Title 10 › Subtitle Subtitle A— - General Military Law › Part PART IV— - SERVICE, SUPPLY, AND PROPERTY › Chapter CHAPTER 131— - PLANNING AND COORDINATION › § 2225
The Secretary of Defense must set up a program to protect Department of Defense computer systems and stop insider threats. The program must find when someone accesses, uses, or sends classified or controlled unclassified information without permission. The program must use technology and rules. The tech must let DoD watch for unauthorized activity, such as monitoring external ports and read/write use, disabling removable media ports, logging unusual user actions, preventing or rendering exported data unusable, using role-based access checks, protecting transfers between networks, and keeping software updated. The program must also include policies (including for international and interagency partners and operations in hostile areas), a governance plan that links tools to security-clearance and anomaly-detection processes and speeds classification review, ongoing gap analysis and improvements, performance measures, a plan to extend protections to other agencies on DoD networks, and an enforcement plan so the program is applied consistently.
Full Legal Text
Armed Forces — Source: USLM XML via OLRC
Legislative History
Reference
Citation
10 U.S.C. § 2225
Title 10 — Armed Forces
Last Updated
Apr 6, 2026
Release point: 119-73