careeraddict favicon

School Leavers

  • Jul 3, 2024
  • 13 min read

Should I Go to University? 10 Pros and 10 Cons to Consider

To go or not to earn an academic degree? That is the question.

Joanna Zambas

Joanna Zambas

Content Manager and Career Expert

Reviewed by Melina Theodorou

student thinking 'Should I Go to University?'

Pursuing higher education allows you to develop knowledge, learn new skills and better your professional prospects. That said, going to university comes with its set of advantages and disadvantages, both of which you must consider before enrolling in a course.

Below, we’ll walk you through the pros and cons of going to university to help you make a more confident and informed decision.

Pros of going to university

Here are 10 benefits of going to university worth considering:

1. You’ll be able to secure specialised jobs

Gaining a university degree in your area of interest will improve your chances of securing a job role in specialised fields. Indeed, most skilled jobs require academic training as well as a bachelor’s and master’s degree. Some examples include careers in healthcare, engineering, education, law and accounting.

So, while there are many alternatives to university , a university education is essential for certain roles and careers.

2. You’ll earn more money

Did you know that college graduates earn significantly more than high school leavers?

So, if you’re a high school student aspiring towards having a lucrative career, a college degree will give you a head start.

Meanwhile, if you’re a professional with industry experience and you’re hoping to land a promotion or develop your career further, a university degree can certainly help. That said, this will also depend on your industry as well as your employer.

3. You’ll develop transferable skills

Transferable skills refer to a set of skills that you can use in any job role. Some of the most useful transferable skills include communication , critical thinking, teamwork, multitasking, leadership and creativity.

So, attending a university will not only provide you with specific subject knowledge but also a chance to hone other skills that make you more employable .

4. You’ll broaden your mind

Going to university gives you a chance to move somewhere new, meet people from diverse backgrounds, and make friends from across the world.

Not only will you broaden your social circle but your mindset, too.

Plus, apart from studying, you can throw yourself into other extracurriculars that revolve around culture, politics, arts and sports. All of which will contribute to your personal growth.

5. You’ll gain expertise in your favorite subject

If you know what field you wish to pursue a career in or are passionate about a particular subject and want to learn more about it, then college could be for you.

Pursuing a degree will help you become an expert in your areas of interest and allow you to delve deeper into these topics. You could even pursue a career within academia by obtaining a master’s and PhD qualification after finishing your undergraduate studies.

6. You’ll hone your research skills

A university degree teaches you how to think analytically and critically, but also how to conduct thorough research, question assumptions, become apt at solving problems and deduce informative conclusions.

Whether it’s research for a bio-med project or a literature thesis, this is a skill that is invaluable to employers, and one that you will utilize time and time again throughout your career.

7. You’ll have access to networking opportunities

Your professional network plays a critical role in your success in this day and age.

University will allow you to create and broaden your network of professional contacts, be it through volunteering opportunities , internships or meet-and-greets that can bring you in touch with potential employers and people who can support you in your future endeavors.

8. You’ll become more independent

For young students, university life gives you a taste of living independently. Not only are you exposed to new social settings but you also learn about basic life skills such as doing the laundry, cooking and paying bills.

This newfound sense of independence will give you a chance to grow into an adult and give you more responsibility over yourself. It may sound daunting at first, but you’ll learn a lot and grow from this experience.

9. You’ll be able to see the world

If you choose to enroll in an academic institution in a different country, this will give you the chance to travel and study at the same time. At many universities, you’ll also have the option to do a year abroad , and there may also be courses that include field trips to different countries.

So, if you’re passionate about traveling and exploring new places, university could definitely open up a few opportunities for you to do just that.

10. You’ll gain work experience

As a university student, you’ll have your fair pick of internships and part-time jobs to choose from, which will allow you to attain experience and gain technical skills. Some degree programs offer a year in industry, but also job placement opportunities that you can pursue during summer breaks.

This will ultimately give you a head start as a graduate looking for entry-level positions, and it will certainly contribute to your résumé.

Cons of going to university

Like everything else, going to university has its shortcomings. Here are 10 disadvantages of going to university.

1. You’ll end up in debt

Everyone knows how expensive education is nowadays. Therefore, unless you have the financial means to pay for your education upfront, you’ll be graduating not just with a degree but also a considerable debt .

Plus, there other expenses you need to take into consideration, including your accommodation costs as well as living expenses.

That said, you can always apply for financial aid, scholarships and bursaries that will lift some of the financial burden off your shoulders.

2. You’ll commit a long time to your studies

Going to university is a long-term commitment, which could require three to eight years of your life, depending on the course you choose to take.

This can be a real challenge if you’re a working professional, because you’ll have to give up your full-time job to return to university.

But even if you’re a young student, this factor can still be a consideration for you. After all, you’ll be depriving yourself of years of income and piling on student debt. That said, part-time study options could allow you to work while you work towards your degree .

3. You won’t be guaranteed a job

The only guarantee you get from going to university is that you’ll be graduating with a degree (if you work hard enough). Apart from that, there is no guarantee that you’ll find a job in your field easily or that you’ll be promoted.

The job market remains quite competitive, and you’ll need to assemble a variety of skills, qualifications and experience in order to stand out from other candidates. However, on many occasions, a college degree could be a minimum requirement to qualify for a role.

4. You’ll lack technical skills

Not all degrees offer hands-on experience and the chance to develop technical skills .

While many entry-level roles do offer training, your lack of technical skills could prolong how quickly you land a job and kick-start your career.

Internships, part-time work and volunteering are all great options to attain some technical experience in the fields you’re interested in.

5. There won’t be a lot of contact time

Some courses may offer significantly less contact time than others.

At school, you may have gotten a solid eight hours of classes, five days a week, but at university, you might find that you only have five to eight hours of lectures, seminars and workshops a week. While this does depend on the faculty and course you select, it could still be deterring to receive such few hours of teaching considering the extravagant tuition fees you will be paying.

A lot of courses require independent study and research, so you’ll likely find yourself more often sitting in the library than in a lecture hall.

6. It can be overwhelming

While studying at a university can be exciting, it can also be an overwhelming experience, especially if you’re living far away from home. Moving away can be stressful and very hard for those attached to their family and friends.

Homesickness is quite common, especially among college freshmen, but it’s something you can overcome with time, especially if you devote yourself to your studies.

7. You may earn less than an apprentice

It may come as a surprise, but you can earn more with an apprenticeship than with an undergraduate degree.

Apprentices get a pay increase through an award program as they progress from one level to another; they may earn a higher salary than you based on the time they have been working in a company or because of their level of competency and experience.

So, in some cases, embarking on an apprenticeship may be a more viable option than pursuing a degree in that field.

8. You’ll have intense workload

School is hard.

On top of seminars and lectures, there’s also mid-term exams, coursework, projects and essays to be written . Juggling this kind of workload can be overwhelming, especially if you also choose to work during your studies or decide to take part in sports and societies, which will also take up a good chunk of your time.

If you’re prone to stress and you struggle with multitasking and organization, university could be quite challenging, but you’ll adapt and learn how to cope with your workload with time.

9. It requires a lot of self-discipline

Throughout your degree, you’ll be responsible for managing your own time and studies. It will require a lot of self-discipline on your part.

Of course, this is a great learning experience and an opportunity to grow, but if you don’t feel ready to take this kind of step, then perhaps you could consider other alternatives to university and enroll when you are ready.

10. You might change your mind

What if you register on a course and later change your mind to choose a different career path ? Well, you’ll have to wait till next semester to make the switch.

However, the university may not transfer your previously acquired credit hours to the new academic program, so you might have to start all over again. However, if you end up studying the subject you’re truly passionate about, then it will be worth it!

How to decide if you should go to university

Reflecting on the following questions can help when you’re stuck in this dilemma. Writing down your answers in a journal or your notes app can help, as you’ll be able to revisit them at a later stage and see what still resonates.

1. What is your end goal?

Not everyone has a clear picture of what they would like their future to look like. It can be hard to picture “the rest of your life” when you’ve just finished school, after all. But although your circumstances and some of your preferences might change over time, some things, like your values, likely won’t.

If you get pure joy out of something (let’s say traveling or caring for animals ), it’s unlikely that it will go away anytime soon. So, ask yourself: would working 9 to 5 from a small cubicle make me happy? Would I want more flexibility and a better work–life balance? Would I be better off being my own boss?

Consider your character and where you feel most “at home”. That will give you a hint as to what lifestyle would suit you, and you can start setting goals to get there.

2. Is a degree required for your desired profession?

If your desired career path doesn’t strictly require a degree, you could be better off completing an apprenticeship or internship instead of going to university.

Enrolling in an associate’s degree instead of a bachelor’s degree, or completing a shorter diploma, combined with your work experience could give you an advantage over other candidates while also removing the need to stay in university for four years or more.

3. Can you afford it?

Although university can be costly, an associate’s degree can earn you nearly half a million dollars more over the span of your career than if you had not attended university at all. A bachelor’s degree, meanwhile, can earn you twice as much — that’s according to a 2024 report by the Georgetown University Centre on Education and the Workforce. When researching different ways of funding your studies, keep these figures in mind!

Having said that, some industries are likelier to pay more attention to your work experience than your educational qualifications — so, be sure to do your research into the typical requirements for your target role, any prospective employers you have in mind, and your industry more generally.

4. Have you considered any other options?

If it’s not a loud “yes!”, it’s likely a “no”. So, rather than take out student loans and push yourself to do something you’re not fully committed to, explore your options — and give yourself a deadline if the idea of exploring indefinitely makes you anxious.

You could, for example, work for six months to build your skill set, earn some money, and make professional connections; or you could volunteer, combining part-time work with helping others. If it doesn’t turn out to be what you wanted, you can submit your college application at the next opportunity.

If you find work in a relevant field to the one you dream of working in, even better! It will give you a real flavor of what the work is like, which will be an eye-opener.

5. Do you see yourself returning to school later in life?

People will tell you that it’s never too late to follow your dreams, and that you can always change your mind. While it’s true that attending university as an older adult is by no means impossible, it does come with its own set of challenges.

You’ll be juggling studying with working, at the least. Throw parenting, caregiving or other responsibilities that may come with being an older adult into the mix, and you see how little time you’re left with for rest, hobbies and socializing — all of which are vital components in your wellbeing.

Sometimes, the best time is now.

Final thoughts

In 2023, 61% of recent high school graduates went on to enroll in colleges and universities. Though that’s the majority, there is still a significant number of young adults who choose different paths; some go on to find work, some take a gap year , and some (no doubt) graduate and have no plan at all.

No matter how you look at it, any decision you make is bound to have its positives and negatives. So, give yourself enough time to reflect, weigh all the pros and cons, and don’t entirely dismiss your intuition. Sometimes we know what we want but second-guess ourselves anyway.

Join the discussion! Can you think of any other reasons you should or shouldn’t go to university? Share them with us in the comments section below!

This article is a partial update of an earlier version originally published on August 25, 2017, and contains contributions by Electra Michaelidou. In the update, we added a new section called “How to decide if you should go to university”.

Career Planning

Going to University

advantages and disadvantages of going to university essay

PrepScholar

Choose Your Test

  • Search Blogs By Category
  • College Admissions
  • AP and IB Exams
  • GPA and Coursework

Should You Go to College? 4 Pros and 3 Cons

College Admissions , College Info

feature_go_to_college.png

The decision to attend college is a big one. Getting a college degree takes time: at least four years for most people. Getting a college degree also costs money: tens of thousands of dollars for most people. You might be asking yourself, "Is it worth it? Should I go to college?"

In this article, I'll explain the benefits of going to college and detail some of the potential drawbacks. Furthermore, I'll give you all the information you need to decide whether or not you should pursue a college degree.

4 Major Benefits of Going to College

Going to college can make you richer, happier, and healthier—sounds good to me! Here, we take a look at the four biggest benefits of attending college.

#1: There Are Many Financial and Career Benefits

Let's start by considering the financial advantages of a college education.

College graduates with a bachelor's degree earn about $32,000 more per year than those with a high school diploma or its equivalent.

Here's one of the most cited statistics that shows the benefits of a college education: a person with a bachelor's degree will, on average, earn almost $1 million more over the course of her lifetime than somebody with just a high school diploma . While money shouldn't necessarily be the biggest priority in anyone's life, there's no doubt that a higher salary will give you more opportunities, alleviate stress, and allow you to more easily support a family.

Moreover, college-educated Millennials have much lower unemployment and poverty rates. According to recent studies from 2020 to 2021 by the New York Federal Reserve Bank , young people aged 22-27 are more likely to be unemployed if they don't have a college degree. Unemployment among those with a college degree was 3.9%, but it was 10.3% for those without a degree.

In addition, those who attended college are more likely to get married and less likely to be living in their parents' homes. Statistics indicate that attending college has more economic benefits for Millennials than it did for previous generations. Going to college might be more important now than ever before!

Finally, a college degree is required for many entry-level jobs. According to a study done b y the Georgetown Public Policy Institute , 65% of jobs now require postsecondary education and training beyond high school, and 35% of jobs require at least a bachelor's degree.

body_job.png

As you can see, there are tons of financial benefits to getting a bachelor's degree. But what about the professional advantages?

In college, you can make connections that will help you land a good job after you graduate. Experts estimate that 70%-80% of jobs aren't advertised publicly . Often, you simply have to know the right people to secure employment.

Many companies also offer internship programs to college students that can lead to full-time employment after you graduate.

Furthermore, most colleges offer free career counseling and can put you in touch with employers and alumni who can help you find a job. Colleges will often have job fairs as well, where recruiters come to campus looking for qualified students to work for their companies. These fairs give you an opportunity to form relationships with company representatives who can assist you professionally.

Lastly, many of your peers will probably go on to professional success. Your college friends might one day be able to offer you a job, refer you for a job, or make a lucrative business deal with you. As a college student, you'll (likely) be surrounded by many motivated, talented people who, in the future, will want to work with those they know and trust—and this could very well include you.

#2: You Get to Explore Your Interests

College opens up a whole new world to you academically. In high school, you generally only have a choice of a handful of elective classes, but in college you can literally choose from among hundreds of classes and majors.

While there are core requirements at most colleges, for the most part, you can decide what you want to study and take classes in subjects you want to learn more about. Many students are able to spark academic passions in college.

You could take classes in anthropology, psychology, sociology, microbiology, or osteology. Many college grads have several friends and former students who were inspired by college classes that positively changed the course of their academic and professional lives.

Also, while in college, you'll have the chance to pursue tons of extracurriculars and opportunities you might not otherwise have done. These activities can become lifelong passions, help you form meaningful relationships, and even prepare you for a future job.

For example, you could write for the campus newspaper, or you could be a DJ for the school radio station. You could dance for a hip-hop group, or join a campus organization that provides tutoring to underprivileged kids. You could help build houses for those in need. You could work on political campaigns or join groups that advocate for various social issues. The choice is yours!

body_howard_stern.jpeg

Howard Stern started his career working at the radio station at Boston University.

#3: You'll Have Fun and Make Friends

Many students enjoy their college experience. Too often people discount the importance of fun when it comes to education, and for some people, their best memories and most fun times are from their college years. On a college campus, you can attend parties, plays, sporting events, and concerts; you can also create your own random fun with your peers.

Most schools bring exciting events and speakers to their campuses, too. Colleges will often host famous musicians and comedians. For example, The Weeknd has performed shows at Syracuse, Northeastern, Lafayette College, and the University of Minnesota, while Drake has performed at numerous colleges, including Howard, SUNY Purchase, and the University of Kentucky.

Colleges will also sponsor parties and other on-campus events that are just meant to be fun and facilitate social interaction. At Stanford, there's a tradition known as Full Moon on the Quad . On the first full moon of the school year, students gather in the quad, and the seniors welcome the freshmen by kissing them. There's a lot of kissing. It might not be hygienic, but it's memorable.

You may make very close friends while you're attending college. In college, you get to befriend people from all over the US and even other countries. A big part of the college experience is having the opportunity to learn from and interact with people from diverse backgrounds.

Overall, you have the chance to study, live, party, and participate in extracurricular activities with your peers. There will probably be no other time in your life when you get to spend as much time with your friends, and the amount of quality time you get to spend with them will form the foundation for meaningful lifelong friendships.

#4: It Gives You Space for Self-Improvement

For many students, college is the first time in their lives they're not living at home. During college, they learn to be self-sufficient. They learn domestic skills and budgeting—even how to motivate themselves without parental encouragement. At the same time, most college students can still go home or call home if they're in need of some money or advice.

Many people who don't go to college remain at home for at least a couple of years after high school. Though they often have more freedom than they did during high school, their routines and mindsets don't change nearly as drastically as those who went to college. Anecdotally at least, even students who live at home and commute to college experience more growth than those who bypass college.

Whether you go to an in-state or out-of-state school, your college will likely expose you to a new city and environment. For instance, if you grew up in California and went to Stanford , it could still be a six-hour drive from where your family lived. You would be able to experience life in Northern California and the San Francisco Bay Area, which has a different vibe, culture, and climate from, say, Los Angeles. Many college students are grateful to be able to have the opportunity to live in a different environment.

Furthermore, most colleges have study abroad programs that can give you a chance to take classes in countries around the world. At Emerson College, you can spend a semester in a 14th-century medieval castle in The Netherlands. At the University of Chicago , you can study abroad in Paris, Beijing, Barcelona, Berlin, Kyoto, Bologna, Cairo, Istanbul, Jerusalem, Edinburgh, Hong Kong, London, Oaxaca, Vienna, Milan, and a few other places, too. You can learn about the world by traveling and studying in countries around the world.

Finally, people who go to college tend to be healthier. According to a report from the National Academy of Sciences , people with a bachelor's degree live longer than people without one. They're also less likely to smoke and more likely to exercise.

Similarly, according to a study published by the American Journal of Public Health , people who get a bachelor's degree after 25 years of age exhibit fewer depressive symptoms and have better self-rated health at midlife.

body_apple.jpeg

3 Possible Disadvantages of Attending College

Even though attending college can offer you many benefits, there are potential drawbacks.

Note that you only get many of the benefits of going to college if you're able to graduate. A 2021 Forbes article reported that, six years after enrolling in college, less than 60% of students had graduated with a bachelor's degree.

Now, let's take a look at the three biggest cons of attending college.

#1: There's the Risk of High Costs and Potential Debt

College is really, really expensive, with costs continuing to rise, and many college graduates are burdened with astronomical student loan debt.

The College Board estimates that the average cost of attendance for an in-state public college for 2021-2022 is $10,740 , while the cost of attendance for a private college averages $38,070.  Remember, though, that most students receive financial aid that covers at least part of the cost of attendance if they demonstrate financial need.

Unfortunately, many students don't receive the aid they need to fully cover the costs. As a result, they take on unsubsidized student loans to finance their college education. Sadly, student loan debt increased from $260 billion in 2004 to $1.7 trillion in 2021 . Average student loan debt in 2021 was $38,147 —that's a pretty staggering amount.

Overall, student loan debt can dramatically impact your life after your graduate. It can affect the jobs you take and cause you to delay buying a house or starting a family.

#2: The Financial Benefits of College Might Be Overstated

The claim that college graduates earn $1 million more in their lifetimes might actually be skewed by graduates from top universities .

A 2021 study by PayScale.com found that there are only seven schools (out of 1,878 four-year schools) at which earning a college degree can get you a $1 million return on investment. Basically, the reported number that college graduates make $1 million more over the course of their professional lives is not that accurate.

Moreover, it's important to note that while attending college, most people aren’t working or are only working part-time. So in addition to the financial costs and debts you're incurring while in college, you probably won't be able to get the salary you could be making from working a full-time job during the four to six years you're in school.

body_work.jpeg

#3: College Might Not Actually Make You Smarter

The last con of attending college is that going to one might not actually increase your intelligence.

A 2011 study found that 45% of 2,322 traditional-aged college students studied from 2005 to 2009 made no significant improvement in their critical thinking, reasoning, or writing skills during the first two years of college. After four years, 36% showed no significant gains.

More recent studies have shown similar trends among those with either some college or a degree. Given the cost of attending college, you'd hope that higher education would have a dramatically positive effect on these skills for all students—but this might not actually be the case.

Should I Go to College? How to Make the Right Choice for You

Admittedly, we might be somewhat biased because we've spent years stressing the importance of attending college to high school students. However, we do recognize that college might not be for everyone.

Other than the pros and cons of college we mentioned previously, here are some additional factors to consider when deciding whether or not to attend college.

You'll Have More Options With a College Degree

You might be planning to enter a trade that doesn't require a college degree and will provide you with a good salary and benefits. However, if you end up deciding that you don't like that field after a few years and you don't have a college degree, your employment options will be limited.

Also, if you take up a trade that requires physical labor and you suffer an injury, you might struggle to find work without a college degree.

body_possibilities.jpeg

There Are Ways to Pay for College

You might be turned off by college because of how much you think it will cost you. But remember that you might not know your out-of-pocket expenses until you get accepted to college and get a financial aid package.

In reality, there are many grants and scholarships that can alleviate the financial burden and make college more affordable for you .

You Might Not Need College If You're Already Successful

If you're one of those rare people who has already achieved tremendous professional success before attending college, then going to college might not benefit you much financially.

For instance, say you get drafted in the first round of the draft by Major League Baseball and are offered a multi-million dollar signing bonus. Nobody would fault you for bypassing college. After all, you can always take college classes in the off-season or get your degree when you're done with your playing career.

If you're a mini Mark Zuckerberg or starring in your own sitcom, going to college might not lead to a higher income or a better job after you graduate. Bill Gates and Miley Cyrus were able to do OK professionally without college degrees!

You Might Not Be Academically Inclined

Most people are capable of doing college-level work if they're motivated and apply themselves. That being said, some people just detest school or don't have the aptitude to do well in a college environment.

Keep in mind, though, that college gives you so much more freedom than high school to explore your academic interests and find the fields in which you can excel. Similarly, if there's a subject that confuses you and that you absolutely abhor, you can probably avoid taking classes in it in college.

body_struggle.jpg

wecometolearn /Flickr

Conclusion: Should You Go to College or Not?

There's no denying that college offers many financial, professional, and personal benefits. Numerous studies have shown that college graduates have far better financial and job prospects than those who don't attend college. What's more, few people regret going to college despite the tremendous amount of student debt and the less-than-ideal economy.

If you're worried about the cost of attendance, make sure you know about financial aid and how to limit your debt when you graduate . College is an investment that pays off for the vast majority of people who graduate.

Admittedly, some people don't need college to achieve their personal or professional goals. While you can of course be successful without a college degree, college graduates tend to fare better. If you're considering college, make the decision that will benefit you the most now and in the future.

What's Next?

Decided you want to go to college? Then take the first step and find out how to apply .

If you don't think you'll be able to get into college, check out these open admission colleges and these colleges with the highest acceptance rates .

If you still need to take the SAT or ACT for college, take a look at our ultimate SAT study guide and ultimate ACT study guide to learn more about the tests and what you'll need to know to ace them.

Want to improve your SAT score by 160 points or your ACT score by 4 points?   We've written a guide for each test about the top 5 strategies you must be using to have a shot at improving your score. Download them for free now:

Trending Now

How to Get Into Harvard and the Ivy League

How to Get a Perfect 4.0 GPA

How to Write an Amazing College Essay

What Exactly Are Colleges Looking For?

ACT vs. SAT: Which Test Should You Take?

When should you take the SAT or ACT?

Get Your Free

PrepScholar

Find Your Target SAT Score

Free Complete Official SAT Practice Tests

How to Get a Perfect SAT Score, by an Expert Full Scorer

Score 800 on SAT Math

Score 800 on SAT Reading and Writing

How to Improve Your Low SAT Score

Score 600 on SAT Math

Score 600 on SAT Reading and Writing

Find Your Target ACT Score

Complete Official Free ACT Practice Tests

How to Get a Perfect ACT Score, by a 36 Full Scorer

Get a 36 on ACT English

Get a 36 on ACT Math

Get a 36 on ACT Reading

Get a 36 on ACT Science

How to Improve Your Low ACT Score

Get a 24 on ACT English

Get a 24 on ACT Math

Get a 24 on ACT Reading

Get a 24 on ACT Science

Stay Informed

Get the latest articles and test prep tips!

Follow us on Facebook (icon)

Justin has extensive experience teaching SAT prep and guiding high school students through the college admissions and selection process. He is firmly committed to improving equity in education and helping students to reach their educational goals. Justin received an athletic scholarship for gymnastics at Stanford University and graduated with a BA in American Studies.

Ask a Question Below

Have any questions about this article or other topics? Ask below and we'll reply!

The shortcut to your shortlist

Make your university search faster and less stressful. Get a personalised shortlist by selecting what matters to you.

  • CHOOSE ONE OR MORE

Popular universities

  • University of Kent
  • University of East Anglia UEA
  • University of Chester
  • Coventry University
  • University of Aberdeen
  • University of Portmouth
  • Nottingham Trent University
  • University of Sunderland
  • London Metropolitan University
  • London South Bank University
  • University of East London
  • BROWSE ALL UNIVERSITIES

Course search

Popular undergraduate courses.

  • Computer Science
  • LLB Bachelor of Laws
  • Biomedical Sciences
  • Physiotherapy
  • Sports Science

Open days search

Upcoming open days.

  • University of Cumbria
  • SRUC Scotland's Rural College
  • Royal Agricultural University
  • Ravensbourne University London
  • University of South Wales

Article search

Popular topics.

  • Clearing advice for students
  • Clearing advice for parents
  • Clearing advice for teachers
  • League tables
  • Getting ready for uni

Popular articles

  • What is UCAS Extra?
  • Applying directly into Clearing
  • Clearing success stories
  • What's a university open day
  • How university rankings can help you through Clearing
  • BROWSE ALL ADVICE

Pros and Cons of going to university

Thinking about your next steps it’s important to weigh the pros and cons of going to university carefully before making a decision..

Author image

Pros of going to university

Cons of going to university, things to consider, making your decision.

Deciding whether to go to university can be a challenging call to make. Ultimately, it’s about your own personal goals and circumstances but here are some pros and cons to consider. 

Looking for Clearing advice?

The Clearing concierge has the answers

Higher earning potential

According to a survey conducted in 2020 by the Higher Education Statistics Agency (HESA), graduates had a higher average salary than those who hadn’t gone to uni.

Greater job choice

Employers often ask for a degree as a minimum requirement for specialist and non-specialist roles so you’re likely to have more job choice with a university education.

  • What are the highest paying degrees?
  • What do graduates do and earn?

Life experience

Going away to university will help you learn more about yourself as well as how the world works. Even if you decide to stay at home and study at your local university, you’ll discover things like how to be self-motivated and organise your own time.

Develop transferable skills

Regardless of the subject you decide to study, you’ll learn many transferable skills such as problem solving, communication and teamwork in addition to career specific ones. For more details about subjects and skills, check out our subject guides.

Gain expertise in your field

Going to university gives you access to tutors and other professionals who are experts in their subject area. You’ll gain knowledge and practical experience that will open doors in the future.

Access to resources

Universities often invest in state-of-the-art resources to support students to achieve their full potential. This might be anything from library and archival material to specialist equipment and dedicated studio spaces.

For most people, going to university means taking out loans to pay for tuition fees as well as living costs. This can really add up over the years you’re studying.

Time commitment

There is a significant time commitment to many courses and while there are more flexible options such as part time study, it obviously takes longer to complete.

According to the Institute for Fiscal Studies, the average student loan debt in England was £39,000 for students who started university in 2020. Considering the potential impact of debt on your finances before deciding to go to university is essential, however, you should remember that you'll only start repayments once your income is above a set threshold and you only pay back 9% of your income above that amount.

  • Repaying your student loan
  • Are you eligible for student finance?
  • University bursaries and scholarships

Pressure to succeed

University can come with pressures whether it’s workload, exams, or your own or others’ expectations to achieve. Coping with these stresses can feel uncomfortable at times.

Not for everyone

Lots of people build successful careers without going to university. Other routes into professions are available and are explored in our how to become guides.

Your interests and goals

Doing an undergraduate degree at university is usually a three-year commitment or more so what are your interests and goals that will motivate you to succeed?

Your financial situation

While cost shouldn’t be the only deciding factor, its vital you know how to budget for the cost of tuition, accommodation, and other living expenses. Check you are eligible for a student loan and whether other financial aid is open to you such as scholarships, grants or disability allowance.

Your support network

Be clear about your existing support networks, who will help you adjust to university life? Also think about how you want to develop new networks. For example, if you enjoy playing sport, are there clubs you could join to feel connected?

Talk to your family, friends, and teachers

While the decision is ultimately up to you, talking through your options and asking people you trust for advice will help you reach conclusions, and perhaps offer an alternative perspective too.

Visit different universities

If a lot of universities offer the sort of course you’re interested in, visiting a few early will help you work out what appeals and what you’re not so keen on. Sometimes what you think you want, doesn’t play out. For example, you might think you want a busy city experience but discover the beauty in a quiet rural uni instead.

Attend open days

Going to an open day will help you get a feel for the university and its culture. You will usually get the chance to talk to current students and lecturers so prepare some questions beforehand.

  • What's a university open day?
  • Why you should go to a university open day
  • How to plan for a university open day

Do your research

Doing some online research is often a good place to start. You’ll learn what sort of courses are available and how the content differs from uni to uni. You can also think about location and what type of university might suit you, for example, a city versus a campus university.

Make a Uniselect shortlist

Our Uniselect tool helps you create personalised shortlists of universities based on certain criteria such as location, budget and subject you want to study. You can create multiple lists but it’s worth being clear on at least some of your preferences to help you reach a decision.

  • University shortlisting made easy with Uniselect
  • A students' guide to university shortlisting

The shortcut to your uni shortlist

Related articles.

Students in class listening to a lecturer

What’s the Teaching Excellence Framework (TEF)?

Discover the Teaching Excellence Framework (TEF), which presents Gold, Silver, Bronze and...

Student opening their exam results

Unexpected exam results

Sometimes your predicted grades aren’t the ones you end up with. Read on to discover what...

A student looking at a laptop and writing notes

Why is Clearing seen as a bad thing?

Clearing is a different but equally valid way of securing a place at university. Read our...

Is this page useful?

Sorry about that..., how can we improve it, thanks for your feedback.

Employers and Universities: Work with us?

Register  |  Login

Success at School

  • Apprenticeships
  • Career zones

advantages and disadvantages of going to university essay

Your guide to: The pros and cons of university

University can be an amazing experience, but it’s not for everyone. It’s also one of the biggest decisions you’ll make in your life – so it’s important to think carefully before taking the plunge.

In this guide, we explore the pros and cons of university to help you make up your mind.

'Weighing up the pros and cons of university? Check out this guide' Tweet this to your followers

1. You can become an expert in a subject you love

Girl at desk

If you like to know everything there is to know about your favourite subject, uni could be for you

If you’re the person who has to know everything there is to know about a subject, then uni could be for you. Over the three or four years of your undergraduate course, you’ll become an expert in your chosen subject . The chances are you’ll get to choose a number of specialist areas of study as your interests develop.

2. University can prepare you for a specific career path

Some jobs require a university degree. For example, if you want to be a doctor or a vet , you’ll need to go to university. Other career paths typically start out at university – such as engineering , nursing and laboratory science. However, more and more apprenticeships are opening up  – in fact, apprenticeships are available in all three of these professions today. If you’re considering a career in one of these areas, university may still be the best way in, but research all your options before making up your mind.

3. Graduates earn more

Graduates earn 35% more than school leavers, according to the stats pros at the Institute for Fiscal Studies (IFS). And while the gap is narrowing, the IFS say it isn’t going anywhere soon. Don’t forget that the 35% number is a headline – there are lots of factors which can make a difference. These include the course and university you choose and the career path you’d like to pursue .

4. Uni gives you time to gain work experience

Going to university means you’ll be very highly qualified come graduation day – but it doesn’t guarantee you the technical and employability skills employers look for . Never fear – the long summer vacation is a great time to gain experience and skills through internships , a summer job or work experience placement . Internships are plentiful – but they can be competitive. If you don’t get one, look for local employers related to the career path you’re considering and get in touch.

5. You’ll get a taste of independence

Students prepare food together

University is a good chance to learn the skills of independent living - while having fun with your friends!

University gives you a flavour of independent living without throwing you in at the deep end. You’ll usually be broken in gently with a year in halls, giving you the chance to learn basic life skills like cooking and doing the laundry. Later, you’ll probably live in rented accommodation. Choosing a student house is exciting and insightful – and although you might not relish the thought of clean the loo or kitchen sink when you move in, it’s all good experience!

6. You will gain high-level transferable skills

Uni may be light on workplace experience, but a degree gives you skills that will stand you in good stead throughout your career . Whatever subject you study, you’ll learn to think critically and analytically, question assumption, carry out thorough and robust research, solve problems , and process large amounts of information quickly.

7. It can broaden your mind

Students in an art gallery

University is a chance to broaden the mind - many students throw themselves into art, culture and politics

One of the best things about uni is that it can alter your outlook on the world. It's a chance to move to a new place, meet people from different backgrounds, learn about fascinating ideas and experience culture, art and politics. OK, so we may be painting a grand view of uni life, but it's all there for the taking – if you want it.

1. You may not gain technical skills

Some degrees, such as medicine or veterinary science, prepare you for a particular career path. Others, like engineering and computer science are geared towards certain areas of work. These degree courses give you skills that you can directly apply in your job, should you choose to continue in your field of study. However, many roles are open to graduates with a degree in any discipline – and according to research by the New College of the Humanities, half of graduates end up in jobs like these. Your degree may give you valuable transferable skills, but you will have to learn the technical skills you need to carry out your job.

2. You may not get employability skills

According to research by Career Builder, only one in three employers thinks students graduate with the skills they need in the workplace. Nearly half of employers surveyed said graduates leave university without people skills , and many said graduates lacked problem-solving, creative thinking, communication and teamwork skills .

3. Contact time is less than at school

Students attending a lecture

Time spent in lectures is much less than many students expect

Contact time is often much less than students expect. In a recent survey, nearly two thirds of students thought they would get more contact time than at school, and a similar number expected to spend more time in lectures than in the classroom. In reality, contact time is usually much less than at school. Courses such as history may have less than 10 hours of weekly contact time.

4. You’ll leave with a lot of debt

According to research by the Sutton Trust, 2015 graduates left university with an average of £44,000 of debt. This is likely to rise as tuition fees and living and accommodation costs increase. The good news is repayments are linked to your earnings – currently, you must be earning around £17,500 to start repaying your student loan, and your remaining loan will be written off if you don’t repay it within 30 years of the first April after you graduate.

5. You will be committing at least three years of your life

A university degree is a big commitment to academic study. Most bachelor’s degrees last at least three years. You should think carefully if you’d prefer to be working in a paid job than dedicating yourself to years of study, coursework, revision and exams.

6. You’re not guaranteed a graduate job

About two thirds of graduates are overqualified for their job, according to the CIPD (the professional body for the HR industry). This does not mean they will never do a graduate job, and with the job market a very competitive place, their degree may still have helped them get that job. In fact, research by the Institute of Student Employers revealed that there were 20% more graduate job vacancies in 2021 compared to 2019.

7. Lifetime earnings can be higher with an apprenticeship

Apprentice working in a lab

Higher and degree apprentices are likely to earn more than a non-Russell Group graduate over their career

According to the Sutton Trust, those with a level 5 apprenticeship  (or higher) are likely to earn more over their lifetime than graduates with a degree from a non- Russell Group university . Apprentices in this group are predicted to earn an average of £1.5 million over their career, compared with the £1.4 million forecast for non-Russell Group graduates. With degree apprenticeships, your earnings potential could be even higher – there isn't much data about this just yet.

So what does this mean for me?

The pros and cons of university mean you should think carefully before choosing your path. If you're drawn to university because you think it will help you get a well-paid job, you should think about the career path you’d like to pursue, and research the various ways of getting there.

Here are some questions you should ask yourself before deciding:

  • What career path appeals to me?
  • How will a university degree help me achieve this?
  • Could an apprenticeship be a better way to enter my career path?

If you've weighed up the pros and cons of university and decided it's the right choice for you, make sure you use your time wisely:

  • How can I explore different career paths while I’m at university?
  • How can I gain skills and experience while I’m at university?

Have fun, explore new ideas and meet new people, and make time to enjoy the holidays as well as gaining work experience – you may not get another opportunity for a long time!

Still debating the pros and cons of university? Check out this post which helps you decide whether university could be for you.

You might also like...

What degree should I do?

Which university should I go to?

Image credits

Lead image via Flickr , Expert via Flickr , Students eat together via US Defense , Students at gallery via Tampa University , Lecture via Wikimedia Commons , Apprentice via US Navy

Latest jobs

Success at School

Sign up to our newsletter

Get test careers advice and info on apprenticeships and school leaver jobs.

  • Online Colleges
  • Study in Europe
  • Study in America
  • Study in Africa
  • Study in Asia
  • Study in Australia
  • Study in Antarctica
  • Reviewed Universities
  • International Scholarships
  • Cheap Tuition Universities
  • Low Tuition Universities
  • Privacy Policy
  • Scholars Hub
  • Scholar's Career Guides

Advantages and Disadvantages of University Education

Advantages and Disadvantages of University Education

We’d be looking at the advantages and disadvantages of university education in this article at World Scholars Hub to help you get a clear understanding of the pros and cons of the modern education system in the world today.

It is right to say that education is really beneficial and must be taken seriously. It’s also right to note that nothing is completely perfect, as anything with an advantage comes with its own disadvantages as well which may be too much or little to ignore.

We’d start this article by bringing you the advantages of university education after which we’d look at some of its disadvantages. Let’s go on, shall we..

Table of Contents

We’d list out the advantages after which we’d go on to the disadvantages.

Advantages of University Education

Below are the advantages of a university education:

1. Human Development

The role of university education in human development is comprehensive.

The impact of social education and family education on human growth is somewhat contingent, and the scope of the impact is often only focused on certain aspects. University education is an activity for cultivating people in an all-around way.

It should not only care about the growth of the knowledge and intelligence of the educational object, but also care about the formation of students’ ideological and moral character, and also care about the healthy growth of the educated. It is the unique duty of school education to cultivate and shape a comprehensive and complete social person. And this responsibility can only be undertaken by school education.

2. University Education is Well Organised

One of the aims of education is to have an influence on people’s purpose, organization, and planning. University education embodies all the characteristics of education.

The purpose and planning of university education are embodied in a rigorous organization. It is right to note that university education is institutionalized education and has a strict organizational structure and system. 

From a macro point of view, the school has a variety of systems at various levels; from a micro point of view, there are dedicated leadership positions and education and teaching organizations within the school, which specialize in ideology, politics, teaching, and general logistics, Cultural and sports activities and other specialized organizations, as well as a series of rigorous education and teaching systems, and so on, are not available in the form of social education and family education.

3. Provides Systematic Content

To meet the needs of fostering a comprehensive and complete society, the content of university education pays special attention to internal continuity and systemicity.

Social education and family education are generally fragmented in educational content. Even planned social education is often staged, and its knowledge as a whole is also fragmented. university education not only pays attention to the knowledge system but also conforms to the laws of cognition.

Therefore, education is systematic and complete. The completeness and systematicness of educational content are important features of school education.

4. Provides an Effective Means of Education

Universities have complete educational facilities and special teaching equipment for education, such as visual teaching aids such as audio-visual film and television, experimental practice bases, etc., which are all effective means of school education. These are indispensable material conditions to ensure the smooth progress of teaching, which cannot be fully provided by social education and family education.

5. Specialized Functions which include Training People

The university education function is to train people, and the university is a place to do just that. The special characteristics of university education are mainly manifested in the specificity of tasks. The only mission of the school is to train people, and other tasks are achieved around training people.

In university education, there are specialized educators—teachers who are trained and brought in through strict selection and specialized training.

Such educators not only have extensive knowledge and high moral character but also understand the laws of education and master effective education methods. University education also has special education and teaching equipment and has special education means. All this fully guarantees the effectiveness of University education.

6. Provides Stability

The form of university education is relatively stable.

Universities have stable educational places, stable educators, stable educational objects, and stable educational content, as well as stable educational order and so on. This kind of stability in universities is very conducive to personal development.

Of course, stability is relative, and it must have corresponding reforms and changes. Stability is not rigid. If we regard relative stability as sticking to the rules and rigidity, it will inevitably go to the opposite side.

Disadvantages of University Education

The disadvantages of university education bring the following adverse effects on the younger generation:

1. Feeling Dull

The narrow educational goals, the complexity of educational content, and fierce academic competition force students to think about study, exams, grades, and rankings every day, and often they are either incapable of taking care of or ignoring everything around them. Such accumulation will inevitably make them indifferent to things that have nothing to do with learning, and cause numbness and inactivation of feelings.

2. Increasing Diseases

Diseases are mainly caused by mental imbalance, reduced exercise, and monotony of activities. Facing the tremendous pressure of studying and entering higher education, students often feel nervous, depressed, and even fearful, which can lead to functional and organic diseases such as insomnia, headaches, anxiety, depression, and decreased immunity. The strange diseases such as “Sensing Syndrome” and “Attention Deficit Syndrome” discovered by experts in recent years are also directly related to the huge learning pressure of students.

3. Distorted Personality

Education has always claimed to cultivate people, but in fact, in the educational model constructed by mechanical drills and forcible indoctrination, students’ originally lively and lovely personalities are fragmented and eroded, and their different personalities are ignored and suppressed. Uniformity and one-sidedness have become the inevitable result of this model. These conditions, coupled with the increasing prevalence of only children, will result in varying degrees of isolation, selfishness, autism, pride, inferiority, depression, cowardice, emotional indifference, excessive words and deeds, fragile will, and gender inversion among students. Distorted and unsound personality.

4. Weak Abilities

Education is meant to promote the all-around development of adults, to enable people to develop balanced, harmonious, and free all aspects of abilities.

However, our education has abnormally developed some of the students’ abilities, while disregarding many other abilities. Not to mention the relatively poor self-care ability, psychological self-control ability, and survival adaptability of students, it is the ability to collect and process information related to learning, the ability to discover and acquire new knowledge, the ability to analyze and solve problems, the ability to communicate and communicate. The ability to cooperate has not been effectively cultivated.

Many students who have been educated have gradually become a generation who can’t live, have no passion, and can’t create.

Getting a university education doesn’t come so cheap. It is pertinent to note that one of the troubles students face in the university is the tuition cost and the living cost.

Getting quality education means more money and as a result, most students have to take up as many jobs as possible in other to take care of their study expenses.

University education can be really expensive but going to university is worth the cost in so many ways. With the shift in focus to the expenses involved in getting a university education, many students lose focus on their academics and tend to overwork themselves in order to meet up with the financial demands of the university.

Though the cost of education is high in most countries of the world, there are countries with free education for international students that you can totally benefit from.

We hope that with this article, you’re able to understand the advantages and disadvantages of university education for students. Feel free to use the comment section to share your thoughts or contribute to the information already provided.

RELATED ARTICLES MORE FROM AUTHOR

15 best cyber security certifications, 10+ best countries to study abroad in 2023, the career path of a mechanical engineer in 2023.

© World Scholars Hub 2023

What are your chances of acceptance?

Calculate for all schools, your chance of acceptance.

Duke University

Your chancing factors

Extracurriculars.

advantages and disadvantages of going to university essay

The Pros and Cons of Attending College Close vs Far From Home

A person sitting cross legged, pointing to the text, with an abstract monitor behind them

Your GPA and SAT don’t tell the full admissions story

Our chancing engine factors in extracurricular activities, demographics, and other holistic details. We’ll let you know what your chances are at your dream schools — and how to improve your chances!

advantages and disadvantages of going to university essay

Our chancing engine factors in extracurricular activities, demographic, and other holistic details.

Our chancing engine factors in extracurricular activities, demographic, and other holistic details. We’ll let you know what your chances are at your dream schools — and how to improve your chances!

Finalizing your college list, a working list of the colleges to which you intend to apply, can be a long and involved process. You’ll need to balance a number of different priorities and values as you narrow down the 7,000 undergraduate institutes in the United States to a mere ten or so that you’d like to attend.   It takes a lot of introspection and insight from those you trust before you can arrive at a balanced and effective list.

