The White House

Office of the Press Secretary

Presidential Memorandum: Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems

MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

SUBJECT: Promoting Economic Competitiveness While Safeguarding Privacy, Civil Rights, and Civil Liberties in Domestic Use of Unmanned Aircraft Systems

Unmanned Aircraft Systems (UAS) technology continues to improve rapidly, and increasingly UAS are able to perform a variety of missions with greater operational flexibility and at a lower cost than comparable manned aircraft. A wide spectrum of domestic users -- including industry, private citizens, and Federal, State, local, tribal, and territorial governments -- are using or expect to use these systems, which may play a transformative role in fields as diverse as urban infrastructure management, farming, public safety, coastal security, military training, search and rescue, and disaster response.

The Congress recognized the potential wide-ranging benefits of UAS operations within the United States in the FAA Modernization and Reform Act of 2012 (Public Law 112-95), which requires a plan to safely integrate civil UAS into the National Airspace System (NAS) by September 30, 2015. As compared to manned aircraft, UAS may provide lower-cost operation and augment existing capabilities while reducing risks to human life. Estimates suggest the positive economic impact to U.S. industry of the integration of UAS into the NAS could be substantial and likely will grow for the foreseeable future.

As UAS are integrated into the NAS, the Federal Government will take steps to ensure that the integration takes into account not only our economic competitiveness and public safety, but also the privacy, civil rights, and civil liberties concerns these systems may raise.

By the authority vested in me as President by the Constitution and the laws of the United States of America, and in order to establish transparent principles that govern the Federal Government's use of UAS in the NAS, and to promote the responsible use of this technology in the private and commercial sectors, it is hereby ordered as follows:

Section 1. UAS Policies and Procedures for Federal Government Use. The Federal Government currently operates UAS in the United States for several purposes, including to manage Federal lands, monitor wildfires, conduct scientific research, monitor our borders, support law enforcement, and effectively train our military. As with information collected by the Federal Government using any technology, where UAS is the platform for collection, information must be collected, used, retained, and disseminated consistent with the Constitution, Federal law, and other applicable regulations and policies. Agencies must, for example, comply with the Privacy Act of 1974 (5 U.S.C. 552a) (the "Privacy Act"), which, among other things, restricts the collection and dissemination of individuals' information that is maintained in systems of records, including personally identifiable information (PII), and permits individuals to seek access to and amendment of records.

(a) Privacy Protections. Particularly in light of the diverse potential uses of UAS in the NAS, expected advancements in UAS technologies, and the anticipated increase in UAS use in the future, the Federal Government shall take steps to ensure that privacy protections and policies relative to UAS continue to keep pace with these developments. Accordingly, agencies shall, prior to deployment of new UAS technology and at least every 3 years, examine their existing UAS policies and procedures relating to the collection, use, retention, and dissemination of information obtained by UAS, to ensure that privacy, civil rights, and civil liberties are protected. Agencies shall update their policies and procedures, or issue new policies and procedures, as necessary. In addition to requiring compliance with the Privacy Act in applicable circumstances, agencies that collect information through UAS in the NAS shall ensure that their policies and procedures with respect to such information incorporate the following requirements:

(i) Collection and Use. Agencies shall only collect information using UAS, or use UAS-collected information, to the extent that such collection or use is consistent with and relevant to an authorized purpose.
(ii) Retention. Information collected using UAS that may contain PII shall not be retained for more than 180 days unless retention of the information is determined to be necessary to an authorized mission of the retaining agency, is maintained in a system of records covered by the Privacy Act, or is required to be retained for a longer period by any other applicable law or regulation.
(iii) Dissemination. UAS-collected information that is not maintained in a system of records covered by the Privacy Act shall not be disseminated outside of the agency unless dissemination is required by law, or fulfills an authorized purpose and complies with agency requirements.

(b) Civil Rights and Civil Liberties Protections. To protect civil rights and civil liberties, agencies shall:

(i) ensure that policies are in place to prohibit the collection, use, retention, or dissemination of data in any manner that would violate the First Amendment or in any manner that would discriminate against persons based upon their ethnicity, race, gender, national origin, religion, sexual orientation, or gender identity, in violation of law;
(ii) ensure that UAS activities are performed in a manner consistent with the Constitution and applicable laws, Executive Orders, and other Presidential directives; and
(iii) ensure that adequate procedures are in place to receive, investigate, and address, as appropriate, privacy, civil rights, and civil liberties complaints.

(c) Accountability. To provide for effective oversight, agencies shall:

(i) ensure that oversight procedures for agencies' UAS use, including audits or assessments, comply with existing agency policies and regulations;
(ii) verify the existence of rules of conduct and training for Federal Government personnel and contractors who work on UAS programs, and procedures for reporting suspected cases of misuse or abuse of UAS technologies;
(iii) establish policies and procedures, or confirm that policies and procedures are in place, that provide meaningful oversight of individuals who have access to sensitive information (including any PII) collected using UAS;
(iv) ensure that any data-sharing agreements or policies, data use policies, and record management policies applicable to UAS conform to applicable laws, regulations, and policies;
(v) establish policies and procedures, or confirm that policies and procedures are in place, to authorize the use of UAS in response to a request for UAS assistance in support of Federal, State, local, tribal, or territorial government operations; and
(vi) require that State, local, tribal, and territorial government recipients of Federal grant funding for the purchase or use of UAS for their own operations have in place policies and procedures to safeguard individuals' privacy, civil rights, and civil liberties prior to expending such funds.

(d) Transparency. To promote transparency about their UAS activities within the NAS, agencies that use UAS shall, while not revealing information that could reasonably be expected to compromise law enforcement or national security:

(i) provide notice to the public regarding where the agency's UAS are authorized to operate in the NAS;
(ii) keep the public informed about the agency's UAS program as well as changes that would significantly affect privacy, civil rights, or civil liberties; and
(iii) make available to the public, on an annual basis, a general summary of the agency's UAS operations during the previous fiscal year, to include a brief description of types or categories of missions flown, and the number of times the agency provided assistance to other agencies, or to State, local, tribal, or territorial governments.

(e) Reports. Within 180 days of the date of this memorandum, agencies shall provide the President with a status report on the implementation of this section. Within 1 year of the date of this memorandum, agencies shall publish information on how to access their publicly available policies and procedures implementing this section.

