PolicyBrief
S. 3161
119th CongressNov 7th 2025
Protecting DOD Data Act of 2025
IN COMMITTEE

This Act mandates the Department of Defense to enhance the protection of personal data affecting the operational security of its personnel by reviewing guidance, limiting external data storage, and increasing Congressional notification requirements for security events and policy changes.

Elissa Slotkin
D

Elissa Slotkin

Senator

MI

LEGISLATION

DoD Data Bill Mandates Off-Site Storage Restrictions and New Security Training by June 2026

If you or someone you know works for the Department of Defense (DoD)—military or civilian—this bill is about tightening the screws on who holds your sensitive personal data and where it lives. The Protecting DOD Data Act of 2025 is straightforward: it forces the Secretary of Defense to prioritize and enhance protection for any personal data that could compromise the operational security of DoD personnel. Think of it as a comprehensive digital lockdown on the information that, if leaked, could put people at risk.

The bill immediately requires the DoD to identify this high-risk data and ensure its protection aligns with the privacy laws and practices already in place before this Act was established. By June 1, 2026, the Secretary must review all existing guidance and issue new, enhanced protection measures if necessary. This isn't just a suggestion; it’s a mandate to bring existing data security practices up to a higher, more consistent standard. For the thousands of service members and DoD employees, this means a formal commitment to keeping their digital footprint secure.

The Digital Drawbridge: New Rules for Data Storage

One of the most significant changes involves where this sensitive data can be stored. The bill essentially tells the DoD to pull up the digital drawbridge: no DoD personal data affecting operational security can be stored on a server or cloud service not managed by the Department.

There are only two exceptions to this strict rule. First, the data can be stored off-site if it’s under a formal contract or agreement between the Secretary and a third-party contractor or subcontractor. This means the data isn't just floating out there; it’s secured under specific, legally binding terms. Second, for personal data, the individual (the data subject) can give explicit permission for the off-site storage. If neither of those conditions is met, the data stays on DoD turf.

However, there is a third, slightly fuzzier out. The Secretary can waive this storage restriction if they certify in writing that the waiver is necessary in the interest of national security, appropriately considers the risks to the affected employee, and doesn't create a national security risk. While the intent is clear—security first—this “national security waiver” introduces a medium level of vagueness. The Secretary gets to decide what constitutes “necessary in the interest of national security,” which gives the office significant discretion in bypassing the core storage restriction.

Accountability and the System Owners

This bill doesn't just focus on contractors; it also targets the people inside the DoD who manage the data. The Secretary must develop new requirements for standards, training, reporting, and security debriefings for DoD personnel who act as “system owners.” These are the folks with the keys to the kingdom—the privileges to write or read data across the multiple platforms holding this sensitive personal information. They'll need regular security debriefings, including after they leave the Department, acknowledging that the threat doesn't disappear when an employee walks out the door.

For DoD IT personnel and system owners, this means a significant increase in required training and compliance. For the contractors and subcontractors who handle DoD data, they are now under much stricter scrutiny regarding data location and security protocols, potentially increasing compliance costs and administrative load. The bill also builds in a strong accountability mechanism: the Secretary must notify Congress within 30 days of changing any related policy or after any specified security event, such as an unauthorized data exposure or the issuance of one of those national security waivers. This ensures a paper trail for crucial security decisions and incidents for when things go wrong.