Title 10 › Subtitle Subtitle A— - General Military Law › Part PART I— - ORGANIZATION AND GENERAL MILITARY POWERS › Chapter CHAPTER 19— - CYBER AND INFORMATION OPERATIONS MATTERS › § 393
Require cleared defense contractors to quickly tell a DoD office chosen by the Secretary when a covered contractor network or system is successfully breached. A senior official will set rules for which contractor systems are covered, working with top DoD officials in policy, acquisition, research, intelligence, the DoD Chief Information Officer, and U.S. Cyber Command. Reports must say how the breach happened, include any isolated sample of malicious software, and summarize any DoD-created information that might have been affected. A cleared defense contractor is a private company allowed to handle classified DoD work. A covered network is a contractor system that holds or processes DoD-created data that needs extra protection. The rules let DoD ask for access to contractor equipment or data so DoD can do its own forensic checks, but access is only to find out whether DoD information was taken and what was taken. The rules must protect trade secrets, business or financial data, and personal identifying information. Information from these reports can only be shared with groups that need it because their work may be affected, those who help respond to cyber incidents, law enforcement or counterintelligence, or for national security and cyber defense. Contractors who follow these rules cannot be sued for doing so, unless a plaintiff proves by clear and convincing evidence that the contractor committed willful misconduct — meaning an intentional, unjustified act or omission done while knowingly ignoring a very large risk that likely caused the harm.
Full Legal Text
Armed Forces — Source: USLM XML via OLRC
Legislative History
Reference
Citation
10 U.S.C. § 393
Title 10 — Armed Forces
Last Updated
Apr 6, 2026
Release point: 119-73