Title 6 › Chapter 6— CYBERSECURITY › Subchapter I— CYBERSECURITY INFORMATION SHARING › § 1504
Requires the Attorney General and the Secretary of Homeland Security to write rules and privacy guidelines so the federal government can receive cyber threat indicators and defensive measures from outside groups. They must publish interim rules and privacy guidelines within 60 days after December 18, 2015, and final rules and privacy guidelines within 180 days after that date. The Secretary of Homeland Security must build a real-time system inside DHS within 90 days after December 18, 2015, that accepts cyber threat indicators and defensive measures by email, web form, or automated system and passes them automatically to the right federal agencies. The system must be open for any non-federal group to use, must let all appropriate federal entities get the information quickly, and must follow the published policies and privacy rules. The President may later name another federal agency (not the Defense Department or NSA) to build a similar capability if needed, after notifying Congress at least 30 days earlier. The rules must include audit checks and punishments for federal staff who knowingly misuse the process. Cyber threat indicators — basic one-line: information about cybersecurity threats. Defensive measures — basic one-line: actions or tools to stop or reduce those threats. The law says shared indicators are treated as voluntarily given and can be kept private from public records laws. A provider can mark information as proprietary or privileged, and giving it to the government does not waive trade-secret or other protections. Federal use of the shared data is limited to cybersecurity purposes, finding threats or vulnerabilities, responding to serious threats (like death, serious bodily harm, or major economic harm), protecting minors, or preventing or prosecuting certain crimes such as fraud, identity theft, espionage, or trade-secret theft. The guidelines must limit how long personal or identifying information is kept, require safe handling, set rules for destroying data that is not a threat, protect confidentiality as much as possible, and ensure sharing fits with classified and national security rules. The law also says the rules should not let federal, state, tribal, or local governments use the shared information to regulate lawful activity of private entities, except narrowly to make or enforce cybersecurity rules.
Full Legal Text
Domestic Security — Source: USLM XML via OLRC
Reference
Citation
6 U.S.C. § 1504
Title 6 — Domestic Security
Last Updated
Apr 3, 2026
Release point: 119-73not60