FEDERAL REGISTER PART VIII INFORMATION SECURITY OVERSIGHT OFFICE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP84M00395R000600170026-0
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
8
Document Creation Date: 
December 20, 2016
Document Release Date: 
April 27, 2007
Sequence Number: 
26
Case Number: 
Publication Date: 
June 25, 1982
Content Type: 
REGULATION
File: 
AttachmentSize
PDF icon CIA-RDP84M00395R000600170026-0.pdf891.69 KB
Body: 
Approved For Release 2007/04/27: ClA, : : 5R000600170026-0 ML.j M. M Part VIII Friday June 25, 1982 Information Security Oversight Office National Security Information Uiro For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 eravllegister / Vol. 47, No. 123 / Friday T u 4-FORMATION SECURITY OVERSIQHT Sec. nCC11%C ne 25, 1982 / Rules and Regulations 32 CFR Part 2001 [Directive No. 1] National Security Information AGENCY: Information Security Oversight Office (ISOO). , ACTION: Implementing Directive; final rule. SUMMARY: The Information Security Oversight Office is publishing this Directive (final rule) pursuant to section c ori.ir., _e,., -. - - -A?" uenvauve identification and markings, Subpart C-Dedaaaification and Downgrading 2001.30 Listing declassification and downgrading authorities. 2001.31 Systematic review for declassification. . 2001.32 Mandatory review for declassification 2001.33 Assistance to the Department of State. 2001.34 FOIA and Privacy Act requests._ Subpart D-Safeguarding 2001.40 General. 200 1.41. Standards fQr security equipment relating to national security information. 2001.42 Accountability. The National Security Council approved 2001.43 Storage. this Directive on June 22. 1982. The 200144 Transmittal. Executive order prescribes a uniform 2001.45 Special access programs. information security system; It also 2001.48 Reproduction controls. establishes a monitoring system to 22 ?48 Doss o i possible compromise. enhance its effectiveness. This Directive ?48 esponsiibbiand o sets forth guidance to agencies 49 R Responslities of of huction o holders. 20 downgrading, declassification, and safeguarding of national security information. EFFECTIVE DATE: August 1, 1982. FOR FURTHER INFORMATION CONTACT. Steven Garfinkel, Director, ISOO. Telephone: 202-535?..7251. SUPPLEMENTARY INFORMATION: This 01.51 Emergency authority. Subpart E-Implementation and Review 2001.60 Agency regulations. 2001.61 Security education. 2001.62 Oversight. . Subpart F-General Provisions 2001.70 Definitions. 2001.71 Publication and effective date level. The information shall be safeguarded at the higher level in accordance with Subpart D, pending the determination about its classification level. Upon the determination of its classification level, the information shall be marked as provided in_$ 2001.5. 12001.2 Classification authority. (a) Requests for original classification authority (1.2 and 5.2(b)(5)1. A request for original classification authority pursuant to section 1.2 of Executive Order 12358 (hereinafter "the Order") shall include a compleTe justification for the level of classification authority sought, a description of the information that will require original classification, and the anticipated frequency of original classification actions. (b) Listing classification authorities [1.21. Agencies shall maintain a current listing of officials delegated original classification-authority by name, position, or other identifier. If possible, this listing shall be unclassified. (c) Exceptional cases 11.2(e)1. Information described in section 1.2(e) of the Order shall be protected as provided in 1 2001.1(b). 12001.3 Classification categories. FR 14874, April e, 1982 -? wv =. +VV.:/ AA"Jvilnuc1un (l.:rta/p Certain information provisions of section 5.2(b)(i) of which would otherwise be unclassified Executive Order 12358. The Purpose of Subpart A-Original Classification may require classification when the Directive is to assist in implementing _ combined or associated with other the Order, users of the Directive shall 12001.1 Classification levels. unclassified or classified information. refer concurrently to that Order for (a1 Limitations [1.1(b)1.i Markings Classification on this basis shall be guidance. other than "Top Secret," "Secret," and supported by a written explanation that, List of Subjects in 32 CFR part 2001 "Confidential," such as "For Official Use at a minimum, shall be maintained with Archives and records, Authors Only" or"Limited Official Use," shall the file or referenced on the record copy Authority not be used to identify national security of the information. delegations, Classified information, information. No other term or phrase (b) Unofficial publication or Executive orders, Freedom of shall be used in conjunction with these aclosure()) 11.3 d . Following an information, Information. Intelligence, markings, such as "Secret Sensitive" or National defense, National security "Agency Confidential," to Identify inadvertent dent cal or -or o oo n oforms rmation ed information, Presidential documents, national security information. The terms s filar to information in has ee al or Security information. Security measures. "Top Secret," "Secret," and classified in accordanthat itth the Order Title 32 of the Code of Federal "Confidential" should not be used to or predecessor orders, Regulations. Part 2001, is revised to read Identify nonclassified executive branch Peary interest shall dethe termine the as follows: informatio PART 2001-NATIONAL SECURITY INFORMATION Subpart A-Original Classification Sec. 2001.1 Classification levels. 2001.2 Classification authority. 2001.3 Classification categories. 2001.4 Duration of classification. 2001.5 Identification and markings. 2001.9 Limitations on classification. Subpart B-Derivative Classification 2001.20 Use of derivative classification. 