4 (providing Finland’s IoT labelling database as an example).
454
See Hollie Hennessey & Mike Sullivan-Trainor, Consumer IoT Device Cybersecurity Standards, Policies, and
Certification Schemes at Part 1 (2023), https://csa-iot.org/wp-content/uploads/2023/02/Consumer-IoT-Device-
Cybersecurity-Standards-Policies-and-Certification-Schemes.pdf [https://perma.cc/UN9M-FE2M].
455
Government of Canada, CyberSecure Canada (Dec. 29, 2023), https://ised-isde.canada.ca/site/cybersecure-
canada/en [https://perma.cc/6ZKU-HG9L].
456
Press Release, Ministry of Science and ICT (MSIT) MSIT and Korea Internet and Security Agency signed an
Memorandum of Understanding with the Singapore Cyber Security Agency for Mutual Recognition of IoT Security
Certification Systems (Dec. 14, 2023), https://www.msit.go.kr/eng/bbs/view.do;jsessionid=pJsmQ-
Zxr72rRsCgyqvwPmVCaAmf3EIfa0FZ60tY.AP_msit_1?sCode=eng&mPid=2&mId=4&bbsSeqNo=42&nttSeqNo=
938 [https://perma.cc/CE5P-5EHF].
457
See Auto Innovators Ex Parte at 1-2 referencing international regulations addressing cybersecurity in
automobiles. ISO/SAE 21434:2021 - Road Vehicles - Cybersecurity Engineering (Aug. 2021) and UNECE 155 -
(continued….)
Federal Communications Commission FCC 24-26
69
cybersecurity certification framework that would require certain products, services, and processes to
adhere to specific requirements.
458
Relatedly, the U.S. has signed an agreement for a joint roadmap
between the Cyber Trust Mark and similar consumer labeling programs in the EU.
459
Further, Japan has
committed to work with the U.S. to “ensure interoperability” of its IoT labeling scheme currently under
development.
460
136. We fully recognize the importance of ensuring international recognition of the IoT
Labeling Program and reciprocity considerations underlie our decisions today. We delegate authority to
the Bureau and the FCC Office of International Affairs to work with other federal agencies to develop
international recognition of the Commission’s IoT label and mutual recognition of international labels,
where appropriate, as promptly as possible to enable recipients of the Cyber Trust Mark to realize the
benefits an internationally recognized Cyber Trust Mark can have to promote global market access.
Moreover, the proliferation in the marketplace both in the U.S. and abroad of products meeting a common
baseline standard will elevate the overall global cybersecurity baseline for IoT and promote security-by-
design approaches to smart products.
L. Consumer Education
137. We adopt the IoT Labeling NPRM’s proposal and base the IoT Labeling Program’s
consumer education requirements on the considerations NIST outlines in the NIST Cybersecurity White
Paper
461
due to its general applicability to an IoT label and in light of support from the record.
462
The
Lead Administrator will be responsible for developing a consumer education campaign that is based on
the considerations recommended by NIST in the NIST Cybersecurity White Paper and discussed in
greater detail below.
463
In developing its consumer education plan, we task the Lead Administrator with
considering ways to roll out a robust campaign with a reasonable national reach, including ways to make
the consumer education accessible and developing education materials in multiple languages.
464
We
further task the Lead Administrator with considering the costs of conducting such outreach and how that
outreach would be funded. Once developed, the Lead Administrator will submit this consumer education
plan to the Bureau for consideration and for coordination in publicizing the benefits of the IoT Labeling
Program. We recognize the importance of close collaboration between industry and delegate authority to
the Bureau to consider and work with the Lead Administrator and other stakeholders to determine how
the consumer education campaign would be executed and to execute the campaign. In addition and in
Uniform Provisions Concerning the Approval of Vehicles with Regards to Cyber Security and Cyber Security
Management Systems. As noted earlier in the document, the Commission’s program initially focusses on consumer
IoT, rather than enterprise or industrial.
458
European Union Agency for Cybersecurity (ENISA), Cybersecurity Certification Framework,
https://www.enisa.europa.eu/topics/certification/cybersecurity-certification-framework [https://perma.cc/5ZS4-
KWTX] (last visited Dec. 29, 2023).
459
Press Release, European Commission, EU-US Joint Statement on CyberSafe Product Action Plan (Jan. 31,
2024), https://digital-strategy.ec.europa.eu/en/library/eu-us-joint-statement-cybersafe-products-action-plan
[https://perma.cc/8D78-H97V].
460
Press Release, Ministry of Economy, Trade and Industry, Joint Statement of the Japan-U.S. Economic Policy
Consultative Committee at 6 (Nov. 14, 2023), https://www.meti.go.jp/press/2023/11/20231116006/20231116006-
1.pdf [https://perma.cc/GN7U-PYP4].
461
IoT Labeling NPRM at 22, para. 53; NIST Cybersecurity White Paper at 19-20.
462
See, e.g., CSA Comments at 26; Cybersecurity Coalition Comments at 15; NYC OTI Comments at 4; Comcast
Comments at 10; Kaiser Permanente Comments at 5; PMI Comments at 2; NRF Comments at 2; Coalition Letter
Reply at 2.
463
We anticipate that the Lead Administrator may receive support from other Label Administrators in conducting its
consumer outreach campaign.
464
The Lead Administrator should include recommendations about what those languages should be.
Federal Communications Commission FCC 24-26
70
furtherance of our expectation that the success of the IoT Labeling Program will be dependent on a close
collaboration with the federal government, industry, and other relevant stakeholders,
465
the Commission
will coordinate as needed with relevant agencies, such as the Department of Homeland Security, CISA,
the FBI, as well as the FTC, the Consumer Product Safety Commission (CPSC), and other industry
stakeholders who have indicated a willingness to publicize the benefits of the IoT Labeling Program as
part of their own consumer education activities.
138. In the IoT Labeling NPRM, the Commission stated its expectation that the success of the
IoT Labeling Program would require a robust consumer education campaign involving a collaboration
with manufacturers, retailers, industry, and non-profit groups to promote the label and explain to
consumers what the label means.
466
The Commission sought comment on whether the campaign should
rely on consumer education materials recommended by NIST, the anticipated costs of such a campaign,
and mechanisms in which to conduct outreach consistent with federal constraints on federal outreach.
467
We agree with CEDIA that consumer education will have a significant impact on meeting the IoT
Labeling Program’s goals.
468
We further agree that adequate consumer education must inform consumers
of the limitations of the Cyber Trust Mark as well as the benefits of having a product that meets baseline
cybersecurity requirements,
469
and we agree with CSA that consumers should understand that the label
does not guarantee complete device security, but that such protections are an important component of risk
management.
470
As pointed out by the City of New York’s Office of Technology and Innovation, an
effective consumer education program would need to cover the risks and threats to “digital integration of
[IoT] devices” and how those risks “can be lessened by helping operators, users, and consumers . . . learn
the key elements of a strong IoT Cybersecurity posture.”
471
We agree with commenters in the record that
NIST’s approach to consumer education is best, and note that no commenters opposed NIST’s approach.
139. As the Commission acknowledged in the IoT Labeling NPRM, NIST has prepared a
document identifying consumer education considerations as part of its analysis of a cybersecurity labeling
program.
472
In following with NIST’s recommendations, the Commission believes consumers should
have access to the following information as part of the IoT Labeling Program’s consumer education plan:
(1) What the label means and does not mean, including that the label does not imply an
endorsement of the product and that labeled products have not completely eliminated
risk;
(2) What cybersecurity baselines must be met to obtain authority to affix the label, why
they were included, and how those criteria address security risks;
(3) A glossary of applicable terms, written in plain English;
(4) General information about the conformity assessment process, including information
about how the conformity assessment was conducted and the date the label was
465
IoT Labeling NPRM at 6, para. 9.
466
Id.at 21, para. 53.
467
Id.at 21-22, paras. 53-54.
468
CEDIA Reply at 5 (“Consumer and industry education will have a significant impact on meeting the goals of the
U.S. Cyber Trust Mark program.”).
469
See id.(“[E]ducation must also inform consumers of the limitations of the mark; and that ‘reasonable efforts’
alone may not fully protect the consumer.”).
470
CSA Comments at 18 (“No IoT device will be completely secure . . . . Nevertheless, cybersecurity features, like
seatbelts and airbags in cars, are beneficial in reducing risk.”).
471
NYC OTI Comments at 4.
472
IoT Labeling NPRM at 21-22, para. 53; NIST Cybersecurity White Paper at 19-20.
Federal Communications Commission FCC 24-26
71
awarded to the product;
(5) The kinds of products eligible for the label and an easy way for consumers to identify
labeled products;
(6) The current state of device labeling as new cybersecurity threats and vulnerabilities
emerge;
(7) Security considerations for end-of-life IoT products and functionality implications if
the product is no longer connected to the Internet;
(8) Consumer’s shared responsibility for securing the device software and how their
actions (or inactions) can impact the product’s software cybersecurity; and
(9) Contact information for the IoT Labeling Program and information on how
consumers can lodge a complaint regarding a product label.
140. We recognize that some aspects of this consumer education campaign overlap other
aspects of the IoT Labeling Program, such as the registry. We see no harm with including that
information in the registry as well as the consumer education campaign. We also observe the importance
of conducting what NIST describes as a “campaign” to establish and increase label recognition,
473
and
thus envision a Lead Administrator-led, multiple stakeholder engagement that puts NIST’s
recommendations into practice.
141. NIST has conducted research into the consumer perspective on the loss of manufacturer
support in IoT products.
474
The research suggests that proactive communication to consumers from the
manufacturer with information about end-of-life support policies, the expected lifespan, and how to sign
up for notifications about changes to support is an additional, important step.
475
NIST also emphasizes the
importance of consumer education about the meaning of the dates attached to a label, and cautions that
this can confuse consumers as to the date’s meaning.
476
We agree with Consumer Reports that educating
consumers about the meaning of support periods is an important aspect of consumer education.
477
We
believe that the recommendations identified by NIST in the NIST Cybersecurity White Paper, coupled
with the consumer research done by NIST and industry, provide a strong model that the Lead
Administrator can utilize in its consumer education campaign to meet the goals NIST and the record,
discussed above, identify as important for a successful consumer education campaign.
142. To assist the Lead Administrator in promoting consumer education, the Commission will
coordinate publicizing the benefits of the IoT Labeling Program with the relevant agencies, including the
Department of Homeland Security, CISA, FBI, FTC, the Consumer Product Safety Commission (CPSC),
and other industry stakeholders who have indicated a willingness to assist with consumer education. A
coalition of trade associations advocates for a consumer education program led by the U.S. government,
478
but do not propose how to conduct outreach consistent with the federal outreach concerns articulated in
the IoT Labeling NPRM.
479
We agree that a government outreach program is essential in a larger
campaign to effectively inform consumers about the IoT Labeling Program, consistent with NIST’s
recommendations identified above. The Commission intends to work closely with CISA to make use of
473
NIST Cybersecurity White Paper at 19.
474
See NIST Consumer Perspectives Research.
475
Id.at 502-503.
476
Id.at 503.
477
Consumer Reports Comments at 26 (“Relatedly, we will have to educate consumers that a connected device
required regular updates over time in order to stay secure.”).
478
Coalition Letter Reply at 4.
479
IoT Labeling NPRM at 21, para. 53.
Federal Communications Commission FCC 24-26
72
their “Secure our World” program.
480
We agree with CTA that federal consumer education efforts do not
preclude independent communication and outreach programs.
481
For example, the National Retail
Foundation indicated their willingness to support consumer education efforts.
482
While Everything Set,
Inc. is concerned that outsized private sector involvement in consumer education might hurt the
campaign’s credibility,
483
we believe that retail and manufacturer involvement in promoting the IoT
Labeling Program and the limitations of the IoT Labeling Program are important to ensure widespread
recognition of the Cyber Trust Mark in commerce. To promote consumer education and engage in a joint
effort with industry and stakeholders to raise awareness of the label, the Commission will coordinate with
the Lead Administrator, Executive Agencies, and other industry stakeholders who have indicated a
willingness to publicize the benefits of the IoT Labeling Program as part of their own consumer education
efforts.
M. Cost/Benefit Analysis
143. Our analysis indicates that the expected benefits of the IoT Labeling Program greatly
exceed the expected costs of the program. The expected benefits of the IoT Labeling Program include
improved consumer cyber awareness; reduced vulnerability of products that could be used in cyberattacks
both in people’s homes and as part of a larger national IoT ecosystem; and increased manufacturer
competition and relational benefits stemming from increased goodwill and product awareness.
Consumers value the security of their devices, and the complexity of understanding whether IoT devices
meet baseline security standards, and making informed purchases on that basis is a significant cost to
consumers.
484
144. Consumer Benefit from Reduced Search Costs. The Cyber Trust Mark can lower
consumer research costs by reducing the amount of time consumers spend researching the cybersecurity
characteristics of IoT products before making a purchase. We estimate that the Cyber Trust Mark will
save consumers at least $60 million annually from reduced time spent researching cybersecurity features
of potential purchases. We use the U.S. Department of Transportation (DOT)’s approach of valuing the
time savings of travel to value the time savings to consumers of the Cyber Trust Mark.
485
Our analysis
relies on the share of households with a smart home device (which we note is only one segment of the IoT
480
Cybersecurity & Infrastructure Security Agency, Secure Our World, https://www.cisa.gov/secure-our-world
[https://perma.cc/4KFU-RSGC] (last visited Jan. 12, 2024).
481
CTA Comments at 32 (“The private sector can augment the government’s educational campaign through
advertising, websites and social media.”).
482
See NRF Comments at 2 (“The National Retail Foundation . . . supports the idea that retailers who sell IoT
devices should be part of broader efforts to raise consumer awareness around IoT cybersecurity.”).
483
Everything Set, Inc. Comments at 3.
484
Summary statistics from American Experiences Survey conducted by Consumer Reports found that the majority
of respondents were interested in purchasing a connected device and a large share had difficulty learning about the
security features of connected devices. Consumer Reports Summer Research at 5 (“Four out of five of our
respondents were interested in purchasing a connected device scoring their desire between 3 and 5 on a five-point
scale with 5 being most interested, and 38% had tried to find security or privacy information about a connected
device before purchase. But many found it difficult because it was either unavailable, available only after purchase,
buried on legal documents, or not always found in a consistent place.”). Similarly, Comcast highlights the difficulty
consumers have comparing security features between products. Comcast Comments at 10 (“But today there is an
information asymmetry: consumers do not have a reliable, easy-to-understand mechanism to compare security
features between otherwise comparable IoT devices (or, as noted, to understand that a device’s security is no longer
being supported.)”).
485
See Memorandum from Vinn White, Acting Assistant Secretary for Transportation Policy, U.S. Department of
Transportation to Secretarial Officers and Modal Administrators at 13 (Sept. 27, 2016),
https://www.transportation.gov/sites/dot.gov/files/docs/2016%20Revised%20Value%20of%20Travel%20Time%20
Guidance.pdf [https://perma.cc/MP3R-TMS7].
Federal Communications Commission FCC 24-26
73
market likely to be impacted by this Order), the share of those households that are likely to devote time to
investigating the cybersecurity of their connected products, and an estimate of their time value of
researching cybersecurity characteristics of devices. First, we estimate that 49 million U.S. households
own at least one IoT device from a market segment that likely will be impacted by the Cyber Trust Mark.
Further, recent survey evidence suggests that 32% of households are invested in reducing their
cybersecurity risk.
486
We estimate each hour of time savings to be valued at $16 based on the median
compensation in the U.S. and an individual’s potential preference for researching products rather than
working an additional hour.
487
We note that this calculation only focuses on one segment of the IoT
market, which may underestimate the time savings induced by this Order. We recognize that the exact
time savings of utilizing the Cyber Trust Mark relative to searching for information online is unknown, so
a lower end estimate of 15 minutes of time savings per year per household is used. We find a 15-minute
time savings is consistent with the value of cybersecurity features disclosed in surveys.
488
Given
486
A survey of households showed that 41% of internet connected households (92%) have a smart home device.
This indicates that 38% (=92%*41%) of households have at least one smart home device. The survey represented
the market for smart home devices, like thermostats, lighting control systems, smart appliances, and other
components. See Jennifer Kent, Next-Generation Smart Home: Building for the Future at 2,
https://www.parksassociates.com/products/whitepapers/next-gen-smart-home-2023 [https://perma.cc/KJE6-T3EW]
(last visited Jan. 18, 2024). This would indicate that out of the 130 million households in the United States, 49
million (=130,000,000*0.38) have an IoT device. See U.S. Census Bureau, Selected Social Characteristics in the
United States (DP02) American Community Survey 2022 1-Year Estimates,
https://data.census.gov/table?q=households&g=010XX00US [https://perma.cc/3YZ5-XFM8] (last visited Feb. 8,
2024). Furthermore, a survey by Cisco shows that 32% of consumers are “Privacy Actives” - those that are
interested in privacy and security and have acted on behalf of those interests. See Cisco, Building Consumer
Confidence Through Transparency and Control at 5 (2021),
https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-cybersecurity-series-2021-
cps.pdf?CCID=cc000742&DTID=esootr000515&OID=rptsc027438 [https://perma.cc/2KHM-K978]. This indicates
that 15 million ( =130,000,000*0.38*0.32) (rounded down) households would experience cost savings from using
the Cyber Trust Label.
487
The median wage is $22.46 for all occupations and it is adjusted by 1.45 = ($43.93/ $30.35), which is the ratio of
average total compensation to average wages to fully account for the benefits of an additional hour of work. U.S.
Bureau of Labor Statistics, May 2022 National Occupational Employment and Wage Estimates (Apr. 25, 2023),
https://www.bls.gov/oes/current/oes_nat.htm#00-0000; Press Release, U.S. Bureau of Labor Statistics, Employer
Costs for Employee Compensation – September 2023 (Dec. 15, 2023),
https://www.bls.gov/news.release/pdf/ecec.pdf. Value of time savings calculations are dependent on an individual's
willingness to pay a portion of their hourly income to avoid an activity. Generally, the more uncomfortable the
activity the larger the share of income an individual would pay. DOT uses 50% for personal local travel, meaning
an individual would be willing to pay half of their hourly income to avoid one hour of personal travel, and 70% for
personal intercity travel. The rate at which consumers are willing to pay to avoid spending an hour of time
researching cybersecurity concerns is unknown so the preference associated with personal local travel (50%) is used.
See Memorandum from Vinn White, Acting Assistant Secretary for Transportation Policy, U.S. Department of
Transportation to Secretarial Officers and Modal Administrators at 13 (Sept. 27, 2016),
https://www.transportation.gov/sites/dot.gov/files/docs/2016%20Revised%20Value%20of%20Travel%20Time%20
Guidance.pdf [https://perma.cc/MP3R-TMS7]. Given the difficulty in researching IoT security that is highlighted
by the record, we believe this preference rate is reasonable. Together this means that each hour of time savings is
equal to $16.14 (=22.26*1.45*0.5).
488
We find the value of 15 minutes of search time to be consistent with the value consumers already place on
various security features. For example, a survey related to smart home devices found that participants were willing
to pay $5.75 for automatic updates relative to manual security updates. From the same survey consumers were also
willing to pay $12.74 for password protection. Given that an hour of research time is valued at $16.14, it is likely
that a household would be willing to spend at least 15 minutes, valued at $4.04= (16.14/(15/60)) researching
whether a device has the security features they are interested in. See Pardis Emami-Naeini et al., Are Consumers
Willing to Pay for Security and Privacy of IoT Devices?, USENIX (Aug. 2023),
https://www.usenix.org/conference/usenixsecurity23/presentation/emami-naeini [https://perma.cc/SYJ7-W4QA]
(Duke and Carnegie Mellon Study).
Federal Communications Commission FCC 24-26
74
manufacturer and industry group comments showing support for consumer awareness and cybersecurity,
we believe there would be sufficiently large enough immediate manufacturer participation in the IoT
Labeling Program to incur these benefits in the first year of the program, and every year thereafter.
489
Nationwide, the Cyber Trust Mark would result in a minimum of $60 million in time savings annually.
490
145. A separate approach to calculating the benefit of the Cyber Trust Mark is to estimate the
value consumers place on security and privacy features of IoT devices. A study submitted by Consumer
Reports found that respondents valued individual security upgrades between $6 and $13.
491
The study
also found that devices were valued at around $34 more if they had a label emphasizing a bundle of the
most protective security features.
492
Given the difficulty consumers face in understanding what security
and privacy features are included in a device, the Cyber Trust Mark would help consumers easily identify
and choose products with features they value. For example, if the Cyber Trust Mark represented the most
protective features associated with the label in the in the study, a consumer would benefit by $34 from
purchasing a device with the Cyber Trust Mark over a device that did not display the Mark. Based on our
estimate of 15 million households that would be impacted by the IoT labeling program, we estimate that
the benefit to consumers, in terms of the added value of the Cyber Trust Mark, would be between $85
million and $500 million annually.
493
While the exact security features that will be proposed by the Lead
Administrator in collaboration with stakeholders are not yet determined, if the Cyber Trust Mark only
emphasized the lowest valued security feature, the program would produce a benefit of at least $85
million.
