Cybersecurity Regulations: Statute and Code Reference
This page provides a structured reference to the 65 regulatory citations tracked across Ransomware Authority. All citations are extracted from page content and verified against primary sources.
Citation Summary
Category
Count
Federal Statutes (U.S. Code)
9
Federal Regulations (C.F.R.)
6
Named Federal Acts
43
Executive Orders
3
Public Laws
4
Total
65
Federal Statutes (U.S. Code)
Federal Regulations (C.F.R.)
Named Federal Acts
Citation
Jurisdiction
AWS CloudTrail, Azure Act
US
Antideficiency Act
US
Azure Act
US
Bank Secrecy Act
US
Bank Service Company Act
US
CISA Cyber Incident Reporting for Critical Infrastructure Act
US
Computer Fraud and Abuse Act
US
Cyber Act
US
Cyber Incident Reporting for Critical Infrastructure Act
US
Cyber Incident Reporting for Critical Infrastructure Act of 2022
US
Cybersecurity Act of 2021
US
Cybersecurity and Infrastructure Security Agency Act of 2018
US
Enemy Act
US
FTC Act
US
Family Educational Rights and Privacy Act
US
Federal Information Security Modernization Act
US
FinCEN Suspicious Act
US
HIPAA Enforcement Act
US
HITECH Act of 2009
US
Health Insurance Portability and Accountability Act
US
Health Insurance Portability and Accountability Act of 1996
US
Homeland Security Act
US
Immediate Act
US
International Emergency Economic Powers Act
US
Leach-Bliley Act
US
Microsoft Act
US
NY SHIELD Act
US
National Emergencies Act
US
Non-Designated Act
US
Notable Ransomware Threat Act
US
Post-Incident Act
US
RaaS Group Act
US
Ransomware Threat Act
US
Review Act
US
SHIELD Act
US
Short-Term Act
US
Suspicious Act
US
The Cyber Incident Reporting for Critical Infrastructure Act
US
The Cyber Incident Reporting for Critical Infrastructure Act of 2022
US
The Health Insurance Portability and Accountability Act
US
Third Extortion Layer Act
US
Threat Act
US
Typical Act
US
Executive Orders
Public Laws
Pages with Regulatory Citations
Recent Regulatory Changes
Monitoring Sources
Citations on this site are monitored against the following regulatory data sources:
Ashrae (last checked: 2026-03-09)
Congress (last checked: 2026-03-09)
Ecfr (last checked: 2026-03-09)
Federal Register (last checked: 2026-02-28)
Nfpa (last checked: 2026-03-09)
Openstates (last checked: 2026-03-09)
Citation data last extracted: 2026-03-08
Explore This Site
Topics (49)
Browse topics…
What Is Ransomware: Definition and Core Concepts
Ransomware Attack Lifecycle: From Intrusion to Extortion
Ransomware Variants: Major Strains and Families
Ransomware-as-a-Service (RaaS): How Criminal Ecosystems Operate
Double Extortion Ransomware: Data Theft and Encryption Combined
Triple Extortion Ransomware: DDoS and Third-Party Pressure Tactics
Ransomware Initial Access Vectors: How Attackers Get In
Phishing as a Ransomware Delivery Mechanism
RDP Vulnerabilities and Ransomware: Exposed Protocols as Entry Points
Lateral Movement in Ransomware Attacks: Techniques and Detection
Ransomware Encryption Methods: Algorithms and Key Management
Ransomware Negotiation: How Ransom Demands Are Handled
Ransomware Payment Considerations: Risks, Legality, and Alternatives
Cryptocurrency and Ransomware Payments: Tracing and Compliance
OFAC Sanctions and Ransomware Payments: US Legal Obligations
Ransomware Incident Response: Step-by-Step Containment and Recovery
Ransomware Recovery Without Paying: Decryption and Restoration Options
Backup Strategies for Ransomware Resilience: 3-2-1 and Beyond
Ransomware Prevention Best Practices for US Organizations
Ransomware Detection Techniques: Behavioral and Signature-Based Approaches
Endpoint Protection Against Ransomware: EDR and Beyond
Zero Trust Architecture and Ransomware Defense
Ransomware Tabletop Exercises: Planning and Execution
Ransomware Reporting Requirements for US Organizations
CISA Ransomware Guidance: Federal Resources and Advisories
FBI Ransomware Reporting: IC3 and Law Enforcement Coordination
Ransomware in US Healthcare: Threats, Regulations, and Response
Ransomware Targeting US Critical Infrastructure: Sectors and Stakes
Ransomware in US Education: K-12 and Higher Education Threats
Ransomware Targeting US Government Agencies: Federal and State
Ransomware in US Financial Services: Regulatory and Operational Impact
Ransomware in US Manufacturing and OT Environments
Supply Chain Ransomware Attacks: Managed Service Provider Risks
Notable Ransomware Threat Actor Groups: Profiles and TTPs
US Ransomware Statistics and Trends: Annual Data and Analysis
Financial and Operational Cost of Ransomware Attacks on US Organizations
Cyber Insurance and Ransomware: Coverage, Gaps, and Claims
Legal Obligations After a Ransomware Attack: Notification and Disclosure
HIPAA and Ransomware: Breach Notification and Compliance Requirements
NIST Ransomware Risk Management: Framework Application and Guidance
Ransomware Decryptor Tools: Free Resources and No More Ransom Project
Ransomware Forensic Investigation: Evidence Preservation and Analysis
Active Directory Exploitation in Ransomware Attacks
Vulnerability Management to Reduce Ransomware Exposure
Employee Security Awareness Training to Counter Ransomware
Business Continuity Planning for Ransomware Scenarios
Ransomware Dark Web Leak Sites: Monitoring and Response
Ransomware Risks for US Small and Medium Businesses
History of Ransomware: Key Attacks and Evolution in the US
Tools & Calculators
Password Strength Calculator