NOTICE: In the event of a lapse in funding of the Federal government after 14 March 2025, CIA will be unable to process any public request submissions until the government re-opens.

OFFICE OF SECURITY POLICY DEFINITION CONCERNING SECURITY VIOLATIONS AND THEIR REPORTING BY CIA DOMESTIC INDUSTRIAL CONTRACTOR FACILITIES

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP96B01172R001000150007-9
Release Decision: 
RIPPUB
Original Classification: 
S
Document Page Count: 
5
Document Creation Date: 
December 12, 2016
Document Release Date: 
September 20, 2001
Sequence Number: 
7
Case Number: 
Publication Date: 
January 17, 1978
Content Type: 
MF
File: 
AttachmentSize
PDF icon CIA-RDP96B01172R001000150007-9.pdf299.48 KB
Body: 
Approved For Releases 2001/11 -RDP96B01172RO01 Q_01 50007-9 21501-78 25X1A opy5of6 17 JAN 1978 MEMORANDUM FOR: Director of Security Security (PTOS) SUBJECT: Office of Security Policy Definition Concerning Security Violations and Their Reporting by CIA Domestic Industrial Contractor Facilities 1. Action Requested: It is requested that you sign Attachment '"fit ne anAttachment Two forwarded with this memorandum, and that you forward Attachment One to the Director of Logistics and Attachment Two to the Director, NRO, together with exemplars of the Security Violation Report Form. 2. Bac round: The DCI, when commenting on the Security Review Task Force Report of the Moore and Boyce/Lee Cases, expressed concern that not all security violations were being reported to tars as required in Section I, Paragraph 6a(3) of the ndustrial Security Manual. Agency regulations cur ntain no definition of a security violation. Attachments One and Two contain a definition of what constitutes a reportable security violation. Also included is a reporting form which would be used by Agency contractors to report such violations to Headquarters in a noncompartmented format. 3. Staff Position: This new definition of a reportable security v o-at on represents the coordinated position of this Office, of the Security Staffs of the Office of Develop- ment and Engineering, the Office of Communications, the Office of Logistics, and of the NRO, as well as of the Special Security Center. The Security Violation Report Form was designed by the Office of Development and Engineering and meets with the approval of the other Offices concerned. The Office of Communications has requested a copy of the two attachments and the Security Violation Report Form. We propose to forward them as requested following your signature of Attachments One and Two. ' ` ivsl I rVE r iK ` ~ OIJ rFS -, D METHODS INVOLVED RWNDUt yr 2RO0A% 0 ase 2041b1v1fR8L rS 117 SECRET' Approved For Releas?g 2001/11/08: CI 01172R001L00150007-9 112501.78 25X1A 4. Recommendation: It is recommended that you sign and forwa the attached memoranda to the Director of Logistics and to the Director, NRO, along with copies of the Security Violation Report Form for further dissemination to the Director of Logistics and the appropriate NRQ Program Offices. 25X1A Approved For Release 2001/11/08 : CIA-RDP96B0l172R001000150007-9 11 CRET Approved For Release 2001/11/08 : G -A 6B01172R001U09150007-9 6 FEB 1978 MEMORANDUM FOR: Director of Logistics FROM: Robert W. Gambino Director of Security SUBJECT: Security Violations Occurring at CIA Funded Contractor Facilities -- Definition of and Reporting Procedures (U/AIUO) I. (S) During security audits conducted at Agency- funded and non-Agency-funded contractors as a result of the Boyce/Lee Case, it has become apparent that some contractors have not been reporting security violations to Headquarters. It is recognized that such reports have not been required in the past with respect to collateral classified contracts, and that it was only in the SCI area that reporting of security violations was mandatory. Many contractors have adopted the policy of reporting only violations which have, in their judgment, resulted in compromise or which they felt could potentially result in compromise. They have not uniformly reported other matters such as open safes or unsecured classified material found by guards, preferring to regard them simply as security "discrepancies" rather than as violations. 2. (U/AIUO) The Director of Central Intelligence has expressed concern regarding this situation and agrees that such a lack of reporting is unacceptable. The following policy will, therefore, apply with regard to all contracts under the cognizance of the Central Intelligence Agency: (UTAIUO) "SECURITY VIOLATION: Any breach of securit regulat ens, requ rerents, procedures or guides by an individual which subjects classified or sensitive material or "formation to -compromise to unauthorized persons,;,or which places it in- jeopardy where a conprogiise could result, constitutes a reportable security. flioration. --Such a breach OS 7 5216 Approved For Release 2001/11/08: CIA-RDP96B01172R00OOO0t5flOQ2.;9--- Approved For Release 2001/11/08: CIAS6B01172R001000150007-9 includes both acts of omission such as failure to properly secure classified or sensitive material and acts of commission such as discussion of classified or sensitive information over nonsecure telephone circuits. The information and materials referred to in this definition comprise Collateral classified, SCI classified, and those materials and information which are sensitive because they involve intelligence sources and methods." 3. (U/AIUO) It is requested that you disseminate the definition as shown above to all of your contractors. 4. (U/AIUO) Along with the definition, please forward a copy of the attached Security Violation Report Form. It may be reproduced locally by each contractor as necessary. Please inform your contractors that the Security Violation Report Forms, when filled in, are to be classified SECRET if they relate to SCI contracts, and CONFIDENTIAL if they relate to Collateral-type contracts. The contractor is to submit these forms in duplicate to the Cognizant Headquarters Security Officer (CHSO). The CHSO will maintain one copy in Office of Logistics files as a record of security violations pertaining to that particular contract for review during contract award fee negotiations. The C}ISO will send the second copy to the Office of Security for inclusion in the individual's security file. Full Program names should not be used in reporting SCI violations on this Security Violation Report Form because the forms will ultimately be stored in a noncompartmented area. If it is necessary for the contractor to report SCI details of a violation, the facts should be separately stated in an attachment which will be detached upon receipt at Headquarters and maintained under SCI control. S. (U/AIUO) It is recognized that the Office of Communications has already established procedures under which contractors report certain types of COMSEC violations to Headquarters. This new procedure is a supplementary requirement. (U/AID Please advise this Office when the actions 25X1A in paragraphs 3 and 4 ha Attachment Distribution: Orig Adse Approved Pt iSM lease 20 / 1 - DD/PTOS ISB 1 - OS/Reg IDP96B01172R001000150007-9 25X1 A ca (29 Dec 77, retyped 9 Jan 78) 25X1A Approved For Release 2001/11/08 : CIA-RDP96B01172RO01000150007-9 Next 1 Page(s) In Document Exempt Approved For Release 2001/11/08 : CIA-RDP96BOl 172RO01 000150007-9