The US government has new laws on sharing data across departments

A digital themed isometric showing a neon padlock in the foreground, and a technological diagram of a processor logic board in the background.
(Image credit: Shutterstock / JLStock)

The White House just issued new guidance on how federal agencies should use the Traffic Light Protocol (TLP).

In an announcement posted on the White House website, the US government said it will follow TLP markings on cybersecurity information “voluntarily shared by an individual, company, or other any organization, when not in conflict with existing law or policy.”

“We adhere to these markings because trust in data handling is a key component of collaboration with our partners,” the announcement concludes.

Trust is pivotal

TLP is a set of rules the cybersecurity community follows, on what information can be shared, how, and with whom. It uses four color codes to distinguish who gets to read what:

Clear means information can be shared with anyone
Green means information should not be publicly accessible, but can be shared with peers and partners
Amber means information can be shared only with those who need to know about it, such as other members of an organization, or certain clients
Amber+Strict means information is for limited disclosure, only for certain people within an organization
Red should not be disclosed to anyone besides those who already know about it, without their permission

The Traffic Light Protocol (TLP) is important in cybersecurity because it provides a clear and standardized way to control the sharing and distribution of sensitive information. That way, all parties can make sure the data reaches only the intended audiences, without taking unnecessary risks. By categorizing information into levels of confidentiality, TLP helps prevent unauthorized access or exposure, which can reduce the risk of data leaks or security breaches.

Furthermore, it is important for building trust and collaboration within and between organizations, as participants can confidently share information with an understanding of how it should be handled. This protocol is especially crucial in incident response, intelligence sharing, and collaborative cybersecurity efforts where discretion is needed to protect both sensitive information and the individuals or organizations involved.

More from TechRadar Pro

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
An American flag flying outside the US Capitol building against a blue sky
White House unveils "US Cyber Trust Mark" to help determine if your devices are secure
A wall of data on a large screen.
“It's the same doors that the good guys use, that the bad guys can walk through” - former White House tech advisor on data-centric security in the wake of Salt Typhoon
Digital US flag
Biden orders review, new rules governing US national cybersecurity
US President Donald Trump speaks to the press as he signs an executive order to create a US sovereign wealth fund, in the Oval Office of the White House on February 3, 2025, in Washington, DC.
The US privacy nightmare? What's changed after 30 days of President Trump's new administration
Criminals are abusing top-level government domains across multiple countries
IT
US government says companies are no longer allowed to send bulk data to these nations
Latest in Security
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple H3C Magic routers hit by critical severity remote command injection, with no fix in sight
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Latest in News
Samsung Galaxy S25 from the front
The Now Bar on Samsung One UI 7 is about to get a lot more useful – and could soon match Live Activities on iOS
Marvel Rivals
Marvel Rivals will get two new hero skins for Moon Knight and Black Panther this week meaning I'll now need to farm even more Units
Netflix Ads
Netflix adds HDR10+ support – great news for Samsung TV owners, but don't expect LG and Sony to do the same any time soon
Klipsch Klipschorn AK7 in a room with lots of dark wood furniture and a bare brick wall
Klipsch just updated two of its most iconic stereo speaker designs, keeping these beautiful retro icons on your most-wanted list
FiiO FX17 IEMs
Our favorite budget audiophile brand unveils wired earbuds with 26(!) drivers, electrostatic units, USB-C ultra-Hi-Res Audio, and a not-so-budget price
Nvidia RTX 5080 against a yellow TechRadar background
RTX 5080 24GB version teased by MSI - is it time to admit that 16GB isn't enough for 4K?