PART VIII INFORMATION SECURITY OVERSIGHT OFFICE

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89B01330R000400610006-1
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
8
Document Creation Date: 
December 22, 2016
Document Release Date: 
August 16, 2011
Sequence Number: 
6
Case Number: 
Publication Date: 
June 25, 1982
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP89B01330R000400610006-1.pdf857.45 KB
Body: 
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Friday June 25, 1982 Part VIII Information Security Oversight Office Nat~onat Security Information Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Federal Register /Vol. 47, No. 123 /Friday, June 25, 1982 /Rules and Regulations INFORMATION SECURITY OVERSIGHT OFFICE 32 CFR Part 2001 [Directhre No. 1] National Security Information AOENCY: Information Security Oversight Office (ISOO). ACTION: Implementing Directive; final rule. SUMMARY: The Information Security Oversight Office is publishing this Directive (final rule) pursuant to section 5.2(b)(1) of Executrve Order 12358, relating to natronal security information. The National Security Council approved this Directive on June 22,1982. The Executive order prescribes a uniform information security system; it also establishes a monitoring system to enhance its effectiveness. This Directive sets forth guidance to agencies on original and derivative classification, s fwngrading, declassification, and guarding of natroaal security information. EFFECTIVE DATI: August 1, 1982. FOR FURTHER INFORMATION CONTACT: Steven Garfinkel, Director, ISOO. Telephone: 20235-7251, SUPPLEMENTARY INFORMATION; Thie ? Duectrve is issued pursuant to the provisions of section 5.2(bj(1) of Executive Order 12358. The purpose of the Directive is to assist in Implementing the Order, users of the Directive shall refer concurrently to that Order for guidance. List of Subjects to 3Z CFR part 2001 Archives and records, Authority delegations, Classified information, Executive orders, Freedom of - informatron, Information, Intelligence, National defense. National security informatron, Presidential documents, Security information, Security measures, Title 32 of the Code of Federal Regulations, Part 2001, is revised to read as follows: PART 2001-NATIONAL SECURITY INFORMATION Subpart A--Orlplnal Clssalitcatbn sec. 2001.1 Qassificatlon levels. 2001.2 Clanificatlon authority. 2001.3 Classt$caUoa categories. 2001.4 Duratloa of classificatlon. 2001.5 Ideatlficatloa and markings. 2001.8 Limitatlons on claasificaUoa. Subpart 8-DerivatJw Glsasifkatlon 200120 Use of derivative classificatlon. 200121 Classificatlon guides. Sec. 2001.22 Derivatlve identificatloa and marklAgB. Subpart C-Deciagttkatlon and Oownprading 2001.30 Listing declassificatlon and 200131W S tam tic a view for declassificatlon. 2001.32 Mandatory review for declassification: 2001.33 Assistance to the Department of State. 2001.34 FOIA and privacy Act requests. Subpart D~Safeyuardinp 2001.40 General. 2001.41 Standards fQr security equipment. 2001.42 Accountability. 2001.43 Storage. 2001.44 Transmittal. 2001.45 Special access programs. 2001.48 Reproduction conh'ols. ? 2001.47 Loss or possible compromise. 2001.48 Disposition and destruction. 2001.49 Responsibilities of holders. 2001.50 Emergency planning. - 2001.51 Emergency authority. Subpart E-Implementation and Review 2001.80 Agency regulations. . 2001.81 Security education. 2001.82 Oversight Subpart F-General provisbns 2001.70 De$nitloas. 2001.71 Publication and effective date. Authority: Section 5.2(bj(1), E.0.12358.47 FR 14874, Aprll 8,1982. Subpart A-OriSlnal Ciasslflcatlon , level, fhe information shall be safeguarded at the higher level in ' accordance with Subpart D, pending the determinatron about its clasa~catron level. Upon the determination of its classification level, the information shall be marked as provided In_4 2001.5, ' ~ 2001.2 Classlflcatlon authority. (a) Requests for original classification authority~l.2 and 5.2(b)(SJJ. A request for original classifcatron authority pursuant to section 1.2 of Executive Order 12358 (hereinafter "the Order") shall Include a comple{e justification for the level of classification authority sought, a description of the information that will require original classification, and the anticipated frequency of original classification actions. (b) Listing classification authorities ~1.2J. Agencies shall maintain a current listing of officials delegated original clasaification~authority by name, position, or other identifier. If possible, this listing shall be unclassified. [c) Exceptional cases ~1.2(eJJ. Information described in sectron 1.2(e) of the Order shall be protected as provided in ? 