494
146. Manufacturer Competitive and Reputational Benefits. Aside from the direct benefits to
consumers, there are also wider benefits of the Cyber Trust Mark. Participating businesses benefit from
489
Cisco Comments at 1 (“Cisco shares the Commission’s goal of increasing consumer awareness of cybersecurity
concerns related to IoT and we have a significant interest in strengthening the resiliency of the communications
network.”); Samsung Comments at 2 (“Samsung is also committed to strengthening IoT security through leadership
in industry initiatives and standard-setting bodies.”); AHAM Comments at 1 (“AHAM conceptually supports the
Commission’s effort to create a voluntary program that allows manufacturers to show that they took the necessary
steps to meet a baseline standard of security for IoT products”); CTA Comments at 2 (“CTA and its members have
made enhancing security across the IoT ecosystem a top priority. In 2018, CTA joined forces with partners across
the connected ecosystem to form the Council to Secure the Digital Economy (CSDE) and develop guidance for the
international information and communications technology community on how to secure IoT and reduce risk across
the connected ecosystem.”).
490
$60 million = (15,000,000*$16*(15/60)) is the estimated value for 15 minutes of time savings nationwide.
491
See Duke and Carnegie Mellon Study at 8, Table 2. Researchers calculated consumers’ willingness to pay for
five individual security and privacy improvements related to a smart speaker with voice assistant and a smart smoke
detector. The security features varied from low protection to high protection. On the high end, Table 2 shows that
consumers were willing to pay $13.31 for cloud storage to be de-identifiable verse identifiable. On the low end,
consumers were willing to pay $5.75 for automatic security updates verses manual ones.
492
Researchers calculated consumers’ willingness to pay for a device with no label verses a device with a label
indicating the device included a set of the most protective security features. See id. (“The regression analysis (see
Table 4) showed that compared to having risky security and privacy practices or no transparency, participants were
significantly more willing to purchase . . . and willing to pay significantly higher premiums ( . . . premium=
$33.63 . . . ) to have a smart device with improved security and privacy practices.”).
493
As noted in our analysis above, there are approximately 15 million households that would benefit from being
aware of their IoT devices cybersecurity. The range of benefits is based on the range of values discussed in the
Duke and Carnegie Mellon Study. Based on the lowest valued feature the benefit would be $85 million
(15,000,000*$5.75) and based on the value of the label, the higher end of benefits would be $500 million
(15,000,000*$33.63), with both estimates rounded down to the nearest five million.
494
Consumers valued automatic updates over manual updates at a value of $5.75. This is the lowest value feature
that consumers still put a positive premium on. See Duke and Carnegie Mellon Study at 8, Table 2. While we
understand that some devices that consumers are already purchasing contain the features they value, by focusing on
the lower end of benefits, we emphasize the lower bound of value placed on security and privacy features.
Federal Communications Commission FCC 24-26
75
product differentiation and quality signaling vis-a-vis competitors that do not participate in the IoT
Labeling Program and from increased company goodwill and reduced risks related to cybersecurity
incidents.
495
By aligning minimum security practices with the proposed standards, and communicating
those standards to consumers, manufacturers may be able to generate goodwill and reduce business loss
after cybersecurity incidences.
496
While we do not revisit our discussion of a safe harbor from liability as
discussed above, we note that manufacturers may benefit from adopting security practices that are
consistent with standards necessary to bear the Cyber Trust Mark. We highlight that there have been
several instances where the Federal Trade Commission investigated and settled with firms due to poor
security practices or inaccurate communication of their security practices.
497
We merely note that a
manufacturer that has gone through the process of obtaining the Cyber Trust Mark may benefit from
likely having documented the security practices and attendant testing necessary to acquire the Mark.
147. Market-Wide Benefits of Reduced Cybersecurity Incidents. Insecure IoT products are
often used in distributed denial-of-service (DDoS) attacks, which can be used to overwhelm websites to
create a distraction during other cybersecurity crimes, or to request a ransom be paid to stop the attack.
While we cannot quantify the expected benefits the Cyber Trust Mark may have on reducing the number
of vulnerable devices and/or the potential reduction on their likelihood of being used in a cybersecurity
attack, commenters do highlight improved security as one of the major benefits of this IoT Labeling
Program.
498
We do further emphasize this as a benefit that is likely to have significant impacts on firms in
a wide range of industries.
499
148. Costs to IoT Labeling Program Participants. Only those entities who choose to
participate will incur costs associated with the voluntary IoT Labeling Program. The specific costs to
495
Consumers value cybersecurity and the Cyber Trust Mark would help them identify devices/products that are
consistent with their preferences. Research found that consumers were willing to pay a premium for cybersecurity
features and many searched for device cybersecurity information before purchase. See id.at 1 (“Participants were
willing to pay a significant premium for devices with better security and privacy practices.”); Consumer Reports
Summer Research at 5 (“Four out of five of our respondents were interested in purchasing a connected . . . and 38%
had tried to find security or privacy information about a connected device before purchase.”).
496
A report by IBM includes reputational costs as a factor associated with lost business that can be associated with a
data breach. IBM Security, Cost of a Data Breach Report at 15 (2023),
https://www.ibm.com/downloads/cas/E3G5JMBP [https://perma.cc/5NMF-5HQE] (“Lost business costs include
activities such as business disruptions and revenue losses from system downtime, the cost of lost customers and
acquiring new customers, and reputation losses and diminished goodwill.”); see also Duke and Carnegie Mellon
Study at 1 (“Participants were willing to pay a significant premium for devices with better security and privacy
practices.”).
497
“The FTC also alleged that Tapplock failed to implement a security program or take other steps that might have
helped the company discover electronic vulnerabilities with its locks.” Press Release, FTC, FTC Gives Final
Approval to Settlement with Smart Lock Maker (May 20, 2020), https://www.ftc.gov/news-events/news/press-
releases/2020/05/ftc-gives-final-approval-settlement-smart-lock-maker [https://perma.cc/RQ3P-GWV5].
“According to the complaint, Ring also failed to implement standard security measures to protect consumers’
information from two well-known online threats—“credential stuffing” and “brute force” attacks—despite warnings
from employees, outside security researchers and media reports.” Press Release, FTC, FTC Says Ring Employees
Illegally Surveilled Customers, Failed to Stop Hackers from Taking Control of Users’ Cameras (May 31, 2023),
https://www.ftc.gov/news-events/news/press-releases/2023/05/ftc-says-ring-employees-illegally-surveilled-
customers-failed-stop-hackers-taking-control-users [https://perma.cc/P5MN-RCJC].
498
See, e.g., Keysight Comments at 1; Logitech Comments at 1; A2LA Comments at 1; AIM Comments at 1;
Widelity Comments at 1; Whirlpool Comments at 3; ITI Comments at 2; Everything Set, Inc. Comments at 3.
499
Industry reports highlight the use of IoT devices in DDoS attacks as well as the potential harm of such attacks.
See Akamai, The Evolution of DDoS: Return of the Hacktivists at 4 (Jan. 2023),
https://www.akamai.com/resources/research-paper/the-evolution-of-ddos-return-of-the-hacktivists
[https://perma.cc/VT6H-4KZ8] (“The explosion of the Internet of Things (IoT) has been a boon to DDoS attackers,
providing an endless army of poorly secured devices that they can requisition to serve as botnets.”).
Federal Communications Commission FCC 24-26
76
participating manufacturers cannot be readily measured but are expected to include: conformity testing
fees at a CyberLAB, CLA lab, or through in-house testing; CLA fees; internal compliance and filing
costs; Cyber Trust Mark placement on product; costs incurred for API access as part of the QR Code; a
customer information campaign; and adjustments to security practices necessary to meet the standards
established for the Cyber Trust Mark. These costs are likely to vary depending on the standards and
testing procedures proposed by the Lead Administrator as well as the extent of manufacturer
participation. Any in-house testing lab will also be required to obtain accreditation to ISO/IEC standards
and will incur the accreditation costs. We expect that manufacturers that choose to pursue this option
may offset the accreditation costs with time savings, and potentially cost savings, associated with in-
house testing.
149. Participating manufacturers will incur conformity testing, reporting costs, potential
renewal fees, and Label Administrator processing fees, but the Commission’s IoT Labeling Program is
voluntary and we only expect manufacturers who would benefit from the program to participate in the
long-run, further indicating that accrued benefits will exceed manufacturer costs. Furthermore, comments
in the record show that many manufacturers and industry groups are in favor of consumer awareness and
addressing cybersecurity concerns.
500
This provides some indication that manufacturers perceive the
benefits of participating in the IoT Labeling Program as outweighing the costs. We understand that
manufacturers’ security practices for IoT products vary. Some manufacturers will find it beneficial to
align their cybersecurity standards with the IoT Labeling Program’s standards and apply for the Cyber
Trust Mark. If a manufacturer decides not to participate in the program, then they will not experience any
additional costs.
150. Cost of Registry Development and Administration. We attempt to estimate the cost of
developing and administering the registry with currently available information, recognizing that our cost
estimate is unable to incorporate pending issues that will be addressed by the Bureau as discussed
above.
501
While the cost to the Lead Administrator to manage the registry in accordance with the
Bureau’s pending determinations and as discussed above are forthcoming, we nevertheless attempt to
estimate the costs of the Lead Administrator’ administrative role in managing the registry as described
above. Our estimate utilizes data submitted by Consumer Reports, which envisioned a centralized
registry. We note that the registry, as adopted, will be less burdensome than the costs described by
Consumer Reports in their estimates.
502
Our estimate to maintain registry components and review
applications as part of the CLA duties, which aligns with the middle of the expert range based on
commenter submissions, is approximately $5 million annually. The high-end estimate submitted by
Consumer Reports is $10 million.
503
Consumer Reports indicates that setting up a centralized registry
could be done by one individual with a few contractors at a cost less than $200,000 a year.
504
Depending
on the requirements, the Lead CLA may still need to set up some minimal components of a registry and
incur a small portion of these costs. The estimates on the annual administration costs are much less
precise with the expert proposed estimate of between $100k and $10 million annually, with indication that
the $10 million estimate is on the very high end.
505
Staff calculate a more reasonable, but likely still high,
estimate in the middle of that range, even accounting for the advanced technical expertise that would be
500
See, e.g., Cisco Comments at 1; Samsung Comments at 2; AHAM Comments at 1; CTA Comments at 2;
Coalition Letter Reply at 1.
501
See supra para. 121121.
502
The Consumer Reports proposed registry architecture includes a dataset that can store images and PDFs as well
as allows for device manufacturers, retailers, security researchers and administrators to access the platform. See
Consumer Reports Registry Design Proposal at 4. The registry, as adopted, does not include these features and
therefore would not incur the costs to develop and maintain them.
503
Id. at 7.
504
Id.
505
Id.at 8.
Federal Communications Commission FCC 24-26
77
required to review applications. For example, an organization relying on five lawyers, five electrical
engineers, and five software developers in a full-time capacity would require $3 million annually in wage
compensation. If we generously assume another $2 million in additional costs to accommodate ISO/IEC
accreditation, contractors, facilities, and other resources, the total is $5 million. While these estimates are
for a single administrator, we believe this is a reasonable estimate of the staffing costs that would be
distributed among the CLAs to meet the requirements of reviewing applications.
151. The estimated high-end costs of administering the IoT Labeling Program annually ($10
million) are far less than the low-end estimate of annual benefits to consumers ($60 million) of just one
aspect of the program. We further highlight that the benefits to manufacturers are likely to exceed
manufacturer’s participation costs. Together this indicates the total program benefits exceed costs.
Because the initial startup costs are so low relative to the benefits, we do not compare the discounted
values.
IV. LEGAL AUTHORITY
152. We adopt the IoT Labeling NPRM’s tentative conclusion that the FCC has authority to
adopt the IoT Labeling Program. We conclude that section 302 provides us with the authority to adopt a
voluntary program for manufacturers seeking authority to affix the FCC-owned Cyber Trust Mark on
wireless consumer IoT products that comply with the program requirements.
506
In the IoT Labeling
NPRM, the Commission sought comment on its authority under section 302 of the Act, along with other
possible sources of authority.
507
In particular, under section 302(a) of the Act, consistent with the public
interest, convenience, and necessity, the Commission is authorized to make “reasonable regulations (1)
governing the interference potential of devices which in their operation are capable of emitting radio
frequency energy by radiation, conduction, or other means in sufficient degree to cause harmful
interference to radio communications; and (2) establishing minimum performance standards for home
electronic equipment and systems to reduce their susceptibility to interference from radio frequency
energy.’”
508
153. Some commenters question our authority under section 302 to establish an IoT Labeling
Program.
509
The U.S. Chamber of Commerce cautions the Commission to not “overinterpret its harmful
interference authority” under sections 302(a) and 333.
510
CTIA argues that the Commission does not have
the authority to regulate cybersecurity, but does not cite to section 302(a) or explain why the
Commission’s action today does not fall within the scope of section 302(a) or any other section of the
Communications Act.
511
Others do not dispute the Commission’s authority to adopt a voluntary program
but argue that the Commission does not have the authority to make the IoT Labeling Program
mandatory.
512
506
47 U.S.C. § 302a.
507
IoT Labeling NPRM at 23-26, paras. 57-65.
508
47 U.S.C. § 302a(a).
509
See, e.g., NTCA Comments at 10 (“It is not clear that a voluntary IoT label program intended to increase
consumer confidence serves the explicit concerns of diminishing radio interference as contemplates in Sections
302(a) and 333.”); CTIA Comments at 43 (“[T]he FCC does not have any express statutory authority to create a
cybersecurity labeling program or otherwise adopt requirements related to the cybersecurity of Internet-connected
devices.”); Chamber Comments at 3 (“The Chamber is concerned with the Commission's interpretation of its legal
authority.”).
510
Chamber Comments at 3.
511
CTIA Comments at 42-44.
512
See USTelecom Comments at 2 (“[S]ections 302 or 333 of the Communications Act do not authorize the
Commission to impose general cybersecurity requirements . . . .”) (emphasis added); see also, e.g., NCTA
Comments at 13 n.27 (“Although NCTA previously raised concerns about the scope of the Commission’s authority
(continued….)
Federal Communications Commission FCC 24-26
78
154. We agree with Comcast that Congress intended section 302 to be flexible enough “to
address novel issues not yet on the legislative radar[.]”
513
As Comcast further observes, “[t]he stated goal
of the [IoT Labeling] Program is to ‘ensure that IoT devices have implemented certain minimum
cybersecurity protocols to prevent their being hacked by bad actors who could cause the devices to cause
harmful interference to radio communications,” which falls squarely within the Commission’s remit
under Section 302(a).”
514
Further, NYC OTI points out that IoT which “by design doesn’t protect against
the reception of spurious or unintended RF communications may be subject to a series of radio-layer
attacks due to the lack of these protections” and thus is within our authority to regulate.
515
A voluntary
IoT Labeling Program thus assures consumers that certain cybersecurity standards are met to protect those
devices from being used to generate interference to other devices.
516
155. In addition to our authority under section 302(a)(1), section 302(a)(2) authorizes the
Commission to “establish minimum performance standards for home electronic equipment and systems to
reduce their susceptibility to interference from radio frequency energy.”
517
A voluntary program for
consumer IoT products is encompassed within our authority to regulate home electronic equipment and
their accompanying systems that render that home electronic equipment operational.
156. Section 302(a)(2) allows such regulations to apply to “the manufacture, import, sale,
offer for sale, or shipment of such devices and home electronic equipment and systems[.]” The legislative
history of section 302 also supports our conclusion. Congress adopted section 302 due to concerns about
radio frequency interference to consumer electronic equipment:
518
In the market for home devices, however, good faith industry attempts to solve this
interference have not always been as successful. . . . [T]he Conferees believe that
Commission authority to impose appropriate regulations on home electronic equipment
and systems is now necessary to insure that consumers’ home electronic equipment and
systems will not be subject to malfunction due to [radio frequency interference].
519
157. Congress envisioned “home electronic equipment and systems” to include not only radio
and television sets, but all types of electronics and their supporting systems used by consumers.
520
under Section 302 to address cybersecurity concerns in other contexts, here the Commission proposes to establish a
voluntary program that is limited to connected devices, which is well within the Commission’s Section 302 and 333
authority.”); CTIA Reply at 4-5 (noting that “several commenters articulated their view that while a voluntary
program could be considered ‘reasonable,’ the FCC lacks authority to develop mandatory regulations or
requirements under Sections 302, 303, or 333 of the Act,” and observing that “a purely voluntary program is
unlikely to invite the same scrutiny as a set of mandatory standards”). Because we adopt a voluntary program, we
need not address arguments that it would be unreasonable under section 302(a) to adopt mandatory requirements or
that mandatory requirements otherwise would be beyond the Commission’s authority.
513
Comcast Comments at 15.
514
Id. at 14 (quoting IoT Labeling NPRM at 24, para. 59); see also, e.g., NCTA Comments at 12-13.
515
NYC OTI Comments at 4-5.
516
See Zhifei Xu et al., Inaudible Attack on Smart Speakers With Intentional Electromagnetic Interference, Vol. 69
IEEE Transactions on Microwave Theory and Techniques (2021). While CTIA asserts that “[a]ttacks that seek to
weaponize radiofrequency interference . . . are not a major risk” it does not provide the basis for that assertion—and
even it concedes that such attacks are possible. CTIA Reply at 4. Based on our historical experience and expertise
we are more cautious about such risks and believe the voluntary IoT Labeling Program we adopt for Internet-
connected wireless devices is a measured response appropriately calibrated to our assessment of those risks.
517
47 U.S.C. § 302a(2).
518
H.R. Rep. No. 97-765, at 32 (Conf. Rep.), 1982 U.S.C.C.A.N. at 2276 (1982).
519
Conf. Rep. at 2276.
520
Id.
Federal Communications Commission FCC 24-26
79
Examples given by Congress were home burglar alarms, security systems, automatic garage door openers,
record turntables, and sound systems.
521
Congress clearly foresaw interference and disruption to
consumer equipment and the systems that equipment was connected to as within the ambit of section 302
when it gave the Commission “exclusive jurisdiction” over matters involving radio frequency
interference.
522
The many alternatives available to the Commission to accomplish its duty under section
302 include directing manufacturers to meet “certain minimal standards” or utilizing labels.
523
158. We additionally conclude that our section 302(a) authority to adopt “reasonable
regulations” governing the interference potential of devices capable of causing RF interference empowers
us to choose specific approaches that advance goals of the Act in addition to the core concerns in section
302(a)(1) and (2).
524
For one, as widely supported in the record, we rely on NIST’s recommended IoT
criteria (the NIST Core Baseline) as the foundation for the cybersecurity requirements to be applied under
the IoT Labeling Program.
525
Even if some elements or applications of those criteria could advance
policies or interests in addition to guarding against the risk that exploited vulnerabilities in Internet-
connected wireless consumer IoT products could cause harmful interference, it would be neither prudent
nor workable to try to segregate or disaggregate that package of criteria in an effort to isolate some
product capabilities from others in an effort to narrow the Program’s focus. To the contrary, maintaining
the integrity of the cohesive package of NIST criteria advances the directive in section 302(a) to address
the interference potential of wireless devices through “reasonable regulations.”
526
Commenters point out,
for example, that even when harmful interference to IoT products from cyberattacks “is not necessarily
the traditional form of interference caused by devices operating in frequencies and at power levels not
approved by the Commission[,]” it can implicate statutory policy concerns nonetheless.
527
Under the
521
Id.
522
Id.
523
Id. at 2277.
524
We thus reject claims to the contrary. See, e.g., NTCA Comments at 7-8.
525
We reject the efforts of some commenters to cast doubt on our authority by arguing that “[t]o date, the
Commission has not played a role in reviewing IoT for cybersecurity risks, and Congress did not look to the
Commission when it considered and passed legislation to improve IoT cybersecurity.” Chamber Comments at 3.
But there is no doubt that Congress has looked to NIST in that regard. See, e.g., IoT Cybersecurity Improvement Act
of 2020, 15 U.S.C. § 278g-3a to § 278g-3e (establishes minimum cybersecurity requirements for IoT technology
procured by the U.S. government and directs federal agencies to only procure devices that comply with NIST
guidelines (NIST SP 800-213 and 213A) and establishes vulnerability reporting requirements for products sold to
the U.S government); see also CTIA Comments at 11-12 (citing the IoT Cybersecurity Improvement Act of 2020 and
noting that it “delegated authority to NIST and the Department of Homeland Security”). It remains proper for us to
carry out our statutory duties even when they implicate issues that some might argue historically have not been as
central a focus of the Commission’s work, and it is eminently reasonable for us to do so informed by outside
expertise—as reflected in our reliance on the NIST Core Baseline as the foundation for our IoT Labeling Program,
and through our public-private collaboration efforts here more generally. Cf. Huawei Tech. USA, Inc. v. FCC, 2
F.4th 421, 427 (5th Cir. 2021) (“Assessing security risks to telecom networks falls in the FCC’s wheelhouse. And
the agency’s judgments about national security receive robust input from other expert agencies and officials. We are
therefore persuaded that, in crafting the rule, the agency reasonably acted within the broad authority Congress gave
it to regulate communications.”); id. at 439 (“[T]he FCC cannot conjure national security authority out of thin air. . .