200121 Classification guide,. degree of damage to the national (b) Reasonable doubt [1.1(c11. (1) security, the need for continued When there is reasonable doubt about classification, and. In coordination with the need to classify information, the the agency in which the disclosure information shall be safeguarded as if it Occurred what action must be taken to were "Confidential" Information in prevent similar occurrences. -'accordance with Subpart D, pending the determination about its classification. 12001.4 ? Duration Of classification. Upon the determination of a need for (a) Information not marked for classification, the information that is declassification (1.41. Information classified shall be marked as provided classified under predecessor orders that in 1 2001.5. is not subject to automatic (2) When there Is reasonable doubt declassification shall remain classified about the appropriate classification until reviewed for declassification. (b) Authority to extend automatic 'Bracketed reference, pertain to related sections declassification determinations of Executive Order izmse, The authority to extend the [1.4(b)]. rove.dLF9LRe1easP 7nn7r04i77 0IA-R DP84M00395R000600170026-0 Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Register I Vol. 47. No. 123 / Fly. June 25. 1982 / Rules and Regulations 27837 classification of information subject to that the potential benefits of portion marking are clearly outweighed by the predecessor orders Is limited to those Increased administrative burdens. officials who have classification Unless the portion marking requirement authority over the information and are has been waived as authorized, each designated In writing to have original portion of a document. including classification authority at the level of subjects and titles, shall be marked by the information to remain classified. placing a parenthetical designation Any decision to extend this . . immediately preceding or following the classification on other than a document- text to which It applies. The symbols by-document basis shall be reported to "(TS)" for Top Secret, "(S)" for Secret, " " for (U) the Director of the Information Security "(C)" for Confidential, and Oversight Office. Unclassified shall be used for this 120013 tdentltlcstlou and enartdnW purpose. If the application of parenthetical designations is not' (t.).1.5(b) and lair)]. A uniform Information security system practicable. the document shall contain requires that standard markings be a statement sufficient to identify the applied to national security Information. information that is classified and the Except in extraordinary circumstances level of such classification, and the propided in section 1.5(a) of'the information that is not classified. If all as as Indicated s section herein. the portions of a document are classified at Order, id d or as the of paper documents created e same level, this fact may be after the effective date of the Order indicated by a statement to that effect. If shall not deviate from the following a subject or title requires classification, prescribed formats. These markings an unclassified identifier may be applied to facilitate reference.. . (i) For an unclassified transmittal document -UNCLASSIFIED WHEN CLASSIFIED ENCLOSURE IS REMOVED" (Ii) For a classified transmittal document: "UPON REMOVAL OF ATTAI S THIS DOCUMENT IS (classification level of the transmittal document standing alone)" (2) 'Restricted Data"and 'Formerly Restricted Data"1B.Z(a)). "Restricted Data" and "Formerly Restricted Data" shall be marked in accordance with regulations.issued under the Atomic Energy Act of 1954, as amended. (3) Intelligence sources or methods (1.5(c)). Documents that contain information relating to intelligence sources or methods shall include the following marking unless otherwise proscribed by the Director of Central Intelligence: "WARNING NOTICE-IINT`ELLIGENCE SOURCES OR METFiiODS INVOLVED" shall also be affixed to material other than paper documents, or the originator (b) Classification authority If the (4) Foreign government information shall provide holders or recipients of the original classifier is other than the 11.5(c)). Documents that contain foreign information with written instructions for ' signer or approver of the document, the government information shall include protecting the information. identity shall be shown as follows: either the marking'TOREIGN (a) Classification level. The markings "CLASSIFIED BY (identification of original GOVERNMENT INFORMATION," or a ''Top Secret," "Secret," and classification authority)" marking that otherwise indicates that "Confidential" are used to indicate: that the information Is foreign government information requires protection as tc) Agency and office of 01'91n, If the Information. If the fact that information national security information under the identity of the originating agency and is foreign government information must Order, the highest level of classification office is not apparent on the face of a be concealed the marking shall not be document, it shall be placed below the used-and the document shall be marked the contained in a document; of each and .,ASSED BY" line. as if it were wholly oft J.S. origin. classification level form, each each page (d) Declassification and do~m each -portion a e n of a and, in tnetrvctionsDeclassification and.a~ (5) Computer output fL5(cJJ. abbreviated form, document. Documents that are generated as (1) Overall marking, The highest level applicable, downgrading instructions computer output may be marked of classification of information in a shall be shown aslollows: automatically by systems software. If document shall be marked in such a (1) For information to be declassified automatic marking is not practicable. way as to distinguish it clearly from the automatically on a specific date: such documents must be marked informational text. These markings shall "DECLASSIFY ON: (date]" manually. appear at the top and bottom of the (6) Agency preescribedmarkings outside of the front cover (if any), on the (2) For information to be declassified (1.5(c), 4.2(a). and &3(c)) Officials title page (if any), an the first page, and automatically upon occurrence of a ' delegated original classification on the outside of the back cover (if any). specific event _ authority by the President may prescribe (2) Page marking: Each interior page '"DECLASSIFY ON: (description of event)" additional markings to control of a classified document shall be reproduction and dissemination. marked at the top and bottom either (3) For information not to be including markings required for special according to the highest classification of declassified automatically: access programs authorized by section the content of the page. including the "DECLASSIFY ON: ORIGINATING 4.2(a) of the Order. designation "Unclassified" when it is AGENCY'S DETERNIINATION REQUIRED (I) Electrically transmitted applicable, or with the highest overall or'OADR? " information (messages) f1.5(c)J National classification of the document. (4) For information to be downgraded security information that is transmitted (3) Portion marking. Agency heads automatically on a specific date or upon electrically shall be marked as follows: may waive the portion marking occurrence of a specific event (1) The highest level of classification requirement for specified classes of "DOWNGRADE TO (classification level) shall appear before the first line of text; documents or information only upon a written determination that (i) There will ON (date or description of event)" (2) A "CLASSIFIED BY" line is not be minimal circulation of the specified (e) Special markings.-(1) Transmittal required. documents or information and minimal documents 11.5(c)). A transmittal (3) The duration of classification shall potential usage of these documents or document shall indicate on its face the appear as follows: information as a source for derivative highest classification of any information (1) For Information to be declassified classification determinations; or (ii) transmitted by It. It shall also include automatically on a specific date: there is some other basis to conclude the following or similar instruction: "DECO (date)" . ' 27838 Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Register / Vol. 47, No. 123 / Friday. June 25, 1982 / Rules and Regulations (Ii) For information to be declassified upon occurrence of a specific event "DECL: (description of event)" (iii) For information not to be automatically declassified which requires the originating agency's 'determination (see also 4 2001.5(d)(3)): "DECL? OADR" (iv) For information to be automatically downgraded: "DNG (abbreviation of classification level to which the information is to be downgraded and date or description of event on which downgrading is to occur)" (4) Portion marking shall be as prescribed in ? 2001.5(a)(3); (5) Special markings as prescribed in 2001.5(e) (2). (3). and (4) shall appear after the marking for the highest level of classification. These include: (i) "Restricted Data" and "Formerly Restricted Data" shall be marked in accordance with regulations issued under the Atomic Energy Act of 1954, as amended; (ii) Information concerning intelligence sources or methods: "WNINTEL," unless proscribed by the Director of Central Intelligence; (Iii) Foreign government information: "FGI," or a marking that otherwise indicates that the information is foreign government information.. If the fact that information is foreign government information must be concealed, the marking shall not be used and the - message shall be marked as if it were wholly of U.S. origin. (6) Paper copies of electrically transmitted messages shall be marked as provided in 12001.5(a) (1) and (2). (g) Changes in classification markings [1.4(b) and 4.1(b)J. When a change is made in the duration of classified information, all holders of record shall be promptly notified. If practicable, holders of record shall also be notified of a change in the level of classification. Holders shall alter the markings to conform to the change, citing the authority for It. If the remarking of large quantities of information is unduly burdensome, the holder may attach a change of classification notice to the storage unit in lieu of the marking action otherwise required. Items withdrawn from the collection fof purposes other " than transfer for storage shall be marked promptly In accordance with the change notice: 12001.6 Lknttations on classification (1.6(e)). Before reclassifying information as provided in section 1.8(c) of the Order, the authorized official shall consider the following factors, which shall be addressed in the report to the Director of the Information Security Oversight Office: (a) The elapsed time following disclosure; (b) The nature and extent of disclosure; (c) The ability to bring the fact of reclassification to the attention of persons to whom the information was disclosed; (d) The ability to prevent further disclosure; and (e) The ability to retrieve the information voluntarily from persons not authorized access in its reclassified state. Subpart B-Derivative Classification 12001.20 Use of derivative classification (2.1]. The application of derivative classification markings is a responsibility of those who incorporate, paraphrase, restate, or generate in new form information that is already . classified, and of those who apply markings in accordance with instructions from an authorized original classifier or in accordance with an authorized classification guide. If a person who applies derivative classification markings believes that the paraphrasing, restating, or summarizing of classified information has changed the level of or removed the basis for classification, that person must consult for a determination an appropriate official of the originating agency or office of origin who has the authority to upgrade, downgrade, or declassify the information. 