/regulations

Clean Air Act Regulations for Energy / Utilities in Michigan

Explore Michigan's Clean Air Act regulations impacting the energy and utilities sector for compliance and environmental standards.

Contact Us

Reviewed by Jeff Harms

Director, Advisory Services at OCD tech

Updated June, 19

Michigan Clean Air Act Main Criteria for Energy / Utilities

Explore Michigan Clean Air Act's key energy and utilities criteria, ensuring compliance, emissions control, and sustainable environmental practices.

Michigan Grid Resilience Protection Requirements

  • Advanced threat monitoring systems must be deployed at all energy production facilities over 50MW capacity within Michigan's Upper Peninsula due to the region's isolated grid infrastructure and severe winter conditions
  • Utilities must maintain redundant communication channels that can operate independently of public telecommunications networks during emergency weather events specific to Great Lakes weather patterns
  • All SCADA systems must implement air-gapped backup capabilities that can be activated within 4 hours to maintain compliance with Michigan's Critical Infrastructure Protection supplement to the Clean Air Act

Emissions Monitoring Cybersecurity Standards

  • Continuous Emissions Monitoring Systems (CEMS) must implement tamper-evident logging that preserves data integrity even during power fluctuations common to Michigan's renewable-heavy grid composition
  • All emissions data transmission to MDEQ (Michigan Department of Environmental Quality) requires end-to-end encryption with Michigan-approved cryptographic standards that exceed federal guidelines
  • Biannual penetration testing of emissions reporting systems must be conducted with specific test cases for Michigan's seasonal industrial output variations

Regional Incident Response Requirements

  • Energy providers must maintain a 72-hour continuity plan specifically addressing cyber incidents during peak winter heating periods when natural gas demand exceeds regional pipeline capacity
  • Mandatory reporting of all security incidents to the Michigan Public Service Commission must occur within 6 hours, significantly stricter than federal timeframes
  • Annual tabletop exercises must simulate coordinated attacks targeting multiple Michigan utilities during extreme weather conditions

Cross-Border System Security

  • Energy facilities within 100 miles of Michigan's Canadian border must implement enhanced access controls for both physical and network infrastructure
  • Systems connecting to Ontario's Independent Electricity System Operator (IESO) must maintain separate authentication mechanisms from those used for Michigan operations
  • Cross-border data flows must be logged and audited monthly with reports available to both US and Canadian regulatory authorities

Supply Chain Security Standards

  • Critical component suppliers for Michigan utility infrastructure must maintain verified security certifications specific to the Great Lakes energy market
  • Utilities must conduct quarterly vulnerability assessments of operational technology from suppliers with facilities in Michigan's neighboring states
  • All third-party service providers must demonstrate compliance with Michigan-specific background check requirements for personnel accessing energy production or distribution systems

Legacy System Protection

  • Coal-to-natural gas converted plants common in Michigan's energy transition must implement specialized security controls to address vulnerabilities in hybrid control systems
  • Operators of facilities over 25 years old must develop Michigan-approved security isolation plans for systems that cannot be updated to current standards
  • Annual risk assessments must specifically address cyber-physical risks to aging infrastructure in Michigan's industrial corridors

Secure Your Business with Expert Cybersecurity & Compliance Today
Contact Us

Achieve Michigan Clean Air Act for Energy / Utilities with OCD Tech—Fast & Secure

Don’t let security gaps slow you down. Partner with OCD Tech’s seasoned cybersecurity experts to tailor a robust, framework-aligned protection plan. From uncovering hidden vulnerabilities to mapping controls against Clean Air Act, we’ll streamline your path to certification—and fortify your reputation.

What is...

What is Michigan Clean Air Act for Energy / Utilities

Michigan Clean Air Act for Energy/Utilities: A Cybersecurity Perspective

 

While Michigan follows the federal Clean Air Act, the state has its own implementation through Michigan's Natural Resources and Environmental Protection Act (NREPA), specifically Part 55, Air Pollution Control. For energy and utility companies operating in Michigan, this creates unique cybersecurity considerations.

