PART VIII INFORMATION SECURITY OVERSIGHT OFFICE
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP89B01330R000400610006-1
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 22, 2016
Document Release Date:
August 16, 2011
Sequence Number:
6
Case Number:
Publication Date:
June 25, 1982
Content Type:
MISC
File:
Attachment | Size |
---|---|
CIA-RDP89B01330R000400610006-1.pdf | 857.45 KB |
Body:
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Friday
June 25, 1982
Part VIII
Information Security
Oversight Office
Nat~onat Security Information
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Federal Register /Vol. 47, No. 123 /Friday, June 25, 1982 /Rules and Regulations
INFORMATION SECURITY OVERSIGHT
OFFICE
32 CFR Part 2001
[Directhre No. 1]
National Security Information
AOENCY: Information Security Oversight
Office (ISOO).
ACTION: Implementing Directive; final
rule.
SUMMARY: The Information Security
Oversight Office is publishing this
Directive (final rule) pursuant to section
5.2(b)(1) of Executrve Order 12358,
relating to natronal security information.
The National Security Council approved
this Directive on June 22,1982. The
Executive order prescribes a uniform
information security system; it also
establishes a monitoring system to
enhance its effectiveness. This Directive
sets forth guidance to agencies on
original and derivative classification,
s fwngrading, declassification, and
guarding of natroaal security
information.
EFFECTIVE DATI: August 1, 1982.
FOR FURTHER INFORMATION CONTACT:
Steven Garfinkel, Director, ISOO.
Telephone: 20235-7251,
SUPPLEMENTARY INFORMATION; Thie ?
Duectrve is issued pursuant to the
provisions of section 5.2(bj(1) of
Executive Order 12358. The purpose of
the Directive is to assist in Implementing
the Order, users of the Directive shall
refer concurrently to that Order for
guidance.
List of Subjects to 3Z CFR part 2001
Archives and records, Authority
delegations, Classified information,
Executive orders, Freedom of -
informatron, Information, Intelligence,
National defense. National security
informatron, Presidential documents,
Security information, Security measures,
Title 32 of the Code of Federal
Regulations, Part 2001, is revised to read
as follows:
PART 2001-NATIONAL SECURITY
INFORMATION
Subpart A--Orlplnal Clssalitcatbn
sec.
2001.1 Qassificatlon levels.
2001.2 Clanificatlon authority.
2001.3 Classt$caUoa categories.
2001.4 Duratloa of classificatlon.
2001.5 Ideatlficatloa and markings.
2001.8 Limitatlons on claasificaUoa.
Subpart 8-DerivatJw Glsasifkatlon
200120 Use of derivative classificatlon.
200121 Classificatlon guides.
Sec.
2001.22 Derivatlve identificatloa and
marklAgB.
Subpart C-Deciagttkatlon and
Oownprading
2001.30 Listing declassificatlon and
200131W S tam tic a view for
declassificatlon.
2001.32 Mandatory review for
declassification:
2001.33 Assistance to the Department of
State.
2001.34 FOIA and privacy Act requests.
Subpart D~Safeyuardinp
2001.40 General.
2001.41 Standards fQr security equipment.
2001.42 Accountability.
2001.43 Storage.
2001.44 Transmittal.
2001.45 Special access programs.
2001.48 Reproduction conh'ols. ?
2001.47 Loss or possible compromise.
2001.48 Disposition and destruction.
2001.49 Responsibilities of holders.
2001.50 Emergency planning. -
2001.51 Emergency authority.
Subpart E-Implementation and Review
2001.80 Agency regulations. .
2001.81 Security education.
2001.82 Oversight
Subpart F-General provisbns
2001.70 De$nitloas.
2001.71 Publication and effective date.
Authority: Section 5.2(bj(1), E.0.12358.47
FR 14874, Aprll 8,1982.
Subpart A-OriSlnal Ciasslflcatlon ,
level, fhe information shall be
safeguarded at the higher level in '
accordance with Subpart D, pending the
determinatron about its clasa~catron
level. Upon the determination of its
classification level, the information shall
be marked as provided In_4 2001.5, '
~ 2001.2 Classlflcatlon authority.
