New York Utilities Face a New Era of Mandatory Cybersecurity

Article Cybersecurity

March 27, 2026

Water works

Cyber threats targeting energy and utility infrastructure are no longer a distant risk. They are a present and growing danger.

In response, the New York State Public Service Commission (PSP) now requires regulated utilities to treat cybersecurity as a legal duty, essential to providing safe and adequate public service.

What Is Case 25-M-0302?

On June 13, 2025, the New York State Public Service Commission issued an order instituting a proceeding to establish cybersecurity requirements for information technology under 16 NYCRR, formally known as Case 25-M-0302. Following a public comment period that closed September 15, 2025, the regulations were finalized and became effective January 1, 2026.

The proceeding was driven by a recognition that utilities are high-value targets for cyberattacks, prompted by a 2023 amendment to the Public Service Law requiring gas and electric corporations to develop tools to protect consumer privacy, and by Governor Hochul’s call to strengthen cybersecurity for the State’s water infrastructure.

The Commission’s core finding: “Adequate cybersecurity is now an intrinsic part of safe and adequate service.” Cybersecurity is no longer a best practice; it is a legal obligation embedded in the duty to serve.

The regulations establish a dynamic set of mandatory, minimum, and enforceable standards designed to be strong and agile enough to meet today’s threats, as well as those expected in the future.

The current phase focuses on Information Technology (IT) and the protection of Personally Identifiable Information (PII), with a separate proceeding planned for Operational Technology (OT).

Who Is Impacted?

The PSC anchored its authority in its longstanding supervisory power over public utilities, making these obligations broadly applicable across regulated utility sectors:

  • Gas and Electric corporations
  • Water-Works corporations
  • Steam corporations
  • Telephone corporations
  • Cable Television companies

Exemptions: Municipal corporations and regulated entities generally serving fewer than 50,000 customers are exempt from coverage under these regulations.

What the Regulations Require

The draft regulations, now in effect, impose a comprehensive set of minimum, mandatory cybersecurity obligations on covered entities. Key requirements include that organizations:

  1. Designate a Chief Information Security Officer (CISO)
    A qualified CISO must be designated to oversee and manage the organization’s cybersecurity program and enforce policy across all covered IT systems.
  2. Establish a Formal Cybersecurity Program (§1200.2)
    Covered entities must create and maintain a documented, risk-based cybersecurity program designed to proactively identify, mitigate, and respond to threats against IT systems and PII.
  3. Adopt Written Cybersecurity Policies (§1200.3)
    Entities must develop and maintain written policies governing data governance, access controls, system monitoring, and incident response protocols.
  4. Conduct Ongoing Risk Assessment
    Organizations must proactively and continuously assess risks and threats to their IT systems, taking reasonable, documented action to mitigate those risks and remain vigilant.
  5. Report Cybersecurity Incidents Within 72 Hours
    Covered entities must notify the Department of Public Service’s Office of Resilience within 72 hours of reasonably believing a cybersecurity incident has occurred, including incidents affecting third-party service providers that impact the covered entity’s IT systems or PII.
  6. Third-Party Service Provider Requirements
    Third-party vendors must contractually agree to notify covered entities of any cybersecurity incidents that directly impact the covered entity’s IT systems or nonpublic information.
  7. Retain Cybersecurity Records for Five Years
    All records related to cybersecurity events and incidents must be retained for a minimum of five calendar years and be available for regulatory review.
  8. Grant DPS Audit Access
    Department of Public Service staff must be granted physical and digital access to all covered entity assets upon request for the purpose of conducting cybersecurity audits and compliance reviews.
  9. Annual Senior Management Certification
    Senior management must annually certify compliance with the regulations to the Director of the DPS Office of Resilience, Utility Security, Nuclear Affairs, and Emergency Preparedness.
  10. Incident Recovery Planning
    Entities must maintain documented plans for recovery and restoration of normal operations in a safe and timely manner following a cybersecurity incident.

