US Code
Part A— Cybersecurity and Infrastructure Security
§ 663. Federal intrusion detection and prevention system

(a) DefinitionsIn this section—(1) the term “agency” has the meaning given the term in section 3502 of title 44;
(2) the term “agency information” means information collected or maintained by or on behalf of an agency;
(3) the term “agency information system” has the meaning given the term in section 660 of this title; and
(b) Requirement(1) In generalNot later than 1 year after December 18, 2015, the Secretary shall deploy, operate, and maintain, to make available for use by any agency, with or without reimbursement—(A) a capability to detect cybersecurity risks in network traffic transiting or traveling to or from an agency information system; and
(B) a capability to prevent network traffic associated with such cybersecurity risks from transiting or traveling to or from an agency information system or modify such network traffic to remove the cybersecurity risk.
(2) Regular improvementThe Secretary shall regularly deploy new technologies and modify existing technologies to the intrusion detection and prevention capabilities described in paragraph (1) as appropriate to improve the intrusion detection and prevention capabilities.
(c) ActivitiesIn carrying out subsection (b), the Secretary—(1) may access, and the head of an agency may disclose to the Secretary or a private entity providing assistance to the Secretary under paragraph (2), information transiting or traveling to or from an agency information system, regardless of the location from which the Secretary or a private entity providing assistance to the Secretary under paragraph (2) accesses such information, notwithstanding any other provision of law that would otherwise restrict or prevent the head of an agency from disclosing such information to the Secretary or a private entity providing assistance to the Secretary under paragraph (2);
(2) may enter into contracts or other agreements with, or otherwise request and obtain the assistance of, private entities to deploy, operate, and maintain technologies in accordance with subsection (b);
(3) may retain, use, and disclose information obtained through the conduct of activities authorized under this section only to protect information and information systems from cybersecurity risks;
(4) shall regularly assess through operational test and evaluation in real world or simulated environments available advanced protective technologies to improve detection and prevention capabilities, including commercial and noncommercial technologies and detection technologies beyond signature-based detection, and acquire, test, and deploy such technologies when appropriate;
(5) shall establish a pilot through which the Secretary may acquire, test, and deploy, as rapidly as possible, technologies described in paragraph (4); and
(6) shall periodically update the privacy impact assessment required under section 208(b) of the E-Government Act of 2002 (44 U.S.C. 3501 note).
(d) PrinciplesIn carrying out subsection (b), the Secretary shall ensure that—(1) activities carried out under this section are reasonably necessary for the purpose of protecting agency information and agency information systems from a cybersecurity risk;
(2) information accessed by the Secretary will be retained no longer than reasonably necessary for the purpose of protecting agency information and agency information systems from a cybersecurity risk;
(3) notice has been provided to users of an agency information system concerning access to communications of users of the agency information system for the purpose of protecting agency information and the agency information system; and
(4) the activities are implemented pursuant to policies and procedures governing the operation of the intrusion detection and prevention capabilities.
(e) Private entities(1) ConditionsA private entity described in subsection (c)(2) may not—(A) disclose any network traffic transiting or traveling to or from an agency information system to any entity other than the Department or the agency that disclosed the information under subsection (c)(1), including personal information of a specific individual or information that identifies a specific individual not directly related to a cybersecurity risk; or
(B) use any network traffic transiting or traveling to or from an agency information system to which the private entity gains access in accordance with this section for any purpose other than to protect agency information and agency information systems against cybersecurity risks or to administer a contract or other agreement entered into pursuant to subsection (c)(2) or as part of another contract with the Secretary.
(2) Limitation on liabilityNo cause of action shall lie in any court against a private entity for assistance provided to the Secretary in accordance with this section and any contract or agreement entered into pursuant to subsection (c)(2).
(3) Rule of constructionNothing in paragraph (2) shall be construed to authorize an Internet service provider to break a user agreement with a customer without the consent of the customer.
(f) Privacy Officer reviewNot later than 1 year after December 18, 2015, the Privacy Officer appointed under section 142 of this title, in consultation with the Attorney General, shall review the policies and guidelines for the program carried out under this section to ensure that the policies and guidelines are consistent with applicable privacy laws, including those governing the acquisition, interception, retention, use, and disclosure of communications.

Structure US Code

US Code

Title 6— DOMESTIC SECURITY

CHAPTER 1— HOMELAND SECURITY ORGANIZATION

SUBCHAPTER XVIII— CYBERSECURITY AND INFRASTRUCTURE SECURITY AGENCY

Part A— Cybersecurity and Infrastructure Security

§ 651. Definition

§ 652. Cybersecurity and Infrastructure Security Agency

§ 652a. Sector Risk Management Agencies

§ 653. Cybersecurity Division

§ 654. Infrastructure Security Division

§ 655. Enhancement of Federal and non-Federal cybersecurity

§ 656. NET Guard

§ 657. Cyber Security Enhancement Act of 2002

§ 658. Cybersecurity recruitment and retention

§ 659. National cybersecurity and communications integration center

§ 660. Cybersecurity plans

§ 661. Cybersecurity strategy

§ 662. Clearances

§ 663. Federal intrusion detection and prevention system

§ 664. National asset database

§ 665. Duties and authorities relating to .gov internet domain

§ 665a. Intelligence and cybersecurity diversity fellowship program

§ 665b. Joint cyber planning office

§ 665c. Cybersecurity State Coordinator

§ 665d. Sector Risk Management Agencies

§ 665e. Cybersecurity Advisory Committee

§ 665f. Cybersecurity education and training programs

§ 665g. State and Local Cybersecurity Grant Program

§ 665h. National Cyber Exercise Program

§ 665i. CyberSentry program

§ 665j. Ransomware threat mitigation activities

§ 665k. Federal Clearinghouse on School Safety Evidence-based Practices

§ 665l. School and daycare protection

§ 665m. President’s Cup Cybersecurity Competition

§ 665n. Industrial Control Systems Cybersecurity Training Initiative