Sec. 2. Multi-stakeholder Engagement Process. In addition to the Federal uses of UAS described in section 1 of this memorandum, the combination of greater operational flexibility, lower capital requirements, and lower operating costs could allow UAS to be a transformative technology in the commercial and private sectors for fields as diverse as urban infrastructure management, farming, and disaster response. Although these opportunities will enhance American economic competitiveness, our Nation must be mindful of the potential implications for privacy, civil rights, and civil liberties. The Federal Government is committed to promoting the responsible use of this technology in a way that does not diminish rights and freedoms.

(a) There is hereby established a multi-stakeholder engagement process to develop and communicate best practices for privacy, accountability, and transparency issues regarding commercial and private UAS use in the NAS. The process will include stakeholders from the private sector.

(b) Within 90 days of the date of this memorandum, the Department of Commerce, through the National Telecommunications and Information Administration, and in consultation with other interested agencies, will initiate this multi-stakeholder engagement process to develop a framework regarding privacy, accountability, and transparency for commercial and private UAS use. For this process, commercial and private use includes the use of UAS for commercial purposes as civil aircraft, even if the use would qualify a UAS as a public aircraft under 49 U.S.C. 40102(a)(41) and 40125. The process shall not focus on law enforcement or other noncommercial governmental use.

Sec. 3. Definitions. As used in this memorandum:

(a) "Agencies" means executive departments and agencies of the Federal Government that conduct UAS operations in the NAS.

(b) "Federal Government use" means operations in which agencies operate UAS in the NAS. Federal Government use includes agency UAS operations on behalf of another agency or on behalf of a State, local, tribal, or territorial government, or when a nongovernmental entity operates UAS on behalf of an agency.

(c) "National Airspace System" means the common network of U.S. airspace; air navigation facilities, equipment, and services; airports or landing areas; aeronautical charts, information, and services; related rules, regulations, and procedures; technical information; and manpower and material. Included in this definition are system components shared jointly by the Departments of Defense, Transportation, and Homeland Security.

(d) "Unmanned Aircraft System" means an unmanned aircraft (an aircraft that is operated without direct human intervention from within or on the aircraft) and associated elements (including communication links and components that control the unmanned aircraft) that are required for the pilot or system operator in command to operate safely and efficiently in the NAS.

(e) "Personally identifiable information" refers to information that can be used to distinguish or trace an individual's identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual, as set forth in Office of Management and Budget Memorandum M-07-16 (May 22, 2007) and Office of Management and Budget Memorandum M-10-23 (June 25, 2010).

Sec. 4. General Provisions.

(a) This memorandum complements and is not intended to supersede existing laws and policies for UAS operations in the NAS, including the National Strategy for Aviation Security and its supporting plans, the FAA Modernization and Reform Act of 2012, the Federal Aviation Administration's (FAA's) Integration of Civil UAS in the NAS Roadmap, and the FAA's UAS Comprehensive Plan.

(b) This memorandum shall be implemented consistent with applicable law, and subject to the availability of appropriations.

(c) Nothing in this memorandum shall be construed to impair or otherwise affect:

(i) the authority granted by law to an executive department, agency, or the head thereof; or
(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(d) Independent agencies are strongly encouraged to comply with this memorandum.

(e) This memorandum is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

(f) The Secretary of Commerce is hereby authorized and directed to publish this memorandum in the Federal Register.

BARACK OBAMA

# #

The White House

Office of the Press Secretary

Statement by NSC Spokesperson Bernadette Meehan on the Shooting in Copenhagen

The United States condemns today’s deplorable shooting in Copenhagen. We offer our condolences to the loved ones of the deceased victim, and our thoughts are with those wounded in this attack. We have been in close contact with our Danish counterparts and stand ready to lend any assistance necessary to the investigation.  

The White House

Office of the Press Secretary

Readout of the President's Call with President Petro Poroshenko of Ukraine

The President spoke with Ukrainian President Poroshenko today to express his sympathy for the mounting toll of the conflict in eastern Ukraine and his deep concern about the ongoing violence, particularly in and around Debaltseve.  The two leaders emphasized the pressing need for all signatories to implement the cease fire and protocol agreements reached at Minsk last September and reaffirmed by the Minsk Implementation Plan this week.   They agreed to remain in close contact in the days ahead.  Both leaders stressed the importance of establishing a lasting peace that respects Ukraine’s sovereignty and unity.  Separately, the President congratulated Poroshenko on Ukraine reaching an agreement with the International Monetary Fund on an ambitious package of reforms that will help to stabilize Ukraine’s economy and lay the groundwork for growth and prosperity.  

The White House

Office of the Press Secretary

Readout of the President’s Call with Chancellor Angela Merkel of Germany

The President spoke with German Chancellor Merkel today about the ongoing violence in eastern Ukraine and the ceasefire scheduled to begin at midnight tonight. The President and Chancellor Merkel are particularly concerned about the intense fighting in and around Debaltseve. They also agreed on the pressing need for all signatories to implement the cease fire and protocol agreements reached at Minsk last September and reaffirmed by the Minsk Implementation Plan this week. The President thanked the Chancellor for her tireless efforts to bring the conflict in eastern Ukraine to an end in manner that preserves Ukraine’s sovereignty and unity.

The White House

Office of the Press Secretary

Weekly Address: Giving Every Child, Everywhere, a Fair Shot

WASHINGTON, DC — In this week’s address, the President laid out his plan to ensure more children graduate from school fully prepared for college and a career.  Our elementary and secondary schools are doing better, as demonstrated by the news this past week that our high school graduation rate has hit an all-time high, but there is still more that can be done to ensure every child receives a quality education.  That’s why the President wants to replace No Child Left Behind with a new law that addresses the overuse of standardized tests, makes a real investment in preschool, and gives every kid a fair shot at success.  He reminded everyone that when educating our kids, the future of our nation, we shouldn’t accept anything less than the best.

The audio of the address and video of the address will be available online at www.whitehouse.gov at 6:00 a.m. ET, February 14, 2015.

Remarks of President Barack Obama
Weekly Address
Palo Alto, California
February 14, 2015

Hi, everybody.  In my State of the Union Address, I laid out my ideas to help working families feel more secure and earn the skills required to advance in a world of constant change.

And in a new economy that’s increasingly built on knowledge and innovation, a core element of this middle-class economics is how well we prepare our kids for the future.

For decades, we threw money at education without making sure our schools were actually improving, or whether we were giving teachers the tools they need, or whether our taxpayer dollars were being used effectively.  And our kids too often paid the price.

Over the past few years, we’ve seen signs that our elementary and secondary school students are doing better.  Last year, our younger students earned the highest math and reading scores on record.  Last week, we learned that our high school graduation rate hit a new all-time high.