2001.1(bj. 4 2001.3 CMsuBgUon categories. (a) Classification in context of related information ~1.3(b)J. Certain fnformatron which would otherwise be unclassified may require classification when combined or associ t d a e with other 42001.1 ClassincaUon levels, unclassified or classified information. (aJ Limitations ~1.1(b)J.r Markings Classification on this basis shall be other than 'Top Secret," "Secret," and supported by a written explanation that, "Confidential," aucli as "For Official Uae at a minimum, shall be maintained with Only" or "Limited Official Uae," shall the file or referenced on the record copy not be used to identify national security of the information. information. No other term or phrase ~) Unofficial publication or shall be used In conjunction with these Sisclosure j1.3(dJJ. Following an markings, such ae "Secret Sensitive" or Inadvertent or unauthorized publication "Agency Confidential," to Identify or disclosure of information identical or national security Information, The terms similar to information that has been 'Top Secret." "Secret," and classified in accordance with the Order "Confidentral" should not be u or predec d t se o essor orders, the agency of identify nonclassified executive branch Primary interest shall determine the Inf?rmatr?n. degree of damage to the natronal (b) Reasonable doubt ~i.i(c)J. (i) security, the need for continued When there is reasonable doubt about classification, and fa coordination with the need to classify information, the the agency in which the disclosure lnformatron shall be safeguarded as if it occun'ed. what action must be taken to were "Confidential" Information in prevent similar occurrences. accordance with Subpart D, pending the determination about its classifcation. 4 ~i'4 ~ ~~n of classltlcaUon. Upon the determination of a need for (a) Information not marked jor claeaifi~cation, the information that b declassifica6bn ~1.lJ. Information classified shall be marked 8, provided classified under predecessor orders that In 42001.5? is not subject to automatic (2) When there is reasonable doubt declassification shall remain classified about the appropriate classification until reviewed for declaeaIfication. 'Bracketed reteronces Pertain to esiated sections declosai'ficati n determinations I!4 b otExecugv. praer 12~ The authority to extend the j (11 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Federal Register / Val. 47. I11o. 123 / Friday. Mere 25, 1982 /Rules and Resulations dauification of information subject bo sutomatic dedasaification under predecessor orders Is limited to those officials who have dasalfication authority over the information and are designated in writing to have origins! dassifcation authority at the level of the ittfornration to rearaia dasaifed. Any dedsion to extend thin dassificatioa on other than a docnment- by-documeatbnsis shall be reported to the Director of the Information Security Oversight Office. . t2001~ Idsntificatloa and markiggs [ l.i(a), l.ti(p) and 1.6(c)l. ` A uniform information security system requires that standard markings be applied to national security information. Except in extraordinary circamstances as provided in section 1.5(a) of`the Order, or as kndicsted herein, the marking of paper documents created after the effective date of the Order shall not deviate from the following proscaibed formats. These markdngs aball also be affixed to material other than paperdocuments, or the originator shall provide holders ar re?pients of the information withwrittea instructions for protecting the information. (aj Classificotion level.'Ibe markings "Top Secret," "Secret," and "Confidential" an used to indicate: Zhat information requires protection as national security information under the Order, the highest level of dassification contained in a document; and the dassifcation level of each page and, in abbreviated form, each portion of a document (i) Overall markvtg The highest level of classification of information in a document shall be marked in such a way as to distinguish fi dearly from the informational text These markings shaII appear at the top and bottom of tbe outside of the front cover (if eery), on the title page (if any), on the first page, and on the outside of the back cover (if any). (2) Page marking. Each interior page of a classified document aball be marked at the top and bottom either according to the highest dassification of the content of the page. inducting the designation "Undassified" when it is applicable, or with the highest overall classification of the document (3) Portion marking. Agency heads may waive the portion marking requirement for specified classes of documents or information only upon a wr[tten determination that: (i) There will be minimal circulation of the spedfied documents or information and minimal potentiak usage of these documents or information as s sourcx for derivative classification determinations; ea' (ii) there is some other basis to condude that the poteaRial henefib ad portion marking are clearly outweighed by the increased administrative burdens. Udesa the portion marldug rsquiremeai has bees waived es authorized. each portion of a document, including sub)ects and titles, shall be marked by placing a parentheticaldesignation immediately preceding or following the text to which it applies. The