§10308. Cyber protection support for personnel of the Department of State in positions highly vulnerable to cyber attack
(a) Definitions
In this section:
(1) At-risk personnel
The term "at-risk personnel" means personnel of the Department-
(A) whom the Secretary determines to be highly vulnerable to cyber attacks and hostile information collection activities because of their positions in the Department; and
(B) whose personal technology devices or personal accounts are highly vulnerable to cyber attacks and hostile information collection activities.
(2) Personal accounts
The term "personal accounts" means accounts for online and telecommunications services, including telephone, residential internet access, email, text and multimedia messaging, cloud computing, social media, health care, and financial services, used by Department personnel outside of the scope of their employment with the Department.
(3) Personal technology devices
The term "personal technology devices" means technology devices used by personnel of the Department outside of the scope of their employment with the Department, including networks to which such devices connect.
(b) Requirement to provide cyber protection support
The Secretary, in consultation with the Secretary of Homeland Security and the Director of National Intelligence, as appropriate-
(1) shall offer cyber protection support for the personal technology devices and personal accounts of at-risk personnel; and
(2) may provide the support described in paragraph (1) to any Department personnel who request such support.
(c) Nature of cyber protection support
Subject to the availability of resources, the cyber protection support provided to personnel pursuant to subsection (b) may include training, advice, assistance, and other services relating to protection against cyber attacks and hostile information collection activities.
(d) Privacy protections for personal devices
The Department is prohibited pursuant to this section from accessing or retrieving any information from any personal technology device or personal account of Department employees unless-
(1) access or information retrieval is necessary for carrying out the cyber protection support specified in this section; and
(2) the Department has received explicit consent from the employee to access a personal technology device or personal account prior to each time such device or account is accessed.
(e) Rule of construction
Nothing in this section may be construed-
(1) to encourage Department personnel to use personal technology devices for official business; or
(2) to authorize cyber protection support for senior Department personnel using personal devices, networks, and personal accounts in an official capacity.
(f) Report
(1) In general
Not later than 180 days after December 22, 2023, the Secretary shall submit to the appropriate committees of Congress a report regarding the provision of cyber protection support pursuant to subsection (b), which shall include-
(A) a description of the methodology used to make the determination under subsection (a)(1); and
(B) guidance for the use of cyber protection support and tracking of support requests for personnel receiving cyber protection support pursuant to subsection (b).
(2) Appropriate committees of Congress defined
In this subsection, the term "appropriate committees of Congress" means-
(A) the appropriate congressional committees;
(B) the Select Committee on Intelligence and the Committee on Homeland Security and Governmental Affairs of the Senate; and
(C) the Permanent Select Committee on Intelligence and the Committee on Oversight and Accountability of the House of Representatives.
(
Statutory Notes and Related Subsidiaries
Measures To Protect Department Devices From the Proliferation and Use of Foreign Commercial Spyware
"(a)
"(1)
"(A) the Committee on Foreign Relations, the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee on Armed Services of the Senate; and
"(B) the Committee on Foreign Affairs, the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee on Armed Services of the House of Representatives.
"(2)
"(3)
"(b)
"(1)
"(A) issue standards, guidance, best practices, and policies for Department [of State] and USAID [United States Agency for International Development] personnel to protect covered devices from being compromised by foreign commercial spyware;
"(B) survey the processes used by the Department and USAID to identify and catalog instances where a covered device was compromised by foreign commercial spyware over the prior 2 years and it is reasonably expected to have resulted in an unauthorized disclosure of sensitive information; and
"(C) submit to the appropriate committees of Congress a report on the measures in place to identify and catalog instances of such compromises for covered devices by foreign commercial spyware, which may be submitted in classified form.
"(2)
"(A) the location of the personnel whose covered device was compromised;
"(B) the number of covered devices compromised;
"(C) an assessment by the Secretary of the damage to the national security of the United States resulting from any loss of data or sensitive information; and
"(D) an assessment by the Secretary of any foreign government or foreign organization or entity, and, to the extent possible, the foreign individuals, who directed and benefitted from any information acquired from the compromise.
"(3)
Definitions
For definitions of "Department", "Secretary", and "appropriate congressional committees" as used in this section, see section 6002 of