FEDERAL REGISTER PART VIII INFORMATION SECURITY OVERSIGHT OFFICE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP84M00395R000600170026-0
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 20, 2016
Document Release Date:
April 27, 2007
Sequence Number:
26
Case Number:
Publication Date:
June 25, 1982
Content Type:
REGULATION
File:
Attachment | Size |
---|---|
CIA-RDP84M00395R000600170026-0.pdf | 891.69 KB |
Body:
Approved For Release 2007/04/27: ClA, : : 5R000600170026-0
ML.j
M. M
Part VIII
Friday
June 25, 1982
Information Security
Oversight Office
National Security Information
Uiro For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
eravllegister / Vol. 47, No. 123 / Friday T
u
4-FORMATION SECURITY OVERSIQHT Sec.
nCC11%C
ne 25, 1982 / Rules and Regulations
32 CFR Part 2001
[Directive No. 1]
National Security Information
AGENCY: Information Security Oversight
Office (ISOO). ,
ACTION: Implementing Directive; final
rule.
SUMMARY: The Information Security
Oversight Office is publishing this
Directive (final rule) pursuant to section
c ori.ir., _e,., -. - -
-A?" uenvauve identification and
markings,
Subpart C-Dedaaaification and
Downgrading
2001.30 Listing declassification and
downgrading authorities.
2001.31 Systematic review for
declassification. .
2001.32 Mandatory review for
declassification
2001.33 Assistance to the Department of
State.
2001.34 FOIA and Privacy Act requests._
Subpart D-Safeguarding
2001.40 General.
200
1.41. Standards fQr security equipment
relating to national security information. 2001.42 Accountability.
The National Security Council approved 2001.43 Storage.
this Directive on June 22. 1982. The 200144 Transmittal.
Executive order prescribes a uniform 2001.45 Special access programs.
information security system; It also 2001.48 Reproduction controls.
establishes a monitoring system to 22 ?48 Doss o i possible compromise.
enhance its effectiveness. This Directive ?48 esponsiibbiand o
sets forth guidance to agencies 49 R Responslities of of huction
o
holders.
20
downgrading, declassification, and
safeguarding of national security
information.
EFFECTIVE DATE: August 1, 1982.
FOR FURTHER INFORMATION CONTACT.
Steven Garfinkel, Director, ISOO.
Telephone: 202-535?..7251.
SUPPLEMENTARY INFORMATION: This
01.51 Emergency authority.
Subpart E-Implementation and Review
2001.60 Agency regulations.
2001.61 Security education.
2001.62 Oversight. .
Subpart F-General Provisions
2001.70 Definitions.
2001.71 Publication and effective date
level. The information shall be
safeguarded at the higher level in
accordance with Subpart D, pending the
determination about its classification
level. Upon the determination of its
classification level, the information shall
be marked as provided in_$ 2001.5.
12001.2 Classification authority.
(a) Requests for original classification
authority (1.2 and 5.2(b)(5)1. A request
for original classification authority
pursuant to section 1.2 of Executive
Order 12358 (hereinafter "the Order")
shall include a compleTe justification for
the level of classification authority
sought, a description of the information
that will require original classification,
and the anticipated frequency of original
classification actions.
(b) Listing classification authorities
[1.21. Agencies shall maintain a current
listing of officials delegated original
classification-authority by name,
position, or other identifier. If possible,
this listing shall be unclassified.
(c) Exceptional cases 11.2(e)1.
Information described in section 1.2(e)
of the Order shall be protected as
provided in 1 2001.1(b).
12001.3 Classification categories.
FR 14874, April e, 1982 -? wv =. +VV.:/ AA"Jvilnuc1un (l.:rta/p Certain information
provisions of section 5.2(b)(i) of which would otherwise be unclassified
Executive Order 12358. The Purpose of Subpart A-Original Classification may require classification when
the Directive is to assist in implementing _ combined or associated with other
the Order, users of the Directive shall 12001.1 Classification levels. unclassified or classified information.
refer concurrently to that Order for (a1 Limitations [1.1(b)1.i Markings Classification on this basis shall be
guidance. other than "Top Secret," "Secret," and supported by a written explanation that,
List of Subjects in 32 CFR part 2001 "Confidential," such as "For Official Use at a minimum, shall be maintained with
Archives and records, Authors Only" or"Limited Official Use," shall the file or referenced on the record copy
Authority not be used to identify national security of the information.
delegations, Classified information, information. No other term or phrase (b) Unofficial publication or
Executive orders, Freedom of shall be used in conjunction with these aclosure())
11.3 d . Following an
information, Information. Intelligence, markings, such as "Secret Sensitive" or
National defense, National security "Agency Confidential," to Identify inadvertent
dent cal or
-or o oo n oforms rmation ed
information, Presidential documents, national security information. The terms s filar to information in has ee al or
Security information. Security measures. "Top Secret," "Secret," and classified in accordanthat itth the Order
Title 32 of the Code of Federal "Confidential" should not be used to or predecessor orders,
Regulations. Part 2001, is revised to read Identify nonclassified executive branch Peary interest shall dethe termine the
as follows: informatio
PART 2001-NATIONAL SECURITY
INFORMATION
Subpart A-Original Classification
Sec.