symbob "('I'S)" for Top Secret, "(S)"for Secret, "(C)" for Confidential. sad "(U)" for Undassified shall be wed forthis - - putpose. If the application of parenthetical designations is not practicable, the document shall contafa a statement sufficient to identify the information that b classified and the level of such dauification, and the information that V not classified. If all portions of a document an dassffied at the same level, this fact may be indicated by a statement to that effect Tf a subf act or title requires dassification, as undassified iderrtifier may be applied to tadlitate reference... . . (b) Classification ovtlrority. If the original classifier L other than the signer or approver of the document, the identity shall be shown as follows: "CLASSIFIED 1tY {identification of original classification authority)" (c) Agency cud office o/ origin. if tbe identity of the originating agency and office is not apparent on the face of a document, it shall be placed below the "CI.ASSIFIID k3Y" line. 27837 (i) For an rmcJauified traaamittal document: "IJNCL.ASSiFIED WREN CLASSTFIED SNCLOS1lRE iB RElvtOVID" (ii) For a clawified t:+anamittal documen>r 'UPON RSi~/OVAL OP ATI'ACti1vlF.MIB TiR.S DOCUMENT IS (clusiiication Iwd of .the transmittal document standing aloner' (2) "Restricted Dam"need 'Formerly Restricted Dom"~elt(a)J. "Restricted Data" and'~+ormer'Ir Restricted Data" shall be marked in accaa'dance with regulations,issued under the Atomic Energy Act of itl5~l, as amended. (8) Intelligence soa~ea or methods ~1.5(c)J. Documents that contain information relating to iateiligeace sources or methods shat! iaelnde the following marking unless otherwise proscribed by the Director of Central Intelligence: "WARNING NOTI SOURC88ORM~hIODS WVOLVI'~" (4) Foreign government information (1.6(c)J. Docaments that cmntain foreign government information shall indude either the marlir4g'TOREIGN GOVERNMENT INFORMATION," or a marking that otherwise indicates that the information is foreign government information. Tf the fact that information b foreign government information must be conoeaked, the marking shall not be used~rrd the document shall be marked as if it were wholly of iJ.S. origin (d) Declaasiffcation and downgrading ~ (5) Computer output jLtc(c)J instructions. Declassification and, as Document that are generated as applicable, downgradinginstructions - compuler output maybe marked shall be shows as'follows: (1) For information to be dedassifed automatically on a specific date: "DBC[.ASSffY ON: (date)" . (2) For information to be decassifed automatically upon occurrence of a apezific evenL? _ "DECLASSIFY ON: (description of event)" (3j For information not to be declassified automatically: "DECLASSIFY ON: ORIGWATING AGENCY'S DEIERtvlIT1ATlON REQUIRED or'OADR' " (4) For information to be downgraded automatically on a spedfic date or upon occurrence of a specific event: "DOWNGRADE TO (classification level) ON (data or description of avant)" (e) Specialmarkings.--(i)Teansmittal documents ~I.s(cJ). A transmittal document a all indicate on ib face the highest dassificatlon of any Wormation transmitted by it It shall also indnde the following or similar instruction: automatically by rystems software. V automatic marking b not practicable. such documents must be marked manual>,-. (B) A,gencypr+escnbedmarkings f1.5(cj, !2(a~ and 6.3(c)f Officials delegated origins! dassi$cation authority by the k?r+esident may prescribe additional markings b control reproduction and dissemination. inducting markings required for special access programs authorized by section ~.2(a) of the Order. (f) Electrically transmitted information (messages) f1.5(cJJ. National security information that is transmitted electrically shall be marked as follows: (i) The highest level of classification aball appear before the first line of text; (2) A "CLASSIFIED l3Y" line is not required; (3) The duration of dasai_fication shall appear as follows: (i) For information to be dedassifed automatically on a specific date: Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Federal Register /Vol. 47, No. 123 / PY'Iday, juste 25, 1982 /Rules and Regulations (ii) For information to be declassified upon occurrence of a specific event: "DECL? (deacrlptioa of event)" (Iii) For Information not to be automatically declassified which requires the originating agency's determination (see also ~ 2001.5(d)(3)): "DECI: OADR" (Iv) For Information to be automatically downgraded: "DNG (abbreviation of clasai$cation level to which the information is to be downgraded and date or description of event on which downgrading to to occur)" (4) Portion marking shall be as prescribed in !