1200121 Classtflation guides. (a) Ceneral [2.2(a)J. Classification guides shall. at a minimum: (1) Identify or categorize the elements of information to be protected, (2) State which classification level applies to each element or category of information; and (3) Prescribe declassification . instructions for each element or category of information in terms of (I) a period of time, (ii) the occurrence of an event, or (iii) a notation that the information shall not be declassified' automatically without the approval of the originating agency. (b) Requirement for review [2-2(a)]. Classification guides shall be reviewed at least every two years and updated as n , or as rec e y a necessary. Each agency shall classification guide, and shown on a guides maintain in a list current of its use. "DECLASSIFY ON' line as follows: . (c) Waivers [2.2(c)). An authorized . "DECLASSIRY ON: (date: description of official's decision to waive the event: or'ORIGINATING AGENCY'S requirement to issue classification DETERMINATION REQUIRED' (OADR))" guides for specific classes of documents or information should be based, at a minimum, on an evaluation of the following factors: (1) The ability to segregate and describe the elements of information; (2) The practicality of producing or disseminating the guide because of the nature of the information; (3) The anticipated usage of the guide as a basis for derivative classification; and (4) The availability of alternative sources for derivatively classifying the information in a uniform manner. 12001.22 Derivative Identification and markings [1.5(c) and 2.1(b)], Documents classified derivatively on the basis of source documents or classification guides shall bear all markings prescribed in 4 2001,5(a) through (e) as are applicable. ' Information for these markings shall be taken from the source document or instructions in the appropriate classification guide. (a) Classification authority. The authority for classification shall be shown as follows: "CLASSIFIED BY (description of source document or classification guide)" If a document is classified on the basis of more than one source document or classification guide, the authority for classification shall be shown as follows: "CLASSIFIED BY MULTIPLE SOURCES" In these cases the derivative classifier shall maintain the identification of each source with the file or record copy of the derivatively classified document. A document derivatively classified on the basis of a source document that Is marked "CLASSIFIED BY MULTIPLE SOURCES" shall cite the source document in its "CLASSIFIED BY" line rather than the term "MULTIPLE SOURCES." (b) Declassification and downgrading instructions. Dates or events for automatic declassification or downgrading, or the notation "ORIGINATING AGENCY'S DETERMINATION REQUIRED" to indicate that the document is not to be declassified automatically, shall be carried forward from the source docume t di t d b Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Register / Vol. 47, No. 123 / Friday, June 25, 2982 / Rules and Regulations 27839 Subpart C-DeclassMication and Downgrading 12001.30 Listing cis lassffication and downgrading authorltiss [3.1(b)1 Agencies shall maintain a current listing of officials delegated declassification or downgrading authority by name. position, or other identifier. If possible, this listing shall be unclassified. 4 2001.31 Systematic review for declassification [3.31 (a) Permanent records. Systematic review is applicable only to those classified records and presidential papers or records that the Archivist of the United States, acting under the Federal Records Act, has determined to be of sufficient historical or other value to warrant permanent retention. (b) Non permanent records. Non- permanent classified records shall be disposed of in accordance with schedules approved by the Administrator of General Services under the Records Disposal Act. These schedules shall provide for the continued retention of records subject to an ongoing mandatory review for declassification request. (c) Responsibilities. (1) In meeting responsibilities assigned by section 3.3(a) of the Order, the Archivist shall: (I) Establish procedures, in consultation with the Director of the Information Security Oversight Office, for the systematic declassification review of permanent classified records accessioned into the National Archives and classified presidential papers or records under the Archivist's control; (ii) Conduct systematic declassification ileviews in accordance with guidelines provided by the head of the agency that originated the information; or, with respect to foreign government information, in accordance with guidelines provided by the bead of the agency having declassification jurisdiction over the information, or, if no guidelines have been provided, in accordance with the general guidelines provided by the Director of the Information Security Oversight Office after coordination with the agencies having declassification authority over the information; or, with respect to presidential papers or records, in accordance with guidelines developed by;the;Archivist and approved by the National Security Council; (iii) Conduct systematic declassification reviews of accessioned records and presidential papers or records as they become 30 years old. except for file series concerning' intelligence activities (including special activities), or intelligence sources or methods created after 1945, and information concerning cryptology created after 1945; (iv) Conduct systematic declassification reviews of accessioned records and presidential papers or records in file series concerning intelligence activities (including special