The factors that you weigh as you choose the schools you’re interested in will depend in large part on your personal priorities. For example, some students know they want to attend a small college in a big city. Other students might prefer a school close to the ocean or one known for its engineering program. All of these preferences will combine to help create your college list.

As you consider the preferences that will mold your college list, you’ll need to think carefully about each and how important it is to you overall. Not only that, but you’ll also have to predict how important each will be for you in the long run. Sometimes a preference might seem initially important to you, but could become less so over time.

One major consideration for many students is how far away from home they are willing to go for college. Some students know right away that staying close to home is not a top priority, while others recognize that they will have difficulty relocating any significant distance. And some students know that going far away will be initially difficult, but they will be be able to adjust over time, if the school is the right fit.

In this post, we’ll discuss going to college close to home versus going to college far away. We’ll outline some of the common pros and cons of each decision to help frame your thinking as you make this important choice about your future. To learn more about the benefits and disadvantages of going to college close to home or going to college far away, keep reading.

Benefits of Staying Close to Home

There are many benefits that come to mind immediately when you think about staying close to home as you begin your college career. One of the most obvious is the minimization of potential homesickness. College can include a period of adjustment for any student, and going through those changes far from home can make you homesick. If you stick close to home, you’ll likely have lots of support from your family and even friends while you tackle the next chapter of your life.

You’ll also have access to familiar resources. You may already know the town or area well, so you’ll have an easier time learning where to find groceries, a pharmacy, restaurants, and any other off-campus amenities. You’ll also usually be able to continue to see the same doctor and dentist, use the same bank, and not change your voter registration or deal with absentee ballots. Many logistics will be simplified.

In addition, going to college in close proximity to your parents often means access to other types of resources. You may have the option of visiting anytime you need a break from campus. A home-cooked meal and a free laundry room are only a drive away. Some students going to college close to their parents’ home even continue to live at home in order to save costs on room and board.

Your proximity will also ensure more continuity in your life. You might be able to keep your job from high school. You might have friends who are also staying local, meaning that your social circle can remain intact. You may even continue to participate in the same activities, like a club soccer team, church, or volunteer group.

Finally, going to school close to where you grew up often means that your parents and support network are almost immediately available to you should there be an emergency. At the same time, you would be able to make it home quickly if anyone there needed your immediate help. Indeed, there are many benefits of going to college close to home.

Drawbacks of Going to College Close to Home

Sometimes, though, staying close to home for college is not all it’s cracked up to be.

For one, living nearby means that your parents will be able to visit frequently and will likely expect you to do the same, which may potentially be a hindrance as you develop greater independence.

You’ll also want to think about the lack of anonymity you’ll have if you go to college close to home. It may not be uncommon for you to run into acquaintances, family friends, high school teachers, or classmates. You may even end up spending most of your time with your family or high school friends. While this is comforting to some, to others it might seem a bit suffocating. Think about how much of a fresh start you are after before choosing to attend college close to home.

Finally, by staying close to home you sometimes sacrifice the opportunity to experience something different for four years. It may not seem like it now, but four years is ultimately not a huge time commitment in your life. The opportunity to experience a different setting or more diverse surroundings for a finite period of time does not surface often in life. If you know you’ve always wanted to try living in the city, the mountains, or just someplace else, this could be a good time to try it.          

While there are certainly many benefits to attending a college close by, there are also some disadvantages. You should consider both sides before making a decision.

advantages and disadvantages of going to university essay

Benefits of Going to College Far Away

Going to college far away from your home is also an option that presents a number of unique benefits.

For one, by going someplace new on your own, you will inevitably gain more independence. It will be up to you to handle the small logistics you might be used to your parents managing on your behalf. For example, if you get a parking ticket or need to pick up a prescription, those responsibilities will fall squarely on your own shoulders.

You’ll need to find your own way around a new region, locating the resources that you’ll need along the way, but as you do so you will grow in ways that you might not have otherwise. You will take on adult responsibilities and experience what may be your first real-world independence. You will make your own decisions and hold yourself accountable for them.

Another benefit of going to college far from home is the opportunity to experience living in a new region. You might be exposed to new cultures and lifestyles. You might get to experience life in a big city or a rural town for the first time. You’ll get a chance to broaden your horizon. If you’ve always wanted to live in New York City or Southern California or the Rockies, this may be the time to make it happen.

Finally, if you go to college far away, you will get a fresh start. Many students want the chance to reinvent themselves after high school, and when you go to college far away, you can create your new life from scratch. None of your high school mistakes or expectations will follow you. You can pursue new friendships, new activities, and a new lifestyle without the shadow of your high school self following along. For many students, this is a refreshing way to turn over a new leaf.

Drawbacks of Going to College Far Away

Of course, attending college far away is not without its disadvantages. For one, you may experience homesickness when you leave everything you’ve known at home to start anew again. It may take you a while to adjust to your new life or you might not find a new group of friends right away. While this adjustment period is normal, it sometimes takes longer than others and you’ll have to decide if you’re willing to put up with it for however long it lasts.

You will also have to accept that you’ll be missing out on milestones at home. If you’re used to attending your younger brother’s baseball games or your grandmother’s piano concerts, these are more than likely things that you’ll have to miss out on now that you’re far away. There may even be holidays or family events that you can’t attend.

Another potential drawback is the cost of moving far away. You will need to pay for travel to and from your college each time you go, and for some students this means that going home for the holidays is not in the budget. You’ll also need to consider the shipping costs to send your belongings to your new college. If you can’t ship them, there will be things you’ll need to buy when you arrive. Overall, going to school far away tends to involve more logistical costs than staying close to home.

Finally, if there is an emergency and you are attending a college that is far from home, it will take longer to be reunited with your family. If you have to travel home unexpectedly, the costs may be exorbitant. If you have a medical emergency, you will have to cope with it independently until a family member can arrive, if they are able to afford the travel costs.

Distance from home is often a central factor weighed into college-list creation. Some students immediately know their comfort level for being away, and others aren’t quite so sure. In any case, there is nearly always a period of adjustment that occurs when you begin college, whether you do so close to home or on the other side of the country. Discuss your choices with your family and hear their perspective on the issue, too. Some families might even offer to help with travel costs or logistics.

For more information about choosing your college, check out these CollegeVine posts:

  • FAQs: Applying to a Women’s College
  • Will I Fit In at College as a First-Generation Student?
  • The Demographics of the Ivy League
  • A Guide to Religiously-Affiliated Colleges
  • How to Make the Most of a College Fair
  • How to Decide Where to Apply Early
  • College Visits: When (and If) to Make Them
  • 3 Reasons You Should Start Drafting Your School List Now

Curious about your chances of acceptance to your dream school? Our free chancing engine takes into account your GPA, test scores, extracurriculars, and other data to predict your odds of acceptance at over 500 colleges across the U.S. We’ll also let you know how you stack up against other applicants and how you can improve your profile. Sign up for your free CollegeVine account today to get started!

Related CollegeVine Blog Posts

advantages and disadvantages of going to university essay

The pros and cons of going to university

Record-high costs and competition leave A-level students questioning worth of a degree

  • Newsletter sign up Newsletter

Would-be graduates face hard choices in the current economic climate

1. Pro: greater earning potential

2. con: added student debt, 3. pro: greater job choice, 4. con: ‘worthless’ degrees, 5. pro: life experience, 6. con: vocational courses.

Thousands of A-level students have missed out on their first-choice university after this year’s grades reverted to pre-pandemic boundaries, sparking a rush for “clearing” places.

How to prepare for the cost of university Rishi Sunak’s ‘rip-off’ uni crackdown: what makes a degree low value? Is it time to rethink the value of a university degree?

According to Ucas , only 205,000 school leavers made their offers for their first- or second-choice university, “nearly 10,000 fewer than in 2022”, said The Guardian , thanks to a “steep fall” in the number of top A-level grades. Universities UK said only 79% of 18-year-olds were accepted on to their first-choice course.

Nearly 50,000 teenagers were left “scrambling” to find a course after the results were published last week, said The Times , with a record 10,400 gaining places through the Ucas clearing service – up from 6,000 last year.

Subscribe to The Week

Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.

https://cdn.mos.cms.futurecdn.net/flexiimages/jacafc5zvs1692883516.jpg

Sign up for The Week's Free Newsletters

From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.

Some universities were “bending over backwards” to admit would-be students, wrote education editor Sian Griffiths, due to their “urgent need” for the students’ tuition fees of £9,250 a year.

With intense competition for places and evermore focus on the cost benefit of going to university, The Week weighs up the pros and cons of getting a degree.

Graduates can reasonably expect to earn more on average than non-graduates over the course of their careers. According to Statista , graduates in England earned an average of £38,500 last year, which is £11,500 higher than non-graduates.

However, this fabled “graduate premium” has fallen over time, according to data from the Higher Education Statistics Agency , thanks partly to more people gaining degrees and demand outstripping supply of places.

“How much graduates earn also depends on the subject studied and university attended,” said BBC News .

On average, women who study creative arts and languages degrees earn about the same in their lifetime as they would have done without a degree, according to research by the Institute for Fiscal Studies think tank. Men who study creative arts on average earn less across their lifetime than those who didn’t attend university.

However, students who chose law, economics or medicine earned significantly more than those without a degree.

While tuition fees vary, cost is a huge factor – especially since they tripled a decade ago. Many will pay £9,250 a year, and take out a student loan to pay for it.

Factor in living costs and the average debt for those who started their course in 2022/23 will be £45,600 by the time they graduate, according to data from the Commons Library .

Although students do not start paying back their loans until their earnings exceed a certain threshold (currently £27,660 a year, according to government data ), they are charged interest on their total loan from the day they take it out.

When repayments begin, they can be substantial (currently 9% of their income above the repayment threshold). It had been the case that the balance will be written off after 30 years, or when you turn 65 (whichever came first).

But a “big change this year”, for students starting their courses on or after 1 August 2023, will now see the balance lasting for 40 years rather than 30, said The Times – “until close to retirement for many” – and a lower salary repayment threshold.

Universities have said that “effectively freezing tuition fees” since 2012 is “threatening to have an impact on the quality” of what they can offer as their income has been reduced dramatically in real terms.

A degree offers greater opportunities and choice in the job market. It will also “improve your chances of securing a job role in specialised fields”, said Career Addict . A degree “is essential for certain skilled roles and careers”.

A university education “allows you to target a broader range of careers than you can through an apprenticeship”, said Prospects , “but both will stand you in good stead when it comes to getting a job”.

According to data published in 2019 by the Office for National Statistics , almost a third of graduates were overqualified for their job.

“Our findings show that people who studied arts, biology and humanities are the most likely to be overeducated,” said Dr Maja Savic, an ONS economist.

Nearly three out of 10 graduates do not progress into highly skilled jobs or further study 15 months after graduating, according to the regulator, the Office for Students (OfS).

Under new government plans , universities could be restricted in recruiting students to courses that “do not have good outcomes”. This includes courses with high drop-out rates, or a low proportion of graduates ending up in professional jobs.

“Of course going to university is about so much more than money,” said The Times. While hard to quantify, many graduates benefit enormously from the university experience, and the life lessons learned.

These include making new friends from different backgrounds, expanding your network of contacts that can help you in later life, broadening your range of interests through extracurricular societies and clubs, studying abroad, learning skills like budgeting – all of which will serve you well after you graduate.

The focus has begun to shift towards vocational courses and on-the-job training, which offers many of the skills needed to succeed in the workplace – without the accompanying student debt. From 2024, candidates will be able to apply to do apprenticeships through Ucas.

A 2021 report by the Chartered Institute of Personnel and Development found that the majority of graduates (52%) would have considered doing an apprenticeship instead of a degree.

By doing an apprenticeship, “you’ll immediately enter the world of work and gain valuable on-the-job experience while earning money as you study”, said Prospects. “You won’t pay tuition fees and you’ll make industry contacts from day one.”

Sign up for Today's Best Articles in your inbox

A free daily email with the biggest news stories of the day – and the best features from TheWeek.com

Harriet Marsden is a writer for The Week, mostly covering UK and global news and politics. Before joining the site, she was a freelance journalist for seven years, specialising in social affairs, gender equality and culture. She worked for The Guardian, The Times and The Independent, and regularly contributed articles to The Sunday Times, The Telegraph, The New Statesman, Tortoise Media and Metro, as well as appearing on BBC Radio London, Times Radio and “Woman’s Hour”. She has a master’s in international journalism from City University, London, and was awarded the "journalist-at-large" fellowship by the Local Trust charity in 2021. 

Ryan Reynolds and Hugh Jackman in Deadpool & Wolverine

The Week Recommends The titular leads are on 'top form' in box office hit for Marvel

By Irenie Forshaw, The Week UK Published 31 July 24

Price at a film premiere at The Curzon Mayfair in November last year

Speed Read Model says she is away 'working' after missing insolvency court hearing into her bankruptcy and £750,000 unpaid tax

By Harriet Marsden, The Week UK Published 31 July 24

AI brain visual taken in Brussels, January 2024

The Explainer Like most new technologies, the answer probably lies somewhere in between

By The Week UK Published 31 July 24

University students

The Explainer A combination of spiralling costs and fewer international students is leaving universities in serious financial trouble

By Richard Windsor, The Week UK Published 29 May 24

USC protest in 2018

Speed Read Citing safety concerns, the university canceled a pro-Palestinian student's speech

By Rafi Schwartz, The Week US Published 17 April 24

Cornell University

Speed Read The junior engineering student reportedly confessed to posting the vile messages to a Greek life online forum

By Peter Weber, The Week US Published 1 November 23

A student at Cambridge University

Today's big question UK is losing ground to competitors, with China edging up the rankings

By Felicity Capon Published 2 October 23

An empty exam hall in Wales, November 2022

Pros and Cons IB offers a more holistic education and international outlook but puts specialists looking to study in the UK at a disadvantage

By The Week Staff Published 27 September 23

A Levels

Talking Point The generation who lost critical months of schooling and weren’t able to sit their GCSEs now approaching a dysfunctional university

By The Week Staff Published 25 August 23

school girls wearing uniforms

Pros and Cons Do rules around clothing promote discipline and inclusion or are they a pricey constraint on individuality?

By Harriet Marsden Published 1 August 23

A student at her laptop during the pandemic

feature Claimants say they received poor service and felt like ‘lowest form of life in food chain’

By Chas Newkey-Burden Published 28 July 23

  • Contact Future's experts
  • Terms and Conditions
  • Privacy Policy
  • Cookie Policy
  • Advertise With Us

The Week is part of Future plc, an international media group and leading digital publisher. Visit our corporate site . © Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.

You might be using an unsupported or outdated browser. To get the best possible experience please use the latest version of Chrome, Firefox, Safari, or Microsoft Edge to view this website.

Is College Worth It? Consider These Factors Before Enrolling

Garrett Andrews

Expert Reviewed

Updated: Jun 4, 2024, 8:30am

Is College Worth It? Consider These Factors Before Enrolling

For decades in the U.S., a four-year degree was seen as a ticket to a better life, associated with higher wages, better health and access to homeownership, to name a few benefits. But rising costs, mounting student debt, changing job requirements in some industries and new higher education alternatives have altered the equation, leaving many high schoolers and their parents wondering: Is college worth it?

College graduates still earn higher wages and have lower unemployment rates than workers with only a high school diploma. However, industries that don’t require a bachelor’s degree, like manufacturing, construction and hospitality, often pay well and see steady economic demand. Plus, many companies and even government organizations no longer require job candidates to hold college degrees.

Though some researchers claim the economic benefits of a college degree are diminishing, higher education is still undeniably valuable. But is college right for you? That depends on your financial priorities and professional goals. Read on to learn more about the pros and cons of going to college.

Why You Can Trust Forbes Advisor Education

Forbes Advisor’s education editors are committed to producing unbiased rankings and informative articles covering online colleges, tech bootcamps and career paths. Our ranking methodologies use data from the National Center for Education Statistics , education providers, and reputable educational and professional organizations. An advisory board of educators and other subject matter experts reviews and verifies our content to bring you trustworthy, up-to-date information. Advertisers do not influence our rankings or editorial content.

  • 6,290 accredited, nonprofit colleges and universities analyzed nationwide
  • 52 reputable tech bootcamp providers evaluated for our rankings
  • All content is fact-checked and updated on an annual basis
  • Rankings undergo five rounds of fact-checking
  • Only 7.12% of all colleges, universities and bootcamp providers we consider are awarded

How To Determine Whether College Is Worth It

College is a great way to discover yourself: what you’re good at, what drives you, what you want to spend your life doing. Higher learning can provide opportunities to travel, research, build a professional network and connect with peers and mentors. But the cost is immense—often more than $100,000 for a four-year degree, depending on the institution.

If you’re on the fence about college, take the considerations discussed below into account. Also, compare the potential benefits and drawbacks of a four-year degree to alternative higher ed options, such as bootcamps , professional certificate programs and trade schools .

Factors To Consider

When determining whether you should go to college, ask yourself the following questions:

  • What are your career goals?
  • Does the school you’re eying offer a strong program in your area of interest?
  • How much would you pay for tuition and other expenses?

Next, assess what student loans and scholarships are available to you, and consider the level of debt you’ll face after graduation. If you’re not sure where to start, check out our rankings of the best private student loans , the best low-interest student loans and the best personal loans for students . We also list some of the best scholarship websites and search engines .

Finally, think about the salary you’ll likely earn in your desired profession and how quickly you’ll be able to repay your loans.

It might be wise to consider this decision as if you were your own life coach or mentor. How would you talk through this problem with someone in your shoes? College admission professionals, high school guidance counselors and mentors can also provide input to help you make an informed decision.

College Income and Wealth Premiums

Two key economic indicators to think about are income and wealth. “Income” here relates to your earnings from a job, while “wealth” refers to your net worth.

For decades, college graduates enjoyed higher earnings and greater wealth than individuals who did not graduate from college, creating so-called “college premiums” on both income and wealth. Though these premiums still exist, they’ve declined for recent graduates, according to economic research published by the Federal Reserve Bank of St. Louis .

The college wealth premium is trending downward faster than the income premium due in part to the high and rising cost of college.

The Cost of College

To examine the cost of college, we look at the average net price as collected by the National Center for Education Statistics (NCES). Net price is the total cost of college—including tuition, supplies, housing and other expenses—minus grant and scholarship aid.

In the 2020–21 academic year, the average net price of attending a four-year college for first-time undergraduates was $14,700 at public institutions, $28,400 at private nonprofit schools and $24,600 at private, for-profit institutions, according to NCES.

Tuition and Fees

Tuition and fees have risen over the past decade across public and private nonprofit colleges and universities. The increase was highest for private nonprofits, where annual tuition and fees increased by 14% between the 2010–11 and 2021–22 school years—from $34,000 to $38,000, respectively. The increase at public institutions in that time frame was smaller at 6%, from $9,100 to $9,700.

Total Cost of Attendance

The total cost of attendance combines the cost of tuition, fees, books, supplies, room, board and other expenses. It also accounts for federal student aid awards, including grants, work-study programs and loans.

In 2021–22, the average total cost of attending a public, four-year institution was $26,000 for students living on campus. Attending a private, for-profit school cost $32,900, or $55,800 for a private, nonprofit college.

So for a four-year bachelor’s degree, the average total cost of attendance for students residing on campus was approximately:

  • $104,000 at public schools
  • $131,600 at private, for-profit schools
  • $223,200 at private, nonprofit schools

In other words, the cost of college is steep even with financial aid taken into account.

Student Loans

The percentage of first-year undergraduates who take out student loans has decreased since 2010, according to NCES. Thirty-eight percent of first-time, full-time college students were awarded loans in 2020–21, compared with 50% in 2010–11. NCES noted a decrease across all controls for both two-year and four-year higher education institutions.

The average loan amount awarded has also decreased over the past decade. First-time, degree-seeking students received an average $8,400 in 2020–21, compared to $7,700 in 2010–11, a decrease of 8%.

Education debt is the fastest-growing form of debt in the U.S. with total student debt now around $1.76 trillion, according to the Federal Reserve . In the 2021–22 academic year, 49% of students earning bachelor’s degrees from public, four-year institutions graduated with federal student loan debt, according to research from College Board . The average amount of debt per student was $20,700. Another 9% graduated with private loan debt averaging $34,600 per borrower.

To understand how effective students are at paying back their loans, NCES examined the class of 2015-16 four years after graduation, finding that the average federal student borrower still owed 78% of their original loan amount. The average percentage owed was particularly high among Pell Grant recipients: 85% of the original borrowed amount.

The Potential College Payoff

We’ve determined that college is expensive (and only getting costlier), student debt is on the rise and financial aid awards are dwindling. So what’s the return on an investment in higher education? Let’s take a look at potential payoffs for college grads.

Higher Earnings

College graduates still enjoy higher earnings than the average U.S. worker. The U.S. Bureau of Labor Statistics (BLS) reports that in 2022, bachelor’s degree holders took home a median wage of $1,432 per week, while workers with just a high school diploma earned only $853. That’s a difference of 68%.

But how much you earn depends on several factors, including the industry you work in and your age, gender and location. A 2021 report from the Georgetown University Center on Education and Workforce found that 16% of high school graduates and 28% of associate degree holders earn higher wages than half of bachelor’s degree graduates.

On average, bachelor’s degree holders don’t start to see returns on their college investment until they’ve worked full time for 15 years. It’s the lowest return on investment (ROI) of all postsecondary degrees, according to the Education Data Initiative .

However, ROI for bachelor’s degrees can differ significantly depending on the major. The most cost-effective majors are in the computer and information sciences. Other areas with high returns include business finance, business accounting and electrical engineering. Majors with low ROI include fine art, liberal arts, general studies and education.

Lower Unemployment Rates

In 2022, bachelor’s degree grads faced an unemployment rate of 2.2%, while the rate for all workers was 3%, according to the BLS. By comparison, 4% of workers with only a high school diploma were unemployed.

Despite national conversation questioning the value of a college degree, a recent survey by the National Association of Colleges and Employers found that many employers still see higher ed as valuable, with three-quarters of respondents viewing college credentials as high-quality.

Recession Resiliency

Having a college degree may help you stay afloat during the next economic downturn. According to a report by the Public Policy Institute of California , less-educated workers suffered higher unemployment losses during the past few recessions. For example, at the height of the Covid-19 recession, workers with no college education experienced an unemployment rate of 18%, compared to 10% for workers with bachelor’s degrees.

The Pros and Cons of Going to College

Whether going to college is worth it really depends on your situation. Some career aspirations require a four-year degree, while plenty of others don’t. Certain academic interests make more sense to pursue in a formal campus environment. Others lend themselves to self-study.

Your financial situation is an important factor in determining the value of college. You’ll want to ask yourself if higher wages and more career options in the long run are worth years of student loan payments.

  • Higher wages on average
  • More career options
  • Opportunities to gain further credentials and earn more money
  • Alumni networks
  • Recession resilience
  • Personal growth
  • Better health
  • Higher likelihood of homeownership and being partnered (married or cohabiting)
  • Lower risk of becoming delinquent on debt obligations
  • Years of student loan debt
  • Not necessary for some jobs
  • Many alternatives to college, like apprenticeships and associate degrees, may provide similar benefits
  • “Opportunity loss” due to time in college spent not working in profession

If you’re unsure about whether college would pay off for you, check out the below resources to learn about alternative options for higher education and professional credentials:

  • Best Coding Bootcamps
  • Best Online Trade Schools
  • Can You Get a Bachelor’s Degree at a Community College? Here’s What To Know
  • How Much Do Coding Bootcamps Cost? What To Know
  • How To Get an Apprenticeship: Tips and Resources
  • Tech Bootcamps With Job Guarantees: What To Know
  • These 8 Universities Offer Business Certificates Online
  • What Is a Graduate Certificate? Everything You Need To Know
  • What Is a Skilled Trade? Top-Paying Trades To Conside

Frequently Asked Questions (FAQs) About Whether College Is Worth It

Should i go to college.

A college degree is a great investment for many students, but it’s not the slam dunk that it once was. A college degree is still correlated with higher earnings and greater wealth, but the cost is considerable and rising. Depending on your intended profession, you might consider an alternative education path.

Is college worth the cost?

Ultimately, whether college is worth the cost will depend on factors like your career and life goals and whether you’ll need to take out student loans. While a college degree is still associated with greater earnings and wealth over a lifetime, the upfront cost is not worth it for many students.

Why is college worth it?

There are many positives to attending college: higher wages, stronger recession resilience, lower unemployment rates, the list goes on. Plus, many employers require or prefer a college degree for many professional roles. On the other hand, you may be able to earn a good living without attending college, depending on your professional aspirations.

  • Ranking The Most Affordable States For College Students
  • How To Apply For College
  • Should You Attend Graduate School Online?
  • Choosing A Major: How To Find What Major Is Right For You
  • What Accreditation Should A College Have?
  • Do You Need The SAT For College Admission?
  • How To Get A Free Laptop For College
  • How To Transfer Universities
  • Online Checklist For Students
  • ACT Vs. SAT
  • Are Community Colleges Free?
  • Get Accepted: What Is The Average SAT Score Needed For College Admission?
  • Where Can You Take CPA Courses Online?
  • What’s The Difference Between A College And A University?
  • The Best Ways To Learn A New Language While In College
  • Online Dual-Degree Programs
  • Can International Students Attend Online College In The U.S.?
  • Online Jobs For College Students
  • Preparing For Senior Year Of High School
  • Weighted Vs. Unweighted GPA
  • What Are AP Classes?
  • What Is A Double Major?
  • What Is A Good GPA In College, And Does It Matter?
  • What Is A College Minor?

What Is The ACT Test? A Complete Guide

What Is The ACT Test? A Complete Guide

Jeff Tompkins

2024 IELTS Preparation Guide

Genevieve Carlton Ph.D.

College Application Deadlines 2024

Sheryl Grey

ASVAB Study Guide 2024

Garrett Andrews

How To Learn German: Tips And Tricks

Matt Whittle

How To Learn Korean Online: Everything You Should Know

Garrett Andrews is an adjunct faculty member in the Department of Political Science at Portland Community College where he teaches State and Local Government.

Brenna Swanston is an education-focused editor and writer with a particular interest in education equity and alternative educational paths. As a newswriter in her early career, Brenna's education reporting earned national awards and state-level accolades in California and North Carolina. Since 2018, she has worked in the higher-education web content space, where she aims to help current and prospective students of all backgrounds find effective, accessible pathways to rewarding careers.

IELTS Preparation with Liz: Free IELTS Tips and Lessons, 2024

' src=

  • Test Information FAQ
  • Band Scores
  • IELTS Candidate Success Tips
  • Computer IELTS: Pros & Cons
  • How to Prepare
  • Useful Links & Resources
  • Recommended Books
  • Writing Task 1
  • Writing Task 2
  • Speaking Part 1 Topics
  • Speaking Part 2 Topics
  • Speaking Part 3 Topics
  • 100 Essay Questions
  • On The Day Tips
  • Top Results
  • Advanced IELTS

IELTS Advantage Disadvantage Sample Essay Questions

Below is a list of IELTS sample essay questions for advantage / disadvantage essays in writing task 2. These essay types are often taught together with discussion essays but I think it is worth studying them separately to be better prepared.

Advantage / Disadvantage Essay Tips

  • spend time planning the benefits and drawbacks of the statement given
  • make sure you have relevant supporting points
  • put your advantages together in one body paragraph and the same with the disadvantages
  • follow a safe advantage disadvantage essay model

Advantage / Disadvantage Essay Questions

It is becoming increasingly popular to have a year off between finishing school and going to university. What are the advantages and disadvantages of this?
Some people think that it would be better for large companies and industry to move to regional areas outside large urban centers. Do you think the advantages outweigh the disadvantages?
With the rise of e-books comes the decline in paper books. Some people see this as a good step forward while others do not. What are the advantages and disadvantages of this trend?
The rise of convenience foods has helped people keep up with the speed of the modern life style. What are the advantages of this trend? Do the advantages outweigh the disadvantages?
There seems to be an increasing trend towards assessing students through exams rather than continual assessment. What are the advantages and disadvantages of exams as a form of assessment?
Space exploration costs tax payers an exorbitant amount of money each year. What are the advantages and disadvantage of spending money on space exploration?
Many elderly people are no long looked after by their families but are put in care homes or nursing homes. What are the advantages and disadvantages of this trend?
It is often considered that change is more beneficial to people than trying to avoid it and have everything remain the same. Do you think the advantages of change outweigh the disadvantages?

Other IELTS Essay Questions

  • Opinion Essay Questions
  • Solution Essay Questions
  • Discussion Essay Questions
  • Direct Question Essay Titles
  • All Essay Questions by Topic

ADVANCED IELTS LESSONS

advantages and disadvantages of going to university essay

Recent Lessons

New reading exercise for you (july 2024), ielts gt writing task 1 letter: using the prompts for a high score, ielts writing task 1: multiple charts, graphs and tables, ielts writing task 2 essay topics 2024, introduction paragraph for ielts writing task 1.

' src=

Click Below to Learn:

  • IELTS Test Information

Copyright Notice

Copyright © Elizabeth Ferguson, 2014 – 2024

All rights reserved.

Privacy Policy & Disclaimer

  • Click here:  Privacy Policy 
  • Click here: Disclaimer

Return to top of page

Copyright © 2024 · Prose on Genesis Framework · WordPress · Log in

Working While Going to College: Pros and Cons Essay

  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Introduction

Reasons for working during college, positive effects of working during college, negative effects of working during college.

At the present day, the majority of students chose work while going to college, they take a part-time job and attend classes, or they chose a full-time occupation during the summer. Some students have a financial necessity to find work before graduation, while others are ready to sacrifice their free time, entertainment, and communication with group mates to provide themselves with a comfortable living and become adaptable, responsible, and mature. Like any activity, working while going to college has positive and negative effects on young people. The purpose of this essay is to examine the reasons that encourage students to work while studying and the impact of working during college.

Working during college has its reasons and may be highly beneficial. Although a significant number of students are frequently apprehensive about applying for a part-time or even full-time job during college, this possibility may be taken into consideration. However, a student should thoroughly evaluate his or her strengths, flexibility, and potential necessity of working. One of the most substantial reasons to work while going to college is the ability to earn money. A working student may independently pay for his or her classes, reduce the amount of money that was borrowed for education, or have the ability to afford a comfortable living. In particular cases, when companies offer students the benefits of a full-time job for the execution of part-time work, young people may start their retirement savings while they are still studying. Another reason for working while going to college is the improvement of personal and professional skills. Even if a taken part-time job is not connected with obtainable education and future profession, it will inevitably require time management and decision-making skills, or the ability to build understanding with a large number of diverse people. In general, working during college is a positive personal life experience, students may try various kinds of activities, test their abilities, or get acquainted and apparently form a friendship with a great number of people.

Working while going to college has a substantial number of positive effects. First of all, getting a job during college provides students with an income and helps them to make student loan payments. Student loan debt is a significant issue for many students, the necessity to pay it after graduation slows down life progress and postpones the essential ambitions such as homeownership and starting a family. Working during college gives young people the possibility to graduate without substantial financial obligations. Another positive impact of the combination of work with studying is the receiving of valuable job experience. Students who are working during college accumulate knowledge, improve self-discipline, and develop their professional and communicative skills. Finding a job that corresponds with a chosen profession may positively affect a resume and provide career development immediately after finishing the study. Even if job experience received during part-time work is not closely related to the field of study, working students learn work ethic, and get additional information that may be highly useful in the future. Such students obviously get more chances to fit a particular position after graduation compared with young people without any experience at all.

Despite the positive impact of working while going to college on students’ future career, self-development, and financial obligations, a job taken in college may influence students adversely. As young people who work frequently choose their jobs instead of study time and prefer practical skills to theoretical knowledge, it significantly affects their grades in a negative way. Students with work frequently have a serious risk of getting expelled, as the necessity to work effectively for extended hours eliminates the possibility of studying to the full extent. The constant receiving of low grades results in deferring or quitting courses. If a job takes much time and effort, it makes students distracted and influences their social life, insulating them from entertainment, communication, and activities with group mates. Negative effects of working while studying on grades, a lack of sleep and social life, and tension at work due to managing deadlines significantly increase the working students’ level of stress. One more potential though not inevitable negative effect of working while going to college is an elevated risk of students’ obesity. Working young people frequently do not have time for balanced and healthy meals, and the consumption of fast food and other high-sugar meals may lead to severe health problems, like obesity, diabetes, and other diseases.

Students have various reasons to work while going to college, the most substantial reason is the ability to pay classes, reduce the student loan debt before graduation, and start retirement savings in the case of full-time job benefits for part-time work from particular companies. Working while going to college improves students’ personal and professional skills and provides a positive life experience. Working in college has both positive and negative effects on students. It helps with student loan payments and significantly influences the successful start of a career due to received experience, skills, and knowledge. However, a lack of sleep and social life, tension at work due to managing deadlines, and extended working hours have a negative impact on students’ grades and increase the risk of getting expelled. As working students frequently eat fast food due to a lack of time for healthy meals, it may result in severe diseases.

  • Goals of the Life: Personal Experience of Responsibility for Life and Happiness
  • Fostering the Development of Optimism and Resilience
  • The Shortage of Full-Time Nurses
  • Working or Studying Fulltime: Causes and Effects
  • Full-Time Equivalents for Nursing Units
  • Old Life Style and Modern Life Style Differences
  • A Community Development Plan for Youth 15-18 Years in Kenyan Kibera Slum
  • Housing Policy and Bridging the Inequality Gap
  • Three Easy Ways to Improve Your Time Management
  • Gambling as an Acceptable Form of Leisure
  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2022, January 16). Working While Going to College: Pros and Cons. https://ivypanda.com/essays/working-while-going-to-college-pros-and-cons/

"Working While Going to College: Pros and Cons." IvyPanda , 16 Jan. 2022, ivypanda.com/essays/working-while-going-to-college-pros-and-cons/.

IvyPanda . (2022) 'Working While Going to College: Pros and Cons'. 16 January.

IvyPanda . 2022. "Working While Going to College: Pros and Cons." January 16, 2022. https://ivypanda.com/essays/working-while-going-to-college-pros-and-cons/.

1. IvyPanda . "Working While Going to College: Pros and Cons." January 16, 2022. https://ivypanda.com/essays/working-while-going-to-college-pros-and-cons/.

Bibliography

IvyPanda . "Working While Going to College: Pros and Cons." January 16, 2022. https://ivypanda.com/essays/working-while-going-to-college-pros-and-cons/.

ielts-material

Some students take a year off between school and university – IELTS Writing Task 2 Advantage/Disadvantage Essay

Zuhana

Updated On Jun 06, 2024

arrow

Share on Whatsapp

Share on Email

Share on Linkedin

Some students take a year off between school and university – IELTS Writing Task 2 Advantage/Disadvantage Essay

Table of Contents

Academic ielts writing task 2 topic:.

ielts logo

IELTS Writing Prediction Questions for 2024

In IELTS Writing Task 2 advantages and disadvantages essays, you will be asked to write the benefits and drawbacks of the topic given. You have to be careful that you write the advantages and disadvantages of the topic given and not your opinion about the topic.

To help you to understand this type of essay better, given below is a sample essay along with a vocabulary section. Continue to practise other topics of advantages and disadvantages essays to help you during your preparation.

Some students take a year off between school and university, to work or to travel. Do the advantages of this outweigh the disadvantages? OR

It is common practice for some students to take a gap year after graduating high school to work and/or travel. What do you think are the advantages and disadvantages of this?

Band 9.0 Model Essay:

It is true these days that many high school leavers choose to start their work or take a trip before going to university. While a gap year can bring some immediate drawbacks, I am convinced that it is more likely to have long-term benefits for their lives.

On the one hand, young students are very likely to encounter several difficulties when delaying their university study. One of these problems is the delay in academic progress caused by spending one year off school. It is understandably almost impossible for young people to enjoy their experiences in doing a job or travelling to a new place but still arrange a certain amount of time for revision. As a result, gap-year takers may have to face the challenge of becoming familiar with the knowledge at school again, receiving more pressure of catching up with their peers. Besides, the life outside the university campus may prove to be mentally and physically overwhelming for inexperienced school leavers. They, for instance, may be at risk of being exploited in an exhausting job or face potential dangers on their trips to a new country. If not well prepared for such possible obstacles, young high school graduates can suffer from unintended consequences.

On the other hand, I would argue that these disadvantages are outweighed by the positive effects. A gap year is an ideal opportunity for students to learn about what is not taught at university. Working with other people who are experts in a particular field can give these newcomers not only an understanding of the job but also valuable practical lessons to help them become more mature. When it comes to applying for a position in a company, employers tend to favourably consider applicants who possess extensive experience in life and the occupation. Furthermore, in terms of recreation, having a year to relax can be advantageous as students can have a chance to relieve stress in study. With a comfortable and willing attitude, undergraduates can acquire knowledge more effectively in comparison with those who go to university right away.

In conclusion, despite some negative aspects, it seems to me that the benefits of a gap year are more significant for the reasons mentioned.

Useful Expressions

  • Long-term (adj): continuing for a long time into the future ==>The long-term effect of education should not be neglected.
  • To encounter sth (v): to experience something, especially something unpleasant ==>Young graduates commonly have to encounter great difficulty in seeking employment.
  • Progress (n): movement to an improved or more developed state ==>By adequately rewarding the students who have made significant progress in study, the school administration can recognise the achievements of these diligent students to others, encouraging many more students to devote more effort to study to obtain similar rewards.
  • Peer (n): a person who is the same age, or has the same social position or the same abilities as other people in a group. ==>In some developing Asian countries such as Vietnam, baby girls are usually less appreciated than their peers due to the remnants of feudalism that favoured men more than women.
  • Overwhelming (adj): too great or large for somebody ==>High school students in Vietnam, ranging from primary to high school ones, are obliged to learn an overwhelming amount of knowledge at school, not to mention loads of homework and other extra classes.
  • Inexperienced (adj): having little knowledge or experience ==>Many companies, for fear of arising expenses on training inexperienced new employees, tend to refuse the applicants who have just graduated.
  • Extensive (adj): having a great range ==>Society certainly benefits from the intellectual workforce who possess extensive knowledge in scientific areas.
  • Occupation (n): a person’s job ==>On the other hand, manual occupations are of fundamental importance to society.
  • Advantageous (adj): giving advantages or helping to make you more successful ==>The ability to speak foreign languages fluently can prove to be very advantageous for job seekers in the competitive job market.

Get Evaluated for FREE:

Do you have an essay on this topic? Please post it in the comments section. One of our IELTS trainers will evaluate your essay from an examiner’s point of view and reply to the comment. This service is completely FREE of cost.

Also Check :

  • Advantage and Disadvantage essays
  • IELTS Sample Essays
  • IELTS Essay Topics
  • IELTS Writing tips
  • IELTS Writing recent actual test
  • Direct question essay
  • IELTS Writing Answer sheet

Practice IELTS Writing Task 2 based on Essay types

ielts img

Effective IELTS Essay Connectors for Writing Task 2 & Task 1

Zuhana

Nafia Zuhana is an experienced content writer and IELTS Trainer. Currently, she is guiding students who are appearing for IELTS General and Academic exams through ieltsmaterial.com. With an 8.5 score herself, she trains and provides test takers with strategies, tips, and nuances on how to crack the IELTS Exam. She holds a degree in Master of Arts – Creative Writing, Oxford Brookes University, UK. She has worked with The Hindu for over a year as an English language trainer.

Explore other Writing Actual Tests

The most important aim of science should be to improve people’s lives – IELTS Writing Task 2

Kasturika Samanta

Process by which Sheep Embryos are Cloned – IELTS Writing Task 1

Akanksha Tripathi

View All

Post your Comments

11 comments, recent articles.

Some People Think That Parents Should Teach Children How to be Good Members of Society Sample Essay

Raajdeep Saha

IELTS Writing Task 2 Sample Essays

IELTSMaterial Master Program

1:1 Live Training with Band 9 Teachers

4.9 ( 3452 Reviews )

Our Offices

Gurgaon city scape, gurgaon bptp.

Step 1 of 3

Great going .

Get a free session from trainer

Have you taken test before?

Please select any option

Email test -->

Please enter Email ID

Mobile Band 9 trainer -->

Please enter phone number

Application

Please select any one

Already Registered?

Select a date

Please select a date

Select a time (IST Time Zone)

Please select a time

Mark Your Calendar: Free Session with Expert on

Which exam are you preparing?

Great Going!

The pros and cons of university

What and where to study.

  • International events
  • Attend a virtual open day
  • Questions to ask at an exhibition
  • Things to remember before your UCAS event
  • Ask these ten questions before you leave an event
  • What is distance learning?
  • Who is distance learning for?
  • How does distance learning work?
  • How do employers view distance learning degrees?
  • Fees and funding for distance learning
  • Tips to study online or remotely
  • The deadline has passed but your options are still open
  • UCAS Undergraduate for mature students
  • Contextual admissions
  • How to apply in Welsh
  • First-generation students
  • Disabled students: Preparing for open days and visits
  • Speaking to the disability support team or mental health adviser
  • Support for disabled students – frequently asked questions
  • UCAS Undergraduate: support for care leavers
  • Student carers
  • Student-parent’s guide to open days
  • Chloe's story
  • Funding for estranged student in Scotland
  • Students from a UK Armed Forces background
  • Patricka, UK Armed Forces Service leaver
  • Support for students who have been bereaved as a child
  • Criminal convictions – what you need to know
  • Students with imprisoned parents
  • Free school meals application fee waiver
  • How and where to study
  • Subject tasters
  • All you need to know about university open days
  • A first-timers guide to a virtual event
  • Getting the most out of a UCAS virtual exhibition
  • Hub live sessions
  • CREATE YOUR FUTURE London 2024 | EXHIBITOR INFORMATION
  • CREATE YOUR FUTURE Manchester 2024 | EXHIBITOR INFORMATION
  • UCAS/Discovery Bedford 2024 | Exhibitor Information
  • UCAS/Discovery Birmingham 2024 | Exhibitor Information
  • UCAS/Discovery Brighton 2024 | Exhibitor Information
  • UCAS/Discovery Bristol 2024 | Exhibitor Information
  • UCAS/Discovery Carlisle 2024 | Exhibitor Information
  • UCAS/Discovery Carmarthen 2024 | Exhibitor Information
  • UCAS/Discovery Colchester 2024 | Exhibitor Information
  • UCAS/Discovery East London 2024 | Exhibitor Information
  • UCAS/Discovery Hull 2024 | Exhibitor Information
  • UCAS/Discovery Ipswich 2024 | Exhibitor Information
  • UCAS/Discovery Leeds 2024 | Exhibitor Information
  • UCAS/Discovery Lincoln 2024 | Exhibitor Information
  • UCAS/Discovery Liverpool 2024 | Exhibitor Information
  • UCAS/Discovery Maidstone 2024 | Exhibitor Information
  • UCAS/Discovery Newbury 2024 | Exhibitor Information
  • UCAS/Discovery Newcastle 2024 | Exhibitor Information
  • UCAS/Discovery Northampton 2024 | Exhibitor Information
  • UCAS/Discovery Norwich 2024 | Exhibitor Information
  • UCAS/Discovery Sheffield 2024 | Exhibitor Information
  • UCAS/Discovery Stoke-on-Trent 2024 | Exhibitor Information
  • UCAS/Discovery York 2024 | Exhibitor Information
  • Top tips for UCAS Discovery
  • The ultimate UCAS Discovery checklist
  • The ultimate checklist for comparing your choices
  • University open days
  • What is university like?
  • Choosing a course
  • How to choose between undergraduate courses and unis
  • The Teaching Excellence Framework (TEF)
  • Foundation degrees
  • Higher Technical Qualifications
  • Environmental management placement case study
  • Studying in Welsh
  • Studying at a higher education college
  • How to become a DJ and presenter
  • How to become a Maths teacher
  • How to become a creative technologist
  • How to become a critical care nurse
  • How to become a dance choreographer
  • How to become a firefighter
  • How to become a football coach
  • How to become a games designer
  • How to become a management consultant
  • How to become a mental health nurse
  • How to become a paralegal apprentice
  • How to become a paramedic
  • How to become a personal trainer
  • How to become a research scientist
  • How to become a solar farm manager
  • How to become a volcano vlogger and guide
  • How to become a waste warrior
  • How to become a wing designer
  • How to become a writer
  • How to become an advertising business owner
  • How to become an engineering apprentice
  • How to become an illustrator
  • How to become an occupational therapy technical instructor
  • Life as a cyber security apprentice
  • What are your options?
  • What is the Turing Scheme?
  • Applying to study outside of the UK
  • General visa and immigration information for studying outside of the UK
  • What you need to know about studying outside of the UK
  • The pros and cons of studying outside of the UK

We asked uni students what they thought

advantages and disadvantages of going to university essay

So, what are the pros of going to uni?