( 2001.5(a)(3); (5) Special markings as prescribed in ~ 2001.5(e) (2), (3), and (4) shall appear after the marking for the highest level of classification. These include: (i) "Restricted Data" and "Formerly Restricted Data" shall be marked in accordance with regulations issued under the Atomic Energy Act of 1954, as amended; (ii) Information concerning intelligence sources or methods: "WNIIVTEI," unless proscribed by the Director of Central Intelligence; (lii) Foreign government information: "FGI," or a marking that otherwise Indicates that the information is foreIga government information..lf the fact that information is foreigtt government information must be concealed. the marking shall not be used and the - message shall be marked as if it were wholly of U.S. origin. (8) Paper copies of electrically transmitted messages shall be marked as provided in f 2t1111.5(a) (i) sad (2). (g) Changes ut classification marlcirtgs ~2.4(b) and !.i(b)J. When a change is made is the duration of classified information, all holders of record shall be promptly notified. If practicable, holders of record shall also be notified of a change in the level of classification. Holders shall alter the markings to conform to the change, dung the authority for it. U the remarking of large quantities of information fe unduly burdensome, the holder may attach a change of classi$cation notice to the storage unit in lieu of the marking action otherwise required. Items withdrawn from the collection fot purposes other than transfer for storage shall be marked promptly fa accordance with the change notice: 1# 2001.a LJrMtatlona on dasslticatton I1?a~l>? Before reclassifying information as provided in section 1.8(c) of the Order, the authorized offidal shall consider the following facton, which shall be addressed is the report to the Director of the Information Security Oversight Office: (a) The elapsed time following disclosure; (b) The nature and extent of disclosure; (c) The ability to bring the fact of reclassification to the attention of persons to whom the information was disclosed; (d) The ability to prevent further disclosure; and (e) The ability to retrieve the information voluntarily from persona not authorized access in its reclassified state. Subpart B-Derivative Classltldtion f 2001.20 lJae of d~rlvaWe taasaMcatbn [2.1L The application of derivative classification markings is a responsibility of those who incorporate. paraphrase. resters, or generate in new form information that is already . classified. and of those who apply markings in accordance with instructions from an authorized orIgiaaI classifier or in accordance with an authorized classification guide. If a person who applies derivative classification markings believes that the paraphrasing, restating, or summarizing of classified information has changed the level of or removed the basin for classification. that person must consult for a determination an appropriate offidal of the originating agency or office of origin who has the authority to upgrade, downgrade, or declassify the information. f 2001.21 e2asetncatlott ~utd.,. (a) General (2.2(a)J Classification guides shall, at a minimum: (i) Identify or categorize the elements of information to be protected; (2) State which classification level applies to each element or category of . information; and (3) Prescribe declassification Instructions for each element or category. of information to terms of (i) a period of time, (ti) the occurrence of an event, or (iii) a notation that the information shall not be declassi$ed ' automatically without the approval of the originating agency: (b) Requirement forreviewl~(aI1 Claaaificatioa guides shall be reviewed at leant every two years and tipdated as necessary. Bach agency shall maintain a list of 1U classification guides in current use. (c) Waiver:r ~2.2(c)j. An authorized offidal'a decision to waive the requirement to issue classification guides for spedfic classes of documents or information should be based, at a minimum, on an evaluation of the following factors: (i) The ability to segregate and describe the elements of information; (2) The practicality of producing or disseminating the guide because of the nature of the information; (3) T'he antidpated usage of the guide as a basis for derivative classification; and (4) The availability of alternative sources for derivatively classifying the information in a uniform manner. ? 2001.22 Mrtvawe identlttcatlon and markings (ts(e) and 2.1(b)]. Documents classified derivatively on ? the basin of source documents or classification guides shall bear all markings prescribed In ~ 2001,5(a) through (e) as are applicable. Information for these markings shall be taken from the source document or instructions to the appropriate classification guide. - (a) Classification authortity. The authority for classification shall be shown as follows: "CLASSIF'lED BY (description of source document or classi$catioa guide)" If a document is classified on the basis of more than one source document or classification guide, the authority for classification shall be shown as follows: "Ci.ASSIt'? HY MtA.TlpLE SOURCES" Tn these cases the derivative classifier shall maintain the identification of each source with the file or record copy of the derivatively classified document. A ?document derivatively classified