---identifier: "/us/cfr/t31/s578.315"source: "ecfr"legal_status: "authoritative_unofficial"title: "31 CFR § 578.315 - Significant activities undermining cybersecurity."title_number: 31title_name: "Money and Finance: Treasury"section_number: "578.315"section_name: "Significant activities undermining cybersecurity."chapter_name: "OFFICE OF FOREIGN ASSETS CONTROL, DEPARTMENT OF THE TREASURY"part_number: "578"part_name: "CYBER-RELATED SANCTIONS REGULATIONS"positive_law: falsecurrency: "2026-04-05"last_updated: "2026-04-05"format_version: "1.1.0"generator: "[email protected]"authority: "3 U.S.C. 301; 31 U.S.C. 321(b); 50 U.S.C. 1601 1701 Pub. L. 101-410, 104 Stat. 890, as amended (28 U.S.C. 2461 note); Pub. L. 115-44, 131 Stat. 886 (codified in scattered sections of 22 U.S.C.); E.O. 13694, 80 FR 18077, 3 CFR 2015 Comp., p. 297; E.O. 13757, 82 FR 1, 3 CFR 2016 Comp., p. 659."regulatory_source: "87 FR 54376, Sept. 6, 2022, unless otherwise noted."cfr_part: "578"---
Identifier
/us/cfr/t31/s578.315
Currency
2026-04-05
Positive Law
No
Updated
2026-04-05
Chapter
Office of Foreign Assets Control, Department of the Treasury
Authority
3 U.S.C. 301; 31 U.S.C. 321(b); 50 U.S.C. 1601 1701 Pub. L. 101-410, 104 Stat. 890, as amended (28 U.S.C. 2461 note); Pub. L. 115-44, 131 Stat. 886 (codified in scattered sections of 22 U.S.C.); E.O... 3 U.S.C. 301; 31 U.S.C. 321(b); 50 U.S.C. 1601 1701 Pub. L. 101-410, 104 Stat. 890, as amended (28 U.S.C. 2461 note); Pub. L. 115-44, 131 Stat. 886 (codified in scattered sections of 22 U.S.C.); E.O. 13694, 80 FR 18077, 3 CFR 2015 Comp., p. 297; E.O. 13757, 82 FR 1, 3 CFR 2016 Comp., p. 659.
# 578.315 Significant activities undermining cybersecurity.The term *significant activities undermining cybersecurity* includes: significant efforts to deny access to or degrade, disrupt, or destroy an information and communications technology system or network; or to exfiltrate, degrade, corrupt, destroy, or release information from such a system or network without authorization for purposes of conducting influence operations; or causing a significant misappropriation of funds, economic resources, trade secrets, personal identifications, or financial information for commercial or competitive advantage or private financial gain; significant destructive malware attacks; and significant denial of service activities.