. [B]ut as the FCC argues, the Act’s purposes include ‘mak[ing] [communication] available . . . for the purpose of
the national defense’ and ‘promoting safety of life and property through the use of wire and radio communications.’
The agency reasonably read ‘public interest’ in light of these larger goals to encompass secure networks.” (citation
omitted)).
526
47 U.S.C. § 302a(a).
527
Comcast Comments at 15; see also, e.g., NYC OTI Comments at 4-5 (IoT which “by design doesn’t protect
against the reception of spurious or unintended RF communications may be subject to a series of radio-layer attacks
due to the lack of these protections.”).
Federal Communications Commission FCC 24-26
80
circumstances here, we thus find it “reasonable” for our IoT Labeling Program to rely on the full package
of IoT cybersecurity criteria that guard against the risk that the covered products cause harmful
interference, and also guard against the risk of interference to those covered products—even in the case of
non-RF interference—consistent with the policy goals underlying provisions such as sections 302(a) and
333 and of the Act.
528
Our understanding of the reasonableness of our approach here also is informed by
the public safety and national security goals in sections 1 and 4(n) of the Act.
529
Thus, although we do not
rely on additional provisions beyond section 302 as authority for the voluntary IoT Labeling Program we
adopt today, they inform our understanding of what regulatory approach to implementing section 302(a)
is reasonable under these circumstances.
530
159. Comcast also cites the legislative history of section 302(a) in support of our authority to
establish an IoT Labeling Program.
531
Congress agreed with a letter from the Commission that initial
language that would have restricted section 302(a) to devices that cause harmful interference to
“‘commercial, aircraft, and public safety’ radio communications” was too narrow.
532
Congress instead
adopted the current language: “reasonable regulations . . . consistent with the public interest, convenience,
and necessity.”
533
The Commission’s authority under section 302 was designed by Congress to be
“sufficiently broad to permit it to formulate rules relating to any service where interference from these
devices is a serious problem.”
534
Such language, it was believed, would be “sufficiently broad to permit it
to formulate rules relating to any service where interference from these devices is a serious problem.”
535
We conclude that a voluntary program with minimum standards to prevent radio interference to consumer
IoT products is consistent with the text and history of section 302.
160. Further, we have previously imposed security requirements that prevent unauthorized
parties from accessing and alerting technology to cause radio interference under our section 302 authority.
In 2020, we required that access points to automated frequency coordination systems were secure so
unauthorized parties could not alter the list of available frequencies and power levels sent to an access
point.
536
We agree with Comcast that our previous actions requiring end user devices to “contain security
features sufficient to protect against modification of software and firmware by any unauthorized
parties”
537
and actions to secure unlicensed national information infrastructure devices
538
are sufficiently
528
47 U.S.C. §§ 302a(a), 333.
529
47 U.S.C. §§ 151, 154(n).
530
Because we conclude that section 302 of the Act authorizes our actions today, we defer consideration of other
sources of authority that the Communications Act may grant the Commission over this area.
531
Comcast Comments at 14.
532
U.S. Rep. No. 90-1276, at 7 (1968), reprinted in part at 114 Cong. Rec. 18,428 (June 24, 1968).
533
Id.; 47 U.S.C. § 302a.
534
U.S. Rep. No. 90-1276, at 7 (1968), reprinted in part at 114 Cong. Rec. 18,428 (June 24, 1968).
535
Id.
536
Unlicensed Use of the 6 GHz Band; Expanding Flexible Use in Mid-Band Spectrum Between 3.7 GHz and 24
GHz, Report and Order and Further Notice of Proposed Rulemaking, 35 FCC Rcd 3852, para. 79 (2020).
537
Amendment of the Commission’s Rules with Regard to Commercial Operations in the 3550- 3650 MHz Band,
GN Docket No. 12-354, Report and Order and Second Further Notice of Proposed Rulemaking, 30 FCC Rcd 3959,
4033-4034, para. 240 (2015).
538
Revision of Part 15 of the Commission’s Rules to Permit Unlicensed National Information Infrastructure (U-NII)
Devices in the 5 GHz Band, ET Docket No. 13-49, First Report and Order, 29 FCC Rcd 4127, 4143, para. 54 (2014).
Federal Communications Commission FCC 24-26
81
analogous to this proceeding as to be supported by our section 302 authority.
539
161. Finally, consistent with our tentative conclusion in the IoT Labeling NPRM, we find that
our section 302 authority enables us to rely on third parties in carrying out the implementation details of
our Program.
540
As the Commission pointed out in the NPRM, section 302(e) of the Act authorizes the
Commission to delegate equipment testing and certification to private laboratories, and the Commission
already has relied in part on third parties in carrying out its equipment authorization rules that likewise
implement section 302 of the Act.
541
V. FURTHER NOTICE OF PROPOSED RULEMAKING
162. In this Further Notice of Proposed Rulemaking (Further Notice), we seek comment on
additional declarations intended to provide consumers with assurances that the products bearing the FCC
IoT Label do not contain hidden vulnerabilities from high-risk countries, that the data collected by the
products does not sit within or transit high-risk countries, and that the products cannot be remotely
controlled by servers located within high-risk countries. Specifically, we seek comment on whether we
should require manufacturers to disclose to the Commission whether firmware and/or software were
developed and manufactured in a “high-risk country,” as well as where firmware and software updates
will be developed and deployed from. We also seek comment on whether to require manufacturers to
disclose to consumers in the registry whether firmware and/or software were developed and manufactured
in a “high-risk country,” as well as where firmware and software updates will be developed and deployed
from. We propose to include as high-risk countries those foreign adversary countries defined by the
Department of Commerce in 15 CFR § 7.4.
542
Are there other sources that the Commission should
consider for identifying high-risk countries? Specifically, we seek comment on whether to require the
applicant seeking to use the FCC IoT Label to make one of the following declarations under penalty of
perjury to accompany its application to use the label:
a. No software or software update or part of any software or software update that runs on or
controls the product was or will be developed or deployed from within a country on the
Secretary of Commerce’s list of high-risk countries, except that this commitment does not
apply to the origin of open-source contributions not paid for directly or indirectly by us or our
direct or indirect partners in offering this product; or
b. This device runs, or due to future software updates might run, software developed within the
Secretary of Commerce’s list of high-risk country or countries. Applicant is not aware of any
backdoors or other sabotage, or any reason to believe that there is a particular heightened risk
for such backdoors or sabotage relative other software developed within such a country, but
we inform purchasers and users that the Department of Commerce has designated high-risk
country or countries as jurisdictions whose conduct is significantly adverse to the national
539
Comcast Comments at 15-16 (“The FCC’s history with Section 302 includes a number of analogous situations
where the FCC cited Section 302 to justify rules or requirements ensuring the security of devices to avoid RF
interference.”).
540
IoT Labeling NPRM at 25, para. 62. Although some commenters contest our section 302 authority as a general
matter, no commenter contends that, insofar as section 302 of the Act does provide us authority, that authority would
not be broad enough to allow us to rely on third parties as we do here.
541
Id.
542
15 CFR § 7.4(a). “The Secretary [of Commerce] has determined that the following foreign governments or
foreign non-government persons have engaged in a long-term pattern or serious instances of conduct significantly
adverse to the national security of the United States or security and safety of United States persons and, therefore,
constitute foreign adversaries solely for the purposes of the Executive Order, this rule, and any subsequent rule: (1)
The People's Republic of China, including the Hong Kong Special Administrative Region (China); (2) Republic of
Cuba (Cuba); (3) Islamic Republic of Iran (Iran); (4) Democratic People's Republic of Korea (North Korea); (5)
Russian Federation (Russia); and (6) Venezuelan politician Nicolás Maduro (Maduro Regime).” This list may be
revised as determined as necessary by the Secretary of Commerce.
Federal Communications Commission FCC 24-26
82
security of the United States or security and safety of United States persons.
163. We also seek comment on requiring manufacturers to disclose to the Commission
whether the data collected by the product is stored in or transits a high-risk country or countries. We also
seek comment on whether to require manufacturers to disclose to consumers in the registry whether the
data collected by the product is stored in or transits a country or countries that are known to pose a
national security risk to the United States. Does the manufacturer have sufficient knowledge of the data
collected by the device to know where the servers hosting the collected data are located or where the
servers remotely controlling the device will be located? Is it possible for the location of stored data to be
changed without the manufacturer’s knowledge? Are there other factors that would impact the
manufacturer’s ability to make these declarations. Specifically, we seek comment on requiring the
applicant seeking to use the FCC IoT Label to make one of the following declarations under penalty of
perjury to accompany its application to use the label:
a. No customer data collected by this product will be sent to servers located on the Department
of Commerce’s list of high-risk countries, defined at 15 CFR § 7.4 or any successor
regulation. No servers that remotely control the device will be located in such a country; or
b. Customer data collected by this product will be sent to servers located in a high-risk country
or countries. We inform purchasers and users that the Secretary of Commerce has designated
high-risk country or countries as jurisdictions whose conduct is significantly adverse to the
national security of the United States or security and safety of United States persons.
164. If a manufacturer must disclose one of these exposures or potential exposures to a high-
risk country, should it have to disclose additional information as well? Should it have to disclose the
identity of the high-risk country or countries? Should it have to disclose the specific hardware or
software components or server activities that did, will, or could originate from or take place in those
countries? How could such disclosures help purchasers make informed decisions about product
acquisitions? And what burdens would such additional disclosures place on manufacturers? Should we
require manufacturers to include this information in the registry to inform consumers of these issues?
165. Alternatively, should the fact that software or firmware originates from such countries,
that data will be stored in such countries, or that products can be remotely controlled by servers within
such countries, make products ineligible for the label altogether? Are there certain product components,
such as cellular interface modules, that pose elevated risks for which such a prohibition might specifically
be warranted?
166. With respect to these declarations proposed to require the manufacturer to inform the
Commission, would such information provide meaning to consumers? Should we require manufacturers
to include this information in the registry to inform consumers of these issues? How would
manufacturers inform users who are not purchasers? In addition, we seek comment on the possible costs
and benefits of requiring any additional language in the relevant product’s registry page. Should they
encompass some or all of the same representations made in an application for authorization to use the
FCC label, or should they be different or additional? Can such representations be made not just for the
benefit of the purchaser or user, but also extend to any third parties who may be impacted by a security
vulnerability in a labeled product attributable to a failure of the manufacturer, and what would the
practical or legal implications of that be? How might this influence manufacturer participation in the
program? Could the federal Magnuson-Moss Act be an additional legal overlay here, as well?
543
How
should those state and federal laws inform whether and how the Commission requires manufacturer or
seller representations in the product’s registry page?
VI. PROCEDURAL MATTERS
167. Paperwork Reduction Act. This document contains new and modified information
543
15 U.S.C. §§ 2301-2312.
Federal Communications Commission FCC 24-26
83
collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104-13. It
will be submitted to the Office of Management and Budget (OMB) for review under Section 3507(d) of
the PRA. OMB, the general public, and other Federal agencies will be invited to comment on the new or
modified information collection requirements contained in this proceeding. In addition, we note that
pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107-198, see 44 U.S.C.
3506(c)(4), we previously sought specific comment on how the Commission might further reduce the
information collection burden for small business concerns with fewer than 25 employees.
168. The Further Notice may contain new or modified information collection(s) subject to the
Paperwork Reduction Act of 1995.
544
All such new or modified information collection requirements will
be submitted to OMB for review under section 3507(d) of the PRA. OMB, the general public, and other
federal agencies are invited to comment on any new or modified information collection requirements
contained in this proceeding. In addition, pursuant to the Small Business Paperwork Relief Act of
2002,
545
we seek specific comment on how we might “further reduce the information collection burden for
small business concerns with fewer than 25 employees.”
546
169. In this present document, we have assessed the effects of the operational framework for a
voluntary IoT cybersecurity labeling program. Since the IoT Labeling Program is voluntary, small
entities who do not participate in the IoT Labeling Program will not be subject to any new or modified
reporting, recordkeeping, or other compliance obligations. Small entities that choose to participate in the
IoT Labeling Program by seeking authority to affix the Cyber Trust Mark on their products will incur
recordkeeping and reporting as well as other obligations that are necessary to test their IoT products to
demonstrate compliance with the requirements we adopt today. We find that, for the Cyber Trust Mark to
have meaning for consumers, the requirements for an IoT product to receive the Cyber Trust Mark must
be uniform for both small businesses and other entities. Thus, the Commission continues to maintain the
view we expressed in the IoT Labeling NPRM, that the significance of mark integrity, and building
confidence among consumers that devices and products containing the Cyber Trust Mark label can be
trusted to be cyber secure, necessitates adherence by all entities participating in the IoT Labeling Program
to the same rules regardless of size.
170. Regulatory Flexibility Act. The Regulatory Flexibility Act of 1980, as amended
(RFA),
547
requires that an agency prepare a regulatory flexibility analysis for notice and comment
rulemakings, unless the agency certifies that “the rule will not, if promulgated, have a significant
economic impact on a substantial number of small entities.”
548
Accordingly, we have prepared a Final
Regulatory Flexibility Analysis (FRFA) concerning the possible impact of the rule changes contained in
this Report and Order on small entities. The FRFA is set forth in Appendix B.
171. We have also prepared an Initial Regulatory Flexibility Analysis (IRFA) concerning the
potential impact of rule and policy change proposals on small entities in the Further Notice. The IRFA is
set forth in Appendix C. The Commission invites the general public, in particular small businesses, to
comment on the IRFA. Comments must be filed by the deadlines for comments on the Further Notice
indicated on the first page of this document and must have a separate and distinct heading designating
them as responses to the IRFA.
172. Congressional Review Act. The Commission has determined, and the Administrator of
the Office of Information and Regulatory Affairs, Office of Management and Budget, concurs, that this
rule is “non-major” under the Congressional Review Act, 5 U.S.C. § 804(2). The Commission will send
544
Pub. L. No. 104-13.
545
Pub. L. No. 107-198.
546
44 U.S.C. § 3506(c)(4).
547
5 U.S.C. § 603.
548
5 U.S.C. § 605(b).
Federal Communications Commission FCC 24-26
84
a copy of this Report & Order to Congress and the Government Accountability Office pursuant to 5
U.S.C. § 801(a)(1)(A).
173. OPEN Government Data Act. The OPEN Government Data Act requires agencies to
make “public data assets” available under an open license and as “open Government data assets,” i.e., in
machine-readable, open format, unencumbered by use restrictions other than intellectual property rights,
and based on an open standard that is maintained by a standards organization.
549
This requirement is to be
implemented “in accordance with guidance by the Director” of the OMB.
550
The term “public data asset”
means “a data asset, or part thereof, maintained by the Federal Government that has been, or may be,
released to the public, including any data asset, or part thereof, subject to disclosure under the Freedom of
Information Act (FOIA).”
551
A “data asset” is “a collection of data elements or data sets that may be
grouped together,”
552
and “data” is “recorded information, regardless of form or the media on which the
data is recorded.”
553
We delegate authority, including the authority to adopt rules, to the Bureau, in
consultation with the agency’s Chief Data Officer and after seeking public comment to the extent it deems
appropriate, to determine whether to make publicly available any data assets maintained or created by the
Commission within the meaning of the OPEN Government Act pursuant to the rules adopted herein, and
if so, to determine when and to what extent such information should be made publicly available. Such
data assets may include assets maintained by a CLA or other third-party, to the extent the Commission’s
control or direction over those assets may bring them within the scope of the OPEN Government Act, as
interpreted in the light of guidance to be issued by OMB.
554
In doing so, the Bureau shall take into
account the extent to which such data assets are subject to disclosure under the FOIA.
555
174. Ex Parte Presentations—Permit-But-Disclose. The proceeding this Further Notice of
Proposed Rulemaking initiates shall be treated as a “permit-but-disclose” proceeding in accordance with
the Commission’s ex parte rules.
556
Persons making ex parte presentations must file a copy of any
written presentation or a memorandum summarizing any oral presentation within two business days after
the presentation (unless a different deadline applicable to the Sunshine period applies). Persons making
oral ex parte presentations are reminded that memoranda summarizing the presentation must (1) list all
persons attending or otherwise participating in the meeting at which the ex parte presentation was made,
and (2) summarize all data presented and arguments made during the presentation. If the presentation
consisted in whole or in part of the presentation of data or arguments already reflected in the presenter’s
written comments, memoranda or other filings in the proceeding, the presenter may provide citations to
such data or arguments in his or her prior comments, memoranda, or other filings (specifying the relevant
page and/or paragraph numbers where such data or arguments can be found) in lieu of summarizing them
in the memorandum. Documents shown or given to Commission staff during ex parte meetings are
deemed to be written ex parte presentations and must be filed consistent with section 1.1206(b) of the
Commission’s rules. In proceedings governed by section 1.49(f) of the Commission’s rules or for which
the Commission has made available a method of electronic filing, written ex parte presentations and
memoranda summarizing oral ex parte presentations, and all attachments thereto, must be filed through
549
Congress enacted the OPEN Government Data Act as Title II of the Foundations for Evidence-Based
Policymaking Act of 2018, Pub. L. No. 115-435 (2019), §§ 201-202. 44 U.S.C. § 3502(20), (22) (defining “open
Government data asset” and “public data asset”); id. § 3506(b)(6)(B) (addressing public availability).
550
44 U.S.C. § 3506(b)(6)(B).
551
44 U.S.C. § 3502(22).
552
Id. § 3502(17).
553
Id. § 3502(16).
554
OMB has not yet issued final guidance.
555
See, e.g., 5 U.S.C. § 552(b)(4), (6)-(7) (containing exemptions concerning confidential commercial information,
personal privacy, and information compiled for law enforcement purposes, respectively).
556
47 CFR §§ 1.1200 et seq.
Federal Communications Commission FCC 24-26
85
the electronic comment filing system available for that proceeding, and must be filed in their native
format (e.g., .doc, .xml, .ppt, searchable .pdf). Participants in this proceeding should familiarize
themselves with the Commission’s ex parte rules.
557
175. Comment Filing Procedures. Pursuant to sections 1.415 and 1.419 of the Commission’s
rules, 47 CFR §§ 1.415, 1.419, interested parties may file comments and reply comments on or before the
dates indicated on the first page of this document. Comments may be filed using the Commission’s
Electronic Comment Filing System (ECFS). See Electronic Filing of Documents in Rulemaking
Proceedings, 63 FR 24121 (1998).
Electronic Filers: Comments may be filed electronically using the Internet by
accessing ECFS: https://www.fcc.gov/ecfs.
Paper Filers: Parties who choose to file by paper must file an original and one
copy of each filing. Filings can be sent by commercial overnight courier, or by
first-class or overnight U.S. Postal Service mail. All filings must be addressed to
the Commission’s Secretary, Office of the Secretary, Federal Communications
Commission.
Commercial overnight mail (other than U.S. Postal Service Express Mail and
Priority Mail) must be sent to 9050 Junction Drive, Annapolis Junction, MD
20701.
U.S. Postal Service first-class, Express, and Priority mail must be addressed to 45
L Street NE, Washington, DC 20554.
Effective March 19, 2020, and until further notice, the Commission no longer
accepts any hand or messenger delivered filings.
176. Providing Accountability Through Transparency Act. Consistent with the Providing
Accountability Through Transparency Act, Public Law 118-9,
558
a summary of this document will be
available on https://www.fcc.gov/proposed-rulemakings.
177. People with Disabilities. To request materials in accessible formats for people with
disabilities (braille, large print, electronic files, audio format), send an e-mail to [email protected] or call
the Consumer & Governmental Affairs Bureau at 202-418-0530 (voice).
178. Additional Information. For further information regarding the Report and Order, please
contact Drew Morin, Acting Chief, Cybersecurity and Communications Reliability Division, Public
Safety and Homeland Security Bureau by email to [email protected]; or James Zigouris, Attorney-
Advisor, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security
Bureau, (202) 418-0697, or by email to [email protected].
VII. ORDERING CLAUSES
179. Accordingly, IT IS ORDERED that pursuant to the authority contained in sections 1, 2,
4(i), 4(n), 302, 303(r), 312, 333, and 503, of the Communications Act of 1934, as amended, 47 U.S.C. §§
151, 152, 154(i), 154(n), 302a, 303(r), 312, 333, 503; the IoT Cybersecurity Improvement Act of 2020, 15
U.S.C. § 278g-3a to § 278g-3e; this Report and Order IS hereby ADOPTED.
180. IT IS FURTHER ORDERED that the amendments of the Commission’s Rules as set
forth in Appendix A are ADOPTED, effective 30 days after publication in the Federal Register, except for
the amendments to 47 CFR §§ 8.208, 8.209, 8.212, 8.214, 8.215, 8.217, 8.218, 8.219, 8.220, 8.221, 8.222.