on the basis of a source document that is marked "CLASSIFIED BY MULTIPLE SOURCES" shall die the source document in its "CLASSIFIED HY" line rather than the term "MULTIPLE SOURCES." (b) Declassification arrd downgrading instructions. Dates or events for automatic declaaaification or downgrading, or the notation "ORIGINATING AGENCY'S DETERIvlIr1ATION REQUIRED" to indicate that the document b not to be declassified automatically. shall be carried forward from the source document. or as directed by a classification guide, and shown on a "DECLASS>F7C ON" line as follows: "DECI.ASSIRY ON: (date; description of went; or'ORIGINATIIVG AGENCY'S DE'I'F.RivIINA1ION REQUIItED' (OADR))" Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Federal Register /Vol. 47, No. iZ3 /Friday, )ttne 25, 1982 /Rules and Regulations Subpart C--D~classiNcatlon and Down~ndln~ 20of.~0 tJstlnp dsctassHieatton and ~w~kw wmo~twa is-,roll ? Agendas shall maintain a current listing of offida4 delegated declassification or downgrading authority by name, position, or other identifier. If possible, this listing shall be unclassified. zootaf systematk rsvisw for dsedasslflcstbn lssl (a) Permanent reco~s. Systematic review is applicable only to those classified records and presidential, papers or records that the Archivist of the United States, acting under the Federal Records Act, has determined to be of suffident historical or other value to warrant permanent retention. (b) Non permanent records. Non- permanent classified records shall be disposed of in accordance with schedules approved by the Administrator of General Services under the Records Disposal Act. These schedules shall provide for the continued retention of records subject to an ongoing mandatory review for declassification request. (c) Responsibilities. (i) In meeting responsibilities assigned by section s.s(a) of the Order, the Archivist shall: (i) Establish procedures, is consultation with the Director of the Information Security Oversight Office, for the systematic declassification review of permanent dassified records accessioned into the National Arddves sad classified presidential papers or records under the Archivist's control; (ii) Condud systematic declassification reviews in accordance with guidelines provided by the head of the agency that originated the ~ ? information; or, with respect to goreiga government information, in accordance with guidelines provided by the head of the agency having declassification jurisdiction over the information, or, if no guidelines have been provided, in accordance with the general guidelines provided by the Director of the Information Security Oversight Office after coordination with the agencies having declassification authority over the information; or, with respect to presidential papers or records, in accordance with guidelines developed by;the'Archivist and approved by the National Security Council; (iii) Conduct systematic declassification reviews of accessioned records and presidential papers or records as they become 90 years old, except for file series concerning' intelligence activities (induding spedal activities). or intelligence sources or methods created after 1945, and information concerning cryptology crated after 1945; (iv) Conduct systematic declassification reviews of accessioned records and presidential papers or records in file series concerning intelligence activities [including spedal . activities). or intelligence sources or methods created after 1945 and cryptology records created after 1945 as they become fifty years old; (v) Establish systematic review priorities for accessioned records and presidential papers or records based on the degree of redearcher interest and the potential for declassifying a significant portion~of the information; (vi) Re-review for declassification accessioned records and presidential papers or records upon the determination that the followup review will be productive, both in terms of researcher interest and the potential for declassifying a significant portion of the information. (2) The ArchivLt may review for declassification. with the concurrence of the originating agency, accessioned records and presidential papers or records, prior to the timeframes established in paragraphs (c)(1) (iii) sad (iv) of this section. (3) Offidals delegated original classification authority by the President under the Order or predecessor orders shall: (i) Within six months of the effective date of the Order issue guidelines for systematic dedassification review and, if applicable, for downgrading. These guidelines shall be developed in consultation with the Archivist and the Director of the~Information Security Oversight Office and be designed to assist the Archivist in the conduct of systematic reviews; (ii) Designate experienced personnel to provide timely assistance to the Archivist in the systematic review process; (iii) Review and update guidelines for systematic declassification review and downgrading at least every five years