There are many great reasons to go to university and study for a degree. Here are a few – do any seem like something that’s important to you, or something you’d enjoy? If so, it might be worth going to an open day or event  to find out more about the courses or unis you might be interested in. 

  • You’ll end up with a degree at the end of your studies, which could help you get your career started.
  • You’ll be taught by industry experts and well-respected academics, who will help you understand your specialities and grow your passion for your chosen subject.
  • Uni isn’t just about learning academically. You’ll also grow as a person, making new friends, enjoying a hectic social life, living independently and learning how to look after yourself.
  • During your time at uni, you can join clubs and societies, as well as having access to placement and work experience opportunities, which will all enrich you as a person (and your CV).
  • You’ll be in control of your time and your learning, meaning you can focus on what interests you most – and if that means going to the library at 2am, you can.

Browse uni courses

What are the cons of going to uni?

As with any big decision, there are also aspects of uni that some people might consider to be cons. We’ve listed some here to get you started on your decision-making process.

  • For most people, going to uni involves taking out a loan, or multiple loans, to cover tuition and living costs. It’s important to understand how student finance works and whether it’s the right choice for you.
  • It can be a big jump from A levels to degree level study – you’ll have to do a lot more independent studying, sometimes with little contact time with tutors and lecturers.
  • Although the independence is great for some students, for others it can be overwhelming, and homesickness can really affect your mental health. Most unis will offer great support, so make sure to read into what’s available .   
  • There’s lots of reading to do. Most courses will involve long reading lists, so if that’s really not for you, uni might not be the right place for you. Some courses are more hands-on than others though, so it’s worth checking this on open days.
  • You’ll have lots of deadlines, often all around the same sort of time, for different modules. Keep this in mind if you find time management tricky.

Find out more about apprenticeships  

You shouldn’t feel under pressure to go to university – you don’t *have to* go just because your friends are going, or your family think you should. Take a look at some of your other options to find the right next step for you. 

Alternatives to uni

Hopefully you feel a bit clearer now in how to approach your choices for your next steps after school or college.

If you’re still not sure – that’s OK. We’ve got lots of guidance to help you. Register for the Hub and you’ll have access to personalised information to help you make your decisions, complete your applications, and feel more confident for your new adventure.

Start your search now

Get your UCAS Hub

Your place to discover your options and research your future.

ultimate-guides-1.png

Is university worth it.

Maybe you’ve already got big ideas about the future; maybe you’re still figuring things out. One thing’s certain: there are many options after leaving school. Read our ultimate guide to help you decide.

Ultimate guide: Is university worth it?

Sponsored articles UCAS Media Service

Cardiff university clearing '24 live now, clearing: find your future at kent, small class sizes with expert tutors.

Home — Essay Samples — Education — University — Three benefits of going to university

test_template

Three Benefits of Going to University

  • Categories: Personal Experience University

About this sample

close

Words: 594 |

Published: Mar 14, 2019

Words: 594 | Page: 1 | 3 min read

Image of Dr. Charlotte Jacobson

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Verified writer

  • Expert in: Life Education

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

2 pages / 824 words

3 pages / 1177 words

1 pages / 488 words

1 pages / 472 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on University

Wake Forest University's Presidential Scholarship is a prestigious award that recognizes and rewards academic excellence and leadership potential. In this essay, we will analyze the significance of the Presidential Scholarship, [...]

Embarking on the path to higher education is a profound decision that shapes not only one's career but also one's identity and values. California Baptist University (CBU), with its commitment to academic excellence, spiritual [...]

Community colleges and universities both offer higher education opportunities, but they have distinct differences in terms of cost, size, academic programs, and student experience. This essay will compare and contrast community [...]

In the current academic discourse, the examination of the Western Governors University's (WGU) approach to education, particularly within the context of the EST1 Task 2, offers a fertile ground for analysis. This task, [...]

Academic Excellence: Explore how Rutgers' rigorous academic programs contribute to your educational growth. Research Opportunities: Discuss the research opportunities available at Rutgers and how they [...]

Now that you passed high school, applied to your abroad-university, packed your luggage and set your foot into your university student accommodation, you are about to meet various types of roommates that every international [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

advantages and disadvantages of going to university essay

The Classroom | Empowering Students in Their College Journey

Advantages & Disadvantages of Starting College Directly After High School

Advantages vs disadvantages of starting college directly after high school.

A college degree is necessary for many careers looking for applicants with a college education. College is a place to not only get a degree, but also to explore new interests, learn about yourself, make friends and gain the skills that help you succeed in life, both personally and professionally. Many people start college right after high school; some choose to wait. Either choice has advantages and disadvantages that affect your post-college life. High school graduates have the choice of pursuing their college degree right after college or waiting to start their higher education.

Internships are a great way to spend a gap year or two, getting experience in the field you hope to pursue in enrolling in college, as well as exploring the job market in your area. Student loans also trouble college graduates once they start their post high school diploma education. Many grads from high school look to gap years for part-time jobs, as well as work experience in their field, for saving up for a college experience and education.

Those with career goals in a specific career path need to consider their career options in their area and in their field of study in a college program, while also looking at college costs, financial aid needs, student loan debt, health care needs, personal growth, life skills and future career desires. Many who start college too soon may become a dropout before they find their right path. Whether young people are looking for an Associate’s Degree or a Master’s Degree, they should consider both the upsides and downsides to starting college or post-secondary education right after high school completion.

Advantage: Get Your Degree at a Younger Age

A bachelor’s degree requires about four years of full-time coursework, though many students require a fifth or sixth year due to changing majors, taking a semester off or academic problems that require them to repeat classes. The earlier you start your bachelor’s degree, the earlier you can finish it. Thus, you can be working at a younger age in a job that requires a degree than if you had waited to attend college. This typically means you’ll be making more money at a younger age, too. This comes in handy when you’re 25 and want to start a family or buy a home.

Disadvantage: Haven’t Sampled the Real World

By the time you’ve finished high school, you’ve been a student for over 12 years. Perhaps you’ve worked an after-school job or maybe a full-time job in the summers, but you likely haven’t experienced enough of the real world to understand what you want to study in college. Taking some time off between high school and college allows you to explore the adult world better. Work a full-time job in an industry you’re considering, travel to other countries or volunteer for an organization to get a better idea of what you want to do. While you can do these things while also being a college student, you can’t focus on them as much as if you take time off between high school and college, away from tests and grades.

Advantage: Continue With Classmates

Not all of your classmates will go to college right after high school, but many will. Starting right after high school keeps you on a similar path to your classmates at the same time, especially if you and your friends plan to attend the same college. You can experience being freshmen together, including academics and the social side of college life. Taking time off can leave you feeling behind your friends of the same age group who chose to attend college right after high school.

Disadvantage: Not Ready

While there are usually more social opportunities in college than in high school, the academic side is often more rigorous. You're typically expected to do more reading, write longer papers and take longer finals than you did in high school. Many students enter college unprepared for these academic demands. They’re looking forward to parties, skipping class whenever they feel like it and the other positives of being a college student. It’s near the end of the semester when their grades aren’t as high as they assumed they would be that the panic sets in. Many college students aren’t ready, academically or personally, for college life. They got Bs in high school, no problem, but now getting a C in college requires a lot more work. Time off between high school and college can be used to improve academic skills and personal habits before diving into the challenging world of college.

Advantage: Less Responsibilities

As you get older, you'll take on more responsibilities, such as a spouse, children and owning a home. These things make it harder to attend college, as you have more demands on your time, attention and money. For many students who have just graduated from high school, they don't have these responsibilities yet, and can focus more of their time and energy on college than if they were 25 and have a newborn they need to care for.

Disadvantages: Haven't Saved Up Enough Money

College is expensive, and if you're the one paying for it, starting right after high school may be difficult, as your responsibilities as a high school student typically make it impossible to work a full-time job. Taking time off before college allows you work full-time to save up money, while also researching careers and testing out the real world.

Related Articles

Why Is It Good to Graduate from College?

Why Is It Good to Graduate from College?

Advantages & Disadvantages of Going to College

Advantages & Disadvantages of Going to College

5 Challenges to Overcome as a College Freshman

5 Challenges to Overcome as a College Freshman

Effects of Dropping Out of College on Students

Effects of Dropping Out of College on Students

The best ways to graduate high school early.

High School Tips for Freshmen Girls

High School Tips for Freshmen Girls

What Are the Benefits of Taking Summer College Courses?

What Are the Benefits of Taking Summer College Courses?

Advantages and Disadvantages of an Undergraduate Degree

Advantages and Disadvantages of an Undergraduate Degree

  • Psychology Today; "Why Young People Shouldn't Go to College (At Least Right Away)"; Michael Ungar; March 2011
  • University of North Texas: Why Go to College?
  • Teen Advisor: Taking Time Off After High School

Chris Brower is a writer with a B.A. in English. He also spent time studying journalism and utilizes both to deliver well-written content, paying close attention to audience, and knowing one word could determine whether a product is a success or a failure. He has experience writing articles, press releases, radio scripts, novels, short stories, poems and more.

Download Your Free Book (pdf)

IELTS Luminary - Free Tips, Strategies, eBooks and Detailed Essay Feedback . Overall, this is the best free IELTS and other test prep website.

Having a Year Off Between Finishing School And Going to University - IELTS Band 9 Essay

It is becoming increasingly popular to have a year off between finishing school and going to university - IELTS Band 9 Essay

Get your personalised   IELTS Essay Feedback   from a former examiner

Download IELTS eBooks ,   get everything you need to achieve a high band score

Model Essay 1

The practice of taking a gap year before university is increasingly regarded as a transformative experience, albeit with its challenges. This essay explains that such a break can significantly enhance personal development and sharpen career focus, offering profound insights and life skills. Conversely, it also poses risks of academic skill decline and financial burdens.

One significant advantage of Taking a gap year between secondary education and university is the opportunity for personal development through diverse experiences such as volunteering in remote communities, working part-time jobs, or traveling. Immersion in varied environments can greatly enhance a student's adaptability and self-awareness. For example, a volunteer stint in Southeast Asia exposes a student to new cultures and complex challenges, fostering a mature, global perspective that is highly valued by universities. This experience not only enriches the individual personally but also helps in refining both academic and career objectives, leading to a more focused and enthusiastic engagement when they commence their university studies. The alignment of personal goals with academic pursuits typically results in improved performance and higher satisfaction in higher education.

On the flip side, choosing a gap year can present several challenges. The most notable is the potential for academic skills to diminish during the extended break from formal education. Students may struggle to readjust to the academic rigors of university, experiencing a decline in study habits and academic discipline. This transition can be particularly strenuous for those who have spent a considerable amount of time away from any structured learning environment. Furthermore, the financial burden of a gap year is a critical consideration. Engaging in activities like extensive travel or pursuing unpaid internships, while enriching, can be economically demanding. Not all students can afford these experiences without incurring debt or depending on financial support from their families. Such financial pressures can delay other important life milestones, including purchasing a home or saving for retirement.

In conclusion, a gap year can significantly enhance personal growth and clarity of academic and career goals, potentially leading to a more fulfilling university experience. However, it also poses challenges such as the loss of academic momentum and financial constraints.

Model Essay 2

The concept of a gap year between high school and university is becoming increasingly prevalent, offering both significant benefits and notable risks. This essay will discuss how a gap year can enhance life skills and independence, yet also highlight the challenges it presents in terms of academic momentum and financial stability. These contrasting aspects will be thoroughly examined to assess the overall impact of taking a year off before university.

The primary advantage of a gap year lies in the substantial development of life skills and independence that can benefit a student beyond academic boundaries. When students choose to travel, work, or immerse themselves in different cultural experiences, they acquire practical skills that are crucial in both personal development and academic success. For instance, managing a budget while navigating different countries in Europe teaches vital financial management and strategic planning skills. Similarly, collaborating in diverse teams enhances communication skills and fosters robust problem-solving abilities. These experiences not only accelerate personal growth but also prepare students for the complex challenges of higher education, potentially leading to a more enriched and effective university experience.

Conversely, the disadvantages of a gap year are significant and merit serious consideration. The most critical issue is the loss of academic momentum. An extended break from structured educational routines can erode established study habits and weaken foundational academic skills, making the return to a structured academic environment particularly challenging. This disruption can adversely affect a student's performance and their ability to adapt to university demands. Financially, a gap year involves considerable expenses related to travel and accommodation, which can impose a substantial financial burden. Without meticulous financial planning, students may face debts or other financial commitments that can impede their educational pursuits and long-term personal objectives, thereby complicating their future financial stability and academic achievements.

In conclusion, a gap year can significantly bolster independence and practical skills, enriching a student's university experience. However, it also risks academic disengagement and financial strain.

Model Essay 3

When students graduate from high school, they often face the decision of whether to immediately pursue university studies or to take a gap year. This essay will argue that a gap year offers significant advantages, such as personal growth and exposure to diverse cultures, but also presents potential drawbacks like academic disengagement and the development of unproductive habits. These key aspects will be examined in the essay to weigh the overall value of taking a year off before university.

There are multiple advantages in having a time-off, namely a gap year. First of all, with the time-off, the student can enjoy a reprieve from their responsibilities for a while. This will allow him or her to de-stress and relax which, as proven by recent scientific research, is incredibly important and beneficial for both the body and mind. Moreover, with some free time on hand, the student can choose travelling to foreign places, learning different cultures and meeting with new people from different walks of life. These new experiences will encourage their minds to think beyond their immediate environments. However, for other homebody students where travelling is not their forte, they can decide to delve into their hobbies and interests. Immersing oneself in the subject of their choice could bring them joy and enrich them with the ideas of what they are truly passionate about. This, in turn, will help them in planning out their future career paths. 

While there are many advantages, there are also a few downsides associated with taking a year off. Due to the time away from school and lack of responsibilities, a student may not only become lazy but also become uninterested in further studies. Moreover, the student may get distracted by non-productive activities rather than spending his or her time wisely. For instance, having too much free time on hand could become a breeding ground of time-wasting habits, such as spending hours on social media, video games and binge-watching of TV shows. Such vain habits will put them on the road of self-destruction only. 

To conclude, having a year off has significantly more advantages and benefits than the disadvantages. However, it is important to note that the scales of the pros and cons are heavily dependent upon the mindset of the student; for time is a mighty weapon but the effectiveness of it rests solely upon the hand that wields it.

  • Task 2 Essays

Recent Posts

Studying At University or College Is The Best Route to A Successful Career - IELTS Task 2 Band 9 Essay

Newspapers Are The Best Way To Learn about Current Events - IELTS Band 9 Sample Essay

Friendships That Take Place Online Are Not As Meaningful As Real-Life Friendship - IELTS Sample Essay

IELTS Writing Samples by topic

More and more people are going to study at universities in their own country or abroad. what are the advantages and disadvantages of studying at a university in your own country, advantages and disadvantages studying in universities, advantages and disadvantages studying in universities., more and more students are choosing to study at colleges and universities in a foreign country. what are the advantages and disadvantages of studying abroad, more and more students are choosing to study at colleges and universities in a foreign country. 1. what are the advantages and disadvantages of studying abroad 2. do the benefits of studying abroad outweigh the drawba.

  • Unlimited Task 1 checks Get all the feedback you need to keep improving your charts and letters.
  • Unlimited Task 2 checks Practice and perfect your skills with essays.
  • Personalized suggestions Know how to boost your score.
  • Detailed mistakes analysis Get instant feedback. Spot every mistake.
  • Topic ideas generator Get topic-specific ideas to enhance your writing.
  • Vocabulary helper Get the right words for any topic.
  • Progress tracking Track your writing improvements.

Youth Village

Advantages And Disadvantages Of Going To University

advantages and disadvantages of going to university essay

  • Here are some tips intended to help you , if you confused about going to University.

1.It opens new avenue of employment,most jobs are graduate jobs. There are certain jobs that require one to be knowledgeable regarding certain things like medicine , to become a doctor you need to study more than just the basics.

2.New life experiences , university is a place of self-reflection , it’s where you get tested at how you handle situations , the new experiences are exciting and meeting new people is always amazing , you get to blend in with different personalities. Student life is like a booze-filled nirvana.

3.Self- Improvement , you get to grow mentally and emotionally, you far away from home , you obliged to be independent and face things alone , that helps strengthen you. You get to make your own choices and decisions.

Disadvantages

1.Universities are costly , you spend thousands studying but end up getting no job. Not all of us were born with silver spoons in our mouths so we must think of the money before we decide if whether or not we are going to pursue our studies. The financial aid is not a guarantee most drop out because the financial aid can no longer pay for them

2.Lack of practical experience. in University you spend 70% of your time studying big costly books without getting practical experience , if you get that experience it is of limited time.

3.Time lost, it consumes a lot of time. You spend 4 years studying for a degree solely focusing on it when you should be doing other important beneficial things like running a business.

It is your choice at what you decide , whatever choice make sure that you doing something that will guarantee you a better life. If you don’t choose to go to varsity do something else that’s positive like establish a business. Do some introspection before you make a decision , don’t allow an influence from family or friends decide for you. Be a bigger person and see through what might be right for you.

Aphelele Peyana

Related articles.

advantages and disadvantages of going to university essay

South Africa’s Top Schools for Social Work Education

advantages and disadvantages of going to university essay

Pretoria High School for Girls Principal Suspended Amid Racism Allegations Probe

advantages and disadvantages of going to university essay

The Best Institutions for Accounting in South Africa

advantages and disadvantages of going to university essay

Top Universities for Marine Biology in South Africa

Adblock detected.

ieltsxpress logo

Gap Year Advantages Disadvantages IELTS Essay

Gap year advantages disadvantages ielts writing task 2.

You should spend around 40 minutes on this task.

Many students choose to take a gap year before starting university, to travel or gain work experience.  Do you think this is a good idea or a waste of time? You should write at least 250 words.

Many students choose to take a gap year IELTS Essay

Model Answers 1:

The majority of students start their degree in the same year as finishing school or college. Some students, however, choose to take a year out before starting university. In my opinion, this is a very good idea if the time is used wisely in order to gain new skills or knowledge. In the following essay, I will discuss this idea further.

It is very important that, when a gap year is taken, the time is not wasted but used productively. It would not look very impressive to a future employer if the time was simply used to take a break. This does not mean to say that a gap year should not be enjoyed.

Many people choose to go traveling during their gap year. This can be very beneficial to the individual as it exposes them to new ideas and cultures. It can also mean that they are able to learn a new language. Other students decide to gain work experience during this year. This can be particularly useful, especially if connected to their chosen area of study. Often, students who have worked before attending university appreciate their course more, as they are able to understand the relevance of what is being taught.

Overall, therefore, as discussed in this essay, there can be several benefits to taking a gap year. It is very important, however, that this time is used wisely and not wasted. This means that the year needs to be planned carefully in advance to get the most from the experience.

[253 words]

In some countries young people are encouraged to work or travel for a year between finishing high school and starting university studies. Discuss the advantages and disadvantages for young people who decide to do this.

You should write at least 250 words.

Gap Year Advantages Disadvantages

In many countries, youngsters are often encouraged to take an year off, to work or travel across the world, before embarking on their formal university education. This recent trend, also known as “gap – year”, has numerous merits and a few demerits, which will be discussed in this essay.

To begin with, the biggest advantage of taking sabbatical to explore the world is that it gives them an opportunity to discover their career interest. Such trips are not only fun , but also gives them a chance to socialise , engage in volunteering, and understand global issues and global culture . This helps them to discover their real passion which is the foundation stone for a fulfilling career. For instance, data from Harvard University, 2010, pointed out that drop-out rate from university courses is around 10 percent less in those children who chose the course after taking a “gap year” in comparison to those who headed straight to university after the high school.

In addition to this, working for a year before starting university reduces the financial burden of higher education to an extent. As the advanced studies are costly in most countries, working for a year helps them in saving money so they have to borrow less money and are under less financial debt, when they start higher studies.

In contrast to above viewpoints, the most significant disadvantage of such a break is that it can be a distraction from further studies. Some students find such breaks so relaxing and enjoyable that they decide to shun further studies permanently.

Although the incidences of such cases are few, the effects can be disastrous for their further career. For instance, a 2010 report from Florida University revealed that 1 in 100 students, who take “Gap-year” never go for advanced studies and struggle throughout their life to make the ends meet because of being unskilled.

Gap Year Advantages Disadvantages IELTS Essay

To conclude, the break of a year taken before pursuing university studies helps students to discover their career interest and also allows them to consolidate financially. However, for a minority of high school graduates it can lead to an end of an academic career .

[357 words]

Gap Year in Students Advantages Disadvantages

Taking a “gap year” off between high school and university has become a popular option among many young people. This time off provides a break after many years of formal study. Some students use this time to travel around the world, others volunteer and still others begin working. The idea behind each of these activities is to do something hands-on and refreshing, which enables young people to learn more about themselves and their place in the world around them.

The benefits of taking a year off are plentiful. On a personal level, students who travel away from home develop their independence and self-confidence. On a cultural level, they learn about viewpoints, traditions and perspectives different from their own. Professionally, students get a taste of diverse workplaces, which might inspire a possible career interest. Intellectually, they examine their own beliefs and ideas in relation to those of others in a new environment. All these advantages combine to make a strong case for taking the one-year break.

Nevertheless, there are also dangers involved in taking such a long break. Academically, the main drawback is that students can get sidetracked from their studies. A year is a long time and students could lose the good study habits and sense of discipline they had when they were in a formal academic structure. If they begin working, they could also be deluded into thinking that they’re making a lot of money. They could lose the benefit of college or university education and the chance to earn a higher income all their lives.

In conclusion, whether to take a year-long break or not is an individual decision. Each young person should consider his or her motivations carefully and decide on what’s most desirable. Time is a precious resource and people of all ages, including young people, should treat it with respect.

[305 words]

Gap Year Before Starting a University IELTS Essay

In certain countries some people think that students who just finished high school should take a year off for travelling or working before they enroll in a university. In my opinion, there are both advantages and disadvantages to taking a gap year.

There are a number of drawbacks to taking a year off to travel or work between high school and university. Firstly, if young people decide to work, they might get used to receiving an income and because of this there is a possibility that they do not want to come back to the student life anymore. Secondly, most of the students are too young to travel by themselves; therefore they could waste this opportunity because of their naivety.  Finally, traveling for a whole year requires a huge amount of money which could be spent on university studies.

On the other hand, there are some benefits to spending a year working or traveling before joining university. To begin with, young people broaden their minds when they travel and this might help them to gain valuable experiences in life. A further positive aspect is that while traveling or working, young people could acquire maturity and this could allow them to perform better once they return to their studies. A final benefit is that young people will probably learn some skills such as speaking a different language. They will also learn to appreciate other countries and cultures.

Overall, there are as many advantages as there are disadvantages to traveling or working between high school and university. In my opinion, it all depends on the students’ intellectual and emotional maturity to face this challenge and take advantage of it.

Some students take a year off between school and university to work and travel. Do the advantages outweigh the disadvantages? You should write at least 250 words.

Students take a year off between school and university IELTS Essay

These days many students who have completed their high school take one or two years off before starting university. They either work or travel during this time. In my opinion, this arrangement has both advantages and disadvantages.

When students take years off after finishing school, their attention shifts to other areas. Some might travel and some might work. While traveling is exciting and helps them learn more about other countries or people, it does not do much to improve their career prospects. And those who take up a job immediately after finishing school will most probably have to work in the unskilled sector. Since these jobs are more likely to earn them some money and make them financially independent, they might just stick to them. Unfortunately, this will not help in the long term because unskilled workers will have to be content with low salaries and benefits.

However, those students who eventually return to their studies after taking a year’s gap will benefit if they can focus on their studies. The valuable work experience they gained or the lessons they learned from their travels will improve their career prospects. And when they are ready to start work after finishing university, they will have employers queuing up to hire them. Unfortunately, many of these students who take time off after school will never join university. Those who join a university may find it difficult to focus on their studies. Many of them will drop out and return to their previous job.

To conclude, taking a year off has both benefits and drawbacks. Traveling around the world or taking up a job has several benefits. Travel, for example, will enhance one’s horizons and improve one’s perspectives on life. In the same way, part time or full time jobs equip students with valuable skills that will stand them in good stead. However, a university education is still required to find a good job and students who do not start university after taking a year off will only hamper their career prospects.

Ideas for Gap Year IELTS Essay

ProsCons
An opportunity to have a break from studying and return refreshed. You can volunteer, get valuable work experience, and travel the world.Some people find a year out becomes a distraction from their longer term plans.
A productive gap year can be valuable on your CV.An unstructured year out may not add much value to your future – careful thought and planning is essential.
You can earn and save money towards your higher education costs or future plans.It can be expensive and you could find yourself in a worse financial position at the end.
You could relate the experience and activities to the subject area you plan to study.It can be harder to return to study or work after a year-long break.
You will develop maturity if you don’t yet feel ready for higher education or work life. For some careers, it can be an advantage to be slightly older and have some life experienceIf you don’t get organized, you may end up spending your gap year just ‘thinking about it’.

Also Check: School Children should learn How To Grow Vegetables IELTS Essay

Oh hi there! It’s nice to meet you.

Sign up to receive awesome content in your inbox, every week.

We promise not to spam you or share your Data. 🙂

Check your inbox or spam folder to confirm your subscription.

Gap Year Advantages Disadvantages IELTS Essay

Oh Hi there! It’s nice to meet you.

We promise not to Spam or Share your Data. 🙂

Related Posts

some countries spend a lot of money to make bicycle usage easier

Some Countries Spend a lot of Money to Make Bicycle Usage Easier

Tasks at Home and Work are being performed by Robots ieltsxpress

Tasks at Home and Work are being performed by Robots

Climate has the Greatest Effect on People's Way of Life ielts

Climate has the Greatest Effect on People’s Way of Life

Leave a comment cancel reply.

Your email address will not be published. Required fields are marked *

 Yes, add me to your mailing list

Start typing and press enter to search

Secured a home already? We’ll handle your bills! Find out more

  • Student accommodation
  • Partner with us

UniHomes Blog

The pros and cons of going to university in your hometown, 01 december 2020 • 7 min read, considering going to university in your hometown here are some pros and cons to consider 👇.

When you love where you live, packing up to study in another city may not be the best option. Or is it? With new places come new experiences and the chance to broaden your horizons. But why leave behind your family and friends if you don’t have to? 🤷‍♀️

If you’re not sure whether or not to go to university in your hometown, read on. We’ve pulled together all the pros and cons to help you make the right decision for you.

advantages and disadvantages of going to university essay

👍 Pro: You’ll be close to friends and family

Going to uni is all about making new friends, but that doesn’t mean you have to leave your old ones behind. When you go to uni in your hometown, you get the best of both worlds. Want to meet up with your mates from school for a catch up? You don’t have to plan months in advance and co-ordinate a date that suits everyone. Plus, with your family just a stone’s throw away, you won’t ever feel homesick!

👎 Con: You might spend too much time at home

Home comforts are hard to resist. When you’re getting your clothes washed, your meals cooked and you’ve got a lifeline of financial support at your fingertips, you’ll understandably be reluctant to let it all go for months on end. A word of warning - there is such a thing as too much time with your family, so if you do study in your hometown, try to strike a balance.

👍 Pro: You already know the best spots in town

If you’ve got uni friends who are new to the city, they’ll soon see you as their guide to the best places to eat, drink and go out. You know this town like the back of your hand, so you won’t be fooled when a promoter tells you to wait outside a grotty club for hours because it’s 'the place to be'!

👎 Con: You don’t get to experience a new city

You can’t deny that there’s somewhat of a novelty factor about going away for university. In student halls, no one knows each other, and most aren’t familiar with the local area. You’re all in the same boat on uncharted waters, navigating a new city together. You’re bound to make some bad choices, but you’ll also discover new favourites as you embark on a fresh adventure far from the comfort of your own home.

👍 Pro: Home-cooked food wins every time

Easy cheesy pasta may have been sufficient for fresher’s week, but as the winter goes on, you start longing for your family’s cooking. If you study in your hometown, you’ll never be too far away from a hearty meal that doesn’t involve pasta (or a microwave)!

👎 Con: Commuting can be costly

If you do choose to live at home and your house isn’t close to the campus, commuting to and from class can start to get pricey. If you are choosing this option, we recommend getting a bus pass to keep the costs down – that way, you won’t be forking out every time your friends want to meet up. But, on the other hand, train tickets to your new city are costly too!

👍 Pro: Free laundry access

Let’s be honest here - flaundry (the act of leaving your laundry on the floor for a while until it miraculously cleans itself) doesn’t work. When you’re living in halls, the cost of doing laundry can rack up... to the point where you’re spending your student loan on new clothes to avoid tackling the mountain of dirty clothes from weeks gone by. Spoiler alert – new clothes get dirty too! When you study in your hometown, you can greet your parents with a pile of dirty washing every week! (Sorry, mum.)

👎 Con: You might get FOMO

In the summer before you start university, you can get into a nice routine of living at home; do a bit of work here and there, chill out on the sofa, catch some daytime telly, repeat. If you do intend on staying local when term starts, make an effort to go to campus often and get involved with clubs and socs. If you don’t, you might end up suffering from the dreaded Fear of Missing Out (FOMO) when you choose to stay in again.

👍 Pro: You can choose between home or student accommodation  

Studying in a new city is synonymous with student halls, and while this setting may make for a memorable experience, sharing a flat with new people is not for everyone. When you live locally, you can save money on student accommodation by living at home and commuting to your classes instead. If you’d rather put some much-needed space between you and your family, the option for a student flat is there – but at least you have a choice.

👎 Con: You might miss out on some life skills

When you study in a new city, you’re forced to fend for yourself. As a result, you end up learning some key life skills like cooking an (edible) meal, separating your clothes wash into colours and budgeting for the term ahead. Along the way, you’ll inevitably burn your pasta, turn all your whites red and spend your student loan in a week... but that’s how you learn!

👍 Pro: You won’t have to pick and choose what to take with you

Studying in a new city means making sweeping choices about what to take with you. Worse still, if you aren’t getting a lift to uni, your journey will involve carrying hordes of heavy bags on public transport (because you might want to play guitar at some point, or need that winter coat... right?). When you’re studying in your hometown and the new term starts, you won’t have to make big decisions about what to pack and what to leave at home. If you’re missing anything from your wardrobe, toiletries or kitchen cupboards, you can just pop home and pick them up!

👎 Con: You’ll always have that feeling of “what if…” 

If you don’t go, you’ll never know. It may be for the best, but you may regret not throwing yourself in to new surroundings when you study in your hometown. You never know who you’re going to meet and what new experiences await. Either way, it's best to trust your gut.

👍 Pro: You’ll still meet loads of new people

Even if you aren’t going to a new city, just being at uni will give you the chance to make plenty of new friends and meet like-minded people. Whether through clubs, classes or events, the more you get involved, the more connected you’ll feel with student life. Most universities around the UK welcome students from across the world, so your friend-group won’t be limited to locals-only. Within no time, you’ll be mingling with a diverse mix of people from a range of places.

Whether you choose to study in a new city or stay at home, it’ll be the right decision for you. At the end of the day, it’s not about where you live, but the effort you put in to get the most from your university experience!

Recent Posts

How to prepare for resits and reassessment period, 18 july 2024 • 1 min read, where do students live in glasgow find the best location for your student accommodation, the ultimate guide to studying in the uk as an international student, 17 july 2024 • 1 min read, view all posts, students unihomes..

  • Brand Ambassadors
  • Help Centre
  • Website Terms
  • Privacy & Cookie Policies

© 2024 UniHomes

UniHomes is a trading name of UniHomes and Bills Limited, a company registered in England and Wales with company number 09618272 registered at 6th Floor, 1 New Era Square, Sheffield S2 4RB. VAT Number: 218500925.

You currently have JavaScript disabled

This site requires JavaScript to be enabled. JavaScript is used on this site to improve user experience and enable functionality without JavaScript this site wont work as required.

. Once JavaScript is enabled, this message will be removed.

Essay Service Examples Technology Disadvantages of Technology

Essay on Disadvantages of Mobile Phone Technology

Are there any advantages and disadvantages of having a mobile phone as a child?

What are the disadvantages of owning a mobile phone.

  • Proper editing and formatting
  • Free revision, title page, and bibliography
  • Flexible prices and money-back guarantee

document

What are the advantages of owning a mobile phone?

What is an appropriate age to own a mobile phone, conclusion:, referencing:.

  • Australian Bureau of Statistics, 2010. 1370.0 - Measures Of Australia's Progress, 2010. [online] Abs.gov.au. Available at: [Accessed 17 March 2020].
  • Bhagat, A., 2017. Top 20 Health Disadvantages Of Using Mobile Phones For Long Hours. [online] ListSurge. Available at: [Accessed 17 March 2020].
  • Goodman, P., 2020. 20 Advantages Of Mobile Phones. [online] TurboFuture. Available at: [Accessed 17 March 2020].
  • Jones, K., 2020. The Advantages Of Mobile Phones To Society. [online] Techwalla. Available at: [Accessed 17 March 2020].
  • How do cell phones distract students? 2016. Directed by The Media Show. The Media Show.
  • Voegeli, A., 2014. The Affects Cell Phones Have On Social Skills | Siowfa14 Science In Our World: Certainty And Cont. [online] Sites.psu.edu. Available at: [Accessed 17 March 2020].
  • Williams, A., 2017. How Do Smartphones Affect Childhood Psychology? [online article] Psych Central. Available at: [Accessed 17 March 2020].
  • Williams, A., 2020. How Do Smartphones Affect Childhood Psychology? [online] Psych Central. Available at: [Accessed 17 March 2020].

Our writers will provide you with an essay sample written from scratch: any topic, any deadline, any instructions.

reviews

Cite this paper

Related essay topics.

Get your paper done in as fast as 3 hours, 24/7.

Related articles

Most popular essays.

  • Advantages of Technology
  • Disadvantages of Technology

Driverless cars have great potential to become the biggest transportation method in the near...

  • Effects of Technology

As the advent of technology brought an easiness and comfort in our life, at the same time it...

  • Technology in Education

In this age, society, particularly students, use technology to make complex things less...

  • Mobile Phone

I am writing this discursive essay on the topic on the advantages and disadvantages of having...

  • Criminal Justice

In this essay, I will talk about how modern technology will change our criminal justice system....

The world is changing at very high rate because of the advancement of technologies. Technologies...

  • Conversation

Can you imagine your life without technology? I think the answer is no and it is a terrible thing....

Nowadays, technology is all around the world. We use it on a daily basis to get our individual...

The Internet is on a constant uprise, from social media platforms to a wireless connection in the...

Join our 150k of happy users

  • Get original paper written according to your instructions
  • Save time for what matters most

Fair Use Policy

EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via [email protected].

We are here 24/7 to write your paper in as fast as 3 hours.

Provide your email, and we'll send you this sample!

By providing your email, you agree to our Terms & Conditions and Privacy Policy .

Say goodbye to copy-pasting!

Get custom-crafted papers for you.

Enter your email, and we'll promptly send you the full essay. No need to copy piece by piece. It's in your inbox!

  • Skip to main content
  • Keyboard shortcuts for audio player

As she is poised to be the Democratic nominee, here are 5 facts about Kamala Harris

Jeongyoon Han

US Vice President and Democratic presidential candidate Kamala Harris speaks at her campaign headquarters in Wilmington, Delaware, on July 22, 2024.

Vice President and Democratic presidential candidate Kamala Harris speaks at her campaign headquarters in Wilmington, Delaware, on Monday. Erin Schaff/POOL via Getty Images hide caption

For more on Biden's decision and the now open 2024 race, head to the NPR Network's live updates page .

Just one day after President Biden threw his support behind Vice President Harris for the 2024 Democratic presidential nomination after dropping out of the race, Harris secured enough delegates to win the nomination, according to the Associated Press.

While she has not officially become the nominee, if she does when the DNC holds its virtual roll call on Aug, 7, Harris will become the first woman of color to be a major party presidential nominee.

Harris, the daughter of immigrants from Jamaica and India, has had a career with many firsts: She became the country's first Indian American senator when she was inaugurated in 2017. She is California’s first female and South Asian attorney general. In 2021, she became the first woman to become vice president, in addition to being the first Black or Asian American person in the position.

And, if she were to win the general election against former President Donald Trump, she would become the first woman president of the United States.

Here are five things to know about Harris:

1. She ran for president in 2020 but didn’t get very far.

Senator Kamala Harris holds her niece Amara as she and her husband Douglas Emhoff wave to the crowd after hosting her first presidential campaign rally in her hometown of Oakland, California, on Sunday, Jan. 27, 2019.

Senator Kamala Harris holds her niece Amara as she and her husband Douglas Emhoff wave to the crowd after hosting her first presidential campaign rally in her hometown of Oakland, California, on Sunday, Jan. 27, 2019. Gabrielle Lurie/The San Francisco Chronicle via Getty Images hide caption

Harris announced in 2019 she would run for the White House, and while Harris notably pushed Biden on his previous record over desegregation and busing, that was the high point of her run. Most of her bid, in fact, was riddled with campaign hiccups and minimal momentum.

She was criticized for how she championed tough truancy policies when she was the attorney general for California, which some said perpetuated inequities in the criminal justice system and disproportionately affected families of color . Harris later said she regretted the " unintended consequences " that law had on families.

More broadly, Harris failed to distinguish her positions on key issues, in ways that her competitors, such as Massachusetts Sen. Elizabeth Warren and Vermont Sen. Bernie Sanders, were able to. In the months following, Harris failed to gain steam with limited funds and little excitement behind her campaign, and she dropped out by December 2019.

2. She has a mixed legacy in criminal justice

California Attorney General-elect Kamala Harris holds a press conference top discuss the hard fought Attorney General race. The vote tally took over a month to decide the outcome, with each side leading at various times. Harris finally won with approximately 50 thousand vote lead.

California Attorney General-elect Kamala Harris holds a press conference top discuss the hard fought Attorney General race. The vote tally took over a month to decide the outcome, with each side leading at various times. Harris finally won with approximately 50 thousand vote lead. Ted Soqui/Corbis via Getty Images hide caption

During her 2020 presidential bid, Harris ran to the left of Biden on several criminal justice issues, like ending solitary confinement and implementing a national standard on the use of deadly force.

But her “tough on crime” track record as a prosecutor, district attorney, and attorney general in California during the 1990s and 2000s is a clear reminder of her complicated and sometimes contradictory legacy on the criminal justice system . 

On the one hand, she established a reentry program in the early 2000s that was seen as a form of restorative justice. She supported legislation that would expand voting rights to those serving felony sentences. She also opposed the death penalty — and stood by that when she did not seek the death penalty against a gang member who killed a police officer in 2004. But when the opportunity came to get rid of the death penalty in California, Harris appealed that ruling . Then, when California Gov. Gavin Newsom put a moratorium on the death penalty in 2019, Harris praised Newsom for the decision, and subsequently called for a federal moratorium on executions .

It took her years as San Francisco’s district attorney to adopt a defendant’s rights policy known as the Brady doctrine, even though her staff recommended the policy to her in 2005 . As state attorney general, she rejected the use of advanced DNA testing in the case of a Black man who was — and still is — on death row for a notable murder case, though she has since said she felt “ awful ” about that decision. She also did not go after cases that involved killings by the police in San Francisco shortly after the 2014 killing of Michael Brown in Ferguson, Mo., which brought on the ire of protesters in Oakland. The year after, she declined to support a bill that would have her office investigate officer-involved shootings, and she did not back statewide standards over body cameras worn by police officers.

3. She is known for high-profile grillings early in the Trump administration

Sen. Kamala Harris, D-CA, listens to Christine Blasey Ford, the woman accusing Supreme Court nominee Brett Kavanaugh of sexually assaulting her at a party 36 years ago, testifying before the US Senate Judiciary Committee on Capitol Hill in Washington, DC, September 27, 2018.

Sen. Kamala Harris, D-CA, listens to Christine Blasey Ford, the woman accusing Supreme Court nominee Brett Kavanaugh of sexually assaulting her at a party 36 years ago, testifying before the US Senate Judiciary Committee on Capitol Hill in Washington, DC, September 27, 2018. Saul Loeb/AFP via Getty Images hide caption

It was 2018. Harris was still a relative newcomer in the Senate. And yet, she made a splash when she grilled Brett Kavanaugh, Trump’s then-nominee for the Supreme Court.

“Can you think of any laws that give government the power to make decisions about the male body?” she asked Kavanaugh in a question pointedly about reproductive rights.

After Kavanaugh struggled to give an answer, Harris repeated the question. Kavanaugh’s final response: “I'm not thinking of any right now, senator.”

That was one of several viral moments of Harris as she went after officials and politicians tied to the Trump administration, including former Attorney General Jeff Sessions, former White House chief of staff John Kelly, and former Attorney General William Barr .

While Trump called her “ nasty ” for how she questioned Kavanaugh, her line of questioning piqued Trump’s interest when she was freshly nominated by Biden to be his running mate in 2020, showing him and Republicans she was capable of going after them.

4. It took a while to find her footing as VP, but when she did, she focused on issues that are key to younger voters

U.S. President-elect Joe Biden, center right, wife Jill Biden, right, U.S. Vice President-elect Kamala Harris, center left, and husband Douglas Emhoff hold hands while wearing protective masks during an election event in Wilmington, Delaware, U.S., on Saturday, Nov. 7, 2020.Sarah Silbiger/Bloomberg via Getty Images

U.S. President-elect Joe Biden, center right, wife Jill Biden, right, U.S. Vice President-elect Kamala Harris, center left, and husband Douglas Emhoff hold hands while wearing protective masks during an election event in Wilmington, Delaware, U.S., on Saturday, Nov. 7, 2020. Sarah Silbiger/Bloomberg via Getty Images hide caption

Despite Harris’ underwhelming performance in the 2020 Democratic presidential primary, Biden nominated her to be his running mate, making her the first Black woman and person of Indian descent to be nominated by a major party for national office. The announcement was celebrated by many in the party: She had been seen as a rising leader among Democrats, and capable of leading an increasingly diversifying party and country.

But things went off to a rocky start when she entered the White House. She misstepped in an interview with NBC’s Lester Holt when answering why she had not yet visited the border at the time, had turnover in her staff, and had consistently low approval ratings early into her tenure as vice president.

Although Harris was initially seen as uncomfortable in the role, she quickly grew into the job. Harris said the Supreme Court’s overturning of Roe v. Wade in 2022 galvanized her, and she rewrote an entire speech she was supposed to deliver at an event about maternal health that day. She became the primary messenger on abortion and reproductive rights. Additionally, she campaigned aggressively for gun safety, has tried to connect with more women and people of color during her tenure, and was praised by progressives for her forceful call for a ceasefire in the Israel-Hamas war.

5. Her race and gender have made her subject to sexist and racist attacks

US Vice President and Democratic Presidential candidate Kamala Harris speaks at West Allis Central High School during her first campaign rally in Milwaukee, Wisconsin, on July 23, 2024.

US Vice President and Democratic Presidential candidate Kamala Harris speaks at West Allis Central High School during her first campaign rally in Milwaukee, Wisconsin, on July 23, 2024. Kamil Krzaczynski/AFP via Getty Images hide caption

While many women in politics are often victims of sexist remarks and verbal abuse, a 2020 study tracking more than 300,000 instances of gendered abuse and disinformation against 13 women political candidates found that Harris was the target of such attacks 78% of the time.

Nina Jankowicz, who researches disinformation targeting women in politics and is the co-founder and CEO of the American Sunlight Project, said harmful narratives are “part of the criticism and abuse that women in public life frequently receive.”

The attacks against Harris in particular have often come from many on the right, including Trump and his running mate, Ohio Sen. JD Vance. Trump advanced a birtherism conspiracy theory about Harris that falsely stated she was not qualified to run as vice president back in 2020. Trump also called Harris “ crazy ,” and often ridicules the way she laughs — yet another display of hyper-criticizing women’s voices.

