10 U.S. Code § 393 - Reporting on penetrations of networks and information systems of certain contractors

(a) Procedures for Reporting Penetrations.—
The Secretary of Defense shall establish procedures that require each cleared defense contractor to report to a component of the Department of Defense designated by the Secretary for purposes of such procedures when a network or information system of such contractor that meets the criteria established pursuant to subsection (b) is successfully penetrated.
(b) Networks and Information Systems Subject to Reporting.—
(1) Criteria.—
The Secretary of Defense shall designate a senior official to, in consultation with the officials specified in paragraph (2), establish criteria for covered networks to be subject to the procedures for reporting system penetrations under subsection (a).
(2) Officials.—The officials specified in this subsection are the following:
(A)
The Under Secretary of Defense for Policy.
(B)
The Under Secretary of Defense for Acquisition and Sustainment.
(C)
the Under Secretary of Defense for Research and Engineering.
(D)
The Under Secretary of Defense for Intelligence and Security [1]
(E)
The Chief Information Officer of the Department of Defense.
(F)
The Commander of the United States Cyber Command.
(c) Procedure Requirements.—
(1) Rapid reporting.—The procedures established pursuant to subsection (a) shall require each cleared defense contractor to rapidly report to a component of the Department of Defense designated pursuant to subsection (a) of each successful penetration of the network or information systems of such contractor that meet the criteria established pursuant to subsection (b). Each such report shall include the following:
(A)
A description of the technique or method used in such penetration.
(B)
A sample of the malicious software, if discovered and isolated by the contractor, involved in such penetration.
(C)
A summary of information created by or for the Department in connection with any Department program that has been potentially compromised due to such penetration.
(2) Access to equipment and information by department of defense personnel.—The procedures established pursuant to subsection (a) shall—
(A)
include mechanisms for Department of Defense personnel to, upon request, obtain access to equipment or information of a cleared defense contractor necessary to conduct forensic analysis in addition to any analysis conducted by such contractor;
(B)
provide that a cleared defense contractor is only required to provide access to equipment or information as described in subparagraph (A) to determine whether information created by or for the Department in connection with any Department program was successfully exfiltrated from a network or information system of such contractor and, if so, what information was exfiltrated; and
(C)
provide for the reasonable protection of trade secrets, commercial or financial information, and information that can be used to identify a specific person.
(3) Dissemination of information.—The procedures established pursuant to subsection (a) shall limit the dissemination of information obtained or derived through such procedures to entities—
(A)
with missions that may be affected by such information;
(B)
that may be called upon to assist in the diagnosis, detection, or mitigation of cyber incidents;
(C)
that conduct counterintelligence or law enforcement investigations; or
(D)
for national security purposes, including cyber situational awareness and defense purposes.
(d) Protection From Liability of Cleared Defense Contractors.—
(1)
No cause of action shall lie or be maintained in any court against any cleared defense contractor, and such action shall be promptly dismissed, for compliance with this section that is conducted in accordance with the procedures established pursuant to subsection (a).
(2)
(A) Nothing in this section shall be construed—
(i)
to require dismissal of a cause of action against a cleared defense contractor that has engaged in willful misconduct in the course of complying with the procedures established pursuant to subsection (a); or
(ii)
to undermine or limit the availability of otherwise applicable common law or statutory defenses.
(B)
In any action claiming that paragraph (1) does not apply due to willful misconduct described in subparagraph (A), the plaintiff shall have the burden of proving by clear and convincing evidence the willful misconduct by each cleared defense contractor subject to such claim and that such willful misconduct proximately caused injury to the plaintiff.
(C) In this subsection, the term “willful misconduct” means an act or omission that is taken—
(i)
intentionally to achieve a wrongful purpose;
(ii)
knowingly without legal or factual justification; and
(iii)
in disregard of a known or obvious risk that is so great as to make it highly probable that the harm will outweigh the benefit.
(e) Definitions.—In this section:
(1) Cleared defense contractor.—
The term “cleared defense contractor” means a private entity granted clearance by the Department of Defense to access, receive, or store classified information for the purpose of bidding for a contract or conducting activities in support of any program of the Department of Defense.
(2) Covered network.—
The term “covered network” means a network or information system of a cleared defense contractor that contains or processes information created by or for the Department of Defense with respect to which such contractor is required to apply enhanced protection.


[1]  So in original. Probably should be followed by a period.
Codification

Section, as added and amended by Pub. L. 114–92, is based on Pub. L. 112–239, div. A, title IX, § 941, Jan. 2, 2013, 126 Stat. 1889, which was formerly set out as a note under section 2224 of this title before being transferred to this chapter and renumbered as this section.

Amendments

2021—Subsec. (b)(2)(D). Pub. L. 116–283 substituted “of Defense for Intelligence and Security” for “of Defense for Intelligence.”

2019—Subsec. (b)(2)(B). Pub. L. 116–92, § 902(8)(A), substituted “Under Secretary of Defense for Acquisition and Sustainment” for “Under Secretary of Defense for Acquisition, Technology, and Logistics”.

Subsec. (b)(2)(C). Pub. L. 116–92, § 902(8)(B), added subpar. (C). Former subpar. (C) redesignated (D).

Subsec. (b)(2)(D). Pub. L. 116–92, § 1621(e)(1)(A)(vi), which directed amendment of subpar. (C) by substituting “Under Secretary of Defense for Intelligence and Security” for “Under Secretary of Defense for Intelligence”, could not be executed. See 2021 Amendment note above.

Pub. L. 116–92, § 902(8)(C), redesignated subpar. (C) as (D). Former subpar. (D) redesignated (E).

Subsec. (b)(2)(E), (F). Pub. L. 116–92, § 902(8)(C), redesignated subpars. (D) and (E) as (E) and (F), respectively.

2015—Pub. L. 114–92, § 1641(a)(1), substituted “Reporting on penetrations of networks and information systems of certain contractors” for “Reports to Department of Defense on penetrations of networks and information systems of certain contractors” in section catchline.

Pub. L. 114–92, § 1641(a), transferred section 941 of Pub. L. 112–239 to this chapter and renumbered it as this section. See Codification note above.

Subsec. (c)(3). Pub. L. 114–92, § 1641(a)(2), added par. (3) and struck out former par. (3). Prior to amendment, text read as follows: “The procedures established pursuant to subsection (a) shall prohibit the dissemination outside the Department of Defense of information obtained or derived through such procedures that is not created by or for the Department except with the approval of the contractor providing such information.”

Subsec. (d). Pub. L. 114–92, § 1641(a)(3), added subsec. (d) and struck out former subsec. (d). Prior to amendment, text read as follows:

“(1) In general.—Not later than 90 days after the date of the enactment of this Act—

“(A) the Secretary of Defense shall establish the procedures required under subsection (a); and

“(B) the senior official designated under subsection (b)(1) shall establish the criteria required under such subsection.

“(2) Applicability date.—The requirements of this section shall apply on the date on which the Secretary of Defense establishes the procedures required under this section.”

The following state regulations pages link to this page.