unless earlier review is requested by the Archivist. (4) Within six months of the effective date of the Order the Director of the Information Security Oversight Office shall issue, in consultation with the Archivist and the agendas having declassification authority over the information, general guidelines for the systematic dedaesificetion review of foreign government information. Also within six months, agency heads may issue, in consultation with the Archivist and the Director of the Information 27839 Security Oversight Office. spedflc systematic dedassification review guidelines for foreign government information over which the agency bead has declassification authority. These guidelines shall be reviewed and updated every five yeah unless earlier review V requested by the Archivist. (d) Special procedures. All agency heads shall be bound by the epedal procedures for systematic review of classified cryptologic?recorde and classified records pertaining to intelligence activities (including special activities), or intelligence sources or methods issued by the Secretary of Defense and the Director of Central Intelligence, respectively. ~ ~Ot11.9~ Wndatory nvNw for dedassiflutlon [~]. ,(a) U.S. originated information. (i) , Each agency head shall publish in the Federal Register the identity of We person(s) or office(s) to which mandatory declassification review requests may be addressed. (2) Processing. (i) Requests for classified recot+da to the custody of the originating agency. A valid mandatory declassification review request need not identify the requested information by date or title of the responsive records, but must be of suffident particularity to allow agency personnel to locate the records containing the information sought with a reasonable amount of effort. Agency responses to mandatory declassification review requests shall be governed by the amount of search and review time required to process the request.-In responding to mandatory declassification review requests, agendas shall either make a prompt dedassification determination and notify the requester accordingly, or inform the requester of the additional time needed to process the request. Agendas shall make a final determination within one year from the date of receipt except in unusual dreumstances. When information cannot be dedassified in its entirety, agendas wiU make reasonable efforts to re3ease, consistent with other applicable law, those declassified portions of the requested information that constitute e coherent segment. Upon the denial of an initial request, the agency shall also notify the requester of the right of an administrative appeal, which must be filed within 80 days of receipt of the denial. (ii) Requests for classified records in the custody of an agency other than the origmatuRg agency. When an agency receives a mandatory dedassification review request for records in its Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 27840 Federal Register / VoL 47, No. 123 /Friday, June Z5, 1982 /Rules and Regulations posaeasion that wen originated by another agency. it shall forward the nqueat to that agency. The forwarding agency shall iadnde a copy of the records requested together with its recommendations for action. Upon receipt. the originating agency shall process the nqueat in accordance with 2001.32(a}(2)(i). Upon nqueat. the originating agency shall communicate ib dedasaification determination to the referring agency. (iii) Appeals of denials of mandatory declassificationreviewnequeats. The agency appellate authority-shall normally make a determination within 30 working days following the receipt of an appeal If additional time is nquiod to make a determination, the agency appellate authority shall notify the nqueater of the additional time needed and provide the requester with the reason far the extension. The agency appellate authority shall notify the nqueater in writing of the final determination and of the reason for any denial (b) Fot+eigrt $avernment information. Except as provided in this paragraph. agency heads shall process mandatory dedassification review requests for dassif[ed eecords oontaiaing foreign government information in accordance with ; 2001.32(a). The agency that initially received or dassified the foreign government Information shall be responeIble for making a dedaasification determination after consultation with concerned agendas. If the agency ncetving the ngaeat is not the agency that received or classified the foreign goveramaat Information. it shall refer the request to the appropriate ageacj for,actio~o. Consultation with the foreign originator through appropriate channels may be necessary prior to final action on the request. (c) Cryptologic and intelligence information. Mandatory dedaasificatioa review requests for cryptologic information and information concerning intelligence activities (induding apedal activities) or intelligence seurees or methods shall be processed solely is accordance with apedal proceduoa Issued