activities), or intelligence sources or methods created after 1945 and cryptology records created after 1945 as they become fifty years old; (v) Establish systematic review priorities for accessioned records and presidential papers or records based on the degree of researcher interest and the potential for declassifying a significant portion,of the information; (vi) Re-review for declassification accessioned records and presidential papers or records upon the determination that the followup review will be productive, both in terms of researcher interest and the potential for declassifying a significant portion of the information. (2) The Archivist may review for declassification, with the concurrence of the originating agency, accessioned records and presidential papers or records, prior to the timeframes established in paragraphs (c)(1) (iii) and (iv) of this section. (3) Officials delegated original classification authority by the President under the Order or predecessor orders shall: (i) Within six months of the effective date of the Order issue guidelines for systematic declassification review and, if applicable, for downgrading. These guidelines shall be developed in consultation with the Archivist and the Director of the'Information Security Oversight Office and be designed to assist the Archivist in the conduct of systematic reviews; (ii) Designate experienced personnel to provide timely assistance to the Archivist in the systematic review process; (iii) Review and update guidelines for systematic declassification review and downgrading at least every five years unless earlier review is requested by the Archivist (4) Within six months of the effective date of the Order the Director of the Information Security Oversight Office shall issue, in consultation with the Archivist and the agencies having declassification authority over the information, general guidelines for the systematic declassification review of foreign government information. Also within six months, agency heads may issue, in consultation with the Archivist and the Director of the Information Security Oversight Office..specific systematic declassification review guidelines for foreign government information over which the agency head has declassification authority. These guidelines shall be reviewed and updated every five years unless earlier review is requested by the Archivist. (d) Special procedures. All agency heads shall be bound by the special procedures for systematic review of classified cryptologic?records and classified records pertaining to intelligence activities (including special activities), or intelligence sources or methods issued by the Secretary of Defense and the Director of Central Intelligence, respectively. 12001.32 Mandatory review for deciassRtcation [3.41. -(a) U.S. originated information. (1) Each agency head shall publish in the Federal Register the identity of the person(s) or office(s) to which mandatory declassification review requests may be addressed. (2) Processing. (I) Requests for classified records in the custody of the originating agency. A valid mandatory declassification review request need not identify the requested information by date or title of the responsive records, but must be of sufficient particularity to allow agency personnel to locate the records containing the information sought with a reasonable amount of effort. Agency responses to mandatory declassification review requests shall be governed by the amount of search and review time required to process the request.-In responding to mandatory declassification review requests, agencies shall either make a prompt declassification determination and notify the requester accordingly, or inform the requester of the additional time needed to process the request. Agencies shall make a final determination within one year from the date of receipt except in unusual circumstances. When information cannot be declassified in its entirety, agencies will make reasonable efforts to release, consistent with other applicable law, those declassified portions of the requested information that constitute a coherent segment Upon the denial of an initial request, the agency shall also notify the requester of the right of an administrative appeal, which must be filed within 60 days of receipt of the denial. (ii) Requests for classified records in the custody of an agency other than the originating agency. When an agency receives a mandatory declassification review request for records in its Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Register / Vol. 47, No. 123 / Friday, June 25, 1982 / Rules and Regulations possession that were originated by another agency, it shall forward the request to that agency. The forwarding agency shall include a copy of the records requested together with its recommendations for action. Upon receipt, the originating agency shall process the request in accordance with f 2001.32(a)(2)(i). Upon request the originating agency shall communicate its declassification determination to the referring agency. (iii) Appeals of denials of mandatory declassification review requests. The agency appellate authority shall normally make a determination within 30 working days following the receipt of an appeal. If additional time is required to make a determination, the agency ? 