2001.1 Classification levels.
2001.2 Classification authority.
2001.3 Classification categories.
2001.4 Duration of classification.
2001.5 Identification and markings.
2001.9 Limitations on classification.
Subpart B-Derivative Classification
2001.20 Use of derivative classification.
200121 Classification guide,.
degree of damage to the national
(b) Reasonable doubt [1.1(c11. (1) security, the need for continued
When there is reasonable doubt about classification, and. In coordination with
the need to classify information, the the agency in which the disclosure
information shall be safeguarded as if it Occurred what action must be taken to
were "Confidential" Information in prevent similar occurrences.
-'accordance with Subpart D, pending the
determination about its classification. 12001.4 ? Duration Of classification.
Upon the determination of a need for (a) Information not marked for
classification, the information that is declassification (1.41. Information
classified shall be marked as provided classified under predecessor orders that
in 1 2001.5. is not subject to automatic
(2) When there Is reasonable doubt declassification shall remain classified
about the appropriate classification until reviewed for declassification.
(b) Authority to extend automatic
'Bracketed reference, pertain to related sections declassification determinations of Executive Order izmse, The authority to extend the [1.4(b)].
rove.dLF9LRe1easP 7nn7r04i77 0IA-R DP84M00395R000600170026-0
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Register I Vol. 47. No. 123 / Fly. June 25. 1982 / Rules and Regulations 27837
classification of information subject to that the potential benefits of portion
marking are clearly outweighed by the
predecessor orders Is limited to those Increased administrative burdens.
officials who have classification Unless the portion marking requirement
authority over the information and are has been waived as authorized, each
designated In writing to have original portion of a document. including
classification authority at the level of subjects and titles, shall be marked by
the information to remain classified. placing a parenthetical designation
Any decision to extend this . . immediately preceding or following the
classification on other than a document- text to which It applies. The symbols
by-document basis shall be reported to "(TS)" for Top Secret, "(S)" for Secret,
"
"
for
(U)
the Director of the Information Security "(C)" for Confidential, and
Oversight Office. Unclassified shall be used for this
120013 tdentltlcstlou and enartdnW purpose. If the application of
parenthetical designations is not'
(t.).1.5(b) and lair)].
A uniform Information security system practicable. the document shall contain
requires that standard markings be a statement sufficient to identify the
applied to national security Information. information that is classified and the
Except in extraordinary circumstances level of such classification, and the
propided in section 1.5(a) of'the information that is not classified. If all
as
as Indicated s section herein. the portions of a document are classified at
Order, id d or as the of paper documents created e same level, this fact may be
after the effective date of the Order indicated by a statement to that effect. If
shall not deviate from the following a subject or title requires classification,
prescribed formats. These markings an unclassified identifier may be applied
to facilitate reference.. .
(i) For an unclassified transmittal
document
-UNCLASSIFIED WHEN CLASSIFIED
ENCLOSURE IS REMOVED"
(Ii) For a classified transmittal
document:
"UPON REMOVAL OF ATTAI S
THIS DOCUMENT IS (classification level of
the transmittal document standing alone)"
(2) 'Restricted Data"and 'Formerly
Restricted Data"1B.Z(a)). "Restricted
Data" and "Formerly Restricted Data"
shall be marked in accordance with
regulations.issued under the Atomic
Energy Act of 1954, as amended.
(3) Intelligence sources or methods
(1.5(c)). Documents that contain
information relating to intelligence
sources or methods shall include the
following marking unless otherwise
proscribed by the Director of Central
Intelligence:
"WARNING NOTICE-IINT`ELLIGENCE
SOURCES OR METFiiODS INVOLVED"
shall also be affixed to material other
than paper documents, or the originator (b) Classification authority If the (4) Foreign government information
shall provide holders or recipients of the original classifier is other than the 11.5(c)). Documents that contain foreign
information with written instructions for ' signer or approver of the document, the government information shall include
protecting the information. identity shall be shown as follows: either the marking'TOREIGN
(a) Classification level. The markings "CLASSIFIED BY (identification of original GOVERNMENT INFORMATION," or a
''Top Secret," "Secret," and classification authority)" marking that otherwise indicates that
"Confidential" are used to indicate: that the information Is foreign government
information requires protection as tc) Agency and office of 01'91n, If the Information. If the fact that information
national security information under the identity of the originating agency and is foreign government information must
Order, the highest level of classification office is not apparent on the face of a be concealed the marking shall not be
document, it shall be placed below the used-and the document shall be marked the contained in a document;
of each and .,ASSED BY" line. as if it were wholly oft J.S. origin.