by the Secretaq of Defense and - the Director of Central Intelligence. ____.. respectively. (d) Fees. Ia responding to mandatort dedetiaification review nests for dassi$ed records. agency heads may charge flea in accordance with section 483a of?title 31. UNted States Code. The achedales of fees published in the Federal Regiastar by agendas in implementation of Executive Order 12085 shall remain Ia effect untII they . are revised. !2001.31 Assistance to the Departnsant of state [1.3(b)1 Heads of agendea should assist the Department of State In its preparation of the Foreign Relotions of the United States (FRUS) series by fadlitating access to approprtate dasai$ed material in their custody and by expediting dedaasification oview of documents proposed for indusion in the FRUS. ~ 2001.34 t=OIA and Pris-ary Act requests [3.41 Agency heads shall process oquests for dedaasi$cation that are submitted under the provisions of the Preedom of Information Act, as amended or the Privacy Act of 1974, in accordance with the provisions of those Acta. Subpart D-Safeguarding ; 2oot.4o General [4.t1 Information dassified pursuant to this Order ar pndecesaor orders shall be afforded a level of protection against unauthorized disdosure commensurate with its level of dasai$cation. For information in apedal access programs established Hader the provisions of section 4.2 of the Order, the safeguarding requirements of Subpart D may be modified by the agency head responsible for coating the apedal access program as tong as the modified requloments provide appropriate protection for the Information. it 2001.41 standards for security ?~~ I4.,tb~ and t~troll Tha AdmIniatrator of General Services shag in coordination with agendea originating dasaified information, establish and publish uniform standards. spedfications, and supply schedules for security equipment designed to provide secuo storage for and to destroy dasai$ed information. - My agency may establish more stringent standards for its own sae. Whenever new security equipment Is procured it shall be in conformance with the standards and specifications nferod to above and ahaU. to the maximum extent pocticable, be of the type available through the Federal Sapply System. - ; 200f.42_AccountabilHy (4.t(b)1 . - (a) Top Secrot Top Secret control officials shall be designated to receive. transmit. and maintain current access and accountability records for Top Secret information. M inventory of Top Secret documents shall be made et least annually. Agency heads may wain a the requirement for an annual Inventory of storage systems containing large vdumes of Top Secret information aeon a determination that the safeguarding of this information is sot jeopardized by the inventory waiver. Waivers shall be in writing and be available for review by the Information Security Oversight Office. (b) Secret and Confidential. Agency heads shall prescribe accountability or control requioments for Secret and Confidential information. f 200,.43 Storage [4.tN)1 Claasi$ed information shall be stored only in facilities or under conditions designed to prevent unauthorized persona from gaining access to it. (a) Minimum requirements for physical barriers. (1) Top Secret Top Secret information shall be stored in a GSA-approved security container with an approved, built-in, three-position, dial-type changeable combination lodr, in a vault protected by an alarm system and response force; or in other types of storage fadlitiea that meet the standards for Top Secret eatabliahed under the provisions of ;2001.41. In addition. heads of agencies shall prescribe those supplementary controls deemed necessary to restrict unauthorized access to aoaa In which such information is etond. (2) Secret and Confidential. Secret and Confidential Information shall be stood in a manner and under the conditions pnscrIbed for Top Secret information. of in a container, vault. or alarmed area that meets the ?tandarda for Secret or Confdential information established under the provisions of 2001.41. Secret and Confidential information may aLo be stood in a safe-type filing cabinet having abuilt- in. rhos-position. dial-type changeable combination lode, or a steel filing cabinet equipped with a steel lock bar secured by aGSA-approved three- position changeable combination padlock. Heads of agendas shall poacribe supplementary controls for storage of Secret information in cabinets equipped with a steel lock bar. Access to bulky Secret and Confidential material in weapons storage areas. strong rooms, dosed aoaa or similar fadlities shall be controlled in accordance with oquioments eetabliahed by the appropriate agency - head At a minimum. such requirements shall prescribe the use of key-operated. high-security padlodu approved by the General Services Adminiatretion. (b) Combinations. (1) Equipment in service. Combinations to dial-type lode shall be changed ody by persona having an appropriate security dearance, and shall be changed whenever such equipment 1a placed in