And Jankowicz said that it’s important to call out the sexist and racist online trolling against Harris that’s only grown since Biden’s announcement on Sunday.

“And I just think it's really important at this historic moment that we label these narratives and lies as what they are: an attempt to undermine Kamala Harris' public service and her record of public service because of her gender, her background and her skin color,” she said.

  • Environment
  • Science & Technology
  • Business & Industry
  • Health & Public Welfare
  • Topics (CFR Indexing Terms)
  • Public Inspection
  • Presidential Documents
  • Document Search
  • Advanced Document Search
  • Public Inspection Search
  • Reader Aids Home
  • Office of the Federal Register Announcements
  • Using FederalRegister.Gov
  • Understanding the Federal Register
  • Recent Site Updates
  • Federal Register & CFR Statistics
  • Videos & Tutorials
  • Developer Resources
  • Government Policy and OFR Procedures
  • Congressional Review
  • My Clipboard
  • My Comments
  • My Subscriptions
  • Sign In / Sign Up
  • Site Feedback
  • Search the Federal Register

The Federal Register

The daily journal of the united states government.

  • Legal Status

This site displays a prototype of a “Web 2.0” version of the daily Federal Register. It is not an official legal edition of the Federal Register, and does not replace the official print version or the official electronic version on GPO’s govinfo.gov.

The documents posted on this site are XML renditions of published Federal Register documents. Each document posted on the site includes a link to the corresponding official PDF file on govinfo.gov. This prototype edition of the daily Federal Register on FederalRegister.gov will remain an unofficial informational resource until the Administrative Committee of the Federal Register (ACFR) issues a regulation granting it official legal status. For complete information about, and access to, our official publications and services, go to About the Federal Register on NARA's archives.gov.

The OFR/GPO partnership is committed to presenting accurate and reliable regulatory information on FederalRegister.gov with the objective of establishing the XML-based Federal Register as an ACFR-sanctioned publication in the future. While every effort has been made to ensure that the material on FederalRegister.gov is accurately displayed, consistent with the official SGML-based PDF version on govinfo.gov, those relying on it for legal research should verify their results against an official edition of the Federal Register. Until the ACFR grants it official status, the XML rendition of the daily Federal Register on FederalRegister.gov does not provide legal notice to the public or judicial notice to the courts.

Cybersecurity Labeling for Internet of Things

A Rule by the Federal Communications Commission on 07/30/2024

Document Details

Information about this document as published in the Federal Register .

Document Statistics

Published document.

This document has been published in the Federal Register . Use the PDF linked in the document sidebar for the official electronic format.

Enhanced Content - Table of Contents

This table of contents is a navigational tool, processed from the headings within the legal text of Federal Register documents. This repetition of headings to form internal navigation links has no substantive legal effect.

FOR FURTHER INFORMATION CONTACT:

Supplementary information:, a. eligible devices or products, b. oversight and management of the iot labeling program, c. cyberlabs, cla-run labs, and in-house testing labs, d. two-step process for obtaining authority to use the fcc iot label, e. consumer iot product cybersecurity criteria and standards, f. the fcc iot label (cyber trust mark and qr code), g. registry, h. continuing obligations of entities authorized to use the fcc iot label, i. audits, post-market surveillance, and enforcement, j. international reciprocal recognition of the cyber trust mark, k. consumer education, l. cost/benefit analysis, i. legal authority, ii. incorporation by reference, iii. procedural matters, iv. ordering clauses, list of subjects in 47 cfr part 8, final rules, subchapter a—general, part 8—safeguarding and securing the internet, subpart a—protections for internet openness, subpart b—cybersecurity labeling program for iot products, enhanced content - submit public comment.

  • This feature is not available for this document.

Enhanced Content - Read Public Comments

Enhanced content - sharing.

  • Email this document to a friend

Enhanced Content - Document Print View

  • Print this document

Enhanced Content - Document Tools

These tools are designed to help you understand the official document better and aid in comparing the online edition to the print edition.

These markup elements allow the user to see how the document follows the Document Drafting Handbook that agencies use to create their documents. These can be useful for better understanding how a document is structured but are not part of the published document itself.

Enhanced Content - Developer Tools

This document is available in the following developer friendly formats:.

  • JSON: Normalized attributes and metadata
  • XML: Original full text XML
  • MODS: Government Publishing Office metadata

More information and documentation can be found in our developer tools pages .

Official Content

  • View printed version (PDF)

This PDF is the current document as it appeared on Public Inspection on 07/29/2024 at 8:45 am. It was viewed 0 times while on Public Inspection.

If you are using public inspection listings for legal research, you should verify the contents of the documents against a final, official edition of the Federal Register. Only official editions of the Federal Register provide legal notice of publication to the public and judicial notice to the courts under 44 U.S.C. 1503 & 1507 . Learn more here .

Federal Communications Commission.

Final rule.

In this document, the Federal Communications Commission (Commission or FCC) establishes a voluntary cybersecurity labeling program for wireless consumer Internet of Things, or IoT, products. The program will provide consumers with an easy-to-understand and quickly recognizable FCC IoT Label that includes the U.S. Cyber Trust Mark and a QR code linked to a dynamic, decentralized, publicly available registry of more detailed cybersecurity information. This program will help consumers make safer purchasing decisions, raise consumer confidence regarding the cybersecurity of the IoT products they buy, and encourage manufacturers to develop IoT products with security-by-design principles in mind.

Effective date: This rule is effective August 29, 2024.

Incorporation by reference: The incorporation by reference of certain material listed in the rule is approved by the Director of the Federal Register as of August 29, 2024.

Compliance date: Compliance with 47 CFR 8.208 , 8.209 , 8.212 , 8.214 , 8.215 , 8.217 , 8.218 , 8.219 , 8.220 , 8.221 , and 8.222 will not be required until the Office of Management and Budget has completed review under the Paperwork Reduction Act. The Commission will publish a document in the Federal Register announcing that compliance date.

Zoe Li, Cybersecurity and Communications Reliability Division, Public Safety and Homeland Security Bureau, (202) 418-2490, or by email to [email protected] .

For additional information concerning the Paperwork Reduction Act information collection requirements contained in this document, contact Nicole Ongele, Office of Managing Director, Performance and Program Management, 202-418-2991, or by email to [email protected] .

This is a summary of the Commission's Report and Order, PS Docket No. 23-239, adopted March 14, 2024, and released March 15, 2024. The full text of this document is available by downloading the text from the Commission's website at: https://docs.fcc.gov/​public/​attachments/​FCC-24-26A1.pdf . When the FCC Headquarters reopens to the public, the full text of this document will also be available for public inspection and copying during regular business hours in the FCC Reference Center, 45 L Street NE, Washington, DC 20554. To request this document in accessible formats for people with disabilities ( e.g., Braille, large print, electronica files, audio format, etc.) or to request reasonable accommodations ( e.g., accessible format documents, sign language interpreters, CART, etc.), send an email to [email protected] or call the FCC's Consumer and Government Affairs Bureau at (202) 418-0530 (voice), (202) 418-0432 (TTY).

Congressional Review Act: The Commission has determined, and the Administrator of the Office of Information and Regulatory Affairs, Office of Management and Budget, concurs, that this rule is non-major under the Congressional Review Act, 5 U.S.C. 804(2) . The Commission will send a copy of the Order to Congress and the Government Accountability Office pursuant to 5 U.S.C. 801(a)(1)(A) .

1. With the Report and Order (Order), the Commission takes prompt and decisive measures to strengthen the nation's cybersecurity posture by adopting a voluntary cybersecurity labeling program for wireless IoT products. The Commission's IoT Labeling Program will provide consumers with an easy-to-understand and quickly recognizable FCC IoT Label that includes the U.S. Government certification mark (referred to as the U.S. Cyber Trust Mark) that provides assurances regarding the baseline cybersecurity of an IoT product, together with a QR code that directs consumers to a registry with specific information about the product. Consumers who purchase an IoT product that bears the FCC IoT Label can be assured that their product meets the minimum cybersecurity standards of the IoT Labeling Program, which in turn will strengthen the chain of connected IoT products in their own homes and as part of a larger national IoT ecosystem. The Order will help consumers make better purchasing decisions, raise consumer confidence with regard to the cybersecurity of the IoT products they buy to use in their homes and their lives, and encourage manufacturers of IoT products to develop products with security-by-design principles in mind.

2. In the Order, we set forth the framework by which the IoT Labeling Program will operate. We focus the IoT Labeling Program initially on IoT “products,” which we define to include one or more IoT devices and additional product components necessary to use the IoT device beyond basic operational features. Recognizing that a successful voluntary IoT Labeling Program will require close partnership and collaboration between industry, the Federal Government, and other stakeholders, we adopt an administrative framework for the IoT Labeling Program that capitalizes on the existing public, private, and academic sector work in this space, while ensuring the integrity of the IoT Labeling Program through oversight by the Commission.

3. Voluntary IoT Labeling Program. We establish a voluntary IoT Labeling Program for wireless consumer IoT products. While participation is voluntary, those that choose to participate must comply with the requirements of the IoT Labeling Program to receive authority to utilize the FCC IoT Label bearing the Cyber Trust Mark. The IoT Labeling Notice of Proposed Rulemaking (NPRM), 88 FR 58211 (August 25, 2023), sought comment on whether the proposed IoT Labeling Program should be voluntary, reasoning that “success of a cybersecurity labeling program will be dependent upon a willing, close partnership and collaboration between the federal government, industry, and other stakeholders.” The record shows substantial support for a voluntary approach. The Custom Electronic Design & Installation Association (CEDIA) suggests that IoT Labeling Program must be voluntary “for the program to gain momentum in the marketplace.” AIM, Inc. (AIM) suggests that the voluntary aspect of the IoT Labeling Program “will help drive adoption of the label by device producers.” Further, commenters suggest that a voluntary program will ensure the broadest reach, most efficiency, and widest access to a diversity of IoT technologies. We agree that a voluntary program will help drive adoption of the IoT Labeling Program, so that a willing, close partnership can be achieved. We also agree with the record that flexible, voluntary, risk-based best practices are the hallmarks of IoT security as it exists today and as it is being developed around the world. Additionally, we acknowledge the view that “consumer labeling is a difficult undertaking in any context,” especially Start Printed Page 61243 in the evolving area of cybersecurity, and that the “best approach is to start the Program with something achievable and effective.” We concur that willing participation will allow the IoT Labeling Program to be more easily achievable than requiring participation in a novel program. With the added imprimatur of a U.S. Government certification mark, the IoT Labeling Program will help distinguish products in the marketplace that meet minimum requirements and provide options to consumers.

4. We reject arguments that mandating participation in the IoT Labeling Program is necessary. While we recognize that a voluntary IoT Labeling Program may cause concern that smaller businesses with limited resources may choose not to participate, we believe the strong stakeholder engagement and collaboration that we expect to result from willing participation, and which is vital to establishing this new program, outweighs these risks. Further, while we acknowledge that, at least in the near term, allowing the IoT Labeling Program to be voluntary “could limit its adoption and impact,” we believe this risk is outweighed by the benefits that a voluntary program will garner, such as speed to market to hasten impact, efficiency of resources, and the likelihood that consumer demand will drive widespread adoption over time.

5. In adopting the IoT Labeling Program with the parameters discussed in the Order, we are establishing a collaborative effort between the Federal Government and relevant stakeholders in industry and the private sector. We emphasize that the Order is intended to provide the high-level programmatic structure that is reasonably necessary to establish the IoT Labeling Program and create the requirements necessary for oversight by the Commission, while leveraging the extensive work, labeling schemes, processes and relationships that have already been developed in the private sector. We also note that there is further development to be done by the private sector and other Federal agencies to implement the IoT Labeling Program and, as discussed below, expects many of the details not expressly addressed in the Order will be resolved through these separate efforts and by the authorities the Commission delegates to the Public Safety and Homeland Security Bureau (PSHSB or the Bureau).

6. The Order initially establishes the IoT Labeling Program for wireless consumer IoT products. We do not, however, foreclose the possibility of expanding the IoT Labeling Program in the future.

7. The record supports adopting an IoT Labeling Program that encompasses consumer-focused IoT products. We focus our IoT Labeling Program initially on consumer IoT products, rather than enterprise or industrial IoT products. Because medical devices regulated by the U.S. Food and Drug Administration (FDA) already are subject to statutory and regulatory cybersecurity requirements under other Federal laws more specifically focused on such devices, we do not include such devices in our IoT Labeling Program. In addition, we exclude from this program motor vehicles  [ 1 ] and motor vehicle equipment (as defined in 49 U.S.C. 30102(8) given that the National Highway Traffic Safety Administration (NHTSA) “has the authority to promulgate motor vehicle safety regulations on cybersecurity and has enforcement authority to secure recalls of motor vehicles and motor vehicle equipment with a safety-related defect, including one involving cybersecurity flaws.” We also exclude from our IoT Labeling program any communications equipment on the Covered List that the Commission maintains pursuant to the Secure and Trusted Communications Networks Act and equipment produced by certain other entities as discussed below. Finally, our initial IoT Labeling Program will focus on wireless consumer IoT devices consistent with the core of our section 302 authority governing the interference potential of devices that emit radio frequency energy—and thus we exclude wired IoT devices at this time.

8. Definition of IoT Devices. Although we focus our IoT Labeling program on IoT “products,” to lay a foundation we must first address the definition of IoT “devices” because this definition is a building block of the IoT “product” definition. In this respect, we adopt the modified version of the National Institute of Standards and Technology (NIST) definition of “IoT device” that the Commission proposed in the IoT Labeling NPRM. Specifically, the IoT Labeling NPRM proposed defining an IoT device to include (1) an internet-connected device capable of intentionally emitting radio frequency (RF) energy that has at least one transducer (sensor or actuator) for interacting directly with the physical world, coupled with (2) at least one network interface ( e.g., Wi-Fi, Bluetooth) for interfacing with the digital world. This definition builds on NIST's definition by adding “internet-connected” as a requirement, because “a key component of IoT is the usage of standard internet protocols for functionality.” The modified definition adopted in the Order also adds that a device must be “capable of intentionally emitting RF energy,” because aspects of the Commission's authority recognizes the particular risks of harmful interference associated with such devices. It should be noted that we direct the Label Administrator to collaborate with Cybersecurity Label Administrators (CLAs) and other stakeholders ( e.g., cyber experts from industry, government, and academia) as appropriate and recommend within 45 days of publication of updates or changes to NIST guidelines, or adoption by NIST of new guidelines, to the FCC any appropriate modifications to the Labeling Program standards and testing procedures to stay aligned with the NIST guidelines.

9. The record supports this reasoning. For example, Consumer Reports states that “[i]f you're going to sell a device where some of the benefits come from having a cloud connection, an app, and connectivity, then those must also be secured.” Consumer Reports provides further support for the Commission's reasoning by noting that “connectivity may be so central to the functionality of the device that it may no longer be able to operate safely [without it].” TIC Council Americas similarly “agrees that `internet-connected' should be included in the definition of IoT devices.” We agree with these arguments and adopt the modified IoT device definition requiring “internet-connected” device element to assure consumers that the functionality of the IoT device or product displaying the Cyber Trust Mark is reasonably secure as well. As noted by ioXt Alliance, including “internet-connected” in the definition of IoT makes “sense if the program focuses on IoT products instead of devices because not all IoT devices are `internet-connected.' ” Because the IoT Labeling Program will be focused on the broader category of IoT consumer products and not devices, including “internet-connected” in the definition of IoT device is further justified.

10. We disagree with commenters who argue the Commission should adopt the NIST definition of a device without change. We acknowledge that the record indicates some concern regarding the internet-connected element of the Commission's proposed definition; however, we find these concerns to be misplaced. TIC Council Start Printed Page 61244 Americas, for example, supports adding “internet-connected” to the definition, but argues that “there are devices that are able to connect to non-internet connected networks, and that those devices should not be excluded from the program.” While we do not foreclose the possibility of expanding the IoT Labeling Program to devices on non-internet connected networks in the future, we focus initially on the more common category of internet-connected consumer IoT products. Others argue that “internet-connected” is too “situational,” with a concern that the device might become “disconnected from the internet and, therefore, no longer be an `IoT device.' ” We do not agree that “internet-connected device” must be interpreted so narrowly as to exclude from the IoT Labeling Program devices that may become disconnected from the internet. “internet-connected,” in terms of the IoT Labeling Program, applies to the functional capability of the device; if the device is capable of being connected to the internet, the fact that it may not be connected at any given point in time does not exclude its eligibility for participation in the IoT Labeling Program. Further, any potential concerns arising from requiring an IoT device be “internet-connected” for inclusion in the IoT Labeling Program are outweighed by the benefit of giving consumers further assurance that the security of their IoT device or product extends to the connected functionality that a consumer expects when making such a purchase. In this respect, including “internet-connected” in the definition of IoT device also recognizes the highest risk functional component of an IoT device that distinguishes “smart” devices from other devices a consumer may use, and allows the Cyber Trust Mark to more effectively support consumer expectations.

11. The record also supports adding an RF energy-emitting element to the IoT device definition, acknowledging the Commission's authority under section 302 governing the interference potential of devices that emit RF energy and can cause harmful interference to radio communications. We reject the argument that limiting the definition to RF-emitting devices may lead to marketplace confusion if a product does not bear the Cyber Trust Mark due solely to its lack of RF energy emissions. In the first instance, we note the need to launch an achievable IoT Labeling Program consistent with the Commission's core authority. We also note that the benefits that a focus on wireless products will have in elevating the overall cybersecurity posture of the IoT ecosystem, especially in view of the record indicating that the majority of IoT devices are wireless, outweigh the risks associated with concerns regarding marketplace confusion. In any case, there will be a number of products—both wired and wireless—that do not bear the Cyber Trust Mark while uptake occurs. We also anticipate that consumer education in this space will help alleviate these concerns.

12. We further disagree with the view that the capability of a device to emit RF radiation is “unrelated to the general, far-ranging cybersecurity concerns the Commission is confronting in this proceeding.” Instead, we agree with Comcast that interference caused by a [distributed denial of service] attack raises “the same policy concerns and has the same practical effect as interference caused by traditional means.” The Electronic Privacy Information Center (EPIC) explains how hackers exploit unpatched vulnerabilities to attack a large number of wireless devices, and turning them into signal jammers to take down mobile networks. The record thus bears out our view that cybersecurity vulnerabilities in wireless IoT devices could cause harmful interference to radio communications. Given Congress' direction to the Commission in section 302 of the Act to guard against the interference potential of wireless devices, requiring the element of “emitting RF energy interference” in the IoT device definition for the initial iteration of the IoT Labeling Program focuses on that core Commission authority without ruling out future action regarding wired IoT devices. Further, while we acknowledge that devices that unintentionally or incidentally emit RF radiation may also pose interference potential, we find that a focus initially on “intentional” radiators provides the ability of a nascent program to target products with the highest risk profile from among those that emit RF energy.

13. Definition of IoT Products. We adopt the NIST definition of an “IoT product.” Specifically, the IoT Labeling NPRM's proposed definition of IoT product is an “IoT device and any additional product components ( e.g., backend, gateway, mobile app) that are necessary to use the IoT device beyond basic operational features.” The record supports adopting the IoT product definition developed by NIST, with Garmin International, Inc. (Garmin) noting that a fundamental purpose of the IoT Labeling Program “is to inform consumers regarding device security as they evaluate potential IoT purchases. . . . [T]his purpose is best achieved by focusing on `consumer IoT products' as defined by NIST in NISTIR 8425.” Additionally, Kaiser Permanente states that adopting the NIST definition of IoT products will “promote consistency across federal agency programs and related industry norms and requirements.” Further, the Information Technology Industry Council (ITI) explained that the “Commission's implementation of the program will be more successful if it aligns as closely as possible to the definitions, processes and procedures already outlined by NIST.” We agree with these commenters, in that adopting NIST's IoT product definition will allow for consistency in the treatment of programmatic elements across the Federal Government, and allow the Commission to appropriately leverage the work existing in this space to promote the IoT Labeling Program's success. We also note that no commenters opposed the NIST definition of IoT products. For purposes of the IoT Labeling Program, when discussing IoT products and their “components” in the Order, we are using the NISTIR 8425 scoping definition of “components.” We believe that this definition allows the IoT Labeling Program to address the most relevant “package” components expected by consumers to be securable when making purchasing decisions, and encompasses the appropriate level of “component” pieces to address the functionalities that generate the most salient cybersecurity risks. [ 2 ] This view is supported by the record, with Consumer Technology Association (CTA) providing a proposed testing framework where “all individual components provided by the manufacturer should be in scope for testing,” including all components of the IoT product “that are necessary for the device to function in a normal use case scenario.”

14. IoT Devices vs. IoT Products. We find that the IoT Labeling Program should apply to “IoT products” as defined above, rather than being limited only to “IoT devices.” In the IoT Labeling NPRM, the Commission noted Start Printed Page 61245 that it was important to ensure that the IoT Labeling Program “would be sufficiently inclusive to be of value to consumers.” Since the Commission's adoption of the IoT Labeling NPRM, NIST has provided clarity in this realm by stating “the cybersecurity technical and non-technical outcomes defined in the NISTIR 8425 consumer profile apply to IoT products and not just IoT devices.” In addition, in reviewing the record, we believe applying the IoT Labeling Program to IoT products instead of IoT devices alone achieves these priorities because only by addressing the full functionality of a consumer product ( i.e., one or more IoT devices and any additional product components ( e.g., backend, gateway, mobile app) that are necessary to use the IoT device, beyond basic operational features) “including data communications links to components outside this scope but excluding those external components and any external third-party components that are outside the manufacturer's control” will provide consumers the necessary scope to satisfy the basic security expectation of the consumer and effectuate a discernable increase in the cybersecurity posture of the IoT ecosystem at large.

15. There is significant support in the record for an IoT product focus for the IoT Labeling Program. As explained by UL Solutions, applying the IoT Labeling Program to IoT products is necessary since “most IoT devices sold to consumers cannot be meaningfully used without additional components.” The Cybersecurity Coalition further supports this position by saying “IoT devices are typically part of a broader ecosystem of components that can have their own security issues, requiring `IoT cybersecurity' to extend beyond individual devices to be effective.” ITI notes an IoT product focus benefits consumers because it “will appropriately capture the relevant devices/components of the product that could be vulnerable to attack (and are always included in an IoT product, as NIST points out).” Applying the IoT Labeling Program to IoT products further benefits consumers by promoting consumer safety because it “encourages manufacturers to prioritize security across all components, ultimately leading to safer and more reliable IoT experiences for consumers.” Additionally, the record indicates that “the entire service which includes cloud infrastructure as well as apps or other ways to control or manage the device by the user, and not simply the physical device itself, is critical for an assessment of safety and security.” Further, focusing on IoT products aligns not only with the technical requirements of NISTIR 8425, but also “emerging requirements in Europe and the UK [United Kingdom], such as the EU [European Union] [Cyber Resilience Act], and EU Directives on consumer protections EU 2019/770, 771.” We agree and will apply the IoT Labeling Program to consumer IoT products, which provides for the greatest level of consumer benefit by prioritizing cybersecurity across the entirety of the consumer product, as compared to just the device, which is able to perform its full functionality only when working in conjunction with other product components.

16. We disagree with Samsung, CTIA—The Wireless Association (CTIA), LG Electronics, and CTA, who advocate focusing on IoT devices instead of IoT products. Samsung and CTIA argue that cybersecurity standards for devices are more mature than standards for products, and CTA argues that applying the FCC IoT Label to products would be more complex than devices. LG Electronics expresses concern that expanding to products “would require device manufacturers to attest to the security of product components that are outside of their control.” We do not agree that these rationales support limiting application of the IoT Labeling Program only to devices, rather than products. First, applying the IoT Labeling Program narrowly to IoT devices would run counter to NIST's guidance and considerable work in this space, upon which the Commission has relied for the basis for the IoT Labeling Program proposal. NIST's Profile of the IoT Core Baseline for Consumer IoT Products (NISTIR 8425), discussed above, provides fundamental IoT guidelines and applies to the broader product category, and the more recent NIST IoT Product Component Requirements Essay clearly states that the outcomes listed in NISTIR 8425 apply to consumer IoT products and not just IoT devices.

17. Further, regarding the notion that the IoT Labeling Program should be focused on IoT devices because existing standards for IoT devices are more readily available or achievable in the near term, we counter that the record shows existing IoT device standards can be leveraged to support assessing IoT products as well. As noted by commenter ITI, existing IoT industry standards “capture similar baseline themes” to the NIST criteria. In view of these similarities, the IoT Labeling Program can leverage these existing standards for IoT devices as building blocks, and tailor them in view of the IoT products being assessed. Accordingly, the need to realize the benefits of a product-level label weigh in favor of taking a small amount of time to get to product-based standards by leveraging existing device standards.

18. We also reject the argument that because “cybersecurity frameworks and testing programs have been developed to focus on device-level—rather than product-level—assessment” that a device-level IoT Labeling Program is the appropriate outcome. We note, for example, that ITI recommends recognizing IoT security assessments from our international partners, such as IoT assessments under the Cybersecurity Labelling Scheme (CLS) by Singapore's Cyber Security Agency, which assesses the overall IoT product, and not just a single device included in the IoT product. In this regard, the ability to recognize international efficiencies for IoT Labeling Program participants would be hindered by limiting the Cyber Trust Mark to the device level, as Singapore's CLS (and other evolving international standards) focus on product-level assessments.

19. Finally, applying the IoT Labeling Program to products enhances value to consumers without requiring manufacturers to be responsible for products or devices that are outside of their control. The record shows that a consumer's expectation of security extends to the entire IoT product they purchase. This consumer expectation is evidenced in the record by ITI, clarifying that “because consumers purchase, interact with, and view IoT merchandise not as component parts but as complete physical product . . . Consumers are primarily concerned with the entire physical product they are purchasing.” Additionally, as noted by UL Solutions, “most IoT devices sold to consumers cannot be meaningfully used without additional components.” In view of this need, a manufacturer seeking authority to affix the FCC IoT Label is expected to secure the whole IoT product, including the product's internal communication links connecting the different parts of the product to each other as well as the product's communication links that connect the IoT product to the outside world. We do not require manufacturers to be responsible for third-party products or devices (including apps) that are outside of their control;  2 Start Printed Page 61246 however, where a manufacturer allows third-party apps, for example, to connect to and they allow that application to control their IoT product, such manufacturer is responsible for the security of that connection link and the app if such app resides on the IoT product. Further, we agree with CTIA that if “a [p]roduct [c]omponent also support[s] other IoT Products through alternative features and interfaces, these alternative features and interfaces may, through risk-assessment, be considered as separate from and not part of the IoT Product for purposes of authorization.” Moreover, NIST enumerates the dangers of an IoT device-only focus, establishing that the “additional product components have access to the IoT device and the data it creates and uses-making them potential attack vectors that could impact the IoT device, customer, and others,” and that “these additional components can introduce new or unique risks to the IoT product.” Consumer expectations that the FCC IoT Label would apply to the entirety of the product purchased is further highlighted by Consumer Reports, explaining that “If everything is sold within a box, then everything in the box should be approved to use the mark.” Consumer Reports also notes that “[i]f the labeling programs were only to address the physical device and not other system components, consumers would likely be deceived as to the scope and efficacy of the program.” The record is adamant that the “Cyber Trust Mark must be trusted by consumers to be successful.” In view of the record, securing only a portion of an IoT product by just assessing a single IoT device included in the IoT product, instead of assessing the devices and components that comprise the IoT product holistically, could deceive consumers and go against consumer expectation that the technology being brought into their homes is reasonably secure. We weigh heavily the likelihood for consumer confusion should the device-only approach be taken, and accordingly we apply this consumer IoT Labeling Program to IoT products and not just IoT devices.

20. In sum, although there are relative advantages and disadvantages with either a narrow focus on IoT devices or a broader focus on IoT products, on balance we are persuaded to focus our initial IoT Labeling Program on IoT products. As explained above, we find commenters' concerns about encompassing full IoT products in our IoT Labeling Program to be overstated. At the same time, we see significant shortcomings with a narrower focus just on IoT devices. Weighing the totality of these considerations, we are persuaded that targeting the IoT Labeling Program on IoT products is the best approach at this time.

21. Consumer IoT Products vs. Enterprise IoT Products. The IoT Labeling Program applies to the labeling of consumer IoT products that are intended for consumer use, and does not include products that are primarily intended to be used in manufacturing, healthcare, industrial control, or other enterprise applications. While we do not foreclose expansion of the IoT Labeling Program at a later date, this initial scope will provide value to consumers most efficiently and expediently, without added complexity from the enterprise environment.

22. The record supports the IoT Labeling Program having a consumer IoT focus, with support provided by UL Solutions, the Cybersecurity Coalition, and the Connectivity Standards Alliance (CSA), among others. The FDA also suggests that IoT outside of the consumer scope may need “[g]reater and more tailored controls,” suggesting that different considerations might attend IoT with a purpose outside of that in the routine consumer realm. Additionally, commenters highlight the differing security needs of consumer and enterprise products. For example, UL Solutions notes that “IoT products intended for commercial or industrial settings are exposed to different types of threats than consumer products and often carry higher risk if breach, which necessitates different requirements.” CSA also highlights that “[e]nterprise device security approaches are often customized and vary based on the specific needs of the business.” We agree that applying the IoT Labeling Program to consumer IoT products will reduce complexity, which will bolster the likelihood of success when starting the new IoT Labeling Program.

23. The International Speech and Communication Association (ISCA) supports including enterprise IoT, stating that a broader scope will ensure the IoT Labeling Program remains flexible to the extent that the boundary between consumer and enterprise IoT is blurring. Further, ISCA and Abhishek Bhattacharyya note that attackers have more to gain from targeting enterprise settings. While there are considerable threat vectors and vulnerabilities associated with all classes of IoT products, [ 3 ] we agree with Everything Set, Inc., that focusing the IoT Labeling Program on household use of IoT products will be more useful and have greater impact, given that enterprises tend to have more time, resources, and expertise to devote to network security. They note further that many small- and medium-sized businesses also buy consumer devices, so a consumer-focused Cyber Trust Mark would be of utility to them, as well. We believe in the near term that a consumer focus will provide the most initial impact, and create a level of recognition and trust in the Cyber Trust Mark itself as the IoT Labeling Program progresses that could be leveraged to enterprise IoT at a later time, and we therefore defer consideration of the IoT Labeling Program's expansion.

24. Exclusion of Certain Devices/Products. As an initial matter, we exclude from the IoT Labeling Program medical devices regulated by the U.S. Food and Drug Administration (FDA). The Center for Devices and Radiological Health (within the FDA) expresses concern that the Commission's labeling IoT Labeling Program may lack controls and minimum criteria that it believes are necessary for IoT medical devices. In addition, the FDA is concerned that including medical devices in the IoT Labeling Program may cause consumer confusion and “potentially creates conflict where product manufacturers attempt to both qualify for the Cyber Trust Mark and comply with existing statutory and regulatory cybersecurity requirements under other federal laws, such as the Federal Food, Drug, and Cosmetic Act (FD&C Act).” These considerations persuade us to exclude FDA-regulated medical devices from our IoT Labeling Program, consistent with commenters' recommendations. In Start Printed Page 61247 addition, we exclude from this program motor vehicles and motor vehicle equipment given that the National Highway Traffic Safety Administration (NHTSA) “has the authority to promulgate motor vehicle safety regulations on cybersecurity and has enforcement authority to secure recalls of motor vehicles and motor vehicle equipment with a safety-related defect, including one involving cybersecurity flaws.”

25. Exclusion of Devices/Products Produced by Certain Entities. We adopt the following measures to promote national security in connection with the IoT Labeling Program. The IoT Labeling NPRM proposed to exclude from the IoT Labeling Program (1) any communications equipment on the Covered List maintained by the Commission pursuant to section 2 of the Secure and Trusted Communications Networks Act (STCNA); (2) any IoT device produced by an entity identified on the Covered List ( i.e., an entity named or any of its subsidiaries or affiliates) as producing “covered” equipment; and (3) any device or product from a company named on certain other lists maintained by other Federal agencies that represent the findings of a national security review. We now adopt all of these prohibitions as they relate to our decision to focus the IoT Labeling Program on consumer IoT products. Thus, any communications equipment identified on the Covered List, now or in the future, will be ineligible for the IoT Labeling Program, and any such product will be denied approval to use the Cyber Trust Mark. Furthermore, any additional products produced by an entity identified on the Covered List as producing “covered” equipment, or any product containing devices or product components produced by such an entity, will be ineligible for the IoT Labeling Program; this would include products that may not fit within the definition of “communications equipment” under STCNA. Only entities identified on the Covered List as producers of “covered” equipment—not those on the Covered List only because of their “covered” services—are subject to this prohibition. In addition, we adopt the proposal that IoT devices or products containing devices manufactured by companies named on the Department of Commerce's Entity List, named on the Department of Defense's List of Chinese Military Companies, or suspended or debarred from receiving Federal procurements or financial awards, including those published as ineligible for award on the General Service Administration's System for Award Management, will not be authorized to display the FCC IoT Label or participate in the IoT Labeling Program. Further, we exclude from the IoT Labeling Program any products containing devices produced or manufactured by these entities. We conclude that inclusion on these lists represents a determination by an agency charged with making national security determinations that a company's products lack the indicia of trustworthiness that the Cyber Trust Mark is intended to represent. Our action here thus supports and reinforces the steps we have taken in other proceedings to safeguard consumers and communications networks from equipment that poses an unacceptable risk to national security and that other Federal agencies have taken to identify potential concerns that could seriously jeopardize the national security and law enforcement interests of the United States.

26. With the exception of China's comments raising the same World Trade Organization (WTO) issue we rejected in the Report and Order applying the Covered List to the FCC equipment authorization program, the record overwhelmingly supports excluding from the IoT Labeling Program these products and devices produced by companies identified on the Covered List. Additionally, USTelecom, CTIA, CTA, Cybersecurity Coalition and Consumer Reports specifically support excluding from the IoT Labeling Program IoT devices that are manufactured by companies on the Covered List, but also urge the Commission to restrict any equipment manufactured by companies on additional Federal restricted lists, including those otherwise banned from Federal procurement. Consumer Reports agrees with excluding systems that include components included on the Covered List or similar lists from the IoT Labeling Program. Each of these lists represent the determination by relevant Federal agencies that the entities on the list may pose a national security threat within their respective areas, and as such we find that we cannot separately sanction their products as trustworthy via the IoT Labeling Program. While each list is designed to support specific prohibitions, their use here only excludes their contents from a voluntary program representing U.S. Government assessment of their security and does not prohibit any other use. Insofar as the FCC IoT Label reflects the FCC's signal to consumers about cybersecurity, it is reasonable for the FCC to take a cautious approach especially for those products for which relevant Federal agencies have expressed other security concerns.

27. Applicant Declaration Under Penalty of Perjury. To implement the Commission's goal of ensuring the Cyber Trust Mark is not affixed to products that pose a risk to national security or a risk to public safety, we require applicants seeking authorization to use the FCC IoT Label to provide a declaration under penalty of perjury that all of the following are true and correct:

(i) The product for which the applicant seeks to use the FCC IoT Label through cybersecurity certification meets all the requirements of the IoT Labeling Program.

(ii) The applicant is not identified as an entity producing covered communications equipment on the Covered List, established pursuant to § 1.50002 of the Commission's rules.

(iii) The product is not comprised of “covered” equipment on the Covered List.

(iv) The product is not produced by any entity, its affiliates, or subsidiaries identified on the Department of Commerce's Entity List, or the Department of Defense's List of Chinese Military Companies.

(v) The product is not owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving Federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration's System for Award Management.

(vi) The applicant has taken every reasonable measure to create a securable product.

(vii) The applicant will, until the support period end date disclosed in the registry, diligently identify critical vulnerabilities in our products and promptly issue software updates correcting them, unless such updates are not reasonably needed to protect against security failures.

(viii) The applicant will not elsewhere disclaim or otherwise attempt to limit the substantive or procedural enforceability of this declaration or of any other representations and commitments made on the FCC IoT Label or made for purposes of acquiring or maintaining authorization to use it.

28. If any applicant fails to make any of the above disclosures within 20 days after being notified of its noncompliance, such failure would result in termination of any improperly granted authorization to use the Label, and/or subject the applicant to other Start Printed Page 61248 enforcement measures. The applicant is required to update its declaration, or withdraw a not-yet granted application, if any of the applicant's circumstances impacting the declarations materially change while the application is pending.

29. Wireless Consumer IoT Devices vs. Wired Consumer IoT Devices. The Order adopts the IoT Labeling NPRM's proposal that the IoT Labeling Program apply initially to wireless consumer IoT devices. This is consistent with the IoT Labeling NPRM proposal to focus the scope of the IoT Labeling Program on intentional radiators that generate and emit RF energy by radiation or induction and exclude wired-only IoT devices, noting such devices are encompassed by the Commission's section 302 authority governing the interference potential of devices that emit RF energy and can cause harmful interference. We find that this distinction is appropriate, both because of the Commission's interest in keeping the scope of the IoT Labeling Program clear and manageable during its debut and because there is support in the record for wireless intentional radiators as most prevalent types of consumer IoT devices contemplated in the IoT Labeling NPRM. While we recognize that there are other types of RF devices—both unintentional and incidental radiators—that are subject to our jurisdiction, we are not including them in our IoT Labeling Program at this time.

30. We acknowledge there is substantial support in the record for including wired IoT consumer products within the scope of the IoT Labeling Program. Consumer Reports recommends including both wired and wireless IoT within the scope of the IoT Labeling Program, pointing out that wired IoT devices or products are vulnerable to cybersecurity threats just as wireless IoT devices or products are. Consumer Reports also points out that “while wireless devices are the majority of IoT devices, there are still almost 700 million wired IoT devices globally, and they are expected to grow by a 10% [compound annual growth rate] through 2027 according to IoT Analytics `State of IoT—Spring 2023 Report.' ” TÜV SÜD also encourages the Commission to cover both wired and wireless devices within the scope of the IoT Labeling Program, and AIM emphasizes the importance of the security of both wired and wireless IoT to the cybersecurity ecosystem. CTA further states that the Commission should not define the scope of the IoT Labeling Program in such a way as to exclude wired IoT products. The Association of Home Appliance Manufacturers (AHAM) points out that both wired and wireless IoT are included in the NIST definition.

31. While we agree that wired IoT products are susceptible to cyberattacks and similarly pose security risks to consumers and others, we find it to be in the public interest for the IoT Labeling Program to start with wireless consumer IoT products in view of the record indicating that “wireless devices are the majority of IoT devices,” which would indicate that a focus on this product segment will have a substantial impact on the overall IoT market. The record also supports this approach, with Keysight Technologies, Inc. concurring that “the program should include consumer RF IoT products initially.” Further, we do not agree with arguments that there may be an unintended perception that “[c]reating a program that would only certify wireless IoT devices would send an improper message that only wireless IoT devices are secure.” Instead, we believe that beginning with wireless IoT products is both feasible and can be adopted with more speed, providing more prompt benefit in the marketplace. Further, a more limited scope will streamline the initial rollout of the IoT Labeling Program, provide focus to the additional tasks necessary to stand up the program, and lay the groundwork for expansion, and we do not foreclose consideration including wired IoT products in the future. As such and as discussed below, we also defer consideration of our legal authority to consider wired products at this time.

32. Based on the comments filed regarding oversight and management of the IoT Labeling Program, the Commission finds it is in the public interest to continue to foster public-private collaboration, including with regard to the management and administration of the IoT Labeling Program, while ensuring the Commission retains ultimate control and oversight of the IoT Labeling Program. In this respect, providing a broad, unifying government oversight framework for existing private labeling schemes and other private efforts in this context will allow current participants in this ecosystem to capitalize on their existing investments and relationships in a way that not only promotes the overall effectiveness of the FCC's IoT Labeling Program and increases the security of the IoT ecosystem.

33. The Commission adopts the IoT Labeling NPRM proposal that the IoT Labeling Program be comprised of a single “program owner” responsible for the overall management and oversight of the IoT Labeling Program, with administrative support from one or more third-party administrators. NIST's white paper recommends one “scheme owner” responsible for managing the labeling program, determining its structure and management, and performing oversight to ensure the program is functioning consistently in keeping with overall objectives. We agree that it is appropriate for a single entity to perform these functions and find that the Commission will be the program owner of the IoT Labeling Program, and as such retains ultimate control over the program, and determines the program's structure. CSA highlights support in the record for having the Commission as the program owner, arguing that “[p]lacing the regulatory authority in the hands of the Commission and providing government-backed endorsement may strengthen trust with Consumers.” However, the NIST Cybersecurity White Paper also recommends the “scheme owner” be responsible for defining the conformity assessment requirements, developing the label and associated information, and conducting consumer outreach and education.

34. While the Commission as program owner will oversee the elements of the program, the program will be supported by Cybersecurity Label Administrators (Label Administrators or CLAs) who will manage certain aspects of the program and authorize use the FCC IoT Label as well as a Lead Administrator selected by the Bureau from among the CLAs, which will undertake additional duties including acting as the point of contact between the CLAs and the Commission. In addition, the Commission believes it is appropriate for a Lead Administrator, in collaboration with the CLAs and other stakeholders, to identify or develop, and recommend to the Commission for approval, the IoT specific standards and testing procedures, procedures for post-market surveillance, as well as design and placement of the label. The Lead Administrator will also be responsible for developing, in coordination with stakeholders, a consumer education plan and submitting the plan to the Bureau and engaging in consumer education. Each of these duties are discussed in depth below. The Cybersecurity Coalition recommends the Commission utilize a single administrator, rather than multiple administrators “to reduce the likelihood of conflict among administrators and simplify engagement with Start Printed Page 61249 manufacturers, consumers, and government agencies.” CTA, on the other hand, contemplates multiple administrators, suggesting that the Commission may consider leveraging “a consortium of scheme owners[ ] to ensure that the IoT Labeling Program is administered and issues are adjudicated in an effective, objective, and timely fashion.” We agree with CTA's reasoning, while also acknowledging the Cybersecurity Coalition's concern regarding potential conflict. Accordingly, the Bureau will select a Lead Administrator from among the CLA applicants to address conflicts.

35. As an initial matter, we have looked to the structure of, and experiences with, the Commission's equipment authorization program and rules in developing the IoT Labeling Program, as proposed and discussed in the IoT Labeling NPRM. We emphasize, however, that the IoT Labeling Program is new and distinct, and it will operate under its own rules and with new authorities specifically delegated to PSHSB. This is consistent with the record developed in the proceeding, in which many commenters urged the Commission to keep the equipment authorization and IoT Labeling programs separate. In addition, several commenters addressed whether obtaining a valid equipment authorization should be a pre-requisite for obtaining the Cyber Trust Mark, or whether obtaining approval to use the Cyber Trust Mark would be required as a condition for applying for an equipment authorization. We emphasize that our IoT Labeling Program is voluntary, and parties are required to follow the Commission's equipment authorization program regardless of whether or not they choose to participate in the IoT Labeling Program. We also clarify that there is no requirement to complete the equipment authorization process before qualifying for the Cyber Trust Mark; however, our existing part 2 rules will continue to prohibit the marketing of a device that does not have a valid equipment authorization.

36. We conclude that it is in the public interest and supported in the record to adopt the IoT Labeling Program structure recommended by NIST, with the modifications discussed above regarding third-party administrators that are overseen by the Commission as the program owner. This and the following paragraph preview the remaining roles and responsibilities for the IoT Labeling Program, which will be developed in depth in the remaining sections of the Order. The Commission also will be responsible for coordinating mutual recognition of the Cyber Trust Mark with international partners, coordinating with the Lead Administrator, Federal partners, industry, and other stakeholders on consumer education programs, and performing oversight to ensure the IoT Labeling Program is functioning properly. In addition, the Commission will specify the data to be included in a consumer-friendly registry that provides additional information about the security of the products approved to use the Cyber Trust Mark and is accessible through the QR Code that is required to accompany the Cyber Trust Mark. Further, the Commission will own and maintain the registration for the Cyber Trust Mark, which may only be used when the product has been appropriately tested and complies with the Commission's IoT Labeling Program requirements.

