In this section:
The term "personal accounts" means accounts for online and telecommunications services, including telephone, residential internet access, email, text and multimedia messaging, cloud computing, social media, health care, and financial services, used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community.
The term "personal technology devices" means technology devices used by personnel of the intelligence community outside of the scope of their employment with elements of the intelligence community, including networks to which such devices connect.
Subject to a determination by the Director of National Intelligence, the Director may provide cyber protection support for the personal technology devices and personal accounts of the personnel described in paragraph (2).
The personnel described in this paragraph are personnel of the intelligence community-
(A) who the Director determines to be highly vulnerable to cyber attacks and hostile information collection activities because of the positions occupied by such personnel in the intelligence community; and
(B) whose personal technology devices or personal accounts are highly vulnerable to cyber attacks and hostile information collection activities.
Subject to the availability of resources, the cyber protection support provided to personnel under subsection (b) may include training, advice, assistance, and other services relating to cyber attacks and hostile information collection activities.
Nothing in this section shall be construed-
(1) to encourage personnel of the intelligence community to use personal technology devices for official business; or
(2) to authorize cyber protection support for senior intelligence community personnel using personal devices, networks, and personal accounts in an official capacity.
Not later than 180 days after December 20, 2019, the Director shall submit to the congressional intelligence committees a report on the provision of cyber protection support under subsection (b). The report shall include-
(1) a description of the methodology used to make the determination under subsection (b)(2); and
(2) guidance for the use of cyber protection support and tracking of support requests for personnel receiving cyber protection support under subsection (b).
(
For definitions of "intelligence community" and "congressional intelligence committees", referred to in text, see section 5003 of div. E of