 

Key Components of Michigan's Clean Air Regulations for Energy/Utilities

 

  • Michigan Air Emissions Reporting System (MAERS) - A digital platform where utilities must report emissions data that requires secure access controls and data integrity protections
  • Renewable Operating Permits (ROP) - Digital permit management for major sources of air pollution with sensitive compliance information that must be protected
  • Michigan Mercury Rule - Stricter than federal standards, requiring detailed emissions monitoring and reporting systems that must be secured against tampering
  • Michigan Air Pollution Control Rules - State-specific regulations that require automated monitoring systems which are potential attack vectors

 

Cybersecurity Risks Specific to Michigan Utilities Under Clean Air Regulations

 

  • Continuous Emissions Monitoring Systems (CEMS) - Required for Michigan power plants, these internet-connected systems could be compromised to falsify emissions data or disrupt operations
  • Industrial Control Systems (ICS) - Systems that control emissions reduction equipment are vulnerable to attacks that could cause environmental violations
  • MAERS Database Vulnerabilities - Michigan's centralized emissions reporting database contains sensitive operational data attractive to competitors or bad actors
  • Regional Transmission Organizations - Michigan utilities connected to MISO (Midcontinent Independent System Operator) face unique integration points between emissions monitoring and grid operations

 

Michigan-Specific Compliance Requirements

 

  • Michigan Department of Environment, Great Lakes, and Energy (EGLE) - Requires secure digital submission of quarterly emissions reports that must maintain data integrity
  • Michigan Electric Provider Renewable Energy Standard - Requires tracking and reporting of renewable energy credits through digital systems that must be secured
  • Michigan Carbon Dioxide Budget Trading Program - Creates requirements for secure emissions allowance tracking systems
  • Michigan Public Service Commission (MPSC) Regulations - Oversees integrated resource planning with sensitive operational data that must be protected

 

Common Attack Vectors for Michigan Utility Clean Air Systems

 

  • SCADA System Infiltration - Attackers may target the control systems for emissions control equipment to cause violations
  • Data Tampering - Manipulation of emissions data before submission to MAERS to hide violations or disrupt operations
  • Credential Theft - Targeting login credentials for Michigan's EGLE reporting platforms
  • Supply Chain Attacks - Compromising vendors who service emissions monitoring equipment at Michigan facilities
  • Ransomware - Encrypting emissions data right before Michigan's quarterly reporting deadlines to force ransom payments

 

Essential Cybersecurity Measures for Michigan Clean Air Compliance

 

  • Air Quality Monitoring Network Security - Implement encryption and access controls for all monitoring equipment reporting to Michigan EGLE
  • MAERS Submission Verification - Use digital signatures and multi-factor authentication when submitting reports to Michigan's system
  • Segmentation of Control Networks - Isolate emissions control systems from general business networks to prevent lateral movement by attackers
  • Backup Monitoring Systems - Maintain redundant systems to ensure continuous compliance with Michigan's continuous monitoring requirements
  • Incident Response Planning - Develop specific procedures for responding to attacks on emissions monitoring systems that include notification to Michigan EGLE

 

Regulatory Reporting Requirements During Cybersecurity Incidents

 

  • Michigan EGLE Notification - Required within 24 hours if cybersecurity incidents impact emissions monitoring capabilities
  • MPSC Reporting - May require notification if incidents affect critical utility infrastructure
  • Data Backup Requirements - Michigan regulations require utilities to maintain verifiable backups of emissions data
  • Alternative Monitoring Plans - Need to be filed with Michigan EGLE if primary monitoring systems are compromised

 

Practical Security Measures for Non-Technical Staff

 

  • Recognize Phishing Attempts - Train staff to identify emails attempting to steal MAERS or EGLE portal credentials
  • Report Unusual System Behavior - Establish clear protocols for reporting anomalies in emissions monitoring equipment
  • Secure Remote Access - Use VPNs and multi-factor authentication when accessing Michigan reporting systems remotely
  • Document Chain of Custody - Maintain records of who accesses and modifies emissions data before submission
  • Regular Training Updates - Keep staff informed of evolving Michigan regulatory requirements and associated security protocols

 

Michigan-Specific Resources and Contacts

 

  • Michigan EGLE Air Quality Division - Primary contact for reporting cybersecurity incidents affecting Clean Air Act compliance
  • Michigan Cyber Civilian Corps (MiC3) - Volunteer cybersecurity experts who can assist during major incidents
  • Michigan Intelligence Operations Center (MIOC) - Can provide threat intelligence specific to critical infrastructure in Michigan
  • Michigan Public Service Commission Critical Infrastructure Protection - Offers guidance on protecting utility systems

 

Read More

Looking for compliance insights across other regions, industries, and regulatory frameworks? Explore our collection of articles covering key compliance requirements and best practices tailored to different sectors and locations.

SOC 1

New Jersey

Legal / Accounting / Consulting

SOC 1 Regulations for Legal / Accounting / Consulting in New Jersey

Explore SOC 1 regulations for legal, accounting, and consulting firms in New Jersey to ensure compliance and secure client trust.