37. The Commission will approve qualified Cybersecurity Label Administrators (Label Administrators or CLAs) to manage certain aspects of the labeling program and be authorized by the Commission to license the Cyber Trust Mark to manufacturers whose products are in compliance with the Commission's IoT cybersecurity labeling rules. The Commission will also select a Lead Administrator, which will be responsible for carrying out additional administrative responsibilities, including but not limited to reviewing applications and recognizing qualified and accredited Cybersecurity Testing Laboratories (CyberLABs) and engaging in consumer education regarding the Cyber Trust Mark. The Lead Administrator will also collaborate with cyber experts from industry, government, academia, and other relevant sectors if needed to identify, develop, and maintain consumer IoT cybersecurity technical and conformity assessment standards that are based on NIST standards and guidance, that will be submitted to PSHSB for consideration and approval, and, subject to any required public notice and comment, adopted into the Commission's rules. The standards and testing procedures developed or identified in collaboration with CLAs and other stakeholders and submitted by the Lead Administrator for consideration by the Commission will, in turn, be used by accredited  [ 4 ] testing labs recognized by the Lead Administrator—whether CyberLABs, [ 5 ] a CLA-run lab, or a testing lab internal to a company (in-house testing lab) for product testing.

38. Retaining key overarching functions within the Commission as discussed above will ensure the effective administration and oversight of this government program and protect the integrity of the FCC-owned Cyber Trust Mark, while perpetuating, where appropriate, the relevant efforts of the private sector that meet the goals and requirements of the program. We also agree with CSA that program ownership by the Commission will increase consumer confidence in the Cyber Trust Mark. In addition, the clear high-level oversight functions retained for the Commission ensures the Commission has meaningful decision-making control. Here, while the CLA(s) will recommend standards and testing procedures to be approved by the Commission as well as manage the day-to-day administrative functions assigned, the Commission will ultimately review, consider, and exercise judgment on whether the requirements are appropriate to support the Commission's program, and on how the program is ultimately administered.

39. We adopt the IoT Labeling NPRM's proposal that one or more qualified third-party administrators (Cybersecurity Labeling Administrators or CLAs) be designated by the Commission to manage certain aspects of the labeling program and be authorized to certify the application of the FCC IoT Label by manufacturers whose products are found to be in compliance with the Commission's IoT cybersecurity labeling rules and regulations. The record supports the Commission's adoption of a labeling program that is supported by CLAs. Start Printed Page 61250 According to TIC Council Americas, involving independent third-party administrators who verify that labeled products meet the program requirements will bring trust, consistency, and an impartial level playing field to the Cyber Trust Mark. The Cybersecurity Coalition, Widelity, and CSA highlight that utilizing experienced third-party administrators will allow the program to run more efficiently and will provide “the required expertise for the administration of the program.” CTA and other commenters also assert that the IoT Labeling Program will be best served if the Commission “leverage[s] the unique expertise and existing certification infrastructure offered by well-regarded industry organizations.” AHAM says that “[g]iven the volume and increasing numbers of IoT products on the market, [the] FCC needs to give manufacturers as many options as possible as far as obtaining the Cyber Trust mark” and that “third parties will play an important role in any successful program.”

40. CTA supports assigning certain responsibilities to one or more independent, ( i.e., neutral) third-party administrators which it refers to as “Authorized Scheme Owners.” However, the Commission disagrees with this descriptor insofar as some commenters are confused as to whether the “scheme owner” is the entity ultimately responsible for the program, or a third-party entity responsible for certain program administration functions or specified tasks under the ultimate direction of the Commission. To avoid confusion, the Commission refers to these third-party administrators as CLAs. These CLAs are neutral third parties independent of the applicant and within the context of a program overseen by the Commission.

41. We believe that authorizing one or more CLAs to handle the routine administration of the program will help to ensure a timely and consistent rollout of the program. In particular, several private entities have already implemented robust IoT cybersecurity labeling programs with established business processes in place to receive applications from IoT manufacturers and conduct conformity/standards testing against widely accepted cybersecurity guidelines ( e.g., NIST guidelines) or proprietary product profiles based on the NIST criteria. We anticipate a large number of entities will seek grants of authorization to use the FCC IoT Label and we are concerned that if we were to adopt a program limited to a single administrator, there may be bottlenecking delays in the processing of applications and a single administrator could result in a single point of failure in the program. Allowing multiple CLAs to execute the role of day-to-day administration of the program will provide for the simultaneous processing of a significant number of applications, provide redundancy of structure, and potentially foster competition in this space to better serve those seeking access to the label. In addition, leveraging the expertise of multiple existing program managers and using pre-existing systems and processes that meet our program specifications will minimize administrative delay, while promoting an efficient and timely rollout of the Cyber Trust Mark. This will also ensure that the Commission effectively utilizes the expertise of those entities who have made investments in their own cybersecurity labeling programs and have experience working with manufacturers and IoT conformity and standards testing, expediting the ability to provide consumers with a simple way to understand the relative security of the products and devices they purchase under a government-backed standard.

42. We recognize, however, that there is a need for a common interface between the CLAs and the Commission to facilitate ease of engagement and to conduct other initial tasks associated with the launch of the program. We delegate authority to PSHSB to review CLA applications, review CLA applications that also request consideration for Lead Administrator, select the Lead Administrator and manage changes in the Lead Administrator.

43. Lead Administrator Duties. The Lead Administrator will undertake the following duties in addition to the CLA duties outlined below:

a. interface with the Commission on behalf of the CLAs, including but not limited to submitting to the Bureau all complaints alleging a product bearing the FCC IoT Label does not meet the requirements of the Commission's labeling program;

b. conduct stakeholder outreach as appropriate;

c. accept, review, and approve or deny applications from labs seeking recognition as a lab authorized to perform the conformity testing necessary to support an application for authority to affix the FCC IoT Label, [ 6 ] and maintain a publicly available list of Lead Administrator-recognized labs and a list of labs that have lost their recognition;

d. within 90 days of release of the Public Notice announcing the Lead Administrator selection, the Lead Administrator shall, in collaboration with stakeholders ( e.g., cyber experts from industry, government, and academia) as appropriate:

i. submit to the Bureau recommendations identifying and/or developing the technical standards and testing procedures for the Commission to consider with regard to at least one class of IoT products eligible for the IoT Labeling Program. The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules;

ii. submit to the Bureau a recommendation on how often a given class of IoT products must renew their request for authority to bear the FCC IoT Label, which may be dependent on the type of product, and that such a recommendation be submitted in connection with the relevant standards recommendations for an IoT product or class of IoT products; The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules;

iii. submit to the Bureau recommendations on the design of the FCC IoT Label, including but not limited to labeling design and placement ( e.g., size and white spaces, product packaging.) The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules; and

iv. submit to the Bureau recommendations with regard to updates to the registry including whether the registry should be in additional languages, and if so, to recommend specific languages for inclusion;

v. submit to the Bureau recommendations on the design of the FCC IoT Label, including but not limited to labeling design and placement ( e.g., size and white spaces, product packaging, whether to include Start Printed Page 61251 the product support end date and other security and privacy information on the label.) The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules.

e. The Lead Administrator shall, in collaboration with CLAs and other stakeholders ( e.g., cyber experts from industry, government, and academia) as appropriate recommend within 45 days of publication of updates or changes to NIST guidelines, or adoption by NIST of new guidelines, to the FCC any appropriate modifications to the Labeling Program standards and testing procedures to stay aligned with the NIST guidelines;

f. submit to the Commission reports on CLAs' post-market surveillance activities and findings in the format and by the date specified by PSHSB;

g. develop in collaboration with stakeholders a consumer education campaign, submit the plan to the PSHSB, and participate in consumer education;

h. receive complaints about the Labeling Program, including but not limited to consumer complaints about the registry and coordinate with manufacturers to resolve any technical problems associated with consumers accessing the information in the registry;

i. facilitate coordination between CLAs; and

j. submit to the Commission any other reports upon request of the Commission or as required by Commission rule.

44. Cybersecurity Label Administrator Duties. CLA(s) are responsible for various administrative duties, including:

a. receive and evaluate applications and supporting data requesting authority to use the FCC IoT Label on the product subject to the application;

b. grant an application only if it meets all of the Commission's requirements to use the FCC IoT Label and authorize ( i.e., certify) the applicant to use the FCC IoT Label on the product subject to the application;

c. ensure that manufacturers make all required information accessible by the IoT registry;

d. participate in consumer education campaign in coordination with the Lead Administrator;

e. perform post-market surveillance activities, such as audits, in accordance with ISO/IEC 17065 and submit periodic reports to the Lead Administrator of their post-market surveillance activities and findings in the format and by the date specified by PSHSB; and

f. receive complaints alleging an IoT product does not support the cybersecurity criteria conveyed by the Cyber Trust Mark and refer these complaints to the Lead Administrator which will notify PSHSB. [ 7 ]

45. The record supports the use of CLAs to support a variety of tasks within the program's construct. ioXt Alliance supports utilizing CLAs for evaluating and certifying products for the Cyber Trust Mark. CTA supports utilizing CLAs to conduct program operations. The Cybersecurity Coalition and Kaiser Permanente also support utilizing CLAs for managing the day-to-day operations of the IoT Labeling Program. CSA argues that, “the day-to-day administration of the Cyber Trust Mark Program should be managed by a Third-Party Administrator, serving as the entity that grants permission to use the Program trademark to applicants.” In addition, ITI recommends that it should be the responsibility of the CLA to review or audit self-attestations and that “third-party administrators can and should play a key role in administering conformity assessment schemes.” CSA and CTIA further recommend adopting the IoT Labeling NPRM's proposal that a third-party administrator evaluate, accredit, or recognize the CyberLABs, and CSA also “recommends that the Commission hire a third-party administrator to operate the IoT Registry.” Finally, ioXt Alliance recommends that third-party administrators should also “vet companies and products during the certification process” to determine which products pose a threat to national security, based on Commission guidance. ioXt Alliance also notes in its comments that the “label design and associated information should be informed by the expertise of manufacturers and third-party administrators.”

46. Subject to Commission oversight, and consistent with recommendations in the record, the CLAs will evaluate and grant or deny requests for authority to use the FCC IoT Label on consumer IoT products in accordance with the IoT Labeling Program. Each administrator will be responsible for certifying that the consumer IoT products for which it authorizes a manufacturer to apply the FCC IoT Label are tested by an accredited testing lab, which as discussed further below may be a CyberLAB, the applicant's own in-house lab, or a CLA-run lab, and that the testing report demonstrates the product conforms to all Commission IoT labeling rules. The CLA will track each application it receives requesting authority to use the FCC IoT Label, and the disposition of all applications, including date of filing, date of acceptance as complete, the date and reason application is returned to applicant, and date of grant or denial. The CLAs will review each application they receive to ensure the application and supporting documents are provided and are sufficient to show the product conforms to all Commission rules and that it includes a compliance test report generated by an accredited and Lead Administrator-recognized testing lab ( e.g., third-party lab (CyberLAB), applicant's in-house testing lab, or CLA-run lab). If the application is deficient, it will not be granted until all necessary conditions are satisfied. If the application is complete and meets all of the Commission's requirements, the CLA will issue a cybersecurity labeling authorization ( i.e., cybersecurity certification) approving the applicant to affix the FCC IoT Label to the identified product.

47. In addition to its role as a CLA, the Lead Administrator must collaborate with CLAs and other stakeholders ( e.g., cyber experts from industry, government, and academia) as appropriate to develop or identify, and maintain, consumer IoT cybersecurity technical and conformity assessment standards to be met for each class of IoT product seeking authority to affix the FCC IoT Label on their product, which the Lead Administrator will submit to PSHSB for consideration and approval and, subject to any required public notice and comment, adoption into its rules. Adopting standards through consensus is supported by the record in this proceeding. [ 8 ] The Information Technology Industry Counsel (ITI) supports the Commission retaining ownership of the IoT Labeling Program and authorizing the “various industry-led, consensus standards, which can be used to gain approval for the Cyber Trust Mark.” ITI also notes that using industry-led, consensus standards will also limit the likelihood of legal challenges. UL Standards & Engagement Start Printed Page 61252 agrees that the FCC should use a “voluntary consensus-based standards development process” to create and update standards for the IoT Labeling Program. The U.S. Chamber of Commerce also supports a consensus-based approach urging the Commission “to track closely with public-private developments in IoT cybersecurity as well as industry-driven initiatives, such as the C2 Consensus on IoT Device Security Baseline Capabilities (C2 Consensus) and CTIA's cybersecurity certification program for IoT devices.” The Council to Secure the Digital Economy (CSDE), which is “composed of USTelecom, the Consumer Technology Association (CTA), and 13 global information and communications technology (ICT) companies—has also already convened technical experts from 19 leading organizations throughout the ICT sector to develop and advance industry consensus on baseline security capabilities for new devices,” including the C2 Consensus document, which provides guidance to the public and private sectors on IoT devices security. We agree with these recommendations that the Commission adopt standards following recommendations based on an industry-led consensus process, leveraging standards work already in process or completed, which will provide for the swift development and implementation of the IoT Labeling Program.

48. The Lead Administrator is to base the recommended technical standards and testing procedures on the NISTIR 8425, Profile of the IoT Core Baseline for Consumer IoT Products. As noted by ITI, there is “a suite of existing standards that might be leveraged to ensure that the outcomes NIST outlines can be met.” In addition, NIST's IoT Product Component Requirements Essay provides a summary of standards and guidance that NIST has initially identified as applicable to IoT devices and IoT product components, that the Lead Administrator may determine are applicable to the IoT Labeling Program. The Lead Administrator should evaluate and leverage existing work for efficiency and speed to market where appropriate in making its recommendations to the Commission.

49. The Lead Administrator in collaboration with stakeholders as appropriate will identify or develop IoT cybersecurity standards (or packages of standards) and testing procedures that they determine can be used to test that a product meets the NISTIR 8425 criteria for each class of products identified by the working group. The Lead Administrator will submit to the Bureau recommendations on a rolling basis as they are identified, but shall submit the initial set of recommendations no later than 90-days after release of the Public Notice selecting the Lead Administrator. We specify a timeframe here to ensure timeliness of initial standards and prompt launch of the program. Noting the work already ongoing on these issues, we also find such a timeframe to be reasonably achievable. The proposed standards (or packages of standards) and testing procedures must be approved by the Commission prior to implementation. The Commission delegates authority to PSHSB to evaluate and (after any required public notice and comment) approve (or not approve) the technical standards and testing procedures proposed by the Lead Administrator for use in the IoT Labeling Program and incorporate the approved standards and testing procedures by reference into the Commission's rules. The Commission further directs the Bureau to ensure the standards and testing procedures are relevant and appropriate to support the Commission's IoT Labeling Program.

50. Selecting CLAs. Each entity seeking authority to act as a CLA must file an application with the Commission for consideration by PSHSB, [ 9 ] which includes a description of its organization structure, an explanation of how it will avoid personal and organizational conflict when processing applications, a description of its processes for evaluating applications seeking authority to use the FCC IoT Label, and a demonstration of expertise that will be necessary to effectively serve as a CLA including, but not limited to:

1. Cybersecurity expertise and capabilities in addition to industry knowledge of IoT and IoT labeling requirements.

2. Expert knowledge of NIST's cybersecurity guidance, including but not limited to NIST's recommended criteria and labeling program approaches for cybersecurity labeling of consumer IoT products.

3. Expert knowledge of FCC rules and procedures associated with product compliance testing and certification.

4. Knowledge of Federal law and guidance governing the security and privacy of agency information systems.

5. Demonstration of ability to securely handle large volumes of information and demonstration of internal security practices.

6. Accreditation pursuant to all the requirements associated with ISO/IEC 17065 with the appropriate scope. [ 10 ] We recognize that CLAs cannot obtain accreditation to the FCC scope until after the Commission adopts standards and testing procedures. As such, the Commission will accept and conditionally approve CLA applications from entities that meet the other FCC program requirements and commit to obtain ISO/IEC 17065 accreditation with the appropriate scope within six (6) months of the effective date by the adopted standards and testing procedures. CLA approval to authorize use of the FCC IoT Label will be finalized upon receipt and demonstration to the Commission of ISO/IEC 17065 accreditation with the appropriate scope. [ 11 ]

7. Demonstrate implementation of controls to eliminate actual or potential conflicts of interests (including both personal and organizational), particularly with regard to commercially sensitive information, to include but not limited to, remaining impartial and unbiased and prevent them from giving preferential treatment to certain applications ( e.g., application line jumping) and from implementing heightened scrutiny of applications from entities not members or otherwise aligned with the CLA.

8. That the applicant is not owned or controlled by or affiliated with any entity identified on the Commission's Covered List or is otherwise prohibited from participating in the IoT Labeling Program. We will dismiss all CLA applications from an entity (company) identified on the Commission's Covered List, the Department of Commerce's Entity List, and the Department of Defense's List of Chinese Military Companies.

9. That the applicant is not owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving Start Printed Page 61253 Federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration's System for Award Management.

10. In addition to completing the CLA application information, entities seeking to be the Lead Administrator will submit a description of how they will execute the duties of the Lead Administrator, including:

a. their previous experience in IoT cybersecurity;

b. what role, if any, they have played in IoT labeling;

c. their capacity to execute the Lead Administrator duties outlined in the Order;

d. how they would engage and collaborate with stakeholders to identify or develop the Bureau recommendations discussed in the Order;

e. a proposed consumer education campaign; and

f. additional information the applicant believes demonstrates why they should be the Lead Administrator.

51. For items #7 and #8, we note that the record raises national security considerations when selecting a Label Administrator. For example, CTIA urges that the Commission “exclude all entities on the Covered List (not just those included on the list for producing equipment), all entities on the other lists identified in the IoT Labeling NPRM, as well as entities that are otherwise banned from federal procurement.” CTIA explains that these broad exclusions for program participation are necessary because of “the unique nature of the proposed labeling program—namely that it is both government-administered and voluntary—counsels in favor of painting with a broad brush on national security-based exclusions.” We agree with the commenters in the record, and consistent with our reasoning herein addressing the exclusion of certain products that would raise potential national security concerns, we also prohibit entities owned or controlled by or affiliated with entities that produce equipment found on the Covered List, as well as entities specified on the other lists referenced above or those suspended or debarred from receiving Federal procurements or financial awards from being a CLA in view of national security considerations and to insure the integrity of the IoT Labeling Program. Each of these lists represent the determination of relevant Federal agencies that the entities on the list may pose a national security threat within their respective areas, and as such we find that it is not in the public interest to permit these entities to provide assurances to the American public that products meet minimum cybersecurity standards. Importantly, we are only excluding the entities of the lists from a voluntary program under which the FCC approves their capability to oversee cybersecurity certification testing for purposes of the IoT Label. Insofar as the FCC IoT Label reflects the FCC's signal to consumers about cybersecurity, it is reasonable for us to take a cautious approach when approving entities to conduct the underlying product evaluations when relevant Federal agencies have expressed security concerns with the entity.

52. NCTA—The Internet & Television Association (NCTA) also suggests that “any `foreign entity of concern' as defined by the CHIPS Act should be ineligible for certification or recognition as a CyberLAB.” Further, ioXt Alliance recommends that the Commission “establish rules to ensure CyberLABs are not subject to undue influence by foreign adversaries.” We agree that it would be problematic for the U.S. to rely on the determination of entities controlled or affiliated with “foreign adversaries” as to the security of products approved to use the Cyber Trust Mark, and therefore the FCC will not recognize for purposes of the IoT Labeling Program any applicant that is an entity, its affiliate, or subsidiary owned or controlled by a “foreign adversary” country. A “foreign adversary” country is defined in the Department of Commerce's rule, 15 CFR 7.4 , and includes China (including Hong Kong), Cuba, Iran, North Korea, Russia, and Maduro Regime. We do not otherwise see a basis to preclude other foreign entities from serving as CLAs, but at this preliminary stage of establishing the IoT Labeling Program—where no international agreements are yet in place in this regard, and oversight details continue to be effectuated—we defer action in this regard. We delegate authority to PSHSB, in consultation with the Office of International Affairs (OIA), to evaluate and (after any appropriate public notice and comment) establish qualification criteria for any entity outside the United States to be approved to act as a CLA once any appropriate international agreements or other appropriate prerequisites are in place.

53. We decline to require that a CLA be a non-profit. The Cybersecurity Coalition recommends that the CLA be a non-profit entity, but did not elaborate on why, focusing their comments on having a neutral, independent third-party that followed consistent pricing guidelines and had industry experience and strong security practices. Researchers from the Northeastern University's College of Engineering similarly agreed that the Label Administrator should be a non-profit while emphasizing that the CLA should not have conflicts of interest. We decline, however, to require that the CLA be a non-profit organization, recognizing that there may be well-qualified companies that may be for-profit organizations or non-profit organizations that possess the other relevant qualifications. We agree with what appear to be the underlying concerns of the record, that the CLA be neutral, have the knowledge outlined above ( e.g., knowledge regarding FCC rules, IoT cybersecurity standards and testing procedures), and be free of conflicts. However, we believe that a company that satisfies the above requirements could carry out the CLA duties without being a non-profit organization. Moreover, expanding the pool of potential participants should increase the likelihood that a reasonable number of qualified entities apply to fulfill the specified roles. In addition, the record did not highlight reasons why a for-profit company would be incapable of fulfilling the role of label administrator.

54. Termination of CLA Authority. To address national security concerns, the authority of CLAs to grant applications to use the FCC IoT Label under the IoT Labeling Program will automatically terminate if the CLA subsequently becomes owned or controlled by or affiliated with an entity that produces equipment found on the Covered List, or otherwise added to any exclusionary list identified in this item as precluding authorization as a CLA. In addition, a CLA's authority may also be terminated for failure to uphold the required competencies or accreditations enumerated above. We delegate authority to PSHSB, to determine if a CLA's authority is to be terminated in the latter circumstance, and to terminate such authorization. [ 12 ] PSHSB, may identify such CLA deficiencies itself or receive notice from other entities, including other agencies, consumers, Start Printed Page 61254 and industry, that products granted authorization by a CLA do not accurately reflect the security posture of the product. Products authorized to use the FCC IoT Label by a disqualified CLA will be subject to the disqualification procedures described further below.

55. CLA Application Filing Window. We delegate authority to the Bureau to issue a Public Notice opening the initial filing window to receive applications from entities seeking authority to be recognized as a CLA (and Lead Administrator) under the IoT Labeling Program with instructions on how to apply and further details on the qualifications required of CLA applicants as well as the decision criteria used to select applicants. We also delegate to the Bureau authority to open additional filing windows or otherwise accept additional applications for authority to be recognized by the Bureau as a CLA when and as the Bureau determines it is necessary. Interested parties must establish they meet the requirements established in the Order. The Commission notes that it may refer applications to the U.S. Committee for the Assessment of Foreign Participation in the U.S. Telecommunications Sector (Team Telecom) for their review and consideration of national security and law-enforcement risks. We further delegate authority to PSHSB in coordination with the Office of the Managing Director (OMD) (specifically Office of the Chief Information Officer) and, to the extent necessary, the Office of General Counsel (OGC) (specifically the Senior Agency Official for Privacy), to receive and review each application for compliance with the criteria established in the Order. We also delegate to PSHSB authority to adopt additional criteria and administrative procedures necessary to efficiently select one or more independent, non-governmental entities, to act as CLA(s) and Lead Administrator. The Lead Administrator must provide equitable recommendations to the Commission to encourage the broadest possible participation of CLAs within the parameters of the FCC's rules. [ 13 ] We also delegate to PSHSB authority to adopt additional criteria and procedures in the event the Lead Administrator must be replaced or chooses to withdraw from its responsibilities. [ 14 ] We delegate authority to PSHSB to release a Public Notice announcing the CLA(s) selected by the Bureau and next steps for each entity, including but not limited the execution of appropriate documentation governing the details of the CLA's responsibilities. Moreover, we delegate to PSHSB and OMD authority to take any necessary steps, including adoption of additional procedures and any applicable fees after selection of the CLAs, if necessary to ensure compliance with the Communications Act or applicable government-wide statutes that are implicated by the IoT Labeling Program. Finally, we also delegate authority to PSHSB and OMD, in consultation with OGC, to take any additional actions necessary to preserve the Commission's rights to the Cyber Trust Mark under trademark and other applicable laws. Only entities who have followed the procedures required by PSHSB and OMD and executed relevant required documentation will be authorized by the Commission to accept and grant applications authorizing the use of the FCC IoT Label, which includes the Cyber Trust Mark and QR Code.

56. The Commission envisioned the role of CyberLABs as assessing IoT devices or products for compliance against IoT security standards, once developed. The Commission sought comment on whether the Commission or one of the authorized label administrators would evaluate, accredit, or recognize the CyberLABs, noting that it was seeking to ensure that CyberLABs have the necessary expertise and resources to properly test and assess whether IoT devices and products are in compliance with the IoT security standards. To become accredited and FCC-recognized for the proposed IoT Labeling Program, the Commission proposed the submission of applications demonstrating the applicant CyberLAB met the following requirements:

  • Qualifications: The CyberLAB has technical expertise in cybersecurity testing and conformity assessment of IoT devices and products.
  • Resources: The CyberLAB has the necessary equipment, facilities, and personnel to conduct cybersecurity testing and conformity assessment of IoT devices and products.
  • Procedures: The CyberLAB has documented procedures for conformity assessment.
  • Continued competence: Once accredited and recognized, CyberLABs would be periodically audited and reviewed to ensure they continue to comply with the IoT security standards and testing procedures.

57. We adopt our proposal to accept CyberLABs, in-house labs, and CLA-run labs, to test and assess IoT products for compliance with the consumer IoT standards that are established pursuant to the process described above to actualize the outcome of the NIST criteria. Rather than having the Commission or CLA evaluate or accredit a lab, however, we are persuaded that it is appropriate to recognize testing labs that have been accredited to ISO/IEC 17025 standards to conduct compliance testing that would support an application for authority to affix the FCC IoT Label. Consistent with standard practice for accreditation, the organization accrediting the testing labs must be recognized by the Bureau to perform such accreditation based on International Standard ISO/IEC 17011. We recognize that labs cannot be accredited or recognized in the context of this IoT Labeling Program until after the IoT cybersecurity standards have been approved by the Commission and incorporated into the Commission's rules. We delegate authority to PSHSB to publish a Public Notice, subject to any required notice and comment, outlining the specific standards CyberLABs, in-house labs, and CLA-run labs must meet to be recognized as qualified to conduct conformity testing to support applications seeking authority to use the FCC IoT Label. We also find it to be in the public interest for the Lead Administrator to review and recognize labs that meet these accreditation requirements and make a list of recognized labs publicly available. [ 15 ]

58. The Order agrees with CTIA that entities specializing in testing and certification will be valuable to program participants, and that such entities are likely to have the resources and expertise to evaluate IoT products in accordance with a standard. CTIA also notes, “a third-party certification model will help to lend credibility to the program” because CyberLABs can focus on the assessment aspects of the program in a way that helps ensure the Start Printed Page 61255 integrity of the IoT Labeling Program. The Order also agrees with CTA that leveraging accredited industry bodies to perform conformity assessments will “speed the establishment of the program and increase the program's ultimate quality.”

59. We agree with CSA's argument that the Commission should adopt a model where CyberLABs must be ISO/IEC 17025 accredited. CSA notes its confusion as to whether CyberLABs were intended to be “certification bodies” as defined by ISO/IEC 17065 or “evaluation laboratories” as defined by ISO/IEC 17025. We clarify that the proposal as envisioned by the IoT Labeling NPRM and adopted here is for CyberLABs, in-house labs, and CLA-run labs to function as a body responsible for assessing the security of IoT products ( i.e., testing lab). CSA proposes that such bodies hold ISO/IEC 17025 accreditations, as this model has been the basis for mutual recognition agreements in the cybersecurity industry, and we agree.

60. We note the objection of LG Electronics, which asserts that “[t]he CyberLAB concept described in the NPRM would almost certainly create a testing bottleneck” that would slow the process, and deter participation in the IoT Labeling Program. Instead, LG Electronics argues, self-certification is required to avoid these problems, although LG Electronics concedes that some compliance certification is required to participate in the IoT Labeling Program. As a nascent program, and as discussed above in connection with the envisioned process, we do not find it appropriate to adopt at this time a labeling path that does not include some level of laboratory testing in combination with an application to a CLA to ensure the product bearing the FCC IoT Label complies with the IoT Labeling Program's requirements. However, we recognize the benefits of time, efficiency and cost-savings associated with in-house testing and will allow the option for applicants to use an in-house testing labs, provided the lab is ISO/IEC 17025 accredited.

61. CyberLABs' Programmatic Role. CyberLABs will receive requests for conformance testing from manufacturers seeking to use the FCC IoT Label and will assess and test the products using the cybersecurity standards developed by industry and approved by the Commission and provide the applicant with a report of their findings. There was confusion in the record with how the term CyberLAB is to be applied. The Commission clarifies that the CyberLABs are laboratories whose role is limited to conducting compliance tests and generating reports. CyberLABs are not, in the organizational structure adopted in the Order, either certifying products or issuing authorization to use the FCC IoT Label. While the IoT Labeling NPRM defined a CyberLAB as an “authorization body” we remove that reference here as the term “authorization body” might be seen as referring to certification bodies, not laboratories. The role of CyberLABs is to conduct the required tests and generate test reports for use by the applicant in seeking CLA authorization to use the FCC IoT Label.

62. In-House Testing Lab. We also adopt an option for manufacturers to use an accredited and Lead Administrator-recognized in-house testing lab to perform the cybersecurity conformity testing for their IoT products, provided the in-house lab meets the same vigorous standards as the CyberLABs. In the IoT Labeling NPRM, the Commission sought comment on whether there is an avenue for “a comprehensive review that an IoT device or product compl[ies] with the IoT security standards.” We received significant support in the record for an in-house testing option. Samsung argues that, to encourage widespread adoption, the Commission must allow manufacturers an option to perform in-house testing to receive the label. The Cybersecurity Coalition urges the Commission to allow for in-house testing. We agree that an in-house testing option, for some manufacturers, will be more cost-effective, encourage participation in the IoT Labeling Program, and when combined with the filing of an application with a CLA can assure quality and trust in the IoT Labeling Program. However, we do require that in-house labs meet the same accreditation and recognition requirements as CyberLABs. In this respect, consumers may be assured that the label achieved on an in-house basis meets the same standards as those tested elsewhere, promoting consistency and reliance on the IoT Labeling Program generally. We also expect that ensuring a common baseline testing standard will ultimately aid in the ability to gain international recognition of the Cyber Trust Mark.

63. CLA-Run Testing Lab. We also recognize that CLAs may also have, or seek to have, their own in-house labs conduct conformity testing for applicants seeking certification to use the Mark. The Commission finds no need to limit the number of potential testing facilities by prohibiting CLA-run labs from also being considered recognized labs. Applicants who wish to do so, may file an application with an authorized CLA and request the services of the CLA's accredited and Lead Administrator-recognized lab. Again, the Commission requires CLA labs to meet the same accreditation and recognition requirements as CyberLABs. Only after a lab has been accredited by a recognized accreditation body may the lab file an application with the Lead Administrator seeking to be recognized as an approved cybersecurity testing lab. [ 16 ] As explained by the American Association for Laboratory Accreditation (A2LA), “[a]ccreditation is a means of determining the technical competence of conformity assessment organizations such as laboratories using qualified, third-party accreditation bodies. It assures federal government agencies as well as private sector organizations that assessments conducted by accreditation bodies are objective and reliable and that one can have confidence in the data generated by the accredited testing laboratory.” Recognizing that, whether an IoT product is evaluated by a CyberLAB, CLA-run lab, or an in-house lab there is a need to ensure equal rigor in the process, this requirement applies to in-house testing labs and third-party testing labs (CyberLABs and CLA-run labs). For ease of understanding, when we refer to CyberLABs below, we are including CyberLABs, in-house testing labs, and CLA-run labs.

64. In order to achieve recognition by the Lead Administrator, all labs seeking recognition under the Commission's IoT Labeling Program must submit evidence of accreditation in the form of an attestation from an accreditation body that the prospective lab has demonstrated:

1. Technical expertise in cybersecurity testing and conformity assessment of IoT devices and products. Compliance with all requirements associated with ISO/IEC 17025. If we determine that other ISO standards or other relevant requirements are missing, the Commission will provide guidance to industry on how they may be addressed. Start Printed Page 61256

2. Knowledge of FCC rules and procedures associated with IoT cybersecurity compliance testing and certification.

3. Necessary equipment, facilities, and personnel to conduct cybersecurity testing and conformity assessment of IoT devices and products.

4. Documented procedures for IoT cybersecurity conformity assessment.

5. Demonstrated implementation of controls to eliminate actual or potential conflicts of interests (including both personal and organizational), particularly with regard to commercially sensitive information.

6. That the applicant is not owned or controlled by or affiliated with any entity that produces equipment on the FCC Covered List or is otherwise prohibited from participating in the IoT Labeling Program. We will dismiss all applications from a company named on the Department of Commerce's Entity List, the Department of Defense's List of Chinese Military Companies.

7. That the applicant is not owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving Federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration's System for Award Management.

65. Once accredited and recognized, the lab will be periodically audited and reviewed by the Lead Administrator to ensure they continue to comply with the IoT security standards and testing procedures.

66. Concerning items #6 and #7, national security considerations must be considered when allowing testing labs to participate because of “the unique nature of the proposed labeling program.” As recommended in the record and consistent with our exclusions as to eligible products and eligibility to serve as a third-party administrator, all entities owned or controlled by or affiliated with entities that produce equipment found on the Covered List, as well as entities specified on the other U.S. Government exclusionary lists referenced above are prohibited from serving as a CyberLAB. Each of these lists represent the determination of relevant Federal agencies that the entities on the list may pose a national security threat within their respective areas, and as such we find that we cannot give U.S. Government endorsement to their security testing while claiming they pose such a threat. Insofar as the label reflects the FCC's signal to consumers about cybersecurity, it is reasonable for the FCC to take a cautious approach especially for those products for which relevant Federal agencies have expressed other security concerns with the testing lab.

67. NCTA also suggests also suggests that “any `foreign entity of concern' as defined by the CHIPS Act should be ineligible for certification or recognition as a CyberLAB.” Further, ioXt Alliance recommends that the Commission “establish rules to ensure CyberLABs are not subject to undue influence by foreign adversaries.” We agree that it would be problematic for the U.S. to rely on the determination of entities controlled or affiliated with “foreign adversaries” as to the security of products approved to use the Cyber Trust Mark, and therefore the Lead Administrator will not recognize for purposes of the IoT Labeling Program any testing lab that is an entity, its affiliate, or subsidiary owned or controlled by a “foreign adversary” country. A “foreign adversary” country is defined in the Department of Commerce's rule, 15 CFR 7.4 , and includes China (including Hong Kong), Cuba, Iran, North Korea, Russia, and Maduro Regime. Because of the role CLAs will play in the labeling program, we find that the concerns related to entities identified as “foreign adversaries” are equally applicable to entities acting as CLAs as they are testing labs. To avoid these issues, the record suggests requiring testing labs certify compliance with the Commission's rules, including the rules pertaining to the Covered List. Accordingly, we find it appropriate that each testing lab must certify to the truth and accuracy of all information included in its recognition application and immediately update the information if the information changes.

68. The Order notes that Garmin advocates even stricter measures on the testing labs, suggesting that the labs be “located in the U.S.” We decline to require physical location within the U.S. to avoid “unnecessarily limiting the pool of legitimate CyberLABs approved to conduct testing and conformity assessment for the Mark.” Further, the record indicates that this stricter approach “would vastly diminish manufacturers' abilities to select and access evaluation labs, conduct proper risk management and promote competition and diversity in the lab market.” Such a restriction might also unduly limit the ability of legitimate foreign corporations that do not raise national security concerns to participate in the IoT Labeling Program to the detriment of the goal of elevating the cybersecurity posture of those IoT devices sold in the U.S. and to promote international recognition of the Cyber Trust Mark. We delegate authority to the Bureau to adopt any additional criteria or procedures necessary with respect to labs located outside of the United States.

69. Terminating CyberLAB Testing Authority. To address national security concerns, the CyberLAB recognition afforded to entities under this IoT Labeling Program will be automatically terminated for entities that subsequently become affiliated with an entity that is owned or controlled by or affiliated with entities that produce equipment placed on the Covered List, or that are otherwise added to any exclusionary list identified in this item as precluding authorization as a CyberLAB. CyberLAB testing authority may also be terminated for failure to uphold the required competencies or accreditations enumerated above. We delegate authority to the Bureau to determine when a CyberLAB's authority is to be terminated, and to terminate such authorization. [ 17 ] The Bureau may identify such deficiencies itself or receive notice from other entities, including other agencies, consumers, and industry, that products tested by a CyberLAB do not accurately reflect the security posture of the product. Products authorized to use the FCC IoT Label by a disqualified CyberLAB will be subject to the disqualification procedures described further below.

70. Fees. To fulfill their role, as envisioned by the IoT Labeling NPRM, we authorize CyberLABs to charge reasonable fees to conduct the tasks adopted in the Order. The IoT Labeling NPRM proposed a fee calculation methodology adopted by the Commission in the 2020 Application Fee Report and Order, 86 FR 15026 (March 19, 2021), and sought comment on whether any oversight is needed by the Commission over such charges. We did not receive any comments on the suitability of the approach proposed in the IoT Labeling NPRM or detailed comments about the degree of oversight the Commission should conduct over Start Printed Page 61257 the charges. We recognize the Cybersecurity Coalition's comments that high fees would deter participation in the IoT Labeling Program. We anticipate that there will be multiple CyberLABs authorized through the approach adopted in the Order, and we believe that market competition will ensure fees are reasonable, competitive, and accessible while covering the costs incurred by the CyberLABs in performing their designated tasks. We believe this addresses the concerns raised by the Cybersecurity Coalition and renders the approach proposed in the IoT Labeling NPRM unnecessary. The National Association of Manufacturers (NAM) rightly indicates, however, that the fee structure for CyberLABs will necessitate “robust protections to ensure that CyberLABs focus on the underlying mission of protecting the public rather than boosting their revenues.” We delegate to the Bureau, in connection with OMD, to review and reconsider if necessary whether the level and structure of the fees should be regulated by the Commission.

71. The Commission adopts a two-step process for a manufacturer seeking authority to use the FCC IoT Label, which includes (1) product testing by an accredited and Lead Administrator-recognized lab ( e.g., CyberLAB, CLA lab, or an in-house lab) and (2) product label certification by a CLA. In the context of this IoT Labeling Program and as discussed in detail below, we find that in order to ensure the integrity of this nascent program, that the FCC IoT Label certification process will include a two-step process involving (1) the use of an accredited and Lead Administrator-recognized laboratory (CyberLAB, CLA lab, or in-house lab) to test the IoT product for compliance to FCC rules and generate a test report; and (2) an application to an FCC-recognized CLA ( i.e., an accredited certification body) to certify the product as fully compliant with all relevant FCC IoT Labeling Program rules.

72. The record is split on the processes the Commission should adopt for manufacturers to follow when seeking to use the FCC IoT Label, specifically with regard to whether it is necessary for a third-party to review and verify the product meets all of the IoT Labeling Program requirements, including product testing, or if the manufacturer should be afforded the opportunity to “self-declare” compliance and affix the FCC IoT Label without third-party verification.

73. UL Solutions, TÜV SÜD, and TIC Council Americas recommend that the Commission require all applications to be supported by conformity testing conducted by an accredited lab ( e.g., ISO/IEC 17025 accredited), and submitted to a third-party for verification of compliance with the Commission's program requirements. Others argue the Commission should accept a declaration of conformity or self-certification, while others recommend the Commission enter into agreements with each manufacturer to allow the manufacturer to conduct internal conformity testing of its products and self-certify compliance with the Commission's program requirements resulting in approval to use the Cyber Trust Mark without third-party involvement. CTA, for example, contemplates a “Manufacturer Self-Attestation Process” where manufacturers apply to the Commission for access to a “Mark Self-Attestation License Agreement” between the manufacturer and the FCC. Under this process, the manufacturer provides documentation showing how it complies with the NIST Criteria and if the Commission agrees with the documentation, the parties execute the agreement. The license agreement will identify the limits of the manufacturer's license authority, which may be corporate-wide, on a divisional basis, or for a specific product line.

74. To ensure the Cyber Trust Mark retains the highest level of integrity and consumer trust, we agree with commenters who caution against allowing testing by entities that are not accredited and recognized. We also agree with Garmin and AHAM, who recommend third-party verification of the information contained in a manufacturer's application to use the Cyber Trust Mark. UL Solutions notes that while the Commission's equipment authorization process allows some products that pose a low risk of RF interference to be approved via a Supplier's Declaration of Conformity (SDoC), there is no clear line to be drawn between low risk and high risk connected products when “IoT devices are significant targets for an ever- growing number of cybersecurity attacks.” In addition, UL Solutions points to the investigation conducted by the Government Accountability Office (GAO) into the ENERGY STAR program's initial reliance a supplier's declaration of conformity, which GAO found to be unreliable because GAO was able to obtain UL certification with blatantly non-conforming products.

75. The Commission disagrees with commenters who believe the IoT Labeling Program should offer different methods of conformity assessment based on varying levels of risk and potential impact on consumers because doing so adds an unnecessary and significant layer of complexity to the process. The Commission recognizes the view of Keysight, the National Electronic Manufacturers Association (NEMA), AIM, Whirlpool, AHAM, Consumer Reports, Garmin, NAM, ITI, and TIC Council Americas, who support self-attestation as an efficient and cost effective methodology for applicants to conduct conformity assessments. However, the Commission agrees with A2LA, which urges caution with self-attestations of conformity “due to the bias inherent in self-declaration.” We also take into serious consideration the 2010 GAO Report that found the ENERGY STAR program in effect at that time, which was “primarily a self-certification program relying on corporate honesty and industry self-policing to protect the integrity of the Energy Star label,” failed to require upfront third-party validation of manufacturers' self-reported claims of compliance with the program requirements, which resulted in the certification of bogus products as ENERGY STAR compliant. ENERGY STAR has since changed the manner in which it certifies products as ENERGY STAR compliant, stating that in order “[t]o ensure consumer confidence in the ENERGY STAR label and to protect the investment of ENERGY STAR partners, the U.S. Environmental Protection Agency (EPA) requires all ENERGY STAR products to be third-party certified. Products are tested in an EPA-recognized laboratory and reviewed by an EPA-recognized certification body before they can carry the label.”

76. As such, in light of the nascent nature of the IoT Labeling Program, lessons learned in the ENERGY STAR context, and the need to ensure that the Cyber Trust Mark garners sufficient trust by consumers to be viewed as providing accurate information and manufacturer participation, we find that allowing a path to “self-attestation” is not appropriate at this time. While such a path may provide for prompt time to market for the Cyber Trust Mark itself, the concerns regarding the Mark's integrity at this initial stage counsel against “self attestation.” Moreover, we anticipate that the benefits and level of efficiency afforded manufacturers by the ability to use in-house labs will mitigate the additional process associated with certification by a CLA, as discussed below.

77. We intend for the Cyber Trust Mark to serve as a reliable and trusted Start Printed Page 61258 way for consumers to quickly identify those products that meet the Commission's program requirements. To achieve this, the Commission must adopt sufficient controls over the IoT Labeling Program to ensure only those products that meet the Commission's requirements bear the Cyber Trust Mark. The Commission's second step of requiring an application be submitted to a CLA is a significant and important control to ensure that an independent disinterested third-party outside the manufacturer's control has reviewed the manufacturer's product application and supporting test report and verified that the product complies with the Commission's program requirements.