This is progress.  But in a 21st century economy, our kids will only do better than we did if we educate them better than we were educated.  So we have to do more to make sure they graduate from school fully prepared for college and a career.

This year, I want to work with both parties in Congress to replace No Child Left Behind with a smarter law that addresses the overuse of standardized tests, makes a real investment in preschool, and gives every kid a fair shot in the new economy.

Now, it’s pretty commonsense that an education bill should actually improve education.  But as we speak, there’s a Republican bill in Congress that would frankly do the opposite.

At a time when we should invest more in our kids, their plan would lock in cuts to schools for the rest of this decade.  We’d end up actually invest less in our kids in 2021 than we did in 2012.

At a time when we should give our teachers all the resources they need, their plan could let states and cities shuffle education dollars into things like sports stadiums or tax cuts for the wealthy.

At a time when we have to give every child, everywhere, a fair shot – this Congress would actually allow states to make even deeper cuts into school districts that need the most support, send even more money to some of the wealthiest school districts in America, and turn back the clock to a time when too many students were left behind in failing schools.

Denying a quality education to the children of working families is as wrong as denying health care or child care to working families.  We are better than this.

I have a different vision for the middle class.

In today’s world, we have to equip all our kids with an education that prepares them for success, regardless of what they look like, or how much their parents make, or the zip code they live in.

And that means trying new things, investing in what’s working, and fixing what’s not.

That means cutting testing down to the bare minimum required to make sure parents and teachers know how our kids and schools are doing from year to year, and relative to schools statewide.

That means giving the teachers and principals who do the hard work every day the resources they need to spend less time teaching to a test, and more time teaching our kids the skills they need.

Some of these changes are hard.  They’ll require all of us to demand more of our schools and more of our kids, making sure they put down the video games and iPhones, and pick up the books.  They’ll require us to demand that Washington treat education reform as the dedicated progress of decades – something a town with a short attention span doesn’t always do very well.

But I'm confident we can do this.  When it comes to education, we are not a collection of states competing against one another; we are a nation competing against the world.  Nothing will determine our success as a nation in the 21st century more than how well we educate our kids.  And we shouldn’t accept anything less than the best.

Thanks, and before I go – Happy Valentine’s Day, Michelle.  Have a great weekend, everybody.

The White House

Office of the Press Secretary

Remarks by the President at a DNC Fundraiser

Private Residence
San Francisco, California

4:30 P.M. PST

PRESIDENT OBAMA:  Thank you, everybody.  Well, first of all, let me just say, Sandy and Jeanne are some of my most longstanding stalwart supporters and I am so grateful to them.  They have been with me just about every step of the way, and I’m sure this shows their Illinois good sense -– (laughter) –- but I am truly grateful, and they arranged a spectacular setting for a spectacular event.  And I want to thank them both. 

I want to thank everybody who helped to co-host this.  There are a lot of friends here who’ve –- I’ve been in your houses, too.  (Laughter.)  And you’ve known me before I had any gray hair.  (Laughter.)  And before a lot of people could pronounce my name properly, and I’m grateful.  And for those of you who I’m meeting for the first time, thank you so much for being here.

I’m going to -– the way I usually do these is to make some very brief remarks on the frontend and then really I want to spend most of the time just in a conversation and answering questions or hearing ideas that you may have.  If you look at what happened last year –- and I talked about this in the State of the Union –- after a debilitating recession, worst financial crisis since the Great Depression, four or five hard years of rebuilding and retooling and recovery, last year ended up being really a breakout year for America, in which all that hard work began to show itself not just in the fact that we had the fastest drop in unemployment in 30 years; not only in the fastest job growth since the 1990s; not only in strong GDP growth, export growth; but also a whole series of structural changes that we had begun way back in 2009 that were beginning to really bear fruit. 

Doubling the production of clean energy.  Ten times more solar power than we had.  Three times more wind power than we had.  Cutting carbon emissions.  High school graduation rates at an all-time high.  For younger students, reading and math scores showing appreciable gains.  Highest college enrollment that we had seen in a very long time. 

All these issues that had affected a lot of people for a long time finally began to pay off.  And, obviously, one of the most striking examples was health care, where despite all the battles back and forth in Washington, after a year we’ve seen more than 10 million people have affordable health insurance –- high-quality health insurance for the first time, in some cases, in their lives.  (Applause.)

And so the question I posed at the State of the Union was, how do we sustain this momentum and drive it in such a way that the overall growth that we’re seeing, the aggregate GDP numbers, the improved stock market –- that all of that begins to now manifest itself in hard-working families feeling a little bit more secure, feeling a little bit more hopeful, seeing more ladders of opportunity for young people?  How do we make sure that our prosperity is broad-based?  How do we make sure that incomes and wages start going up for folks?  How do we make sure that a young family is able to manage child care costs and save for college and save for retirement?  And if somebody gets sick, are they able to stay home, or if their child is sick, without losing a day’s pay?  How do we make sure that minimum-wage workers are getting paid enough that they’re not in poverty if they’re working full-time?  How do we build on the progress that we’ve made around clean energy to actually tackle the global challenge of climate change, and do it in a way that produces jobs and spurs on economic development?  How do we keep ourselves safe while still being true to our values?

And the good news is, is that we actually have pretty good answers for all of these challenges.  They’re not easy.  In some cases, it requires sacrifice.  In some cases, it requires investments today that will pay off 10 years from now, or 20 years from now, or 50 years from now.  But we know what to do, and the question is, is our politics up to the task?  And that’s where all of you come in. 

We had a very challenging midterm, despite good news, in part because two-thirds almost of eligible voters didn’t vote.  And part of the challenge is that people have felt so cynical about government for so long, and the gridlock in Washington has been so fierce, that at a certain point, people just opt out.

And one of the things I am absolutely determined to do over the next two years is not just consolidate the gains that we’ve made, not just move forward on new initiatives like free community colleges for young people around the country who need to be trained for the 21st-century economy, but part of my goal is also to restore a sense of possibility in our politics and our government.  And in some cases, that means challenging folks who are practicing the worst kind of cynical politics, and a politics based on fear rather than hope.  In some cases, it’s going to be finding areas of cooperating with Republicans.  In either case, we’re going to need people like you to support these ongoing efforts. 

