FERC, CFTC, and State Energy Law Developments

On July 21, FERC directed NERC to develop a new or modified “forward-looking, objective-driven” Reliability Standard that addresses supply chain risk management for industrial control system hardware, software, and computing and networking services (“cyber controls”) associated with BES operations. FERC required the standard to address

  • software integrity and authenticity;
  • vendor remote access;
  • information system planning; and
  • vendor risk management and procurement controls.

FERC is concerned that a “gap” exists in the CIP Reliability Standards, which has been highlighted by recent events where malware campaigns have targeted supply chain vendors in BES cyber control systems.

FERC expressed concern that vulnerable systems may be attacked either through hardware or software components of a cyber-control system or a third-party service provider may be attacked who has access to sensitive IT infrastructure or that holds or maintains sensitive data.

On July 21, prompted by cyberattacks highlighting cyber system vulnerabilities that may be exploited to attack the operation and maintenance of interconnected networks, FERC sought comment from industry participants on possible modifications to the CIP Reliability Standards that could address the cybersecurity of control centers used to monitor and control the BES in real time.

The Commission seeks comment on the following:

  • The operational impact of forming a separation between the internet and BES control center cyber systems performing transmission operator functions through use of physical (hardware) or logical (software means).
  • Whether rules should be implemented concerning “application whitelisting,” computer administration practices that would prevent unauthorized programs from running on a system network. FERC believes that application whitelisting could be a more effective mitigation tool than other mitigation measures because whitelisting allows only software applications and processes that are reviewed and tested before use in the system network.

In a final rule issued on June 16, the Federal Energy Regulatory Commission (FERC) directed the North American Electric Reliability Corporation (NERC) to make available to FERC staff certain databases developed by NERC that contain detailed, entity-specific information on transmission and generation assets as well as protection system misoperations.

FERC concluded that it needs access to the information in these databases to carry out its reliability responsibilities under section 215 of the Federal Power Act, including the identification of needed new or modified reliability standards and a better understanding of NERC’s periodic reliability and adequacy assessments. The only changes from FERC’s initial proposal were to limit FERC staff’s access to information about US facilities and to exclude any information voluntarily provided to NERC.

On March 21, 2016, the North American Electricity Reliability Corporation (NERC) submitted an informational filing to update the Federal Energy Regulatory Commission (FERC or Commission) on the implementation of the Risk-Based Registration (RBR) initiative—a program NERC launched to reduce unnecessary compliance and registration burdens through the use of risk-based assessments. The filing is an example of NERC’s continued push towards implementing a risk-based approach to reliability and focusing compliance and enforcement efforts on high-risk areas. As reflected in the filing, certain low-risk entities have been dropped from the NERC Compliance Registry, removing the reliability compliance obligations to which those entities were previously subject.

The electric utility industry has spent vast amounts of money on cybersecurity, an investment that has steadily escalated since the Critical Infrastructure Protection (CIP) Reliability Standards became effective in 2008. Those investments, and the increasingly strict CIP Reliability Standards, were intended to address fears that hackers could use the industrial control systems and other computer systems that control the electric system to cause a blackout. Until recently, that threat was hypothetical. Now, for the first time, public reports have emerged of hackers taking down part of an electric grid.

In late December 2015, hackers allegedly infected several of Ukraine’s power authorities, causing blackouts that lasted several hours and affected thousands of people. Ukrainian authorities confirmed that malicious software infected several control systems, which disabled those systems and resulted in a power outage. The malware, known to have been involved in attacks since 2007, was reportedly embedded in Microsoft Office documents and was retrofitted to include code targeting power stations and other critical infrastructure. Although the geopolitical circumstances in Ukraine are drastically different from those faced by electric utilities in the United States, the attack provides a “proof of concept,” demonstrating that it is possible for an attacker to cause a widespread blackout—the threat is no longer hypothetical.

The newly passed "highway bill" (Fixing America’s Surface Transportation Act) amends the Federal Power Act to incorporate new energy security provisions.

The provisions aim to strengthen the federal government’s authority over electric grid emergency response, facilitate coordination among federal agencies on reliability issues, enhance the protocols for protecting and sharing Critical Energy Infrastructure Information, and exempt utilities from environmental penalties when operating subject to Department of Energy emergency directives.

Please join us for a one-hour webinar about the new provisions and how they will likely affect electric utilities.

Topics will include:

  • An overview of the new provisions
  • The provisions’ background
  • The regulatory steps required

CLE credit: CLE credit in CA (1.0 hour), FL, IL, NJ (via reciprocity), NY, PA, TX, and VA is currently pending approval.

For more information, contact Mary Ann Huntington at +1.202.739.5622 or mhuntington@morganlewis.com.

Register here >>

If signed into law, measures would grant the DOE authority to order utilities to implement emergency protective actions.

Early yesterday morning, H.R. 22 (the Highway Bill) was amended on a voice vote to include an amendment (House Amendment 828) addressing critical energy security issues. Developed by Representative Fred Upton (R-MI) and sponsored by Representative Markwayne Mullin (R-OK), the amendment aims to strengthen the federal government’s authority over electric grid emergency response, facilitate coordination among federal agencies on reliability issues, and enhance the protocols for the protection and sharing of Critical Energy Infrastructure Information (CEII).

The amendment would authorize the Department of Energy (DOE) to order utilities, the North American Electric Reliability Corporation (NERC), or NERC Regional Entities to implement emergency security measures for up to 15 days at a time. Such orders would issue upon a written determination from the President identifying a grid security emergency, which could include malicious electronic or physical attacks or natural events (e.g., geomagnetic storm events) that could disrupt critical electronic devices or communications networks. The amendment provides for the DOE to reissue emergency orders for consecutive 15-day periods if each time the President finds that the emergency is continuing.