The amendments to 47 CFR §§ 8.208, 8.209, 8.212, 8.214, 8.215, 8.217, 8.218, 8.219, 8.220, 8.221,
557
Id. § 1.49(f).
558
5 U.S.C. § 553(b)(4). The Providing Accountability Through Transparency Act, Pub. L. No. 118-9 (2023),
amended section 553(b) of the Administrative Procedure Act.
Federal Communications Commission FCC 24-26
86
8.222, which may contain new or modified information collection requirements, will not become effective
until OMB completes any review that the Public Safety and Homeland Security Bureau determines is
required under the Paperwork Reduction Act. The Commission directs the Public Safety and Homeland
Security Bureau to announce effective dates for these sections by publication in the Federal Register and
by subsequent Public Notice.
181. IT IS FURTHER ORDERED that the Commission’s Office of the Secretary, SHALL
SEND a copy of this Report and Order and Further Notice of Proposed Rulemaking, including the Final
and Initial Regulatory Flexibility Analyses, to the Chief Counsel for Advocacy of the Small Business
Administration.
182. IT IS FURTHER ORDERED that the Office of the Managing Director, Performance
Program Management, SHALL SEND a copy of this Report and Order in a report to be sent to Congress
and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. §
801(a)(1)(A).
FEDERAL COMMUNICATIONS COMMISSION
Marlene H. Dortch
Secretary
Federal Communications Commission FCC 24-26
87
APPENDIX A
Final Rules
The Federal Communications Commission amends subchapter A of Title 47 of the Code of Federal
Regulations as follows:
1. Under the authority of 47 U.S.C §§ 151, 152, 153, 154(i)-(j), 160, 163, 201, 202, 206, 207,
208, 209, 214, 215, 216, 217, 218, 219, 220, 230, 251, 254, 256, 257, 301, 303, 304, 307,
309, 310, 312, 316, 332, 403, 501, 503, 522, 1302, revise the heading for subchapter A to
read as follows:
Subchapter A – General
PART 8 – SAFEGUARDING AND SECURING THE INTERNET
2. The authority citation for part 8 continues to read as follows:
AUTHORITY: 47 U.S.C. 151, 152, 153, 154, 163, 201, 202, 206, 207, 208, 209, 216, 217, 257, 301,
302a, 303, 304, 307, 309, 312, 316, 332, 403, 501, 503, 522, 1302, 1753.
3. Revise the heading for part 8 to read as set forth above.
§§ 8.1, 8.2, 8.3, and 8.6 [Designated as Subpart A]
4. Designate §§ 8.1, 8.2, 8.3, and 8.6 as subpart A.
5. Add a heading for newly designated subpart A to read as follows:
Subpart A—PROTECTIONS FOR INTERNET OPENNESS
6. Add subpart B, consisting of §§ 8.201 – 8.222 to read as follows:
Subpart B—Cybersecurity Labeling Program for IoT Products
§ 8.201 Incorporation by reference.
Certain material is incorporated by reference into this subpart with the approval of the Director of the
Federal Register in accordance with 5 U.S.C. 552(a) and 1 CFR part 51. All approved incorporation
by reference (IBR) material is available for inspection at the FCC and at the National Archives and
Records Administration (NARA). Contact the Federal Communications Commission (FCC or
Commission) at the address indicated in 47 CFR 0.401(a), phone: (202) 418-0270. For information
on the availability of this material at NARA, visit www.archives.gov/federal-register/cfr/ibr-locations
or email [email protected]. The material may be obtained from the International Organization
for Standardization (ISO), 1, ch. De la Voie Creuse, CP 56, CH 1211, Geneva 20, Switzerland;
www.iso.org; Tel.: +41 22 749 01 11; Fax: +41 22 733 34 30; email: [email protected].
(a) ISO/IEC 17011:2017(E), Conformity assessment—Requirements for accreditation bodies
accrediting conformity assessment bodies, Second Edition, November 2017; IBR approved for §
8.217.
(b) ISO/IEC 17025:2017(E), General requirements for the competence of testing and calibration
laboratories, Third Edition, November 2017; IBR approved for §§ 8.217; 8.220.
(c) ISO/IEC 17065:2012(E), Conformity assessment—Requirements for bodies certifying products,
processes and services, First Edition, 2012-09-15; IBR approved for § 8.220.
Federal Communications Commission FCC 24-26
88
Note 1 to § 8.201: The standards listed in this section are co-published with the International
Organization for Standardization (ISO), 1, ch. De la Voie-Creuse, CP 56, CH–1211, Geneva 20,
Switzerland; www.iso.org; Tel.: + 41 22 749 01 11; Fax: + 41 22 733 34 30; email: [email protected].
Note 2 to § 8.201: ISO publications can also be purchased from the American National Standards
Institute (ANSI) through its NSSN operation (www.nssn.org), at Customer Service, American
National Standards Institute, 25 West 43rd Street, New York, NY 10036, telephone (212) 642–4900.
§ 8.202 Basis and purpose.
In order to elevate the nation’s cybersecurity posture and provide consumers with assurances
regarding their baseline cybersecurity, thereby addressing risks of harmful radiofrequency
interference to and from consumer Internet-connected (Internet of Things or IoT) products the Federal
Communications Commission establishes a labeling program for consumer IoT products.
§ 8.203 Definitions.
(a) Affiliate. For purposes of this subpart and the IoT labeling program, an affiliate is defined as a
person that (directly or indirectly) owns or controls, is owned or controlled by, or is under common
ownership or control with, another person. For purposes of this subpart, the term own means to own
an equity interest (or the equivalent thereof) of more than 10 percent.
(b) Consumer IoT Products. IoT products intended primarily for consumer use, rather than enterprise
or industrial use. Consumer IoT Products exclude medical devices regulated by the U.S. Food and
Drug Administration (FDA) and excludes motor vehicles and motor vehicle equipment regulated by
the National Highway Traffic Safety Administration (NHTSA).
(c) Cybersecurity Label Administrator (CLA). An accredited third-party entity that is recognized an
authorized by the Commission to manage and administer the labeling program in accordance with the
Commission’s rules in this subpart.
(d) Cybersecurity Testing Laboratory (CyberLAB). Accredited third-party entities recognized and
authorized by a CLA to assess consumer IoT products for compliance with requirements of the
labeling program.
(e) Cyber Trust Mark. A visual indicator indicating a consumer IoT product complies with program
requirements of the labeling program and the Commission’s minimum cybersecurity requirements in
this subpart.
(f) FCC IoT Label. A binary label displayable with a consumer IoT product complying with program
requirements of the Labeling Program, the binary label bearing the Cyber Trust Mark, and a
scannable QR code that directs consumers to a registry containing further information on the
complying consumer IoT product.
(g) Intentional Radiator. A device that intentionally generates and emits radiofrequency energy by
radiation or induction.
(h) Internet-Connected Device. A device capable of connecting to the internet and exchanging data
with other devices or centralized systems over the internet.
(i) IoT Device.
Federal Communications Commission FCC 24-26
89
(1) An Internet-connected device capable of intentionally emitting radiofrequency energy that has
at least one transducer (sensor or actuator) for interacting directly with the physical world,
coupled with
(2) At least one network interface (e.g., Wi-Fi, Bluetooth) for interfacing with the digital world.
(j) IoT Product. An IoT device and any additional product components (e.g., backend, gateway,
mobile app) that are necessary to use the IoT device beyond basic operational features, including data
Federal Communications Commission FCC 24-26 communications links to components outside this
scope but excluding those external components and any external third-party components that are
outside the manufacturer’s control.
(k) Labeling Program. A voluntary program for consumer IoT products that allows a complying
consumer IoT product to display an FCC IoT Label.
(l) Lead Administrator. A CLA selected from among Cybersecurity Label Administrators (CLAs) to
be responsible for carrying out additional administrative responsibilities of the labeling program.
(m) Product Components. Hardware devices, plus supporting components that generally fall into
three main types per NISTIR 8425: specialty networking/gateway hardware (e.g., a hub within the
system where the IoT device is used); companion application software (e.g., a mobile app for
communicating with the IoT device); and backends (e.g., a cloud service, or multiple services, that
may store and/or process data from the IoT device). Should a Product Component also support other
IoT Products through alternative features and interfaces, these alternative features and interfaces may,
through risk-assessment, be considered as separate from and not part of the IoT Product for purposes
of authorization.
(n) Registry. Information presented to consumers about consumer IoT products that comply with the
program requirements of the Labeling Program, the registry is publicly accessible through a link from
the QR Code of the FCC IoT Label displayed with the complying Consumer IoT Product, and
containing information about the complying consumer IoT product, manufacturer of the complying
Consumer IoT Product, and other information as required by the Labeling Program.
§ 8.204 Prohibition on use of the FCC IoT Label on products produced by listed sources.
All Consumer IoT Products produced by sources listed in this subpart, are prohibited from obtaining
use of the FCC IoT Label under this subpart. This includes:
(a) All communications equipment on the Covered List, as established pursuant to 47 CFR 1.50002;
(b) All IoT Products containing IoT Devices or Product Components produced by entities listed in
paragraph (c) or (d) of this section;
(c) IoT Devices or IoT Products produced by any entity, its affiliates, or subsidiaries identified on the
Covered List as producing covered equipment, as established pursuant to 47 CFR 1.50002;
(d) IoT Devices or IoT Products produced by any entity, its affiliates, or subsidiaries identified on the
Department of Commerce’s Entity List, 15 CFR part 744, supplement no. 4, and/or the Department of
Defense’s List of Chinese Military Companies, http://media.defense..gov/202/Oct/05/2003091660/-
1/-1/0/1260H%20COMPANIES.PDF; and
(e) Products produced by any entity owned or controlled by or affiliated with any person or entity that
has been suspended or debarred from receiving federal procurements or financial awards, to include
Federal Communications Commission FCC 24-26
90
all entities and individuals published as ineligible for award on the General Service Administration’s
System for Award Management.
§ 8.205 Cybersecurity labeling authorization.
(a) Cybersecurity labeling authorization is an authorization issued by a Cybersecurity Label
Administrator (CLA) and authorized under the authority of the Commission, which grants an
applicant of a complying Consumer IoT Product to display the FCC IoT Label on the relevant
packaging for the complying consumer product, based on compliance with the program requirements
as determined by the CLA.
(b) Cybersecurity labeling authorization attaches to all units of the complying Consumer IoT Product
subsequently marketed by the grantee that are identical (see § 8.206) to the sample determined to
comply with the program requirements except for permissive changes or other variations authorized
by the Commission.
§ 8.206 Identical defined.
As used in this subpart, the term identical means identical within the variation that can be expected to
arise as a result of quantity production techniques.
§ 8.207 Responsible party.
In the case of a complying Consumer IoT Product that has been granted authorization to use the FCC
IoT Label, the applicant to whom that grant of cybersecurity labeling authorization is issued is
responsible for continued compliance with the program requirements for continued use of the FCC
IoT Label.
§ 8.208 Application requirements.
(a) An application to certify the Consumer IoT Product as being compliant with the Labeling Program
shall be submitted in writing to a Cybersecurity Labeling Administrator (CLA) in the form and format
prescribed by the Commission. Each application shall be accompanied by all information required by
this subpart.
(b) The applicant shall provide to the CLA in the application all information that the CLA requires to
determine compliance with the program requirements of the Labeling Program.
(c) The applicant will provide a declaration under penalty of perjury that all of the following are true
and correct:
(1) The product for which the applicant seeks to use the FCC IoT Label through cybersecurity
certification meets all the requirements of the IoT Labeling Program.
(2) The applicant is not identified as an entity producing covered communications equipment on
the Covered List, established pursuant to 47 CFR 1.50002.
(3) The product is not comprised of “covered” equipment on the Covered List.
(4) The product is not produced by any entity, its affiliates, or subsidiaries identified on the
Department of Commerce’s Entity List, 15 CFR part 744, supplement no. 4, and/or the
Federal Communications Commission FCC 24-26
91
Department of Defense’s List of Chinese Military Companies,
http://media.defense..gov/202/Oct/05/2003091660/-1/-1/0/1260H%20COMPANIES.PDF; and
(5) The product is not owned or controlled by or affiliated with any person or entity that has been
suspended or debarred from receiving federal procurements or financial awards, to include all
entities and individuals published as ineligible for award on the General Service Administration’s
System for Award Management as described in § 8.204.
(6) The applicant has taken every reasonable measure to create a securable product.
(7) The applicant will, until the support period end date disclosed in the registry, diligently
identify critical vulnerabilities in our products and promptly issue software updates correcting
them, unless such updates are not reasonably needed to protect against security failures.
(8) The applicant will not elsewhere disclaim or otherwise attempt to limit the substantive or
procedural enforceability of this declaration or of any other representations and commitments
made on the FCC IoT Label or made for purposes of acquiring or maintaining authorization to
use it.
(d) The applicant shall provide a written and signed declaration to the CLA that all statements it
makes in the application are true and correct to the best of its knowledge and belief.
(e) Each application, including amendments thereto, and related statements of fact and authorizations
required by the Commission, shall be signed by the applicant or their authorized agent.
(f) The applicant declares the product is reasonably secure and will be updated through the minimum
support period for the product and the end date of the support period must be disclosed.
(g) The applicant shall declare under penalty of perjury that the consumer IoT product for which the
applicant is applying for participation in the Labeling Program is not prohibited pursuant to § 8.204.
(h) If the identified listed sources under § 8.204 are modified after the date of the declaration required
by paragraph (c) of this section but prior to grant of authorization to use the FCC IoT Label, then the
applicant shall provide a new declaration as required by paragraph (c).
(i) The applicant shall designate an agent located in the United States for the purpose of accepting
service of process on behalf of the applicant.
(1) The applicant shall provide a written attestation:
(i) Signed by both the applicant and its designated agent for service of process, if different
from the applicant;
(ii) Acknowledging the applicant’s consent and the designated agent’s obligation to accept
service of process in the United States for matters related to the applicable product, and at the
physical U.S. address and email address of its designated agent; and
(iii) Acknowledging the applicant’s acceptance of its obligation to maintain an agent for
service of process in the United States for no less than one year after either the grantee has
permanently terminated all marketing and importation of the applicable equipment within the
U.S., or the conclusion of any Commission-related administrative or judicial proceeding
Federal Communications Commission FCC 24-26
92
involving the product, whichever is later.
(2) An applicant located in the United States may designate itself as the agent for service of
process.
(j) Technical test data submitted to the CLA shall be signed by the person who performed or
supervised the tests. The person signing the test data shall attest to the accuracy of such data. The
CLA may require the person signing the test data to submit a statement showing that they are
qualified to make or supervise the required measurements.
(k) Signed, as used in this section, means an original handwritten signature or any symbol executed or
adopted by the applicant or CLA with the intent that such symbol be a signature, including symbols
formed by computer-generated electronic impulses.
§ 8.209 Grant of authorization to use FCC IoT Label.
(a) A CLA will grant cybersecurity labeling authorization if it finds from an examination of the
application and supporting data, or other matter which it may officially notice, that the consumer IoT
product complies with the program requirements.
(b) Grants will be made in writing showing the effective date of the grant.
(c) Cybersecurity certification shall not attach to any product, nor shall any use of the Cyber Trust
Mark be deemed effective, until the application has been granted.
(d) Grants will be effective from the date of authorization.
(e) The grant shall identify the CLA granting the authorization and the Commission as the issuing
authority.
(f) In cases of a dispute, the Commission will be the final arbiter.
§ 8.210 Dismissal of application.
(a) An application that is not in accordance with the provisions of this subpart may be dismissed.
(b) Any application, upon written request signed by the applicant or their agent, may be dismissed
prior to a determination granting or denying the authorization requested.
(c) If an applicant is requested to submit additional documents or information and fails to submit the
requested material within the specified time period, the application may be dismissed.
§ 8.211 Denial of application.
If the CLA is unable to make the findings specified in § 8.209(a), it will deny the application.
Notification of the denial to the applicant will include a statement of the reasons for the denial.
§ 8.212 Review of CLA decisions.
(a) Seeking review from a CLA. Any party aggrieved by an action taken by a CLA must first seek
review from the CLA. The CLA should respond to appeals of their decisions in a timely manner and
Federal Communications Commission FCC 24-26
93
within 10 business days of receipt of a request for review.
(b) Seeking review from the Commission. A party aggrieved by an action taken by a CLA may, after
seeking review by the CLA, seek review from the Commission.
(c) Filing deadlines. (1) An aggrieved party seeking review of a CLA decision by the CLA shall
submit such a request within sixty (60) days from the date the CLA issues a decision. Such request
shall be deemed submitted when received by the CLA.
(2) An aggrieved party seeking review of a CLA decision by the Commission shall file such a
request within sixty (60) days from the date the CLA issues a decision on the party’s request for
review. Parties must adhere to the time periods for filing oppositions and replies set forth in 47
CFR 1.45.
(d) Review by the Public Safety and Homeland Security Bureau or the Commission. (1) Requests for
review of CLA decisions that are submitted to the Federal Communications Commission shall be
considered and acted upon by the Public Safety and Homeland Security Bureau; provided, however,
that requests for review that raise novel questions of fact, law or policy shall be considered by the full
Commission.
(2) An aggrieved party may seek review of a decision issued under delegated authority by the
Public Safety and Homeland Security Bureau pursuant to the rules set forth in 47 CFR part 1.
(e) Standard of review. (1) The Public Safety and Homeland Security Bureau shall conduct de novo
review of request for review of decisions issued by the CLA.
(2) The Federal Communications Commission shall conduct de novo review of requests for
review of decisions by the CLA that involve novel questions of fact, law, or policy; provided,
however, that the Commission shall not conduct de novo review of decisions issued by the Public
Safety and Homeland Security Bureau under delegated authority.
(f) Time periods for Commission review of CLA decisions. (1) The Public Safety and Homeland
Security Bureau shall, within forty-five (45) days, take action in response to a request for review of a
CLA decision that is properly before it. The Public Safety and Homeland Security Bureau may extend
the time period for taking action on a request for review of a CLA decision for a period of up to
ninety days. The Commission may also at any time, extend the time period for taking action of a
request for review of a CLA decision pending before the Public Safety and Homeland Security
Bureau.
(2) The Commission shall issue a written decision in response to a request for review of a CLA
decision that involves novel questions of fact, law, or policy within forty-five (45) days. The
Commission may extend the time period for taking action on the request for review of a CLA
decision. The Public Safety and Homeland Security Bureau also may extend action on a request
for review of a CLA decision for a period of up to ninety days.
(g) No Authorization Pending CLA Review. While a party seeks review of a CLA decision, they are
not authorized to use the FCC IoT Label until the Commission issues a final decision authorizing
their use of the FCC IoT Label.
§ 8.213 Limitations on grants to use the FCC IoT Label.
Federal Communications Commission FCC 24-26
94
(a) A grant of authorization to use the FCC IoT Label remains effective until set aside, revoked or
withdrawn, rescinded, surrendered, or a termination date is otherwise established by the Commission.
(b) No person shall, in any advertising matter, brochure, etc., use or make reference to the FCC IoT
Label or the Cyber Trust Mark in a deceptive or misleading manner.
§ 8.214 IoT product defect and/or design change.
When a complaint is filed directly with the Commission or submitted to the Commission by the Lead
Administrator or other party concerning a consumer IoT product being non-compliant with the
Labeling Program, and the Commission determines that the complaint is justified, the Commission
may require the grantee to investigate such complaint and report the results of such investigation to the
Commission within 20 days. The report shall also indicate what action if any has been taken or is
proposed to be taken by the grantee to correct the defect, both in terms of future production and with
reference to articles in the possession of users, sellers and distributors.
§ 8.215 Retention of records.
(a) For complying consumer IoT products granted authorization to use the FCC IoT Label, the
grantee shall maintain the records listed as follows:
(1) A record of the original design and specifications and all changes that have been made to the
complying consumer IoT product that may affect compliance with the standards and testing
procedures of this subpart.
(2) A record of the procedures used for production inspection and testing to ensure conformance
with the standards and testing procedures of this subpart.
(3) A record of the test results that demonstrate compliance with the appropriate regulations in
this chapter.
(b) Records shall be retained for a two-year period after the marketing of the associated product has
been permanently discontinued, or until the conclusion of an investigation or a proceeding if the
grantee is officially notified that an investigation or any other administrative proceeding involving its
product has been instituted.
§ 8.216 Termination of authorization to use the FCC IoT Label.
(a) Grant of authorization to use the FCC IoT Label is automatically terminated by notice of the
Bureau following submission of a report as specified in § 8.214 has not been adequately corrected:
(1) For false statements or representations made either in the application or in materials or
response submitted in connection therewith or in records required to be kept by § 8.215.
(2) If upon subsequent inspection or operation it is determined that the consumer IoT product
does not conform to the pertinent technical requirements in this subpart or to the representations
made in the original application.
(3) Because of conditions coming to the attention of the Commission which would warrant it in
refusing to grant authorization to use the FCC IoT Label.
(4) Because the grantee or affiliate has been listed as described in § 8.204.
Federal Communications Commission FCC 24-26
95
(b) [Reserved]
§ 8.217 CyberLABs.