I’ve only got two years left, but two years is a long time.  And two years is also the time in which we’re going to be setting the stage for the next presidential election and the next 10 years of American policy.  And so I intend to run through the tape and work really hard, and squeeze every last little bit of change and improvement in the lives of ordinary Americans and middle-class families that I can.  But I can’t do it alone.  And that’s why your support for the DNC is so greatly appreciated.  And for those of you who have been there every step of the way, I just want to say thank you. 

Thanks, everybody.  (Applause.)

END
4:38 P.M. PST

The White House

Office of the Press Secretary

Statement by NSC Spokesperson Bernadette Meehan on Recent Attacks in West Africa

The United States strongly condemns the recent Boko Haram atrocities committed against innocent civilians in Nigeria as well as in Chad, Niger, and Cameroon.  We offer our deepest condolences to the victims, their families, and to those who have been displaced by these cruel acts, and we reiterate our support for these countries’ efforts to fight Boko Haram in a manner that respects human rights and the rule of law. We also applaud progress toward the establishment of a Multi-National Joint Task Force, which entails a promising regional approach to a regional challenge. We believe that swift action to support and operationalize such a task force will prove vital to protecting civilians and enhancing security throughout the region, and the United States will continue to support bilateral and multilateral initiatives to counter Boko Haram.

The White House

Office of the Press Secretary

Remarks by the President at the Cybersecurity and Consumer Protection Summit

Stanford University
Stanford, California

11:33 A.M. PST

THE PRESIDENT:  Hello, Stanford!  (Applause.)  Thank you so much.  Thank you.  Thank you, everybody.  Have a seat.  Have a seat. 

AUDIENCE MEMBER:  Yes, we can!

THE PRESIDENT:  Yes, we can!  (Applause.) 

First of all, let me thank President Hennessy for not just the introduction but for your outstanding leadership at one of the great universities of the world.  (Applause.)  I’ve got to admit, like, I kind of want to go here.  (Laughter and applause.)  I was trying to figure out why it is that a really nice place like this is wasted on young people -- (laughter) -- who don’t fully appreciate what you got.  It’s really nice.  And everybody here is so friendly and smart, and it’s beautiful.  And what’s there not to like?

I want to thank you and everyone at Stanford for hosting this summit, especially Amy Zegart, George Triantis, and someone who served as a great advisor to me at the White House and as an outstanding ambassador to Russia before coming back to The Farm -- Mike McFaul.  (Applause.)

It is great to be here at Leland Stanford Junior University.  And I’m pleased to be joined by members of my team who bleed Cardinal red.  We’re infiltrated with Stanford people.  We’ve got Senior Advisor Valerie Jarrett, National Security Advisor Susan Rice, Secretary of Commerce Penny Pritzker.  (Applause.)  And, let’s face it, I like Stanford grads.  I noticed Steve Chu was around here, who helped lead our Energy Department for a while.  (Applause.)  And he’s now hanging out.  I’m also pleased to be joined by other members of my Cabinet -- our Secretary of Homeland Security Jeh Johnson is here, and our Small Business Administrator, Maria Contreras-Sweet.  And I want to acknowledge my tireless Homeland Security Advisor who helped, and continues to shape, our cybersecurity efforts -- Lisa Monaco.  (Applause.)  Thank you, Lisa.  

So I’d always heard about this campus, and everybody is riding bikes, and people hopping into fountains -- (laughter) -- and the current holder of The Axe.  (Applause.)  This is the place that made “nerd” cool.  (Laughter.)  I was thinking about wearing some black-rimmed glasses, some tape in the middle, but I guess that’s not what you do anymore.  Ambassador McFaul told me if I came to Stanford, you’d “talk nerdy to me.”  (Laughter.)   

But I’m not just here to enjoy myself.  As we gather here today, America is seeing incredible progress that we can all be proud of.  We just had the best year of job growth since the 1990s.  (Applause.)  Over the past 59 months, our businesses have created nearly 12 million new jobs, which is the longest streak of private sector job growth on record.  And in a hopeful sign for middle-class families, wages are beginning to rise again.

And, meanwhile, we’re doing more to prepare our young people for a competitive world.  Our high school graduation rate has hit an all-time high.  More Americans are finishing college than ever before.  Here at Stanford and across the country, we’ve got the best universities, we’ve got the best scientists, the best researchers in the world.  We’ve got the most dynamic economy in the world.  And no place represents that better than this region.  So make no mistake, more than any other nation on Earth, the United States is positioned to lead in the 21st century. 

And so much of our economic competitiveness is tied to what brings me here today, and that is America’s leadership in the digital economy.  It’s our ability -- almost unique across the planet -- our ability to innovate and to learn, and to discover, and to create, and build, and do business online, and stretch the boundaries of what’s possible.  That’s what drives us.  And so when we had to decide where to have this summit, the decision was easy, because so much of our Information Age began right here, at Stanford.   

It was here where two students, Bill Hewlett and Dave Packard, met and then, in a garage not far from here, started a company that eventually built one of the first personal computers, weighing in at 40 pounds.  (Laughter.)  It was from here, in 1968, where a researcher, Douglas Englebart, astonished an audience with two computers, connected “online,” and hypertext you could click on with something called a “mouse.” 

A year later, a computer here received the first message from another computer 350 miles away -- the beginnings of what would become the Internet.  And, by the way, it’s no secret that many of these innovations built on government-funded research is one of the reasons that if we want to maintain our economic leadership in the world, America has to keep investing in basic research in science and technology.  It's absolutely critical.  (Applause.)

So here at Stanford, pioneers developed the protocols and architecture of the Internet, DSL, the first webpage in America, innovations for cloud computing.  Student projects here became Yahoo and Google.  Those were pretty good student projects.  (Laughter.)  Your graduates have gone on to help create and build thousands of companies that have shaped our digital society -- from Cisco to Sun Microsystems, YouTube to Instagram, StubHub, Bonobos.  According to one study, if all the companies traced back to Stanford graduates formed their own nation, you’d be one the largest economies in the world and have a pretty good football team as well.  (Laughter and applause.)

And today, with your cutting-edge research programs and your new cyber initiatives, you’re helping us navigate some of the most complicated cyber challenges that we face as a nation.  And that’s why we’re here.  I want to thank all of you who have joined us today -- members of Congress, representatives from the private sector, government, academia, privacy and consumer groups, and especially the students who are here.  Just as we’re all connected like never before, we have to work together like never before, both to seize opportunities but also meet the challenges of this Information Age. 

And it’s one of the great paradoxes of our time that the very technologies that empower us to do great good can also be used to undermine us and inflict great harm.  The same information technologies that help make our military the most advanced in the world are targeted by hackers from China and Russia who go after our defense contractors and systems that are built for our troops.  The same social media we use in government to advocate for democracy and human rights around the world can also be used by terrorists to spread hateful ideologies.  So these cyber threats are a challenge to our national security. 