78. The second step of the application process is particularly important because, as discussed above, the Commission allows the first step (testing) to be completed by an accredited and recognized CyberLAB, a CLA lab, or the manufacturer's in-house lab. Requiring the manufacturer to submit an application with a CLA is an important control, particularly to ensure that all products, including those products whose conformity testing is conducted, and reports are generated, by the manufacturer's in-house lab, are subject to third-party scrutiny and oversight. As such, the Commission requires all entities seeking to use the FCC IoT Label must submit an application for authority to a CLA to use the FCC IoT Label that is supported by the appropriate report detailing the conformity testing conducted by a lab that is both accredited and Lead Administrator-recognized (CyberLAB, CLA lab, or manufacturer's in-house lab). Only entities who have received prior authorization from a CLA ( i.e., cybersecurity certification) are authorized to use the FCC IoT Label, which will ensure the IoT Labeling Program retains its integrity. [ 18 ] We further recognize that the CLA may charge a reasonable fee to cover the cost of reviewing the application and the costs of conducting the other tasks the CLA would perform. Once the IoT Labeling Program is established, we may revisit the issue of whether to adopt additional pathways to obtaining authority to use the FCC IoT Label.

79. The IoT Labeling NPRM sought comment on whether and how one or more third-party administrators should be utilized to manage the IoT Labeling Program, and whether the Commission should designate one or more administrators to authorize use of the label. Kaiser Permanente argues that the Commission should maintain ownership of the application process, as well as oversight and supervision of third parties administering the IoT Labeling Program. Garmin notes that the application process described in the IoT Labeling NPRM is unclear and worries that third-party involvement would require enormous effort, and cautioned that sharing sensitive information with a third-party administrator itself raises security concerns. However, the record was silent with respect to details about an application process. We agree that oversight and supervision of the IoT Labeling Program, including intaking applications, will require effort but believe a CLA is in the best position to streamline that process and, as noted, ensure the integrity of the process. We will require the CLA to have the ability to securely handle large volumes of information, which we believe should alleviate Garmin's concern. We outline the application process to use the FCC IoT Label below.

80. Before being able to display the Cyber Trust Mark, the applicant must determine their product is an eligible product under our rules; have their product tested by an accredited and Lead Administrator-recognized CyberLAB, CLA Lab, or manufacturer's in-house lab; obtain a report of conformity and compliance from the lab; and submit an application for authority to use the FCC IoT Label to an FCC-recognized CLA in accordance with their procedures. Using the CLAs' filing processes, entities seeking authority to use the FCC IoT Label will file an application to be developed by the Bureau. Each application must include a report of conformity issued by an accredited CyberLAB, accredited CLA lab, or accredited in-house lab whose testing and reporting is comparative in rigor to that completed by a CyberLAB. The CLA will review the application and supporting documentation to ensure it is complete and in compliance with the Commission's rules and will either grant or deny the application. If an application is granted, the CLA will provide the applicant with notification of the grant and authority to affix the FCC IoT Label to the product granted authorization.

81. Applications that do not meet the Commission's IoT Labeling Program will be denied by the CLA. If an application is denied, the CLA will provide the applicant with notification of the denial and an explanation of why it was denied. An applicant may only re-submit an application for a denied product if the CLA-identified deficiencies have been corrected. The applicant must indicate on its application that it is re-submitting the application after it was denied, the name of the CLA that denied the application, and the CLA's explanation of why it was denied. Failure to disclose the denial of an application for the same or substantially similar product will result in denial of the application for that product and the FCC will take other regulatory and/or legal action it deems appropriate.

82. Grant or denial of an application for authority to use the FCC IoT Label will be made by the CLA in the first instance. The CLA will return incomplete applications to the applicant or otherwise contact the applicant regarding the incomplete application, as soon as possible.

83. We delegate authority to the Bureau to issue a Public Notice after any necessary notice and public comment and after completing any process required under the Paperwork Reduction Act, providing further details on how to apply for authority to use the FCC IoT Label, including but not limited to informational elements of the application, additional details on filing requirements ( e.g., description or photograph of the label and how/where it will be affixed to the product), and how to request confidential treatment of submitted information. As the Commission anticipated in the NPRM, CLAs may charge reasonable fees for their services and to cover the costs of performing the administrative duties. The IoT Labeling NPRM proposed to follow the fee calculation methodology adopted by the Commission in the 2020 Application Fee Report and Order and requested comment on the proposal and any changes. We did not receive any comments on the suitability of this approach. We recognize the Cybersecurity Coalition's comments that high fees would deter participation in the IoT Labeling Program. We anticipate that there will be multiple administrators authorized through the approach adopted in the Order, and we believe that market competition will ensure fees are reasonable, competitive, and accessible while covering the costs incurred by the CLA in performing their designated tasks. We believe this addresses the concerns raised by the Cybersecurity Coalition and renders the approach proposed in the IoT Labeling NPRM unnecessary. We therefore reject Start Printed Page 61259 the NPRM's proposal. To the extent that the Lead Administrator may incur costs in performing its duties on behalf of the program as a whole, we expect these costs to be shared among CLAs as a whole. [ 19 ] We delegate to the Bureau, in connection with OMD, to consider these issues and provide guidance to the CLAs and Lead Administrator to ensure the fees do not become onerous, as indicated by the record.

84. Seeking Review of CLA Decision. Any party aggrieved by an action taken by a CLA must first seek review from the CLA, which must be filed with the CLA within 60 days from the date of the CLA's decision. A party aggrieved by an action taken by a CLA may, after seeking review by the CLA, seek review from the Commission. A request for Commission review must be filed with the Commission within 60 days from the date the CLA issues a decision on the party's request for review. In all cases of requests for review, the request for review shall be deemed filed on the postmark date. If the postmark date cannot be determined, the applicant must file a sworn affidavit stating the date that the request for review was mailed. Parties must adhere to the time periods for filing oppositions and replies set forth in 47 CFR 1.45 .

85. We delegate authority to PSHSB to consider and act upon requests for review of CLA decisions. Requests for review that raise novel questions of fact, law, or policy will be considered by the full Commission. An affected party may seek review of a decision issued under delegated authority pursuant to the rules set forth in part 1 of the Commission's rules. The Bureau will conduct de novo review of requests for review of decisions issued by a CLA. The Commission will conduct de novo review of requests for review of decisions by the CLA that involve novel questions of fact, law, or policy; provided, however, that the Commission will not conduct de novo review of decisions issued by the Bureau under delegated authority. The Bureau will, within 45 days, take action in response to a request for review of CLA decision that is properly before it. The Bureau may extend the time period for taking action on a request for review of a CLA decision for a period of up to 90 days. The Commission may also at any time, extend the time period for taking action of a request for review of a CLA decision pending before the Bureau. The Commission will issue a written decision in response to a request for review of a CLA decision that involves novel questions of fact, law, or policy within 45 days. The Commission may extend the time period for taking action on the request for review of a CLA decision. The Bureau also may extend action on a request for review of an CLA decision for a period of up to ninety days. While a party seeks review of a CLA decision, they are not authorized to use the FCC IoT Label until the Commission issues a final decision authorizing their use of the FCC IoT Label.

86. Technical Criteria for Consumer IoT Products. We adopt the IoT Labeling NPRM proposal that the NIST Core Baseline serve as the basis of the IoT Labeling Program. The NIST Core Baseline is based on product-focused cybersecurity capabilities (also referred to by NIST as “Outcomes”) rather than specific requirements, which NIST asserts provide the flexibility needed due to the diverse marketplace of IoT products, and we agree. As outlined in the IoT Labeling NPRM, the NIST criteria includes the following IoT product capabilities: (1) asset identification; (2) product configuration; (3) data protection; (4) interface access control; (5) software update; (6) cybersecurity state awareness; and the following IoT Product Developer Activities: (7) documentation; (8) information and query reception; (9) information dissemination; and (10) product education and awareness.

87. The record reflects broad support for adoption of the technical criteria presented in NISTIR 8425. For example, a coalition of industry stakeholders including the Association of Home Appliance Manufacturers, Connectivity Standards Alliance, Consumer Technology Association, CTIA Information Technology, Industry Council, National Electrical Manufacturers Association, Plumbing Manufacturers International Power Tool Institute, Security Industry Association, Telecommunications Industry Association, U.S. Chamber of Commerce, and USTelecom submitted a letter to the Commission supporting the establishment of “a voluntary program based on the technical criteria developed by [NIST], under NISTIR 8425.” UL Solutions supports adoption of the NISTIR 8425 criteria and asserts that there are several mature standards that can be drawn from that address the NISTIR 8425 criteria, such as UL 2900, UL 5500, and IEC 62443.

88. CTIA supports adoption of the NIST Core Baseline but urges the Commission not to prescribe any specific methodologies that testing programs or standards must use, other than to require that such programs or standards be consistent with NIST Core Baseline. CSA also supports adoption of the NIST Core Baseline but urges the Commission to refrain from developing its own standards for testing. Rather, CSA asserts that they have developed a certification program that meets the requirements of NISTIR 8425 and other relevant standards documents, including ETSI EN 303 645 and the Singapore Cybersecurity Labeling Scheme, and CTA indicates that they are working on American National Standards (ANS) documents that will “[d]efine a Framework that is a standardized and objective method of applying the Criteria in NISTIR 8425 to a candidate Scheme or to a manufacturer's proposal for self-attestation . . .” Garmin encourages the Commission to consider ETSI 303 645 standards, and commenters American Certification Body, Inc. and Consumer Reports encourage international standards such as those developed as a result of the EU Cyber Resiliency Act and UK's Product Security and Telecommunications Infrastructure Act. These commenters did not oppose referencing the NIST criteria.

89. We agree with Infineon, Consumer Reports, and NCTA and adopt NISTIR 8425 as the basis for the Commission's IoT Labeling Program. The consumer IoT environment is complicated by a significant number of different types of consumer IoT products. Adoption of the NIST criteria as the foundation of the IoT Labeling Program will result in a robust consumer IoT program that is sufficiently flexible that it can be applied across all types of consumer IoT products. The NIST criteria were developed through a multi-year effort between NIST and various stakeholders, and includes significant industry input and will continue to be updated by NIST as necessary. The Commission agrees with NIST's publication, which avers that the following NISTIR 8425 criteria identify the cybersecurity capabilities that consumers would expect manufacturers to address within the products they buy. NIST contemplates that most of the criteria concern the IoT product directly and are expected to be satisfied by software and/or hardware implemented in the IoT product (1-6 below) and other criteria apply to the IoT product developer (7-10 below). The following is the list of Start Printed Page 61260 the NIST IoT product capability criteria, NIST's brief description of each, and the NIST-identified cybersecurity utility for each:

(1) Asset Identification: The product can be uniquely identified by the customer and other authorized entities and the product uniquely identifies each IoT product component and maintains an up-todate inventory of connected product components

i. Cybersecurity Utility: The ability to identify IoT products and their components is necessary to support such activities as asset management for updates, data protection, and digital forensics capabilities for incident response.

(2) Product Configuration: The configuration of the IoT product is changeable, with an ability to restore a secure default setting, and changes can only be performed by authorized individuals, services, and other IoT product components.

i. Cybersecurity Utility: The ability to change aspects of how the IoT product functions can help customers tailor the IoT product's functionality to their needs and goals. Customers can configure their IoT products to avoid specific threats and risk they know about based on their risk appetite.

(3) Data Protection: The IoT product protects data store across all IoT product components and transmitted both between IoT product components and outside the IoT product from unauthorized access, disclosure, and modification.

i. Cybersecurity Utility: Maintaining confidentiality, integrity, and availability of data is foundational to cybersecurity for IoT products. Customers will expect that data are protected and that protection of data helps to ensure safe and intended functionality of the IoT product.

(4) Interface Access Control: The IoT product restricts logical access to local and network interfaces—and to protocols and services used by those interfaces—to only authorized individuals, services, and IoT product components.

i. Cybersecurity Utility: Enumerating and controlling access to all internal and external interfaces to the IoT product will help preserve the confidentiality, integrity, and availability of the IoT product, its components, and data by helping prevent unauthorized access and modification.

(5) Software Update: The software of all IoT product components can be updated by authorized individuals, services, and other IoT product components only by using a secure and configurable mechanism, as appropriate for each IoT product component.

i. Cybersecurity Utility: Software may have vulnerabilities discovered after the IoT product has been deployed; software update capabilities can help ensure secure delivery of security patches.

(6) Cybersecurity State Awareness: The IoT product supports detection of cybersecurity incidents affecting or affected by IoT product components and the data they store and transmit.

i. Cybersecurity Utility: Protection of data and ensuring proper functionality can be supported by the ability to alert the customer when the device starts operating in unexpected ways, which could mean that unauthorized access is being attempted, malware has been loaded, botnets have been created, device software errors have happened, or other types of actions have occurred that was not initiated by the IoT product user or intended by the developer.

The following is the list of NIST-identified IoT Product Developer Activities/Non-Technical Supporting Capabilities and their NIST-identified cybersecurity utility:

(7) Documentation: The IoT product developer creates, gathers, and stores information relevant to cybersecurity of the IoT product and its product components prior to customer purchase, and throughout the development of a product and its subsequent lifecycle.

i. Cybersecurity Utility: Generating, capturing, and storing important information about the IoT product and its development ( e.g., assessment of the IoT product and development practices used to create and maintain it) can help inform the IoT product developer about the product's actual cybersecurity posture.

(8) Information and Query Reception: The IoT product developer has the ability to receive information relevant to cybersecurity and respond to queries from the customer and others about information relevant to cybersecurity.

i. Cybersecurity Utility: As IoT products are used by customers, those customers may have questions or reports of issues that can help improve the cybersecurity of the IoT product over time.

(9) Information Dissemination: The IoT product developer broadcasts ( e.g., to the public) and distributes ( e.g., to the customer or others in the IoT product ecosystem) information relevant to cybersecurity.

i. Cybersecurity Utility: As the IoT product, its components, threats, and mitigations change, customers will need to be informed about how to securely use the IoT product.

(10) Product Education and Awareness: The IoT product developer creates awareness of and educates customers and others in the IoT product ecosystem about cybersecurity-related information ( e.g., considerations, features) related to the IoT product and its product components.

i. Cybersecurity Utility: Customers will need to be informed about how to securely use the device to lead to the best cybersecurity outcomes for the customers and the consumer IoT product marketplace.

90. Consumer IoT Product Standards. We find that standards are necessary to administer the IoT Labeling Program in a fair and equitable manner and to ensure the products with the FCC IoT Label have all been tested to the same standards to provide consumers with confidence that products bearing the FCC IoT Label include strong cybersecurity. Commenters generally agree with the adoption of standards based on NIST's Core Baseline for Consumer IoT products (NISTIR 8425). We take up the Cybersecurity Coalition's recommendation “that the Commission or a designated third-party administrator work with stakeholders to identify recognized standards that encompass the Core Baseline, or that offer equivalent controls.” NCTA also notes that “Standards Development Organizations (“SDOs”) and specification organizations are well-established organizations that can develop standards aligned with NIST guidelines and the Program's goals.” According to NIST, the NISTIR 8425 “ outcomes are guidelines that describe what is expected . . . but more specific information may be needed to define how to implement IoT products or product components so that they meet an outcome. Requirements define how a component can meet an outcome for a specific use case, context, technology, IoT product component etc. . . ..”

91. We reject CTIA's recommendation that the Commission refrain from adopting specific standards and solely rely on the NIST criteria. Rather, the Commission agrees with NIST and commenters that its criteria are general guidelines that must be further developed into a requirements document ( i.e., standards) and corresponding testing procedures, which will demonstrate how the product bearing the FCC IoT Label has met the NIST criteria and to ensure consistency of application across a class of products. ITI adds that the “Commission need not recreate [existing] work or develop its own standards but can leverage completed standards work for swift development Start Printed Page 61261 and implementation.” The integrity of the Cyber Trust Mark requires the Commission to adopt standards that provide for adequate and consistent testing of products to ensure that all products bearing the FCC IoT Label have demonstrated conformance to the identified standards that the Commission has approved as compliant with the NIST criteria. In addition, for the Commission's IoT Labeling Program to be fairly administered by the multiple CLAs, all products displaying the FCC's label must be tested against the same standards to ensure that all products displaying the FCC IoT Label conform to the Commission's standards.

92. Commenters such as TÜV SÜD agree that “the main requirement when perform[ing] testing for compliance is that the test need[s] to be reliable and always offer the same outcome when a product is tested in the same condition. In the current state of the NIST IoT criteria there is not enough detail[ ] in the standard, so there is the need to write a more detail[ed] test method/standard.” UL Solutions also “supports the use of the NISTIR 8425 criteria as the basis for the IoT Labeling Program. These criteria help establish a minimum security baseline suitable for consumer IoT products . . . However, as noted in paragraphs 27 and 28 [of the IoT Labeling NPRM ], these criteria must be defined by minimum IoT security requirements and standards to enable consistent and replicable product testing.” Moreover, Somos similarly agrees that leveraging existing standards for device definition and security guidelines are the fastest, most effective path to the definition of a secure ecosystem, that NIST 8425 standard is the appropriate starting point, and that “existing standards should allow for the Commission to quickly create its definitions and guidelines.” We agree with the Cybersecurity Coalition that “only those standards and best practices recognized by the labeling program should be eligible, in order to avoid the inclusion of non-credible or irrelevant frameworks that may undermine trust in the label.”

93. We further determine that, given the existing work in this space, the Commission should not undertake the initial development of the standards that underpin the NIST Core Baseline. Rather, as discussed in paragraph 56 above, we direct the Lead Administrator to undertake this task, and delegate authority to the Bureau to review and approve the consumer IoT cybersecurity standards and testing procedures that have been identified and/or developed by the Lead Administrator (after any appropriate public comment) that ensures the product to which a manufacturer seeks to affix the FCC IoT Label conforms to the NIST criteria. NIST's IoT Product Component Requirements Essay provides a summary of standards and guidance that NIST has initially identified as applicable to IoT devices and IoT product components, that the Lead Administrator may determine are applicable to the IoT Labeling Program. Moreover, the Lead Administrator may also determine existing standards or schemes that exist in the market already may be readily adaptable and leverage such work to meet the terms of the program.

94. The Commission recognizes that since a “product” for purposes of the IoT Labeling Program is comprised of at least one IoT device and any additional product components that are necessary to use the IoT device beyond basic operational features, there may be multiple standards ( e.g., a package of standards) applicable to a single IoT product ( e.g., standards applicable to IoT devices; mobile apps; networking equipment included with IoT devices; and cloud platforms). The Commission does not anticipate a single standard would be developed or identified to apply to all consumer IoT products. However, a single package of standards may be developed or identified for each product type or class as identified by the Lead Administrator and reviewed and approved by the Bureau. We also agree with the Cybersecurity Coalition that “participants should have discretion to include security features that go beyond standard requirements . . . So long as the additional security features do not conflict with conformity with the standard used for eligibility by the labeling program participants, participants should be encouraged to go beyond baseline requirements.”

95. We adopt the IoT Labeling NPRM's proposal to implement a single binary label with layering. As discussed in the IoT Labeling NPRM, “under a binary label construct, products will either qualify to carry the label or not qualify ( i.e., not be able to carry the label) and `layers' of the label would include the Commission's Cyber Trust Mark representing that the product or device has met the Commission's baseline consumer IoT cybersecurity standards and a scannable code ( e.g., QR Code) directing the consumer to more detailed information of the particular IoT product.”

96. We adopt a binary label because we believe that a label signaling that an IoT product has met the minimum cybersecurity requirements will be simplest for consumers to understand, especially as the label is introduced to and established for the public. The Cybersecurity Coalition supports a binary label, citing the benefits of a simple, consumer friendly nature and its potential to streamline the purchasing decision for consumers. Similarly, as LG Electronics points out, “[l]ike the ENERGY STAR program, a binary label specifying that a device has met a government standard—in this case for cybersecurity—will be enough to drive consumers and manufacturers toward more secure products,” while leaving manufacturers free to separately provide additional cybersecurity information about their products. And the Connectivity Standards Alliance supports the use of a single binary label with layering, as recommended by NIST, asserting that “[a]cademic studies have validated this approach.” Conversely, Canada advocates a multi-tiered approach to labeling to “lower barriers to entry into the labelling regime and facilitate trade and competition by ensuring Micro, Small and Medium Sized Enterprises (MSMEs), with fewer resources to meet a high level of cybersecurity,” and to “provide the incentives for a greater number of firms to innovate in IoT products and work on `climbing the ladder' of cybersecurity levels over time.” Another commenter suggests a multi-tiered label that would have different colors depending on the length of time the product is supported. Other commenters advocate a multi-tiered approach that need not be reflected in different Cyber Trust Marks, but in different information available when a consumer scans the QR code. A study by Carnegie Mellon University indicates that different types of labels of various complexities have varying levels of effectiveness, but does not contest the idea of a binary label. We also recognize that some international regimes, such as Singapore, use a multi-tiered label.

97. Although one could imagine myriad different approaches to labeling that each have relative advantages and disadvantages, on balance we are persuaded to rely on a binary label as we begin our IoT Labeling Program, consistent with NIST's recommended approach. We agree with the Cybersecurity Coalition that “the primary value of the IoT . . . labeling program is to better enable ordinary consumers to distinguish labeled products as likely providing better basic security than unlabeled products.” We believe a binary label meets this goal by Start Printed Page 61262 providing a clear indication that products with the label meet the Commission's cybersecurity requirements. We anticipate that promoting early consumer recognition of the FCC IoT Label—which we think is better advanced by a binary label—will, in turn, make consumers more attuned to cybersecurity issues and more receptive to additional cybersecurity information that manufacturers elect to provide apart from the FCC IoT Label and associated QR code. Thus, we believe that our use of a binary label still retains incentives for manufacturers to innovate and achieve higher levels of cybersecurity. Our approach to determining what cybersecurity standards will be applied also accommodates the potential for different requirements being necessary to meet the NIST baseline criteria in different contexts. To the extent that any multi-tiered labeling approach contemplated by commenters would allow manufacturers to obtain a label through lesser cybersecurity showings, that would be less effective at achieving the goals of our program. And to the extent that any multi-tiered labeling approach would require manufacturers to make heightened cybersecurity showings to achieve higher-tier labels, that is unlikely to lower barriers to participation in the IoT Labeling Program while also risking less understanding and acceptance of the FCC IoT Label by consumers. Because delay in moving forward with the IoT Labeling Program would have its own costs in pushing back the potential for benefits to consumers and device security, we also recognize the benefits of a binary label as more straightforward to implement, at least at the start of our IoT Labeling Program. Weighing all the relevant considerations, we are persuaded to move forward with a binary label at this time.

98. We require that products bearing the FCC IoT Label, which includes the Cyber Trust Mark, must also include the corresponding QR Code. Approval to use the Cyber Trust Mark is conditioned on the label also bearing the QR Code in accordance with the IoT Labeling Program's label standards. In addition, the FCC IoT Label must be easily visible to consumers ( e.g., on product packaging). This approach received considerable support in the record. We agree with USTelecom that “consumers should not have to open the package to get information because that could impact their ability to return the product.” Power Tool Institute, Inc. concurs that “[p]lacing a QR Code on the packaging is preferable to placing it on the device.” Notable pros of using a QR Code are providing “consumers with detailed information about a device or product,” enhancing the program's objective by providing real-time updates. However, some commenters raise concerns with the placement of the QR Code on the product packaging. Logitech urges the Commission to not require a QR Code in conjunction with the label, stating that it could crowd packaging, cause consumer confusion, and may cause confusion if retailers scan the wrong barcode when checking out a customer. We believe that as the label becomes established and recognized by consumers and retailers, the benefit of providing a QR Code linking to a registry populated with current information on the IoT product outweighs the potential for consumer confusion. We also believe the registry will be of value to consumers such that they will want to see it acknowledged in an easily accessible manner, which will override any potential difficulty retailers may have with scanning the incorrect code. Moreover, recognizing the realities of inventory turnover against the need for a cybersecurity label to be dynamic, the use of a QR Code-embedded URL in this context ensures that (1) if a consumer desires more information about the product than what the label itself signifies there is a simple means of access; and (2) information associated with the product's compliance with the IoT Labeling Program is current. We view these as relevant considerations to purchasing decisions, which requires easy access to such information “on the spot” rather than requiring a purchaser to independently seek it out.

99. We direct the Lead Administrator to collaborate with stakeholders as needed to recommend to the Commission standards for how the FCC IoT Label bearing the Cyber Trust Mark and the QR Code should be designed ( e.g., size and white spaces) and where such a label should be placed. This should include where the label could be placed on products where consumers may not see product packaging when shopping or after purchasing ( e.g., refrigerators, washing machines, dryers, dishwashers, etc.) and including where consumers purchase products online. The Lead Administrator and stakeholders should also examine whether the label design should include the date the manufacturer will stop supporting the product as well as whether including other security and privacy information ( e.g., sensor data collection) on the label would be useful to consumers. In addition, the Lead Administrator should address the use of the FCC IoT Label in store displays and advertising. [ 20 ] We recognize the current work being done by industry on an appropriate format for the label, including the Cybersecurity Label Design, which is part of CTA's American National Standards Institute (ANSI)-accredited standards program. As noted by CTA in its reply comments, the FCC specifies requirements for the use of the Cyber Trust Mark, but “there are several additional details needed regarding QR coding and resolution, white space for accurate recognition of QR codes, and more.” CTA states that the draft ANSI/CTA-2120 details lay out requirements for packaging, and we encourage the Lead Administrator to review and consider the work CTA's Cybersecurity Label Design working group (a subgroup of CTA's Cybersecurity and Privacy Management Committee) has completed in this regard. We agree that we should take into consideration the considerable work that has already been undertaken with respect to labeling design and placement and seek to leverage and benefit from this expertise by directing the Lead Administrator to seek feedback from a cross-section of relevant stakeholders who have been working on these issues. We delegate authority to PSHSB to review, approve (or not approve) the Lead Administrator-recommended labeling design and placement standards after any required public notice and comment process and if approved incorporate into the Commission's part 8 rules. The provisions of 47 CFR 2.935(a) (allowing the electronic display of “or other information that the Commission's rules would otherwise require to be shown on a physical label attached to the device”) do not apply to the FCC IoT Label. The Cyber Trust Mark may only be used as directed by part 8, notwithstanding 47 CFR 2.935 or any other rule.

100. We adopt our proposal from the IoT Labeling NPRM that the label include the Cyber Trust Mark and a QR Code that links to a decentralized publicly available registry containing Start Printed Page 61263 information supplied by entities authorized to use the FCC IoT Label ( e.g., manufacturers) through a common Application Programming Interface (API). The registry will include and display consumer-friendly information about the security of the product. We believe a publicly accessible registry furthers the Commission's mission of allowing consumers to understand the cybersecurity capabilities of the IoT devices they purchase. We also agree that it is important for the registry to be dynamic, so a consumer can be aware if a product loses authorization to use the FCC IoT Label or if the manufacturer is no longer providing security updates. There is robust support for the development of a publicly-accessible registry. We agree with NCTA that “the IoT Registry is foundational to the value and utility of the Cyber Trust Mark Program.” In the following paragraphs, we establish general parameters for registry information.

101. We adopt a decentralized registry that contains specific essential information that will be disclosed by the manufacturer, as discussed in further detail below. This essential information from the manufacturer will be provided to a consumer accessible application via the registry by utilizing a common API that is secure by design. When a consumer scans the QR Code, a consumer accessible application will access the registry using the common API and present the consumer with the information we require to be displayed from the registry. CTIA points out that a centralized registry containing all the information the Commission conceived in the IoT Labeling NPRM and by commenters in the record would be inordinately complex and costly. We agree, and endeavor to meet the policy goal of providing a transparent, accessible registry to the public through more efficient and less complicated means.

102. We agree with the Commission's assessment in the IoT Labeling NPRM that the registry's goal is to assist the public in understanding security-related information about the products that bear the Cyber trust Mark. CTIA confirms this view, stating “the Commission should focus on the [registry] as a means to provide consumers with information that is critical to the success of the program.” CTIA further proposes that we should allow each manufacturer to establish their own mechanisms for conveying this information to consumers. However, we acknowledge ioXt Alliance's concern that a completely manufacturer-driven approach could lead to inconsistencies, inaccuracies, or other difficulties for the consumer. To balance the need for a workable, streamlined registry that is consistent for consumers and meets the Commission's goals while easing the administrative burden inherent in a centralized registry, we require a common API that would provide access to the following essential information from the manufacture and display it to the consumer in a simple, uniform way:

  • Product Name;
  • Manufacturer name;
  • Date product received authorization ( i.e., cybersecurity certification) to affix the label and current status of the authorization (if applicable);
  • Name and contact information of the CLA that authorized use of the FCC IoT Label;
  • Name of the lab that conducted the conformity testing;
  • Instructions on how to change the default password (specifically state if the default password cannot be changed);
  • Information (or link) for additional information on how to configure the device securely;
  • Information as to whether software updates and patches are automatic and how to access security updates/patches if they are not automatic;
  • The date until which the entity promises to diligently identify critical vulnerabilities in the product and promptly issue software updates correcting them, unless such an update is not reasonably needed to protect against cybersecurity failures ( i.e., the minimum support period); alternatively, a statement that the device is unsupported and that the purchaser should not rely on the manufacturer to release security updates;
  • Disclosure of whether the manufacturer maintains a Hardware Bill of Materials (HBOM) and/or a Software Bill of Materials (SBOM);  [ 21 ] and
  • Additional data elements that the Bureau determines are necessary pursuant to the delegated authority discussed below.

103. To reduce potential burdens and focus on essential information, we pare back the scope of the registry from what the Commission proposed in the IoT Labeling NPRM. We agree with the Cybersecurity Coalition that “[t]he primary purpose of the label is to help consumers make informed purchasing decisions” and include in the registry information that is key to making a purchasing decision, without overwhelming the consumer. To this end, we agree with commenters who suggest that including the information proposed in the IoT Labeling NPRM may be too burdensome. NEMA, for example, expresses concern about the resources required for a registry containing a full catalogue of devices. CTIA agrees that the IoT registry envisioned by the IoT Labeling NPRM would “impose significant, unmeetable burdens” for participants and the manager of the registry, and encourages us to refine our approach. The Cybersecurity Coalition likewise expresses concern over the complexity of the proposed registry. We agree that the registry be “modest in its goals” and “limited to basic information that is uniform . . . and pragmatic and useful to the consumer.” We believe that a registry containing simple, easy to understand information will be most helpful to a consumer making a purchasing decision, but also see the value in allowing manufacturers to include a second registry page (following the consumer-focused page) to enable manufacturers to provide additional technical details designed for researchers, enterprise purchasers, and other expert consumers of the label. Focusing only on the most critical information will further facilitate the speedy establishment of the IoT Labeling Program and the registry itself.

104. In the interest of keeping information simple and establishing the database swiftly, we streamline the elements that should be included in the registry. We do require information about how to operate the device securely, including information about how to change the password, as it would help consumers understand the cybersecurity features of the products, how those products are updated or otherwise maintained by the manufacturer, and the consumer's role in maintaining the cybersecurity of the product. We do not require information about whether a product's security settings are protected against unauthorized changes as part of the initial rollout of the registry in an attempt to streamline the registry to address concerns that the registry would be too bulky or unfriendly to consumers. We recognize the value of ensuring the registry information is accessible to everyone, including those whose primary language is not English. Accordingly, we direct the Lead Administrator to recommend to the Bureau whether the registry should be in additional languages and if so, to recommend the specific languages for inclusion. We delegate authority to the Bureau to consider and adopt requirements in this regard upon review Start Printed Page 61264 of these recommendations. As the Association of Home Appliance Manufacturers points out, the location of the product's manufacture is redundant with existing legal requirements. We also do not require labels to include an expiration date at this time as it may not be an applicable requirement for every product, but we direct the Label Administrator to consider whether to recommend including the product support end date on labels for certain products, or category of products.

105. While we recognize the value of utilizing the registry to keep consumers informed about product vulnerabilities, we note CTIA and Garmin's concerns about listing unpatched vulnerabilities as not providing value to consumers, discouraging manufacturers from participating in the program, and tipping off bad actors. We agree that these concerns are significant and do not require detailed information about vulnerability disclosures in the registry at this time. Rather, we require disclosure only of whether a manufacturer maintains an SBOM and HBOM for supply chain security awareness. We agree with Consumer Reports, NYC Cyber Command Office of Technology and Innovation (NYC OTI), and the Cybersecurity Coalition that an SBOM should be considered as an element of the registry. We also note that Garmin's concern is with disclosing the specific contents of an SBOM to the public, which “could reveal confidential business relationships with companies, as well as provide a roadmap for attackers,” but this is not what we require here. Requiring participating manufacturers to disclose only the maintenance of an SBOM and HBOM, rather than the contents therein, indicates an added level of software and hardware security while also protecting potentially sensitive information. Further, while we agree with CTA that a searchable registry would have value for the public, we are mindful of the resources, costs, and time involved with creating a registry that is searchable by each of the elements identified in the IoT Labeling NPRM. In limiting the registry as we have, we address the concerns that the registry may be too complex to administer in the initial iteration of the IoT Labeling Program. As discussed above, the decentralized, API-driven registry we adopt in the Order addresses the complexity concerns raised in the record. We cabin our initial vision of the registry and direct the Bureau, as described further below, to consider ways to make the initial design of the registry modest, with potential to scale the registry as the IoT Labeling Program grows.

106. In this respect, we note that NIST's research suggests that “future work should be done to examine potential issues of including an expiry date on a label.” NIST cited studies conducted by the UK Government that consumers were confused about what the expiration date meant, and an Australian government study in which consumers thought the device would stop working after that date. The UK research did conclude, however, that continued manufacturer support was important to survey participants. Consumer Reports suggested an expiration date, if present, should be tied to an end-of-support date rather than a renewal date. NIST's research into the importance of support dates to consumers coupled with the potential confusion of expiration dates and the support from the record lead us to conclude an expiration date is not warranted. We do find, however, that the disclosure of a minimum support period and end date for the support period for the device is appropriate and will provide meaningful information to consumers on the manufacturer's commitment to provide patches or other support—a vital issue in a dynamic threat environment. To ensure that information about this support period remains accurate, and to encourage manufacturers to support their products for longer periods, manufacturers shall be able to extend the support period in the registry through a mechanism to be determined by the Lead Administrator, but which should be expeditious and require no further disclosures.

107. While we identify the defined set of data that is consistent across all manufacturers, we believe the information contained in the registry for a particular IoT product or product class may also depend on the standards and testing procedures adopted for each particular IoT product. As such, in the near term, we expect there will be additional registry data elements that are specific to an IoT product, or classes of IoT products, that are not yet ripe for decision. We also recognize that some of the information recommended by NIST in its consumer education recommendations, discussed in further detail below, may be valuable for consumers to see in the registry. Accordingly, while we provide a baseline of necessary information that must be displayed for an IoT product in the registry, regardless of class the IoT product belongs to, we delegate authority to the Bureau to determine, subject to any required public notice and comment processes, whether any additional disclosure fields, such as the manufacturer's access control protections ( e.g., information about passwords, multi-factor authentication), whether or not the data is encrypted while in motion and at rest (including in the home, app, and cloud), patch policies and security or privacy information are necessary, and if so, what should they be.

108. We disagree with commenters, such as LG Electronics, who suggest that manufacturers should have discretion over whether to include additional privacy and/or security information through a QR Code, URL, or other scannable mechanism insofar as it would require additional information in the registry. LG Electronics, though supportive of adding a variety of data to the registry, acknowledges it is unclear how much detail or what types of information would be of value to a consumer. We believe that allowing discretion over what information is included in the registry may overcrowd it, or engender consumer confusion. Rather, uniform registry elements will provide greater consistency for consumers and adoption of uniform registry elements is supported by the record. We make clear, however, that we do not otherwise restrict what information manufacturers may include or reference on their product packaging, so long as it does not interfere with or undermine the display of the FCC IoT Label.

109. We recognize that a decentralized registry relying on data derived through an API from manufacturers will require some oversight to ensure that the registry, when accessed by consumers using QR Codes, functions as described and displays the required information about individual products. We direct the Lead Administrator to receive and address any technical issues that arise in connection with displaying the registry through the QR Code, the associated API, and consumer complaints with respect to the registry. CSA recommends that the Commission engage a third-party with operating the registry for cost and efficiency reasons. CTA agrees that the Commission should use a third-party to host and manage the registry due to the resources required to establish the registry. We agree that, given the structure of the registry as we adopt in the Order, the Lead Administrator is in the best position to interface with manufacturers to ensure the smooth operation of the registry.

110. We also recognize that for a registry of this magnitude to be effectively and timely rolled out requires significant input and Start Printed Page 61265 coordination with industry partners. To determine how the registry should be structured to best meet the goals of the IoT Labeling Program as we adopt in the Order, we direct the Bureau to seek comment and consider, as part of a public process, the technical details involved with the operation of the registry. We delegate authority to the Bureau to adopt a Public Notice, subject to any required public notice and comment, establishing the structure of the registry; identifying the common API; how the API should be structured; how the API should be used; how the queried data will be displayed to the consumer; how manufacturers need to maintain and implement the API in connection with its interactions with the registry; what, if any, additional disclosure fields would be most beneficial to consumers in the future, as discussed above; how the data in the registry returned by the API should be presented to the consumer; how the costs involved in maintaining the registry will be handled; how often the registry should be updated; whether to require the manufacturer to list the product sensors, what data is collected, if the data is shared with third parties, or security or privacy issues and if data should be replicated; and whether data should be replicated in multiple repositories—by the relevant CLA(s) or vendors, for example—and publicly accessible via a single query point; and any other technical information needed to establish the registry as we adopt in the Order. The Bureau should consider how to reduce burdens on manufacturers in supporting the decentralized registry. We delegate authority to PSHSB in coordination with, at a minimum, OMD (specifically the Office of the Chief Information Officer) and, to the extent necessary OGC (specifically the Senior Agency Official for Privacy) to identify and impose any applicable security or privacy requirements arising from Federal law or Federal guidance for the registry and to approve or modify the recommendations regarding the functional elements of the registry listed above. We further delegate authority to PSHSB to publish a Public Notice, subject to any required public notice and comment, adopting and incorporating into the Commission's rules any additional requirements or procedures necessary to implement the Cyber Trust Mark registry.

111. We adopt the proposal in the IoT Labeling NPRM that applicants must renew their authority to use the FCC IoT Label. Entities authorized to use the FCC IoT Label are required to ensure the product bearing the FCC IoT Label continue to comply with the Commission's program requirements. We disagree with the Connected Consumer Device Security Council (CCDS) that no renewals should be required and the product should simply bear the last date of testing. Such an approach could severely impair consumer trust in the label, especially if a product bearing the FCC IoT Label is being sold as new but is far out of date as to its initial achievement of the Mark.

112. For those that support some interval of renewal, the record is divided with respect to whether IoT Labeling Program applicants should file for renewal each year, as proposed in the IoT Labeling NPRM. Consumer Reports and TÜV SÜD agree that annual renewal is appropriate. AHAM feels that an annual renewal application as the Commission proposed was unnecessary, or at minimum “unnecessarily rigid.” AHAM posits that a requirement to renew should only be triggered when a significant or substantive change is made to either the standard the manufacturer certifies to, or a significant design change to the product. Similarly, more durable IoT products (such as smart appliances) may need to be renewed less frequently. NAM argues that annual renewals are unnecessary for products that pose a limited risk. Kaiser Permanente believes higher-risk devices should be updated annually, and otherwise renewal should occur every three years. CCDS argues no annual testing is necessary, and the product should simply have the date it was authorized to bear the label that signals the product was compliant as of the initial date. CSA suggests limiting the need for annual testing, but suggests some kind of annual reporting should be required. We observe that other certifying bodies, such as ioXt Alliance, require annual renewal for products they certify and allow incentives for early renewal. Based on the record, we recognize the degrees of nuance attendant to the different types of products at issue. We agree with the notion that certain IoT products, depending on their lifespan and risk level, may need different standards for renewal to achieve the FCC IoT Label.

113. We task the Lead Administrator to collaborate with stakeholders and provide recommendations to PSHSB on how often a given class of IoT products must renew their request for authority to bear the FCC IoT Label, which may be dependent on the type of product, and that such a recommendation be submitted in connection with the relevant standards recommendations for an IoT product or class of products. In doing so, consideration should be given as to whether annual continuous compliance reports are acceptable for purposes of renewing, and how to effectively balance the need for industry flexibility and the need to ensure that consumers have up-to-date information about the product they are considering purchasing. Consideration should also be given to the fees incurred as part of a renewal process, as we agree with Kaiser Permanente that renewal fees must not be unduly burdensome or cost-prohibitive. We emphasize that renewals should occur frequently enough that a consumer can be sure that a product bearing the FCC IoT Label has reasonable cybersecurity protections in place, and some process must be in place to ensure accountability, even if annual testing is not required. We delegate authority to PSHSB to review, approve (if appropriate) and, subject to any required public notice and comment, incorporate by reference into the Commission's rules, the proposals from the Lead Administrator for renewal of authority to bear the FCC IoT Label.

114. We adopt the IoT Labeling NPRM's proposal to rely on a combination of administrative remedies and civil litigation to address non-compliance and direct the CLA(s) to conduct post-market surveillance. The purpose of this IoT Labeling Program is to provide reasonable assurances to the consumer that the products they bring into their homes have at least a minimum level of cybersecurity. The success of the IoT Labeling Program hinges on the label retaining its integrity as a trusted consumer resource. This requires vigorous review and enforcement to ensure that products bearing the Cyber Trust Mark are in compliance with the program standards. We further observe that the ISO/IEC 17065 standards require CLAs to perform appropriate post-market surveillance activities. We adopt post-market surveillance and civil enforcement, accordingly.

115. We find support in the record that the “Mark must be trusted by consumers to be successful” and “to gain consumer confidence and incentivize cybersecurity, the label must be backed by a robust enforcement program.” We agree with the EPIC's position that weak enforcement may result in unmet consumer expectations regarding a product's actual level of cybersecurity and “allow bad actors to take advantage of the goodwill created Start Printed Page 61266 by the cybersecurity program,” and take up its recommendation of independent, post-market audits accordingly. Whirlpool also supports regular market surveillance to find instances of unapproved use of the Cyber Trust Mark, as well as products that may have been certified but no longer meet program requirements. Whirlpool states that surveillance “should include random auditing . . . as well as sampling of some established percentage on a regular basis of certified products/devices.” The American Association for Laboratory Accreditation supports adopting the product surveillance standards established for Telecommunication Certification Bodies (TCBs) and in the EPA's ENERGY STAR program. We also agree with commenters who indicate that the Commission, CLAs, and possibly the Federal Trade Commission (FTC) should be able to receive complaints of noncompliant displays of the Cyber Trust Mark, which could result in auditing. We delegate authority to the Bureau, in coordination with the Consumer and Governmental Affairs Bureau, to determine the process for receiving and responding to complaints. CTA and Planar Systems also support random auditing. We agree that random audits, in addition to regular post-market surveillance will best serve to maintain consumer confidence in the Cyber Trust Mark. [ 22 ]

116. Post-market surveillance. We agree with the Cybersecurity Coalition that post-market surveillance of products receiving the Cyber Trust Mark should be a principal enforcement mechanism, and find that CLAs are in the best position to conduct post-market surveillance and random auditing, in accordance with ISO/IEC 17065. These activities are based on type testing a certain number of samples of the total number of product types which the CLA has certified. In addition, each CLA must be prepared to receive and address post-market surveillance from the public. If a CLA determines that a product fails to comply with the technical regulations for that product, the CLA will immediately notify the grantee and the Lead Administrator in writing. The grantee will have 20 days to provide a report to the CLA describing actions taken to correct the deficiencies. Continued deficiency after 20 days will result in termination of the grantee's approval to display the Cyber Trust Mark. A grantee's approval to display the Cyber Trust Mark may also be terminated subject to the 20 day cure period for false statements or representations found in their application or associated materials or if other conditions come to the attention of a CLA which would warrant initial refusal to authorize use of the FCC Label. Such terminations will protect the integrity of the FCC IoT Label and encourage accurate representations and disclosures in application materials that will enhance the reliability of the Labeling Program's operation, more generally.

