Disclosure, retention, and use
Authorized activities
Agency actions after receipt
Rapid, confidential sharing of cyber threat indicators
Upon receiving a covered cyber incident or ransom payment report submitted pursuant to this section, the Agency shall immediately review the report to determine whether the cyber incident that is the subject of the report is connected to an ongoing cyber threat or security vulnerability and where applicable, use such report to identify, develop, and rapidly disseminate to appropriate stakeholders actionable, anonymized cyber threat indicators and defensive measures.
Principles for sharing security vulnerabilities
With respect to information in a covered cyber incident or ransom payment report regarding a security vulnerability referred to in paragraph (1)(B)(ii), the Director shall develop principles that govern the timing and manner in which information relating to security vulnerabilities may be shared, consistent with common industry best practices and United States and international standards.
Privacy and civil liberties
section 681b of this titlesection 1504 of this titleInformation contained in covered cyber incident and ransom payment reports submitted to the Agency pursuant to shall be retained, used, and disseminated, where permissible and appropriate, by the Federal Government in accordance with processes to be developed for the protection of personal information consistent with processes adopted pursuant to and in a manner that protects personal information from unauthorized use or unauthorized disclosure.
Digital security
section 681b of this titleThe Agency shall ensure that reports submitted to the Agency pursuant to , and any information contained in those reports, are collected, stored, and protected at a minimum in accordance with the requirements for moderate impact Federal information systems, as described in Federal Information Processing Standards Publication 199, or any successor document.
Prohibition on use of information in regulatory actions
In general
A Federal, State, local, or Tribal government shall not use information about a covered cyber incident or ransom payment obtained solely through reporting directly to the Agency in accordance with this part to regulate, including through an enforcement action, the activities of the covered entity or entity that made a ransom payment, unless the government entity expressly allows entities to submit reports to the Agency to meet regulatory reporting obligations of the entity.
Clarification
A report submitted to the Agency pursuant to section 681b or 681c of this title may, consistent with Federal or State regulatory authority specifically relating to the prevention and mitigation of cybersecurity threats to information systems, inform the development or implementation of regulations relating to such systems.
Protections for reporting entities and information
Liability protections
In general
section 681b(a) of this titlesection 681b(b) of this titlesection 681d(c)(2) of this titleNo cause of action shall lie or be maintained in any court by any person or entity and any such action shall be promptly dismissed for the submission of a report pursuant to that is submitted in conformance with this part and the rule promulgated under , except that this subsection shall not apply with regard to an action by the Federal Government pursuant to .
Scope
The liability protections provided in this subsection shall only apply to or affect litigation that is solely based on the submission of a covered cyber incident report or ransom payment report to the Agency.
Restrictions
Notwithstanding paragraph (2), no report submitted to the Agency pursuant to this part or any communication, document, material, or other record, created for the sole purpose of preparing, drafting, or submitting such report, may be received in evidence, subject to discovery, or otherwise used in any trial, hearing, or other proceeding in or before any court, regulatory body, or other authority of the United States, a State, or a political subdivision thereof, provided that nothing in this part shall create a defense to discovery or otherwise affect the discovery of any communication, document, material, or other record not created for the sole purpose of preparing, drafting, or submitting such report.
Sharing with non-Federal entities
section 681b of this titleThe Agency shall anonymize the victim who reported the information when making information provided in reports received under available to critical infrastructure owners and operators and the general public.
Stored Communications Act
Nothing in this part shall be construed to permit or require disclosure by a provider of a remote computing service or a provider of an electronic communication service to the public of information not otherwise permitted or required to be disclosed under chapter 121 of title 18 (commonly known as the “Stored Communications Act”).
Pub. L. 107–296, title XXII, § 2245Pub. L. 117–103, div. Y, § 103(a)(2)136 Stat. 1051(, as added , , .)