Title 6 › Chapter CHAPTER 6— - CYBERSECURITY › Subchapter SUBCHAPTER I— - CYBERSECURITY INFORMATION SHARING › § 1502
Top U.S. intelligence and security leaders must make rules, with help from other agency heads, to speed up and guide how the federal government shares cyber threat information. They must do this while protecting classified secrets, intelligence methods, and people's privacy and civil rights. The rules must cover sharing classified threat indicators with cleared people, sharing things that can be declassified at an unclassified level, sharing unclassified or controlled-unclassified information (and the public if needed), sharing warnings to help protect specific entities, and regularly publishing cyber best practices with special attention to small businesses. The rules must let the government share in real time when possible. They should use existing sharing processes (like sector information centers). They must include ways to tell recipients quickly if something was shared in error, require security controls to stop unauthorized access, and require removal of personal data not needed for the cyber threat (or use tools to strip it out) before sharing. If a U.S. person's data was shared in violation of the rules, the person must be told. The leaders must consult the Small Business Administration and the National Laboratories, and the Director of National Intelligence must send these procedures to Congress not later than 60 days after December 18, 2015.
Full Legal Text
Domestic Security — Source: USLM XML via OLRC
Reference
Citation
6 U.S.C. § 1502
Title 6 — Domestic Security
Last Updated
Apr 6, 2026
Release point: 119-73