CONTROL MARKINGS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP86-00674R000300080009-0
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
37
Document Creation Date: 
December 19, 2016
Document Release Date: 
March 30, 2006
Sequence Number: 
9
Case Number: 
Publication Date: 
November 1, 1979
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP86-00674R000300080009-0.pdf2.18 MB
Body: 
Approved For Release IQ 1F 1 U"61 MEMORANDUM FOR: Chairman, Markings Task Force DDA Representative, Markings Task Force SUBJECT: Control Markings 1. The Markings Task Force has been discussing the discontinuation of the control marking, "Administrative - Internal Use Only." The arguments for doing away with it are substantial: a. It has been misused a great deal; and b. The safeguarding sanctions are not clearly defined. 2. I have discussed the use and need of such a marking with a number of people throughout the DDA. There is a need to protect internal Agency information which if released might be misused or be misleading. These papers include: a. Management options and recommendations; and b. Administrative planning and procedures. 3. Discussion for the need to have a positive indicator to alert employees that a document contains such information has been lively and interesting. Some of the arguments for and against include: a. Some people feel if a piece of paper is not marked, employees will/may take it home and discuss the contents freely. b. Unclassified government information doesn't need to be marked as it is U.S. Government property and all employees should be aware of this and handle all such material as prescribed by regulations and law. t tCLASSi `IF.D WPe i SepaX stet. F,r o ic;tesurb Approved For Release 2006/04/1 MM 748000300080009-0 - "' 0 N D CONFIDENTIAL Approved For Release 0 /04/19 : CIA-RDP86-00674R000300080009-0 c. What about HR 0 (attached), "Care and Use of Official Data"? This regulation is under review for revision as the current definition of "Official Data" includes all overt material received by the CIA, including the New York Times, library books, etc. Those reviewing the regulation are having problems coming to grips with the definition. 4. In order to provide proper control over Agency in- ternal documents, I suggest we do one of two things: a. Write a proper definition of "Official Data" and get the regulation out to all employees. If a component is concerned they may indicate on a document "Official Data - Internal Use Only;" or b. Develop a new control marking for documents which (1) reflect opinion or recommendations for management policy; or (2) administrative procedures. 5. The first option appeals as HR 0 spells out 25X1 control of information in general. Sanctions are provided whether the information is marked or not. 6. The second option implies a new marking with a new definition. We suggest "Agency Restricted" as a marking to meet this need. This could be defined as: Information prepared by Agency per- sonnel or consultants, such as that pertaining to opinions, recommendations, interpretations, plans or internal pro- cedures, the disclosure of which could prejudice, hinder or deter the Agency from carrying out essential management or administrative functions. 7. The intent is (1) to ensure that such information is only released to the public through authorized channels and (2) to provide an environment conducive to the uninhibited exchange of ideas. Sanctions for the improper use of an un- classified document should follow those for unauthorized release. (There is opposition to giving a control marking Approved For Release 2006/04t1 T: CIA-RDP86-00674R000300080009-0 CONFIDENTIAL Approved For ReleasCOGM19FID6MNT 74R000300080009-0 to documents containing national security information. We have been relying on the classification to control these papers. I submit that even after classifications are no longer valid, the internal nature of some of these documents will remain.) 8. In summary, we need at leastprovide a positive indicator to control the dissemination of unclassified man- agement information and administrative procedures. signed D Attachment: a/s cc: DDO/P NFAC/ DDS&T OGC DDA/O ISAS/ ISAS/ Approved For Release 2006/041-193 CIA-RDP86-00674R000300080009-0 CONFIDENTIAL CONFIDENTIAL Approved For Re URM04/19 : CIA-RDP86-00674R000300080009-0 21. CARE AND USE OF OFFICIAL DATA. All information, classified or unclassified, received, compiled or created by the Central Intelligence Agency (except personal copies of unclassified personnel papers) is official data and is the property of the United States Government. a. POLICY (1) All employees are prohibited from using official data for any purpose other than in the performance of their official duties for or on behalf of the Agency. Official data is not to be held in personal files or set aside for personal use or benefit. (2) Official data is not to be copied or removed from the files of the Agency for release outside the Agency except by those officials authorized through chain of command by the Director of Central Intelligence. (3) Any employee who is served with a subpoena which may require the dis- closure of official data to a court, the Congress, or a committee of the Congress will promptly inform the General Counsel of the serving of the subpoena, the nature of the information sought, and any circumstances which may bear upon the desirability of making available the official data, so that the General Counsel may advise the Director. (4) When not in use, official data must be kept in storage facilities which have been approved by the Director of Security. Consequently, documents which contain official data are not to be taken home or stored in private resi- dences unless the use of an approved, secure facility has been authorized in advance by the Director of Security. (5) In addition to the prohibition against unauthorized disclosure of official data outside the Agency, internal disclosure of official data is limited to those employees whose duties require access to it. Employees are not to disclose official data to those who do not need to know it, nor are they to try to obtain official data they do not need to know. b. RESPONSIBILITIES (1) Each individual employed by the Central Intelligence Agency is responsible for the secure handling of official data and for protecting it against un- authorized disclosure. Termination of Agency employment will not affect these responsibilities. (2) The Director of Personnel is to ensure that all personnel processed through headquarters report to the Office of Security to read this regulation a l the statutes referred to in subparagraph c below before entering on duty or separating from the Agency. personnel not processed through headquarters read this regulation and the statutes referred to in subparagraph c before entering on duty or separating from the Agency. (4) Any authorized representative of CIA who negotiates with individuals or organizations for services is to ensure that the appropriate statutory pro- visions are incorporated in the Secrecy Agreement or contract. The in- corporation may be by reference where feasible. (3) Chiefs of Installations are to ensure that all Revised: 14 November 1969 (508) CONFIDENTIAL F.. ,d.d I,.m cuteweN, dornp,.di,g .,d Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approt F 0. STATUTORY REFERENCES. Sections 793, 794, and 798, Title 18 of United States Code prohibit certain activities with respect to defense information and provide penalties for violation. Section 793 provides generally that persons who lose defense information without reporting such loss, or gather or transmit defense information with the intent or with reason to believe such information will be used to the injury of the United States or to the advantage of any foreign nation are subject to a fine of $10,000 or 10 years imprisonment or both. Section 794 provides generally that persons who communicate or deliver or attempt to communicate or deliver defense information to any foreign government with intent or reason to believe such information will be used to the injury of the United States or to the advantage of a foreign government are subject to imprisonment for not more than 20 years. If this statute is violated during wartime, the punishment is death or imprisonment for not more than 30 years. Both sections 793 and 794 provide like penalties for a conviction of conspiracy to violate either section. Section 798 provides generally that persons who com- municate or otherwise make available to an unauthorized person or pub- lisher, or use in any manner prejudicial to the safety or interest of the United States or for the benefit of any foreign government any classified information relating to cryptography or communications intelligence are subject to a fine of $10,000 or 20 years imprisonment or both. Revised: 14 November 1969 (508) CONFIDENTIAL Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THIS SAMPLE LETTER DOES NOT CONTAIN CLASSIFIED INFORMATION CONFIDENTIAL 0 INFORMATION SECURITY OVERSIGHT OFFICE Washington, D.C. 20405 September 30, 1978 0 SUBJECT: MINIMUM REQUIRED MARKINGS FOR CLASSIFIED DOCUMENTS (U) 6A1 TO: ALL EXECUTIVE BRANCH AGENCIES (C) Each portion of a classified document shall be marked.to indicate the highest classification of information it contains. For example, this paragraph is marked as if it contained Confidential information. (U) The circled numbers on this page indicate those markings required .for all classified documents. The footnotes below refer to the appropriate paragraph of this directive. (U) Other markings shall be applied to classified material depending on the content: If it is determined that the information should be down- graded automatically, see para. I.G.4. :[f the document does not contain classified information but As used to transmit classified material, see para I.G.11. :[f the document contains foreign government information, :gee para. I.G.12. :[f the document contains Restricted Data or Formerly Restricted Data, see para. I.H.I. :[f the document contains Information on intelligence sources and methods, see para. I.H.2. :[f it is determined that the information requires limitations on reproduction and/or dissemination, see para. I.H.3. I.M. AWARE Director Classified by CONFIDENTIAL FOOTNOTES 1. Page markings 2. Office of origin 3. Date of classification 4. Subjects and titles 5. Identity of classifier Q Declassify Review for ,?1 Declassification on l6! Extended by 0 Reason for extension Date/event for declassification/ review-(chec.k appropriate block) I.G.3. Extention: authority i.G.S. Extention: reason I.G.6. Mandatory portion marking I.G.9. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674ROO0300080009-0 THIS SAMPLE LETTER DOES NOT CONTAIN CLASSIFIED INFORMATION CONFIDENTIAL 0 INFORMATION SECURITY OVERSIGHT OFFICE Washington, D.C. 20405 September 30, 1978 0 SUBJECT: MINIMUM REQUIRED MARKINGS FOR CLASSIFIED DOCUMENTS (U) fat TO: ALL EXECUTIVE BRANCH AGENCIES (C) Each portion of a classified document shall be marked to indicate the highest classification of information it contains. For example, this paragraph is marked as if it contained Confidential Information. (U) The circled numbers on this page indicate those markings required for all classified documents. The footnotes below refer to the appropriate paragraph of this directive. (U) Other makings shall be applied to classified material depending on the content: :[f it is determined that the information should be down- graded automatically, see para. I.G.4. . If the document does not contain classified information but :Ls used to transmit classified material, see para I.G.11. If the document contains foreign government information, see para. I.G.12. If the document contains Restricted Data or Formerly Restricted Data, see para. I.H.1. If the document contains information on intelligence sources and methods, see para. I.H.2. If it is determined that the information requires limitations on reproduction and/or dissemination, see para. I.H.3. I.M. AWARE Director Classified by (D CONFIDENTIAL FOOTNOTES 1. Page markings I.G.7. 6. 2. Office of origin I.G.2. 3. Date of classification I.G.2. 7. 4. Subjects and titles I,G.8.a9. 8. 5. Identity of classifier I.G.J. 9. DeclassifyDReview for O Declassification on 6 Extended by Reason for extension O Date/event for declassification/ review (check appropriate block) I.G.3. Extention: authority I.G.S. Extention: reason I.G.6. Mandatory portion marking I.G.9. Approved For Release 2006/04/19 : CIA-RDP86-00674ROO0300080009-0 Approved For Release 2096 OA/19;9 A-RDP86-00674R000300080009-0 Ur iqjin,il Classification Not to I xceed 6 years CL BY: C/S/TS classifier's ernp 11L(:I. ON: a. 13 September 1980 or b. Event Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 CONFIDENTIAL Markinq Original Classification on Documents Classified in Excess of 6 years but Not in Excess of 20 years tUNIIPL NIIAL Y: C/S/TS classifier's employee no. ECL ON: a 13 Septemberr1980 T or b. Event ~ Oft ZE ON 13 September 1988 [`l classifier is not TS EX BY T5 c~assifier REASON class. guide Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 SECRET Downgrading Documents SECRET CL BY: S/TS classifier's employee no. DOWNGRADE TO C on a. spec?'dato V.. b. Event L N DE L O a. spec. date b. Event OR REVW ON same as a or b TS cTas sifier REASON class. 