(A)
Authorized activities
Cyber threat indicators and defensive measures provided to the Federal Government under this subchapter may be disclosed to, retained by, and used by, consistent with otherwise applicable provisions of Federal law, any Federal agency or department, component, officer, employee, or agent of the Federal Government solely for—
(i)
a cybersecurity purpose;
(ii)
the purpose of identifying—
(I)
a cybersecurity threat, including the source of such cybersecurity threat; or
(II)
a security vulnerability;
(iii)
the purpose of responding to, or otherwise preventing or mitigating, a specific threat of death, a specific threat of serious bodily harm, or a specific threat of serious economic harm, including a terrorist act or a use of a weapon of mass destruction;
(iv)
the purpose of responding to, investigating, prosecuting, or otherwise preventing or mitigating, a serious threat to a minor, including sexual exploitation and threats to physical safety; or
(v)
the purpose of preventing, investigating, disrupting, or prosecuting an offense arising out of a threat described in clause (iii) or any of the offenses listed in—
(I)
sections 1028 through 1030 of title 18 (relating to fraud and identity theft);
(II)
chapter 37 of such title (relating to espionage and censorship); and
(III)
chapter 90 of such title (relating to protection of trade secrets).
(C)
Privacy and civil liberties
Cyber threat indicators and defensive measures provided to the Federal Government under this subchapter shall be retained, used, and disseminated by the Federal Government—
(i)
in accordance with the policies, procedures, and guidelines required by subsections (a) and (b);
(ii)
in a manner that protects from unauthorized use or disclosure any cyber threat indicators that may contain—
(I)
personal information of a specific individual; or
(II)
information that identifies a specific individual; and
(iii)
in a manner that protects the confidentiality of cyber threat indicators containing—
(I)
personal information of a specific individual; or
(II)
information that identifies a specific individual.
(D)
Federal regulatory authority
(ii)
Exceptions
(I)
Regulatory authority specifically relating to prevention or mitigation of cybersecurity threats
(II)
Procedures developed and implemented under this subchapter