15 U.S.C. § 7442

Current through P.L. 118-106 (published on www.congress.gov on 10/04/2024)
Section 7442 - Federal Cyber Scholarship-for-Service Program
(a) In general

The Director of the National Science Foundation, in coordination with the Director of the Office of Personnel Management and Secretary of Homeland Security, shall continue a Federal cyber scholarship-for-service program to recruit and train the next generation of information technology professionals, industrial control system security professionals, and security managers to meet the needs of the cybersecurity mission for Federal, State, local, and tribal governments.

(b) Program description and components

The Federal Cyber Scholarship-for-Service Program shall-

(1) provide scholarships through qualified institutions of higher education, including community colleges, to students who are enrolled in programs of study at institutions of higher education leading to degrees or specialized program certifications in the cybersecurity field and cybersecurity-related aspects of other related fields as appropriate, including artificial intelligence, quantum computing and aerospace;
(2) provide the scholarship recipients with summer internship opportunities or other meaningful temporary appointments in the Federal information technology and cybersecurity workforce;
(3) prioritize the placement of scholarship recipients fulfilling the post-award employment obligation under this section to ensure that-
(A) not less than 70 percent of such recipients are placed in an executive agency (as defined in section 105 of title 5);
(B) not more than 10 percent of such recipients are placed as educators in the field of cybersecurity at qualified institutions of higher education that provide scholarships under this section; and
(C) not more than 20 percent of such recipients are placed in positions described in paragraphs (2) through (5) of subsection (d); and
(4) provide awards to improve cybersecurity education, including by seeking to provide awards in coordination with other relevant agencies for summer cybersecurity camp or other experiences, including teacher training, in each of the 50 States, at the kindergarten through grade 12 level-
(A) to increase interest in cybersecurity careers;
(B) to help students practice correct and safe online behavior and understand the foundational principles of cybersecurity;
(C) to improve teaching methods for delivering cybersecurity content for kindergarten through grade 12 computer science curricula; and
(D) to promote teacher recruitment in the field of cybersecurity.
(c) Scholarship amounts

Each scholarship under subsection (b) shall be in an amount that covers the student's tuition and fees at the institution under subsection (b)(1) for not more than 3 years and provides the student with an additional stipend.

(d) Post-award employment obligations

Each scholarship recipient, as a condition of receiving a scholarship under the program, shall enter into an agreement under which the recipient agrees to work for a period equal to the length of the scholarship, following receipt of the student's degree, in the cybersecurity mission of-

(1) an executive agency (as defined in section 105 of title 5);
(2) Congress, including any agency, entity, office, or commission established in the legislative branch;
(3) an interstate agency;
(4) a State, local, or Tribal government;
(5) a State, local, or Tribal government-affiliated non-profit that is considered to be critical infrastructure (as defined in section 5195c(e) of title 42); or
(6) as provided by subsection (b)(3)(B), a qualified institution of higher education.
(e) Hiring authority
(1) Appointment in excepted service

Notwithstanding any provision of chapter 33 of title 5 governing appointments in the competitive service, an agency shall appoint in the excepted service an individual who has completed the eligible degree program for which a scholarship was awarded.

(2) Noncompetitive conversion

Except as provided in paragraph (4), upon fulfillment of the service term, an employee appointed under paragraph (1) may be converted noncompetitively to term, career-conditional or career appointment.

(3) Timing of conversion

An agency may noncompetitively convert a term employee appointed under paragraph (2) to a career-conditional or career appointment before the term appointment expires.

(4) Authority to decline conversion

An agency may decline to make the noncompetitive conversion or appointment under paragraph (2) for cause.

(f) Eligibility

To be eligible to receive a scholarship under this section, an individual shall-

(1) be a citizen or lawful permanent resident of the United States;
(2) demonstrate a commitment to a career in improving the security of information technology;
(3) have demonstrated a high level of competency in relevant knowledge, skills, and abilities, as defined by the national cybersecurity awareness and education program under section 7443 of this title;
(4) be a full-time student in an eligible degree program at a qualified institution of higher education, as determined by the Director of the National Science Foundation, except that in the case of a student who is enrolled in a community college, be a student pursuing a degree on a less than full-time basis, but not less than half-time basis;
(5) enter into an agreement accepting and acknowledging the post award employment obligations, pursuant to section1 (d);
(6) accept and acknowledge the conditions of support under section1 (g); and
(7) accept all terms and conditions of a scholarship under this section.
(g) Conditions of support
(1) In general

As a condition of receiving a scholarship under this section, a recipient shall agree to provide the Office of Personnel Management (in coordination with the National Science Foundation) and the qualified institution of higher education with annual verifiable documentation of post-award employment and up-to-date contact information.