(a) Requests for original classification
authority~l.2 and 5.2(b)(SJJ. A request
for original classifcatron authority
pursuant to section 1.2 of Executive
Order 12358 (hereinafter "the Order")
shall Include a comple{e justification for
the level of classification authority
sought, a description of the information
that will require original classification,
and the anticipated frequency of original
classification actions.
(b) Listing classification authorities
~1.2J. Agencies shall maintain a current
listing of officials delegated original
clasaification~authority by name,
position, or other identifier. If possible,
this listing shall be unclassified.
[c) Exceptional cases ~1.2(eJJ.
Information described in sectron 1.2(e)
of the Order shall be protected as
provided in ? 2001.1(bj.
4 2001.3 CMsuBgUon categories.
(a) Classification in context of related
information ~1.3(b)J. Certain fnformatron
which would otherwise be unclassified
may require classification when
combined or associ
t
d
a
e
with other
42001.1 ClassincaUon levels, unclassified or classified information.
(aJ Limitations ~1.1(b)J.r Markings Classification on this basis shall be
other than 'Top Secret," "Secret," and supported by a written explanation that,
"Confidential," aucli as "For Official Uae at a minimum, shall be maintained with
Only" or "Limited Official Uae," shall the file or referenced on the record copy
not be used to identify national security of the information.
information. No other term or phrase ~) Unofficial publication or
shall be used In conjunction with these Sisclosure j1.3(dJJ. Following an
markings, such ae "Secret Sensitive" or Inadvertent or unauthorized publication
"Agency Confidential," to Identify or disclosure of information identical or
national security Information, The terms similar to information that has been
'Top Secret." "Secret," and classified in accordance with the Order
"Confidentral" should not be u
or predec
d t
se
o
essor orders, the agency of
identify nonclassified executive branch Primary interest shall determine the
Inf?rmatr?n. degree of damage to the natronal
(b) Reasonable doubt ~i.i(c)J. (i) security, the need for continued
When there is reasonable doubt about classification, and fa coordination with
the need to classify information, the the agency in which the disclosure
lnformatron shall be safeguarded as if it occun'ed. what action must be taken to
were "Confidential" Information in prevent similar occurrences.
accordance with Subpart D, pending the
determination about its classifcation. 4 ~i'4 ~ ~~n of classltlcaUon.
Upon the determination of a need for (a) Information not marked jor
claeaifi~cation, the information that b declassifica6bn ~1.lJ. Information
classified shall be marked 8, provided classified under predecessor orders that
In 42001.5? is not subject to automatic
(2) When there is reasonable doubt declassification shall remain classified
about the appropriate classification until reviewed for declaeaIfication.
'Bracketed reteronces Pertain to esiated sections declosai'ficati n determinations I!4 b
otExecugv. praer 12~ The authority to extend the j (11
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Federal Register / Val. 47. I11o. 123 / Friday. Mere 25, 1982 /Rules and Resulations
dauification of information subject bo
sutomatic dedasaification under
predecessor orders Is limited to those
officials who have dasalfication
authority over the information and are
designated in writing to have origins!
dassifcation authority at the level of
the ittfornration to rearaia dasaifed.
Any dedsion to extend thin
dassificatioa on other than a docnment-
by-documeatbnsis shall be reported to
the Director of the Information Security
Oversight Office. .
t2001~ Idsntificatloa and markiggs
[ l.i(a), l.ti(p) and 1.6(c)l. `
A uniform information security system
requires that standard markings be
applied to national security information.
Except in extraordinary circamstances
as provided in section 1.5(a) of`the
Order, or as kndicsted herein, the
marking of paper documents created
after the effective date of the Order
shall not deviate from the following
proscaibed formats. These markdngs
aball also be affixed to material other
than paperdocuments, or the originator
shall provide holders ar re?pients of the
information withwrittea instructions for
protecting the information.
(aj Classificotion level.'Ibe markings
"Top Secret," "Secret," and
"Confidential" an used to indicate: Zhat
information requires protection as
national security information under the
Order, the highest level of dassification
contained in a document; and the
dassifcation level of each page and, in
abbreviated form, each portion of a
document
(i) Overall markvtg The highest level
of classification of information in a
document shall be marked in such a
way as to distinguish fi dearly from the
informational text These markings shaII
appear at the top and bottom of tbe
outside of the front cover (if eery), on the
title page (if any), on the first page, and
on the outside of the back cover (if any).