1uide # Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 SECRET Derivative Single Source If the source material bears a declassification date or event 20 years or less from the date of origin, the date or event shall be carried forward to the new material. If the source material bears no declassification date or event, or bears an indeterminate date or event such as "Upon Notification by Originator," "Cannot Be Determined," "Impossible to Determine," etc., or is marked for declassification beyond 20 .years, the new material shall be marked with a date for review for declassification at 20 years from the date of original class,sification of the source material. SECRET CL BY: an one's employee no. SOURCE: class nice or source doc DECL ON: spec, date or event OR REVW ON: date for declass review as cited on source doc. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/05~/S :1CIA-RDP86-00674R000300080009-0 Mul ti pl e It the source material bears a declassification date or event 20 years or less from the date or origin, the date or event shall be carried forward to the new material. If' the source material bears no declassification date or event, or bears an indeterminate date or event such as "Upon Notification by Originator," "Cannot Be Determined," "Impossible to Determine," etc., or is marked for declassification beyond ?0 years, the new material shall be marked with a date for review for declassification at 20 years from the date of original classification of the source material. S(_CRFT CL BY: ayne's_ employee no. DFCI. : latest date or event of source materials OR RFVW ON: latest date or event of source materials Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/ ~RE CIA-RDP86-00674R000300080009-0 Foreign Information If the source material is foreign government information bearing no date or event for declassification or is marked for declassi1icai:ion beyond 30 years, the new material shall be marked for review for declassification at 30 years from the time the -information was originated by the foreign entity or acquired or classified by the US, whichever is earlier. CL BY: anyone's employee no. SOURCE. a. Id of source-do-c. b. Mem.,of Undue. { c. class guide REVW ON: date (30 ear after info was originated by foreign government or class. by U.S. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 (6820-271 C Marking Derivatively Classified Doeu- shall not create any' preslIMIA1OU as to v 11 - - -Approveu Section 111. DeclasStfIcation and F. Foreign government irifonna- Downgrading tion.-1. Identification. "Foreign gov- CHAPTER XX--iATERAGENCY CLAS- SIFICATION REVIEW COMMITTEE (Directive No. 1) INFORMATION SECURITY OVERSIGHT OFFICE Notional Security Information AGENCY: Interagency Classification Review Committee (ICRC). ACTION: Implementing directive. SUMMARY: The Interagency Classifi- cation Review Committee is publishing this directive to Implement Executive Order 12065, relating to the classifka- tion, downgrading, declassification and safeguarding of national security In- formation. This directive was ap- proved by the National Security Coun- cil for publication and issuance on September 29, 1978. The Executive order is intended to increase openness in Government by limiting c)assifl,.a- lion and accelerating declassification but at the same time, providing Im- proved protection against unauthi)r- Ized disclosure for that information that requires such protection in the interest of national security. This di- rective sets forth guidelines to agen- cies on original and derivative classifi- cation, downgrading, declassification and safeguarding of national security information. EFFECTIVE 1978. FOR FURTHER CONTACT: Robert W. Wells, Executive Director, ICRC, Telephone: 202-724-1578. SUPPLEMENTARY INFORMATION: This directive is issued pursuant to the provisions of section 8-204 of Execu- tive Order 12085, The Purpose of the directive is to assist in the implemen- tation of Executive Order 12065, wad users of the directive shall refer con- currently to the Executive, order for guidance. TABLE or Cosrasxs Section 1. Original Classification A Definition, B Classification Authority. C Request for Clara fiction Authority, D Record Requirements, E Claaucification Procedure. F Foreign Government Information. G Standard Identification and Markings, h Additional Markings Required. I Abbreviations, Section 11. Derivative Classification Definition, J3 Responsibility. A Record Requirements. B Declassification Policy. C Systematic Review for Declassification. D Procedures for Mandatory Declarifica- lion Review. Section IV. Safeguarding A General. H General Restrictions on Access. C Access by historical Researchers and Former Presidential Appointees. D DLsscinlnat.lon. E Accountability Procedures. F Storage. G Transmittal. 11 Loss or Possible Compromise. I Destruction. Section V. Implementation and Review: Challenges to Classification SecUon VI. General Provisions A Notification, B Posted Notice. C Downgrading, Declassiflent Ion. and Up- grading Markings. D Combat Operations, U Publication and Effective Date. 1. ORIGINAL CLASSIFICATION A. Definition. "Original classifica- tion" as used in the order means an initial determination that, information requires protection against unauthor- ized disclosure in the interest of na- tional security, and a designation of the level of classification (D. I B. Classification authority. In the absence of an authorized classifier, anyone designated to act in that per- son's absence may exercise the classi- fier's authority (1-204). C. Request for classification autltori? ty. Requests for original classification authority for agencies not listed in sec- tion 1-2 of the order shall be submit- ted to the President through the In- formation Security Oversight Office, Requests shall include: (1) The desig- nation of the officials for whom or po- sitions for which authority is sought, (2) the level of authority requested, and (3) the Justification for such re- quests, Including a description of the type of information that Is anticipated to require original classification (1-2). D. Record requirenlents, Agencies and officials granted original classifi- cation authority pursuant to section 1- 2 of the order shall maintain a current listing, by classification designation, of individuals to whom or positions to which original classification authority has been delegated (1-2). E. Classification procedure. Except as provided in section 1-303 of the order, the fact that the information concerns one or more of the qualifying criteria or categories of information 'Parcnlhetfeal references are to related sections of Executive Order 12065. er-nment. information" is: a. Information provided to the United States by a foreign government. or international organization of gov- ernments In the expectation, express or implied, that the information is to be kept In confidence; or b. Information produced by the United States pursuant to a written Joint arrangement with a foreign gov- ernment. or international organization of governments requiring that either the information or the arrangement, or both, be kept in confidence. Such a written joint arrangement may be evi- denced by an exchange of letters. it memorandum of understanding, or other written record (1-303 and 6-103 ). 2. Duration of classification l;niess the guidelines developed pursuant to section 3-404 of the order or other guidelines prescribe dates or events for declassification or for review for tie- classification: & Foreign government Information shall not be assigned a date or event for automatic dcclassiflcatien unto: such is specified or agreed to by the foreign government or interriatiorual organization of governments. b. Foreign government information classified after the effective date of the order shall be assigned a (late for review for declassification up to 30 years from the time the information was classified or acquired. (1-402 and 3-404). G. Standard identification and markings. At the time of original cLe.- sification, the following shall be shown on the face of paper copies of all classified documents: 1. Identity of classifier. The icletdliv of the classifier, unless also the signer or approver of the document. shall be shown on a "classified by" line: e.g., "Classified by John Doc" or "Ciassi- fled by Director. XXX" (1-501(a)), 2. Date of classification and oftice'of origin. The date and office of origin on a document at the.. time of its origi- nation may be considered the date of classification and identification of the office of origin (1-501(b)). 3. Date or event for declassification or review. The date for automatic de- classification or for declassification review shall be shown on a "declassify on" or a "review for declassification on" line: e.g., Declassify on 1 Novem. ber 1984," "Peelessify on completion of State visit," or "Review for declassi- fication on 1 November 1998" (1- 501(c)). 4. Downgrading markings, When It Is determined (e.g., in a classification guide) that a classified document should be downgraded autoroatically tFEDERAL REGISTER, VOL. 43, NO. 194-THURSDAY, OCTOBER 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 248UMPM. I'AA6t100674R000300080009-0 at It certain date or upon a certain event, that date or event shall be re- corded on the face of the document: e.g., "Downgraded to Secret on 1 No- vember 19DO" or "Downgraded to Con- fidential on 1 December 1915" (1-5). 5. Identity of extension authority. The Identity of the official who autho- rizes a date for declassification or for review for declassification that is more than 6 years beyond the (late of the document's ciaasiticat Ion shall be shown on the document, unless that official also is the classifier, Signer, or approver of the document. This mark. ing shall be shown substantially as fol- lows: -Extended by (Insert name or title of position of agency head or Top Secret classification authority)" (I- 502). 6. Reason for extension. When classi- fication is extended beyond 6 years, t Ile reason shall be stated on the docu. ment either in narrative loan or by reference to an agency regulation that states the reason for ext('nsion in nar- rative form. The reason shall be Shown substantially as follows: "Reason for extension: (State reason or applicable reference)" (1-502). 7. Overall and pope marking of docu. menns. The overall classification of a document shall be marked, stamped, Cr oaffixed permanently at the top and bottom of the outuide of the front cover (if any), on the title page (if any), on the first page, and on the out- sicie of the back cover (if any). Each interior page of a classified document shat; be marked or stamped at the top sari bottom either acc:oid.:ng to the hi(;iaest classification of the content of tae' page, including the designation 'Unclassified" when appropriate, or ;icenrduu; to the highest os' rail classi- fication of the docii nent. In any catae, Il?,-' classification marking of tile page shall not supersede the classification marking of portions of the page rnrsrked with lower levels of classifica- t?u (1-fi0I(d)). 8 .Subject and titles. Whenever prac- I -able, subjects and titles shall be se- Iceted so n:7 not to require classifica- t nn. When alt! subject or title is cl:LS- i}srd, an unclassificd identifier may he a.:ssigne i to facilitate receipLing arid e'er~ we (1-5). J. Alunelatoru portion marking. Clas. ifu'rs shall identify the level of clan ;i- (irniron of each classified portion of a 'i' ('untcnt (including subjects and bites), and those portions that are not, cla:,5ified. Portion marking I,hafl be ac.- t?unkplisl:ed by planing a parenthetical designator inunediat.ely preceding or Ioliowwinv? the text that it governs, The synibols for top secret, "(S)" for secret, "(C)" for confidtnitial, arid "(U)" for unclassitled shall be used for rhL' purpose. It Individual portion marking is Impracticable, the docu- ment, shall contain a descrl!,)t.ion suffi- cleat to identify the information that is classified and the' level of such clas- sification. A waiver of the portion niarklux requirernent may be granted by the Director of the Information ,se- curity Oversight Office. Requests for such waivers shall be made by the head of an agency or designee to the Director and shall include: (a) Identifi- cation of the Information or classes of documents for which such waiver is sought, (b) a detailed explanation of why the waiver should be granted, (c) the agency's best judgment as to the anticipated dissemination of the infor- mation or class of documents for which waiver Is sought, and (d) the extent to which the Information sub- ject to the waiver may form a basis for classification of other documents Q- 504). 10. Material other than documents. The classification and associated markings prescribed by this directive of docutrrcnte shall, where practicable, be affixed to material other than doc- uments by stamping, tagging, or other means, It this Is not practicable, recipi- ents shall be made aware of the classi- fication and associated markings by notification or other means as pre- scribed by the agency (1-5). 11. Transmittal documents, A trans- mittal document shall Indicate on its face the highest classification of the information transmitted by it and the classification, if any, of the transmit- tal document, For example, an unclas- sified transmittal document should hear a notation -substantially as fol- lows: "Unclassified When Classified Enclosure Is Detached" Q. 5). 