(2) Terms

A scholarship recipient under this section shall be liable to the United States as provided in subsection (i) if the individual-

(A) fails to maintain an acceptable level of academic standing at the applicable institution of higher education, as determined by the Director of the National Science Foundation;
(B) is dismissed from the applicable institution of higher education for disciplinary reasons;
(C) withdraws from the eligible degree program before completing the program;
(D) declares that the individual does not intend to fulfill the post-award employment obligation under this section;
(E) fails to maintain or fulfill any of the post-graduation or post-award obligations or requirements of the individual; or
(F) fails to fulfill the requirements of paragraph (1).
(h) Monitoring compliance

As a condition of participating in the program, a qualified institution of higher education shall-

(1) enter into an agreement with the Director of the National Science Foundation, to monitor the compliance of scholarship recipients with respect to their post-award employment obligations; and
(2) provide to the Director of the National Science Foundation and the Director of the Office of Personnel Management, on an annual basis, the post-award employment documentation required under subsection (g)(1) for scholarship recipients through the completion of their post-award employment obligations.
(i) Amount of repayment
(1) Less than 1 year of service

If a circumstance described in subsection (g)(2) occurs before the completion of 1 year of a post-award employment obligation under this section, the total amount of scholarship awards received by the individual under this section shall-

(A) be repaid; or
(B) be treated as a loan to be repaid in accordance with subsection (j).
(2) 1 or more years of service

If a circumstance described in subparagraph (D) or (E) of subsection (g)(2) occurs after the completion of 1 or more years of a post-award employment obligation under this section, the total amount of scholarship awards received by the individual under this section, reduced by the ratio of the number of years of service completed divided by the number of years of service required, shall-

(A) be repaid; or
(B) be treated as a loan to be repaid in accordance with subsection (j).
(j) Repayments

A loan described subsection (i) shall-

(1) be treated as a Federal Direct Unsubsidized Stafford Loan under part D of title IV of the Higher Education Act of 1965 (20 U.S.C. 1087a et seq.); and
(2) be subject to repayment, together with interest thereon accruing from the date of the scholarship award, in accordance with terms and conditions specified by the Director of the National Science Foundation (in consultation with the Secretary of Education) in regulations promulgated to carry out this subsection.
(k) Collection of repayment
(1) In general

In the event that a scholarship recipient is required to repay the scholarship award under this section, the qualified institution of higher education providing the scholarship shall-

(A) determine the repayment amounts and notify the recipient, the Director of the National Science Foundation, and the Director of the Office of Personnel Management of the amounts owed; and
(B) collect the repayment amounts within a period of time as determined by the Director of the National Science Foundation, or the repayment amounts shall be treated as a loan in accordance with subsection (j).
(2) Returned to Treasury

Except as provided in paragraph (3), any repayment under this subsection shall be returned to the Treasury of the United States.

(3) Retain percentage

A qualified institution of higher education may retain a percentage of any repayment the institution collects under this subsection to defray administrative costs associated with the collection. The Director of the National Science Foundation shall establish a single, fixed percentage that will apply to all eligible entities.

(l) Exceptions

The Director of the National Science Foundation may provide for the partial or total waiver or suspension of any service or payment obligation by an individual under this section whenever compliance by the individual with the obligation is impossible or would involve extreme hardship to the individual, or if enforcement of such obligation with respect to the individual would be unconscionable.

(m) Public information
(1) Evaluation

The Director of the National Science Foundation, in coordination with the Director of the Office of Personnel Management, shall periodically evaluate and make public, in a manner that protects the personally identifiable information of scholarship recipients, information on the success of recruiting individuals for scholarships under this section and on hiring and retaining those individuals in the public sector cybersecurity workforce, including information on-

(A) placement rates;
(B) where students are placed, including job titles and descriptions;
(C) salary ranges for students not released from obligations under this section;
(D) how long after graduation students are placed;
(E) how long students stay in the positions they enter upon graduation;
(F) how many students are released from obligations; and
(G) what, if any, remedial training is required.
(2) Reports

