When would DoD authorized users require access to PCII?
Authorized users require PCII access only on a need-to-know basis for the specific PCII for purposes such as identifying critical infrastructure vulnerabilities, planning for prevention and incident responses, issuing alerts and warnings and responding to incidents. Access to PCII is governed by the CII Act, the Final Rule, and DoD and DHS PCII policy and procedural guidance.