(a) A CyberLAB providing testing of products seeking a grant of authorization to use the FCC IoT
Label shall be accredited by a recognized accreditation body, which must attest that the CyberLAB
has demonstrated:
(1) Technical expertise in cybersecurity testing and conformity assessment of IoT devices and
products.
(2) Compliance with accreditation requirements based on ISO/IEC 17025 (incorporated by
reference, see § 8.201).
(3) Knowledge of FCC rules and procedures associated with products compliance testing and
cybersecurity certification.
(4) Necessary equipment, facilities, and personnel to conduct cybersecurity testing and
conformity assessment of IoT devices and products.
(5) Documented procedures for conformity assessment.
(6) Implementation of controls to eliminate potential conflicts of interests, particularly with
regard to commercially sensitive information.
(7) That the CyberLAB is not an organization, its affiliates, or subsidiaries identified by the listed
sources of prohibition under § 8.204.
(8) That it has certified the truth and accuracy of all information it has submitted to support its
accreditation.
(b) Once accredited or recognized the CyberLAB will be periodically audited and reviewed to ensure
they continue to comply with the requirements of the ISO/IEC 17025 standard.
(c) The Lead Administrator will verify that the CyberLAB is not listed in any of the lists in § 8.204.
(d) The Lead Administrator will maintain a list of accredited CyberLABs that it has recognized, and
make publicly available the list of accredited CyberLAB. Inclusion of a CyberLAB on the accredited
list does not constitute Commission endorsement of that facility. Recognition afforded to a
CyberLAB under the Labeling Program will be automatically terminated for entities that are
subsequently placed on the Covered List, listed sources of prohibition under § 8.204, or of it, its
affiliate, or subsidiary is owned or controlled by a foreign adversary country defined by the
Department of Commerce in 15 CFR § 7.4.
(e) In order to be recognized and included on the list in paragraph (d) of this section, the accrediting
organization must submit the information in paragraphs (e)(1) through (9) of this section to the Lead
Administrator:
(1) Laboratory name, location of test site(s), mailing address and contact information;
(2) Name of accrediting organization;
Federal Communications Commission FCC 24-26
96
(3) Scope of laboratory accreditation;
(4) Date of expiration of accreditation;
(5) Designation number;
(6) FCC Registration Number (FRN);
(7) A statement as to whether or not the laboratory performs testing on a contract basis;
(8) For laboratories outside the United States, details of the arrangement under which the
accreditation of the laboratory is recognized; and
(9) Other information as requested by the Commission.
(f) A laboratory that has been accredited with a scope covering the measurements required for the
types of IoT products that it will test shall be deemed competent to test and submit test data for IoT
products subject to cybersecurity certification. Such a laboratory shall be accredited by a Public
Safety and Homeland Security Bureau-recognized accreditation organization based on ISO/IEC
17025. The organization accrediting the laboratory must be recognized by the Public Safety and
Homeland Security Bureau to perform such accreditation based on ISO/IEC 17011 (incorporated by
reference, see § 8.201). The frequency for reassessment of the test facility and the information that is
required to be filed or retained by the testing party shall comply with the requirements established by
the accrediting organization, but shall occur on an interval not to exceed two years.
§ 8.218 Recognition of CyberLAB accreditation bodies.
(a) A party wishing to become a laboratory accreditation body recognized by the Public Safety and
Homeland Security Bureau (PSHSB) must submit a written request to the Chief of PSHSB requesting
such recognition. PSHSB will make a determination based on the information provided in support of
the request for recognition.
(b) Applicants shall provide the information in paragraphs (b)(1) through (4) of this section as
evidence of their credentials and qualifications to perform accreditation of laboratories that test
equipment to Commission requirements, consistent with the requirements of § 8.217(e). PSHSB may
request additional information, or showings, as needed, to determine the applicant's credentials and
qualifications.
(1) Successful completion of an ISO/IEC 17011 peer review, such as being a signatory to an
accreditation agreement that is acceptable to the Commission.
(2) Experience with the accreditation of conformity assessment testing laboratories to ISO/IEC
17025.
(3) Accreditation personnel/assessors with specific technical experience on the Commission
cybersecurity certification rules and requirements.
(4) Procedures and policies developed for the accreditation of testing laboratories for FCC
cybersecurity certification programs.
§ 8.219 Approval/recognition of Cybersecurity Label Administrators.
Federal Communications Commission FCC 24-26
97
(a) An accredited third-party entity wishing to become a Cybersecurity Label Administrator (CLA)
must file a written application with the Commission. The Commission may approve the written
application for the accredited third-party entity to be recognized and authorized by the Commission as
a CLA to manage and administer the labeling program by meeting the requirements of paragraph (b)
of this section. An accredited third-party entity is recognized and authorized by the Commission to
manage and administer the labeling program in accordance with the Commission’s rules in this
subpart.
(b) In the United States, the Commission, in accordance with its procedures, allows qualified
accrediting bodies to accredit CLAs based on ISO/IEC 17065 and other qualification criteria. CLAs
shall comply with the requirements in § 8.220.
§ 8.220 Requirements for CLAs.
(a) In general. CLAs designated by the Commission, or designated by another authority recognized
by the Commission, shall comply with the requirements of this section. Each entity seeking authority
to act as a CLA must file an application with the Commission for consideration by PSHSB, which
includes a description of its organization structure, an explanation of how it will avoid personal and
organizational conflict when processing applications, a description of its processes for evaluating
applications seeking authority to use the FCC IoT Label, and a demonstration of expertise that will be
necessary to effectively serve as a CLA including, but not limited to, the criteria in paragraph (c) of
this section.
(b) Methodology for reviewing applications. (1) A CLA’s methodology for reviewing applications
shall be based on type testing as identified in ISO/IEC 17065 (incorporated by reference, see § 8.201).
(2) A CLA’s grant of authorization to use the FCC IoT Label shall be based on the application
with all the information specified in this part. The CLA shall review the application to determine
compliance with the Commission’s requirements in this subpart and shall issue a grant of product
cybersecurity certification in accordance with § 8.208.
(c) Criteria for designation. (1) To be designated as a CLA under this section, an entity shall
demonstrate cybersecurity expertise and capabilities in addition to industry knowledge of IoT and IoT
labeling requirements.
(2) The entity shall demonstrate expert knowledge of National Institute of Standards and
Technology’s (NIST) cybersecurity guidance, including but not limited to NIST’s recommended
criteria and labeling program approaches for cybersecurity labeling of consumer IoT products.
(3) The entity shall demonstrate expert knowledge of FCC rules and procedures associated with
product compliance testing and certification.
(4) The entity shall demonstrate knowledge of Federal law and guidance governing the security
and privacy of agency information systems.
(5) The entity shall demonstrate an ability to securely handle large volumes of information and
demonstrate internal security practices.
(6) To expedite initial deployment of the FCC labeling program, the Commission will accept and
conditionally approve applications from entities seeking to be designated as a CLA provided they
commit to obtain accreditation pursuant to all the requirements associated with ISO/IEC 17065
Federal Communications Commission FCC 24-26
98
with the appropriate scope within six (6) months of the effective date by the adopted standards
and testing procedures and otherwise meet the FCC’s IoT Labeling Program requirements. The
entity must also demonstrate implementation of controls to eliminate actual or potential conflicts
of interests (including both personal and organizational), particularly with regard to commercially
sensitive information. The Bureau will finalize the entity’s application upon receipt and
demonstration of ISO/IEC 17065 accreditation with the appropriate scope.
(7) The entity, or any of its affiliates or subsidiaries, is not owned or controlled by, or affiliated
with, any entity identified on the Commission’s Covered List, listed sources of prohibition under
§ 8.204, or a foreign adversary country defined by the Department of Commerce in 15 CFR § 7.4.
(8) The entity must demonstrate it has implemented controls to eliminate actual or potential
conflicts of interests (including both personal and organizational), particularly with regard to
commercially sensitive information, to include but not limited to, remaining impartial and
unbiased and prevent them from giving preferential treatment to certain applications (e.g.,
application line jumping) and from implementing heightened scrutiny of applications from
entities not members or otherwise aligned with the CLA.
(d) External resources. (1) In accordance with the provisions of ISO/IEC 17065, the evaluation of a
product, or a portion thereof, may be performed by bodies that meet the applicable requirements of
ISO/IEC 17025, in accordance with the applicable provisions of ISO/IEC 17065 for external
resources (outsourcing). Evaluation is the selection of applicable requirements and the determination
that those requirements are met. Evaluation may be performed using internal CLA resources or
external (outsourced) resources.
(2) A CLA shall not outsource review or decision activities.
(3) When external resources are used to provide the evaluation function, including the testing of
products subject to labeling, the CLA shall be responsible for the evaluation and shall maintain
appropriate oversight of the external resources used to ensure reliability of the evaluation. Such
oversight shall include periodic audits of products that have been tested and other activities as
required in ISO/IEC 17065 when a CLA uses external resources for evaluation.
(e) Commission approves a CLA. (1) The Commission will approve as a CLA:
(i) Any entity in the United States that meets the requirements of this section.
(ii) The Commission will not approve as a CLA any organization, its affiliates, or subsidiaries
listed in the listed sources of prohibition under § 8.204.
(2) The Commission will withdraw its approval of a CLA if the CLA's designation or
accreditation is withdrawn, if the Commission determines there is just cause for withdrawing the
approval, or upon request of the CLA. The Commission will limit the scope of products that can
be certified by a CLA if its accreditor limits the scope of its accreditation or if the Commission
determines there is good cause to do so. The Commission will notify a CLA in writing of its
intention to withdraw or limit the scope of the CLA's approval and provide at least 60 days for the
CLA to respond.
(3) The Commission will notify a CLA in writing when it has concerns or evidence that the CLA
is not carrying out its responsibilities under the Labeling Program in accordance with the
Federal Communications Commission FCC 24-26
99
Commission’s rules in this subpart and policies and request that it explain and correct any
apparent deficiencies.
(4) The Public Safety and Homeland Security Bureau shall provide notice to the CLA that the
Bureau proposes to terminate the CLA’s authority and provide the CLA a reasonable opportunity
to respond (not more than 20 days) before reaching a decision on possible termination.
(5) If the Commission withdraws its recognition of a CLA, all grants issued by that CLA will
remain valid unless specifically set aside or revoked by the Commission.
(6) A list of recognized CLAs will be published by the Commission.
(f) Scope of responsibility. (1) A CLA shall receive and evaluate applications and supporting data
requesting authority to use the FCC IoT Label on the product subject to the application.
(2) A CLA shall grant authorization to use the FCC IoT Label with a complying consumer IoT
product in accordance with the Commission's rules and policies.
(3) A CLA shall accept test data from any Lead Administrator-recognized accredited CyberLAB,
subject to the requirements in ISO/IEC 17065 and shall not unnecessarily repeat tests.
(4) A CLA may establish and assess fees for processing applications and other Commission-
required tasks.
(5) A CLA may only act on applications that it has received or which it has issued a certification
authorizing use of the FCC IoT Label.
(6) A CLA shall dismiss an application that is not in accordance with the provisions of this
subpart or when the applicant requests dismissal, and may dismiss an application if the applicant
does not submit additional information or test samples requested by the CLA.
(7) A CLA shall ensure that manufacturers make all required information accessible to the IoT
registry.
(8) A CLA shall participate in a consumer education campaign in coordination with the Lead
Administrator.
(9) A CLA shall receive complaints alleging a product bearing the FCC IoT Label does not
support the cybersecurity criteria conveyed by the Cyber Trust Mark and refer these complaints to
the Lead Administrator which will notify the Public Safety and Homeland Security Bureau.
(10) A CLA may not:
(i) Make policy, interpret unclear provisions of the statute or rules, or interpret the intent of
Congress;
(ii) Grant a waiver of the rules in this subpart; or
(iii) Take enforcement actions.
(11) All CLA actions are subject to Commission review.
Federal Communications Commission FCC 24-26
100
(g) Post-market surveillance requirements. (1) In accordance with ISO/IEC 17065, a CLA shall
perform appropriate post-market surveillance activities. These activities shall be based on type
testing a certain number of samples of the total number of product types for which the CLA has
certified use of the Label.
(2) PSHSB may request that a grantee of authority to use the FCC IoT Label submit a product
sample directly to the CLA that evaluated the grantee’s application as part of the post market
surveillance. Any product samples requested by the Commission and tested by the CLA will be
counted toward a minimum number of samples that the CLA must test to meet its post market
surveillance requirements.
(3) A CLA may also request a grantee submit samples of products that the CLA has certified to
use the FCC IoT Label directly to the CLA.
(4) If during post market surveillance of a complying consumer IoT product, a CLA determines
that the product fails to comply with the technical regulations (or other FCC requirements) for
that product, the CLA shall immediately notify the grantee and the Commission in writing of its
findings. The grantee shall provide a report to the CLA describing the actions taken to correct the
situation, as provided in § 8.216, and the CLA shall provide a report of these actions to the
Commission within 30 days.
(5) CLAs shall submit periodic reports to the Commission of their post-market surveillance
activities and findings in a format and by a date specified by the Commission.
§ 8.221 Requirements for the Lead Administrator.
(a) Establishing a Lead Administrator. If more than one qualified entity is selected by the
Commission to be a CLA, the Commission will select a Lead Administrator. The Lead Administrator
shall:
(1) Interface with the Commission on behalf of the CLAs, including but not limited to submitting
to the Bureau all complaints alleging a product bearing the FCC IoT Label does not meet the
requirements of the Commission’s labeling program;
(2) Coordinate with CLAs and moderate stakeholder meetings;
(3) Accept, review, and approve or deny applications from labs seeking recognition as a lab
authorized to perform the conformity testing necessary to support an application for authority to
affix the FCC IoT Label, and maintain a publicly available list of Lead Administrator-recognized
labs and a list of labs that have lost their recognition;
(4) Within 90 days of election as Lead Administrator, the Lead Administrator will, in
collaboration with the CLAs and stakeholders (e.g. cyber experts from industry, government, and
academia):
(i) Submit to the Bureau recommendations identifying and/or developing the technical
standards and testing procedures for the Commission to consider with regard to at least one
class of IoT products eligible for the IoT Labeling Program. The Bureau will evaluate the
recommendations, subject to any required public notice and comment, adopt them into the
Commission’s rules in this subpart;
Federal Communications Commission FCC 24-26
101
(ii) Submit to the Bureau a recommendation on how often a given class of IoT products must
renew their request for authority to bear the FCC IoT Label, which may be dependent on the
type of product, and that such a recommendation be submitted in connection with the relevant
standards recommendations for an IoT product or class of IoT products. The Bureau will
evaluate the recommendations, and if the Bureau approves of the recommendations, subject
to any required public notice and comment, adopt them into the Commission’s rules in this
subpart;
(iii) Submit to the Bureau a recommendation on procedures for post market surveillance by
the CLAs. The Bureau will evaluate the recommendations, and if the Bureau approves of the
recommendations, subject to any required public notice and comment, adopt them into the
Commission’s rules in this subpart;
(iv) Make recommendations to the Bureau with regard to updates to the registry including
whether the registry should be in additional languages and if so, to recommend specific
languages for inclusion; and
(v) Submit to the Bureau recommendations on the design of the FCC IoT Label, including but
not limited to labeling design and placement (e.g., size and white spaces, product packaging)
and whether to include the product support end date on labels for certain products or category
of products. The Bureau will evaluate the recommendations, and if the Bureau approves of
the recommendations, subject to any required public notice and comment, adopt them into the
Commission’s rules in this subpart;
(5) Within 45 days of publication of updates or changes to NIST guidelines, or adoption by NIST
of new guidelines, recommend in collaboration with CLAs and other stakeholders any
appropriate modifications to the Labeling Program standards and testing procedures to stay
aligned with the NIST guidelines;
(6) Submit to the Commission reports on CLAs’ post-market surveillance activities and findings
in the format and by the date specified by Public Safety and Homeland Security Bureau;
(7) Develop in collaboration with stakeholders a consumer education campaign, submit the plan
to the Public Safety and Homeland Security Bureau, and participate in consumer education;
(8) Receive complaints about the Labeling Program, including but not limited to consumer
complaints about the registry and coordinate with manufacturers to resolve any technical
problems associated with consumers accessing the information in the registry;
(9) Facilitate coordination between CLAs; and
(10) Submit to the Commission any other reports upon request of the Commission or as required
by Commission rules in this subpart.
(b) Criteria for designation. In addition to completing the CLA application information, entities seeking
to be the Lead Administrator will submit a description of how they will execute the duties of the Lead
Administrator, including:
(1) Their previous experience in IoT cybersecurity;
(2) What role, if any, they have played in IoT labeling;
Federal Communications Commission FCC 24-26
102
(3) Their capacity to execute the Lead Administrator duties;
(4) How they would engage and collaborate with stakeholders to identify or develop the Bureau
recommendations;
(5) A proposed consumer education campaign; and
(6) Additional information the applicant believes demonstrates why they should be the Lead
Administrator.
§ 8.222 Establishment of an IoT Registry.
(a) A grantee of authority to use the FCC IoT Label shall provide information about the complying
Consumer IoT Product to the public. Information supplied by grantees shall be made available in a
dynamic, decentralized, publicly accessible registry through a common Application Programming
Interface (API) that is secure by design.
(b) A grantee of authority to use the FCC IoT Label shall publish the following information through
the common API in the Registry:
(1) Product Name;
(2) Manufacturer name;
(3) Date the product received authorization (i.e., cybersecurity certification) to affix the label and
current status of the authorization (if applicable);
(4) Name and contact information of the CLA that authorized use of the FCC IoT Label;
(5) Name of the lab that conducted the conformity testing;
(6) Instructions on how to change the default password (specifically state if the default password
cannot be changed);
(7) Information (or link) for additional information on how to configure the device securely;
(8) Information as to whether software updates and patches are automatic and how to access
security updates/patches if they are not automatic;
(9) The date until which the entity promises to diligently identify critical vulnerabilities in the
product and promptly issue software updates correcting them, unless such an update is not
reasonably needed to protect against cybersecurity failures (i.e. the minimum support period);
alternatively, a statement that the device is unsupported and that the purchaser should not rely on
the manufacturer to release security updates;
(10) Disclosure of whether the manufacturer maintains a Hardware Bill of Materials (HBOM)
and/or a Software Bill of Materials (SBOM); and
(11) Additional data elements that the Bureau deems necessary.
Federal Communications Commission FCC 24-26
103
APPENDIX B
Final Regulatory Flexibility Analysis
1. As required by the Regulatory Flexibility Act of 1980, as amended (RFA),
1
an Initial
Regulatory Flexibility Analysis (IRFA) was incorporated in the Cybersecurity Labeling for Internet of
Things Notice of Proposed Rulemaking (IoT Labeling NPRM) released in August 2023.
2
The Federal
Communications Commission (Commission) sought written public comment on the proposals in the IoT
Labeling NPRM, including comment on the IRFA. No comments were filed addressing the IRFA. This
Final Regulatory Flexibility Analysis (FRFA) conforms to the RFA.
3
A. Need for, and Objectives of, the Final Rules
2. In today’s Report and Order (Order), the Commission adopts a voluntary U.S. Cyber Trust
Mark (Cyber Trust Mark or Mark) cybersecurity labeling program for Internet-connected consumer
Internet of Things (IoT) products that will provide consumers with an easy-to-understand indicator of a
product’s relative cybersecurity and improve consumer confidence and understanding of IoT product
cybersecurity. Consumer IoT products are susceptible to a wide range of security vulnerabilities that can
be exploited by attackers to gain unauthorized access to the IoT product and its data. Providing customers
with an easy-to-understand label indicating that an IoT product has satisfied baseline cybersecurity
standards allows a consumer to understand the relative security risk that the IoT product may pose when
making a purchase. We adopt an IoT Labeling Program focusing on IoT “products,” which in accordance
with the Commission’s proposed adoption of the definition proposed in the IoT Labeling NPRM
incorporates the National Institute of Standards and Technology (NIST) definition of an IoT product as an
“IoT device and any additional product components (e.g., backend, gateway, mobile app) that are
necessary to use the IoT device beyond basic operational features.”
4
The record supports the
Commission’s adoption of a program focused on the IoT product rather than the individual device,
because a label on the product addresses the full functionality of the device and the most relevant
components the consumer expects to be secured when they buy a product. In addition to enabling
consistency in the treatment of programmatic elements across the federal government, our adopted
definition of IoT product will include the component pieces of a device posing cybersecurity risks. We
focus the IoT Labeling Program on “consumer” IoT rather than “enterprise” IoT, as such an approach will
provide value to consumers most efficiently and expediently, without added complexity from the
enterprise environment. Medical devices regulated by the U.S. Food and Drug Administration (FDA),
and devices that pose a risk to national security and public safety are excluded from the program. We
also exclude wired products at this time because of the Commission’s interest in keeping the scope of the
IoT Labeling Program clear and manageable during its debut and because there is support in the record
for wireless intentional radiators as most prevalent types of consumer IoT devices contemplated in the IoT
Labeling NPRM.