The Director of the National Science Foundation, in coordination with the Office of Personnel Management, shall submit, not less frequently than once every two years, to the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Science, Space, and Technology and the Committee on Oversight and Reform of the House of Representatives a report, including-

(A) the results of the evaluation under paragraph (1);
(B) the disparity in any reporting between scholarship recipients and their respective institutions of higher education; and
(C) any recent statistics regarding the size, composition, and educational requirements of the Federal cyber2 workforce..3
(3) Resources

The Director of the National Science Foundation, in coordination with the Director of the Office of Personnel Management, shall provide consolidated and user-friendly online resources for prospective scholarship recipients, including, to the extent practicable-

(A) searchable, up-to-date, and accurate information about participating institutions of higher education and job opportunities related to the field of cybersecurity; and
(B) a modernized description of cybersecurity careers.

1So in original. Probably should be "subsection".

2So in original. Probably should be "cybersecurity". See 2021 Amendment notes below.

3So in original.

15 U.S.C. § 7442

Pub. L. 113-274, title III, §302, Dec. 18, 2014, 128 Stat. 2982; Pub. L. 115-91, div. A, title XVI, §1649B(a), Dec. 12, 2017, 131 Stat. 1754; Pub. L. 116-283 title XCIV, §§9401(g)(4)(C), 9403, 9404, Jan. 1, 2021, 134 Stat. 4810, 4811; Pub. L. 117-167, div. B, title III, §10316(b), Aug. 9, 2022, 136 Stat. 1531.

EDITORIAL NOTES

REFERENCES IN TEXTThe Higher Education Act of 1965, referred to in subsec. (j)(1), is Pub. L. 89-329, Nov. 8, 1965, 79 Stat. 1219. Part D of title IV of the Act is classified to part D (§1087a et seq.) of subchapter IV of chapter 28 of Title 20, Education. For complete classification of this Act to the Code, see Short Title note set out under section 1001 of Title 20 and Tables.

AMENDMENTS2022-Subsec. (b)(1). Pub. L. 117-167 substituted "and cybersecurity-related aspects of other related fields as appropriate, including artificial intelligence, quantum computing and aerospace;" for semicolon at end. 2021-Subsec. (b)(2). Pub. L. 116-283, §9403(1)(A), substituted "information technology and cybersecurity" for "information technology".Subsec. (b)(3). Pub. L. 116-283, §9403(1)(B), amended par. (3) generally. Prior to amendment, par. (3) read as follows: "prioritize the employment placement of at least 80 percent of scholarship recipients in an executive agency (as defined in section 105 of title 5); and". Subsec. (b)(4). Pub. L. 116-283, §9403(1)(C), inserted ",including by seeking to provide awards in coordination with other relevant agencies for summer cybersecurity camp or other experiences, including teacher training, in each of the 50 States," after "cybersecurity education" in introductory provisions.Subsec. (d)(6). Pub. L. 116-283, §9403(2), added par. (6). Subsec. (f)(3). Pub. L. 116-283, §9401(g)(4)(C), substituted "under section 7443" for "under section 7451". Subsec. (f)(5) to (7). Pub. L. 116-283, §9404(1), added pars. (5) to (7) and struck out former par. (5) which read as follows: "accept the terms of a scholarship under this section." Subsec. (g)(1). Pub. L. 116-283, §9404(2)(A), inserted "the Office of Personnel Management (in coordination with the National Science Foundation) and" before "the qualified institution".Subsec. (g)(2)(E), (F). Pub. L. 116-283, §9404(2)(B), added subpars. (E) and (F) and struck out former subpar. (E) which read as follows: "fails to fulfill the post-award employment obligation of the individual under this section." Subsec. (h)(2). Pub. L. 116-283, §9404(3), inserted "and the Director of the Office of Personnel Management" after "Foundation". Subsec. (k)(1)(A). Pub. L. 116-283, §9404(4), substituted ",the Director of the National Science Foundation, and the Director of the Office of Personnel Management of the amounts owed" for "and the Director of the National Science Foundation of the amounts owed".Subsec. (m)(1). Pub. L. 116-283, §9403(3)(A), substituted "cybersecurity" for "cyber" in introductory provisions. Subsec. (m)(2). Pub. L. 116-283, §9404(5), substituted "once every two years, to the Committee on Commerce, Science, and Transportation and the Committee on Homeland Security and Governmental Affairs of the Senate and the Committee on Science, Space, and Technology and the Committee on Oversight and Reform of the House of Representatives a report, including-" and subpars. (A) to (C) for "once every 3 years, to the Committee on Commerce, Science, and Transportation of the Senate and the Committee on Science, Space, and Technology of the House of Representatives a report, including the results of the evaluation under paragraph (1) and any recent statistics regarding the size, composition, and educational requirements of the Federal cybersecurity workforce". Pub. L. 116-283, §9403(3)(B), substituted "cybersecurity" for "cyber". Subsequent amendment by Pub. L. 116-283, §9404(5), reenacted the word "cyber" in subsec. (m)(2)(C). 2017-Subsec. (b)(3), (4). Pub. L. 115-91, §1649B(a)(1), added pars. (3) and (4) and struck out former par. (3) which read as follows: "prioritize the employment placement of scholarship recipients in the Federal Government." Subsec. (d). Pub. L. 115-91, §1649B(a)(2), amended subsec. (d) generally. Prior to amendment, text read as follows: "Each scholarship recipient, as a condition of receiving a scholarship under the program, shall enter into an agreement under which the recipient agrees to work in the cybersecurity mission of a Federal, State, local, or tribal agency for a period equal to the length of the scholarship following receipt of the student's degree." Subsec. (f)(3). Pub. L. 115-91, §1649B(a)(3)(A), amended par. (3) generally. Prior to amendment, par. (3) read as follows: "have demonstrated a high level of proficiency in mathematics, engineering, or computer sciences;".Subsec. (f)(4). Pub. L. 115-91, §1649B(a)(3)(B), amended par. (4) generally. Prior to amendment, par. (4) read as follows: "be a full-time student in an eligible degree program at a qualified institution of higher education, as determined by the Director of the National Science Foundation; and".Subsec. (m). Pub. L. 115-91, §1649B(a)(4), amended subsec. (m) generally. Prior to amendment, text read as follows: "The Director of the National Science Foundation shall evaluate and report periodically to Congress on the success of recruiting individuals for scholarships under this section and on hiring and retaining those individuals in the public sector workforce."

