No Good Deed Goes Unpunished: Why Voluntary Disclosure of Cybersecurity Violations Doesn’t Mean You Won’t Be Punished for Bad Security
一家国防承包商因未遵守网络安全要求而主动向政府报告并整改后仍被罚款175万美元。案例揭示即使公司主动披露问题并积极整改,仍可能面临法律后果。合规是唯一的安全保障,自愿披露仅能减轻处罚,但无法完全免责。 2025-10-14 09:37:42 Author: securityboulevard.com(查看原文) 阅读量:93 收藏

Avatar photo

What do you do when you discover that your cybersecurity is not what you have promised, even though there has not been an incident or breach? Do you (A) ignore it and hope it goes away; (B) fix the problem; or (C) tell your customer that you screwed up, and then fix the problem? While much of what you do may depend on what your contract says, as well as whether you are putting the privacy and security of data at risk (always try to do the right thing), a recent incident shows that even doing the right thing can cost you. A company that found a lack of security compliance, informed the government and fixed the problem ended up being fined for its efforts.

Voluntary Disclosure Programs

The idea of voluntary disclosure has always been sold as a kind of bargain with the government. If companies come forward when they discover security lapses, report them quickly, and fix them responsibly, they will receive credit for candor and cooperation. The Cybersecurity Information Sharing Act of 2015 (CISA) was built on precisely this idea. Congress wanted to remove the fear that disclosing vulnerabilities would create new liabilities, so the statute promised that cyber threat indicators shared with the Department of Homeland Security would not waive privilege, could not be obtained through FOIA, and would not be used against the company in regulatory proceedings. The hope was that this protection would encourage robust information sharing, creating a collective defense against cyber threats.

The Department of Justice and the Department of Defense have their own versions of the same promise. DOJ’s Corporate Enforcement Policy, embedded in the Justice Manual, explicitly encourages companies to self-report wrongdoing, cooperate with investigations, and remediate violations. The policy states that such disclosures can lead to reduced penalties and, in some circumstances, even declinations of prosecution. The Department of Defense, through its Voluntary Disclosure Program, likewise invites contractors to report potential fraud or misconduct in connection with defense contracts, promising that honesty will be rewarded with leniency. The purpose of these policies is not to grant immunity but to create incentives — essentially telling companies that the consequences of hiding violations will be worse than the consequences of revealing them. The federal CISA statute (up for renewal this September) also encourages voluntary disclosures.

The recent settlement between defense contractor Aero Turbine, Inc. (“ATI”) and its private equity owner Gallant Capital Partners LLC (“Gallant”) shows the limits of this bargain. Between January 2018 and February 2020, ATI apparently failed to implement core cybersecurity controls required under NIST SP 800-171, controls that were expressly incorporated into its Air Force contract through DFARS 252.204-7012. Even more seriously, in mid-2019, ATI and Gallant shared files containing sensitive Controlled Unclassified Information (CUI) with a software company in Egypt whose employees were not authorized to access the data.

When ATI and Gallant discovered these problems, they did not cover them up. They hired outside investigators, submitted written disclosures to the government, cooperated with DOJ, identified those responsible, and promptly remediated their systems. The Department of Justice acknowledged this conduct, praised their cooperation, and applied its enforcement policy to reduce the penalties they faced. And yet, the companies still paid $1.75 million to resolve allegations under the False Claims Act that they had submitted claims to the government while falsely representing compliance with their contractual cybersecurity obligations. The essence of the False Claims Act was not that the company did not do the work they had contracted to do with DoD, but rather that, when they did so, they falsely certified that they were FEDRAMP compliant and secure.

The legal reasoning is straightforward. By billing the Air Force for work under a contract that required compliance with NIST SP 800-171, ATI implicitly represented that it was meeting those standards. In reality, it was not. Under the Supreme Court’s reasoning in Universal Health Services, Inc. v. United States ex rel. Escobar, 579 U.S. 176 (2016), a claim for payment that omits a material noncompliance with contractual terms can constitute a false claim. No amount of voluntary disclosure after the fact erases the fact that the government was billed under false pretenses.

That is why the disclosure policies, both under CISA and DOJ’s Corporate Enforcement Policy, function more as sentence reductions than as get-out-of-jail-free cards. They mitigate the damage, but they do not erase liability. The Aero Turbine settlement is proof of that. The government still recouped money, imposed restitution, and reinforced the principle that compliance is not optional. Of course, it might have been much worse if the company had not disclosed the noncompliance – the government might have sought to punish the company more severely, or even sought criminal penalties.

What Should Lawyers Do?

For contractors and cybersecurity professionals, the lesson is uncomfortable but clear. Disclosure is the right move — it reduces exposure and shows good faith — but it is not a shield against punishment. If you fail to implement the required controls, if you misrepresent compliance, or if you expose sensitive data to unauthorized parties, you remain liable no matter how forthright you are afterward. The voluntary disclosure regimes exist to encourage openness, but they do not rewrite contracts, nor do they amend the False Claims Act.

The paradox is that this dynamic may undermine the very incentive structure these programs were meant to create. If every disclosure carries a hefty price tag, some companies may decide that silence is safer, hoping the lapse is never discovered. That is the tension at the heart of CISA and the DOJ/DOD guidelines: they promise leniency but not immunity, credit but not absolution.

In the end, the Aero Turbine case reminds us that in cybersecurity contracting, the only real safe harbor is compliance itself. The disclosure provisions may soften the blow, but as the old saying goes — and as this case shows — no good deed goes unpunished.

Techstrong Gang Youtube

Recent Articles By Author

Avatar photo

Mark Rasch

Mark Rasch is a lawyer and computer security and privacy expert in Bethesda, Maryland. where he helps develop strategy and messaging for the Information Security team. Rasch’s career spans more than 35 years of corporate and government cybersecurity, computer privacy, regulatory compliance, computer forensics and incident response. He is trained as a lawyer and was the Chief Security Evangelist for Verizon Enterprise Solutions (VES). He is recognized author of numerous security- and privacy-related articles. Prior to joining Verizon, he taught courses in cybersecurity, law, policy and technology at various colleges and Universities including the University of Maryland, George Mason University, Georgetown University, and the American University School of law and was active with the American Bar Association’s Privacy and Cybersecurity Committees and the Computers, Freedom and Privacy Conference. Rasch had worked as cyberlaw editor for SecurityCurrent.com, as Chief Privacy Officer for SAIC, and as Director or Managing Director at various information security consulting companies, including CSC, FTI Consulting, Solutionary, Predictive Systems, and Global Integrity Corp. Earlier in his career, Rasch was with the U.S. Department of Justice where he led the department’s efforts to investigate and prosecute cyber and high-technology crime, starting the computer crime unit within the Criminal Division’s Fraud Section, efforts which eventually led to the creation of the Computer Crime and Intellectual Property Section of the Criminal Division. He was responsible for various high-profile computer crime prosecutions, including Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris. Prior to joining Verizon, Mark was a frequent commentator in the media on issues related to information security, appearing on BBC, CBC, Fox News, CNN, NBC News, ABC News, the New York Times, the Wall Street Journal and many other outlets.

mark has 230 posts and counting.See all posts by mark


文章来源: https://securityboulevard.com/2025/10/no-good-deed-goes-unpunished-why-voluntary-disclosure-of-cybersecurity-violations-doesnt-mean-you-wont-be-punished-for-bad-security/
如有侵权请联系:admin#unsafe.sh