classification level form, each each page (d) Declassification and do~m
each -portion a e n of a and, in tnetrvctionsDeclassification and.a~ (5) Computer output fL5(cJJ.
abbreviated form,
document. Documents that are generated as
(1) Overall marking, The highest level applicable, downgrading instructions computer output may be marked
of classification of information in a shall be shown aslollows: automatically by systems software. If
document shall be marked in such a (1) For information to be declassified automatic marking is not practicable.
way as to distinguish it clearly from the automatically on a specific date: such documents must be marked
informational text. These markings shall "DECLASSIFY ON: (date]" manually.
appear at the top and bottom of the (6) Agency preescribedmarkings
outside of the front cover (if any), on the (2) For information to be declassified (1.5(c), 4.2(a). and &3(c)) Officials
title page (if any), an the first page, and automatically upon occurrence of a ' delegated original classification
on the outside of the back cover (if any). specific event _ authority by the President may prescribe
(2) Page marking: Each interior page '"DECLASSIFY ON: (description of event)" additional markings to control
of a classified document shall be reproduction and dissemination.
marked at the top and bottom either (3) For information not to be
including markings required for special
according to the highest classification of declassified automatically: access programs authorized by section
the content of the page. including the "DECLASSIFY ON: ORIGINATING 4.2(a) of the Order.
designation "Unclassified" when it is AGENCY'S DETERNIINATION REQUIRED (I) Electrically transmitted
applicable, or with the highest overall or'OADR? " information (messages) f1.5(c)J National
classification of the document. (4) For information to be downgraded security information that is transmitted
(3) Portion marking. Agency heads automatically on a specific date or upon electrically shall be marked as follows:
may waive the portion marking occurrence of a specific event (1) The highest level of classification
requirement for specified classes of "DOWNGRADE TO (classification level) shall appear before the first line of text;
documents or information only upon a
written determination that (i) There will ON (date or description of event)" (2) A "CLASSIFIED BY" line is not
be minimal circulation of the specified (e) Special markings.-(1) Transmittal required.
documents or information and minimal documents 11.5(c)). A transmittal (3) The duration of classification shall
potential usage of these documents or document shall indicate on its face the appear as follows:
information as a source for derivative highest classification of any information (1) For Information to be declassified
classification determinations; or (ii) transmitted by It. It shall also include automatically on a specific date:
there is some other basis to conclude the following or similar instruction: "DECO (date)"
. ' 27838
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Register / Vol. 47, No. 123 / Friday. June 25, 1982 / Rules and Regulations
(Ii) For information to be declassified
upon occurrence of a specific event
"DECL: (description of event)"
(iii) For information not to be
automatically declassified which
requires the originating agency's
'determination (see also 4 2001.5(d)(3)):
"DECL? OADR"
(iv) For information to be
automatically downgraded:
"DNG (abbreviation of classification level
to which the information is to be downgraded
and date or description of event on which
downgrading is to occur)"
(4) Portion marking shall be as
prescribed in ? 2001.5(a)(3);
(5) Special markings as prescribed in
2001.5(e) (2). (3). and (4) shall appear
after the marking for the highest level of
classification. These include:
(i) "Restricted Data" and "Formerly
Restricted Data" shall be marked in
accordance with regulations issued
under the Atomic Energy Act of 1954, as
amended;
(ii) Information concerning
intelligence sources or methods:
"WNINTEL," unless proscribed by the
Director of Central Intelligence;
(Iii) Foreign government information:
"FGI," or a marking that otherwise
indicates that the information is foreign
government information.. If the fact that
information is foreign government
information must be concealed, the
marking shall not be used and the -
message shall be marked as if it were
wholly of U.S. origin.
(6) Paper copies of electrically
transmitted messages shall be marked
as provided in 12001.5(a) (1) and (2).
(g) Changes in classification markings
[1.4(b) and 4.1(b)J. When a change is
made in the duration of classified
information, all holders of record shall
be promptly notified. If practicable,
holders of record shall also be notified
of a change in the level of classification.
Holders shall alter the markings to
conform to the change, citing the
authority for It. If the remarking of large
quantities of information is unduly
burdensome, the holder may attach a
change of classification notice to the
storage unit in lieu of the marking action
otherwise required. Items withdrawn
from the collection fof purposes other "
than transfer for storage shall be
marked promptly In accordance with the
change notice:
12001.6 Lknttations on classification
(1.6(e)).
Before reclassifying information as
provided in section 1.8(c) of the Order,
the authorized official shall consider the
following factors, which shall be
addressed in the report to the Director of
the Information Security Oversight
Office:
(a) The elapsed time following
disclosure;
(b) The nature and extent of
disclosure;
(c) The ability to bring the fact of
reclassification to the attention of
persons to whom the information was
disclosed;
(d) The ability to prevent further
disclosure; and
(e) The ability to retrieve the
information voluntarily from persons not
authorized access in its reclassified
state.