12. Marking foreign government in- formation. Except In those cases where such markings would reveal in- telligence Information, foreign govern- ment Information incorporated in United States documents shall, when- ever practicable, be Identified in such manner as,to ensure that the foreign government information Is not declas- sified prematurely or made accessible to nationals of a third country without consent of the originator. Documents classified by a foreign government or an international orgsuiizat,fon of gov- ermnents shall, it the foreign classifi- cation Is not in English, be marked with the equivalent U.S. classification, Foreign government information not classified by a foreign government, or an International Organization of gov- ernments but provided to the United fitates in confidence by a foreign gov- ernment or by an international organi- zation of governments shall be classi- fied at an appropriate level and shall be marked with the U.S. classification accordingly (1-5). 11. Additional markings required. In addition to the marking requirements in paragraph (1, the following mark- ings shall, as appropriate, be displayed prominently on classified information. When display of these additional markings is not practicable, their ap- plicability to the Information shall be Included in the written notification of the assigned classification (1-5). 1. Restricted data or formerly re- stricted data For classified informa- tion containing restricted data or for- merly restricted data os defined in the Atomic Energy Act of 1954, as amend- ed, such markings as may be pre- scribed by the Department of Energy In regulations issued pursuant to the act shall be applied. 2. Intelligence sources and methods information. For classified Informa- don involving Intelligence sources or methods: "Warning Notice-Intelii- gence Sources and Methods Involved", 3. Dissemination and reproduction notice. For classified information that the originator has determined, pursu- ant to section 1-506 of the order, should be subject to special dissemina- tion or reproduction limitations, or both, a statement placing the user on notice of the restrictions shall be in- cluded In the text of the document or on Its cover sheet; e.g., "Reproduction requires approval of originator," or "Further dissemination only as direct- ed by (Insert appropriate office or of- ficial)" (1-506). 1. Abbreviations, Classified docu- ments that are tranfrnitted electrically may he marked with abbreviations or codes In a single line to satisfy the re- quirements of each Subsection of para- graphs (;3 and II in a manner consist- ent with economic and efficient use of electrical transmission systems, pro- vided that the full text represented by each such abbreviation or code and Its relation to each subsection of para. graphs 0 and H is readily available to each expected user of the classified documenLi affected. it. DERTVATIVE CLASSIFICATION A. Definition. "Derivative classifica- tion" as used in the order means a de. termination that hiformatiotf is in sub- stance the same as information that Is currently classified, and a designation of the level of classification (2-1). B. RessPonsibility. Derivative applica- tion of classification markings is a re- sponsibility of those who incorporate, paraphrase, restate,_ or generate in new form information that is already classified, and of those who apply markings in accordance with instruc- (ions from an authorized classifier or in accordance with an authorized clas- sification guide. Persons who apply de- rivative classification markings should take care to determine whether their paraphrasing, restating, or sutrimarir- Ing of classified Information has re- moved the basis for classification. Where checks with originators or other appropriate inquiries show that Approved tiAIl PHe-66$9' 14AOM00080009-0 classification or a lower clasvifica- tlon, those reasons need be recorded direct that All classified records 20 n than?original'y asst,lned is apppro- only on or with the record cop of the years old or older, whether held in ate, the derivative d pfpi teXFor Iieiiipae22006124/19 : CIA-F DP86-0067 Q08ffi@%@a6-0Q%e&cy or in Fed- Issued as unclassified or simll be d. Indicate how the designations, oral records centers, be surveyed to irked appropriately (2-101 and 2- time limits, markings, and other re- Identify those that require scheduling 2). quirements of the order and this direc- for future disposition. Such scheduling Marking derivatively classified ttve are to be applied, or make specific shall be accomplished within 2 years .?unwnts. Paper copies of derivative- reference to agency regulations that of the effective date of the order (3- classified documents shall be provide for such application (2-201). 401). rked at the time of origination as 2. Review and record requirements. b. Extending classification after lows: Each classification guide shall be kept review.-(1) Foreign government infor- . The classification authority shall current and shall be reviewed at least rcation. Agency heads listed In section shown on a "classified by" line: e.g., once every 2 years. Each agency shall 1-2 and officials designated by the lassifled by (Insert identity of else- maintain a list of all its classification President pursuant to section 1-201 of rcation guide)" or "Cla_ssifled by guides in current use (2-2). the order may extend the classifica- ~sert source of original classifica? tion of foreign government inforula. u)." It the classification is derived III. ^ECLASSITI(:ATION AND time beyond 30 years, but only in ac- ,m more than one source, the sh-die 1~OWNGHAI1INa cordance with sections 3-3 and 3-404. rase "multiple sources" may be A. Record requirements. Agencies This authority may not be delegated. )wn, provided that identification of and officials granted original classlfl- When classification is extended , 1h such source is maintained with cation authority pursuant to section 1- beyond 30 years, a date no more than ? file or record copy of the docu- 2 of the order shall maintain a record 10 years later shall be set for deciassi- nt (2-102(e)); of individuals or positions designated fication or for the next review. Subse- The identity of the office originat- as declassification authorities purse- quest reviews for declassification shall the derivatively classified docu- ant to section 3-103 of the order (3- be set at no more than 10-year inter- nt shall be shown on the face of the 103). vals (3-404). 'ument (2-102); B. Declassification policy. In making (2) Waivers of further review. Heads Dates or events for declassifica- determinations under section 3-303 of of agencies listed In section 1-2 and of- n or review shall be carried forward the order, officials shall respect the ficials designated by the President 'm the source material or classifies- Intent of the order to protect foreign Pursuant to section 1-201 of the order n guide and shown on a "declassify government information and confiden- may request from the Director of the " or "review for declassification on" tial foreign sources (3-303). Oversight Office a waiver of the lo- e. If the classification is derived C. Systematic Review for Dcclassifl- year review requirement for both U.S.- ~-n more than one source, the latest cation.-1. Systematic review guide- originated and foreign government in. ,.e for declassification or review ap- lines. formation. Such requests shall include cable to the various source maters- a. U.S. originated information.. Sys- a personal certification by the agency shall be applied to the new infor- tematic review guidelines shall be kept head that the classified information ion (2-102(c)); current through review at least every for which the waiver is sought has The classification marking provi- 2 years, unless earlier review for revi- been systematically reviewed as re- n of sections I.Q. 7 through 9 and sion is requested by the Archivist of qulred, and that a definitive date for 12 are also applicable to eleriva- the United States (3-402). declassification could not be deter- ely classified documents (2-1011(c)); b. Foreign government information, mined. Waivers should not be request- Any additional marking undr^r see- Within 1 year after the effective date ed unless-the results of the review n I.H. of this directive appearing on of the order, heads of affected agen- have established an Identifiable need source material shall be carried rtes shall, in consultation with the Ar- to continue classification- for a period -ward to the new material when ap- chivist and in accordance with the pro- in excess of 20 additional years. Each )prtate (2-102(c)); and visions of section 3-404 of the order, request shall include a recommended :.Any abbreviation or code permit- develop systematic review guidelines date or event for subsequent review or I tinder sect ion I. 1. of this directive for 30-year-old foreign government In. automatic declassification (3-401). .y be applied to derivatively class- formation. These guidelines shall be c. Assistance to the Archivist.-(1) d documents. kept current through review by The head of each agency shall desig- ). Classification guides.-1. Require- agency heads at least once every 2 nate experienced personnel to assist sits. Classification guides issued years, unless earlier review for revision the Archivist of the United States in rsuant to section 2-2 of the order is requested by the Archivist of the the systematic review of 20-year-old fill: United States. A copy of these guide- U.S.-originated information and 30- Identify the information to be lines and any revisions thereto shall year-old foreign government informa- .)tected, using categorisation to the be furnished to the information Secu- tion accessioned Into the National Ar- ent necessary to insure that the in- rity Oversight Office. Upon request, chives of the United States. Such per- -mallon involved can be identified the Department of State shall provide sounei shall: uiily and uniformly (2-201): advice and such assistance as Is neces- (a) Provide guidance and assistance ). State which of the classification sary to effect foreign government co- to National Archives employees in ;lgnatlons (i.e.. top secret, secret, or ordination of the guidelines (3-404). identifying and separating documents rtfidentlal) applies to the informa- 2. Systematic review procedures.--a. and specific categories of information n (2-201); Schedulingforsystematic review. Clas- within documents that are deemed to State the duration of classification shied nonpermanent records that are require continued classification: and terms of a period of time or future scheduled to be retained for more (b) Submit to the head of the agency -nt. When such duration to to than 20 years need not be systemati- recommendations for continued ciassi- ceed 6 years, the reason for etch ex- tally reviewed but shall be reviewed ficat.lon that Identify documents or islnn shall be provided In the guide. for declassification upon request. specific categories of information so rwever, If the inclusion of classified Within 60 days of the effective date of separated. tsons would result in a level of clas- the order, heads of agencies and offi- (2) The )lead of the agency shall rcation for a guide that would inhlb- cials designated by the President pur- then make the determinations person- its desirable and required dissenlina- suant to section 1-2 of the order shall ally and in writing required under see- Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 RULES AND REGULATIONS 0283 lion 3.401 eat t7"prOcYeefd? g I e,IMRsertrt9R1/Q4/iV rt aP61,-t~OAZ44ROQ9N9XQPO&Ardance with agency documental or categories of Informa- fled by another agency, Is shall for- policy or guidelines, after contuiting tion require continued protection. The ward the request to the appropriate with other agencies that have subject agency shall inform thii Archivist of agency for review, together with a matter Interest as necessary. If the the United States of this determnna- copy of the document containing; the agency receiving the request is not the tlon(3-4). Information requested when practica- agency that received or classified the d. Special procedures. Special proce- ble, and with Its recommendation to foreign government information, It dunes for systematic review and dermas- withhold any of the information `hall refer the request to the appropri- sification of classified cryptologic In- where appropriate. Unless the agency ate agency, which shall take action as formation and classified information that classified the information objects described above. Including its recorn- concerning the identities of clandes- on grounds that Its association with mendatlon to withhold any of the In- tine human agents promulgated in ac- the Information requires protection, formation where appropriate. In those, cord..vnce with the provisions of section the agency that received the request cares where agency policy or guide- 3-403 of the order shall be )binding on shall also notify the requester of the lines do not apply, consultation with all agencies (3-403). referral. After the agency that claxsi- the foreign originator through appro- e. Foreign relations series. In order fled the information, completes Its priate channels may be advisable prior to permit the editors of foreign rela- review (in coordination with other to final action on-the request (3-5). turns of the United Slates to meet agencies that a direct interest in the their mandated goal of publishing 20 subject matter), a response shall be TV. SAOEGUAr.Dtrma years after the event, heads of depart- sent to the requestor in accordance A. General. Information classified tnents and agencies are requested to with the procedures described above. Pursuant to Executive Order 12065 or assist the editors in the :Department of If requested, the agency shall also prior orders shall be afforded a level State by facilitating access to appro- communicate its determination to the of protection against unauthorized dis- priate classified materials in their cus- referring agency (3--501). closure commensurate with its level of Iody and by expediting declassification d. Action on appeal. The head of an cltucsiflcation (4-1). review of items from their files select- agency or a designee shall establish B. General restrictions on access. ed for publication (3-4). procedures to act within 30 days upon 1. Determination of need-to-know. D. Procedures for mandatory declas- all appeals of denials of requests for Classified Information shall be made silica(ion review. declassification. These procedures available to a person only when the 1. U.S.