U.S Code last checked for updates: Apr 29, 2024
§ 278h.
Research program on security of computer systems
(a)
Establishment
The Director shall establish a program of assistance to institutions of higher education that enter into partnerships with for-profit entities to support research to improve the security of computer systems. The partnerships may also include government laboratories and nonprofit research institutions. The program shall—
(1)
include multidisciplinary, long-term research;
(2)
include research directed toward addressing needs identified through the activities of the Computer System Security 1
1
 So in original. Probably should be “Information Security”.
and Privacy Advisory Board under section 278g–3(f) 2
2
 See References in Text note below.
of this title; and
(3)
promote the development of a robust research community working at the leading edge of knowledge in subject areas relevant to the security of computer systems by providing support for graduate students, post-doctoral researchers, and senior researchers.
(b)
Fellowships
(1)
Post-doctoral research fellowships
(2)
Senior research fellowships
(3)
Eligibility
(A)
In general
(B)
Stipends
(c)
Awards; applications
(1)
In general
(2)
Eligibility
To be eligible for an award under this section, an institution of higher education shall submit an application to the Director at such time, in such manner, and containing such information as the Director may require. The application shall include, at a minimum, a description of—
(A)
the number of graduate students anticipated to participate in the research project and the level of support to be provided to each;
(B)
the number of post-doctoral research positions included under the research project and the level of support to be provided to each;
(C)
the number of individuals, if any, intending to change research fields and pursue studies related to the security of computer systems to be included under the research project and the level of support to be provided to each; and
(D)
how the for-profit entities, nonprofit research institutions, and any other partners will participate in developing and carrying out the research and education agenda of the partnership.
(d)
Program operation
(1)
Management
(2)
Managers may be employees
(3)
Manager responsibility
Program managers designated under paragraph (1) shall be responsible for—
(A)
establishing and publicizing the broad research goals for the program;
(B)
soliciting applications for specific research projects to address the goals developed under subparagraph (A);
(C)
selecting research projects for support under the program from among applications submitted to the Institute, following consideration of—
(i)
the novelty and scientific and technical merit of the proposed projects;
(ii)
the demonstrated capabilities of the individual or individuals submitting the applications to successfully carry out the proposed research;
(iii)
the impact the proposed projects will have on increasing the number of computer security researchers;
(iv)
the nature of the participation by for-profit entities and the extent to which the proposed projects address the concerns of industry; and
(v)
other criteria determined by the Director, based on information specified for inclusion in applications under subsection (c); and
(D)
monitoring the progress of research projects supported under the program.
(4)
Reports
(e)
Review of program
(1)
Periodic review
(2)
Comprehensive 5-year review
(f)
Definitions
In this section:
(1)
Computer system
(2)
Institution of higher education
(Mar. 3, 1901, ch. 872, § 22, as added Pub. L. 107–305, § 8(a)(2), Nov. 27, 2002, 116 Stat. 2375.)
cite as: 15 USC 278h