Subpart B-Derivative Classification
12001.20 Use of derivative classification
(2.1].
The application of derivative
classification markings is a
responsibility of those who incorporate,
paraphrase, restate, or generate in new
form information that is already .
classified, and of those who apply
markings in accordance with
instructions from an authorized original
classifier or in accordance with an
authorized classification guide. If a
person who applies derivative
classification markings believes that the
paraphrasing, restating, or summarizing
of classified information has changed
the level of or removed the basis for
classification, that person must consult
for a determination an appropriate
official of the originating agency or
office of origin who has the authority to
upgrade, downgrade, or declassify the
information.
1200121 Classtflation guides.
(a) Ceneral [2.2(a)J. Classification
guides shall. at a minimum:
(1) Identify or categorize the elements
of information to be protected,
(2) State which classification level
applies to each element or category of
information; and
(3) Prescribe declassification .
instructions for each element or
category of information in terms of (I) a
period of time, (ii) the occurrence of an
event, or (iii) a notation that the
information shall not be declassified'
automatically without the approval of
the originating agency.
(b) Requirement for review [2-2(a)].
Classification guides shall be reviewed
at least every two years and updated as
n
, or as
rec
e
y a
necessary. Each agency shall classification guide, and shown on a
guides maintain in a list current of its use. "DECLASSIFY ON' line as follows:
.
(c) Waivers [2.2(c)). An authorized . "DECLASSIRY ON: (date: description of
official's decision to waive the event: or'ORIGINATING AGENCY'S
requirement to issue classification DETERMINATION REQUIRED' (OADR))"
guides for specific classes of documents
or information should be based, at a
minimum, on an evaluation of the
following factors:
(1) The ability to segregate and
describe the elements of information;
(2) The practicality of producing or
disseminating the guide because of the
nature of the information;
(3) The anticipated usage of the guide
as a basis for derivative classification;
and
(4) The availability of alternative
sources for derivatively classifying the
information in a uniform manner.
12001.22 Derivative Identification and
markings [1.5(c) and 2.1(b)],
Documents classified derivatively on
the basis of source documents or
classification guides shall bear all
markings prescribed in 4 2001,5(a)
through (e) as are applicable. '
Information for these markings shall be
taken from the source document or
instructions in the appropriate
classification guide.
(a) Classification authority. The
authority for classification shall be
shown as follows:
"CLASSIFIED BY (description of source
document or classification guide)"
If a document is classified on the basis
of more than one source document or
classification guide, the authority for
classification shall be shown as follows:
"CLASSIFIED BY MULTIPLE SOURCES"
In these cases the derivative classifier
shall maintain the identification of each
source with the file or record copy of the
derivatively classified document. A
document derivatively classified on the
basis of a source document that Is
marked "CLASSIFIED BY MULTIPLE
SOURCES" shall cite the source
document in its "CLASSIFIED BY" line
rather than the term "MULTIPLE
SOURCES."
(b) Declassification and downgrading
instructions. Dates or events for
automatic declassification or
downgrading, or the notation
"ORIGINATING AGENCY'S
DETERMINATION REQUIRED" to
indicate that the document is not to be
declassified automatically, shall be
carried forward from the source
docume
t
di
t
d b
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Register / Vol. 47, No. 123 / Friday, June 25, 2982 / Rules and Regulations 27839
Subpart C-DeclassMication and
Downgrading
12001.30 Listing cis lassffication and
downgrading authorltiss [3.1(b)1
Agencies shall maintain a current
listing of officials delegated
declassification or downgrading
authority by name. position, or other
identifier. If possible, this listing shall be
unclassified.
4 2001.31 Systematic review for
declassification [3.31
(a) Permanent records. Systematic
review is applicable only to those
classified records and presidential
papers or records that the Archivist of
the United States, acting under the
Federal Records Act, has determined to
be of sufficient historical or other value
to warrant permanent retention.
(b) Non permanent records. Non-
permanent classified records shall be
disposed of in accordance with
schedules approved by the
Administrator of General Services under
the Records Disposal Act. These
schedules shall provide for the
continued retention of records subject to
an ongoing mandatory review for
declassification request.