(2) Page marking. Each interior page
of a classified document aball be
marked at the top and bottom either
according to the highest dassification of
the content of the page. inducting the
designation "Undassified" when it is
applicable, or with the highest overall
classification of the document
(3) Portion marking. Agency heads
may waive the portion marking
requirement for specified classes of
documents or information only upon a
wr[tten determination that: (i) There will
be minimal circulation of the spedfied
documents or information and minimal
potentiak usage of these documents or
information as s sourcx for derivative
classification determinations; ea' (ii)
there is some other basis to condude
that the poteaRial henefib ad portion
marking are clearly outweighed by the
increased administrative burdens.
Udesa the portion marldug rsquiremeai
has bees waived es authorized. each
portion of a document, including
sub)ects and titles, shall be marked by
placing a parentheticaldesignation
immediately preceding or following the
text to which it applies. The symbob
"('I'S)" for Top Secret, "(S)"for Secret,
"(C)" for Confidential. sad "(U)" for
Undassified shall be wed forthis - -
putpose. If the application of
parenthetical designations is not
practicable, the document shall contafa
a statement sufficient to identify the
information that b classified and the
level of such dauification, and the
information that V not classified. If all
portions of a document an dassffied at
the same level, this fact may be
indicated by a statement to that effect Tf
a subf act or title requires dassification,
as undassified iderrtifier may be applied
to tadlitate reference... . .
(b) Classification ovtlrority. If the
original classifier L other than the
signer or approver of the document, the
identity shall be shown as follows:
"CLASSIFIED 1tY {identification of original
classification authority)"
(c) Agency cud office o/ origin. if tbe
identity of the originating agency and
office is not apparent on the face of a
document, it shall be placed below the
"CI.ASSIFIID k3Y" line.
27837
(i) For an rmcJauified traaamittal
document:
"IJNCL.ASSiFIED WREN CLASSTFIED
SNCLOS1lRE iB RElvtOVID"
(ii) For a clawified t:+anamittal
documen>r
'UPON RSi~/OVAL OP ATI'ACti1vlF.MIB
TiR.S DOCUMENT IS (clusiiication Iwd of
.the transmittal document standing aloner'
(2) "Restricted Dam"need 'Formerly
Restricted Dom"~elt(a)J. "Restricted
Data" and'~+ormer'Ir Restricted Data"
shall be marked in accaa'dance with
regulations,issued under the Atomic
Energy Act of itl5~l, as amended.
(8) Intelligence soa~ea or methods
~1.5(c)J. Documents that contain
information relating to iateiligeace
sources or methods shat! iaelnde the
following marking unless otherwise
proscribed by the Director of Central
Intelligence:
"WARNING NOTI
SOURC88ORM~hIODS WVOLVI'~"
(4) Foreign government information
(1.6(c)J. Docaments that cmntain foreign
government information shall indude
either the marlir4g'TOREIGN
GOVERNMENT INFORMATION," or a
marking that otherwise indicates that
the information is foreign government
information. Tf the fact that information
b foreign government information must
be conoeaked, the marking shall not be
used~rrd the document shall be marked
as if it were wholly of iJ.S. origin
(d) Declaasiffcation and downgrading ~ (5) Computer output jLtc(c)J
instructions. Declassification and, as Document that are generated as
applicable, downgradinginstructions - compuler output maybe marked
shall be shows as'follows:
(1) For information to be dedassifed
automatically on a specific date:
"DBC[.ASSffY ON: (date)" .
(2) For information to be decassifed
automatically upon occurrence of a
apezific evenL? _
"DECLASSIFY ON: (description of event)"
(3j For information not to be
declassified automatically:
"DECLASSIFY ON: ORIGWATING
AGENCY'S DEIERtvlIT1ATlON REQUIRED
or'OADR' "
(4) For information to be downgraded
automatically on a spedfic date or upon
occurrence of a specific event:
"DOWNGRADE TO (classification level)
ON (data or description of avant)"
(e) Specialmarkings.--(i)Teansmittal
documents ~I.s(cJ). A transmittal
document a all indicate on ib face the
highest dassificatlon of any Wormation
transmitted by it It shall also indnde
the following or similar instruction:
automatically by rystems software. V
automatic marking b not practicable.
such documents must be marked
manual>,-.