-originated information.-a. shall provide for meaningful appellate possessor of the classified Information Action on an initial request. Each consideration, shall be forwarded to establishes in each Instance, except as Agency shall designate. in its imple- the Oversight Office for review, and provided in section 4-3 of the order. rrenting regulations published in the shall be published in the FEDERAL. IZEG- that access is essential to the accom. 1''e:oei;AL REGISTER, offices to which re- ISTER. In accordance with these proce- plishment of official (government quest:: for mandatory review for de- dures, agencies shall determine wheth- duties or contractual obligations (4- ctswssification may be directed. Upon er continued classification is required 101). request for declassification pursuant in whole or in part, notify the reques- 2. Determination of trustworthiness.. to section 3-5 of the order, agencies for of the determination, and make A person is eligible for access to classl- slaall apply the following procedures: available any information that is do- fled information only after a showing 01) The designated offices shall ac- classified and otherwise releasable. If of trustworthiness as determined by knowledge receipt, of the request. continued classification Is required agency heads based upon appropriate (2) Whenever a request does not rca- under the provisions of section 3-3 of Investigations In accordance with ap- son;ably describe the information the order, the r questor shall be noti- plirable standards and criteria (4-101). sought., the requester shall be notified Pied of the reasons therefor. If re- C. Access by historical researchers that. unless additional information is quested, the agency shall also commu- and former Presidential appointees. provided or the scope of the request Is nicate the appeal determination to Agencies shall obtain: (1) Written n.rrowed. no further action will be un- any referring agency (3-5 and 5- agreements from requcstors to safe- dertaken (3-501). 404(c)). guard the information to which they h. trefonnation in the custody of and e. Fees. If the request requires the are given access as permitted by the under the cxclusree (feel assilication rendering of services for which fair order and this directive: and (2) wri4- arethority of an agency. The designat- and equitable fees may be charged ten consent to the agency's review of ed office shall determine whether, pursuant of title 5 of the Independent their notes and manuscripts for the under the declassification provisions Offices Appropriation Act, 65 Stat. - purpose of determining that no classi- of st-ction 3-3 of the order. the re- 290, 31 U.S.C. 483a (1976), such fees fled information is contained therein. arrested information may be devlasxi- may be imposed at the discretion of A determination of trustworthiness is Pied and, if so, shall make such infor- the agency rendering the services. a precondition to a requester's access. nation available to the rectuest.or, Schedules of such fees shall be pub- If the access requested by historical unless withholding is otherwise war- lisped in the FEDERAL REcesTr:R (3- researchers and former Presidential minted under applicable law. If the in- 501). appointees requires the renc.i!ring of iormation may not be released in 2. Foreign government information. services for which fair and equitable u hole or in part, the requestor shall Except as provided hereinafter, re- fees may be charged pursuant to title he' riven it brief statement as to the quests for mandatory review for the 5 of the Independent Offices Appro- reasons for denial, a notice of the dectwisification of classified docu- priatlons Act. 6b Stat. 290. 31 U.S.C. relit to appeal the dct,('rnnination to a menu that contain for.-ign govern- 483a (1976), the reque:;tor shall be so dcsi;a,nated agency appellate authority ment information shall be processed notified and the fees may be Imposed cincludtng n:une, title, and address of and acted upon in accordance with the (4-3). such authority), and a notice that provisions of section L).1 above. If the U. Dissemination. Except, as other- sucli an appeal must b filed with the agency receiving the request is also wi.,e provided by section 102 of the Na- ag;ency within 60 days in order to be the agency that initially received or tional Security Act of 1947, 61 Stat. ronn?dcrcd (3-501). classified the foreign government In- 495, 50 U.S.C. 403 (1970 and Stipp. V r. I in u rrnatioe classified by agencies formation, it shall determine whether 19'15), classified information orlginat- Oli. 'r than the custodial agency. When the foreign government information in Ing In one agency may not be disseinl- sn agency receives a request for infor- the document may be declassified and nated outside any other agency to FEDERAL REGISTER, VOL. 43, NO. 194-THURSDAY, OCTOBER S. 1975 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 4625.4 RULES AND REGULATIONS Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 which it has been made available with- wt the consent of the originating cured, it shall be in conformance with the standards and specifications re- ferred to above and shall, to the maxi. E. Accountability procedures.-1. Top secret. Top secret control officers ;hall be designated to receive, trans- nit, and maintain current access and iccount.ability records for top secret nformation. An inventory of top secret documents shall be made at ,east annually; however, heads of agencies may authorize the annual in- ventory of top secret documents in re- aositories, libraries, or activities that ;tore large volumes of such informa- tion to be limited to documents to which access has been afforded within the past 12 months. The Director of the Oversight Office may grant a waiver with respect to the requirement of an annual inventory for storage sys- tems involving large volumes of infor- inat.ion if security measures with re- spect to such storage system., are ade- quate to prevent access by unauthor- ized persons (4-103). 2. Secret and confidential. Secret and confidential classified information shall be subject to such controls and current accountability records as the head of the agency may prescribe (4- 103). F. Storage. Classified information shall be stored only in facilities or under conditions adequate to prevent unauthorized persons from gaining access to it (4-103). 11. Top secret. Top secret informa- tion shall' be stored in a GSA-ap- proved, safe-type, steel file cabinet having a built-in, three-position, dial- type combination lock or within an ap- proved vault. or vault-type room, or in other storage facility that meets the standards for top secret established under the provisions of subsection 3 below. In addition, heads of agencies shall prescribe such additional, strpple- mentary controls as are deemed appro- priate to restrict unauthorized access to areas where such information, is stored (4-103). 2. Secret and confidential. Secret and confidential information shall be stored In it manner and tinder the con- dii ions prescribed for top secret infor- Ination, or in a container or vault that meets the standards for secret or con- fidential, established pursuant to the provisions of subsections 3 or 4 below t4-103). 3. Standards for security equipment. The General Services Administration shall, in coordination with agencies originating classified information, es- tablish and publish uniform standards, specifications, and supply schedules for containers, vaults, alarm systems, and associated security devices suit- able for the storage and protection of all categories of classified information. Any agency may establish more strin- gent standards for Its own use. When- mum extent practicable, be of the type designated on the Federal Supply Schedule, General Services Adminis- tration (4-103). 4. Exception to standards for secut-l- tv equipment.-a. Secret and confiden- tial information may also be stored in a steel filing cabinet having a built-in, three-position, dial-type, changeable combination lock, or a steel filing cabi- net equipped with a steel lock bar, pro- vided it Is secured by a three-position, changeable, combination padlock ap- proved by GSA for the purpose. The storage of secret information in the steel filing cabinets described above re- quires the use of such supplementary controls, as the head of the agency deems necessary to achieve the degree of protection warranted by the sensi- tivity of the information involved (4- 103). b. For protection of bulky secret and confidential material (for example, weaponry containing classified compo- nents) in magazines, strong rooms, or closed areas, access oenings may be se- cured by changeable combination or key-operated, high-security padlocks approved by GSA. When key-operated padlocks are used, keys shall be con- trolled in accordance with subsection 6 below (4-103). 5. Combinations.-a, Equipment., in service. Combinations to dial-type locks shall be changed only by persons having appropriate security clearance, and shall be changed whenever such equipment Is placed In use, whenever a person knowing the combination no longer requires access to the combina- tion, whenever a combination has been subjected to possible compromise, whenever the equipment Is taken out of service, and at least once every year. Knowledge of combinations pro- tecting classified information shall be limited to the minimum number of persons necessary for operating pur- poses. Records of combinations shall be classified no lower than the highest level of classified information to be stored in the security equipment con- cerned(4-103). B. Equipment out of service. When security equipment having a built-in combination lock Is taken out of serv- ice, the lock shall be reset to the standard combination 50-25-50. Com- bination padlocks shall be reset to the standard combination 10-20-30 (4- 103). 6. Keys. Heads of agencies shall es- tablish administrative procedures for the control and accountability of keys and locks whenever key-operated, high-security padlocks are utilized. The level of protection provided such keys shall be equivalent to that afford- ed the classified information being protected. Under no circumstances may keys be removed from the prem- ises. They shall be stored in a secure container (4-103). 7. Responsibilities of custodians. Persons entrusted with classified In- formation shall he responsible for pro- viding protection and accountablility for such Information at all times and for locking classified information in approved security equipment when- ever it is not in use or under direct su- pervision of authorized persons. Custo- dians shall follow procedures that insure unauthorized persons do not gain access to classified information (4-103). 8. Inspections. Individuals charged with the custody of classified Informa- tion shall conduct the necessary in- spections within their areas to insure adherence to procedural safeguards prescribed to protect classified infor- mation. Agency security officers shall Insure that periodic inspections are made to determine whether procedur- al safeguards prescribed by agency regulations are in effect at all times (4-103). 0. Transmittal.-1. Preparation and reeeipting. Classified Information shall be enclosed in opaque Inner and outer covers before transmitting. The inner cover shall be a sealed wrapper or envelope plainly marked with the assigned classification and addresses of both sender and addressee. The outer cover shall be sealed and ad- dressed with no identification of the classification of its contents. A receipt shall be attached to or enclosed in the inner cover, except that confidential information shall require a receipt only if the sender deems it necessary. The receipt shall Identify the sender. addressee, and the document, but shall contain no classified information. It shall be immediately signed by the re- cipient and returned to the sender. Any of these wrapping and receipting requirements may be waived by agency heads under conditions that will provide adequate protection and prevent access by unauthorized per- sons (4-103). 2. Transmittal of top secret. The transmittal of top secret information shall be by specifically designated per- sonnel, by State Department diplo- matic pouch, by a messenger-courier system specially created for that pur- pose, or over authorized secure com- munications circuits (4-103). 