(c) Responsibilities. (1) In meeting
responsibilities assigned by section
3.3(a) of the Order, the Archivist shall:
(I) Establish procedures, in
consultation with the Director of the
Information Security Oversight Office,
for the systematic declassification
review of permanent classified records
accessioned into the National Archives
and classified presidential papers or
records under the Archivist's control;
(ii) Conduct systematic
declassification ileviews in accordance
with guidelines provided by the head of
the agency that originated the
information; or, with respect to foreign
government information, in accordance
with guidelines provided by the bead of
the agency having declassification
jurisdiction over the information, or, if
no guidelines have been provided, in
accordance with the general guidelines
provided by the Director of the
Information Security Oversight Office
after coordination with the agencies
having declassification authority over
the information; or, with respect to
presidential papers or records, in
accordance with guidelines developed
by;the;Archivist and approved by the
National Security Council;
(iii) Conduct systematic
declassification reviews of accessioned
records and presidential papers or
records as they become 30 years old.
except for file series concerning'
intelligence activities (including special
activities), or intelligence sources or
methods created after 1945, and
information concerning cryptology
created after 1945;
(iv) Conduct systematic
declassification reviews of accessioned
records and presidential papers or
records in file series concerning
intelligence activities (including special
activities), or intelligence sources or
methods created after 1945 and
cryptology records created after 1945 as
they become fifty years old;
(v) Establish systematic review
priorities for accessioned records and
presidential papers or records based on
the degree of researcher interest and the
potential for declassifying a significant
portion,of the information;
(vi) Re-review for declassification
accessioned records and presidential
papers or records upon the
determination that the followup review
will be productive, both in terms of
researcher interest and the potential for
declassifying a significant portion of the
information.
(2) The Archivist may review for
declassification, with the concurrence of
the originating agency, accessioned
records and presidential papers or
records, prior to the timeframes
established in paragraphs (c)(1) (iii) and
(iv) of this section.
(3) Officials delegated original
classification authority by the President
under the Order or predecessor orders
shall:
(i) Within six months of the effective
date of the Order issue guidelines for
systematic declassification review and,
if applicable, for downgrading. These
guidelines shall be developed in
consultation with the Archivist and the
Director of the'Information Security
Oversight Office and be designed to
assist the Archivist in the conduct of
systematic reviews;
(ii) Designate experienced personnel
to provide timely assistance to the
Archivist in the systematic review
process;
(iii) Review and update guidelines for
systematic declassification review and
downgrading at least every five years
unless earlier review is requested by the
Archivist
(4) Within six months of the effective
date of the Order the Director of the
Information Security Oversight Office
shall issue, in consultation with the
Archivist and the agencies having
declassification authority over the
information, general guidelines for the
systematic declassification review of
foreign government information. Also
within six months, agency heads may
issue, in consultation with the Archivist
and the Director of the Information
Security Oversight Office..specific
systematic declassification review
guidelines for foreign government
information over which the agency head
has declassification authority. These
guidelines shall be reviewed and
updated every five years unless earlier
review is requested by the Archivist.
(d) Special procedures. All agency
heads shall be bound by the special
procedures for systematic review of
classified cryptologic?records and
classified records pertaining to
intelligence activities (including special
activities), or intelligence sources or
methods issued by the Secretary of
Defense and the Director of Central
Intelligence, respectively.
12001.32 Mandatory review for
deciassRtcation [3.41.
-(a) U.S. originated information. (1)
Each agency head shall publish in the
Federal Register the identity of the
person(s) or office(s) to which
mandatory declassification review
requests may be addressed.
(2) Processing. (I) Requests for
classified records in the custody of the
originating agency. A valid mandatory
declassification review request need not
identify the requested information by
date or title of the responsive records,
but must be of sufficient particularity to
allow agency personnel to locate the
records containing the information
sought with a reasonable amount of
effort. Agency responses to mandatory
declassification review requests shall be
governed by the amount of search and
review time required to process the
request.-In responding to mandatory
declassification review requests,
agencies shall either make a prompt
declassification determination and
notify the requester accordingly, or
inform the requester of the additional
time needed to process the request.
Agencies shall make a final
determination within one year from the
date of receipt except in unusual
circumstances. When information
cannot be declassified in its entirety,
agencies will make reasonable efforts to
release, consistent with other applicable
law, those declassified portions of the
requested information that constitute a
coherent segment Upon the denial of an
initial request, the agency shall also
notify the requester of the right of an
administrative appeal, which must be
filed within 60 days of receipt of the
denial.
(ii) Requests for classified records in
the custody of an agency other than the
originating agency. When an agency
receives a mandatory declassification
review request for records in its
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Register / Vol. 47, No. 123 / Friday, June 25, 1982 / Rules and Regulations
possession that were originated by
another agency, it shall forward the
request to that agency. The forwarding
agency shall include a copy of the
records requested together with its
recommendations for action. Upon
receipt, the originating agency shall
process the request in accordance with
f 2001.32(a)(2)(i). Upon request the
originating agency shall communicate its
declassification determination to the
referring agency.
(iii) Appeals of denials of mandatory
declassification review requests. The
agency appellate authority shall
normally make a determination within
30 working days following the receipt of
an appeal. If additional time is required
to make a determination, the agency
? 2001.33 Assistance to the Department of
State [3.3(b)].
Heads of agencies should assist the
Department of State in its preparation of
the Foreign Relations of the United
States (FRUS) series by facilitating
access to appropriate classified material
In their custody and by expediting
declassification review of documents
proposed for inclusion in the FRUS.
12001.34 F01A and Privacy Act requests
13.4].