Much of our critical infrastructure -- our financial systems, our power grid, health systems -- run on networks connected to the Internet, which is hugely empowering but also dangerous, and creates new points of vulnerability that we didn’t have before.  Foreign governments and criminals are probing these systems every single day.  We only have to think of real-life examples -- an air traffic control system going down and disrupting flights, or blackouts that plunge cities into darkness -- to imagine what a set of systematic cyber attacks might do.  So this is also a matter of public safety.
 
As a nation, we do more business online than ever before -- trillions of dollars a year.  And high-tech industries, like those across the Valley, support millions of American jobs.  All this gives us an enormous competitive advantage in the global economy.  And for that very reason, American companies are being targeted, their trade secrets stolen, intellectual property ripped off.  The North Korean cyber attack on Sony Pictures destroyed data and disabled thousands of computers, and exposed the personal information of Sony employees.  And these attacks are hurting American companies and costing American jobs.  So this is also a threat to America’s economic security.

As consumers, we do more online than ever before.  We manage our bank accounts.  We shop.  We pay our bills.  We handle our medical records.  And as a country, one of our greatest resources are the young people who are here today --digitally fearless and unencumbered by convention, and uninterested in old debates.  And they’re remaking the world every day.  But it also means that this problem of how we secure this digital world is only going to increase. 

I want more Americans succeeding in our digital world.  I want young people like you to unleash the next waves of innovation, and launch the next startups, and give Americans the tools to create new jobs and new businesses, and to expand connectivity in places that we currently can't imagine, to help open up new world and new experiences and empower individuals in ways that would seem unimaginable 10, 15, 20 years ago. 

And that’s why we’re working to connect 99 percent of America’s students to high-speed Internet -- because when it comes to educating our children, we can’t afford any digital divides.  It’s why we’re helping more communities get across to the next generation of broadband faster, with cheaper Internet, so that students and entrepreneurs and small businesses across America, not just in pockets of America, have the same opportunities to learn and compete as you do here in the Valley.  It’s why I’ve come out so strongly and publicly for net neutrality, for an open and free Internet -- (applause) -- because we have to preserve one of the greatest engines for creativity and innovation in human history.

So our connectivity brings extraordinary benefits to our daily lives, but it also brings risks.  And when companies get hacked, Americans’ personal information, including their financial information, gets stolen.  Identity theft can ruin your credit rating and turn your life upside down.  In recent breaches, more than 100 million Americans had their personal data compromised, including, in some cases, credit card information.  We want our children to go online and explore the world, but we also want them to be safe and not have their privacy violated.  So this is a direct threat to the economic security of American families, not just the economy overall, and to the wellbeing of our children, which means we’ve got to put in place mechanisms to protect them.

So shortly after I took office, before I had gray hair -- (laughter) -- I said that these cyber threats were one of the most serious economic national security challenges that we face as a nation, and I made confronting them a priority.  And given the complexity of these threats, I believe we have to be guided by some basic principles.  So let me share those with you today.

First, this has to be a shared mission.  So much of our computer networks and critical infrastructure are in the private sector, which means government cannot do this alone.  But the fact is that the private sector can’t do it alone either, because it’s government that often has the latest information on new threats.  There’s only one way to defend America from these cyber threats, and that is through government and industry working together, sharing appropriate information as true partners.  

Second, we have to focus on our unique strengths.  Government has many capabilities, but it’s not appropriate or even possible for government to secure the computer networks of private businesses.  Many of the companies who are here today are cutting-edge, but the private sector doesn’t always have the capabilities needed during a cyber attack, the situational awareness, or the ability to warn other companies in real time, or the capacity to coordinate a response across companies and sectors.  So we’re going to have to be smart and efficient and focus on what each sector does best, and then do it together.

Third, we’re going to have to constantly evolve.  The first computer viruses hit personal computers in the early 1980s, and essentially, we’ve been in a cyber arms race ever since.  We design new defenses, and then hackers and criminals design new ways to penetrate them.  Whether it’s phishing or botnets, spyware or malware, and now ransomware, these attacks are getting more and more sophisticated every day.  So we’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.  

And fourth, and most importantly, in all our work we have to make sure we are protecting the privacy and civil liberty of the American people.  And we grapple with these issues in government.  We’ve pursued important reforms to make sure we are respecting peoples’ privacy as well as ensuring our national security.  And the private sector wrestles with this as well.  When consumers share their personal information with companies, they deserve to know that it’s going to be protected.  When government and industry share information about cyber threats, we’ve got to do so in a way that safeguards your personal information.  When people go online, we shouldn’t have to forfeit the basic privacy we’re entitled to as Americans. 

In recent years, we’ve worked to put these principles into practice.  And as part of our comprehensive strategy, we’ve boosted our defenses in government, we’re sharing more information with the private sector to help those companies defend themselves, we’re working with industry to use what we call a Cybersecurity Framework to prevent, respond to, and recover from attacks when they happen.

And, by the way, I recently went to the National Cybersecurity Communications Integration Center, which is part of the Department of Homeland Security, where representatives from government and the private sector monitor cyber threats 24/7.  And so defending against cyber threats, just like terrorism or other threats, is one more reason that we are calling on Congress, not to engage in politics -- this is not a Republican or Democratic issue -- but work to make sure that our security is safeguarded and that we fully fund the Department of Homeland Security, because it has great responsibilities in this area.

So we’re making progress, and I’ve recently announced new actions to keep up this momentum.  We’ve called for a single national standard so Americans know within 30 days if your information has been stolen.  This month, we’ll be proposing legislation that we call a Consumer Privacy Bill of Rights to give Americans some baseline protections, like the right to decide what personal data companies collect from you, and the right to know how companies are using that information.  We’ve proposed the Student Digital Privacy Act, which is modeled on the landmark law here in California -- because today’s amazing educational technologies should be used to teach our students and not collect data for marketing to students.

And we’ve also taken new steps to strengthen our cybersecurity -- proposing new legislation to promote greater information sharing between government and the private sector, including liability protections for companies that share information about cyber threats.  Today, I’m once again calling on Congress to come together and get this done.

And this week, we announced the creation of our new Cyber Threat Intelligence Integration Center.  Just like we do with terrorist threats, we’re going to have a single entity that’s analyzing and integrating and quickly sharing intelligence about cyber threats across government so we can act on all those threats even faster.
 