3. Transmittal of secret. The trans- mittal of secret material shall be ef- fected In the following manner: a. The 50 States, District of Colum- bia, and Puerto Rico. Secret Informa- tion may be transmitted within and between the 50 States,_ District of Co- ltunbla, and Puerto Rico by one of the means authorized for top secret infor- FEDERAL REGISTER, VOL. 43, NO. 194-THURSDAY, OCTOBER 5, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2019 I 0 t . W% SO0674R000300080009-0 4628(. mation, by the U.S. Postal Service reg- istered mail, or by protective services Provided by U.S. air or surface com- inercial carriers under such conditions as may be prescribed by the head of the agency concerned (4-103). b. Canadian Government Installa- tions. Secret information may be c ransmitted to and between United States Government and Canadian Government installations in the 50 States, the District of Columbia. and Canada by United States aild Canadi- rui registered mail with registered mail receipt (4-103). c. Other areas. Secret information may be transmitted from, to, or within areas other than those specified In subsections a or b above by one of the means established for top secret infor- mation, or by U.S. registered mail through Army, Navy, or Air Force Postal Service facilities provided that the information does not at any time pass out of U.S. citizen control and does not pass through a foreign postal system. Transmittal outside such areas may also be accomplished under escort of appropriately cleared personnel aboard U.S. Government and U.S. Government contract vehicles or air- craft, ships of the United States Navy. civil service manned U.B. Naval ships. and ships of U.S. Registry. Operators of vehicles, captains or masters of ves- sels. and pilots of aircraft who are U.B. citizens and who are appropriately cleared may be designated as escorts (4-103). 4. Transmittal of confidential infor- mation. Confidential information shall be transmitted within and be- t ween the 50 States. the District of Co- lumbia, the Commonwealth of Puerto Rico, and U.B. territories or posses- sions by one of the means established for higher classifications, or by U.B. Postal Service certified, first class, or express mail service when prescribed by an agency head. Outside these areas. confidential information shall be transmitted only as is authorized for higher classifications (4-103). It. Loss or possible compromise. Any person who has knowledge of the loss or possible compromise of classified in- formation shall immediately report the circumstances to an official desig- nated by the agency or organization. In turn, the o^glnating agency shall be notified about the loss or compromise in order that a damage assessment may be conducted and appropriate measures taken to negate or minimize any adverse effect of such a compro- mise. An immediate Inquiry shall be Initiated by the agency under whose cognizance the loss or compromise oc- curred, for the purpose of taking cor- rective measures and appropriate ad- minblrative, disciplinary, or legal action (4-103). 1. Destruction. Nonrecord classified information that. has served its Intend- ed purpose shall be destroyed in ac- cordance with procedures and meth- ods approved, by the head of the agency. The method of destruction se- lected must preclude recognition or re- construction of the classified Informa- tion or material (4-103). V. IMPLEMENTATION AND Itsviaw Challenges to classification. Agency programs established to implement the order shall encourage holders of classified Information to challenge classification In cases where there Is reasonable cause to believe that infor- mation is classified unnecessarily, im- properly, or for an inappropriate period of time. These programs shall provide for action on such challenges or appeals relating thereto within 30 days of receipt and for notification to the challenger of the results. When re- quested, anonymity of the challenger shall be preserved (5-404(d)). VI. GISNSRAL PROVISIONS A. Notiffcatfon. Notification of un- scheduled changes In classification or changes in duration of classification may be by general rather than specific notice (4-102). B. Posted notice. If prompt remark- Ing of large quantities of Informatini would be unduly burdensome. the cus todian may Rttach a change of classtfi cation notice to the storage unit is lieu of the marking action otherwise required. Each notice shall indicate the change, the author ity for the action, the date of the action, and the storage units to which It applies. Item! permanently withdrawn from sucl storage units shall be marked prompt ly in accordance with the marking pro visions herein. However, when infor mation subject to a posted downgrad- ing, upgrading, or declassificatior, notice is withdrawn from one storage unit solely for transfer to another, or a storage unit containing such Infer mation is transferred from one place to another, the transfer may be made without marking If the notice is at, tached to or remains with each ship- ment (4-102). C. Downgrading, declassification, and upgrading markings, Whenever a change is made in the original classifi- cation or in the dates of downgrading or declassification of any classified in- formation, it shall be promptly and conspicuously marked to Indicate the change, the authority for the action, the date of the action, and the Identi- ty of the person taking the. action. Earlier classification markings shall be cancelled when practicable (4-102). D. Combat operations. The provi- sions of the order and this Directive with regard to dissemination, trans- mittal, or safeguarding of classified In. formation may be so modified In con- nection with combat or combat-related operations as the Secretary of Defense may by regulations prescribe (4-103). E. Publication and effective date. This directive shall be published in the FLDRRAI, P.rclsrsa. It shall become effective December 1, 1978 (6-204). JAMFS B. RFOADS, Acting Chairman, Intcragen^y Classification Review Conl- mf ttee. OCTOBER 2, 1978. (FR Doe. 78-28101 Flied 10.4 -78; 8:45 tun I Approved Forf4gLA a+ t#'X08MM9"p)lA--itt Hb 66?WMfl0M0080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 ORIGINAL CL BY' C7 DECL F~ F,70,JW ON E.XT D-YND 6 Y1 11S DERIVATIVE CL BY 11 DECL r-1 F EV 1V ON DERIVED FROM CL DERIVED BY 0 DECL D REVW ON r DERIVED FROM Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 M = MONDAY, JULY 3, 1978 PART IV THE PRESIDENT NATIONAL SECURITY INFORMATION Executive Order 12065 and Order Designating Certain Officials Within tha Executive Office of the President To Classify Information Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 presidential documents Title 3-The President Executive Order 12065 June 28, 1978 National Sectlrfty lnformapon By the authority vested in me as President by the Constitution and laws of the United States of America, in order to balance the public's interest in access to Government information with the need to protect certain national security information from disclosure, it is hereby ordered as follows: SECTION 1. 1-1 ORIGINAL CLASSIFICATION: Classification Designation ........ ............................ _..._....... .............................. !28950] 1-2 Classification Authority 128950] 1-3 Classification Requirements ...................... P89511 1-4 Duration of Classification ................................................................................. [28952] 1-5 Identification and Markings ................................................... ........._.............. T28952] 1-6 Prohibitions ....................................................- $28953] SECTION 2. 2-1 DERIVATIVE CLASSIFICATION: Use of Derivative Classification ............................. _... '28953] 2-2 Classification Guides .............................................. ___ {28953] 2-3 New Material .................................................~ 428954] SECTION 3. 3-1 DECLASSIFICATION AND DOWNGRADING: Declassification Authority ..........................................- 3-2 Transferred Information 3-3 Declassification Policy .._~ . _ _ .._._.... -.. __......._ 1289551 3-4 Systematic Review for Declassification ......... ._....... _-......... -._ ............... _. [28955] 3-5 Mandatory Review for Declassification ............................................................. [28956] 3-6 1D-mg-ding ............. _.......................................................... _......................... VL89571 SECTION. 4. 4-1 SAFEGUARDING: General Restrictions .................................................. _...... -........................ _... [!8957]. 4-2 Special Access Programs ........................................... .................................: + .1289571 4-3 Access by Historical Researchers and Fortner Presidential Appointees...._.._ 128958] 4-4 Reproduction Controls ........ -............ -._......... _............ _.... _ ........................ [28958] SEL7ION 5. 5-1 IMriE ,tEwrArloN AND REVIEW: Oversight ..... __ ................... _............ _..... _ ....... _............. ........... ......... ....... .. [78959] 5-2 Information Security Oversight Office .................................. _........................ [28959] 5-3 Interagency Information Security Conwrtittee ._..._......- .. _> _ [28960] 5-4 General Responsibilities ............. ....................... - ...-......... -._..................... 1289601 5-5 Administrative Sanctions ............................... ....................... ...-_...................... 128961] SECTION 6. GENERAL PawwIssoas: 6-1 Definitions .......... ........... - ...... ............ ...... ...... --.--...... .,........ ....._.............. __ [289611 6-2 General ............................................................................................................. T789611 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 SECTION 1. ORIGINAL CLASSIFICATION. 1-1. Clas.cifuation Designation. 1-101. Except as provided in the Atomic Energy Act of 1954, as amend- ed, this Order prgvides the only basis for classifying information. Information may be classified in one of the three designations listed below. If there is reasonable doubt which designation is appropriate, or whether the information should be classified at all, the less restrictive designation should be used, or the information should not be classified. I-IC22. "Top Secret" shall be applied only to information, the unauthor- ized disclosure of which reasonably could be expected to cause exceptionally grave damage to the national security.. 1-103. "Secret" shall be applied only to information, the unauthorized disclosure of which reasonably could be expected to cause,serious damage to the national security. 1-104. "Confidential" shall be applied to information, the unauthorized disclosure of which reasonably could be expected to cause identifiable damage to the national security. 1-2. Clas.4/ication Authority. 1-201. Top Secret. Authority for original classification of information as Top Secret "may be exercised only by the President, by such officials as the President may designate by publication in the FEDERAL REGISTER, by the agency heads listed below, and by officials to whom such authority is delegat- ed in accordance with Section 1-204: The Secretary of State The Secretary of the Treasury The Secretary of Defense The Secretary of the Army The Secretary of the Navy The Secretary of the Air Force The Attorney General The Secretary of Energy The Chairman, Nuclear Regulatory Commission The Director, Arms Control and Disarmament Agency The Director of Central Intelligence The Administrator, National Aeronautics and Space Administration The Administrator of General Services (delegable only to the Director, Federal Preparedness Agency and to the Director, Information Security Over- sight Office) 1-202. Secret. Authority for original classification of information as Secret may be exercised only by such officials as the President may designate by publication in the FEDERAL REGISTER, by the agency heads listed below, by officials who have Top Secret classification authority, and by officials to whom such authority is delegated in accordance with Section 1-204: The Secretary of Commerce The Secretary of Transportation The Administrator, Agency for International Development The Director, International Communication Agency 1-203. Confidential. Authority for original classification of information as Confidential may be exercised only by such officials as the President may designate by publication in the FEDERAL. REGISTER, by the agency heads listed below, by officials who have Top Secret or Secret classification authority, and by officials to whom such authority is delegated in accordance with Section 1- 204: Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 The President and Chairman, Export-Import Bank of the United States The President and Chief Executive Officer, Overseas Private Investment Corporar.ion 1-204. Limitations on Delegation of Classification Authority. (a) Authority for original classification of information as Top Secret may be delegated only to principal subordinate officials who have a frequent need to exercise such authority as determined by the President or by agency heads listed in Section 1-201. (b) Authority for original classification of information as Secret may be delegated only to subordinate officials who have a frequent need to exercise such authority as determined by the President, by agency heads listed in Sections 1-201 and 1-202, and by officials with Top Secret classification authority. (c) Authority for original classification of information as Confidential may be delegated only to subordinate officials who have a frequent need to exer- cise such authority as determined by the President, by agency heads listed in Sections 1-201, 1-202, and 1-203, and by officials with Top Secret classifica- tion authority. (d) Delegated original classification authority may not be redelegated. (e) Each delegation of original classification authority shall be in writing by name or title of position held. (f) Delegations of original classification authority shall be held to an absolute minimum. Periodic reviews of such delegations shall be made to ensure that the officials so designated have demonstrated a continuing need to exercise such authority. 