Agency heads shall process requests
for declassification that are submitted
under the provisions of the Freedom of
Information Act, as amended. or the
Privacy Act of 1974, in accordance with
the provisions of those Acts.
appellate authority shall notify the - Subpart D-Safeguardlng
requester of the additional time needed
and provide the requester with the _ 12001.40 General [L1].
reason for the extension. The agency Information classified pursuant to this
appellate authority shall notify the Order or predecessor orders shall be
requester in writing of the final afforded a level of protection against
determination and of the reasons for any unauthorized disclosure commensurate
denial. - with its level of classification. For
(b) Foreign government informotion.
Except as provided in this paragraph,
agency heads shall process mandatory
declassification review requests for -
classified records containing foreign
government information in accordance
with f 2001.32(a). The agency that
initially received or classified the
foreign government information shall be
responsible for making a
declassification determination after
consultation with concerned agencies. If
the agency receiving the request is not
the agency that received or classified
the foreign government informati on. it
shall refer the request to the appropriate
agency for. action. Consultation with the
foreign originator through appropriate
channels may be necessary prior to final
action on the request
(c) Cryptologic and intelligence
information. Mandatory declassification
review requests for cryptologic
information and information concerning
intelligence activities (including special
activities) or intelligence sources or maximum extent practicable. be of the
methods shall be processed solely in available through accordance with special procedures - type the Federal
issued by the Secretary of Defense and , _ Supply System.
the Director of Central Intelligence. 2001.42_ Accountability [4.1(b)l
respectively (a) Top Secret, Top Secret control
. (d) Fees. In responding to mandatory officials shall be designated to receive,
dedaiaification review requests for transmit. and maintain current access
classified records. agency heads may and accountability records for Top
charge fees in accordance with section Secret information. An inventory of Top
483a of-title 31, United States Code. The Secret documents shall be made at least
schedules of fees published in the annually. Agency heads may waive the
Federal Register by agencies In ? requirement for an annual inventory of
implementation of Executive Order storage systems containing large
12085 shall remain in effect until they - volumes of Top$ecret information upon
are revised a determination that the safeguarding of
information in special access programs
established under the provisions of
section 4.2 of the Order, the
safeguarding requirements of Subpart D
may be modified by the agency head
responsible for creating the special
access program as long as the modified
requirements provide appropriate
protection for the information.
12001.41 Standards for security
equipment [4.1(b) and 5.1(b)].
The Administrator of General
Services shall, in coordination with
agencies originating classified
information, establish and publish
uniform standards. specifications. and
supply schedules for security equipment
designed to provide secure storage for
and to destroy classified information.
Any agency may establish more
stringent standards for its own use.
Whenever new security equipment is
procured it shall be In conformance
with the standards and specifications
this information is not jeopardized by
the inventory waiver. Waivers shall be
in writing and be available for review
by the Information Security Oversight
Office.
(b) Secret and Confidential. Agency
heads shall prescribe accountability or
control requirements for Secret and
Confidential information.
f 2001.43 Storage [4.1(b)].
Classified information shall be stored
only in facilities or under conditions
designed to prevent unauthorized
persons from gaining access to it. .
(a) Minimum requirements for
physical barriers. (1) Top Secret. Top
Secret information shall be stored in a
GSA-approved security container with
an approved, built-in, three-position,
dial-type changeable combination lock;
in a vault protected by an alarm system
and response force; or in other types of
storage facilities that meet the standards
for Top Secret established under the
provisions of J 2001.41. In addition,
heads of agencies shall prescribe those
supplementary controls deemed
necessary to restrict unauthorized
access to areas in which such
information is stored.
(2) Secret and Confidential. Secret
and Confidential information shall be
stored in a manner and under the
conditions prescribed for Top Secret
information, of in a container, vault, or
alarmed area that meets the standards
for Secret or Confidential information
established under the provisions of
i 2001.41. Secret and Confidential
information may also be stored in a
safe-type filing cabinet having a built-
in, three-position. dial-type changeable
combination lock, or a steel filing
cabinet equipped with a steel lock bar
secured by a GSA-approved three-
position changeable combination.
padlock. Heads of agencies shall
prescribe supplementary controls for
storage of Secret information in cabinets
equipped with a steel lock bar. Access
to bulky Secret and Confidential
material in weapons storage areas,
strong rooms, closed areas or similar
facilities shall be controlled in -
accordance with requirements
established by the appropriate agency -
head. At a minimum, such requirements
shall prescribe the use of key-operated,
high-security padlocks approved by the
General Services Administration.
(b) Combinations. (1) Equipment in
service. Combinations to dial-type locks
shall be changed only by persons having
an appropriate security clearance, and
shall be changed whenever such
equipment is placed in use; whenever a
person knowing the combination no
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Register / VoL 47. No. 129 / Friday, June 25,-29B2 / Rules and Regulations
longer requires access to It whenever a
combination has been subjected to
possible compromise; whenever the
equipmentls taken out of service; or at
least once every year. Knowledge of
combinations shall be limited to the
minimum number of persons necessary
for operating purposes. Records of
combinations shall be classified no
lower than the highest level of classified
information that is protected by the lock.
