When cyber threat sharing laws lapse: Legal risk in a government shutdown

The recent shutdown of the federal government has left many critical services in limbo, including the nation’s primary cybersecurity agency. Amid the ongoing budget standoff in Congress, funding for the Cybersecurity and Infrastructure Security Agency lapsed, coinciding with the expiration of the Cybersecurity Information Sharing Act of 2015.

The expiration of the Act creates operational and legal uncertainty for organizations at a time when cyberattacks are at an all-time high. The law had long provided liability protection for companies that shared cyber threat information in good faith, establishing a legal framework for public-private defense collaboration.

Role of CISA

Before the Act took effect in 2015, companies that alerted federal partners or peers about cyber incidents risked violating privacy, contract, and competition laws. The Act was designed to remove those disincentives and encourage information sharing by providing the following:

  • Liability protections: Shielded companies from privacy, contract, and antitrust claims when sharing threat data in good faith via channels developed and approved by the DHS.
  • Privacy safeguards: Required the removal of personal data, and limited sharing to information necessary to address cybersecurity threats.
  • Freedom of Information Act exemptions: Ensured that shared data could not be disclosed through public records requests, protecting trade secrets and sensitive operations.
  • Preemption: Overrode conflicting state laws to create one consistent federal standard for sharing information about cyber threats.

The 2015 Act also laid the groundwork for the creation in 2018 of CISA, the agency, which now leads the federal government’s coordination on cyber defense and infrastructure protection. The agency promotes information sharing as the backbone of a “defense-in-depth” strategy, recognizing that no single entity can defend alone.

Recent developments and risk implications

Returning to the present, as the federal funding lapse forced widespread furloughs across government agencies, CISA was left operating with only a fraction of its workforce. Essential cyber incident response teams remain active, but many of the agency’s collaborative and preventive functions have been put on hold.

To make matters worse, the 2015 Act expired on September 30, 2025. Although lawmakers have introduced proposals to renew or replace the law, the path forward remains uncertain amid ongoing political gridlock.

Without the Act, companies arguably lose their protection against federal liability, increasing their legal exposure and reducing situational awareness across sectors. These risks include the following:

  • Privacy and negligence claims if shared data contains personal or confidential information.
  • Antitrust scrutiny when coordinating threat intelligence with competitors.
  • FOIA and disclosure risks for data shared with government agencies.
  • Operational slowdowns as legal review and anonymization steps increase.
  • Insurance and audit pressure require documentation and justification for sharing decisions.
  • Weakened collective defense results from reduced sharing, leaving critical sectors exposed.

Steps to take now

The simultaneous shutdown of federal operations and the expiration of the Act have created a gap in the nation’s cyber defense framework. To safeguard their information-sharing strategies, companies should consider taking these steps:

  • Review and tighten internal thresholds and policies for sharing.
  • Revisit intercompany, vendor, and consortium contracts to clarify terms and indemnities.
  • Strengthen privacy, data-minimization, and anonymization practices.
  • Document all legal risk assessments and board-level decisions.
  • Engage proactively with insurers to confirm exposure and coverage.
  • Maintain strong internal detection and response capabilities.
  • Monitor legislative reauthorization efforts and participate in industry forums to stay informed and engaged.

Congress continues to debate how to renew or reform the 2015 Act, and any new law may include expanded safe harbors or state-level alternatives. In the meantime, close monitoring, documented decision-making, and proactive governance remain key to compliance and resilience.

The Constangy Cyber Team helps businesses of all sizes and industries develop comprehensive incident response plans and provides support during a breach. We are here to help! Contact us 24/7 at breachresponse@constangy.com or by phone at 877-DTA-BRCH.

  • Lauren Godfrey wearing a gray blazer over a white top, accessorized with a cross necklace and drop earrings, arms crossed, posed against a light blue and white geometric background.
    Partner

    Lauren guides clients through data security incidents, leading initial assessments and coordinating forensic and remediation efforts to contain, investigate, and resolve issues. She helps clients develop privacy, incident ...

The Constangy Cyber Advisor posts regular updates on legislative developments, data privacy, and information security trends. Our blog posts are informed through the Constangy Cyber Team's experience managing thousands of data breaches, providing robust compliance advisory services, and consultation on complex data privacy and security litigation. 

Search

Get Updates By Email

Subscribe

Archives

Jump to Page

Constangy, Brooks, Smith & Prophete, LLP Cookie Preference Center

Your Privacy

When using this website, Constangy and certain third parties may collect and use cookies or similar technologies to enhance your experience. These technologies may collect information about your device, activity on our website, and preferences. Some cookies are essential to site functionality, while others help us analyze performance and usage trends to improve our content and features.

Please note that if you return to this website from a different browser or device, you may need to reselect your cookie preferences.

For more information about our privacy practices, including your rights and choices, please see our Privacy Policy. 

Strictly Necessary Cookies

Always Active

Strictly Necessary Cookies are essential for the website to function, and cannot be turned off. We use this type of cookie for purposes such as security, network management, and accessibility. You can set your browser to block or alert you about these cookies, but if you do so, some parts of the site will not work. 

Functionality Cookies

Always Active

Functionality Cookies are used to enhance the functionality and personalization of this website. These cookies support features like embedded content (such as video or audio), keyword search highlighting, and remembering your preferences across pages—for example, your cookie choices or form inputs during submission.

Some of these cookies are managed by third-party service providers whose features are embedded on our site. These cookies do not store personal information and are necessary for certain site features to work properly.

Performance Cookies

Performance cookies help us improve our website by collecting and reporting information on its usage. We access and process information from these cookies at an aggregate level.

Powered by Firmseek