Notice March 27, 2026 Doc #2026-06076

Continuation of the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities

Share:
Continuation of the National Emergency With Respect to Significant Malicious Cyber-Enabled Activities
💡

In Simple Terms

This action keeps in place for 1 more year the national emergency over major harmful cyber attacks linked to people or groups outside the United States. It lets the U.S. keep using special powers already set up to respond to that threat.

Summary

President Donald Trump issued this notice to continue for one more year the national emergency related to significant malicious cyber-enabled activities. The action keeps in place the emergency first declared in Executive Order 13694 and confirms that related steps taken in later executive orders remain part of the government’s response, except for Executive Order 14110, which was previously revoked. It says these cyber activities still pose an unusual and extraordinary threat to U.S. national security, foreign policy, and the economy. The notice also directs that the continuation be published in the Federal Register and sent to Congress, as required by law.

Official Record

Federal Register Published

Signed by the President

March 24, 2026

March 27, 2026

Document #2026-06076

Analysis & Impact

💡 How This May Affect You

  • Working families may see fewer cyber disruptions, but banks, employers, and utilities may tighten account security steps.
  • Small businesses could face higher cybersecurity compliance and software costs, but potentially fewer damaging hacks and payment disruptions.
  • Students and recent graduates may benefit from better protection of school and job data, with more login checks.
  • Retirees and seniors may get stronger protections against fraud and service outages, but could face harder account access.
  • Urban, suburban, and rural areas may all benefit from stronger network protections, though rural providers may struggle more.

🏢 Key Stakeholders

  • National security agencies and critical infrastructure operators benefit from continued cyber authorities and deterrence.
  • Foreign malicious cyber actors, sanctioned entities, and facilitators face heightened restrictions and penalties.
  • Technology, finance, energy, telecommunications, and defense sectors remain most exposed to compliance burdens.
  • Treasury OFAC, Homeland Security CISA, Justice, State, and intelligence agencies lead implementation.
  • Cybersecurity advocacy groups, civil liberties organizations, and industry associations shape enforcement debates.

📈 What to Expect

  • Existing cyber sanctions authorities remain active for investigations, listings, and asset freezes.
  • Agencies sustain current cyber threat reporting, coordination, and enforcement without major operational changes.
  • Foreign adversaries continue probing U.S. networks, with periodic sanctions announcements and indictments.

  • Annual renewals likely persist unless cyber threat levels materially decline.

  • Treasury and Justice gradually expand use of sanctions against facilitators and infrastructure providers.

  • Companies maintain higher compliance, logging, and incident-reporting costs tied to persistent cyber risk.

📚 Historical Context

  • Continues Obama’s 2015 cyber emergency, extended annually by Trump and Biden administrations.
  • Builds on EO 13694, as amended by Obama’s 2016 EO 13757 against election interference.
  • Follows Trump’s 2021 EO 13984 and later Biden-era additions, preserving sanctions-based cyber authorities.
  • Historically notable for bipartisan continuity: three presidents maintained one cyber emergency across a decade.
  • Differs mainly in layering revisions: 2023 provisions were revoked in 2025, yet emergency endures.