(2) Equipment out of service. When
security equipment is taken out of
service it shall be inspected to ensure
that no classified information remains,
and the built-in combination lock shall
be reset to the standard combination 50-
25-50. Combination padlocks shall be
reset to the standard combination 10-
20-30.
(c) Keys. Heads of agencies shall
establish administrative procedures for
the control and accountability of keys
and locks whenever key-operated, high-
security padlocks are utilized. The level
of protection provided such keys shall
be equivalent to that afforded the
classified information being protected
by the padlock.
J 2001A4 Transmittal I4.1(b)].
(a) Preparation and receipting.
Classified information to be transmitted
outside of a facility shall be enclosed in
opaque inner and outer covers. The
inner cover shall be a sealed wrapper or
envelope plainly marked with the
assigned classification and addresses of
both sender and addressee. The outer -
cover shall be sealed and addressed
with no identification of the
classification of its contents. A receipt
shall be attached to or enclosed in the
inner cover, except that Confidential
information shall require a receipt only
if the sender deems it necessary. The
receipt shall identify the sender, the
addressee, and the document, but shall
contain no classified information. It
shall be immediately signed by the
recipient and returned to the sender.
Any of these wrapping and receipting
requirements may be waived by agency
heads if conditions provide at least
equivalent protection to prevent access
by unauthorized persons.
(b) Transmittal of Top Secret. The
transmittal of Top Secret information
outside of a facility shall be by
specifically designated personnel. by
State Department diplomatic pouch, by
a messenger-courier system authorized
for the purpose, or over authorized
secure communications circuits.
(c) Transmittal of Secret The
transmittal of Secret information shall
be effected in the following manner
(1) The 50 States, the District-of
Columbia, and Puerto Rico. Secret
Information may be transmitted within
and between the 50 States, the District
of Columbia, and the Commonwealth of
Puerto Rico by one of the means
authorized for Top Secret Information.
by the U.S. Postal Service registered
mail, or by protective services provided
by U.S. air or surface commercial
carriers under such conditions as may
be prescribed by the head of the agency
concerned.
(2) Other areas. Secret information
may be transmitted from, to, or within
areas other than those specified in
i 2001.44(c)(1) by one of the means
established for Top Secret information,
or by U.S. registered mail through
Military Postal Service facilities
provided that the information does not
at any time pass out of U.S. citizen
control and does not pass through a
foreign postal system Transmittal
outside such areas may also be
accomplished under escort of -
appropriately cleared personnel aboard
U.S. Government and U.S. Government
contract vehicles or aircraft, ships of the
United States Navy, civil service
manned U.S. Naval ships, and ships of
U.S. registry. Operators of vehicles,
captains or masters of vessels, and
pilots of aircraft who are U.S.-citizens
and who are appropriately cleared may
be designated as escorts.
(d) Transmittal of Confidential.
Confidential information shall be
transmitted within and between the 50
States, the District of Columbia, the
Commonwealth of Puerto Rico, and U.S.
territories or possessions by one of the
means established for higher
classifications, or by the U.S. Postal
Service certified, first class, or express
mail service when prescribed by an
agency head. Outside these areas.
Confidential information shall be
transmitted only as is authorized for
higher classifications.
(e) Hand carrying of classified
information. Agency regulations shall
prescribe procedures and appropriate
restrictions concerning the escort or
hand carrying of classified information,
including the hand carrying of
classsified information on commercial
carriers.
12001.45 Special access programs [ 1.2(a)
and 4.2(a)].
Agency heads designated pursuant to
section 1.2(a) of the Order may create or
continue a special access program if:
(a) Norm management and
safeguarding procedures do not limit
access sufficiently; and
(b) the dumber of persons with access
to limited to the minimum necessary to
meet the objective of providing extra
protection for the information.
27841
! 2001A6 Reproduetlon controls 14.1(b)].
(a) Top Secret documents, except for
the controlled initial distribution of
information processed or received
electrically, shall not be reproduced
without the consent of the originator.
(b) Unless restricted by the originating
agency, Secret and Confidential
documents may be reproduced to the
extent required by operational needs.
(c) Reproduced copies of classified
documents shall be subject to the same
accountability and controls as the
original documents.
(d) Paragraphs (a) and (b) of-this
section shall not restrict the
reproduction of documents to facilitate
review for declassification.
12001.47 Lass or possible compromise
[4.1(b)].
