2015 US Code
Title 6 - Domestic Security (Sections 101 - 1533)
Chapter 6 - Cybersecurity (Sections 1501 - 1533)
Subchapter I - Cybersecurity Information Sharing (Sections 1501 - 1510)
Sec. 1508 - Report on cybersecurity threats

View Metadata
Metadata
Publication TitleUnited States Code, 2012 Edition, Supplement 3, Title 6 - DOMESTIC SECURITY
CategoryBills and Statutes
CollectionUnited States Code
SuDoc Class NumberY 1.2/5:
Contained WithinTitle 6 - DOMESTIC SECURITY
CHAPTER 6 - CYBERSECURITY
SUBCHAPTER I - CYBERSECURITY INFORMATION SHARING
Sec. 1508 - Report on cybersecurity threats
Containssection 1508
Date2015
Laws In Effect As Of DateJanuary 3, 2016
Positive LawNo
Dispositionstandard
Source CreditPub. L. 114-113, div. N, title I, §109, Dec. 18, 2015, 129 Stat. 2955.
Statutes at Large Reference129 Stat. 2955
Public and Private LawPublic Law 114-113

Download PDF


6 U.S.C. § 1508 (2015)
§1508. Report on cybersecurity threats(a) Report required

Not later than 180 days after December 18, 2015, the Director of National Intelligence, in coordination with the heads of other appropriate elements of the intelligence community, shall submit to the Select Committee on Intelligence of the Senate and the Permanent Select Committee on Intelligence of the House of Representatives a report on cybersecurity threats, including cyber attacks, theft, and data breaches.

(b) Contents

The report required by subsection (a) shall include the following:

(1) An assessment of the current intelligence sharing and cooperation relationships of the United States with other countries regarding cybersecurity threats, including cyber attacks, theft, and data breaches, directed against the United States and which threaten the United States national security interests and economy and intellectual property, specifically identifying the relative utility of such relationships, which elements of the intelligence community participate in such relationships, and whether and how such relationships could be improved.

(2) A list and an assessment of the countries and nonstate actors that are the primary threats of carrying out a cybersecurity threat, including a cyber attack, theft, or data breach, against the United States and which threaten the United States national security, economy, and intellectual property.

(3) A description of the extent to which the capabilities of the United States Government to respond to or prevent cybersecurity threats, including cyber attacks, theft, or data breaches, directed against the United States private sector are degraded by a delay in the prompt notification by private entities of such threats or cyber attacks, theft, and data breaches.

(4) An assessment of additional technologies or capabilities that would enhance the ability of the United States to prevent and to respond to cybersecurity threats, including cyber attacks, theft, and data breaches.

(5) An assessment of any technologies or practices utilized by the private sector that could be rapidly fielded to assist the intelligence community in preventing and responding to cybersecurity threats.

(c) Form of report

The report required by subsection (a) shall be made available in classified and unclassified forms.

(d) Intelligence community defined

In this section, the term "intelligence community" has the meaning given that term in section 3003 of title 50.

(Pub. L. 114–113, div. N, title I, §109, Dec. 18, 2015, 129 Stat. 2955.)

Disclaimer: These codes may not be the most recent version. The United States Government Printing Office may have more current or accurate information. We make no warranties or guarantees about the accuracy, completeness, or adequacy of the information contained on this site or the information linked to on the US site. Please check official sources.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.