3. We adopt standards and testing procedures based on the NIST framework for IoT, adopt the
use of one or more Cybersecurity Label Administrators (Label Administrators or CLAs), overseen by the
Commission to manage certain aspects of the program, and assign tasks and duties to that administrator to
ensure timely rollout of the program. The Commission will select from among the CLA applicants one
entity to be the Lead Administrator. The Lead Administrator will collaborate with stakeholders to, among
other things, develop recommendations on the development or identification of the technical standards
and testing procedures that must be met for an IoT product to be eligible to be authorized to use the Cyber
1
5 U.S.C. § 603. The RFA, 5 U.S.C. §§ 601-612, has been amended by the Small Business Regulatory
Enforcement Fairness Act of 1996 (SBREFA), Pub. L. No. 104-121, Title II, 110 Stat. 857 (1996).
2
Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, FCC 23-65, Notice of Proposed Rulemaking
(Aug. 10, 2023) (IoT Labeling NPRM).
3
5 U.S.C. § 604.
4
See IoT Labeling NPRM at 8, para. 13.
Federal Communications Commission FCC 24-26
104
Trust Mark; make recommendations to the Commission about how often a given class of IoT products
must renew their request for authority to bear the Mark; and recommendations on specific IoT label
formatting. The Lead Administrator will submit each of these recommendations to the Chief of the
Public Safety and Homeland Security Bureau (Bureau) for review and possible approval.
4. We adopt a two-step process that must be followed by a manufacturer seeking authority to
use the Cyber Trust Mark. The manufacturer must:
1) Obtain conformance testing and a report demonstrating that the IoT product meets the program’s
standards and other FCC requirements necessary to be authorized to bear the Cyber Trust Mark.
This testing may be provided by an accredited and FCC-recognized laboratory, which may
include a Cybersecurity Testing Laboratory (CyberLAB), a manufacturer’s in-house lab, or a lab
operated by a Label Administrator; and
2) Submit an application to the Label Administrator of their choice, which will review the
applications and supporting test report, and will authorize the applicant’s use of the Cyber Trust
Mark on that product if all program requirements have been met.
This process will ensure the label reliably reflects the security of the IoT product and secure consumer
trust in the label. This structure implements controls to assure consumers that the IoT products bearing
the Mark have undergone a meaningful procedure involving verification by disinterested parties and that
the product meets the Commission’s requirements to obtain authority to affix the Cyber Trust Mark to a
product.
5. The Commission further adopts a binary label with layering due to its consumer-friendly
nature and its potential to streamline purchasing decisions. The label will contain a QR Code with an
embedded link that directs the consumer to a registry that will display information about the security of
the product for the consumer. To determine how the registry should be structured to best meet the goals
of the IoT Labeling Program as we adopt it today, we direct the Bureau to seek comment and consider, as
part of a public process, the technical details involved with the operation of the registry. The Commission
also tasks the Lead Administrator with fielding complaints about the registry from consumers and
coordinating with manufacturers to resolve any technical problems associated with consumers accessing
the information in the registry. We also address renewal of the label, enforcement considerations,
international reciprocal recognition of the label, and stress the importance of consumer education to
understand the limits and benefits of the label, rooted in a consumer education framework created by
NIST. These elements ensure the label is accessible and easily understood by consumers. Adopting the
voluntary IoT Labeling Program described above will further the Commission’s objective to provide
better information to consumers about the cybersecurity of the IoT products they use, and bolster the
cybersecurity of the nationwide IoT ecosystem.
B. Summary of Significant Issues Raised by Public Comments in Response to the IRFA
6. There were no comments filed that specifically address the proposed rules and policies in the
IRFA.
C. Response to Comments by the Chief Counsel for Advocacy of the Small Business
Administration
7. Pursuant to the Small Business Jobs Act of 2010, which amended the RFA, the Commission
is required to respond to any comments filed by the Chief Counsel for Advocacy of the Small Business
Administration (SBA) and to provide a detailed statement of any change made to the proposed rules as a
result of those comments.
5
The Chief Counsel did not file any comments in response to the proposed
rules in this proceeding.
5
5 U.S.C. § 604(a)(3).
Federal Communications Commission FCC 24-26
105
D. Description and Estimate of the Number of Small Entities to Which the Rules Will
Apply
8. The RFA directs agencies to provide a description of and, where feasible, an estimate of, the
number of small entities that may be affected by the rules, adopted herein.
6
The RFA generally defines
the term “small entity” as having the same meaning as the terms “small business,” “small organization,”
and “small governmental jurisdiction.”
7
In addition, the term “small business” has the same meaning as
the term “small business concern” under the Small Business Act.
8
A “small business concern” is one
which: (1) is independently owned and operated; (2) is not dominant in its field of operation; and (3)
satisfies any additional criteria established by the SBA.
9
9. Small Businesses, Small Organizations, Small Governmental Jurisdictions. Our actions, over
time, may affect small entities that are not easily categorized at present. We therefore describe, at the
outset, three broad groups of small entities that could be directly affected herein.
10
First, while there are
industry specific size standards for small businesses that are used in the regulatory flexibility analysis,
according to data from the Small Business Administration’s (SBA) Office of Advocacy, in general a
small business is an independent business having fewer than 500 employees.
11
These types of small
businesses represent 99.9% of all businesses in the United States, which translates to 33.2 million
businesses.
12
10. Next, the type of small entity described as a “small organization” is generally “any not-for-
profit enterprise which is independently owned and operated and is not dominant in its field.”
13
The
Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 or less to delineate its annual
electronic filing requirements for small exempt organizations.
14
Nationwide, for tax year 2022, there
were approximately 530,109 small exempt organizations in the U.S. reporting revenues of $50,000 or less
according to the registration and tax data for exempt organizations available from the IRS.
15
6
Id. § 604(a)(4).
7
5 U.S.C. § 601(6).
8
5 U.S.C. § 601(3) (incorporating by reference the definition of “small-business concern” in the Small Business
Act, 15 U.S.C. § 632). Pursuant to 5 U.S.C. § 601(3), the statutory definition of a small business applies “unless an
agency, after consultation with the Office of Advocacy of the Small Business Administration and after opportunity
for public comment, establishes one or more definitions of such term which are appropriate to the activities of the
agency and publishes such definition(s) in the Federal Register.”
9
15 U.S.C. § 632.
10
5 U.S.C. § 601(3)-(6).
11
See SBA, Office of Advocacy, What’s New With Small Business?, (Mar. 2023) https://advocacy.sba.gov/wp-
content/uploads/2023/03/Whats-New-Infographic-March-2023-508c.pdf [ https://perma.cc/Z824-JRBW].
12
Id.
13
5 U.S.C. § 601(4).
14
The IRS benchmark is similar to the population of less than 50,000 benchmark in 5 U.S.C § 601(5) that is used to
define a small governmental jurisdiction. Therefore, the IRS benchmark has been used to estimate the number of
small organizations in this small entity description. See IRS, Annual Electronic Filing Requirement for Small
Exempt Organizations – Form 990-N (e-Postcard) (Dec. 4, 2023),
https://www.irs.gov/charities-non-profits/annual-electronic-filing-requirement-for-small-exempt-organizations-
form-990-n-e-postcard [https://perma.cc/6QWK-CR8J]. We note that the IRS data does not provide information on
whether a small exempt organization is independently owned and operated or dominant in its field.
15
See IRS, Exempt Organizations Business Master File Extract (EO BMF) (Feb. 4, 2024),
https://www.irs.gov/charities-non-profits/exempt-organizations-business-master-file-extract-eo-bmf
[https://perma.cc/SXT4-U8C8]. The IRS Exempt Organization Business Master File (EO BMF) Extract provides
information on all registered tax-exempt/non-profit organizations. The data utilized for purposes of this description
(continued….)
Federal Communications Commission FCC 24-26
106
11. Finally, the small entity described as a “small governmental jurisdiction” is defined generally
as “governments of cities, counties, towns, townships, villages, school districts, or special districts, with a
population of less than fifty thousand.”
16
U.S. Census Bureau data from the 2022 Census of
Governments
17
indicate there were 90,837 local governmental jurisdictions consisting of general purpose
governments and special purpose governments in the United States.
18
Of this number, there were 36,845
general purpose governments (county,
19
municipal, and town or township
20
) with populations of less than
50,000 and 11,879 special purpose governments (independent school districts
21
) with enrollment
populations of less than 50,000.
22
Accordingly, based on the 2022 U.S. Census of Governments data, we
estimate that at least 48,724 entities fall into the category of “small governmental jurisdictions.”
23
12. Radio Frequency Equipment Manufacturers (RF Manufacturers). There are several
analogous industries with an SBA small business size standard that are applicable to RF Manufacturers.
These industries are Fixed Microwave Services, Other Communications Equipment Manufacturing, Radio
and Television Broadcasting and Wireless Communications Equipment Manufacturing. A description of
these industries and the SBA small business size standards are detailed below.
was extracted from the IRS EO BMF data for businesses for the tax year 2020 with revenue less than or equal to
$50,000 for Region 1-Northeast Area (58,577), Region 2-Mid-Atlantic and Great Lakes Areas (175,272), and
Region 3-Gulf Coast and Pacific Coast Areas (213,840) that includes the continental U.S., Alaska, and Hawaii. This
data does not include information for Puerto Rico.
16
5 U.S.C. § 601(5).
17
13 U.S.C. § 161. The Census of Governments survey is conducted every five (5) years compiling data for years
ending with “2” and “7”. See also U.S. Census Bureau, Census of Governments, About (Nov. 18, 2021),
https://www.census.gov/programs-surveys/cog/about.html [https://perma.cc/E2FJ-TRXF].
18
See U.S. Census Bureau, 2022 Census of Governments – Organization Table 2. Local Governments by Type and
State: 2022 [CG2200ORG02], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
[https://perma.cc/6Z48-XY77]. Local governmental jurisdictions are made up of general purpose governments
(county, municipal and town or township) and special purpose governments (special districts and independent
school districts). See also tbl.2. CG2200ORG02 Table Notes_Local Governments by Type and State_2022.
19
See id. at tbl.5. County Governments by Population-Size Group and State: 2022 [CG2200ORG05],
https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html [https://perma.cc/6Z48-XY77]. There
were 2,097 county governments with populations less than 50,000. This category does not include subcounty
(municipal and township) governments.
20
See id. at tbl.6. Subcounty General-Purpose Governments by Population-Size Group and State: 2022
[CG2200ORG06], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
[https://perma.cc/6Z48-XY77]. There were 18,693 municipal and 16,055 town and township governments with
populations less than 50,000.
21
See id. at tbl.10. Elementary and Secondary School Systems by Enrollment-Size Group and State: 2022
[CG2200ORG10], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
[https://perma.cc/6Z48-XY77]. There were 11,879 independent school districts with enrollment populations less
than 50,000. See also tbl.4. Special-Purpose Local Governments by State Census Years 1942 to 2022
[CG2200ORG04], CG2200ORG04 Table Notes_Special Purpose Local Governments by State_Census Years 1942
to 2022.
22
While the special purpose governments category also includes local special district governments, the 2022 Census
of Governments data does not provide data aggregated based on population size for the special purpose governments
category. Therefore, only data from independent school districts is included in the special purpose governments
category.
23
This total is derived from the sum of the number of general purpose governments (county, municipal and town or
township) with populations of less than 50,000 (36,845) and the number of special purpose governments -
independent school districts with enrollment populations of less than 50,000 (11,879), from the 2022 Census of
Governments - Organizations tbls. 5, 6 & 10.
Federal Communications Commission FCC 24-26
107
13. Fixed Microwave Services. Fixed microwave services include common carrier,
24
private-
operational fixed,
25
and broadcast auxiliary radio services.
26
They also include the Upper Microwave
Flexible Use Service (UMFUS),
27
Millimeter Wave Service (70/80/90 GHz),
28
Local Multipoint
Distribution Service (LMDS),
29
the Digital Electronic Message Service (DEMS),
30
24 GHz Service,
31
Multiple Address Systems (MAS),
32
and Multichannel Video Distribution and Data Service (MVDDS),
33
where in some bands licensees can choose between common carrier and non-common carrier status.
34
Wireless Telecommunications Carriers (except Satellite)
35
is the closest industry with an SBA small
business size standard applicable to these services. The SBA small size standard for this industry
classifies a business as small if it has 1,500 or fewer employees.
36
U.S. Census Bureau data for 2017
show that there were 2,893 firms that operated in this industry for the entire year.
37
Of this number, 2,837
firms employed fewer than 250 employees.
38
Thus, under the SBA size standard, the Commission
estimates that a majority of fixed microwave service licensees can be considered small.
14. The Commission’s small business size standards with respect to fixed microwave services
involve eligibility for bidding credits and installment payments in the auction of licenses for the various
frequency bands included in fixed microwave services. When bidding credits are adopted for the auction
of licenses in fixed microwave services frequency bands, such credits may be available to several types of
small businesses based on average gross revenues (small, very small, and entrepreneur) pursuant to the
competitive bidding rules adopted in conjunction with the requirements for the auction and/or as
24
See 47 CFR Part 101, Subparts C and I.
25
See id. Subparts C and H.
26
Auxiliary Microwave Service is governed by Part 74 of Title 47 of the Commission’s Rules. See 47 CFR Part 74.
Available to licensees of broadcast stations and to broadcast and cable network entities, broadcast auxiliary
microwave stations are used for relaying broadcast television signals from the studio to the transmitter, or between
two points such as a main studio and an auxiliary studio. The service also includes mobile TV pickups, which relay
signals from a remote location back to the studio.
27
See 47 CFR Part 30.
28
See 47 CFR Part 101, Subpart Q.
29
See id. Subpart L.
30
See id. Subpart G.
31
See id.
32
See id. Subpart O.
33
See id. Subpart P.
34
See 47 CFR §§ 101.533, 101.1017.
35
See U.S. Census Bureau, 2017 NAICS Definition, “517312 Wireless Telecommunications Carriers (except
Satellite),” https://www.census.gov/naics/?input=517312&year=2017&details=517312 [https://perma.cc/NBD5-
UHZ9] (last visited Feb. 14, 2024).
36
See 13 CFR § 121.201, NAICS Code 517312 (as of 10/1/22, NAICS Code 517112).
37
See U.S. Census Bureau, 2017 Economic Census of the United States, Employment Size of Firms for the U.S.:
2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 517312,
https://data.census.gov/cedsci/table?y=2017&n=517312&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false [https://perma.cc/XKA9-98E9] (last visited Feb. 14, 2024).
38
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
Federal Communications Commission FCC 24-26
108
identified in Part 101 of the Commission’s rules for the specific fixed microwave services frequency
bands.
39
15. In frequency bands where licenses were subject to auction, the Commission notes that as a
general matter, the number of winning bidders that qualify as small businesses at the close of an auction
does not necessarily represent the number of small businesses currently in service. Further, the
Commission does not generally track subsequent business size unless, in the context of assignments or
transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect
data on the number of employees for licensees providing these services, at this time we are not able to
estimate the number of licensees with active licenses that would qualify as small under the SBA’s small
business size standard.
16. Other Communications Equipment Manufacturing. This industry comprises establishments
primarily engaged in manufacturing communications equipment (except telephone apparatus, radio and
television broadcast, and wireless communications equipment).
40
Examples of such manufacturing
include fire detection and alarm systems manufacturing, Intercom systems and equipment manufacturing,
and signals (e.g., highway, pedestrian, railway, traffic) manufacturing.
41
The SBA small business size
standard for this industry classifies firms having 750 or fewer employees as small.
42
For this industry,
U.S. Census Bureau data for 2017 shows that 321 firms operated for the entire year.
43
Of that number,
310 firms operated with fewer than 250 employees.
44
Based on this data, we conclude that the majority of
Other Communications Equipment Manufacturers are small.
17. Radio and Television Broadcasting and Wireless Communications Equipment
Manufacturing. This industry comprises establishments primarily engaged in manufacturing radio and
television broadcast and wireless communications equipment.
45
Examples of products made by these
establishments are: transmitting and receiving antennas, cable television equipment, GPS equipment,
pagers, cellular phones, mobile communications equipment, and radio and television studio and
broadcasting equipment.
46
The SBA small business size standard for this industry classifies firms having
1,250 employees or less as small.
47
U.S. Census Bureau data for 2017 show that there were 656 firms in
39
See 47 CFR §§ 101.538(a)(1)-(3), 101.1112(b)-(d), 101.1319(a)(1)-(2), and 101.1429(a)(1)-(3).
40
See U.S. Census Bureau, 2017 NAICS Definitions, “334290 Other Communications Equipment Manufacturing,
https://www.census.gov/naics/?input=334290&year=2017&details=334290 [https://perma.cc/D4JU-E6ZZ] (last
visited Feb. 14, 2024).
41
Id.
42
See 13 CFR § 121.201, NAICS Code 334290.
43
See U.S. Census Bureau, 2017 Economic Census of the United States, Selected Sectors: Employment Size of Firms
for the U.S.: 2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 334290,
https://data.census.gov/cedsci/table?y=2017&n=334290&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false [https://perma.cc/EB69-799P] (last visited Feb. 14, 2024).
44
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
45
See U.S. Census Bureau, 2017 NAICS Definition, 334220 Radio and Television Broadcasting and Wireless
Communications Equipment Manufacturing,
https://www.census.gov/naics/?input=334220&year=2017&details=334220 [https://perma.cc/2EMS-VMD9] (last
visited Feb. 14, 2024).
46
Id.
47
See 13 CFR § 121.201, NAICS Code 334220.
Federal Communications Commission FCC 24-26
109
this industry that operated for the entire year.
48
Of this number, 624 had fewer than 250 employees.
49
Based on this data, we conclude that a majority of manufacturers in this industry are small.
E. Description of Projected Reporting, Recordkeeping, and Other Compliance
Requirements for Small Entities
18. As described above, the Commission adopts the operational framework for a voluntary IoT
cybersecurity labeling program. Since the IoT Labeling Program is voluntary, small entities who do not
participate in the IoT Labeling Program will not be subject to any new or modified reporting,
recordkeeping, or other compliance obligations. The IoT Labeling Program framework incorporates, and
is consistent with, certain NIST guidelines and protocols as part of the Commission’s recognition that
public-private collaboration that leverages the expertise and existing frameworks of the federal
government, industry, and other stakeholders is necessary for the success of its voluntary IoT Labeling
Program. The Commission will be the IoT Labeling Program owner and retain ultimate control over the
IoT Labeling Program, however, third-party administrators will carry out responsibilities such as
management of day-to-day functions, and development of processes, standards, and testing to be
approved by the Commission. In light of the work that remains to be done for administration and
implementation of the IoT Labeling Program, the Commission is not in a position to quantify the costs for
small entities or to determine whether it will be necessary for small entities to hire professionals to
comply with the IoT Labeling Program.
19. Small entities that choose to participate in the IoT Labeling Program by seeking authority to
affix the Cyber Trust Mark on their products will incur recordkeeping and reporting as well as other
obligations that are necessary to test their IoT products to demonstrate compliance with the requirements
the Commission adopts in the Order. More specifically, small entities and other applicants are required to
have their product tested by an accredited and FCC-recognized CyberLAB, Label Administrator Lab, or
manufacturer’s in-house lab; obtain a report of conformity and compliance from the testing lab; and
submit an application for authority to use the Cyber Trust Mark to an FCC-recognized Label
Administrator in accordance with procedures established by the Label Administrator. To ensure that IoT
products approved for the use of the Cyber Trust Mark do not pose national security or public safety risks,
small entities and other applicants seeking authorization to use to the Cyber Trust Mark are required to
provide a declaration under penalty of perjury that as of the date they file their application that, (i) the
product for which the applicant seeks to use the Mark through cybersecurity certification meets all the
requirements of the IoT Labeling Program; (ii) the applicant is not identified on the Covered List,
established pursuant to § 1.50002 of the of the Commission’s rules, as an entity producing covered
communications equipment; and (iii) the product is not produced by any entity, its affiliates, or
subsidiaries identified on the Department of Commerce’s Entity List, or the Department of Defense’s List
of Chinese Military Companies.
20. The Order adopts the NIST Core Baseline technical criteria presented in NISTIR 8425 as the
foundation of the Commission’s IoT Labeling Program as proposed in the IoT Labeling NPRM. Small
entities and others seeking use of the FCC IoT Label will be required to provide information on asset
identification; product configuration; data protection; interface access control; software update;
cybersecurity state awareness; and the IoT product development activities, on documentation, information
and query reception, information dissemination, and product education and awareness for each product
submission. To ensure their IoT products are eligible for continued use of the Cyber Trust Mark, small
entities will need to keep the records necessary to demonstrate the products continue to comply with the
48
See U.S. Census Bureau, 2017 Economic Census of the United States, Employment Size of Firms for the U.S.:
2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 334220,
https://data.census.gov/cedsci/table?y=2017&n=334220&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false [https://perma.cc/Q649-9AC4] (last visited Feb. 14, 2024).