Any person who has knowledge of the
loss or possible compromise of
classified information shall immediately
report the circumstances to an official
designated for this purpose by the
person's agency or organization. The
agency that originated the information
shall be notified of the loss or possible
compromise so that a damage
assessment may be conducted and
appropriate measures taken to negate or
minimize any adverse effect of the
compromise. The agency under whose
cognizance the lose or possible -
.compromise occurred shall initiate an
inquiry to (a) determine cause, (b) place
responsibility, and (c) take corrective
measures and appropriate
administrative, disciplinary, or legal
action.
? 2001A6 Disposition and destruction
14.1(b)1
Classified information no longer
needed in current working files or for
reference or record purposes shall be
processed for appropriate disposition in
accordance with the provisions of
chapters 21 and 33 of title 44, United
States Code, which govern disposition of
Federal records. Classified information
approved for destruction shall be
destroyed in accordance with
procedures and methods prescribed by
the head of the agency. The method of
destruction must preclude recognition or
reconstruction of the classified
information or material.
? 2001.49 Responsibilities of holders
14.1(b)].
Any person having access to and
possession of classified information is
responsible for. (a) Protecting it from
persons not authorized access to it, to
include securing it in approved
equipment or facilities whenever it is
not under the direct supervision of
Who
Approved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0
Federal Ragiater / Vo& 47. Hirt. 123, / Friday, )uae? 25, 1882 / Rules and Regulations
authorized persons; and (b) meetag
accountability requirements proscribed
by the head of the agency.
f 2001.51 Emergency planning 14.1(b)1
Agencies shall develop plans for the
protection. removal. or destruction. of
classified material in case of are.
natural disaster. dvi} disturbance, or
enemy action. These plans shall include
the disposition of classified information
located In foreign countries.
f 2001.St Emerg ncy wUrorlly [4:1(b)L -
Those officials delegated original
classification authority by the President
may prescribe by regulation special
provisions, for the dissemination.
transmittal, destruction, and
safeguarding of national security
information during combat or other
emergency situations which pose an
imminent threat to national security
information
Subpart E-lmplementatlon and
Review ,
I 2001.60 Agony regulations [S.3(b)1
Each head of an agency shall issue
regulations in accordance with 5 U.S.C.
552(a) to implement the Order and 32
CFR Part 2001 no later than December
31, 19M Those portions that affect
members of the public shall include, at a
minimum. information relating to the
agency's mandatory declassification
review program and instructions for
submitting suggestions or complaints
regarding the agency's information
security program.
12001.61 Security education [5.3(x)1
Each agency that creates or handles
national security information is required
under the Order to establish a security
education program. The program
established shall be sufficient to
familiarize all necessary personnel with
the provisions of the Order and its
implementing directives and regulations
and to impress upon them their
individual security responsibilities. The
program shall also provide for initial,
refresher. and terminatiimn briefings. .
12001.62 Oversight f5.3(aT1
Agency beads shall require. that...
periodic formal reviews be made to
ensure compliance with the provisions
of the Order and 1500 directives.
Subpart F-General Provisions
f 2001.70 Definitions (4.11
(a) Original a&issificatian autharityc
The authority vested is an executive
branch official to make an initial
determination that information regsbes
protection against unauthorized
disclosure in the interest of national
security.
(b) Classifkotion guide. A document
issued by an authorized original
classifier that prescribes the level of
classification and appropriate
declassification instructions for
specified information to be classified on
a derivative basis.
(c) Originating agency. The agency
responsible for the initial determination
that particular information is clasar''red.
(d) Multiple sources. The term used to
indicate that a document is. derivatively
classified when it contains classified
information derived from more than one
.source.
(e) Partiaa A segment of a document
for purposes of expressing a unified
theme; ordinarily a paragraph.
V) Specid aaeve p ogtvm. Any
program imposims "need-to-know" or
access controls beyond those sorsraliy
provided for access to Confidelitial,
Secref4 or Top Secret information. Such
a program any include, but is not
limited to, special clearance.
adjudication. or investigative
requirements. special designations of
officials authorized to determine "need-
to-know." or special bate of persons
-determined to have a "need-to-know.'
. (g) Intelligence activity. An activity
that an agency within the Intelligence
Community is authorized to conduct
pursuant to Executive Order 22333.
('h) Special activity. An activity
conducted in support of national foreign
policy objectives abroad which is
planned and executed so that the role of
the United States Government is not
apparent or acknowledged publicly, and
functions in support of such activity, but.
which is no( intended to influence
United States political processes. public
opinion, policies, or media and does not
include diplomatic activities or the
collection and production of intelligence
or related support functions.
(i) Unauthorized disclosure. A
communication or physical transfer of
classified information to an
unauthorized recipient.
12001.71 Publication and effective data
[6:2(6)1
Part 2001 shall be published in the
Federal Register. It shall become
effective August 1, 19M
Steven Garfinkel.
Director, InformatioirSecurity Oversight
Office.
June 23, 1982.
RR Doc. a -27ne Filed 5...-1O37 .n
sarrrro CODE 6820-AF-O
roved For Release 2007/04/27: CIA-RDP84M00395R000600170026-0