What Organizations Need to Do

Compliance with 16 NYCRR Part 1200 requires deliberate, documented action across governance, operations, and vendor management. Here are the key steps covered entities should take:

  1. Appoint or Verify Your CISO
    Confirm that a qualified Chief Information Security Officer is formally designated, with clear authority and responsibility for cybersecurity governance and policy enforcement.
  2. Conduct a Comprehensive IT Security Assessment
    Engage in an IT Security Assessment to map all IT systems and data flows, and the effectiveness of your security controls. Conduct a pen test to identify vulnerabilities and threat vectors, especially those involving PII, and receive documented findings as the foundation of your cybersecurity program.
  3. Build or Update Your Cybersecurity Program & Policies
    Develop or update your formal cybersecurity program and written policies to align with Part 1200 requirements, including data governance, access controls, monitoring, and incident response.
  4. Establish a 72-Hour Incident Notification Protocol
    Create a thorough incident response plan, including an internal escalation and notification workflow capable of triggering DPS reporting within 72 hours of a suspected incident. Extend this requirement to key third-party vendors via contract. Conduct tabletop exercises to evaluate the incident response plan, ensuring it covers various scenarios and details how to respond efficiently.
  5. Audit Your Third-Party Vendors
    Review all service provider contracts to ensure cybersecurity incident notification obligations are included. Assess vendor security postures and require alignment with your program standards.
  6. Implement a 5-Year Records Retention Policy
    Establish or update records management procedures to ensure that all cybersecurity events, incidents, and related documentation are retained for a minimum of five calendar years.
  7. Prepare for DPS Audits
    Ensure DPS staff can be granted timely physical and digital access to systems for audit purposes. Designate a point of contact and document your compliance readiness
  8. Schedule Annual Senior Management Certification
    Establish a governance cadence ensuring senior leadership reviews, affirms, and submits the required annual Certification of Compliance to the Director of the DPS Office of Resilience.
  9. Provide Employee Security Awareness Training
    Ensure your employees are enrolled in annual security and awareness training to stay informed of how to maintain a secure and compliant environment, manage sensitive information, data privacy, and other regulatory requirements. Other compliance-specific training may also be required.

Timeline for Compliance

NY timeline

The regulations include a phased compliance schedule with staggered deadlines. Organizations should build their compliance roadmaps around the following milestones:

  • June 13, 2025: PSC Issues Order & Draft Regulations
    The PSC issues Case 25-M-0302, formally instituting the cybersecurity proceeding and publishing draft regulations for stakeholder comment.
  • September 15, 2025: Public Comment Period Closes
    Interested parties and stakeholders submit comments on the draft regulations. The Commission reviews feedback and finalizes the rules.
  • January 1, 2026: Regulations Take Effect
    16 NYCRR Part 1200 becomes effective. The compliance clock begins. Annual Certifications of Compliance are now required on an ongoing basis.
  • July 1, 2026 (180 Days): General Compliance Deadline
    Covered entities must be in full compliance with most requirements of Part 1200, including CISO designation, cybersecurity program, written policies, incident reporting protocols, and records retention.
  • January 1, 2027 (One Year): Extended Deadline – Select Provisions
    Compliance is required with sections 1200.4(b), 1200.5, 1200.9, 1200.12, and 1200.14(b), covering specific risk assessment, testing, and access management requirements.
  • July 1, 2027 (18 Months): Final Compliance Deadline for Remaining Provisions
    All remaining provisions must be implemented. Full program maturity is expected across all covered entities. No further transitional accommodations after this date.

Final Thoughts

Case 25-M-0302 marks a genuine inflection point in how New York regulates utility cybersecurity. By treating cyber resilience as a core component of safe and adequate service, the PSC has elevated cybersecurity from a best practice to a legal mandate, with audit rights, incident reporting obligations, and senior-level accountability to back it up.

What’s particularly significant is the broader trajectory these requirements signal. The regulations explicitly describe IT and PII protection as a “first step,” with Operational Technology (OT), the systems that run physical infrastructure, expected to follow in a subsequent proceeding.

Organizations that wait for OT rules to act will find themselves far behind.

Emerging amid a federal landscape that has de-emphasized new regulatory burdens, New York’s actions send a clear message: cybersecurity accountability is expanding at the state level, and it is not optional.

Now is the time to invest in governance, documentation, and program maturity, before the next compliance deadline arrives.

CampusGuard is here to help you every step of the way, whether you are just starting to establish your cybersecurity program, through an IT security assessment, policy and procedure reviews, tabletop exercises to test your incident response plan, pen testing, third-party vendor reviews, and online security awareness and compliance training.

We are your trusted partner in boosting your cybersecurity posture and achieving compliance. Contact us today to learn more and get started!

Share

About the Author
Kathy Staples

Kathy Staples

Marketing Manager

Kathy Staples has over 20 years of experience in digital marketing, with special focus on corporate marketing initiatives and serving as an account manager for many Fortune 500 clients. As CampusGuard's Marketing Manager, Kathy's main objectives are to drive the company's brand awareness and marketing strategies while strengthening our partnerships with higher education institutions and organizations. Her marketing skills encompass multiple digital marketing initiatives, including campaign development, website management, SEO optimization, and content, email, and social media marketing.

Related Content