49
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
Federal Communications Commission FCC 24-26
110
IoT Labeling Program requirements. The Bureau has not yet adopted standards addressing how often an
IoT product, or a class of IoT products, will need to be retested for continuing eligibility to display the
Cyber Trust Mark. While these standards have yet to be determined, maintaining records to demonstrate
compliance with the minimum cybersecurity standards that are adopted will be necessary for small
entities that elect to participate in the IoT Labeling Program. Additionally, small entities who participate
in the IoT Labeling Program will be required to maintain appropriate records in the event their IoT
product label authorization is subject to an audit.
F. Steps Taken to Minimize the Significant Economic Impact on Small Entities, and
Significant Alternatives Considered
21. The RFA requires an agency to provide, “a description of the steps the agency has taken to
minimize the significant economic impact on small entities…including a statement of the factual, policy,
and legal reasons for selecting the alternative adopted in the final rule and why each one of the other
significant alternatives to the rule considered by the agency which affect the impact on small entities was
rejected.”
50
22. The actions taken by the Commission in the Order were considered to be the least costly and
minimally burdensome for small and other entities that choose to participate in the IoT Labeling Program.
To serve the aims of the program, and for the Cyber Trust Mark to have meaning for consumers, the
requirements for an IoT product to receive the Cyber Trust Mark must be uniform for both small
businesses and other entities. Thus, the Commission continues to maintain the view expressed in the
IRFA for the IoT Labeling NPRM that the significance of mark integrity, and building confidence among
consumers that devices and products containing the Cyber Trust Mark label can be trusted to be cyber
secure, necessitates adherence by all entities participating in the IoT Labeling Program to the same rules
regardless of size.
23. The Commission took a number of actions in the Order to minimize any significant economic
impact on small entities and considered several alternatives. Specifically, the IoT Labeling Program is
voluntary, so a small entity can engage in their own analysis to determine whether the benefits of
participating in the program outweigh the costs of participating in the IoT Labeling Program with respect
to any IoT products they manufacture. The Commission expects small entities that participate in the IoT
Labeling Program like other entities will realize benefits from having the Cyber Trust Mark on their IoT
product(s) such as product differentiation, increased consumer confidence, reduced risk of distributed
denial-of-service (DDoS) and other types of cyber-attacks, and reduced cybersecurity incident related
risks.
24. In the Order, the Commission has tasked the Lead Administrator with developing or
identifying the standards to which every participant’s IoT product must meet. Rather than formulating
and adopting its own standards and testing procedures, the Commission opted to adopt standards based on
recommendations made by the Lead Administrator in collaboration with industry stakeholders that will be
able to leverage existing standards work in progress or completed, facilitating faster development of
standards, and therefore facilitating a faster rollout of the IoT Labeling Program. Small entities will
benefit from the Commission directive that the Lead Administrator use as a foundation for the IoT
Labeling Program the technical criteria developed by NIST in the NISTIR 8425, Profile of the IoT Core
Baseline for Consumer IoT Products, which provides flexibility that can be applied across all types of
consumer IoT products. Small entities will also benefit from the limited scope of the IoT Labeling
Program which is only applicable to consumer IoT products.
25. The Commission’s decision to allow manufacturers seeking certification to use the Cyber
Trust Mark the option to conduct in-house conformity testing for IoT products, provided the in-house labs
meet the same accreditation and FCC-recognition requirements as CyberLABs, is a step that may benefit
small entities. To the extent that a Cybersecurity Label Administrator also operates an in-house lab to
50
5 U.S.C. § 604(a)(6).
Federal Communications Commission FCC 24-26
111
conduct conformity testing, the ability of small entities to use the Cybersecurity Label Administrator for
both product testing and certification to use the Cyber Trust Mark may yield both time and costs saving
for small entities. Also related to lab testing, the Commission considered but declined to require
conformity testing labs to be physically located in the U.S., which provides more testing lab options for
small and other entities. The Commission also considered but declined to allow self-attestation of
conformity with testing requirements by applicants seeking the Cyber Trust Mark certification, citing
support in the record of the certification of bogus products as Energy Star compliant in the Energy Star
program when the program was “primarily a self-certification program relying on corporate honesty and
industry self-policing to protect the integrity of the Energy Star label.”
51
26. The Commission anticipates that as the IoT Labeling Program becomes established in the
minds of the consumer, small entities may benefit from recognition of the Cyber Trust Mark on their IoT
products, and thus receive greater recognition in the market as a result of participating in the program.
The Commission considered utilizing and adopted a single binary label as proposed in the IoT Labeling
NPRM in part due to its simplicity to consumers, but a simple label benefits small businesses who want to
place the label on their product as the small entity will not need to accommodate a more complex, and
likely more costly, labeling regime on product packaging.
27. The Commission also considered arguments advocating against imposing unnecessarily rigid
or burdensome requirements to participate in the IoT Labeling Program, in response to the renewal
requirement proposal in the IoT Labeling NPRM that participants be required to file for renewal annually
providing supporting documentation that their products continue to meet the IoT Labeling Program
requirements.
52
Agreeing that different types of IoT products may require different renewal standards
depending on their lifespan and level of risk, the Commission opted to task the Lead Administrator to
collaborate with stakeholders and recommend a product-centered approach.
53
The Commission directed
that the recommendation consider whether annual compliance report filings could be used for renewal
purposes, and the recommendation balance the need to provide the industry with flexibility, while
ensuring that consumers are provided up-to-date product information in a timely fashion to inform their
purchasing decisions. The Commission sought to make the IoT Labeling Program sufficiently flexible for
participants by taking achievable steps that preserve the IoT Labeling Program’s integrity, while also
making it accessible to as many small and other manufacturers as possible.
G. Report to Congress
28. The Commission will send a copy of the Report and Order, including this FRFA, in a report
to Congress pursuant to the Congressional Review Act.
54
In addition, the Commission will send a copy of
the Report and Order, including this FRFA, to the Chief Counsel for Advocacy of the SBA. A copy of
the Report and Order and FRFA (or summaries thereof) will also be published in the Federal Register.
55
51
Government Accountability Office, Energy Star Program, Covert Testing Shows the Energy Star Program
Certification Process Is Vulnerable to Fraud and Abuse, GAO-10-470 (2010),
https://www.gao.gov/assets/files.gao.gov/assets/gao-10-470.pdf [https://perma.cc/9VB5-ZWTA].
52
AHAM Comments 4.
53
Id. at 4-5; Whirlpool Comments at 5; CTA Reply at 7; NAM Comments at 5; Kaiser Permanente Comments at 2;
CCDS Comments at 5; CSA Comments at 19.
54
5 U.S.C. § 801(a)(1)(A).
55
Id. § 604(b).
Federal Communications Commission FCC 24-26
112
APPENDIX C
Initial Regulatory Flexibility Analysis
1. As required by the Regulatory Flexibility Act of 1980, as amended (RFA),
1
the Federal
Communications Commission (Commission) has prepared this Initial Regulatory Flexibility Analysis
(IRFA) of the possible significant economic impact on a substantial number of small entities by the
policies and rules proposed in the Further Notice of Proposed Rulemaking (Further Notice). Written
public comments are requested on this IRFA. Comments must be identified as responses to the IRFA and
must be filed by the deadlines for comments on the Further Notice. The Commission will send a copy of
the Further Notice, including this IRFA, to the Chief Counsel for Advocacy of the Small Business
Administration (SBA).
2
In addition, the Further Notice and IRFA (or summaries thereof) will be
published in the Federal Register.
3
A. Need for, and Objectives of, the Proposed Rules
2. The Further Notice included with the Report and Order (Order) follows the
Commission’s adoption of rules establishing a voluntary cybersecurity labeling program for Internet of
Things (IoT) products. The Commission’s IoT Labeling Program will provide consumers with an easy-
to-understand and quickly recognizable FCC IoT Label that indicates the labeled product meets certain
basic minimum cybersecurity requirements. The FCC IoT Label includes a U.S. government certification
mark (Cyber Trust Mark) and a QR code that directs consumers to a registry with consumer-friendly
information about the security of products bearing the Cyber Trust Mark. The Labeling Program will
help consumers make better purchasing decisions, raise consumer confidence with regard to the
cybersecurity of IoT products they buy to use in their homes, and encourage manufacturers to develop
IoT products with security-by-design principles in mind.
3. The Further Notice further explores potential expansion of disclosure requirements of the
Order. We propose to require manufacturers to make additional declarations assuring consumers that the
products bearing the FCC IoT Label do not contain hidden vulnerabilities from high-risk countries and
that the data collected by the products does not sit within or transit high-risk countries. We seek comment
on whether to require manufacturers to make such disclosures to accompany its application and whether
to make such disclosures in the registry. We further inquire about the value of this information for
consumers and how manufacturers might inform other users who are not purchasers. We also seek
comment on the costs and benefits of the proposals in the Further Notice and potential impacts of the
Magnusson-Moss Act.
4. Specifically, in the Further Notice we seek comment on requiring applicants seeking to
use the FCC IoT Label to make one of the following declarations under penalty of perjury regarding
software developed or deployed within a high-risk country:
c. No software or software update or part of any software or software update that runs on or
controls the product was or will be developed or deployed from within a country on the
Secretary of Commerce’s list of high-risk countries, except that this commitment does not
apply to the origin of open-source contributions not paid for directly or indirectly by us or our
direct or indirect partners in offering this product; or
d. This device runs, or due to future software updates might run, software developed within the
Secretary of Commerce’s list of high-risk country or countries. We promise that we are not
aware of any backdoors or other sabotage, nor of any reason to believe that there is a
particular heightened risk for such backdoors or sabotage relative other software developed
1
5 U.S.C. § 603. The RFA, 5 U.S.C. §§ 601 – 612, has been amended by the Small Business Regulatory
Enforcement Fairness Act of 1996 (SBREFA), Pub. L. No. 104-121, Title II, 110 Stat. 857 (1996).
2
5 U.S.C. § 603(a).
3
See id.
Federal Communications Commission FCC 24-26
113
within such a country, but we inform purchasers and users that the Department of Commerce
has designated high-risk country or countries as jurisdictions whose conduct is significantly
adverse to the national security of the United States or security and safety of United States
persons.
5. The Further Notice also seeks comment on requiring applicants seeking to use the FCC
IoT Label to make one of the following declarations under penalty of perjury regarding data stored in or
transited through a country known to pose a national security risk to the United States:
c. No customer data collected by this product will be sent to servers located on the Department
of Commerce’s list of high-risk countries. No servers that remotely control the device will be
located in such a country.
d. Customer data collected by this product will be sent to servers located in a high-risk country
or countries. We inform purchasers and users that the Secretary of Commerce has designated
high-risk country or countries as jurisdictions whose conduct is significantly adverse to the
national security of the United States or security and safety of United States persons.
6. Our proposals and the matters upon which we seek comment in the Further Notice are
intended to build upon today’s Order by enhancing the national security protections associated with the
IoT Labeling Program through increased supply chain transparency.
B. Legal Basis
7. The proposed action is authorized pursuant to sections 1, 2, 4(i), 4(n), 302, 303(r), 312,
333, and 503, of the Communications Act of 1934, as amended.
4
C. Description and Estimate of the Number of Small Entities to Which the Proposed
Rules will Apply
8. The RFA directs agencies to provide a description of and, where feasible, an estimate of
the number of small entities that may be affected by the proposed rules and policies, if adopted.
5
The
RFA generally defines the term “small entity” as having the same meaning as the terms “small business,”
“small organization,” and “small governmental jurisdiction.”
6
In addition, the term “small business” has
the same meaning as the term “small business concern” under the Small Business Act.
7
A “small
business concern” is one which: (1) is independently owned and operated; (2) is not dominant in its field
of operation; and (3) satisfies any additional criteria established by the SBA.
8
9. Small Business, Small Organizations, and Small Governmental Jurisdictions. Our
actions, over time, may affect small entities that are not easily categorized at present. We therefore
describe here, at the outset, three broad groups of small entities that could be directly affected herein.
9
First, while there are industry specific size standards for small business that are used in the regulatory
flexibility analysis, according to data from the SBA’s Office of Advocacy, in general a small business in
4
47 U.S.C. §§ 151, 152, 154(i), 154(n), 302a, 303(r), 312, 333, 503; the IoT Cybersecurity Improvement Act of
2020, 15 U.S.C. § 278g-3a to § 278g-3e.
5
5 U.S.C. § 603(b)(3).
6
5 U.S.C. § 601(6).
7
5 U.S.C. § 601(3) (incorporating by reference the definition of “small-business concern” in the Small Business
Act, 15 U.S.C. § 632). Pursuant to 5 U.S.C. § 601(3), the statutory definition of a small business applies “unless an
agency, after consultation with the Office of Advocacy of the Small Business Administration and after opportunity
for public comment, establishes one or more definitions of such term which are appropriate to the activities of the
agency and publishes such definition(s) in the Federal Register.”
8
15 U.S.C. § 632.
9
5 U.S.C. § 601(3)-(6).
Federal Communications Commission FCC 24-26
114
an independent business having fewer than 500 employees.
10
These types of small businesses represent
99.9% of all businesses in the United States, which translates to 33.2 million businesses.
11
10. Next, the type of small entity described as a “small organization” is generally “any not-
for-profit enterprise which is independently owned and operated and is not dominant in its field.”
12
The
Internal Revenue Service (IRS) uses a revenue benchmark of $50,000 or less to delineate its annual
electronic filing requirements for small exempt organizations.
13
Nationwide, for tax year 2022, there
were approximately 530,109 small exempt organizations in the U.S. reporting revenues of $50,000 or less
according to the registration and tax data for exempt organizations available from the IRS.
14
11. Finally, the small entity described as a “small governmental jurisdiction” is defined
generally as “governments of cities, counties, towns, townships, villages, school districts, or special
districts, with a population of less than fifty thousand.”
15
U.S. Census Bureau data from the 2022 Census
of Governments
16
indicate there were 90,837 local governmental jurisdictions consisting of general
purpose governments and special purpose governments in the United States.
17
Of this number, there were
36,845 general purpose governments (county,
18
municipal, and town or township
19
) with populations of
10
See SBA, Office of Advocacy, What’s New With Small Business? (Mar. 14, 2023),
https://advocacy.sba.gov/2023/03/14/whats-new-with-small-business/ [https://perma.cc/Z824-JRBW].
11
Id.
12
5 U.S.C. § 601(4).
13
The IRS benchmark is similar to the population of less than 50,000 benchmark in 5 U.S.C § 601(5) that is used to
define a small governmental jurisdiction. Therefore, the IRS benchmark has been used to estimate the number of
small organizations in this small entity description. See IRS, Annual Electronic Filing Requirement for Small
Exempt Organizations – Form 990-N (e-Postcard) (Dec. 4, 2023),
https://www.irs.gov/charities-non-profits/annual-electronic-filing-requirement-for-small-exempt-organizations-
form-990-n-e-postcard [https://perma.cc/6QWK-CR8J]. We note that the IRS data does not provide information on
whether a small exempt organization is independently owned and operated or dominant in its field.
14
See IRS, Exempt Organizations Business Master File Extract (EO BMF) (Feb. 4, 2024),
https://www.irs.gov/charities-non-profits/exempt-organizations-business-master-file-extract-eo-bmf
[https://perma.cc/SXT4-U8C8]. The IRS Exempt Organization Business Master File (EO BMF) Extract provides
information on all registered tax-exempt/non-profit organizations. The data utilized for purposes of this description
was extracted from the IRS EO BMF data for businesses for the tax year 2020 with revenue less than or equal to
$50,000 for Region 1-Northeast Area (58,577), Region 2-Mid-Atlantic and Great Lakes Areas (175,272), and
Region 3-Gulf Coast and Pacific Coast Areas (213,840) that includes the continental U.S., Alaska, and Hawaii. This
data does not include information for Puerto Rico.
15
5 U.S.C. § 601(5).
16
13 U.S.C. § 161. The Census of Governments survey is conducted every five (5) years compiling data for years
ending with “2” and “7”. See also U.S. Census Bureau, Census of Governments, About (Nov. 18, 2021),
https://www.census.gov/programs-surveys/cog/about.html [https://perma.cc/E2FJ-TRXF].
17
See U.S. Census Bureau, 2022 Census of Governments – Organization Table 2. Local Governments by Type and
State: 2022 [CG2200ORG02], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
[https://perma.cc/6Z48-XY77]. Local governmental jurisdictions are made up of general purpose governments
(county, municipal and town or township) and special purpose governments (special districts and independent
school districts). See also tbl.2. CG2200ORG02 Table Notes_Local Governments by Type and State_2022.
18
See id. at tbl.5. County Governments by Population-Size Group and State: 2022 [CG2200ORG05],
https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html [https://perma.cc/6Z48-XY77]. There
were 2,097 county governments with populations less than 50,000. This category does not include subcounty
(municipal and township) governments.
19
See id. at tbl.6. Subcounty General-Purpose Governments by Population-Size Group and State: 2022
[CG2200ORG06], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
(continued….)
Federal Communications Commission FCC 24-26
115
less than 50,000 and 11,879 special purpose governments—independent school districts
20
with enrollment
populations of less than 50,000.
21
Accordingly, based on the 2022 U.S. Census of Governments data, we
estimate that at least 48,724 entities fall into the category of “small governmental jurisdictions.”
22
12. Radio Frequency Equipment Manufacturers (RF Manufacturers). There are several
analogous industries with an SBA small business size standard that are applicable to RF Manufacturers.
These industries are Fixed Microwave Services, Other Communications Equipment Manufacturing, Radio
and Television Broadcasting and Wireless Communications Equipment Manufacturing. A description of
these industries and the SBA small business size standards are detailed below.
13. Fixed Microwave Services. Fixed microwave services include common carrier,
23
private-
operational fixed,
24
and broadcast auxiliary radio services.
25
They also include the Upper Microwave
Flexible Use Service (UMFUS),
26
Millimeter Wave Service (70/80/90 GHz),
27
Local Multipoint
Distribution Service (LMDS),
28
the Digital Electronic Message Service (DEMS),
29
24 GHz Service,
30
Multiple Address Systems (MAS),
31
and Multichannel Video Distribution and Data Service (MVDDS),
32
where in some bands licensees can choose between common carrier and non-common carrier status.
33
[https://perma.cc/6Z48-XY77]. There were 18,693 municipal and 16,055 town and township governments with
populations less than 50,000.
20
See id. at tbl.10. Elementary and Secondary School Systems by Enrollment-Size Group and State: 2022
[CG2200ORG10], https://www.census.gov/data/tables/2022/econ/gus/2022-governments.html
[https://perma.cc/6Z48-XY77]. There were 11,879 independent school districts with enrollment populations less
than 50,000. See also tbl.4. Special-Purpose Local Governments by State Census Years 1942 to 2022
[CG2200ORG04], CG2200ORG04 Table Notes_Special Purpose Local Governments by State_Census Years 1942
to 2022.
21
While the special purpose governments category also includes local special district governments, the 2022 Census
of Governments data does not provide data aggregated based on population size for the special purpose governments
category. Therefore, only data from independent school districts is included in the special purpose governments
category.
22
This total is derived from the sum of the number of general purpose governments (county, municipal and town or
township) with populations of less than 50,000 (36,845) and the number of special purpose governments -
independent school districts with enrollment populations of less than 50,000 (11,879), from the 2022 Census of
Governments - Organizations tbls. 5, 6 & 10.
23
See 47 CFR Part 101, Subparts C and I.
24
See id. Subparts C and H.
25
Auxiliary Microwave Service is governed by Part 74 of Title 47 of the Commission’s Rules. See 47 CFR Part 74.
Available to licensees of broadcast stations and to broadcast and cable network entities, broadcast auxiliary
microwave stations are used for relaying broadcast television signals from the studio to the transmitter, or between
two points such as a main studio and an auxiliary studio. The service also includes mobile TV pickups, which relay
signals from a remote location back to the studio.
26
See 47 CFR Part 30.
27
See 47 CFR Part 101, Subpart Q.
28
See id. Subpart L.
29
See id. Subpart G.
30
See id.
31
See id. Subpart O.
32
See id. Subpart P.
33
See 47 CFR §§ 101.533, 101.1017.
Federal Communications Commission FCC 24-26
116
Wireless Telecommunications Carriers (except Satellite)
34
is the closest industry with an SBA small
business size standard applicable to these services. The SBA small size standard for this industry
classifies a business as small if it has 1,500 or fewer employees.
35
U.S. Census Bureau data for 2017
show that there were 2,893 firms that operated in this industry for the entire year.
36
Of this number, 2,837
firms employed fewer than 250 employees.
37
Thus, under the SBA size standard, the Commission
estimates that a majority of fixed microwave service licensees can be considered small.
14. The Commission’s small business size standards with respect to fixed microwave
services involve eligibility for bidding credits and installment payments in the auction of licenses for the
various frequency bands included in fixed microwave services. When bidding credits are adopted for the
auction of licenses in fixed microwave services frequency bands, such credits may be available to several
types of small businesses based average gross revenues (small, very small and entrepreneur) pursuant to
the competitive bidding rules adopted in conjunction with the requirements for the auction and/or as
identified in Part 101 of the Commission’s rules for the specific fixed microwave services frequency
bands.