2001.33 Assistance to the Department of State [3.3(b)]. Heads of agencies should assist the Department of State in its preparation of the Foreign Relations of the United States (FRUS) series by facilitating access to appropriate classified material In their custody and by expediting declassification review of documents proposed for inclusion in the FRUS. 12001.34 F01A and Privacy Act requests 13.4]. Agency heads shall process requests for declassification that are submitted under the provisions of the Freedom of Information Act, as amended. or the Privacy Act of 1974, in accordance with the provisions of those Acts. appellate authority shall notify the - Subpart D-Safeguardlng requester of the additional time needed and provide the requester with the _ 12001.40 General [L1]. reason for the extension. The agency Information classified pursuant to this appellate authority shall notify the Order or predecessor orders shall be requester in writing of the final afforded a level of protection against determination and of the reasons for any unauthorized disclosure commensurate denial. - with its level of classification. For (b) Foreign government informotion. Except as provided in this paragraph, agency heads shall process mandatory declassification review requests for - classified records containing foreign government information in accordance with f 2001.32(a). The agency that initially received or classified the foreign government information shall be responsible for making a declassification determination after consultation with concerned agencies. If the agency receiving the request is not the agency that received or classified the foreign government informati on. it shall refer the request to the appropriate agency for. action. Consultation with the foreign originator through appropriate channels may be necessary prior to final action on the request (c) Cryptologic and intelligence information. Mandatory declassification review requests for cryptologic information and information concerning intelligence activities (including special activities) or intelligence sources or maximum extent practicable. be of the methods shall be processed solely in available through accordance with special procedures - type the Federal issued by the Secretary of Defense and , _ Supply System. the Director of Central Intelligence. 2001.42_ Accountability [4.1(b)l respectively (a) Top Secret, Top Secret control . (d) Fees. In responding to mandatory officials shall be designated to receive, dedaiaification review requests for transmit. and maintain current access classified records. agency heads may and accountability records for Top charge fees in accordance with section Secret information. An inventory of Top 483a of-title 31, United States Code. The Secret documents shall be made at least schedules of fees published in the annually. Agency heads may waive the Federal Register by agencies In ? requirement for an annual inventory of implementation of Executive Order storage systems containing large 12085 shall remain in effect until they - volumes of Top$ecret information upon are revised a determination that the safeguarding of information in special access programs established under the provisions of section 4.2 of the Order, the safeguarding requirements of Subpart D may be modified by the agency head responsible for creating the special access program as long as the modified requirements provide appropriate protection for the information. 12001.41 Standards for security equipment [4.1(b) and 5.1(b)]. The Administrator of General Services shall, in coordination with agencies originating classified information, establish and publish uniform standards. specifications. and supply schedules for security equipment designed to provide secure storage for and to destroy classified information. Any agency may establish more stringent standards for its own use. Whenever new security equipment is procured it shall be In conformance with the standards and specifications this information is not jeopardized by the inventory waiver. Waivers shall be in writing and be available for review by the Information Security Oversight Office. (b) Secret and Confidential. Agency heads shall prescribe accountability or control requirements for Secret and Confidential information. f 2001.43 Storage [4.1(b)]. Classified information shall be stored only in facilities or under conditions designed to prevent unauthorized persons from gaining access to it. . (a) Minimum requirements for physical barriers. (1) Top Secret. Top Secret information shall be stored in a GSA-approved security container with an approved, built-in, three-position, dial-type changeable combination lock; in a vault protected by an alarm system and response force; or in other types of storage facilities that meet the standards for Top Secret established under the provisions of J 2001.41. In addition, heads of agencies shall prescribe those supplementary controls deemed necessary to restrict unauthorized access to areas in which such information is stored. (2) Secret and Confidential. Secret and Confidential information shall be stored in a manner and under the conditions prescribed for Top Secret information, of in a container, vault, or alarmed area that meets the standards for Secret or Confidential information established under the provisions of i 2001.41. Secret and Confidential information may also be stored in a safe-type filing cabinet having a built- in, three-position. dial-type changeable combination lock, or a steel filing cabinet equipped with a steel lock bar secured by a GSA-approved three- position changeable combination. padlock. Heads of agencies shall prescribe supplementary controls for storage of Secret information in cabinets equipped with a steel lock bar. Access to bulky Secret and Confidential material in weapons storage areas, strong rooms, closed areas or similar facilities shall be controlled in - accordance with requirements established by the appropriate agency - head. At a minimum, such requirements shall prescribe the use of key-operated, high-security padlocks approved by the General Services Administration. (b) Combinations. (1) Equipment in service. Combinations to dial-type locks shall be changed only by persons having an appropriate security clearance, and shall be changed whenever such equipment is placed in use; whenever a person knowing the combination no Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Register / VoL 47. No. 129 / Friday, June 25,-29B2 / Rules and Regulations longer requires access to It whenever a combination has been subjected to possible compromise; whenever the equipmentls taken out of service; or at least once every year. Knowledge of combinations shall be limited to the minimum number of persons necessary for operating purposes. Records of combinations shall be classified no lower than the highest level of classified information that is protected by the lock. (2) Equipment out of service. When security equipment is taken out of service it shall be inspected to ensure that no classified information remains, and the built-in combination lock shall be reset to the standard combination 50- 25-50. Combination padlocks shall be reset to the standard combination 10- 20-30. (c) Keys. Heads of agencies shall establish administrative procedures for the control and accountability of keys and locks whenever key-operated, high- security padlocks are utilized. The level of protection provided such keys shall be equivalent to that afforded the classified information being protected by the padlock. J 2001A4 Transmittal I4.1(b)]. (a) Preparation and receipting. Classified information to be transmitted outside of a facility shall be enclosed in opaque inner and outer covers. The inner cover shall be a sealed wrapper or envelope plainly marked with the assigned classification and addresses of both sender and addressee. The outer - cover shall be sealed and addressed with no identification of the classification of its contents. A receipt shall be attached to or enclosed in the inner cover, except that Confidential information shall require a receipt only if the sender deems it necessary. The receipt shall identify the sender, the addressee, and the document, but shall contain no classified information. It shall be immediately signed by the recipient and returned to the sender. Any of these wrapping and receipting requirements may be waived by agency heads if conditions provide at least equivalent protection to prevent access by unauthorized persons. (b) Transmittal of Top Secret. The transmittal of Top Secret information outside of a facility shall be by specifically designated personnel. by State Department diplomatic pouch, by a messenger-courier system authorized for the purpose, or over authorized secure communications circuits. (c) Transmittal of Secret The transmittal of Secret information shall be effected in the following manner (1) The 50 States, the District-of Columbia, and Puerto Rico. Secret Information may be transmitted within and between the 50 States, the District of Columbia, and the Commonwealth of Puerto Rico by one of the means authorized for Top Secret Information. by the U.S. Postal Service registered mail, or by protective services provided by U.S. air or surface commercial carriers under such conditions as may be prescribed by the head of the agency concerned. (2) Other areas. Secret information may be transmitted from, to, or within areas other than those specified in i 2001.44(c)(1) by one of the means established for Top Secret information, or by U.S. registered mail through Military Postal Service facilities provided that the information does not at any time pass out of U.S. citizen control and does not pass through a foreign postal system Transmittal outside such areas may also be accomplished under escort of - appropriately cleared personnel aboard U.S. Government and U.S. Government contract vehicles or aircraft, ships of the United States Navy, civil service manned U.S. Naval ships, and ships of U.S. registry. Operators of vehicles, captains or masters of vessels, and pilots of aircraft who are U.S.-citizens and who are appropriately cleared may be designated as escorts. (d) Transmittal of Confidential. Confidential information shall be transmitted within and between the 50 States, the District of Columbia, the Commonwealth of Puerto Rico, and U.S. territories or possessions by one of the means established for higher classifications, or by the U.S. Postal Service certified, first class, or express mail service when prescribed by an agency head. Outside these areas. Confidential information shall be transmitted only as is authorized for higher classifications. (e) Hand carrying of classified information. Agency regulations shall prescribe procedures and appropriate restrictions concerning the escort or hand carrying of classified information, including the hand carrying of classsified information on commercial carriers. 12001.45 Special access programs [ 1.2(a) and 4.2(a)]. Agency heads designated pursuant to section 1.2(a) of the Order may create or continue a special access program if: (a) Norm management and safeguarding procedures do not limit access sufficiently; and (b) the dumber of persons with access to limited to the minimum necessary to meet the objective of providing extra protection for the information. 27841 ! 2001A6 Reproduetlon controls 14.1(b)]. (a) Top Secret documents, except for the controlled initial distribution of information processed or received electrically, shall not be reproduced without the consent of the originator. (b) Unless restricted by the originating agency, Secret and Confidential documents may be reproduced to the extent required by operational needs. (c) Reproduced copies of classified documents shall be subject to the same accountability and controls as the original documents. (d) Paragraphs (a) and (b) of-this section shall not restrict the reproduction of documents to facilitate review for declassification. 