And today, we’re taking an additional step -- which is why there’s a desk here.  You were wondering, I'm sure.  (Laughter.)  I’m signing a new executive order to promote even more information sharing about cyber threats, both within the private sector and between government and the private sector.  And it will encourage more companies and industries to set up organizations -- hubs -- so you can share information with each other.  It will call for a common set of standards, including protections for privacy and civil liberties, so that government can share threat information with these hubs more easily.  And it can help make it easier for companies to get the classified cybersecurity threat information that they need to protect their companies.

I want to acknowledge, by the way, that the companies who are represented here are stepping up as well.  The Cyber Threat Alliance, which includes companies like Palo Alto Networks and Symantec, are going to work with us to share more information under this new executive order.  You’ve got companies from Apple to Intel, from Bank of America to PG&E, who are going to use the Cybersecurity Framework to strengthen their own defenses.  As part of our BuySecure Initiative, Visa and MasterCard and American Express and others are going to make their transactions more secure.  Nationstar is joining companies that are giving their companies [customers] another weapon to battle identity theft, and that's free access to their credit scores. 
And more companies are moving to new, stronger technologies to authenticate user identities, like biometrics -- because it’s just too easy for hackers to figure out usernames and passwords, like “password.”  (Laughter.)  Or “12345 -- (laughter) -- 7.”  (Laughter.)  Those are some of my previous passwords.  (Laughter.)  I've changed them since then.  (Applause.)   

So this summit is an example of what we need more of -- all of us working together to do what none of us can achieve alone.  And it is difficult.  Some of the challenges I’ve described today have defied solutions for years.  And I want to say very clearly that, as somebody who is a former constitutional law teacher, and somebody who deeply values his privacy and his family’s privacy -- although I chose the wrong job for that -- (laughter) -- but will be a private citizen again, and cares deeply about this -- I have to tell you that grappling with how government protects the American people from adverse events while, at the same time, making sure that government itself is not abusing its capabilities is hard. 

The cyber world is sort of the wild, wild West.  And to some degree, we're asked to be the sheriff.  When something like Sony happens, people want to know what can government do about this.  If information is being shared by terrorists in the cyber world and an attack happens, people want to know are there ways of stopping that from happening.  By necessity, that means government has its own significant capabilities in the cyber world.  But then people, rightly, ask, well, what safeguards do we have against government intruding on our own privacy?  And it's hard, and it constantly evolves because the technology so often outstrips whatever rules and structures and standards have been put in place, which means that government has to be constantly self-critical and we have to be able to have an open debate about it.   

But we’re all here today because we know that we're going to have to break through some of these barriers that are holding us back if we are going to continue to thrive in this remarkable new world.  We all know what we need to do.  We have to build stronger defenses and disrupt more attacks.  We have to make cyberspace safer.  We have to improve cooperation across the board.  And, by the way, this is not just here in America, but internationally -- which also, by the way, makes things complicated because a lot of countries don't necessarily share our investment -- or our commitment to openness, and we have to try to navigate that.

But this should not be an ideological issue.  And that’s one thing I want to emphasize:  This is not a Democratic issue, or a Republican issue.  This is not a liberal or conservative issue.  Everybody is online, and everybody is vulnerable.  The business leaders here want their privacy and their children protected, just like the consumer and privacy advocates here want America to keep leading the world in technology and be safe from attacks.  So I’m hopeful that through this forum and the work that we do subsequently, that we're able to generate ideas and best practices, and that the work of this summit can help guide our planning and execution for years to come. 

After all, we are just getting started.  Think about it.  Tim Berners-Lee, from his lab in Switzerland, invented the World Wide Web in 1989, which was only 26 years ago.  The great epochs in human history -- the Bronze Age, Iron Age, Agricultural Revolution, Industrial Revolution -- they spanned centuries.  We’re only 26 years into this Internet Age.  We’ve only scratched the surface.  And as I guess they say at Google, “The future is awesome.”  (Laughter.)  We haven’t even begun to imagine the discoveries and innovations that are going to be unleashed in the decades to come.  But we know how we’ll get there. 

Reflecting on his work in the 1960s on ARPANET, the precursor of the Internet, the late Paul Baran said this:  “The process of technological developments is like building a cathedral.  Over the course of several hundred years, new people come along and each lays down a block on top of the old foundations, each saying, ‘I built the cathedral.’  And then comes along an historian who asks, ‘Well, who built the cathedral?’”  And Baran said, “If you’re not careful, you can con yourself into believing that you did the most important part.  But the reality is that each contribution has to follow on to previous work.  Everything is tied to everything else.”

Everything is tied to everything else.  The innovations that first appeared on this campus all those decades ago -- that first mouse, that first message -- helped lay a foundation.  And in the decades since, on campuses like this, in companies like those that are represented here, new people have come along, each laying down a block, one on top of the other.  And when future historians ask who built this Information Age, it won’t be any one of us who did the most important part alone.  The answer will be, “We all did, as Americans.” 

And I’m absolutely confident that if we keep at this, if we keep working together in a spirit of collaboration, like all those innovators before us, our work will endure, like a great cathedral, for centuries to come.  And that cathedral will not just be about technology, it will be about the values that we’ve embedded in the architecture of this system.  It will be about privacy, and it will be about community.  And it will be about connection.  What a magnificent cathedral that all of you have helped to build.  We want to be a part of that, and we look forward to working with you in the future.

Thank you for your partnership.  With that, I’m going to sign this executive order.  Thank you.  (Applause.) 

END
12:03 P.M. PST

The White House

Office of the Press Secretary

Executive Order -- Promoting Private Sector Cybersecurity Information Sharing

EXECUTIVE ORDER

- - - - - - -

PROMOTING PRIVATE SECTOR CYBERSECURITY INFORMATION SHARING

By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby ordered as follows:

Section 1. Policy. In order to address cyber threats to public health and safety, national security, and economic security of the United States, private companies, nonprofit organizations, executive departments and agencies (agencies), and other entities must be able to share information related to cybersecurity risks and incidents and collaborate to respond in as close to real time as possible.

Organizations engaged in the sharing of information related to cybersecurity risks and incidents play an invaluable role in the collective cybersecurity of the United States. The purpose of this order is to encourage the voluntary formation of such organizations, to establish mechanisms to continually improve the capabilities and functions of these organizations, and to better allow these organizations to partner with the Federal Government on a voluntary basis.