(B) A,gencypr+escnbedmarkings
f1.5(cj, !2(a~ and 6.3(c)f Officials
delegated origins! dassi$cation
authority by the k?r+esident may prescribe
additional markings b control
reproduction and dissemination.
inducting markings required for special
access programs authorized by section
~.2(a) of the Order.
(f) Electrically transmitted
information (messages) f1.5(cJJ. National
security information that is transmitted
electrically shall be marked as follows:
(i) The highest level of classification
aball appear before the first line of text;
(2) A "CLASSIFIED l3Y" line is not
required;
(3) The duration of dasai_fication shall
appear as follows:
(i) For information to be dedassifed
automatically on a specific date:
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Federal Register /Vol. 47, No. 123 / PY'Iday, juste 25, 1982 /Rules and Regulations
(ii) For information to be declassified
upon occurrence of a specific event:
"DECL? (deacrlptioa of event)"
(Iii) For Information not to be
automatically declassified which
requires the originating agency's
determination (see also ~ 2001.5(d)(3)):
"DECI: OADR"
(Iv) For Information to be
automatically downgraded:
"DNG (abbreviation of clasai$cation level
to which the information is to be downgraded
and date or description of event on which
downgrading to to occur)"
(4) Portion marking shall be as
prescribed in !( 2001.5(a)(3);
(5) Special markings as prescribed in
~ 2001.5(e) (2), (3), and (4) shall appear
after the marking for the highest level of
classification. These include:
(i) "Restricted Data" and "Formerly
Restricted Data" shall be marked in
accordance with regulations issued
under the Atomic Energy Act of 1954, as
amended;
(ii) Information concerning
intelligence sources or methods:
"WNIIVTEI," unless proscribed by the
Director of Central Intelligence;
(lii) Foreign government information:
"FGI," or a marking that otherwise
Indicates that the information is foreIga
government information..lf the fact that
information is foreigtt government
information must be concealed. the
marking shall not be used and the -
message shall be marked as if it were
wholly of U.S. origin.
(8) Paper copies of electrically
transmitted messages shall be marked
as provided in f 2t1111.5(a) (i) sad (2).
(g) Changes ut classification marlcirtgs
~2.4(b) and !.i(b)J. When a change is
made is the duration of classified
information, all holders of record shall
be promptly notified. If practicable,
holders of record shall also be notified
of a change in the level of classification.
Holders shall alter the markings to
conform to the change, dung the
authority for it. U the remarking of large
quantities of information fe unduly
burdensome, the holder may attach a
change of classi$cation notice to the
storage unit in lieu of the marking action
otherwise required. Items withdrawn
from the collection fot purposes other
than transfer for storage shall be
marked promptly fa accordance with the
change notice:
1# 2001.a LJrMtatlona on dasslticatton
I1?a~l>?
Before reclassifying information as
provided in section 1.8(c) of the Order,
the authorized offidal shall consider the
following facton, which shall be
addressed is the report to the Director of
the Information Security Oversight
Office:
(a) The elapsed time following
disclosure;
(b) The nature and extent of
disclosure;
(c) The ability to bring the fact of
reclassification to the attention of
persons to whom the information was
disclosed;
(d) The ability to prevent further
disclosure; and
(e) The ability to retrieve the
information voluntarily from persona not
authorized access in its reclassified
state.
Subpart B-Derivative Classltldtion
f 2001.20 lJae of d~rlvaWe taasaMcatbn
[2.1L
The application of derivative
classification markings is a
responsibility of those who incorporate.
paraphrase. resters, or generate in new
form information that is already .
classified. and of those who apply
markings in accordance with
instructions from an authorized orIgiaaI
classifier or in accordance with an
authorized classification guide. If a
person who applies derivative
classification markings believes that the
paraphrasing, restating, or summarizing
of classified information has changed
the level of or removed the basin for
classification. that person must consult
for a determination an appropriate
offidal of the originating agency or
office of origin who has the authority to
upgrade, downgrade, or declassify the
information.
f 2001.21 e2asetncatlott ~utd.,.
