The term significant activities undermining cybersecurity includes: significant efforts to deny access to or degrade, disrupt, or destroy an information and communications technology system or network; or to exfiltrate, degrade, corrupt, destroy, or release information from such a system or network without authorization for purposes of conducting influence operations; or causing a significant misappropriation of funds, economic resources, trade secrets, personal identifications, or financial information for commercial or competitive advantage or private financial gain; significant destructive malware attacks; and significant denial of service activities.
authority: 3 U.S.C. 301;
31 U.S.C. 321(b);
50 U.S.C. 1601-1651,
1701; Pub. L. 101-410, 104 Stat. 890, as amended (
28 U.S.C. 2461 note); Pub. L. 115-44, 131 Stat. 886 (codified in scattered sections of 22 U.S.C.); E.O. 13694, 80 FR 18077,
3 CFR 2015 Comp., p. 297; E.O. 13757, 82 FR 1,
3 CFR 2016 Comp., p. 659
source: 87 FR 54376, Sept. 6, 2022, unless otherwise noted.
cite as: 31 CFR 578.315