12001.47 Lass or possible compromise [4.1(b)]. Any person who has knowledge of the loss or possible compromise of classified information shall immediately report the circumstances to an official designated for this purpose by the person's agency or organization. The agency that originated the information shall be notified of the loss or possible compromise so that a damage assessment may be conducted and appropriate measures taken to negate or minimize any adverse effect of the compromise. The agency under whose cognizance the lose or possible - .compromise occurred shall initiate an inquiry to (a) determine cause, (b) place responsibility, and (c) take corrective measures and appropriate administrative, disciplinary, or legal action. ? 2001A6 Disposition and destruction 14.1(b)1 Classified information no longer needed in current working files or for reference or record purposes shall be processed for appropriate disposition in accordance with the provisions of chapters 21 and 33 of title 44, United States Code, which govern disposition of Federal records. Classified information approved for destruction shall be destroyed in accordance with procedures and methods prescribed by the head of the agency. The method of destruction must preclude recognition or reconstruction of the classified information or material. ? 2001.49 Responsibilities of holders 14.1(b)]. Any person having access to and possession of classified information is responsible for. (a) Protecting it from persons not authorized access to it, to include securing it in approved equipment or facilities whenever it is not under the direct supervision of Who Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0 Federal Ragiater / Vo& 47. Hirt. 123, / Friday, )uae? 25, 1882 / Rules and Regulations authorized persons; and (b) meetag accountability requirements proscribed by the head of the agency. f 2001.51 Emergency planning 14.1(b)1 Agencies shall develop plans for the protection. removal. or destruction. of classified material in case of are. natural disaster. dvi} disturbance, or enemy action. These plans shall include the disposition of classified information located In foreign countries. f 2001.St Emerg ncy wUrorlly [4:1(b)L - Those officials delegated original classification authority by the President may prescribe by regulation special provisions, for the dissemination. transmittal, destruction, and safeguarding of national security information during combat or other emergency situations which pose an imminent threat to national security information Subpart E-lmplementatlon and Review , I 2001.60 Agony regulations [S.3(b)1 Each head of an agency shall issue regulations in accordance with 5 U.S.C. 552(a) to implement the Order and 32 CFR Part 2001 no later than December 31, 19M Those portions that affect members of the public shall include, at a minimum. information relating to the agency's mandatory declassification review program and instructions for submitting suggestions or complaints regarding the agency's information security program. 12001.61 Security education [5.3(x)1 Each agency that creates or handles national security information is required under the Order to establish a security education program. The program established shall be sufficient to familiarize all necessary personnel with the provisions of the Order and its implementing directives and regulations and to impress upon them their individual security responsibilities. The program shall also provide for initial, refresher. and terminatiimn briefings. . 12001.62 Oversight f5.3(aT1 Agency beads shall require. that... periodic formal reviews be made to ensure compliance with the provisions of the Order and 1500 directives. Subpart F-General Provisions f 2001.70 Definitions (4.11 (a) Original a&issificatian autharityc The authority vested is an executive branch official to make an initial determination that information regsbes protection against unauthorized disclosure in the interest of national security. (b) Classifkotion guide. A document issued by an authorized original classifier that prescribes the level of classification and appropriate declassification instructions for specified information to be classified on a derivative basis. (c) Originating agency. The agency responsible for the initial determination that particular information is clasar''red. (d) Multiple sources. The term used to indicate that a document is. derivatively classified when it contains classified information derived from more than one .source. (e) Partiaa A segment of a document for purposes of expressing a unified theme; ordinarily a paragraph. V) Specid aaeve p ogtvm. Any program imposims "need-to-know" or access controls beyond those sorsraliy provided for access to Confidelitial, Secref4 or Top Secret information. Such a program any include, but is not limited to, special clearance. adjudication. or investigative requirements. special designations of officials authorized to determine "need- to-know." or special bate of persons -determined to have a "need-to-know.' . (g) Intelligence activity. An activity that an agency within the Intelligence Community is authorized to conduct pursuant to Executive Order 22333. ('h) Special activity. An activity conducted in support of national foreign policy objectives abroad which is planned and executed so that the role of the United States Government is not apparent or acknowledged publicly, and functions in support of such activity, but. which is no( intended to influence United States political processes. public opinion, policies, or media and does not include diplomatic activities or the collection and production of intelligence or related support functions. (i) Unauthorized disclosure. A communication or physical transfer of classified information to an unauthorized recipient. 12001.71 Publication and effective data [6:2(6)1 Part 2001 shall be published in the Federal Register. It shall become effective August 1, 19M Steven Garfinkel. Director, InformatioirSecurity Oversight Office. June 23, 1982. RR Doc. a -27ne Filed 5...-1O37 .n sarrrro CODE 6820-AF-O roved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0