Learn More

SOC 2

New Jersey

Insurance

SOC 2 Regulations for Insurance in New Jersey

Explore SOC 2 regulations for insurance in New Jersey to ensure compliance and data security in the insurance industry.

Learn More

FERC Standards

Florida

Energy / Utilities

FERC Standards Regulations for Energy / Utilities in Florida

Explore FERC standards and regulations shaping Florida's energy and utilities sector for compliance and efficiency.

Learn More

RCRA

Texas

Energy / Utilities

RCRA Regulations for Energy / Utilities in Texas

Explore key RCRA regulations impacting Texas energy and utilities for compliance and environmental safety.

Learn More

CFATS

Texas

Energy / Utilities

CFATS Regulations for Energy / Utilities in Texas

Explore CFATS regulations for energy and utilities in Texas to ensure compliance and enhance facility security.

Learn More

ISO 13485

Florida

Pharmaceutical / Biotech / Medical Devices

ISO 13485 Regulations for Pharmaceutical / Biotech / Medical Devices in Florida

Explore ISO 13485 regulations for pharmaceutical, biotech, and medical devices in Florida to ensure compliance and quality management.

Learn More

Customized Cybersecurity Solutions For Your Business

Contact Us

Frequently asked questions

What services does OCD Tech provide?

OCD Tech offers a comprehensive suite of cybersecurity and IT assurance services, including SOC 2/3 and SOC for Cybersecurity reporting, IT vulnerability and penetration testing, privileged access management, social engineering assessments, virtual CISO (vCISO) support, IT general controls audits, WISP development, and compliance assistance for frameworks like CMMC, DFARS, and FTC Safeguards.

Which industries does OCD Tech serve?

OCD Tech specializes in serving highly regulated sectors such as financial services, government, higher education, auto dealerships, enterprise organizations, and not-for-profits throughout New England.

How long does an IT security assessment take?

Typically, OCD Tech’s on-site work spans 1–2 days, depending on complexity and number of sites, followed by 1–2 weeks of analysis and reporting to deliver clear, actionable recommendations.

Why should I get SOC 2 compliant?

SOC 2 reporting demonstrates to clients and prospects that an organization follows best-in-class controls over security, availability, processing integrity, confidentiality, and privacy—boosting trust, meeting RFP/due diligence requirements, and helping secure contracts. OCD Tech helps organizations achieve and maintain this compliance.

Can OCD Tech help me with federal cybersecurity regulations?

Yes—OCD Tech provides guidance for compliance with DFARS (NIST 800‑171), CMMC (Levels 1–3), and FTC Safeguards, ensuring organizations meet specific government or industry-based cybersecurity mandates.

What is a virtual CISO (vCISO), and do I need one?

A virtual CISO delivers strategic, executive-level cybersecurity leadership as a service. OCD Tech’s vCISO service is ideal for organizations lacking a full-time CISO and helps build programs, define policy, oversee risk, and guide security maturity.

Does OCD Tech offer ongoing security training or audits for staff?

Absolutely. OCD Tech provides tailored internal IT Audit training and security awareness sessions, plus annual reviews of Written Information Security Programs (WISP), such as Massachusetts 201 CMR 17 and other state or industry-specific controls.

Audit. Security. Assurance.

IT Audit | Cybersecurity | IT Assurance | IT Security Consultants – OCD Tech is a technology consulting firm serving the IT security and consulting needs of businesses in Boston (MA), Braintree (MA) and across New England. We primarily serve Fortune 500 companies including auto dealers, financial institutions, higher education, government contractors, and not-for-profit organizations with SOC 2 reporting, CMMC readiness, IT Security Audits, Penetration Testing and Vulnerability Assessments. We also provide dark web monitoring, DFARS compliance, and IT general controls review.

Contact Info

OCD Tech

25 BHOP, Suite 407, Braintree MA, 02184

844-623-8324

https://ocd-tech.com

Follow Us

Videos

Check Out the Latest Videos From OCD Tech!

Services

SOC Reporting Services
SOC 2 ® Readiness Assessment
SOC 2 ®
SOC 3 ®
SOC for Cybersecurity ®
IT Advisory Services
IT Vulnerability Assessment
Penetration Testing
Privileged Access Management
Social Engineering
WISP
General IT Controls Review
IT Government Compliance Services
CMMC
DFARS Compliance
FTC Safeguards vCISO

Industries

Financial Services
Government
Enterprise
Auto Dealerships