Such information sharing must be conducted in a manner that protects the privacy and civil liberties of individuals, that preserves business confidentiality, that safeguards the information being shared, and that protects the ability of the Government to detect, investigate, prevent, and respond to cyber threats to the public health and safety, national security, and economic security of the United States.

This order builds upon the foundation established by Executive Order 13636 of February 12, 2013 (Improving Critical Infrastructure Cybersecurity), and Presidential Policy Directive-21 (PPD-21) of February 12, 2013 (Critical Infrastructure Security and Resilience).

Policy coordination, guidance, dispute resolution, and periodic in-progress reviews for the functions and programs described and assigned herein shall be provided through the interagency process established in Presidential Policy Directive-l (PPD-l) of February 13, 2009 (Organization of the National Security Council System), or any successor.

Sec. 2. Information Sharing and Analysis Organizations. (a) The Secretary of Homeland Security (Secretary) shall strongly encourage the development and formation of Information Sharing and Analysis Organizations (ISAOs).

(b) ISAOs may be organized on the basis of sector, sub-sector, region, or any other affinity, including in response to particular emerging threats or vulnerabilities. ISAO membership may be drawn from the public or private sectors, or consist of a combination of public and private sector organizations. ISAOs may be formed as for-profit or nonprofit entities.

(c) The National Cybersecurity and Communications Integration Center (NCCIC), established under section 226(b) of the Homeland Security Act of 2002 (the "Act"), shall engage in continuous, collaborative, and inclusive coordination with ISAOs on the sharing of information related to cybersecurity risks and incidents, addressing such risks and incidents, and strengthening information security systems consistent with sections 212 and 226 of the Act.

(d) In promoting the formation of ISAOs, the Secretary shall consult with other Federal entities responsible for conducting cybersecurity activities, including Sector-Specific Agencies, independent regulatory agencies at their discretion, and national security and law enforcement agencies.

Sec. 3. ISAO Standards Organization. (a) The Secretary, in consultation with other Federal entities responsible for conducting cybersecurity and related activities, shall, through an open and competitive process, enter into an agreement with a nongovernmental organization to serve as the ISAO Standards Organization (SO), which shall identify a common set of voluntary standards or guidelines for the creation and functioning of ISAOs under this order. The standards shall further the goal of creating robust information sharing related to cybersecurity risks and incidents with ISAOs and among ISAOs to create deeper and broader networks of information sharing nationally, and to foster the development and adoption of automated mechanisms for the sharing of information. The standards will address the baseline capabilities that ISAOs under this order should possess and be able to demonstrate. These standards shall address, but not be limited to, contractual agreements, business processes, operating procedures, technical means, and privacy protections, such as minimization, for ISAO operation and ISAO member participation.

(b) To be selected, the SO must demonstrate the ability to engage and work across the broad community of organizations engaged in sharing information related to cybersecurity risks and incidents, including ISAOs, and associations and private companies engaged in information sharing in support of their customers.

(c) The agreement referenced in section 3(a) shall require that the SO engage in an open public review and comment process for the development of the standards referenced above, soliciting the viewpoints of existing entities engaged in sharing information related to cybersecurity risks and incidents, owners and operators of critical infrastructure, relevant agencies, and other public and private sector stakeholders.

(d) The Secretary shall support the development of these standards and, in carrying out the requirements set forth in this section, shall consult with the Office of Management and Budget, the National Institute of Standards and Technology in the Department of Commerce, Department of Justice, the Information Security Oversight Office in the National Archives and Records Administration, the Office of the Director of National Intelligence, Sector-Specific Agencies, and other interested Federal entities. All standards shall be consistent with voluntary international standards when such international standards will advance the objectives of this order, and shall meet the requirements of the National Technology Transfer and Advancement Act of 1995 (Public Law 104-113), and OMB Circular A-119, as revised.

Sec. 4. Critical Infrastructure Protection Program. (a) Pursuant to sections 213 and 214(h) of the Critical Infrastructure Information Act of 2002, I hereby designate the NCCIC as a critical infrastructure protection program and delegate to it authority to enter into voluntary agreements with ISAOs in order to promote critical infrastructure security with respect to cybersecurity.

(b) Other Federal entities responsible for conducting cybersecurity and related activities to address threats to the public health and safety, national security, and economic security, consistent with the objectives of this order, may participate in activities under these agreements.

(c) The Secretary will determine the eligibility of ISAOs and their members for any necessary facility or personnel security clearances associated with voluntary agreements in accordance with Executive Order 13549 of August 18, 2010 (Classified National Security Information Programs for State, Local, Tribal, and Private Sector Entities), and Executive Order 12829 of January 6, 1993 (National Industrial Security Program), as amended, including as amended by this order.

Sec. 5. Privacy and Civil Liberties Protections. (a) Agencies shall coordinate their activities under this order with their senior agency officials for privacy and civil liberties and ensure that appropriate protections for privacy and civil liberties are incorporated into such activities. Such protections shall be based upon the Fair Information Practice Principles and other privacy and civil liberties policies, principles, and frameworks as they apply to each agency's activities.

(b) Senior privacy and civil liberties officials for agencies engaged in activities under this order shall conduct assessments of their agency's activities and provide those assessments to the Department of Homeland Security (DHS) Chief Privacy Officer and the DHS Office for Civil Rights and Civil Liberties for consideration and inclusion in the Privacy and Civil Liberties Assessment report required under Executive Order 13636.

Sec. 6. National Industrial Security Program. Executive Order 12829, as amended, is hereby further amended as follows:

(a) the second paragraph is amended by inserting "the Intelligence Reform and Terrorism Prevention Act of 2004," after "the National Security Act of 1947, as amended,";

(b) Sec. 101(b) is amended to read as follows: "The National Industrial Security Program shall provide for the protection of information classified pursuant to Executive Order 13526 of December 29, 2009, or any predecessor or successor order, and the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.).";

(c) Sec. 102(b) is amended by replacing the first paragraph with: "In consultation with the National Security Advisor, the Director of the Information Security Oversight Office, in accordance with Executive Order 13526 of December 29, 2009, shall be responsible for implementing and monitoring the National Industrial Security Program and shall:";

(d) Sec. 102(c) is amended to read as follows: "Nothing in this order shall be construed to supersede the authority of the Secretary of Energy or the Nuclear Regulatory Commission under the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.), or the authority of the Director of National Intelligence (or any Intelligence Community element) under the Intelligence Reform and Terrorism Prevention Act of 2004, the National Security Act of 1947, as amended, or Executive Order 12333 of December 8, 1981, as amended, or the authority of the Secretary of Homeland Security, as the Executive Agent for the Classified National Security Information Program established under Executive Order 13549 of August 18, 2010 (Classified National Security Information Program for State, Local, Tribal, and Private Sector Entities).";