117. We believe it is appropriate for the Lead Administrator, in collaboration with the CLAs and other stakeholders, to identify or develop, and recommend to the Commission for approval, the post market surveillance activities and procedures that CLAs will use for performing post-market surveillance. The recommendations should include specific requirements such as the number and types of samples that a CLA must test and the requirement that grantees submit, upon request by PSHSB or a CLA, a sample directly to the CLA to be evaluated for compliance at random or as needed. [ 23 ] We delegate authority to the Bureau to review the recommendations and, subject to any required public notice and comment, incorporate post market procedures into the Commission's rules. We also delegate authority to the Bureau to establish requirements (subject to any required public notice and comment) regarding post-market surveillance of products in any instances where the CLA that granted the authorization of the product is not available to conduct such post-market surveillance. The document will also address procedures to be followed if a grantee's approval to display the Cyber Trust Mark is terminated based on mandatory post-market surveillance or notice from the public, including disqualification from the IoT Labeling Program and potential further investigation into other products related to the manufacturer or the CyberLAB, as discussed below. Finally, the Lead Administrator will submit periodic reports to PSHSB of the CLAs' post-market surveillance activities and findings in the format and by the date specified by PSHSB.

118. The IoT Labeling NPRM sought comment on disqualification for nonconformity, referencing the Department of Energy's ENERGY STAR program, which sets out contractual Disqualification Procedures, including a 20 day period to dispute before a formal disqualification decision and what steps an ENERGY STAR partner must take after being formally disqualified ( e.g., removing references to ENERGY STAR in the product labeling, marketing). The IoT Labeling NPRM asked whether the IoT Labeling Program should adopt a similar process. We agree with EPIC and Planar Systems in supporting a “cure period [to] give[ ] good actors the opportunity to fix any issues without incurring penalties” and ” to address any discovered non-conformance as long as the manufacturer is acting in good faith.” Here, we adopt a cure period of 20 days, which is in line with the ENERGY STAR program.

119. EPIC also supports adopting disqualification procedures similar to ENERGY STAR's for non-compliance, including ceasing shipments of units displaying the label, ceasing the labeling of associated units, removing references to the label from marketing materials, and covering or removing labels on noncompliant units within the brand owner's control. It notes that the EPA also conducts retail store level assessments to identify mislabeled products and argues that a robust enforcement mechanism should include all of these actions. We delegate to the Bureau to consider whether such requirements should follow from termination of authority.

120. In addition, we find that a combination of enforcement procedures for non-compliance are available, including administrative remedies under the Communications Act and civil litigation trademark infringement or breach of contract. Administrative remedies may include, but are not limited to, show cause orders, forfeitures, consent decrees, cease and desist orders, and penalties. The Commission will pursue all available means to prosecute entities who improperly or fraudulently use the FCC IoT Label, which may include, but are not limited to, enforcement actions, legal claims of deceptive practices prosecuted through the FTC, [ 24 ] and legal Start Printed Page 61267 claims for trademark infringement or breach of contract. The record supports both administrative remedies to address consumer harm and civil enforcement actions for false use of the FCC IoT Label. We assert that this combination of enforcement mechanisms are best suited to protect consumer trust in the Cyber Trust Mark and incentivize participant compliance.

121. Cyber Trust Mark Demonstrates Adherence to Widely Accepted Industry Cybersecurity Standards. While we decline to preempt state law, we find that approval to use the Cyber Trust Mark on a particular product is an indicator of reasonableness and demonstrates adherence to widely accepted industry cybersecurity standards. While several commenters support Commission preemption of state laws, as well as adoption of liability protections for devices approved to display the Cyber Trust Mark, we decline to preempt state law and decline to implement a legal safe harbor beyond reiterating the Commission's view that achievement of FCC IoT Label is an indicium of reasonableness for entities whose products are compromised despite being approved to use the Cyber Trust Mark. We recognize that a more fulsome safe harbor provision may indeed incentivize participation in the IoT Labeling Program, as the U.S. Chamber of Commerce urges. However, on this record we are not persuaded that it would be feasible or prudent for the Commission to make liability pronouncements as to laws or standards outside the Commission's purview as would be necessary for a broader safe harbor in the absence of preemption. As EPIC observes, such a safe harbor could also decrease consumer trust in the label. In addition, several states have adopted legal safe harbors for entities that implement reasonable security measures ( e.g., voluntarily adopt recognized best practices such as NIST's and implement written security programs), and we defer to the states to determine whether approval to use the Cyber Trust Mark meets these State requirements. Given the uncertain interplay between qualification to use the Cyber Trust Mark and various state law regimes, coupled with the risk that such a safe harbor could decrease consumer trust in the label, we decline to preempt state liability requirements at this time.

122. We note the robust record highlighting the immense value to manufacturers of IoT products in international harmonization of cybersecurity standards. We agree with Widelity that “IoT devices are often manufactured and sold globally. As supply chains evolve, a consistent set of standards will support the rapid growth of innovation and security.” We further agree with Consumer Reports that “mutual recognition should only occur when the other program to be recognized has standards as stringent or more stringent” than the IoT Labeling Program.

123. We recognize several other countries already have an established national cyber IoT labeling program, including Singapore, Finland, and Germany. The record cites to these programs and highlights their features for consideration in developing the IoT Labeling Program. For example, the record explains how Singapore's CLS takes reference from the EN 303 645 standards developed by the European Telecommunications Standards Institute (ETSI). We note that other commenters have also recommended use of the ETSI EN 303 645 standards. Further, the record provides Finland's IoT labeling database as an example for developing our IoT registry. Several other countries have government activity around IoT devices or products. For example, Canada has a cybersecurity certification program for small and medium-sized organizations. As another example, South Korea has a IoT security certification system justified under Article 48-6 of their “Act on Promotion of Information and Communications Network Utilization and Information Protection” statute.

124. We also observe continuing developments in IoT security across the globe for consideration. The European Union Agency for Cybersecurity (ENISA) is currently developing a cybersecurity certification framework that would require certain products, services, and processes to adhere to specific requirements. Relatedly, the U.S. has signed an agreement for a joint roadmap between the Cyber Trust Mark and similar consumer labeling programs in the EU. Further, Japan has committed to work with the U.S. to “ensure interoperability” of its IoT labeling scheme currently under development.

125. We fully recognize the importance of ensuring international recognition of the IoT Labeling Program and reciprocity considerations underlie our decisions in the Order. We delegate authority to the Bureau and the FCC Office of International Affairs to work with other Federal agencies to develop international recognition of the Commission's IoT label and mutual recognition of international labels, where appropriate, as promptly as possible to enable recipients of the Cyber Trust Mark to realize the benefits an internationally recognized Cyber Trust Mark can have to promote global market access. Moreover, the proliferation in the marketplace both in the U.S. and abroad of products meeting a common baseline standard will elevate the overall global cybersecurity baseline for IoT and promote security-by-design approaches to smart products.

126. We adopt the IoT Labeling NPRM's proposal and base the IoT Labeling Program's consumer education requirements on the considerations NIST outlines in the NIST Cybersecurity White Paper due to its general applicability to an IoT label and in light of support from the record. The Lead Administrator will be responsible for developing a consumer education campaign that is based on the considerations recommended by NIST in the NIST Cybersecurity White Paper and discussed in greater detail below. In developing its consumer education plan, we task the Lead Administrator with considering ways to roll out a robust campaign with a reasonable national reach, including ways to make the consumer education accessible and whether education materials should be developed in multiple languages. We further task the Lead Administrator with considering the costs of conducting such outreach and how that outreach would be funded. Once developed, the Lead Administrator will submit this consumer education plan to the Bureau for consideration and for coordination in publicizing the benefits of the IoT Labeling Program. We recognize the importance of close collaboration between industry and delegate authority to the Bureau to consider and work with the Lead Administrator and other stakeholders to determine how the consumer education campaign would be executed and to execute the campaign. In addition and in furtherance of our expectation that the success of the IoT Labeling Program will be dependent on a close collaboration with the Federal Government, industry, and other relevant stakeholders, the Commission will coordinate as needed with relevant agencies, such as the Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation Start Printed Page 61268 (FBI), as well as the FTC, the Consumer Product Safety Commission (CPSC), and other industry stakeholders who have indicated a willingness to publicize the benefits of the IoT Labeling Program as part of their own consumer education activities.

127. We agree with CEDIA that consumer education will have a significant impact on meeting the IoT Labeling Program's goals. We further agree that adequate consumer education must inform consumers of the limitations of the Cyber Trust Mark as well as the benefits of having a product that meets baseline cybersecurity requirements, and we agree with CSA that consumers should understand that the label does not guarantee complete device security, but that such protections are an important component of risk management. As pointed out by the City of New York's Office of Technology and Innovation, an effective consumer education program would need to cover the risks and threats to “digital integration of [IoT] devices” and how those risks “can be lessened by helping operators, users, and consumers . . . learn the key elements of a strong IoT Cybersecurity posture.” We agree with commenters in the record that NIST's approach to consumer education is best, and note that no commenters opposed NIST's approach.

128. As the Commission acknowledged in the IoT Labeling NPRM, NIST has prepared a document identifying consumer education considerations as part of its analysis of a cybersecurity labeling program. In following with NIST's recommendations, the Commission believes consumers should have access to the following information as part of the IoT Labeling Program's consumer education plan:

(1) What the label means and does not mean, including that the label does not imply an endorsement of the product and that labeled products have not completely eliminated risk;

(2) What cybersecurity baselines must be met to obtain authority to affix the label, why they were included, and how those criteria address security risks;

(3) A glossary of applicable terms, written in plain English;

(4) General information about the conformity assessment process, including information about how the conformity assessment was conducted and the date the label was awarded to the product;

(5) The kinds of products eligible for the label and an easy way for consumers to identify labeled products;

(6) The current state of device labeling as new cybersecurity threats and vulnerabilities emerge;

(7) Security considerations for end-of-life IoT products and functionality implications if the product is no longer connected to the internet;

(8) Consumer's shared responsibility for securing the device software and how their actions (or inactions) can impact the product's software cybersecurity; and

(9) Contact information for the IoT Labeling Program and information on how consumers can lodge a complaint regarding a product label.

129. We recognize that some aspects of this consumer education campaign overlap other aspects of the IoT Labeling Program, such as the registry. We see no harm with including that information in the registry as well as the consumer education campaign. We also observe the importance of conducting what NIST describes as a “campaign” to establish and increase label recognition, and thus envision a Lead Administrator-led, multiple stakeholder engagement that puts NIST's recommendations into practice.

130. NIST has conducted research into the consumer perspective on the loss of manufacturer support in IoT products. The research suggests that proactive communication to consumers from the manufacturer with information about end-of-life support policies, the expected lifespan, and how to sign up for notifications about changes to support is an additional, important step. NIST also emphasizes the importance of consumer education about the meaning of the dates attached to a label, and cautions that this can confuse consumers as to the date's meaning. We agree with Consumer Reports that educating consumers about the meaning of support periods is an important aspect of consumer education. We believe that the recommendations identified by NIST in the NIST Cybersecurity White Paper, coupled with the consumer research done by NIST and industry, provide a strong model that the Lead Administrator can utilize in its consumer education campaign to meet the goals NIST and the record, discussed above, identify as important for a successful consumer education campaign.

131. To assist the Lead Administrator in promoting consumer education, the Commission will coordinate publicizing the benefits of the IoT Labeling Program with the relevant agencies, including the Department of Homeland Security, CISA, FBI, FTC, CPSC, and other industry stakeholders who have indicated a willingness to assist with consumer education. A coalition of trade associations advocates for a consumer education program led by the U.S. Government, but do not propose how to conduct outreach consistent with the Federal outreach concerns articulated in the IoT Labeling NPRM. We agree that a government outreach program is essential in a larger campaign to effectively inform consumers about the IoT Labeling Program, consistent with NIST's recommendations identified above. The Commission intends to work closely with CISA to make use of their “Secure our World” program. We agree with CTA that Federal consumer education efforts do not preclude independent communication and outreach programs. For example, the National Retail Foundation indicated their willingness to support consumer education efforts. While Everything Set, Inc. is concerned that outsized private sector involvement in consumer education might hurt the campaign's credibility, we believe that retail and manufacturer involvement in promoting the IoT Labeling Program and the limitations of the IoT Labeling Program are important to ensure widespread recognition of the Cyber Trust Mark in commerce. To promote consumer education and engage in a joint effort with industry and stakeholders to raise awareness of the label, the Commission will coordinate with the Lead Administrator, Executive Agencies, and other industry stakeholders who have indicated a willingness to publicize the benefits of the IoT Labeling Program as part of their own consumer education efforts.

132. Our analysis indicates that the expected benefits of the IoT Labeling Program greatly exceed the expected costs of the program. The expected benefits of the IoT Labeling Program include improved consumer cyber awareness; reduced vulnerability of products that could be used in cyberattacks both in people's homes and as part of a larger national IoT ecosystem; and increased manufacturer competition and relational benefits stemming from increased goodwill and product awareness. Consumers value the security of their devices, and the complexity of understanding whether IoT devices meet baseline security standards, and making informed purchases on that basis is a significant cost to consumers.

133. Consumer Benefit from Reduced Search Costs. The Cyber Trust Mark can lower consumer research costs by reducing the amount of time consumers spend researching the cybersecurity Start Printed Page 61269 characteristics of IoT products before making a purchase. We estimate that the Cyber Trust Mark will save consumers at least $60 million annually from reduced time spent researching cybersecurity features of potential purchases. We use the U.S. Department of Transportation (DOT)'s approach of valuing the time savings of travel to value the time savings to consumers of the Cyber Trust Mark. Our analysis relies on the share of households with a smart home device (which we note is only one segment of the IoT market likely to be impacted by the Order), the share of those households that are likely to devote time to investigating the cybersecurity of their connected products, and an estimate of their time value of researching cybersecurity characteristics of devices. First, we estimate that 49 million U.S. households own at least one IoT device from a market segment that likely will be impacted by the Cyber Trust Mark. Further, recent survey evidence suggests that 32% of households are invested in reducing their cybersecurity risk. We estimate each hour of time savings to be valued at $16 based on the median compensation in the U.S. and an individual's potential preference for researching products rather than working an additional hour. We note that this calculation only focuses on one segment of the IoT market, which may underestimate the time savings induced by the Order. We recognize that the exact time savings of utilizing the Cyber Trust Mark relative to searching for information online is unknown, so a lower end estimate of 15 minutes of time savings per year per household is used. We find a 15-minute time savings is consistent with the value of cybersecurity features disclosed in surveys. Given manufacturer and industry group comments showing support for consumer awareness and cybersecurity, we believe there would be sufficiently large enough immediate manufacturer participation in the IoT Labeling Program to incur these benefits in the first year of the program, and every year thereafter. Nationwide, the Cyber Trust Mark would result in a minimum of $60 million in time savings annually. [ 25 ]

134. A separate approach to calculating the benefit of the Cyber Trust Mark is to estimate the value consumers place on security and privacy features of IoT devices. A study submitted by Consumer Reports found that respondents valued individual security upgrades between $6 and $13. The study also found that devices were valued at around $34 more if they had a label emphasizing a bundle of the most protective security features. Given the difficulty consumers face in understanding what security and privacy features are included in a device, the Cyber Trust Mark would help consumers easily identify and choose products with features they value. For example, if the Cyber Trust Mark represented the most protective features associated with the label in the in the study, a consumer would benefit by $34 from purchasing a device with the Cyber Trust Mark over a device that did not display the Mark. Based on our estimate of 15 million households that would be impacted by the IoT labeling program, we estimate that the benefit to consumers, in terms of the added value of the Cyber Trust Mark, would be between $85 million and $500 million annually. While the exact security features that will be proposed by the Lead Administrator in collaboration with stakeholders are not yet determined, if the Cyber Trust Mark only emphasized the lowest valued security feature, the program would produce a benefit of at least $85 million.

135. Manufacturer Competitive and Reputational Benefits. Aside from the direct benefits to consumers, there are also wider benefits of the Cyber Trust Mark. Participating businesses benefit from product differentiation and quality signaling vis-a-vis competitors that do not participate in the IoT Labeling Program and from increased company goodwill and reduced risks related to cybersecurity incidents. By aligning minimum security practices with the proposed standards, and communicating those standards to consumers, manufacturers may be able to generate goodwill and reduce business loss after cybersecurity incidences. While we do not revisit our discussion of a safe harbor from liability as discussed above, we note that manufacturers may benefit from adopting security practices that are consistent with standards necessary to bear the Cyber Trust Mark. We highlight that there have been several instances where the Federal Trade Commission investigated and settled with firms due to poor security practices or inaccurate communication of their security practices. We merely note that a manufacturer that has gone through the process of obtaining the Cyber Trust Mark may benefit from likely having documented the security practices and attendant testing necessary to acquire the Mark.

136. Market-Wide Benefits of Reduced Cybersecurity Incidents. Insecure IoT products are often used in distributed denial-of-service (DDoS) attacks, which can be used to overwhelm websites to create a distraction during other cybersecurity crimes, or to request a ransom be paid to stop the attack. While we cannot quantify the expected benefits the Cyber Trust Mark may have on reducing the number of vulnerable devices and/or the potential reduction on their likelihood of being used in a cybersecurity attack, commenters do highlight improved security as one of the major benefits of this IoT Labeling Program. We do further emphasize this as a benefit that is likely to have significant impacts on firms in a wide range of industries.

137. Costs to IoT Labeling Program Participants. Only those entities who choose to participate will incur costs associated with the voluntary IoT Labeling Program. The specific costs of to participating manufacturers cannot be readily measured but are expected to include: conformity testing fees at a CyberLAB, CLA lab, or through in-house testing; CLA fees; internal compliance and filing costs; Cyber Trust Mark placement on product; costs incurred for API access as part of the QR Code; a customer information campaign; and adjustments to security practices necessary to meet the standards established for the Cyber Trust Mark. These costs are likely to vary depending on the standards and testing procedures proposed by the Lead Administrator as well as the extent of manufacturer participation. Any in-house testing lab will also be required to obtain accreditation to ISO/IEC standards and will incur the accreditation costs. We expect that manufacturers that choose to pursue this option may offset the accreditation costs with time savings, and potentially cost savings, associated with in-house testing.

138. Participating manufacturers will incur conformity testing, reporting costs, potential renewal fees, and Label Administrator processing fees, but the Commission's IoT Labeling Program is voluntary and we only expect manufacturers who would benefit from the program to participate in the long-run, further indicating that accrued benefits will exceed manufacturer costs. Furthermore, comments in the record show that many manufacturers and industry groups are in favor of consumer awareness and addressing cybersecurity concerns. This provides some indication that manufacturers perceive the benefits of participating in the IoT Labeling Program as outweighing the costs. We understand Start Printed Page 61270 that manufacturers' security practices for IoT products vary. Some manufacturers will find it beneficial to align their cybersecurity standards with the IoT Labeling Program's standards and apply for the Cyber Trust Mark. If a manufacturer decides not to participate in the program, then they will not experience any additional costs.

139. Cost of Registry Development and Administration. We attempt to estimate the cost of developing and administering the registry with currently available information, recognizing that our cost estimate is unable to incorporate pending issues that will be addressed by the Bureau as discussed above. While the cost to the Lead Administrator to manage the registry in accordance with the Bureau's pending determinations and as discussed above are forthcoming, we nevertheless attempt to estimate the costs of the Lead Administrator' administrative role in managing the registry as described above. Our estimate utilizes data submitted by Consumer Reports, which envisioned a centralized registry. We note that the registry, as adopted, will be less burdensome than the costs described by Consumer Reports in their estimates. [ 26 ] Our estimate to maintain registry components and review applications as part of the CLA duties, which aligns with the middle of the expert range based on commenter submissions, is approximately $5 million annually. The high-end estimate submitted by Consumer Reports is $10 million. Consumer Reports indicates that setting up a centralized registry could be done by one individual with a few contractors at a cost less than $200,000 a year. Depending on the requirements, the Lead CLA may still need to set up some minimal components of a registry and incur a small portion of these costs. The estimates on the annual administration costs are much less precise with the expert proposed estimate of between $100k and $10 million annually, with indication that the $10 million estimate is on the very high end. Staff calculate a more reasonable, but likely still high, estimate in the middle of that range, even accounting for the advanced technical expertise that would be required to review applications. For example, an organization relying on five lawyers, five electrical engineers, and five software developers in a full-time capacity would require $3 million annually in wage compensation. If we generously assume another $2 million in additional costs to accommodate ISO/IEC accreditation, contractors, facilities, and other resources, the total is $5 million. While these estimates are for a single administrator, we believe this is a reasonable estimate of the staffing costs that would be distributed among the CLAs to meet the requirements of reviewing applications.

140. The estimated high-end costs of administering the IoT Labeling Program annually ($10 million) are far less than the low-end estimate of annual benefits to consumers ($60 million) of just one aspect of the program. We further highlight that the benefits to manufacturers are likely to exceed manufacturer's participation costs. Together this indicates the total program benefits exceed costs. Because the initial startup costs are so low relative to the benefits, we do not compare the discounted values.

141. We adopt the IoT Labeling NPRM's tentative conclusion that the FCC has authority to adopt the IoT Labeling Program. We conclude that section 302 provides us with the authority to adopt a voluntary program for manufacturers seeking authority to affix the FCC-owned Cyber Trust Mark on wireless consumer IoT products that comply with the program requirements. In the IoT Labeling NPRM, the Commission sought comment on its authority under section 302 of the Act, along with other possible sources of authority. In particular, under section 302(a) of the Act, consistent with the public interest, convenience, and necessity, the Commission is authorized to make reasonable regulations (1) governing the interference potential of devices which in their operation are capable of emitting radio frequency energy by radiation, conduction, or other means in sufficient degree to cause harmful interference to radio communications; and (2) establishing minimum performance standards for home electronic equipment and systems to reduce their susceptibility to interference from radio frequency energy.

142. Some commenters question our authority under section 302 to establish an IoT Labeling Program. The U.S. Chamber of Commerce cautions the Commission to not “overinterpret its harmful interference authority” under sections 302(a) and 333. CTIA argues that the Commission does not have the authority to regulate cybersecurity, but does not cite to section 302(a) or explain why the Commission's action in the Order does not fall within the scope of section 302(a) or any other section of the Communications Act. Others do not dispute the Commission's authority to adopt a voluntary program but argue that the Commission does not have the authority to make the IoT Labeling Program mandatory.

143. We agree with Comcast that Congress intended section 302 to be flexible enough “to address novel issues not yet on the legislative radar[.]” As Comcast further observes, “[t]he stated goal of the [IoT Labeling] Program is to `ensure that IoT devices have implemented certain minimum cybersecurity protocols to prevent their being hacked by bad actors who could cause the devices to cause harmful interference to radio communications,' which falls squarely within the Commission's remit under section 302(a).” Further, NYC OTI points out that IoT which “by design doesn't protect against the reception of spurious or unintended RF communications may be subject to a series of radio-layer attacks due to the lack of these protections” and thus is within our authority to regulate. A voluntary IoT Labeling Program thus assures consumers that certain cybersecurity standards are met to protect those devices from being used to generate interference to other devices.

144. In addition to our authority under section 302(a)(1), section 302(a)(2) authorizes the Commission to “establish minimum performance standards for home electronic equipment and systems to reduce their susceptibility to interference from radio frequency energy.” A voluntary program for consumer IoT products is encompassed within our authority to regulate home electronic equipment and their accompanying systems that render that home electronic equipment operational.

145. Section 302(a)(2) allows such regulations to apply to “the manufacture, import, sale, offer for sale, or shipment of such devices and home electronic equipment and systems[.]” The legislative history of section 302 also supports our conclusion. Congress adopted section 302 due to concerns about radio frequency interference to consumer electronic equipment:

In the market for home devices, however, good faith industry attempts to solve this interference have not always been as successful. . . . [T]he Conferees believe that Commission authority to impose appropriate regulations on home electronic equipment and systems is now necessary to insure that consumers' home electronic equipment and Start Printed Page 61271 systems will not be subject to malfunction due to [radio frequency interference].

146. Congress envisioned “home electronic equipment and systems” to include not only radio and television sets, but all types of electronics and their supporting systems used by consumers. Examples given by Congress were home burglar alarms, security systems, automatic garage door openers, record turntables, and sound systems. Congress clearly foresaw interference and disruption to consumer equipment and the systems that equipment was connected to as within the ambit of section 302 when it gave the Commission “exclusive jurisdiction” over matters involving radio frequency interference. The many alternatives available to the Commission to accomplish its duty under section 302 include directing manufacturers to meet “certain minimal standards” or utilizing labels.

147. We additionally conclude that our section 302(a) authority to adopt “reasonable regulations” governing the interference potential of devices capable of causing RF interference empowers us to choose specific approaches that advance goals of the Act in addition to the core concerns in section 302(a)(1) and (2). For one, as widely supported in the record, we rely on NIST's recommended IoT criteria (the NIST Core Baseline) as the foundation for the cybersecurity requirements to be applied under the IoT Labeling Program. Even if some elements or applications of those criteria could advance policies or interests in addition to guarding against the risk that exploited vulnerabilities in internet-connected wireless consumer IoT products could cause harmful interference, it would be neither prudent nor workable to try to segregate or disaggregate that package of criteria in an effort to isolate some product capabilities from others in an effort to narrow the Program's focus. To the contrary, maintaining the integrity of the cohesive package of NIST criteria advances the directive in section 302(a) to address the interference potential of wireless devices through “reasonable regulations.” Commenters point out, for example, that even when harmful interference to IoT products from cyberattacks “is not necessarily the traditional form of interference caused by devices operating in frequencies and at power levels not approved by the Commission[,]” it can implicate statutory policy concerns nonetheless. Under the circumstances here, we thus find it “reasonable” for our IoT Labeling Program to rely on the full package of IoT cybersecurity criteria that guard against the risk that the covered products cause harmful interference, and also guard against the risk of interference to those covered products—even in the case of non-RF interference—consistent with the policy goals underlying provisions such as sections 302(a) and 333 and of the Act. Our understanding of the reasonableness of our approach here also is informed by the public safety and national security goals in sections 1 and 4(n) of the Act. Thus, although we do not rely on additional provisions beyond section 302 as authority for the voluntary IoT Labeling Program we adopt in the Order, they inform our understanding of what regulatory approach to implementing section 302(a) is reasonable under these circumstances. [ 27 ]

148. Comcast also cites the legislative history of section 302(a) in support of our authority to establish an IoT Labeling Program. Congress agreed with a letter from the Commission that initial language that would have restricted section 302(a) to devices that cause harmful interference to “`commercial, aircraft, and public safety' radio communications” was too narrow. Congress instead adopted the current language: “reasonable regulations . . . consistent with the public interest, convenience, and necessity.” The Commission's authority under section 302 was designed by Congress to be “sufficiently broad to permit it to formulate rules relating to any service where interference from these devices is a serious problem.” Such language, it was believed, would be “sufficiently broad to permit it to formulate rules relating to any service where interference from these devices is a serious problem.” We conclude that a voluntary program with minimum standards to prevent radio interference to consumer IoT products is consistent with the text and history of section 302.

149. Further, we have previously imposed security requirements that prevent unauthorized parties from accessing and alerting technology to cause radio interference under our section 302 authority. In 2020, we required that access points to automated frequency coordination systems were secure so unauthorized parties could not alter the list of available frequencies and power levels sent to an access point. We agree with Comcast that our previous actions requiring end user devices to “contain security features sufficient to protect against modification of software and firmware by any unauthorized parties” and actions to secure unlicensed national information infrastructure devices are sufficiently analogous to this proceeding as to be supported by our section 302 authority.

150. Finally, consistent with our tentative conclusion in the IoT Labeling NPRM, we find that our section 302 authority enables us to rely on third parties in carrying out the implementation details of our Program. As the Commission pointed out in the NPRM, section 302(e) of the Act authorizes the Commission to delegate equipment testing and certification to private laboratories, and the Commission already has relied in part on third parties in carrying out its equipment authorization rules that likewise implement section 302 of the Act.

151. These final rules include regulatory text that is incorporated by reference. In accordance with requirements of 1 CFR 51.5 , the Commission describes the incorporated materials here. These final rules are incorporating by reference the following ISO/IEC standards: ISO/IEC 17011:2017(E), Conformity assessment—Requirements for accreditation bodies accrediting conformity assessment bodies, Second Edition, November 2017, ISO/IEC 17025:2017(E), General requirements for the competence of testing and calibration laboratories, Third Edition, November 2017, and ISO/IEC 17065:2012(E), Conformity assessment—Requirements for bodies certifying products, processes and services, First Edition, 2012-09-15, which establish international standards requirements for accreditation bodies accrediting conformity assessment bodies; general requirements for testing and calibration laboratories; and conformity assessment requirements for certifying products, processes, and services; respectively. Copies of these standards are available for purchase from the American National Standards Institute (ANSI) through its NSSN operation ( www.nssn.org ) at Customer Service, American National Standards Institute, 25 West 43rd Street, New York, NY 10036, telephone (212) 642-4900.

152. Paperwork Reduction Act. This document contains new and modified information collection requirements subject to the Paperwork Reduction Act of 1995 (PRA), Public Law 104-13 . It Start Printed Page 61272 will be submitted to the Office of Management and Budget (OMB) for review under section 3507(d) of the PRA. OMB, the general public, and other Federal agencies will be invited to comment on the new or modified information collection requirements contained in this proceeding. In addition, we note that pursuant to the Small Business Paperwork Relief Act of 2002, Public Law 107-198 , see 44 U.S.C. 3506(c)(4) , we previously sought specific comment on how the Commission might further reduce the information collection burden for small business concerns with fewer than 25 employees.

153. In this document, we have assessed the effects of the operational framework for a voluntary IoT cybersecurity labeling program. Since the IoT Labeling Program is voluntary, small entities who do not participate in the IoT Labeling Program will not be subject to any new or modified reporting, recordkeeping, or other compliance obligations. Small entities that choose to participate in the IoT Labeling Program by seeking authority to affix the Cyber Trust Mark on their products will incur recordkeeping and reporting as well as other obligations that are necessary to test their IoT products to demonstrate compliance with the requirements we adopt in the Order. We find that, for the Cyber Trust Mark to have meaning for consumers, the requirements for an IoT product to receive the Cyber Trust Mark must be uniform for both small businesses and other entities. Thus, the Commission continues to maintain the view we expressed in the IoT Labeling NPRM, that the significance of mark integrity, and building confidence among consumers that devices and products containing the Cyber Trust Mark label can be trusted to be cyber secure, necessitates adherence by all entities participating in the IoT Labeling Program to the same rules regardless of size.

154. Regulatory Flexibility Act Analysis. A Final Regulatory Flexibility Act (FRFA) Analysis for the final rules adopted in the Order was prepared and can be found as Exhibit B of the FCC's Report and Order, FCC 24-26, adopted March 15, 2024, at this link: https://docs.fcc.gov/​public/​attachments/​FCC-24-26A1.pdf .

155. OPEN Government Data Act. The OPEN Government Data Act requires agencies to make “public data assets” available under an open license and as “open Government data assets,” i.e., in machine-readable, open format, unencumbered by use restrictions other than intellectual property rights, and based on an open standard that is maintained by a standards organization. This requirement is to be implemented “in accordance with guidance by the Director” of the OMB. The term “public data asset” means “a data asset, or part thereof, maintained by the Federal Government that has been, or may be, released to the public, including any data asset, or part thereof, subject to disclosure under the Freedom of Information Act (FOIA).” A “data asset” is “a collection of data elements or data sets that may be grouped together,” and “data” is “recorded information, regardless of form or the media on which the data is recorded.” We delegate authority, including the authority to adopt rules, to the Bureau, in consultation with the agency's Chief Data Officer and after seeking public comment to the extent it deems appropriate, to determine whether to make publicly available any data assets maintained or created by the Commission within the meaning of the OPEN Government Act pursuant to the rules adopted herein, and if so, to determine when and to what extent such information should be made publicly available. Such data assets may include assets maintained by a CLA or other third party, to the extent the Commission's control or direction over those assets may bring them within the scope of the OPEN Government Act, as interpreted in the light of guidance to be issued by OMB. [ 28 ] In doing so, the Bureau shall take into account the extent to which such data assets are subject to disclosure under the FOIA.

156. People with Disabilities. To request materials in accessible formats for people with disabilities (braille, large print, electronic files, audio format), send an email to [email protected] or call the Consumer & Governmental Affairs Bureau at 202-418-0530 (voice).

157. Accordingly, it is ordered that pursuant to the authority contained in sections 1, 2, 4(i), 4(n), 302, 303(r), 312, 333, and 503, of the Communications Act of 1934, as amended, 47 U.S.C. 151 , 152 , 154(i) , 154(n) , 302a , 303(r) , 312 , 333 , 503 ; the IoT Cybersecurity Improvement Act of 2020, 15 U.S.C. 278g-3a through 278g-3e ; the Report and Order is hereby adopted.

158. It is further ordered that the Office of the Managing Director, Performance Program Management, SHALL SEND a copy of the Report and Order in a report to be sent to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A) .

  • Communications
  • Consumer protection
  • Cybersecurity
  • Electronic products
  • Incorporation by reference, internet
  • Product testing and certification
  • Telecommunications

Federal Communications Commission

Marlene Dortch,

For the reasons discussed in the preamble, the Federal Communications Commission amends 47 CFR subchapter A as follows:

1. Under the authority of 47 U.S.C. 151 , 152 , 153 , 154(i)-(j) , 160 , 163 , 201 , 202 , 206 , 207 , 208 , 209 , 214 , 215 , 216 , 217 , 218 , 219 , 220 , 230 , 251 , 254 , 256 , 257 , 301 , 303 , 304 , 307 , 309 , 310 , 312 , 316 , 332 , 403 , 501 , 503 , 522 , 1302 , revise the heading for subchapter A to read as follows:

2. The authority citation for part 8 continues to read as follows:

Authority: 47 U.S.C. 151 , 152 , 153 , 154 , 163 , 201 , 202 , 206 , 207 , 208 , 209 , 216 , 217 , 257 , 301 , 302a , 303 , 304 , 307 , 309 , 312 , 316 , 332 , 403 , 501 , 503 , 522 , 1302 , 1753 .

3. Revise the heading for part 8 to read as set forth above.

4. Designate §§ 8.1, 8.2, 8.3, and 8.6 as subpart A.

5. Add a heading for newly designated subpart A to read as follows:

6. Add subpart B to read as follows:

Certain material is incorporated by reference into this subpart with the approval of the Director of the Federal Register in accordance with 5 U.S.C. 552(a) and 1 CFR part 51 . All approved incorporation by reference (IBR) material is available for inspection at the Federal Communications Commission (FCC or Commission) and at the National Archives and Records Administration (NARA). Contact the FCC at the address indicated in 47 CFR 0.401(a) , phone: (202) 418-0270. For information on the availability of this material at NARA, visit www.archives.gov/​federal-register/​cfr/​ibr-locations or email [email protected] . The material may be obtained from the International Electrotechnical Commission (IEC), IEC Central Office, 3, rue de Varembe, CH-1211 Geneva 20, Switzerland, Email: [email protected] , www.iec.ch .

(a) ISO/IEC 17011:2017(E), Conformity assessment—Requirements for accreditation bodies accrediting conformity assessment bodies, Second Edition, November 2017; IBR approved for § 8.217.

(b) ISO/IEC 17025:2017(E), General requirements for the competence of testing and calibration laboratories, Third Edition, November 2017; IBR approved for §§ 8.217; 8.220.

(c) ISO/IEC 17065:2012(E), Conformity assessment—Requirements for bodies certifying products, processes and services, First Edition, 2012-09-15; IBR approved for § 8.220.

Note 1 to § 8.201:

The standards listed in this section are co-published with the International Organization for Standardization (ISO), 1, ch. De la Voie-Creuse, CP 56, CH-1211, Geneva 20, Switzerland; www.iso.org ; Tel.: + 41 22 749 01 11; Fax: + 41 22 733 34 30; email: [email protected] .

Note 2 to § 8.201:

ISO publications can also be purchased from the American National Standards Institute (ANSI) through its NSSN operation ( www.nssn.org ), at Customer Service, American National Standards Institute, 25 West 43rd Street, New York, NY 10036, telephone (212) 642-4900.

In order to elevate the Nation's cybersecurity posture and provide consumers with assurances regarding their baseline cybersecurity, thereby addressing risks of harmful radiofrequency interference to and from consumer internet-connected (Internet of Things or IoT) products the Federal Communications Commission establishes a labeling program for consumer IoT products.

(a) Affiliate. For purposes of this subpart and the IoT labeling program, an affiliate is defined as a person that (directly or indirectly) owns or controls, is owned or controlled by, or is under common ownership or control with, another person. For purposes of this subpart, the term own means to own an equity interest (or the equivalent thereof) of more than 10 percent.

(b) Consumer IoT products. IoT products intended primarily for consumer use, rather than enterprise or industrial use. Consumer IoT products exclude medical devices regulated by the U.S. Food and Drug Administration (FDA) and excludes motor vehicles and motor vehicle equipment regulated by the National Highway Traffic Safety Administration (NHTSA).

(c) Cybersecurity Label Administrator (CLA). An accredited third-party entity that is recognized and authorized by the Commission to manage and administer the labeling program in accordance with the Commission's rules in this subpart.

(d) Cybersecurity Testing Laboratory (CyberLAB). Accredited third-party entities recognized and authorized by a CLA to assess consumer IoT products for compliance with requirements of the labeling program.

(e) Cyber Trust Mark. A visual indicator indicating a consumer IoT product complies with program requirements of the labeling program and the Commission's minimum cybersecurity requirements in this subpart.

(f) FCC IoT Label. A binary label displayable with a consumer IoT product complying with program requirements of the labeling program, the binary label bearing the Cyber Trust Mark, and a scannable QR code that directs consumers to a registry containing further information on the complying consumer IoT product.

(g) Intentional radiator. A device that intentionally generates and emits radiofrequency energy by radiation or induction.

(h) Internet-connected device. A device capable of connecting to the internet and exchanging data with other devices or centralized systems over the internet.

(i) IoT device. (1) An internet-connected device capable of intentionally emitting radiofrequency energy that has at least one transducer (sensor or actuator) for interacting directly with the physical world; coupled with

(2) At least one network interface ( e.g., Wi-Fi, Bluetooth) for interfacing with the digital world.

(j) IoT product. An IoT device and any additional product components ( e.g., backend, gateway, mobile app) that are necessary to use the IoT device beyond basic operational features, including data communications links to components outside this scope but excluding those external components and any external third-party components that are outside the manufacturer's control.

(k) Labeling program. A voluntary program for consumer IoT products that allows a complying consumer IoT product to display an FCC IoT Label.

(l) Lead Administrator. A CLA selected from among Cybersecurity Label Administrators (CLAs) to be responsible for carrying out additional administrative responsibilities of the labeling program.

(m) Product components. Hardware devices, plus supporting components that generally fall into three main types per NISTIR 8425: specialty networking/gateway hardware ( e.g., a hub within the system where the IoT device is used); companion application software ( e.g., a mobile app for communicating with the IoT device); and backends ( e.g., a cloud service, or multiple services, that may store and/or process data from the IoT device). Should a product component also support other IoT products through alternative features and interfaces, these alternative features and interfaces may, through risk-assessment, be considered as separate from and not part of the IoT product for purposes of authorization.

(n) Registry. Information presented to consumers about consumer IoT products that comply with the program requirements of the labeling program, the registry is publicly accessible through a link from the QR Code of the FCC IoT Label displayed with the complying consumer IoT product, and containing information about the complying consumer IoT product, manufacturer of the complying Start Printed Page 61274 consumer IoT product, and other information as required by the labeling program.

All consumer IoT products produced by sources listed in this subpart are prohibited from obtaining use of the FCC IoT Label under this subpart. This includes:

(a) All communications equipment on the Covered List, as established pursuant to 47 CFR 1.50002 ;

(b) All IoT products containing IoT devices or product components produced by entities listed in paragraph (c) or (d) of this section;

(c) IoT devices or IoT products produced by any entity, its affiliates, or subsidiaries identified on the Covered List as producing covered equipment, as established pursuant to 47 CFR 1.50002 ;

(d) IoT devices or IoT products produced by any entity, its affiliates, or subsidiaries identified on the Department of Commerce's Entity List, 15 CFR part 744 , supplement no. 4, and/or the Department of Defense's List of Chinese Military Companies, U.S. Department of Defense, Entities Identified as Chinese Military Companies Operating in the United States in Accordance with Section 1260H of the William M. (“Mac”) Thornberry National Defense Authorization Act for Fiscal Year 2021 ( Pub. L. 116-283 ), Tranche 2 (2022), https://media.defense.gov/​2022/​Oct/​05/​2003091659/​-1/​-1/​0/​1260H%20COMPANIES.PDF . and

(e) Products produced by any entity owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving Federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration's System for Award Management.

(a) Cybersecurity labeling authorization is an authorization issued by a Cybersecurity Label Administrator (CLA) and authorized under the authority of the Commission, which grants an applicant of a complying consumer IoT product to display the FCC IoT Label on the relevant packaging for the complying consumer product, based on compliance with the program requirements as determined by the CLA.

(b) Cybersecurity labeling authorization attaches to all units of the complying consumer IoT product subsequently marketed by the grantee that are identical (see § 8.206) to the sample determined to comply with the program requirements except for permissive changes or other variations authorized by the Commission.

As used in this subpart, the term identical means identical within the variation that can be expected to arise as a result of quantity production techniques.

In the case of a complying consumer IoT product that has been granted authorization to use the FCC IoT Label, the applicant to whom that grant of cybersecurity labeling authorization is issued is responsible for continued compliance with the program requirements for continued use of the FCC IoT Label.

(a) An application to certify the consumer IoT product as being compliant with the labeling program shall be submitted in writing to a Cybersecurity Labeling Administrator (CLA) in the form and format prescribed by the Commission. Each application shall be accompanied by all information required by this subpart.

(b) The applicant shall provide to the CLA in the application all information that the CLA requires to determine compliance with the program requirements of the labeling program.

(c) The applicant will provide a declaration under penalty of perjury that all of the following are true and correct:

(1) The product for which the applicant seeks to use the FCC IoT Label through cybersecurity certification meets all the requirements of the IoT labeling program.

(2) The applicant is not identified as an entity producing covered communications equipment on the Covered List, established pursuant to 47 CFR 1.50002 .

(3) The product is not comprised of “covered” equipment on the Covered List.

(4) The product is not produced by any entity, its affiliates, or subsidiaries identified on the Department of Commerce's Entity List, 15 CFR part 744 , supplement no. 4, and/or the Department of Defense's List of Chinese Military Companies, U.S. Department of Defense, Entities Identified as Chinese Military Companies Operating in the United States in Accordance with Section 1260H of the William M. (“Mac”) Thornberry National Defense Authorization Act for Fiscal Year 2021 ( Pub. L. 116-283 ), Tranche 2 (2022), https://media.defense.gov/​2022/​Oct/​05/​2003091659/​-1/​-1/​0/​1260H%20COMPANIES.PDF ; and

(5) The product is not owned or controlled by or affiliated with any person or entity that has been suspended or debarred from receiving Federal procurements or financial awards, to include all entities and individuals published as ineligible for award on the General Service Administration's System for Award Management as described in § 8.204.

(6) The applicant has taken every reasonable measure to create a securable product.

(7) The applicant will, until the support period end date disclosed in the registry, diligently identify critical vulnerabilities in our products and promptly issue software updates correcting them, unless such updates are not reasonably needed to protect against security failures.

(8) The applicant will not elsewhere disclaim or otherwise attempt to limit the substantive or procedural enforceability of this declaration or of any other representations and commitments made on the FCC IoT Label or made for purposes of acquiring or maintaining authorization to use it.

(d) The applicant shall provide a written and signed declaration to the CLA that all statements it makes in the application are true and correct to the best of its knowledge and belief.

(e) Each application, including amendments thereto, and related statements of fact and authorizations required by the Commission, shall be signed by the applicant or their authorized agent.

(f) The applicant declares the product is reasonably secure and will be updated through minimum support period for the product and the end date of the support period must be disclosed.

(g) The applicant shall declare under penalty of perjury that the consumer IoT product for which the applicant is applying for participation in the labeling program is not prohibited pursuant to § 8.204.

(h) If the identified listed sources under § 8.204 are modified after the date of the declaration required by paragraph (c) of this section but prior to grant of authorization to use the FCC IoT Label, then the applicant shall provide a new declaration as required by paragraph (c).

(i) The applicant shall designate an agent located in the United States for the purpose of accepting service of process on behalf of the applicant.