1-205. Exceptional Cases When an employee or contractor of an agency that does not have original classification authority originates information be- lieved to require classification, the information shall be protected in the manner prescribed by this Order and implementing directives. The informa- tion shall be transmitted promptly under appropriate safeguards to the agency which has appropriate subject matter interest and classification authority. That agency shall decide within 30 days whether to classify that information. If it is not clear which agency should get the information, it shall be sent to the Director of the Information Security Oversight Office established in Section 5- 2 for a determination. i-S. C6asaifscation Regxirasevls. 1-301. Information may not be considered for classification unless it concerns: (a) military plans, weapons, or operations; (b).foreign government information; (c) intelligence activities, sources or methods; (d) foreign relations or foreign activities of the United States; (e) scientific, technological, or economic matters relating to the national security; (f) United States Government programs for safeguarding nuclear materials or facilities; or (g) other categories of information which are related to national security and which require protection against unauthorized disclosure as determined by the President, by a person designated by the President pursuant to Section 1-201, or by an agency head. 1-302: Even though information is determined to concern one or more of the criteria in Section 1-301, it may not be classified unless an original classification authority also determines that its unauthorized disclosure reason- ably could be expected to cause at least identifiable damage to the national security. fDERAL REGKTER VOL 43, NO. 12$-MONDAY, JULY 3, me Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 1-303. Unauthorized disclosure of foreign government information or the identity of a confidential foreign source is presumed to cause at least identifi- able damage to the national security. 1-304. Each determination under the criterion of Section 1-301(g) shall be reported promptly to the Director of the Information Security Oversight Office. 1-4. Duration of Classification. 1-401. Except as permitted in Section 1-402, at the time of the original classification each original classification authority shall set a date or event for automatic declassification no more than six years later. 1-402. Only officials with Top Secret classification authority and agency heads listed in Section 1-2 may classify information for more than six years from the date of the original classification. This authority shall be used spar- ingly. In such cases, a declassification date or event, or a date for review, shall be set. This date or event shall be as early as national security permits and shall be no more than twenty years after original classification, except that for foreign government information the date or event may be up to thirty years after original classification. 1-5. Identification and Markings. 1-501. At the time of original classification, the following shall be shown on the fake of paper copies of all classified documents: (a) the identity of the original classification authority; (b) the office of origin; (c) the date or event for declassification or review; and (d) one of the three classification designations defined in Section. 1-1. 1-502. Documents classified for more than six years shall also be-;marked with the identity of the official who authorized the prolonged classification. Such documents shall be annotated with the reason the classification is expect- ed to remain necessary, under the requirements of Section 1-3, despite the passage of time. The reason for the prolonged classification may be stated by reference to criteria set forth-in agency implementing regulations. These criteria shall explain in narrative form the reason the information needs to be protected beyond six years. If the individual who signs or otherwise authenti- cates a document also is authorized to classify it, no further annotation of identity is required. 1-503. Only the designations prescribed by this Order 'may be used to identify classified information. Markings such as "For Official Use Only" and "Limited Official Use" may not be used for that purpose. Terms such as "Conference" or "Agency" may not be used in conjunction with the classifica- tion designations prescribed by this Order; e.g., "Agency Confidential" or "Conference Confidential." 1-5(4. In order to facilitate excerpting and other uses, each classified document shall, by marking or other means, indicate clearly which portions are classified, with the applicable classification designation, and which portions are not classified. The Director of the Information Security Oversight Office may, for good cause, grant and revoke waivers of this requirement for speci- fied classes of documents or information. 1-505. Foreign government information shall either retain its original classification designation or be assigned a United States classification designa- tion that shall ensure a degree of protection equivalent to that required by'the entity that furnished the information. 1-506. Classified documents that contain or reveal information that is subject to special dissemination and reproduction limitations authorized by FEDERAL REGISTER-VOL. 43, NO. 128-MONDAY. JULY 9, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THE PRESIDENT 28953 this Order shall be marked clearly so as to place the user on notice of the restrictions. 1-6. Prc hibitions. 1-601. Classification may not be used to conceal violations of law, ineffi- ciency, or administrative error, to prevent embarrassment to a person, organi- zation or agency, or to restrain competition. 1-602. Basic scientific research information not clearly related to the national security may not be classified. 1-603. A product of non-government research and development that does not incorporate or reveal classified information to which the producer or developer was given prior access may not be classified under this Order until and unless the government acquires a proprietary interest in the product. This Order does not affect the provisions of the Patent Secrecy Act of 1952 (35 U.S.C. 181-188). 1-604. References- to classified documents that do not disclose classified information may not be classified or used as a basis for classification. 1-6D5. Classification may not be used to limit dissemination of informa- tion that is not classifiable under the provisions of this Order or to prevent or delay the public release of such information. 1-606. No document originated on or 'after the effective date of this Order may be classified after an agency has, received a request for the docu- ment under the Freedom of Information Act or the Mandatory Review provi- sions of this Order (Section 3-5), unless such classification is consistent with this Order and is authorized by the agency head or deputy agency head. Documents originated before the effective date of this Order and subject to such a request may not be classified unless such classification is consistent with this, Order and is authorized by the senior official designated to oversee the agency information security program or by an official with Top Secret classification authority. Classification authority under this provision shall be exercised personally, on a document-by-document basis. 1-607. Classification may not be restored to documents already declassi- fied and released to the public under this Order or prior Orders. SECTION 2. DERIVATIVE CLASSIFICATION. 2-1. Use of Derivative Classification. 2-101. Original classification authority shall not be delegated to persons .who only reproduce, extract, or summarize classified information, or who only apply classification markings derived from source material or as directed by a classification guide. 2-102. Persons who apply such derivative classification markings shall: 4a) respect original classification decisions; (b) %erify the information's current level of classification so far as practica- ble before applying the markings; and (c) carry forward to any newly created documents the assigned dates or events for declassification or review and any additional authorized markings, in accordance with Sections 2-2 and 2-301 below. A single marking may be used for documents based on multiple sources. 2-2. Classification Guides. 2-201. Classification guides used to direct derivative classification shall specifically identify the information to be classified. Each classification guide shall specifically indicate how the designations, time limits, markings, and other requirements of this Order are to be applied to the information. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 28954 THE PRESIDENT 2-202. Each such guide shall be approved personally and in writing by an agency head listed in Section 1-2 or by an official with Top Secret classifica- tion authority. Such approval constitutes an original classification decision. 2-3. New Material. 2-SS01. New material that derives its classification from information classi- fied on or after the effective date of this Order shall be marked with the declassification date or event, or the date for?review, assigned to the source information. 2-302. New material that derives its classification from information classi. fled under prior Orders shall be treated as follows: (a) If the source material bears a declassification date or event twenty years or less from the date of origin, that date or event shall be carried forward on the new material. (b) If the source material bears no declassification date or event or is marked for declassification beyond twenty years, the new material shall be marked with a date for review for declassification at twenty years from the date of original classification of the source material. (c) IT the source material is foreign government information bearing no date or event for declassification or is marked for declassification beyond thirty years, the new material shall be marked for review for declassification at thirty years from the date of original classification of the source material. SECTION 3. DECLASSIFICATION AND DOWNGRADING. 3-1. DecItssification Authority. 3-101. The authority to declassify or downgrade information classified under this or prior Orders shall be exercised only as specified in Section 3-1. 3-102. Classified information may be declassified or downgraded by the official Who authorized the original classification if that official is still serving in the same position, by a successor, or by a supervisory official of either. 3-103. Agency heads named in Section 1-2 shall designate additional officials at the lowest practicable echelons to exercise declassification and downgrading authority. 3-104. If the Director of the Information Security Oversight Office deter- mines that information is classified in violation of this Order, the Director may require the information to be declassified by the agency that originated the classification. Any such decision by the Director may be appealed to the National Security Council. The information shall remain classified until the appeal is decided or until one year from the date of the Director's decision, whichever occurs first. 3-105. The provisions of this Order relating to declassification shall also apply to agencies which, under the terms of this Order, do not have original classification authority but which had such authority under prior Orders. 3-2. Tran:,[erred Information. 3-20:1. For classified information transferred in conjunction with a trans- fer of functions-not merely for storage purposes-the receiving agency shall be deemed to be the originating agency for all purposes under this Order. 3-202. For classified information not transferred in accordance with Sec- tion 3-201, but originated in an agency which has ceased to exist, each agency in posses, ion shall be deemed to be the originating agency for all purposes under thit~ Order. Such information may be declassified or downgraded by the agency in possession after consulting with any other agency having an interest in the subject matter. 3-20:;. Classified information transferred to the General Services Admin- istration for accession into the Archives of the United States shall be declassi. Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THE PRESIDENT 28955 fled or downgraded by the Archivist of the United States in accordance with this Order, the directives of the Information Security Oversight Office, and the agency guidelines. 