38
15. In frequency bands where licenses were subject to auction, the Commission notes that as
a general matter, the number of winning bidders that qualify as small businesses at the close of an auction
does not necessarily represent the number of small businesses currently in service. Further, the
Commission does not generally track subsequent business size unless, in the context of assignments or
transfers, unjust enrichment issues are implicated. Additionally, since the Commission does not collect
data on the number of employees for licensees providing these services, at this time we are not able to
estimate the number of licensees with active licenses that would qualify as small under the SBA’s small
business size standard.
16. Other Communications Equipment Manufacturing. This industry comprises
establishments primarily engaged in manufacturing communications equipment (except telephone
apparatus, and radio and television broadcast, and wireless communications equipment).
39
Examples of
such manufacturing include fire detection and alarm systems manufacturing, Intercom systems and
equipment manufacturing, and signals (e.g., highway, pedestrian, railway, traffic) manufacturing.
40
The
SBA small business size standard for this industry classifies firms having 750 or fewer employees as
small.
41
For this industry, U.S. Census Bureau data for 2017 shows that 321 firms operated for the entire
34
See U.S. Census Bureau, 2017 NAICS Definition, “517312 Wireless Telecommunications Carriers (except
Satellite),” https://www.census.gov/naics/?input=517312&year=2017&details=517312.
35
See 13 CFR § 121.201, NAICS Code 517312 (as of 10/1/22, NAICS Code 517112).
36
See U.S. Census Bureau, 2017 Economic Census of the United States, Employment Size of Firms for the U.S.:
2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 517312,
https://data.census.gov/cedsci/table?y=2017&n=517312&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false.
37
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
38
See 47 CFR §§ 101.538(a)(1)-(3), 101.1112(b)-(d), 101.1319(a)(1)-(2), and 101.1429(a)(1)-(3).
39
See U.S. Census Bureau, 2017 NAICS Definitions, “334290 Other Communications Equipment Manufacturing,
https://www.census.gov/naics/?input=334290&year=2017&details=334290.
40
Id.
41
See 13 CFR 121.201, NAICS Code 334290.
Federal Communications Commission FCC 24-26
117
year.
42
Of that number, 310 firms operated with fewer than 250 employees.
43
Based on this data, we
conclude that the majority of Other Communications Equipment Manufacturers are small.
17. Radio and Television Broadcasting and Wireless Communications Equipment
Manufacturing. This industry comprises establishments primarily engaged in manufacturing radio and
television broadcast and wireless communications equipment.
44
Examples of products made by these
establishments are: transmitting and receiving antennas, cable television equipment, GPS equipment,
pagers, cellular phones, mobile communications equipment, and radio and television studio and
broadcasting equipment.
45
The SBA small business size standard for this industry classifies firms having
1,250 employees or less as small.
46
U.S. Census Bureau data for 2017 show that there were 656 firms in
this industry that operated for the entire year.
47
Of this number, 624 had fewer than 250 employees.
48
Based on this data, we conclude that a majority of manufacturers in this industry are small.
D. Description of Project Reporting, Recordkeeping, and Other Compliance
Requirements for Small Entities
18. We expect the potential rules addressed in the Further Notice will impose new or
additional reporting, recordkeeping and/or other compliance obligations on small entities who choose to
participate in the program who would potentially be required to keep records related to the countries of
origin of their software, software updates, logic-performing hardware, and data collection. In the Further
Notice we raise various matters relating to the reporting requirement obligations we should adopt,
including whether to require manufactures to disclose the jurisdictional provenance of the software of
their product or whether the data collected by the product is not stored and does not transit countries that
are known to pose a national security risk to the United States.
19. The Further Notice seeks comment on a number of aspects relating to our proposals and
matters we discuss, including the benefits and costs associated with a provider’s implementation of them.
We seek comment on and have requested cost and benefit information from commenters pertaining to our
proposals, inquiries, and conclusions in the Further Notice. Thus, at this time the record does not include
sufficient cost/benefit analyses to allow the Commission to quantify the costs of compliance for small
entities a including whether it will be necessary for small entities to hire professionals to comply with the
proposed rules if adopted. In light of the importance of mark integrity and the need to build consumer
confidence and trust in the security of IoT products that will display the FCC IoT Label, regardless of the
size of the entity seeking to participate in the proposed cybersecurity labeling program, adherence by all
participants to the same Commission rules is necessary. However, we expect that the comments we
42
See U.S. Census Bureau, 2017 Economic Census of the United States, Selected Sectors: Employment Size of Firms
for the U.S.: 2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 334290,
https://data.census.gov/cedsci/table?y=2017&n=334290&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false.
43
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
44
See U.S. Census Bureau, 2017 NAICS Definition, “334220 Radio and Television Broadcasting and Wireless
Communications Equipment Manufacturing,
https://www.census.gov/naics/?input=334220&year=2017&details=334220.
45
Id.
46
See 13 CFR § 121.201, NAICS Code 334220.
47
See U.S. Census Bureau, 2017 Economic Census of the United States, Employment Size of Firms for the U.S.:
2017, Table ID: EC1700SIZEEMPFIRM, NAICS Code 334220,
https://data.census.gov/cedsci/table?y=2017&n=334220&tid=ECNSIZE2017.EC1700SIZEEMPFIRM&hidePrevie
w=false.
48
Id. The available U.S. Census Bureau data does not provide a more precise estimate of the number of firms that
meet the SBA size standard.
Federal Communications Commission FCC 24-26
118
receive will help the Commission identify and evaluate relevant matters for small entities, including any
compliance costs and burdens that may result from the proposals and other matters discussed in the
Further Notice.
E. Steps Taken to Minimize the Significant Economic Impact on Small Entities, and
Significant Alternatives Considered
20. The RFA requires an agency to describe any significant, specifically small business,
alternatives that it has considered in reaching its proposed approach, which may include the following
four alternatives (among others): “(1) the establishment of differing compliance or reporting requirements
or timetables that take into account the resources available to small entities; (2) the clarification,
consolidation, or simplification of compliance or reporting requirements under the rule for such small
entities; (3) the use of performance rather than design standards; and (4) an exemption from coverage of
the rule, or any part thereof, for such small entities.”
49
21. The Commission has taken specific steps to address some of the costs for manufacturers
seeking to use the FCC IoT Label in the Further Notice. We seek to give small and others providers
maximum flexibility and reduce potential costs of compliance with disclosure requirements. We consider
and seek comment on various national security disclosure requirements for applicants seeking to use the
FCC IoT Label. We believe that burdens on small and other providers would be diminished by requiring
these disclosures along with other elements of a manufacturer’s application to use the FCC IoT Label.
The disclosures also define high-risk countries as those on the Department of Commerce’s foreign
adversary list, which applicants must already reference, pursuant to other requirements adopt in today’s
Order. We further believe that it is in the public interest to preserve the integrity of the Cyber Trust Mark
and build confidence among consumers with the additional national security declarations we consider in
the Further Notice.
22. Rather than proposing rules regarding additional national security disclosures at this
juncture, in the Further Notice we seek comment on costs associated with disclosing the jurisdictional
provenance of device software and whether the data collected by products is stored in our transits through
high-risk countries. The Commission is mindful that small and other providers subject to any new rules
adopted in this proceeding may incur compliance costs. The Commission expects to more fully consider
the economic impact and alternatives for small entities following the review of comments filed in
response to the Further Notice. Having input from interested parties will allow the Commission to better
evaluate options and alternatives to minimize any significant economic impact on small entities that may
result from the proposed disclosure requirements discussed in the Notice. The Commission’s evaluation
of this information will shape the final alternatives it considers to minimize any significant economic
impact that may occur on small entities, the final conclusions it reaches, and final rules it promulgates.
F. Federal Rules that May Duplicate, Overlap, or Conflict with the Proposed Rules
23. None.
49
5 U.S.C. § 603(c).
Federal Communications Commission FCC 24-26
119
STATEMENT OF
CHAIRWOMAN JESSICA ROSENWORCEL
Re: Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, Report and Order and
Further Notice of Proposed Rulemaking (March 14, 2024).
Internet of Things devices are all around us. They are multiplying—fast. If you buy a television,
a thermostat, a home security camera, or a fitness tracker today the odds are it is connected the internet.
These smart devices make our lives easier and more convenient. They mean we can watch what we want,
turn down the heat when we are away, check who is at the front door when we are not home, and keep
tabs on our health at all times. It is extraordinary.
Still, the device that I think of most when I think about this new world of the Internet of Things—
and maybe it is because I am a Mom—is a baby monitor. My goodness, you want that to be safe. You
want to know when you bring that monitor into your house to watch your newborn, that connection is
secure and not going to invite any malware or malicious activity into your home. I think parents
everywhere feel this way.
So what do we do about it? What can we do to make sure that the conveniences billions of these
devices offer do not come with the downside of increased security risk? How do we make sure the
everyday connections in our homes are safe?
These are the right questions to ask. Because this increase in connection brings more that
convenience. It brings cyber vulnerabilities. After all, every device connected to the internet is a point of
entry for the kind of attacks that steal our personal data and can compromise our safety.
That is why today the Federal Communications Commission establishes the first-ever voluntary
cybersecurity labeling program for connected smart devices in the United States. The label is called the
U.S. Cyber Trust Mark. When it is displayed, it will mean that the device has been certified to meet
cybersecurity standards. The label will include a QR code linking to a product registry that will provide
consumer-friendly information. Just like the “Energy Star” logo helps us know which devices are energy
efficient, the Cyber Trust Mark will help us make informed choices about the security and privacy of
Internet of Things products we bring into our homes and businesses.
We are building the Cyber Trust Mark program on the well-known cybersecurity criteria
developed by the National Institute of Standards and Technology. We are also building this effort on the
existing model we have at this agency for authorization of devices using radio frequency. So we have
both a framework for standards and a framework for execution. To get it done, we will need expert
partners. We will select third-party administrators, including a Lead Administrator, through a rigorous
selection process that will work with us on the day-to-day details of the program. The administrators
selected will be responsible for receiving and reviewing applications from manufacturers to use the Cyber
Trust Mark.
From the start, we are building national security into the program. No entity or communications
equipment from what is known as the “Covered List” is eligible for a label. And in the a further
rulemaking we ask questions if manufacturers should be required to disclose if firmware or software in
the product was developed in a country that is a foreign adversary.
Our expectation is that over time more companies will use the Cyber Trust Mark—and more
consumers will demand it. This has the power to become the worldwide standard for secure Internet of
Things devices. To get to this point, we know we need to work with our federal partners, manufacturers,
retailers, and cybersecurity groups. We are ready to do just that.
Federal Communications Commission FCC 24-26
120
This is no small task. But it’s worth it. Because the future of smart devices is big and the
opportunity for the United States to lead the world with a global signal of trust is even greater. I
appreciate working with my colleagues on establishing this program and look forward to seeing the Cyber
Trust Mark in the marketplace.
I want to thank the staff responsible for this effort including Steven Carpenter, Rochelle Cohen,
Josh Gehret, Ahmed Lahjouji, Zoe Li, Nicole McGinnis, Drew Morin, Renee Roland, Tara Shostek, and
James Zigouris from the Public Safety and Homeland Security Bureau; Brian Butler, Dana Shaffer, Paul
Murray, Jamison Prime, George Tannahill, and Krista Witanowski from the Office of Engineering and
Technology; Edward Carlson, Jared Carlson, and Brandon Moss from the Office of International Affairs;
Regina Brown and Sarah Stone from the Office of the Managing Director; Hunter Deeley, Matthew
Gibson, Jason Koslofsky, Shannon Lipp, Jeremy Marcus, Ryan McDonald, Elizabeth Mumaw, and
Victoria Randazzo from the Enforcement Bureau; Joy Ragsdale and Chana Wilkerson from the Office of
Communications Business Opportunities; Eugene Kiselev, Mack Wachala, and Aleks Yankelevich from
the Office of Economics and Analytics; and Erika Olsen, Larry Atlas, Andrea Kelly, Doug Klein, Marcus
Maher, Karen Schroeder, Jeff Steinberg, and Chin Yoo from the Office of General Counsel.
Federal Communications Commission FCC 24-26
121
STATEMENT OF
COMMISSIONER GEOFFREY STARKS
Re: Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, Report and Order and
Further Notice of Proposed Rulemaking (March 14, 2024).
Everywhere we look, the term “connected” is attached to products that formerly lacked it.
Products that exist in all of our homes—lightbulbs, thermostats, locks, doorbells, smoke alarms, and even
your toaster and refrigerator—now often come standard with wireless capability and the ability to access
and control a device through the Internet. This innovation, though, is not costless. Far too many Internet
of Things (IoT) products include lackluster security features, if any at all. This is a risk to all of us
because insecure and cheap IoT products can threaten our security, our privacy, and more. They can
allow remote access to our homes, allow bad actors to monitor our comings and goings remotely, lead to
data theft, or, if enough insecure IoT products are combined to form a network, create botnets that can
wreak havoc throughout the Internet through denial of service attacks.
We’ve known about these risks a long time, and today’s Order is the culmination of years of work
by the Biden Administration, the National Institute of Standards and Technology (NIST), government
agencies, and private stakeholders. With the proliferation of connected products available it is
challenging, even for the most informed consumer, to confidently identify the cybersecurity capabilities
of an IoT device. But help is on the way. Once the Cyber Trust Mark is up and running, consumers will
only need to look at the product packaging to determine whether the product meets the standards keyed to
NIST’s Profile of the IoT Core Baseline for Consumer Products (NISTIR 8425). By simply scanning a
QR code on the product, consumers can learn more about specific security features, including, for
example, the minimum support period for the product and instructions on how to change the default
password. Consumers can purchase with confidence knowing that the product, including components
such as the backend and mobile app necessary to use the IoT product, meet baseline standards.
This Cyber Trust Mark is ready to meet the moment. Stories abound about the prevalence of
insecure IoT devices. Just last week, following yet another report of cheap, insecure IoT devices made
from China flooding markets in the United States, I sent letters to five leading retailers to learn more
about the sale, and promotion, of easily hackable video doorbells that lack even basic security measures.
1
I also asked about their plans to incorporate the Cyber Trust Mark into their marketplaces to help
consumers identify IoT products that meet the Mark’s level of security. I look forward to reviewing their
responses, and working together to stop risky and insecure products from entering the commerce stream.
I strongly support the Order we adopt today, and believe the item strikes an appropriate balance
between a voluntary program that entices manufacturers and retailers to participate with teeth to protect
consumers. I particularly would like to thank Chairwoman Rosenworcel for her leadership and for
supporting my ideas to properly scope the Cyber Trust Mark. As I signaled when we considered the
Notice, I believed then that the proper scope for the Cyber Trust Mark needed to be “products,” not
“devices.” The Order we adopt today adhered to that policy cut, and I believe gets it right that the best
frame for the Cyber Trust Mark is IoT products. This is consistent with NISTIR 8425, as well as
consumer expectations, and will ensure that the Cyber Trust Mark is both successful domestically and can
achieve mutual recognition internationally with other cyber labeling programs that focus on IoT products.
Second, I maintain that it is imperative that we do not place our stamp of approval on devices
from products that any branch of the United States government and our allies have identified as part of a
national security review. I’m very happy that the Order keeps that policy as well, excluding from the
Cyber Trust Mark equipment produced by any entity on our Covered List, the Department of Commerce’s
Entity List, and the Department of Defense’s List of Chinese Military Companies. I’m also very happy
1
FCC Commissioner Geoffrey Starks Calls on Online Marketplaces to Stop the Sale of Insecure and Unauthorized
IoT Devices, Release, Mar. 8, 2024, https://docs.fcc.gov/public/attachments/DOC-401038A1.pdf.
Federal Communications Commission FCC 24-26
122
that this prohibition applies to Cybersecurity Label Administrators and CyberLABs participating in the
Cyber Trust Mark.
Third, I thank the Chairwoman for agreeing to language in the Order to make clear that the Lead
Administrator should ensure that the Cyber Trust Mark standards are dynamic and updated when NIST
adopts additional recommendations for routers, cloud, and other aspects of the IoT ecosystem that it is
currently considering. Making it clear that our standards are not stagnant will ensure that consumers are
protected as technology and manufacturers innovate.
Much work remains before we see the first Cyber Trust Mark label on a product’s packaging, but
with today’s vote we are closer than ever. Once the Cyber Trust Mark is available, I look forward to the
innovation that I expect will occur from consumers and the federal government purchasing and deploying
IoT products with confidence knowing that those products meet the core baseline for IoT cybersecurity. I
thank staff for their great work on this item. I strongly approve.
Federal Communications Commission FCC 24-26
123
STATEMENT OF
COMMISSIONER NATHAN SIMINGTON
Re: Cybersecurity Labeling for Internet of Things, PS Docket No. 23-239, Report and Order and
Further Notice of Proposed Rulemaking (March 14, 2024).
I’m thrilled that we are enacting this order today. I’m not exaggerating when I say that it has the
potential to be the beginning of a new era for American cybersecurity policy.
It is long established law in this country that if your car explodes in a minor accident, if a table
saw comes loose and maims you, or if your lightbulb overheats and causes a fire, you can take the
negligent product manufacturer to court and recover your damages. This gives manufacturers a strong
incentive to design safe products. But if an attacker hacks your smart home device, like an Alexa, and
steals your financial information or listens in on your private conversations, you have little to no recourse
against the manufacturer, even if the attack was only possible due to its negligent cybersecurity practices.
This is because device manufacturers and software developers routinely disclaim all liability and
warranties against such failures and tort law provides few protections in the absence of physical injury to
persons or property.
I’ve become increasingly alarmed at this gap in our legal system, and in December of 2022, I first
argued for using our authority under Title III to address negligent cybersecurity practices by wireless
device manufacturers, on the theory that hacked devices could be used to cause harmful interference.
Today, we use exactly that theory to institute this program, a massive first step in bringing legal
accountability to the device industry. I worked hard to make sure that the program will set a high bar for
the security of wireless devices. If manufacturers want to be eligible for the US Cyber Trust Mark, they
will have to declare that they have taken every reasonable measure to create a secure device.
1
They will
have to commit to a support period up front, and during that support period, they will have to diligently
identify critical vulnerabilities in their products and promptly release updates correcting them. Crucially,
they will be prohibited from disclaiming these promises to the consumer. As a result, these promises will
be enforceable not only by the FCC itself, but also by the courts of every state under product warranty and
contract law.
Importantly, this program is optional. The IoT market is incredibly dynamic and innovative—and
young. The risk of inadvertently stifling it with overregulation is real. So instead of imposing mandatory
rules, we are setting a high bar for products to earn the right to use the US Cyber Trust Mark and hoping
that consumers and businesses begin to value that mark because it means that the manufacturer is
confident enough about the security of their product, and their processes for patching security flaws, that
they are willing to stand behind the product legally. Over time, I hope that consumers and businesses,
and their insurers, begin to insist that the products they buy bear this mark.
More work remains to be done. I’m happy that the Chairwoman’s office agreed to include a
further notice of proposed rulemaking on the issue of how to handle devices that run software developed
in hostile countries, that will receive updates deployed from or that can be controlled by servers in such
countries, or that will store user data in those countries. Such devices are at high risk of being weaponized
by hostile powers like China. It is incredibly easy to hide a backdoor in an IoT device, and almost
impossible to detect it, as a good backdoor is indistinguishable from an accidental coding mistake. The
House of Representatives voted to ban one trojan horse yesterday, TikTok, and here at the FCC we need
to make sure that consumers and businesses are aware if they might be buying another one.
1
In recognition of the fact that a device’s security might reasonably depend on the actions of its owner and users,
the order uses the term “securable.”
Federal Communications Commission FCC 24-26
124
We will also need to figure out how to expand this program to computers, smartphones, routers,
and non-consumer devices generally. I hope that as we do so, we focus less on bureaucratic processes and
checkbox compliance exercises and more on simply requiring the manufacturers and software developers
behind those products to put their skin in the game and stop hiding behind broad disclaimers of warranties
and liability if they want their products to bear the US Cyber Trust Mark.
Thank you to the Chairwoman’s office, other Commissioners, and staff for working with me on
getting this item right.
Federal Communications Commission FCC 24-26
125
STATEMENT OF
COMMISSIONER ANNA M. GOMEZ
Re: Cybersecurity Labeling for Internet of Things; PS Docket No. 23-239, Report and Order and
Further Notice of Proposed Rulemaking (Mar. 14, 2024).
I really like this item. The Cyber Trust Mark will help consumers make sense of the myriad
connected devices we use in our daily lives. Just among my office, we use 95 connected devices, and that
does not include the devices we use for our work at the Commission. These are just our personal
devices.
This order establishes a great program for consumers, and I believe in empowering consumers
with information, so I am happy to support it.
I also think that making this a voluntary program strikes the right balance to encourage industry
and manufacturer participation, which is critical for its success. This is a great example of a public-
private partnership in service of the greater public good.
Thank you to the Chairwoman for incorporating our edits about the program also being accessible
in multiple languages and for your visionary leadership in launching it. And thank you to the Public
Safety and Homeland Security Bureau for thinking about every detail that will be needed to launch this
groundbreaking program.