§ 278h. — Appropriations; availability.
[Laws in effect as of January 24, 2002]
[Document not affected by Public Laws enacted between
January 24, 2002 and December 19, 2002]
[CITE: 15USC278h]
TITLE 15--COMMERCE AND TRADE
CHAPTER 7--NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
Sec. 278h. Research program on security of computer systems
(a) Establishment
The Director shall establish a program of assistance to institutions
of higher education that enter into partnerships with for-profit
entities to support research to improve the security of computer
systems. The partnerships may also include government laboratories and
nonprofit research institutions. The program shall--
(1) include multidisciplinary, long-term research;
(2) include research directed toward addressing needs identified
through the activities of the Computer System Security \1\ and
Privacy Advisory Board under section 278g-3(f) \2\ of this title;
and
---------------------------------------------------------------------------
\1\ So in original. Probably should be ``Information Security''.
\2\ See References in Text note below.
---------------------------------------------------------------------------
(3) promote the development of a robust research community
working at the leading edge of knowledge in subject areas relevant
to the security of computer systems by providing support for
graduate students, post-doctoral researchers, and senior
researchers.
(b) Fellowships
(1) Post-doctoral research fellowships
The Director is authorized to establish a program to award post-
doctoral research fellowships to individuals who are citizens,
nationals, or lawfully admitted permanent resident aliens of the
United States and are seeking research positions at institutions,
including the Institute, engaged in research activities related to
the security of computer systems, including the research areas
described in section 7403(a)(1) of this title.
(2) Senior research fellowships
The Director is authorized to establish a program to award
senior research fellowships to individuals seeking research
positions at institutions, including the Institute, engaged in
research activities related to the security of computer systems,
including the research areas described in section 7403(a)(1) of this
title. Senior research fellowships shall be made available for
established researchers at institutions of higher education who seek
to change research fields and pursue studies related to the security
of computer systems.
(3) Eligibility
(A) In general
To be eligible for an award under this subsection, an
individual shall submit an application to the Director at such
time, in such manner, and containing such information as the
Director may require.
(B) Stipends
Under this subsection, the Director is authorized to provide
stipends for post-doctoral research fellowships at the level of
the Institute's Post Doctoral Research Fellowship Program and
senior research fellowships at levels consistent with support
for a faculty member in a sabbatical position.
(c) Awards; applications
(1) In general
The Director is authorized to award grants or cooperative
agreements to institutions of higher education to carry out the
program established under subsection (a) of this section. No funds
made available under this section shall be made available directly
to any for-profit partners.
(2) Eligibility
To be eligible for an award under this section, an institution
of higher education shall submit an application to the Director at
such time, in such manner, and containing such information as the
Director may require. The application shall include, at a minimum, a
description of--
(A) the number of graduate students anticipated to
participate in the research project and the level of support to
be provided to each;
(B) the number of post-doctoral research positions included
under the research project and the level of support to be
provided to each;
(C) the number of individuals, if any, intending to change
research fields and pursue studies related to the security of
computer systems to be included under the research project and
the level of support to be provided to each; and
(D) how the for-profit entities, nonprofit research
institutions, and any other partners will participate in
developing and carrying out the research and education agenda of
the partnership.
(d) Program operation
(1) Management
The program established under subsection (a) of this section
shall be managed by individuals who shall have both expertise in
research related to the security of computer systems and knowledge
of the vulnerabilities of existing computer systems. The Director
shall designate such individuals as program managers.
(2) Managers may be employees
Program managers designated under paragraph (1) may be new or
existing employees of the Institute or individuals on assignment at
the Institute under the Intergovernmental Personnel Act of 1970 [42
U.S.C. 4701 et seq.], except that individuals on assignment at the
Institute under the Intergovernmental Personnel Act of 1970 shall
not directly manage such employees.
(3) Manager responsibility
Program managers designated under paragraph (1) shall be
responsible for--
(A) establishing and publicizing the broad research goals
for the program;
(B) soliciting applications for specific research projects
to address the goals developed under subparagraph (A);
(C) selecting research projects for support under the
program from among applications submitted to the Institute,
following consideration of--
(i) the novelty and scientific and technical merit of
the proposed projects;
(ii) the demonstrated capabilities of the individual or
individuals submitting the applications to successfully
carry out the proposed research;
(iii) the impact the proposed projects will have on
increasing the number of computer security researchers;
(iv) the nature of the participation by for-profit
entities and the extent to which the proposed projects
address the concerns of industry; and
(v) other criteria determined by the Director, based on
information specified for inclusion in applications under
subsection (c) of this section; and
(D) monitoring the progress of research projects supported
under the program.
(4) Reports
The Director shall report to the Senate Committee on Commerce,
Science, and Transportation and the House of Representatives
Committee on Science annually on the use and responsibility of
individuals on assignment at the Institute under the
Intergovernmental Personnel Act of 1970 [42 U.S.C. 4701 et seq.] who
are performing duties under subsection (d) of this section.
(e) Review of program
(1) Periodic review
The Director shall periodically review the portfolio of research
awards monitored by each program manager designated in accordance
with subsection (d) of this section. In conducting those reviews,
the Director shall seek the advice of the Computer System Security
\1\ and Privacy Advisory Board, established under section 278g-4 of
this title, on the appropriateness of the research goals and on the
quality and utility of research projects managed by program managers
in accordance with subsection (d) of this section.
(2) Comprehensive 5-year review
The Director shall also contract with the National Research
Council for a comprehensive review of the program established under
subsection (a) of this section during the 5th year of the program.
Such review shall include an assessment of the scientific quality of
the research conducted, the relevance of the research results
obtained to the goals of the program established under subsection
(d)(3)(A) of this section, and the progress of the program in
promoting the development of a substantial academic research
community working at the leading edge of knowledge in the field. The
Director shall submit to Congress a report on the results of the
review under this paragraph no later than 6 years after the
initiation of the program.
(f) Definitions
In this section:
(1) Computer system
The term ``computer system'' has the meaning given that term in
section 278g-3(d)(1) \2\ of this title.
(2) Institution of higher education
The term ``institution of higher education'' has the meaning
given that term in section 1001(a) of title 20.
(Mar. 3, 1901, ch. 872, Sec. 22, as added Pub. L. 107-305, Sec. 8(a)(2),
Nov. 27, 2002, 116 Stat. 2375.)
References in Text
Section 278g-3 of this title, referred to in subsecs. (a)(2) and
(f)(1), was amended generally by Pub. L. 107-296, title X, Sec. 1003,
Nov. 25, 2002, 116 Stat. 2269, and, as so amended, no longer contains a
subsec. (d) defining ``computer system'' or a subsec. (f).
The Intergovernmental Personnel Act of 1970, referred to in subsec.
(d)(2), (4), is Pub. L. 91-648, Jan. 5, 1971, 84 Stat. 1909, as amended,
which enacted sections 3371 to 3376 of Title 5, Government Organization
and Employees, and chapter 62 (Sec. 4701 et seq.) of Title 42, The
Public Health and Welfare, amended section 1304 of Title 5 and section
246 of Title 42, repealed sections 1881 to 1888 of Title 7, Agriculture,
and section 869b of Title 20, Education, and enacted provisions set out
as notes under section 3371 of Title 5. For complete classification of
this Act to the Code, see Short Title note set out under section 4701 of
Title 42 and Tables.
Prior Provisions
A prior section 22 of act Mar. 3, 1901, ch. 872, was renumbered
section 32 and is classified to section 278q of this title.
Section Referred to in Other Sections
This section is referred to in section 7407 of this title.