(e) Sec. 201(a) is amended to read as follows: "The Secretary of Defense, in consultation with all affected agencies and with the concurrence of the Secretary of Energy, the Nuclear Regulatory Commission, the Director of National Intelligence, and the Secretary of Homeland Security, shall issue and maintain a National Industrial Security Program Operating Manual (Manual). The Secretary of Energy and the Nuclear Regulatory Commission shall prescribe and issue that portion of the Manual that pertains to information classified under the Atomic Energy Act of 1954, as amended (42 U.S.C. 2011 et seq.). The Director of National Intelligence shall prescribe and issue that portion of the Manual that pertains to intelligence sources and methods, including Sensitive Compartmented Information. The Secretary of Homeland Security shall prescribe and issue that portion of the Manual that pertains to classified information shared under a designated critical infrastructure protection program.";

(f) Sec. 201(f) is deleted in its entirety;

(g) Sec. 201(e) is redesignated Sec. 201(f) and revised by substituting "Executive Order 13526 of December 29, 2009, or any successor order," for "Executive Order No. 12356 of April 2, 1982.";

(h) Sec. 201(d) is redesignated Sec. 201(e) and revised by substituting "the Director of National Intelligence, and the Secretary of Homeland Security" for "and the Director of Central Intelligence.";

(i) a new Sec. 201(d) is inserted after Sec. 201(c) to read as follows: "The Manual shall also prescribe arrangements necessary to permit and enable secure sharing of classified information under a designated critical infrastructure protection program to such authorized individuals and organizations as determined by the Secretary of Homeland Security.";

(j) Sec. 202(b) is amended to read as follows: "The Director of National Intelligence retains authority over access to intelligence sources and methods, including Sensitive Compartmented Information. The Director of National Intelligence may inspect and monitor contractor, licensee, and grantee programs and facilities that involve access to such information or may enter into written agreements with the Secretary of Defense, as Executive Agent, or with the Director of the Central Intelligence Agency to inspect and monitor these programs or facilities, in whole or in part, on the Director's behalf.";

(k) Sec. 202(d) is redesignated as Sec. 202(e); and

(l) in Sec. 202 a new subsection (d) is inserted after subsection (c) to read as follows: "The Secretary of Homeland Security may determine the eligibility for access to Classified National Security Information of contractors, licensees, and grantees and their respective employees under a designated critical infrastructure protection program, including parties to agreements with such program; the Secretary of Homeland Security may inspect and monitor contractor, licensee, and grantee programs and facilities or may enter into written agreements with the Secretary of Defense, as Executive Agent, or with the Director of the Central Intelligence Agency, to inspect and monitor these programs or facilities in whole or in part, on behalf of the Secretary of Homeland Security."

Sec. 7. Definitions. (a) "Critical infrastructure information" has the meaning given the term in section 212(3) of the Critical Infrastructure Information Act of 2002.

(b) "Critical infrastructure protection program" has the meaning given the term in section 212(4) of the Critical Infrastructure Information Act of 2002.

(c) "Cybersecurity risk" has the meaning given the term in section 226(a)(1) of the Homeland Security Act of 2002 (as amended by the National Cybersecurity Protection Act of 2014).

(d) "Fair Information Practice Principles" means the eight principles set forth in Appendix A of the National Strategy for Trusted Identities in Cyberspace.

(e) "Incident" has the meaning given the term in section 226(a)(2) of the Homeland Security Act of 2002 (as amended by the National Cybersecurity Protection Act of 2014).

(f) "Information Sharing and Analysis Organization" has the meaning given the term in section 212(5) of the Critical Infrastrucure Information Act of 2002.

(g) "Sector-Specific Agency" has the meaning given the term in PPD-21, or any successor.

Sec. 8. General Provisions. (a) Nothing in this order shall be construed to impair or otherwise affect:

(i) the authority granted by law or Executive Order to an agency, or the head thereof; or

(ii) the functions of the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals.

(b) This order shall be implemented consistent with applicable law and subject to the availability of appropriations. Nothing in this order shall be construed to alter or limit any authority or responsibility of an agency under existing law including those activities conducted with the private sector relating to criminal and national security threats. Nothing in this order shall be construed to provide an agency with authority for regulating the security of critical infrastructure in addition to or to a greater extent than the authority the agency has under existing law.

(c) All actions taken pursuant to this order shall be consistent with requirements and authorities to protect intelligence and law enforcement sources and methods.

(d) This order is not intended to, and does not, create any right or benefit, substantive or procedural, enforceable at law or in equity by any party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person.

BARACK OBAMA

The White House

Office of the Press Secretary

G-7 Leaders Statement on Ukraine

We, the leaders of Canada, France, Germany, Italy, Japan, the United Kingdom, the United States, the President of the European Council and the President of the European Commission welcome the “Package of Measures for the Implementation of the Minsk Agreements” adopted by their original signatories on 12th February 2015 in Minsk. Implementation of the “Minsk Package” offers a way forward to a comprehensive, sustainable, and peaceful resolution to the crisis in eastern Ukraine.

However, the G7 remains concerned about the situation in Ukraine, in particular in view of the fighting around Debaltseve where Russian-backed separatist militias are operating beyond the line of contact agreed upon in the Minsk agreements of September 2014, causing numerous civilian casualties. We urge all sides to adhere strictly to the provisions of the Package and to carry out its measures without delay, starting with a ceasefire on the 15th of February. All parties should refrain from actions in the coming days that would hinder the start of the ceasefire. The G7 stands ready to adopt appropriate measures against those who violate the “Minsk package” and therefore intensify the costs for them, in particular against those who do not observe the agreed comprehensive ceasefire and withdrawal of heavy weapons.

We again condemn Russia's illegal annexation of Crimea which is in violation of international law.

The G7 welcomes the agreement in principle reached on the 12th of February by the IMF and the government of Ukraine on a new economic reform program that will be supported by an IMF Extended Fund Facility. The G7 members look forward to prompt consideration of the program by the IMF Executive Board. We are providing financial assistance to support Ukraine. This international assistance will help Ukraine in the ambitious economic reforms it is undertaking to restore economic growth and improve the living standards of the Ukrainian people. We commend the government of Ukraine for its commitment to implement this ambitious reform agenda with regard to economic, rule-of-law, and democratic reforms.