To streamline emergency response actions, the amendment would exempt utilities from penalties for violations of Federal Energy Regulatory Commission (FERC or Commission) orders and NERC Reliability Standards due to implementation of emergency security measures directed by the DOE. The amendment acknowledges that utilities may incur substantial costs while implementing emergency orders that may not otherwise be recoverable through existing regulated or market rates. To address this gap, the amendment’s cost-recovery provisions would direct the Commission to establish a separate mechanism that permits recovery of those emergency-related costs, subject to public notice and comment procedures.

If enacted, the bill would also amend section 202(c) of the Federal Power Act, 16 U.S.C. § 824a(c), to provide utilities with protection from environmental penalties while operating under an emergency order issued by the Commission. This would most likely apply in circumstances where DOE directs a generator to operate to ensure system reliability but that generator is required to reduce operations due to environmental limitations. Under existing law, the generator would be required to run but would simultaneously incur penalties for operating in violation of the environmental laws.  

The amendment also aims to strengthen existing CEII protections. Mandatory disclosures of CEII information under the Freedom of Information Act or other federal and state mandatory disclosure requirements would be prohibited. Additionally, the amendment requires the Commission to segregate CEII and non-CEII within the agency and to require sanctions for knowing and willful disclosure of CEII by Commissioners, officers, employees, or agents of FERC.

Not all of the amendment’s provisions seek to unconditionally limit access to information. For example, federal agencies would be allowed to provide temporary access to classified information to entities subject to emergency grid security measures. The amendment also encourages the voluntary sharing of CEII (e.g., between federal and state authorities or between the Commission and cross-border authorities). Additionally, CEII designations by the Commission would last no longer than five years (unless redesignated) and would also be subject to judicial review.

Last, the amendment addresses the reliability risks posed by the unexpected loss of large power transformers. The amendment would require the DOE, FERC, NERC, and electrical infrastructure operators to develop a plan for storing spare large power transformers and emergency mobile substations that can be quickly deployed to temporarily replace damaged large power transformers and substations that serve grid-critical functions. The plan would need to determine, among other things, the number of spare transformers and mobile substations necessary to restore grid resiliency following an outage, the optimal locations of storage facilities, the relative ease and speed of deploying spare transformers and mobile substations, and the cost of implementing such a plan.

Read House Amendment 828.

View the presentation >> | Listen to the recording >>

When:
Tuesday, May 26, 2015
1–2pm

Our Participants:

  • Stephen M. Spina
  • J. Daniel Skees

Join us for a one-hour webinar to discuss how the regulatory changes driven by the Environmental Protection Agency’s (EPA’s) forthcoming Clean Power Plan are expected to affect energy markets and electric reliability in the United States, as well as how those effects create opportunities for energy companies and investors.

Topics will include:

  • Understanding the Clean Power Plan
  • Expected generator retirements
  • The market impact in capacity markets
  • The effects on providers of ancillary services
  • Reliability impacts and proposed solutions
  • Issues with natural gas reliance Investments in gas infrastructure
  • Effects on transmission planning and siting

Credit
CLE credit in CA (1.0 hour), FL, IL, NJ (via reciprocity), NY, PA, TX, and VA is currently pending approval.

More information
Please contact Mary Ann Huntington at +1.202.739.5622 or mhuntington@morganlewis.com.

See more at: http://www.morganlewis.com/events/epas-clean-power-plan-opportunities-and-effects-on-energy-markets

The D.C. Circuit concluded that sovereign immunity prevents FERC and NERC from imposing monetary penalties on federal agencies that violate Reliability Standards.

Resolving a dispute between the Federal Energy Regulatory Commission (FERC) and the Southwestern Power Administration (SWPA), the U.S. Court of Appeals for the District of Columbia Circuit concluded that federal sovereign immunity prevents FERC, as well as the North American Electric Reliability Corporation (NERC), from imposing monetary penalties on federal agencies that violate mandatory Reliability Standards. As a result of the August 22 decision, federal agencies that are users, owners, and operators of the bulk-power system, such as the various federal power marketing administrations, will not be subject to fines if they violate any of the dozens of Reliability Standards that regulate everything from real-time power system operations to electric utility cybersecurity. Although these agencies are still subject to other enforcement mechanisms, such as compliance directives, the major enforcement tool available to FERC and NERC no longer applies to them.

In this case, the SWPA, which markets hydroelectric power, was fined $19,500 for violating Reliability Standards. FERC upheld the penalty, which had been filed by NERC, on the grounds that section 215 of the Federal Power Act requires the SWPA to comply with Reliability Standards and FERC has the authority to enforce those standards, including through monetary fines, against any entities subject to FERC’s reliability jurisdiction.

On July 17, the Federal Energy Regulatory Commission (FERC) proposed to approve[1] a new mandatory reliability standard that would require electric utilities to protect their transmission facilities and control centers against physical threats. Although FERC did not take issue with most of the language in the CIP-014-1[2] standard proposed By the North American Electric Reliability Corporation (NERC), FERC did express concern over the ability of utilities to identify their own critical facilities, even when that determination is subject to third-party review. To address that concern, FERC proposed to direct NERC to modify the standard so that FERC, or other appropriate federal agencies, could direct electric utilities to add additional facilities to their list of facilities that need physical security protections.