3-20.1. After the termination of a Presidential administration, the Archivist of the United States shall review and declassify or downgrade all information classified by the President, the White House Staff, committees or commissions appointed by the President, or others acting on the President's behalf. Such declassification shall only be undertaken in accordance with the provisions of Section 3-504. 3-3. Declassifucation Policy. 3-301. Declassification of classified information shall be given emphasis comparable to that accorded classification. Information classified pursuant to this and prior Orders shall be declassified as early as national security consid- erations permit. Decisions concerning declassification shall be based on the loss of the information's sensitivity with the passage of time or on the occur- rence of 21 declatssification event. 3-302. When information is reviewed for declassification pursuant to this Order or the Freedom of Information Act, it shall be declassified unless the declassification authority established pursuant to Section 3-1 determines that the information continues to meet the classification requirements prescribed in Section 1?-3 despite the passage of time. 3-303. It is presumed that information which continues . to meet the classification requirements in Section 1-3 requires continued protection. In some cases, however, the need to. protect such information may be outweighed by the public interest in disclosure-of the information, and in these cases the information should be declassified. When such questions arise, they shall be referred to the agency head, a senior agency official with responsibility for processing Freedom of Information Act requests or Mandatory Review re- quests under this Order, an official with Top Secret classification authority, or the Archilrist of the United States in the case of material covered in Section 3- 503. That, official will determine whether the public interest in disclosure outweighs the damage to national security that might reasonably be expected from disclosure. 3-4. Systematic Review for Declassifuation. 3-4011. Classified information constituting permanently valuable records of the Government, as defined by 44 U.S.C. 2103, and information in the possession and control of the Administrator of General Services, pursuant to 44 U.S.C, 2107 or 2107 note, shall be reviewed for declassification as it becomes twenty years old. Agency heads listed in Section 1-2 and officials designated by the President pursuant to Section 1-201 of this Order may extend classification beyond twenty years, but only in`accordance with Sections 3-3 and 3-402. This authority may not be delegated. When classification is extended beyond twenty years, a date no more than ten years later shall be set for declassification or for the next review. That date shall be marked on the document, Subsequent reviews for declassification shall be set at no more than ten year intervals. The Director of the Information Security Oversight Office may extend the period between subsequent reviews for specific catego- ries of documents or information. 3-40.c'. Within 180 days after the effective date of this Order, the agency heads' listed in Section 1-2 and the heads of agencies which had original classification authority under prior orders shall, after consultation with the Archivist of the United States and review by the Information Security Over- sight Office, issue and maintain guidelines for systematic review covering twenty-year old classified information under their jurisdiction. These guide- Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 -28956 THE PRESIDENT lines shall state specific, limited categories of information which, because of their national security sensitivity, should not be declassified automatically but should be reviewed item-by-item to determine whether continued protection beyond twenty years is needed. These guidelines shall be authorized for use by the Archivist of the United States and may, upon approval of the issuing authority, be used by any agency having custody of the information. All information not identified in these guidelines as .requiring review and for which a prior automatic declassification date has not been established shall be declassified automatically at the end of twenty years from the date of original classification. 3-433. Nothwithstanding Sections 3-401 and 3-402, the Secretary of Defense may establish special procedures for systematic review and declassifi- cation oE' classified cryptologic information, and the Director of Central Intelli- gence may establish special procedures for systematic review and declassifica- tion of classified information concerning the identities of clandestine human agents. These procedures shall be consistent, so far as practicable, with the objectives of Sections 3-401 and 3-402. Prior to implementation, they shall be reviewed and approved by the Director of the Information Security Oversight Office and, with respect to matters pertaining to intelligence sources and methods, by the Director of Central Intelligence. Disapproval of procedures by the Director of the Information Security Oversight Office may be appealed to the National Security Council. In such cases, the procedures shall not be implemented until the appeal is decided. 3-404. Foreign government information shall be exempt from automatic declassification and twenty year systematic review. Unless declassified earlier, such information shall be reviewed for declassification thirty years from its date of origin. Such review shall be in accordance with the provisions of Section 3-3 and with guidelines developed by agency heads in consultation with the Archivist of the United States and, where appropriate, with the foreign government or international organization concerned. These guidelines shall be authorized for use by the Archivist of the United States and may, upon approval of the issuing authority, be used by any agency having custody of the ini'ormation. 3-405. Transition to systematic review at twenty years shall be implement- ed as rapidly as practicable and shall be completed no more than ten years from the effective date of this Order. 3-5. Mandatory Review for Declassification. 3-501. Agencies shall establish a mandatory review procedure to handle requests by a' member of the public, by a government employee, or . by an agency, to declassify and release information. This procedure shall apply to information classified under this Order or prior Orders. Except as provided in Section ?t-503, upon such a request the information shall be reviewed for possible declassification, provided the request reasonably describes the infor- mation. Requests for declassification under this provision shall be acted upon within 60 days. After review, the information or any reasonably segregable portion thereof that no longer requires protection under this Order shall be declassified and released unless withholding is otherwise warranted under applicable law. 3-50:2. Requests for declassification which are submitted under the provi- sions of tie Freedom of Information Act shall be processed in accordance with the provisions of that Act. 3-503. Information' less than ten years old which was originated by the President, by the White House Staff, or by committees or commissions ap- pointed by the President, or by others acting on behalf of the President, including such information in the possession and control of the Administrator FEDERAL REGISTER-VOL. 43, NO. 128-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 of General Services pursuant to 44 U.S.C. 2107 or 2107 note, is exempted 'from the provisions of Section 5-501. Such information over ten years old shall be subject to mandatory review for declassification. Requests for manda- tory review shall be processed in accordance with procedures developed by the Archivist of the United States. These procedures shall provide for consul- tation with agencies having primary subject matter interest. Any decision by the Archivist may be appealed to the Director of the Information Security Over- sight Office. Agencies with primary subject matter interest shall be notified promptly of the Director's decision on such appeals and may further appeal to the National Security Council through the process set forth in Section 3-104. 3-504. Requests for declassification of classified documents originated by an agency but in the possession and control of the Administrator of General Services, pursuant to 44 U.S.C. 2107 or 2107 note, shall be referred by the Archivist to the agency of origin for processing in accordance with Section 3- 501 and for direct response to the requestor. The Archivist shall inform requesto:rs of such referrals. 3-505. No, agency in possession of a classified document may, in response to a request for the document made under the Freedom of Information Act or this Order's Mandatory Review provision, refuse to confirm the existence or non-existence of the document, unless the fact of its existence or non-exis- tence would itself be classifiable under this Order. S-6. Doumgrading. 3-601. Classified information that is marked for automatic downgrading is downgraded accordingly without notification to holders. 3-602. Classified information that is not marked for automatic downgrad- ing may be assigned a lower classification designation by the originator or by other authorized officials when such downgrading is appropriate. Notice of downgrading shall be provided to holders of the information to the extent practicab:[e. SECTION 4. SAFEGUARDING, 4-1. Gene al Restrictions on Access. 4-101. No person may be given access to classified information unless that person has been determined to be trustworthy and unless access is necessary for the performance of official duties. 4-102. All classified information shall be marked conspicuously to put users on notice of'its current classification status and, if appropriate, to show any special distribution or reproduction restrictions authorized by this Order. 4-103. Controls shall be established by each agency to ensure that classi- fied information is used, processed, stored, reproduced, and transmitted only -under conditions that will provide adequate protection and prevent .access by .unauthorized persons. -4-101. Classified information no longer needed in current working files or for reference or record purposes.shall be processed for appropriate disposi- tion in accordance with the provisions of Chapters 21 and 33 of Title 44 of the United States Code, which governs disposition of Federal records. 4-105. Classified information disseminated outside the Executive branch shall be ;given protection equivalent to that afforded within the Executive branch. 4-2. Special Access Prvgnsms. 4-201. Agency heads listed in Section 1-201 may create special access programs to control access, distribution, and protection of particularly sensi- tive information classified pursuant to this Order or prior Orders. Such pro- iEDERAL REGISTER VOL. 43, NO. 128-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 grams may be created or continued only by written direction and only by those agency heads and, for matters pertaining to intelligence sources and methods, by the Director of Central ,Intelligence. Classified information in ,such programs shall be declassified according to the provisions of Section 3. 4-202. Special access programs may 'be created or continued only on a specific showing that: (a) normal management and safeguarding procedures are not sufficient to limit need-to-know or access; (b) the number of persons who will need access will be reasonably small and commensurate with the objective of providing extra protection for the information involved; and (c) the special access controls balance the need to protect the information against the full spectrum of needs to use the information. 4-203. All special access programs shall be reviewed regularly and, except those required by treaty or international agreement, shall terminate automati- cally every five years unless renewed in accordance with the procedures in Section 4-2. 4-2D4. Within 180 days after the effective date of this* Order, agency heads shall review all existing special access programs under their jurisdiction and continue them only in accordance with the procedures in Section 4-2. Each of those agency heads shall also establish and maintain a system of accounting for special access programs. The Director of the Information Secu- rity Oversight Office shall have non-delegable access to all such accountings. 4-3. Access by Historical Researchers and Former Presidential Appointees. 4-301. The requirement in Section 4-101 that access to classified infor- mation may be granted. only as is necessary for the performance of official duties may be waived as provided in Section 4-302 for persons who: (a) Ire-engaged in historical research projects, or (b) previously have occupied policy-making positions to which they were appointed by the President. 4-302. Waivers under Section 4-301 may be granted only if the agency with jurisdiction over the information: (a) makes a written determination that access is consistent with the inter- ests of national security; (b) . takes appropriate steps to ensure that access is limited to specific categories of information over which that agency has classification jurisdiction; (c) limits the access granted to former Presidential appointees to items that the person originated, reviewed, signed or received while serving as a Presidential appointee. -4-4. Reproduction Controls. 