use; whenever a person knowing the combination no Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1 Fadatral Rester / YoL 47. No. 123 /Friday. jime ?5.1982 / ~ Rules and Regulations longer requires access to it; whenever a combination has been subjected to possible compromise; whenever the equipmentL taken out of service; or at leant ontx every year. Knowledge of combinations shall be limited to the minimum number of persons necessary for operating purposes. Records of combinations shall be classified ao lower than the highest level of dassified information that is protected by the lock. (2) Bquipmerrt out of service. When security equipment V taken out of service it shall be inspected to ensure that no classified information remains, and thebuilt-ia combination lock shall be reset to the standard combination b0- 25-50. Combination padloclu shall be reset to the standard combination it} 20-90. (c) Keys. Heads of agendas shall establish administrative procedures for the control and accountability of keys and locks whenever key-operated, high- security padlocks are utilized. The level of protection provided such keys shall be equivalent to that afforded the classified information being protected by the padlock. !f 2001.44 Transmittal I4.,ro)1 (a) Pnepamtion and t+eceiptueg. Classified information to be transmitted outside of a fadlity shall be enclosed is opaque inner and outer covers. The inner cover shall be a sealed wrapper or envelope plainly marked with the assigned daasification and addresses of both sender and addressee. The outer cover shall be sealed and addressed with no identification of the dassfficaton of its contents. A receipt shall be attached to or enclosed in the inner cover, except that Confidential information shall require a receipt only if the sender deems it necessary. The receipt shall identify the sender, the addressee, and the document, but shall contain no classified information. It shall be immediately signed by the redpient and returned to the sender. Any of these wrapping and receipting requirements may be waived by agency heads if conditions provide at least equivalent protection to prevent access by unauthorized persona. (b) Transmittal of Top Secret The transmittal of Top Secret information outside of n facility shall be by specifically designated personnel, by State Department diplomatic pouch, by 8 messenger-courier system authorized for the purpose, or over authorized secure communications circuits. (c) Transmittal of Secret The transmittal of Secret information shall be effected in the following manner: (i) The 50 States, the Districtbf Columbia, and Puerto Rico. Secret information may be transmitted within and between the 60 States, the Dbtrlct of Cohrmbia, and the Commonwealth of Puerto Rico by one of the mesas authorised for Top Secret information, by the U.S. Postal Service registered mail. or by protective services provided by U.S. air or surface commercial carriers ender such conditions as may be prescribed by the head of the agency _ coacemed. (2) Other areeas. Secret information may be transmitted from, to. or within areas other than those spedfied is 2001.44(c)(i) by one of the means established for Top Secret information. or by U.S. registered mail through Military Postal Service fadlities provided that the information does not at any time pass out of U.S. dtizen control and does not pans through a foreign postal system. Transmittal outside such areas may also be accomplished under escort of appropriately cleared personnel aboard U.S. Government end U.S. Government contract vehidee or aircraft. ships of the United States Navy, dvil service manned U.S. Naval ships. and ships of U.S. registry. Operators of vehidea, captains or masters of vessel, and pilots of aircraft who are U.S.~dtizeas and who are appropriately cleared may be designated ae escorts. (d) Transmittal of Confidential. Oonfidential information shall be transmitted within and between the 50 States, the District of Columbia, the Commonwealth of Puerto Rico, and U.S. territories or possessions by one of the means established for higher dasaifications, or by the U.S. Postal Service certified, first dean, or express mail service when prescribed by an agency head. Outside these areas, Confidential information shall be transmitted only as is authorized for higher dassificationa. (e) Hand carrying of classified information. Agency regulations shall prescribe procedures and appropriate restrictions concerning the escort or hand carrying of dassified information, induding the hand carrying of dasaeified information on commercial canters. _ ~ 2001.45 Spacial access programs [ 1.2ta) and 4.2(a)L Agency heads designated pursuant to section 1.2(a) of the Order may create or continue a spedal access program if: (a) Normal management and safeguarding procedures do not limit access suffidently; and (b) t)ie bomber of persons with access iR limited to the minimum necessary to meet the objective of providing extra protection for the information. 27841 ! s