(1) The applicant shall provide a written attestation: Start Printed Page 61275

(i) Signed by both the applicant and its designated agent for service of process, if different from the applicant;

(ii) Acknowledging the applicant's consent and the designated agent's obligation to accept service of process in the United States for matters related to the applicable product, and at the physical U.S. address and email address of its designated agent; and

(iii) Acknowledging the applicant's acceptance of its obligation to maintain an agent for service of process in the United States for no less than one year after either the grantee has permanently terminated all marketing and importation of the applicable equipment within the U.S., or the conclusion of any Commission-related administrative or judicial proceeding involving the product, whichever is later.

(2) An applicant located in the United States may designate itself as the agent for service of process.

(j) Technical test data submitted to the CLA shall be signed by the person who performed or supervised the tests. The person signing the test data shall attest to the accuracy of such data. The CLA may require the person signing the test data to submit a statement showing that they are qualified to make or supervise the required measurements.

(k) Signed, as used in this section, means an original handwritten signature or any symbol executed or adopted by the applicant or CLA with the intent that such symbol be a signature, including symbols formed by computer-generated electronic impulses.

(a) A CLA will grant cybersecurity labeling authorization if it finds from an examination of the application and supporting data, or other matter which it may officially notice, that the consumer IoT product complies with the program requirements.

(b) Grants will be made in writing showing the effective date of the grant.

(c) Cybersecurity certification shall not attach to any product, nor shall any use of the Cyber Trust Mark be deemed effective, until the application has been granted.

(d) Grants will be effective from the date of authorization.

(e) The grant shall identify the CLA granting the authorization and the Commission as the issuing authority.

(f) In cases of a dispute, the Commission will be the final arbiter.

(a) An application that is not in accordance with the provisions of this subpart may be dismissed.

(b) Any application, upon written request signed by the applicant or their agent, may be dismissed prior to a determination granting or denying the authorization requested.

(c) If an applicant is requested to submit additional documents or information and fails to submit the requested material within the specified time period, the application may be dismissed.

If the CLA is unable to make the findings specified in § 8.209(a), it will deny the application. Notification of the denial to the applicant will include a statement of the reasons for the denial.

(a) Seeking review from a CLA. Any party aggrieved by an action taken by a CLA must first seek review from the CLA. The CLA should respond to appeals of their decisions in a timely manner and within 10 business days of receipt of a request for review.

(b) Seeking review from the Commission. A party aggrieved by an action taken by a CLA may, after seeking review by the CLA, seek review from the Commission.

(c) Filing deadlines. (1) An aggrieved party seeking review of a CLA decision by the CLA shall submit such a request within sixty (60) days from the date the CLA issues a decision. Such request shall be deemed submitted when received by the CLA.

(2) An aggrieved party seeking review of a CLA decision by the Commission shall file such a request within sixty (60) days from the date the CLA issues a decision on the party's request for review. Parties must adhere to the time periods for filing oppositions and replies set forth in 47 CFR 1.45 .

(d) Review by the Public Safety and Homeland Security Bureau or the Commission. (1) Requests for review of CLA decisions that are submitted to the Federal Communications Commission shall be considered and acted upon by the Public Safety and Homeland Security Bureau; provided, however, that requests for review that raise novel questions of fact, law or policy shall be considered by the full Commission.

(2) An aggrieved party may seek review of a decision issued under delegated authority by the Public Safety and Homeland Security Bureau pursuant to the rules set forth in 47 CFR part 1 .

(e) Standard of review. (1) The Public Safety and Homeland Security Bureau shall conduct de novo review of request for review of decisions issued by the CLA.

(2) The Federal Communications Commission shall conduct de novo review of requests for review of decisions by the CLA that involve novel questions of fact, law, or policy; provided, however, that the Commission shall not conduct de novo review of decisions issued by the Public Safety and Homeland Security Bureau under delegated authority.

(f) Time periods for Commission review of CLA decisions. (1) The Public Safety and Homeland Security Bureau shall, within forty-five (45) days, take action in response to a request for review of a CLA decision that is properly before it. The Public Safety and Homeland Security Bureau may extend the time period for taking action on a request for review of a CLA decision for a period of up to ninety days. The Commission may also at any time, extend the time period for taking action of a request for review of a CLA decision pending before the Public Safety and Homeland Security Bureau.

(2) The Commission shall issue a written decision in response to a request for review of a CLA decision that involves novel questions of fact, law, or policy within forty-five (45) days. The Commission may extend the time period for taking action on the request for review of a CLA decision. The Public Safety and Homeland Security Bureau also may extend action on a request for review of a CLA decision for a period of up to ninety days.

(g) No authorization pending CLA review. While a party seeks review of a CLA decision, they are not authorized to use the FCC IoT Label until the Commission issues a final decision authorizing their use of the FCC IoT Label.

(a) A grant of authorization to use the FCC IoT Label remains effective until set aside, revoked or withdrawn, rescinded, surrendered, or a termination date is otherwise established by the Commission.

(b) No person shall, in any advertising matter, brochure, etc., use or make reference to the FCC IoT Label or the Cyber Trust Mark in a deceptive or misleading manner.

When a complaint is filed directly with the Commission or submitted to the Commission by the Lead Administrator or other party concerning a consumer IoT product being non-compliant with the labeling program, and the Commission determines that the Start Printed Page 61276 complaint is justified, the Commission may require the grantee to investigate such complaint and report the results of such investigation to the Commission within 20 days. The report shall also indicate what action if any has been taken or is proposed to be taken by the grantee to correct the defect, both in terms of future production and with reference to articles in the possession of users, sellers, and distributors.

(a) For complying consumer IoT products granted authorization to use the FCC IoT Label, the grantee shall maintain the records listed as follows:

(1) A record of the original design and specifications and all changes that have been made to the complying consumer IoT product that may affect compliance with the standards and testing procedures of this subpart.

(2) A record of the procedures used for production inspection and testing to ensure conformance with the standards and testing procedures of this subpart.

(3) A record of the test results that demonstrate compliance with the appropriate regulations in this chapter.

(b) Records shall be retained for a two-year period after the marketing of the associated product has been permanently discontinued, or until the conclusion of an investigation or a proceeding if the grantee is officially notified that an investigation or any other administrative proceeding involving its product has been instituted.

(a) Grant of authorization to use the FCC IoT Label is automatically terminated by notice of the Bureau following submission of a report as specified in § 8.214 has not been adequately corrected:

(1) For false statements or representations made either in the application or in materials or response submitted in connection therewith or in records required to be kept by § 8.215.

(2) If upon subsequent inspection or operation it is determined that the consumer IoT product does not conform to the pertinent technical requirements in this subpart or to the representations made in the original application.

(3) Because of conditions coming to the attention of the Commission which would warrant it in refusing to grant authorization to use the FCC IoT Label.

(4) Because the grantee or affiliate has been listed as described in § 8.204.

(b) [Reserved]

(a) A CyberLAB providing testing of products seeking a grant of authorization to use the FCC IoT Label shall be accredited by a recognized accreditation body, which must attest that the CyberLAB has demonstrated:

(1) Technical expertise in cybersecurity testing and conformity assessment of IoT devices and products.

(2) Compliance with accreditation requirements based on ISO/IEC 17025 (incorporated by reference, see § 8.201).

(3) Knowledge of FCC rules and procedures associated with products compliance testing and cybersecurity certification.

(4) Necessary equipment, facilities, and personnel to conduct cybersecurity testing and conformity assessment of IoT devices and products.

(5) Documented procedures for conformity assessment.

(6) Implementation of controls to eliminate potential conflicts of interests, particularly with regard to commercially sensitive information.

(7) That the CyberLAB is not an organization, its affiliates, or subsidiaries identified by the listed sources of prohibition under § 8.204.

(8) That it has certified the truth and accuracy of all information it has submitted to support its accreditation.

(b) Once accredited or recognized the CyberLAB will be periodically audited and reviewed to ensure they continue to comply with the requirements of the ISO/IEC 17025 standard.

(c) The Lead Administrator will verify that the CyberLAB is not listed in any of the lists in § 8.204.

(d) The Lead Administrator will maintain a list of accredited CyberLABs that it has recognized, and make publicly available the list of accredited CyberLAB. Inclusion of a CyberLAB on the accredited list does not constitute Commission endorsement of that facility. Recognition afforded to a CyberLAB under the labeling program will be automatically terminated for entities that are subsequently placed on the Covered List, listed sources of prohibition under § 8.204, or of it, its affiliate, or subsidiary is owned or controlled by a foreign adversary country defined by the Department of Commerce in 15 CFR 7.4 .

(e) In order to be recognized and included on the list in paragraph (d) of this section, the accrediting organization must submit the information in paragraphs (e)(1) through (9) of this section to the Lead Administrator:

(1) Laboratory name, location of test site(s), mailing address and contact information;

(2) Name of accrediting organization;

(3) Scope of laboratory accreditation;

(4) Date of expiration of accreditation;

(5) Designation number;

(6) FCC Registration Number (FRN);

(7) A statement as to whether or not the laboratory performs testing on a contract basis;

(8) For laboratories outside the United States, details of the arrangement under which the accreditation of the laboratory is recognized; and

(9) Other information as requested by the Commission.

(f) A laboratory that has been accredited with a scope covering the measurements required for the types of IoT products that it will test shall be deemed competent to test and submit test data for IoT products subject to cybersecurity certification. Such a laboratory shall be accredited by a Public Safety and Homeland Security Bureau-recognized accreditation organization based on ISO/IEC 17025. The organization accrediting the laboratory must be recognized by the Public Safety and Homeland Security Bureau to perform such accreditation based on ISO/IEC 17011 (incorporated by reference, see § 8.201). The frequency for reassessment of the test facility and the information that is required to be filed or retained by the testing party shall comply with the requirements established by the accrediting organization, but shall occur on an interval not to exceed two years.

(a) A party wishing to become a laboratory accreditation body recognized by the Public Safety and Homeland Security Bureau (PSHSB or Bureau) must submit a written request to the Chief of PSHSB requesting such recognition. PSHSB will make a determination based on the information provided in support of the request for recognition.

(b) Applicants shall provide the information in paragraphs (b)(1) through (4) of this section as evidence of their credentials and qualifications to perform accreditation of laboratories that test equipment to Commission requirements, consistent with the requirements of § 8.217(e). PSHSB may request additional information, or showings, as needed, to determine the applicant's credentials and qualifications.

(1) Successful completion of an ISO/IEC 17011 peer review, such as being a signatory to an accreditation agreement that is acceptable to the Commission.

(2) Experience with the accreditation of conformity assessment testing laboratories to ISO/IEC 17025. Start Printed Page 61277

(3) Accreditation personnel/assessors with specific technical experience on the Commission cybersecurity certification rules and requirements.

(4) Procedures and policies developed for the accreditation of testing laboratories for FCC cybersecurity certification programs.

(a) An accredited third-party entity wishing to become a Cybersecurity Label Administrator (CLA) must file a written application with the Commission. The Commission may approve the written application for the accredited third-party entity to be recognized and authorized by the Commission as a CLA to manage and administer the labeling program by meeting the requirements of paragraph (b) of this section. An accredited third-party entity is recognized and authorized by the Commission to manage and administer the labeling program in accordance with the Commission's rules in this subpart.

(b) In the United States, the Commission, in accordance with its procedures, allows qualified accrediting bodies to accredit CLAs based on ISO/IEC 17065 and other qualification criteria. CLAs shall comply with the requirements in § 8.220.

(a) In general. CLAs designated by the Commission, or designated by another authority recognized by the Commission, shall comply with the requirements of this section. Each entity seeking authority to act as a CLA must file an application with the Commission for consideration by PSHSB, which includes a description of its organization structure, an explanation of how it will avoid personal and organizational conflict when processing applications, a description of its processes for evaluating applications seeking authority to use the FCC IoT Label, and a demonstration of expertise that will be necessary to effectively serve as a CLA including, but not limited to, the criteria in paragraph (c) of this section.

(b) Methodology for reviewing applications. (1) A CLA's methodology for reviewing applications shall be based on type testing as identified in ISO/IEC 17065 (incorporated by reference, see § 8.201).

(2) A CLA's grant of authorization to use the FCC IoT Label shall be based on the application with all the information specified in this part. The CLA shall review the application to determine compliance with the Commission's requirements in this subpart and shall issue a grant of product cybersecurity certification in accordance with § 8.208.

(c) Criteria for designation. (1) To be designated as a CLA under this section, an entity shall demonstrate cybersecurity expertise and capabilities in addition to industry knowledge of IoT and IoT labeling requirements.

(2) The entity shall demonstrate expert knowledge of National Institute of Standards and Technology's (NIST) cybersecurity guidance, including but not limited to NIST's recommended criteria and labeling program approaches for cybersecurity labeling of consumer IoT products.

(3) The entity shall demonstrate expert knowledge of FCC rules and procedures associated with product compliance testing and certification.

(4) The entity shall demonstrate knowledge of Federal law and guidance governing the security and privacy of agency information systems.

(5) The entity shall demonstrate an ability to securely handle large volumes of information and demonstrate internal security practices.

(6) To expedite initial deployment of the FCC labeling program, the Commission will accept and conditionally approve applications from entities seeking to be designated as a CLA provided they commit to obtain accreditation pursuant to all the requirements associated with ISO/IEC 17065 with the appropriate scope within six (6) months of the effective date by the adopted standards and testing procedures and otherwise meet the FCC's IoT Labeling Program requirements. The entity must also demonstrate implementation of controls to eliminate actual or potential conflicts of interests (including both personal and organizational), particularly with regard to commercially sensitive information. The Bureau will finalize the entity's application upon receipt and demonstration of ISO/IEC 17065 accreditation with the appropriate scope.

(7) The entity is not owned or controlled by or affiliated with any entity identified on the Commission's Covered List, listed sources of prohibition under § 8.204, or of it, its affiliate, or subsidiary is owned or controlled by a foreign adversary country defined by the Department of Commerce in 15 CFR 7.4 .

(8) The entity must demonstrate it has implemented controls to eliminate actual or potential conflicts of interests (including both personal and organizational), particularly with regard to commercially sensitive information, to include but not limited to, remaining impartial and unbiased and prevent them from giving preferential treatment to certain applications ( e.g., application line jumping) and from implementing heightened scrutiny of applications from entities not members or otherwise aligned with the CLA.

(d) External resources. (1) In accordance with the provisions of ISO/IEC 17065 the evaluation of a product, or a portion thereof, may be performed by bodies that meet the applicable requirements of ISO/IEC 17025, in accordance with the applicable provisions of ISO/IEC 17065 for external resources (outsourcing). Evaluation is the selection of applicable requirements and the determination that those requirements are met. Evaluation may be performed using internal CLA resources or external (outsourced) resources.

(2) A CLA shall not outsource review or decision activities.

(3) When external resources are used to provide the evaluation function, including the testing of products subject to labeling, the CLA shall be responsible for the evaluation and shall maintain appropriate oversight of the external resources used to ensure reliability of the evaluation. Such oversight shall include periodic audits of products that have been tested and other activities as required in ISO/IEC 17065 when a CLA uses external resources for evaluation.

(e) Commission approves a CLA. (1) The Commission will approve as a CLA:

(i) Any entity in the United States that meets the requirements of this section.

(ii) The Commission will not approve as a CLA any organization, its affiliates, or subsidiaries listed in the listed sources of prohibition under § 8.204.

(2) The Commission will withdraw its approval of a CLA if the CLA's designation or accreditation is withdrawn, if the Commission determines there is just cause for withdrawing the approval, or upon request of the CLA. The Commission will limit the scope of products that can be certified by a CLA if its accreditor limits the scope of its accreditation or if the Commission determines there is good cause to do so. The Commission will notify a CLA in writing of its intention to withdraw or limit the scope of the CLA's approval and provide at least 60 days for the CLA to respond.

(3) The Commission will notify a CLA in writing when it has concerns or evidence that the CLA is not carrying out its responsibilities under the labeling program in accordance with the Commission's rules in this subpart and policies and request that it explain and correct any apparent deficiencies. Start Printed Page 61278

(4) The Public Safety and Homeland Security Bureau shall provide notice to the CLA that the Bureau proposes to terminate the CLA's authority and provide the CLA a reasonable opportunity to respond (not more than 20 days) before reaching a decision on possible termination.

(5) If the Commission withdraws its recognition of a CLA, all grants issued by that CLA will remain valid unless specifically set aside or revoked by the Commission.

(6) A list of recognized CLAs will be published by the Commission.

(f) Scope of responsibility. (1) A CLA shall receive and evaluate applications and supporting data requesting authority to use the FCC IoT Label on the product subject to the application.

(2) A CLA shall grant authorization to use the FCC IoT Label with a complying consumer IoT product in accordance with the Commission's rules in this subpart and policies.

(3) A CLA shall accept test data from any Lead Administrator-recognized accredited CyberLAB, subject to the requirements in ISO/IEC 17065 and shall not unnecessarily repeat tests.

(4) A CLA may establish and assess fees for processing applications and other Commission-required tasks.

(5) A CLA may only act on applications that it has received or which it has issued a certification authorizing use of the FCC IoT Label.

(6) A CLA shall dismiss an application that is not in accordance with the provisions of this subpart or when the applicant requests dismissal, and may dismiss an application if the applicant does not submit additional information or test samples requested by the CLA.

(7) A CLA shall ensure that manufacturers make all required information accessible to the IoT registry.

(8) A CLA shall participate in a consumer education campaign in coordination with the Lead Administrator.

(9) A CLA shall receive complaints alleging a product bearing the FCC IoT Label does not support the cybersecurity criteria conveyed by the Cyber Trust Mark and refer these complaints to the Lead Administrator which will notify the Public Safety and Homeland Security Bureau.

(10) A CLA may not:

(i) Make policy, interpret unclear provisions of the statute or rules, or interpret the intent of Congress;

(ii) Grant a waiver of the rules in this subpart; or

(iii) Take enforcement actions.

(11) All CLA actions are subject to Commission review.

(g) Post-market surveillance requirements. (1) In accordance with ISO/IEC 17065, a CLA shall perform appropriate post-market surveillance activities. These activities shall be based on type testing a certain number of samples of the total number of product types for which the CLA has certified use of the Label.

(2) PSHSB may request that a grantee of authority to use the FCC IoT Label submit a product sample directly to the CLA that evaluated the grantee's application as part of the post market surveillance. Any product samples requested by the Commission and tested by the CLA will be counted toward a minimum number of samples that the CLA must test to meet its post market surveillance requirements.

(3) A CLA may also request a grantee submit samples of products that the CLA has certified to use the FCC IoT Label directly to the CLA.

(4) If during post market surveillance of a complying consumer IoT product, a CLA determines that the product fails to comply with the technical regulations (or other FCC requirements) for that product, the CLA shall immediately notify the grantee and the Commission in writing of its findings. The grantee shall provide a report to the CLA describing the actions taken to correct the situation, as provided in § 8.216, and the CLA shall provide a report of these actions to the Commission within 30 days.

(5) CLAs shall submit periodic reports to the Commission of their post-market surveillance activities and findings in a format and by a date specified by the Commission.

(a) Establishing a Lead Administrator. If more than one qualified entity is selected by the Commission to be a CLA, the Commission will select a Lead Administrator. The Lead Administrator shall:

(1) Interface with the Commission on behalf of the CLAs, including but not limited to submitting to the Bureau all complaints alleging a product bearing the FCC IoT Label does not meet the requirements of the Commission's labeling program;

(2) Coordinate with CLAs and moderate stakeholder meetings;

(3) Accept, review, and approve or deny applications from labs seeking recognition as a lab authorized to perform the conformity testing necessary to support an application for authority to affix the FCC IoT Label, and maintain a publicly available list of Lead Administrator-recognized labs and a list of labs that have lost their recognition;

(4) Within 90 days of election as Lead Administrator, the Lead Administrator will, in collaboration with the CLAs and stakeholders ( e.g., cyber experts from industry, government, and academia):

(i) Submit to the Bureau recommendations identifying and/or developing the technical standards and testing procedures for the Commission to consider with regard to at least one class of IoT products eligible for the IoT labeling program. The Bureau will evaluate the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules in this subpart;

(ii) Submit to the Bureau a recommendation on how often a given class of IoT products must renew their request for authority to bear the FCC IoT Label, which may be dependent on the type of product, and that such a recommendation be submitted in connection with the relevant standards recommendations for an IoT product or class of IoT products. The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules in this subpart;

(iii) Submit to the Bureau a recommendation on procedures for post market surveillance by the CLAs. The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules in this subpart;

(iv) Make recommendations to the Bureau with regard to updates to the registry including whether the registry should be in additional languages, and if so, to recommend specific languages for inclusion; and

(v) Submit to the Bureau recommendations on the design of the FCC IoT Label, including but not limited to labeling design and placement ( e.g., size and white spaces, product packaging) and whether to include the product support end date on labels for certain products or category of products. The Bureau will evaluate the recommendations, and if the Bureau approves of the recommendations, subject to any required public notice and comment, incorporate them by reference into the Commission's rules in this subpart;

(5) Within 45 days of publication of updates or changes to NIST guidelines, or adoption by NIST of new guidelines, Start Printed Page 61279 recommend in collaboration with CLAs and other stakeholders any appropriate modifications to the labeling program standards and testing procedures to stay aligned with the NIST guidelines;

(6) Submit to the Commission reports on CLAs' post-market surveillance activities and findings in the format and by the date specified by Public Safety and Homeland Security Bureau;

(7) Develop in collaboration with stakeholders a consumer education campaign, submit the plan to the Public Safety and Homeland Security Bureau, and participate in consumer education;

(8) Receive complaints about the labeling program, including but not limited to consumer complaints about the registry and coordinate with manufacturers to resolve any technical problems associated with consumers accessing the information in the registry;

(9) Facilitate coordination between CLAs; and

(10) Submit to the Commission any other reports upon request of the Commission or as required by Commission rules in this subpart.

(b) Criteria for designation. In addition to completing the CLA application information, entities seeking to be the Lead Administrator will submit a description of how they will execute the duties of the Lead Administrator, including:

(1) Their previous experience in IoT cybersecurity;

(2) What role, if any, they have played in IoT labeling;

(3) Their capacity to execute the Lead Administrator duties;

(4) How they would engage and collaborate with stakeholders to identify or develop the Bureau recommendations;

(5) A proposed consumer education campaign; and

(6) Additional information the applicant believes demonstrates why they should be the Lead Administrator.

(a) A grantee of authority to use the FCC IoT Label shall provide information about the complying consumer IoT product to the public. Information supplied by grantees shall be made available in a dynamic, decentralized, publicly accessible registry through a common Application Programming Interface (API) that is secure by design.

(b) A grantee of authority to use the FCC IoT Label shall publish the following information through the common API in the Registry:

(1) Product Name;

(2) Manufacturer name;

(3) Date the product received authorization ( i.e., cybersecurity certification) to affix the label and current status of the authorization (if applicable);

(4) Name and contact information of the CLA that authorized use of the FCC IoT Label;

(5) Name of the lab that conducted the conformity testing;

(6) Instructions on how to change the default password (specifically state if the default password cannot be changed);

(7) Information (or link) for additional information on how to configure the device securely;

(8) Information as to whether software updates and patches are automatic and how to access security updates/patches if they are not automatic;

(9) The date until which the entity promises to diligently identify critical vulnerabilities in the product and promptly issue software updates correcting them, unless such an update is not reasonably needed to protect against cybersecurity failures ( i.e., the minimum support period); alternatively, a statement that the device is unsupported and that the purchaser should not rely on the manufacturer to release security updates;

(10) Disclosure of whether the manufacturer maintains a Hardware Bill of Materials (HBOM) and/or a Software Bill of Materials (SBOM); and

(11) Additional data elements that the Bureau deems necessary.

1.  Motor Vehicle “means a vehicle driven or drawn by mechanical power and manufactured primarily for use on public streets, roads, and highways, but does not include a vehicle operated only on a rail line.” 49 U.S.C. 30102(7) .

2.  For purposes of the IoT Labeling Program, the NISTIR 8425 scoping definition of “components” falls into three main types: Specialty networking/gateway hardware ( e.g., a hub within the system where the IoT device is used); Companion application software ( e.g., a mobile app for communicating with the IoT device); and Backends ( e.g., a cloud service, or multiple services, that may store and/or process data from the IoT device). See NISTIR 8425 at 2. Our use of this scoping definition of “components” is intended only to apply to the IoT Labeling program. We note that Commission rules use the term “components” in a variety or contexts and different rule provisions, and we are not intending to affect the use of that term in those other contexts.

2.  To further clarify, nothing in this item prohibits manufacturers from allowing product owners from installing the software of their choice, from disabling security features, or from replacing or modifying components of a product, including the firmware and software. An IoT manufacturer cannot be held responsible for the owner's decision to make such changes, just as a traditional product manufacturer cannot be responsible for the actions of a consumer who modifies the core mechanisms of a product and thereby risks rendering it unsafe. However, we reiterate that in order to be authorized to use the FCC IoT Label, manufacturers must meet the requirements of the program.

3.  There are many types IoT devices and products, which may be divided into various categories or classes based on their purpose, application, and functionality. These classes of IoT devices and products include smart home ( e.g., smart thermostats, smart lights, smart locks, smart cameras), wearables ( e.g., fitness trackers, smart watches), and Healthcare ( e.g., remote patient monitoring devices, smart medical equipment). It is worth noting that not all IoT devices or products are created equal, in terms of features, security and the level of risk they present. Additionally, from security standpoint, an IoT product that is appropriate for consumer or home use may not be suitable for industrial or enterprise environment. These differences suggest the need for different security standards that distinguish between low-risk, medium-risk and high-risk applications. Our approach to identifying the specific cybersecurity standards to apply enables us to appropriately account for that in the case of particular wireless consumer products (or categories of such products) in our initial implementation of the IoT Labeling Program.

4.  The organization(s) accrediting the prospective Label Administrators and testing labs must meet the requirements and conditions in ISO/IEC 17011. See 47 CFR 8.910(b)(1) ISO/IEC 17011:2004(E), “Conformity assessment—General requirements for accreditation bodies accrediting conformity assessment bodies,” First Edition, 2004-09-01, IBR approved for §§ 8.217(e) and 8.218(b).

5.  There appeared to be some confusion in the record with the Commission's use of the term Cybersecurity Labeling Authorization Bodies. Specifically, the ANSI National Accreditation Board (ANAB) recommended the Commission reconsider the use of the term “CyberLAB” as the “implication that such organizations are laboratories could create market confusion.” ANAB Reply at 2. We disagree that the term CyberLAB may be confusing because these organizations are, in fact, laboratories/testing bodies that will be testing products to determine compliance with applicable standards. The CyberLABs, however, are not “certification bodies.” Rather, the entity that will be authorizing an applicant to use the Cyber Trust Mark on their product is the CLA, as described below. To ensure there is no confusion, the Commission has changed the term from Cybersecurity Labeling “Authorization Bodies” as these terms are reserved for accreditation bodies, to Cybersecurity Testing Laboratories, reflecting that the function of these labs is for testing and generating reports, and not certifying or issuing a label. We continue to use the short-form term “CyberLAB” to refer to these testing labs.

6.  If the Lead Administrator, in addition to its administrative duties, intends to offer lab testing service (CLA-run lab), it must submit an application with PSHSB seeking FCC recognition as a lab authorized to perform conformity testing to support an application for authority to affix the FCC IoT Label. The Lead Administrator is not authorized to recognize its own cybersecurity testing lab. If approved by PSHSB, the Lead Administrator will add the name of its lab to the list of recognized labs.

7.  This process does not foreclose the ability of consumers to file an informal complaint in accordance with the Commission's rules. See 47 CFR 1.716 through 1.719 . In the event an informal complaint is filed with the Commission, the complaint will be forwarded to the Lead Administrator for investigation and/or referral to the issuing CLA.

8.  As below, we emphasize the importance of leveraging existing expertise in this space, and as such adopt as a criterion for consideration in selecting the lead administrator the ability to convene and develop consensus among stakeholders.

9.  This approach necessitates a mechanism for the Commission to recognize administrators, and we accordingly adopt a rule doing so. See 47 CFR 8.219 . We model our approach on analogous elements of our equipment authorization rules, with which the Commission and industry have substantial experience, and which have proven workable in practice. See 47 CFR 2.949 . We delegate to PSHSB and OMD authority to take any necessary steps, including adoption of additional procedures and any applicable fees (pursuant to any required public notice and comment), as necessary to ensure compliance with the Communications Act with respect to any rules adopted here that contemplate the filing of applications directly with the Commission. 47 U.S.C. 158(c) .

10.  The scope of CLA's ISO/IEC 17065 certification includes certifying IoT products and devices for compliance with FCC cybersecurity standards.

11.  Consistent with standard practice for accreditation, the organization accrediting the CLAs must be recognized by the Bureau to perform such accreditation based on International Standard ISO/IEC 17011.

12.  Because of the public safety importance of a CLA having the requisite qualifications and adhering to our rules when evaluating requests to use the FCC IoT Label, this process should proceed appropriately expeditiously to minimize any periods of time where a CLA continues to operate in that capacity once concerns have come to PSHSB's attention. In particular, PSHSB shall provide notice to the CLA that the Bureau proposes to terminate the CLA's authority and provide the CLA a reasonable opportunity to respond (not more than 20 days) before reaching a decision on possible termination. PSHSB may suspend the CLA's ability to issues labeling authorizations during the pendency of such consideration if appropriate.

13.  We also agree with CTA in highlighting the importance of PSHSB's involvement in matters where the Lead Administrator and CLAs may share vested interests.

14.  We recognize the potential raised by ioXt Alliance for anticompetitive preferences in recommendations made to the Bureau if a CLA is chosen as Lead Administrator.

15.  To enable the Lead Administrator to compile a reliable and verifiable list, we require accredited CyberLABs to submit certain information to the Lead Administrator: (1) Laboratory name, location of test site(s), mailing address and contact information; (2) Name of accrediting organization; (3) Scope of laboratory accreditation; (4) Date of expiration of accreditation; (5) Designation number; (6) FCC Registration Number (FRN); (7) A statement as to whether or not the laboratory performs testing on a contract basis; (8) For laboratories outside the United States, details of the arrangement under which the accreditation of the laboratory is recognized; and (9) Other information as requested by the Commission.

16.  This approach necessitates a mechanism for the Commission to recognize lab accreditation bodies, and we accordingly adopt a rule doing so. See 47 CFR 8.218 . We model our approach on analogous elements of our equipment authorization rules, with which the Commission and industry have substantial experience, and which have proven workable in practice. See 47 CFR 2.949 . We delegate to PSHSB and OMD authority to take any necessary steps, including adoption of additional procedures and any applicable fees (pursuant to any required public notice and comment), as necessary to ensure compliance with the Communications Act with respect to any rules adopted here that contemplate the filing of applications directly with the Commission. 47 U.S.C 158(c) .

17.  Because of the public safety importance of a CyberLAB having the requisite qualifications and adhering to our rules when evaluating requests to use the FCC IoT Label, this process should proceed appropriately expeditiously to minimize any periods of time where a CyberLAB continues to operate in that capacity once concerns have come to PSHSB's attention. In particular, PSHSB shall provide notice to the CyberLAB that the Bureau proposes to terminate the CyberLAB's authority and provide the CyberLAB a reasonable opportunity to respond (not more than 20 days) before reaching a decision on possible termination. PSHSB may suspend the CLA's ability conduct product testing during the pendency of such consideration if appropriate.

18.  In addition to the discussion in the text, we adopt certain rules to support the administration and integrity of the IoT Labeling Program, including governing the designation of agents for service of process and governing required signatures. See 47 CFR 8.208(i) , (k) . We model our approach on analogous elements of our equipment authorization rules, with which the Commission and industry have substantial experience, and which have proven workable in practice. See 47 CFR 2.911(d)(7) , (f) .

19.  We recognize that many of the duties of the Lead Administrator benefit all the CLAs and the program as a whole, and we do not suggest that the costs associated with the duties of the Lead Administrator as described in the Order to be an exhaustive list of the shared costs we expect to be shared among CLAs as a whole.

20.  The issue of where the FCC IoT Label would be placed was raised in the record. We agree that flexibility in placement is important in instances where the consumer might not see the product's packaging, such as in larger appliances, before purchasing the product. We recognize that some types of products might be customarily displayed in ways that make a one-size-fits-all approach inappropriate. As such, we agree with the ioXt Alliance's suggestion that we consider how the label may be placed in ways that will be helpful to a consumer, such as through an in-store display, advertisement on a screen, or website.

21.  In addition to the declaration, the SBOM and HBOM will be made available upon request by the Commission, CyberLAB, and/or CLA.

22.  To enable a meaningful audit process it will be important to be able to review certain key records, which we consequently will require grantees to retain records regarding the original design and specifications and all changes that have been made to the relevant consumer IoT product that may affect compliance with the IoT Labeling Program requirements; a record of the procedures used for production inspection and testing; and a record of the test results that demonstrate compliance. See 47 CFR 8.215 . We model our approach on analogous elements of our equipment authorization rules, with which the Commission and industry have substantial experience, and which have proven workable in practice. See 47 CFR 2.938(a) , (f) .

23.  If necessary to accommodate the volume of auditing, a CLA may outsource some post-market surveillance testing to a recognized CyberLAB, but retains responsibility for the final review.

24.  In addition, to further help safeguard the integrity of the IoT Labeling Program and the FCC IoT Label, we codify a rule that prohibits any person from, in any advertising matter, brochure, etc., using or making reference to the FCC IoT Label or the Cyber Trust Mark in a deceptive or misleading manner. See 47 CFR 8.213(b) . We model our approach on analogous elements of our equipment authorization rules, with which the Commission and industry have substantial experience, and which have proven workable in practice. See 47 CFR 2.927(c) .

25.  $60 million = (15,000,000*$16*(15/60)) is the estimated value for 15 minutes of time savings nationwide.

26.  The Consumer Reports proposed registry architecture includes a dataset that can store images and PDFs as well as allows for device manufacturers, retailers, security researchers and administrators to access the platform. The registry, as adopted, does not include these features and therefore would not incur the costs to develop and maintain them.

27.  Because we conclude that section 302 of the Act authorizes our actions in the Order, we defer consideration of other sources of authority that the Communications Act may grant the Commission over this area.

28.  OMB has not yet issued final guidance.

[ FR Doc. 2024-14148 Filed 7-29-24; 8:45 am]

BILLING CODE 6712-01-P

  • Executive Orders

Reader Aids

Information.

  • About This Site
  • Accessibility
  • No Fear Act
  • Continuity Information
  • Share full article

Advertisement

The Morning

Kamala harris takes control.

President Biden has dropped out of the race. We answer four questions about what happens next.

Vice President Kamala Harris reaches out to shake the hand of President Biden.

By David Leonhardt

With President Biden having dropped out of the race, I’m devoting today’s newsletter to four big questions about what happens next. My colleagues and I will also give you the latest news about the campaign.

Four questions

1. Is the Democratic nomination race already over?

It may be. Vice President Kamala Harris appears to be in a commanding position .

Some top Democrats, including Nancy Pelosi, favor a competition to choose a new nominee. And an open process would have some big advantages. It would test whether Harris was a stronger politician than she had been during her failed 2020 campaign. If she won the competition, she would emerge from it looking like a winner who was more than Biden’s No. 2.

But a competition obviously requires more than one competitor, and Harris was the only top-tier Democrat to declare herself a presidential candidate yesterday. Many other Democrats endorsed her in the hours after Biden’s withdrawal.

Her list of backers include both progressives and moderates in Congress, as well as Biden, members of the Congressional Black Caucus and two governors who had been considered potential presidential candidates themselves: Gavin Newsom of California and Josh Shapiro of Pennsylvania. The party’s nominating delegates from three states — North Carolina, South Carolina and Tennessee — unanimously voted yesterday to endorse Harris.

Overall, the hours after Biden’s exit went about as well as Harris could have hoped.

2. What will the Harris-Trump polls say now that they’re not hypothetical?

We are having trouble retrieving the article content.

Please enable JavaScript in your browser settings.

Thank you for your patience while we verify access. If you are in Reader mode please exit and  log into  your Times account, or  subscribe  for all of The Times.

Thank you for your patience while we verify access.

Already a subscriber?  Log in .

Want all of The Times?  Subscribe .

IMAGES

  1. How To Write An Advantages Or Disadvantages Essay

    advantages and disadvantages of going to university essay

  2. IELTS Advantages and Disadvantages Essays

    advantages and disadvantages of going to university essay

  3. Advantages and Disadvantages Essay

    advantages and disadvantages of going to university essay

  4. Типы эссе IELTS ‹ Инглекс

    advantages and disadvantages of going to university essay

  5. How to write and advantages and disadvantages essay

    advantages and disadvantages of going to university essay

  6. How To Write An Advantages Or Disadvantages Essay

    advantages and disadvantages of going to university essay

VIDEO

  1. Social media (Advantages /Disadvantages) @Such530

  2. What Is Tourism Essay In English

  3. Ready to going university #youtubeshorts #unfreezmyaccout #love #unfreezemyacount #viral #crew

  4. ESSAY on uses and abuses of SOCIAL MEDIA

  5. Going university for attendance 😂😭#youtubeshort #funny #shorts #viral

  6. Advantages And Disadvantages of Internet Essay

COMMENTS

  1. Is College Worth It? Pros and Cons of Going to College

    Rather than candy, Nick (he/him) went searching for people's vacuum cleaners when trick or treating. He's since found other ways to help people clean, usually involving their essays (though he has great ideas on carpet maintenance, too).

  2. 10 Pros and 10 Cons of Going to College (and How to Decide)

    Pursuing higher education allows you to develop knowledge, learn new skills and better your professional prospects. That said, going to university comes with its set of advantages and disadvantages, both of which you must consider before enrolling in a course.

  3. Should You Go to College? 4 Pros and 3 Cons

    The decision to attend college is a big one. Getting a college degree takes time: at least four years for most people. Getting a college degree also costs money: tens of thousands of dollars for most people.

  4. Pros and Cons of going to university

    Discover the benefits and drawbacks of going to university with our comprehensive guide. Compare courses, rankings, fees and more.

  5. Pros And Cons Of University

    In this article, we look at the pros and cons of university so you can choose the right path for you after school/college. 7 pros and 7 cons to help you decide - plus some tips on how to make up your mind.

  6. Advantages & Disadvantages of Going to College

    You have just graduated high school, or are just about to, and are debating whether college is right for you. While many people feel that college has many advantages and is the obvious choice after graduation, there are some disadvantages to attending as well. Take your time to weigh both options.

  7. Advantages and Disadvantages of University Education

    We'd be looking at the advantages and disadvantages of university education in this article at World Scholars Hub to help you get a clear understanding of the pros and cons of the modern education system in the world today. It is right to say that education is really beneficial and must be taken seriously. It's

  8. The Pros and Cons of Attending College Close vs Far From Home

    Finalizing your college list, a working list of the colleges to which you intend to apply, can be a long and involved process. You'll need to balance a number of different priorities and values as you narrow down the 7,000 undergraduate institutes in the United States to a mere ten or so that you'd like to attend.

  9. University degrees: the pros and cons

    A-level students are weighing up going to university amid record-high costs, competition for places and falling grades.

  10. Is College Worth It? Consider These Factors Before Enrolling

    For decades in the U.S., a four-year degree was seen as a ticket to a better life, associated with higher wages, better health and access to homeownership, to name a few benefits. But rising costs ...

  11. Pros and Cons of College: Is It Worth the Cost?

    Comparing the Pros and Cons of Going to College . By Melissa Brock · January 23, 2023 · 12 minute read We're here to help! First and foremost, SoFi Learn strives to be a beneficial resource to you as you navigate your financial journey.

  12. IELTS Advantage Disadvantage Sample Essay Questions

    Below is a list of IELTS sample essay questions for advantage / disadvantage essays in writing task 2. These essay types are often taught together with discussion essays but I think it is worth studying them separately to be better prepared.

  13. Working While Going to College: Pros and Cons Essay

    Reasons for Working During College. Working during college has its reasons and may be highly beneficial. Although a significant number of students are frequently apprehensive about applying for a part-time or even full-time job during college, this possibility may be taken into consideration.

  14. Some students take a year off between school and university

    In IELTS Writing Task 2 advantages and disadvantages essays, you will be asked to write the benefits and drawbacks of the topic given. You have to be careful that you write the advantages and disadvantages of the topic given and not your opinion about the topic. To help you to understand this type of essay better, given below is a sample essay along with a vocabulary section.

  15. The pros and cons of university

    If you're not sure if uni's the right choice for you, why not listen to what some current students have to say about their experiences. They told us all about their favourite things about uni, and they were also really open about what they find harder, or what they don't enjoy quite as much, so you can get the full picture.

  16. Three benefits of going to university: [Essay Example], 594 words

    Thus, today I would like to share with you the three benefits you can gain from a university, which are improving your knowledge, enhancing your soft skills, and being able to achieve self-independence.

  17. Advantages & Disadvantages of Starting College Directly After High

    Those with career goals in a specific career path need to consider their career options in their area and in their field of study in a college program, while also looking at college costs, financial aid needs, student loan debt, health care needs, personal growth, life skills and future career desires.

  18. Having a Year Off Between Finishing School And Going to University

    Explore the benefits and challenges of taking a year off between finishing school and going to university through our IELTS Band 9 sample essays. Discover expert insights and strategies to articulate your views effectively and achieve top scores. Perfect for candidates aiming to enhance their writing skills and excel in the IELTS exam. Join us to elevate your test preparation and embrace success!

  19. More and more people are going to study at universities in their own

    More and more people are going to study at universities in their own country or abroad. In this essay I will talk about advantages and disadvantages of studying at university in your country.

  20. Advantages And Disadvantages Of Going To University

    Here are some tips intended to help you , if you confused about going to University. Advantages. 1.It opens new avenue of employment,most jobs are graduate jobs.

  21. Advantages And Disadvantages Of Going Straight To College Essay

    Is College Worth It 1022 Words | 5 Pages. According to Andrew J. Rotherham's article "Actually, College Is Very Much Worth it. "he states, "Meanwhile, in 2010, the unemployment rate was 9.2 percent for those with only some college and more than 10 percent for those with just a high school degree, but it was 5.4 percent for college graduates."

  22. Gap Year Advantages Disadvantages IELTS Essay

    Gap Year Advantages Disadvantages IELTS Essay. You should spend around 40 minutes on this task. In some countries young people are encouraged to work or travel for a year between finishing high school and starting university studies.

  23. The Pros and Cons of Going to University in Your Hometown

    Considering going to university in your hometown? Here are some pros and cons to consider 👇. When you love where you live, packing up to study in another city may not be the best option.

  24. Advantages And Disadvantages Of An Established Party

    To get on the general election ballot without going through an established party, one has two options to choose from. The first is to run as an independent candidate.

  25. Similarities Between Julius Caesar And To Kill A Mockingbird

    Upon reviewing both novels read in class, you learn of the disadvantages and advantages of going against what the majority is or believes. Both novels show significant roles that specifically go against the majority, by either defending a black man, or killing the beloved leader off a hunch a group of men has.

  26. Essay on Disadvantages of Mobile Phone Technology

    There are multiple health disadvantages of owning a phone which include brain cancer as phones produce radio frequency energy that depends on the technology of the phone and how close the screen is to the user.

  27. 5 key things to know about Kamala Harris : NPR

    In a career marked by firsts, Harris is no stranger to charting a new path. If she becomes the Democratic nominee, and beats Trump in November, she would be the first woman president of the U.S.

  28. Clarkson Company Disadvantages

    1. What are the advantages and disadvantages of going public? Advantages; It helps you grow your company more rapidly by providing you with extra financial resources.

  29. Federal Register :: Cybersecurity Labeling for Internet of Things

    In this document, the Federal Communications Commission (Commission or FCC) establishes a voluntary cybersecurity labeling program for wireless consumer Internet of Things, or IoT, products. The program will provide consumers with an easy-to-understand and quickly recognizable FCC IoT Label that...

  30. Kamala Harris Takes Control

    At the same time, Harris is starting with some disadvantages relative to Biden, Obama and other recent nominees. Nate notes that the same polling data suggests Harris is weaker than Biden among ...