Title 10 › Subtitle Subtitle A— General Military Law › Part IV— SERVICE, SUPPLY, AND PROPERTY › Chapter 131— PLANNING AND COORDINATION › § 2225
The Secretary of Defense must set up a program to protect Department of Defense computer systems and stop insider threats. The program must find and stop people who try to access, use, or move classified or controlled unclassified information without permission. The program must use tools that watch and detect bad activity, like controlling and disabling external and removable ports, logging and reporting unusual user actions, using data‑loss prevention and rights management, checking and certifying roles and access, guarding transfers between networks, and keeping software patched. It must have rules and procedures, including special rules for work with other countries or agencies and for operations in hostile areas. The program must include a management structure that links technology and policy, coordinates with clearance and screening processes and anomaly detection, speeds up classification reviews, keeps checking for gaps and needed improvements, measures performance, plans how other agencies with DoD network access will be covered, and enforces consistent use across the Department.
Full Legal Text
Armed Forces — Source: USLM XML via OLRC
Legislative History
Reference
Citation
10 U.S.C. § 2225
Title 10 — Armed Forces
Last Updated
Apr 18, 2026
Release point: 119-83