This is not an official government website.
Copyright © 2026 PLEJ LC. All rights reserved.
Creates a federal grant and technical assistance program to help rural, municipal, and small investor‑owned electric utilities adopt advanced cybersecurity technologies and participate in threat information‑sharing. The Department is directed to provide technical help, award grants/cooperative agreements/prizes (competitive or noncompetitive), prioritize utilities with limited cybersecurity resources or critical assets, treat voluntarily shared threat information as exempt from FOIA, and may receive up to $250 million in authorized appropriations for FY2026–FY2030.
The bill directs modest federal funding and technical help to strengthen cybersecurity at smaller, rural, and municipal utilities—improving resilience for many communities—while creating modest taxpayer cost and risks of reduced transparency, uneven coverage, and uncertain impact depending on implementation.
Customers and communities served by rural and municipal utilities (especially electricity and water systems) gain federal grants and technical assistance to strengthen utility cybersecurity and reduce risk of disruptive cyberattacks.
Smaller and resource‑limited utilities are prioritized for assistance and funding, making it more likely that rural and local governments can adopt basic cyber defenses and comply with standards.
Offers multiple funding and support pathways (competitive and noncompetitive grants plus technical assistance), increasing the practical accessibility of federal help for utilities of different sizes and capacities.
Taxpayers fund the program — $250 million authorized across FY2026–2030 — which is a measurable federal cost for which benefits depend on program uptake and effectiveness.
Exemptions from FOIA and similar state/local disclosures could reduce public transparency about cybersecurity risks and government responses, limiting public accountability and informed oversight.
The program may create uneven protection: some private investor‑owned utilities below threshold could benefit while larger utilities (or others) are excluded, producing geographic or interconnection gaps in cyber defenses.
Introduced January 27, 2026 by Mariannette Miller-Meeks · Last progress January 27, 2026