4-401. Top Secret documents may not be reproduced without the consent of the originating agency unless otherwise marked by the originating office. 4-402. Reproduction of Secret and Confidential documents may be re- stricted by the originating agency. 4-403. Reproduced copies of classified documents are subject to the same accountability and controls as the original documents. 4-404. Records shall be maintained by all agencies that reproduce paper copies of classified documents to show the number and distribution of repro- duced copies of all Top Secret documents, of all documents covered by special access programs distributed outside the originating agency, and of all Secret and all Confidential documents which are marked with special dissemi- nation and reproduction limitations in accordance with Section 1-506. 4-405. Sections 4-401 and 4-402 shall not restrict the reproduction of documents-for the purpose of facilitating review for declassification. However, FEDERAL REGISTER-VOL 43, NO. 128-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THE PRESIDENT such reproduced documents that remain classified after review must be de- stroyed after they are used. SECTION 5. IMPLEMENTATION AND REVIEW. 5-1. Oversight. 5-101. The National Security Council may review all matters with respect4 to the implementation of this Order and shall provide overall policy direction for the in Formation security program. 5-102. The Administrator of General Services shall be responsible for implementing and monitoring the program established pursuant to this Order. This responsibility shall be delegated to an Information Security Oversight Office. 5-2. Infonnation Security Oversight Office. 5-20:1. The Information Security Oversight Office shall have a full-time Director appointed by the Administrator of General Services subject to ap- proval by the President. The Administrator also shall have authority to ap- point a staff for the Office. 5-202. The Director shall: (a) oversee agency actions to ensure compliance with this Order and implementing directives; (b) consider and take action on complaints and suggestions from persons within or outside the Government with respect to the administration of the information security program, including appeals from decisions on declassifi- cation requests pursuant to Section 3-503; (c) exercise the authority to declassify information provided by Sections 3-104 and 3-503; (d) develop, in consultation with the agencies, and promulgate, subject to the approval of the National Security Council, directives for the implementa- tion of this Order which shall be binding on the agencies; (e) report annually to the President through the Administrator of General Services and the National Security Council on the implementation of this Order; (f) review all agency implementing regulations and agency guidelines for systematic declassification review. The Director shall require any regulation or guideline to be changed if it is not consistent with this Order or implementing directives. Any such decision by the Director may be appealed to the National Security Council. The agency regulation or guideline shall remain in effect until the appeal is decided or until one year from the date of the Director's decision, whichever occurs first. (g) exercise case-by-case classification authority in accordance with Section 1-205 and review requests for original classification authority from agencies or officials not granted original classification authority under Section 1-2 of this Order, and (h) have. the authority to conduct on-site reviews of the information security program of each agency that handles classified information and to require of each agency such reports, information, and other cooperation as necessary to fulfill his responsibilities. If such reports, inspection, or access to specific categories of classified information would pose an exceptional national security rsk, the affected agency head may deny access. The Director may appeal. denials to the National Security Council. The denial of access shall remain in effect until the appeal is decided or until one year from the date of the denial, whichever occurs first. FEDERAL REGISTER VOL 43, NO. Ma-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 28960 THE PRESIDENT 5-3. Interagency information security Committee. 5-301. There is established an Interagency Information Security Commit- tee which shall be chaired by the Director and shall be comprised of represent- atives of the Secretaries of State, Defense, Treasury, and Energy, the Attorney General, the Director of Central Intelligence, the National Security Council, the Domestic Policy Staff, and the Archivist of the United States. 5-3D2. Representatives of other agencies may be invited to meet with the Committee on matters of particular interest to those agencies. 5-303. The Committee shall meet at the call of the Chairman or at the request of a member agency and shall advise the Chairman on implementation of this order. 5-4. General Responsibilities. 5-401. A copy of any information security regulation and a copy of any guideline for systematic declassification review which has been adopted pursu- ant. to this Order or implementing directives, shall be submitted to the Infor- mation Security Oversight Office. To the extent practicable, such regulations and guidelines should be unclassified. 5-402. Unclassified regulations that establish agency information security policy arid unclassified guidelines for systematic declassification review shall be published in the FEDERAL REGISTER. 5-403. Agencies with original classification authority shall promulgate guides for security classification that will facilitate the identification and uni- form classification of information requiring protection under the provisions of this Order. 5-404. Agencies which originate or handle classified information shall: (a) -designate a senior agency official to conduct an active oversight pro- gram to ensure effective implementation of this Order; (b) designate a senior agency official to chair an agency committee with authority to act on all suggestions and complaints with respect to the agency's administration of the information security program; (c) establish a process to decide appeals from denials of declassification requests submitted pursuant to Section 3-5; (d) establish a program to familiarize agency and other personnel who have access to classified information with the provisions of this Order and implementing -directives. This program shall impress upon agency personnel their responsibility to exercise vigilance in complying with this Order. The program shall encourage agency personnel to challenge, through Mandatory Review and other appropriate procedures, those classification decisions they believe to be improper; (e) promulgate guidelines for systematic review in accordance with Sec- tion 3402; (f) establish procedures to prevent unnecessary access to classified infor- mation, including procedures which require that a demonstrable need for access to classified information is established before initiating administrative clearance procedures, and which ensures that the number of people granted access to classified information is reduced to and maintained at the minimum number that is consistent with operational requirements and needs; and (g) ensure that practices for safeguarding information are systematically reviewed and that those which are duplicative or unnecessary are eliminated. 5-405. Agencies shall submit to the Information Security Oversight Office such information or reports as the Director of the Office may find necessary to carry out the Office's responsibilities. FEDERAL REGISTER-VOL. 43, NO. 128-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THE PRESIDENT 28961 5-5. Administrative Sanctions. 5401. If the Information Security Oversight Office finds that a violation of this Order or any implementing directives may have occurred, it shall make a report to the head of the agency concerned so that corrective steps may be taken. - 5-502. Officers and employees of the United States Government shall be subject to appropriate administrative sanctions if they: (a) knowingly and willfully classify or continue the classification of infor- mation :'in violation of this Order or any implementing directives; or (b) knowingly, willfully and without authorization disclose information properh' classified under this Order or prior Orders or compromise properly classified information through negligence; or (c) knowingly and willfully violate any other provision of this Order or implementing directive. 5-5D3. Sanctions may include reprimand, suspension without pay, remov- al, termination of classification authority, or other sanction in accordance with applicable law and agency regulations. 5-504. Agency heads shall ensure that appropriate and prompt corrective action is taken whenever a violation under Section 5-502 occurs. The Director of the Information Security Oversight Office shall be informed when such violations occur. 5-505. Agency heads shall report to the Attorney General evidence re- flected in classified information of possible violations of Federal criminal law by an agency employee and of possible violations by any other person of those Federal criminal laws specified in guidelines adopted by the Attorney General. SECTION 6. GENERAL PROVISIONS. 6-1. Defi-'titions. 6-101. "Agency" has the meaning defined in 5 U.S.C. 552(e). 6-102. "Classified information" means information or material, herein collectively termed information, that is owned by, produced for or by, or under the control of, the United States Government, and that has been determined pursuant to this Order or prior Orders to -require protection against unauthorized disclosure, and that is so designated. 6-103. "Foreign government information" means information that has been provided to the United States in confidence by, or produced by the United States pursuant to a written joint arrangement requiring confidentiality with, a i:oreign government or international organization of governments. 6-104. "National security" means the national defense and foreign rela- tions of the United States. 6-105. "Declassification event" means an event which would eliminate the need for continued classification. 6-2. Gene al. 6-201. Nothing in this Order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended. "Restricted Data" and information designated as "Formerly Restricted Data" shall be handled, pro- tected, classified, downgraded, and declassified in conformity with the provi- sions of the Atomic Energy Act of 1954, as amended, and regulations issued pursuant thereto. 6-202. The Attorney General, upon-request by the head of an agency, his duly designated representative, or the Director of the Information Security Oversight Office, shall personally or through authorized representatives of the Department of justice render an interpretation of this Order with respect to any question arising in the course of its administration. FEDERAL REGISTER-VOL. 43, NO. 128-MONDAY, JULY 3, 1978 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 6-20:e. Executive Order No. 11652 of March -8, 1972, as amended by Executive Order No. 11714 of April 24, 1973, and as further amended by Executive Order No. 11862 of June 11, 1975, and the "National Security Council Directive of May 17, 1972 (3 CFR 1085 (1971-75 Comp.)) are re- voked. 6-204. This Order shall become effective on December 1, 1978, except that the functions of the 'Information Security Oversight Office specified in Sections Ri-202(d) and 5-202(f) shall be effective immediately and shall be performed in the interim by the Interagency Classification Review Committee established pursuant to Executive Order No. 11652. THE WHITE HOUSE, June 28, 1978. EDrrORIAL NOTE: The President's statement of June 29, 1978, on issuing Executive Order -12065, is pruned in the Weekly Compilation of Presidential Documents (vol. 14, No.-26). Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 THE PRESIDENT 28963 Order oi' June 28, 1978 Designation of Certain Officials Within the Executive Office of the President To Classify National Security Information Pursuant to the provisions of Section 1-201 of Executive Order 12065 of June 28, 1978, entitled "National Security Information", I hereby designate the following officials within the Executive Office of the President to originally classify information as "Top Secret" The Vice President The Assistant to the President for National Security Affairs The Director, Office of Management and Budget The Director, Office of Science and Technology Policy The Special Representative for Trade Negotiations The Chairman, Intelligence Oversight Board Pursuant to the provisions of Section 1-202 of said Order, I designate the Chairman of the Council of Economic Advisers and the President's Personal Representative for Micronesian Status Negotiations to originally classify infor- mation ai; "Secret". Any delegation of this authority shall be in accordance with Section 1-204 of the Order. This Order shall be published in the FEDERAL REGISTER. THE WHITE HOUSE, June 28, 1978. [FR Doc. 78-18506 Filed 6-29-78; 4:19 pm] FEDERAL REGISTER, VOL 43, NO. 128-MONDAY, JULY 9, 197E Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0 Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080009-0