What is a Cyber Security Incident?

What is a Cyber Security Incident?

What Cyber Security Incidents are required to be reported?

  1. Suspected breaches.
  2. Malware incidents that cause significant damage.
    "Significant damage" means:
    1. A degradation in or loss of mission capability to an extent and duration that the entity is not able to perform one or more of its primary functions;
    2. Damages of ten thousand dollars ($10,000) or more to entity assets as estimated by the entity;
    3. A financial loss of ten thousand dollars ($10,000) or more as estimated by the entity; or
    4. Harm to individuals involving loss of life or serious life - threatening injuries.
  3. Denial of Service (DoS) attacks that affect the availability of services.
  4. Demands for ransom related to a cybersecurity incident or unauthorized disclosure of digital records.
  5. Identity theft or identity fraud services hosted by entity information technology systems.
  6. Incidents that require response and remediation efforts that will cost more than ten thousand dollars ($10,000) dollars in equipment, software, and labor.
  7. Other incidents the entity deems worthy of communication to the department.


The new law is effective as of Aug. 1, 2021.

Frequently Asked Questions

Frequently Asked Questions
Accordion Section Title
Must I report an incident immediately?

Yes. According to the law, "disclosure must be made in the most expedient time possible and without unreasonable delay".

Accordion Section Title
What if I need help handling my cybersecurity incident?

The Cybersecurity Incident Reporting form has a response field that asks if you would like assistance.


If yes, an NDIT cybersecurity analyst will contact you. If you require immediate assistance, please contact the Service Desk at 701-328-4470 after completing this form.

Accordion Section Title
What if our cybersecurity incident has already been resolved? Do I still need to report it?

Yes. Under the new law, ALL cybersecurity incidents meeting the above criteria must be reported to NDIT, even if no assistance is required or if the incident has already been resolved.

Accordion Section Title
I submitted a cybersecurity incident, using the form. What happens next?

If you requested assistance when you completed the form, a cybersecurity analyst will be contacting you. If you did not request assistance, a cybersecurity analyst will follow up with you only if additional details are needed.

Accordion Section Title
Are there any additional reporting requirements?

It depends. Until a cybersecurity incident is resolved, an entity shall disclose clarifying details regarding a cybersecurity incident to NDIT, including:

  1. The number of potentially exposed records, potentially affected victims;
  2. The type of records potentially exposed, including (but not limited to) health insurance information, medical information, criminal justice information, regulated information, financial information, and personal information;
  3. Efforts the entity is undertaking to mitigate and remediate the damage of the incident to the entity and other affected entities; and
  4. The expected impact of the incident, including:
    1. The disruption of the entity services;
    2. The effect on customers and employees that experienced data or service losses;
    3. The effect on entities receiving wide area network services from NDIT; and
    4. Other concerns that could potentially disrupt or degrade the confidentiality, integrity, or availability of information systems, data, or services that may affect the state.
Accordion Section Title
What will NDIT do with my cybersecurity incident report?

NDIT is required to report all cybersecurity incidents to Legislative Management. This report includes the status of the cybersecurity incident and any response or remediation to mitigate the cybersecurity incident.

However, NDIT will ensure all reports of disclosed cybersecurity incidents are communicated in a manner that protects victims of cybersecurity incidents, prevents unauthorized disclosure of cybersecurity plans and strategies, and adheres to federal and state laws regarding protection of cybersecurity information.