STATUTORY NOTES AND RELATED SUBSIDIARIES

CHANGE OF NAME Committee on Oversight and Reform of House of Representatives changed to Committee on Oversight and Accountability of House of Representatives by House Resolution No. 5, One Hundred Eighteenth Congress, Jan. 9, 2023.

SAVINGS PROVISION Pub. L. 115-91, div. A, title XVI, §1649B(b), Dec. 12, 2017, 131 Stat. 1755, provided that: "Nothing in this section [amending this section], or an amendment made by this section, shall affect any agreement, scholarship, loan, or repayment, under section 302 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7442), in effect on the day before the date of enactment of this subtitle [Dec. 12, 2017]."

COMMUNITY COLLEGE CYBER PILOT PROGRAM AND ASSESSMENT Pub. L. 115-91, div. A, title XVI, §1649A, Dec. 12, 2017, 131 Stat. 1753, provided that:"(a) PILOT PROGRAM.-Not later than 1 year after the date of enactment of this subtitle [Dec. 12, 2017], as part of the Federal Cyber Scholarship-for-Service program established under section 302 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7442), the Director of the National Science Foundation, in coordination with the Director of the Office of Personnel Management, shall develop and implement a pilot program at not more than 10, but at least 5, community colleges to provide scholarships to eligible students who- "(1) are pursuing associate degrees or specialized program certifications in the field of cybersecurity; and "(2)(A) have bachelor's degrees; or"(B) are veterans of the Armed Forces."(b) ASSESSMENT.-Not later than 1 year after the date of enactment of this subtitle, as part of the Federal Cyber Scholarship-for-Service program established under section 302 of the Cybersecurity Enhancement Act of 2014 (15 U.S.C. 7442), the Director of the National Science Foundation, in coordination with the Director of the Office of Personnel Management, shall assess the potential benefits and feasibility of providing scholarships through community colleges to eligible students who are pursuing associate degrees, but do not have bachelor's degrees."

cybersecurity mission
The term "cybersecurity mission" means activities that encompass the full range of threat reduction, vulnerability reduction, deterrence, international engagement, incident response, resiliency, and recovery policies and activities, including computer network operations, information assurance, law enforcement, diplomacy, military, and intelligence missions as such activities relate to the security and stability of cyberspace.