(a) General (2.2(a)J Classification
guides shall, at a minimum:
(i) Identify or categorize the elements
of information to be protected;
(2) State which classification level
applies to each element or category of .
information; and
(3) Prescribe declassification
Instructions for each element or
category. of information to terms of (i) a
period of time, (ti) the occurrence of an
event, or (iii) a notation that the
information shall not be declassi$ed '
automatically without the approval of
the originating agency:
(b) Requirement forreviewl~(aI1
Claaaificatioa guides shall be reviewed
at leant every two years and tipdated as
necessary. Bach agency shall
maintain a list of 1U classification
guides in current use.
(c) Waiver:r ~2.2(c)j. An authorized
offidal'a decision to waive the
requirement to issue classification
guides for spedfic classes of documents
or information should be based, at a
minimum, on an evaluation of the
following factors:
(i) The ability to segregate and
describe the elements of information;
(2) The practicality of producing or
disseminating the guide because of the
nature of the information;
(3) T'he antidpated usage of the guide
as a basis for derivative classification;
and
(4) The availability of alternative
sources for derivatively classifying the
information in a uniform manner.
? 2001.22 Mrtvawe identlttcatlon and
markings (ts(e) and 2.1(b)].
Documents classified derivatively on
? the basin of source documents or
classification guides shall bear all
markings prescribed In ~ 2001,5(a)
through (e) as are applicable.
Information for these markings shall be
taken from the source document or
instructions to the appropriate
classification guide. -
(a) Classification authortity. The
authority for classification shall be
shown as follows:
"CLASSIF'lED BY (description of source
document or classi$catioa guide)"
If a document is classified on the basis
of more than one source document or
classification guide, the authority for
classification shall be shown as follows:
"Ci.ASSIt'? HY MtA.TlpLE SOURCES"
Tn these cases the derivative classifier
shall maintain the identification of each
source with the file or record copy of the
derivatively classified document. A
?document derivatively classified on the
basis of a source document that is
marked "CLASSIFIED BY MULTIPLE
SOURCES" shall die the source
document in its "CLASSIFIED HY" line
rather than the term "MULTIPLE
SOURCES."
(b) Declassification arrd downgrading
instructions. Dates or events for
automatic declaaaification or
downgrading, or the notation
"ORIGINATING AGENCY'S
DETERIvlIr1ATION REQUIRED" to
indicate that the document b not to be
declassified automatically. shall be
carried forward from the source
document. or as directed by a
classification guide, and shown on a
"DECLASS>F7C ON" line as follows:
"DECI.ASSIRY ON: (date; description of
went; or'ORIGINATIIVG AGENCY'S
DE'I'F.RivIINA1ION REQUIItED' (OADR))"
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Federal Register /Vol. 47, No. iZ3 /Friday, )ttne 25, 1982 /Rules and Regulations
Subpart C--D~classiNcatlon and
Down~ndln~
20of.~0 tJstlnp dsctassHieatton and
~w~kw wmo~twa is-,roll
? Agendas shall maintain a current
listing of offida4 delegated
declassification or downgrading
authority by name, position, or other
identifier. If possible, this listing shall be
unclassified.
zootaf systematk rsvisw for
dsedasslflcstbn lssl
(a) Permanent reco~s. Systematic
review is applicable only to those
classified records and presidential,
papers or records that the Archivist of
the United States, acting under the
Federal Records Act, has determined to
be of suffident historical or other value
to warrant permanent retention.
(b) Non permanent records. Non-
permanent classified records shall be
disposed of in accordance with
schedules approved by the
Administrator of General Services under
the Records Disposal Act. These
schedules shall provide for the
continued retention of records subject to
an ongoing mandatory review for
declassification request.
(c) Responsibilities. (i) In meeting
responsibilities assigned by section
s.s(a) of the Order, the Archivist shall:
(i) Establish procedures, is
consultation with the Director of the
Information Security Oversight Office,
for the systematic declassification
review of permanent dassified records
accessioned into the National Arddves
sad classified presidential papers or
records under the Archivist's control;
(ii) Condud systematic
declassification reviews in accordance
with guidelines provided by the head of
the agency that originated the ~ ?
information; or, with respect to goreiga
government information, in accordance
with guidelines provided by the head of
the agency having declassification
jurisdiction over the information, or, if
no guidelines have been provided, in
accordance with the general guidelines
provided by the Director of the
Information Security Oversight Office
after coordination with the agencies
having declassification authority over
the information; or, with respect to
presidential papers or records, in
accordance with guidelines developed
by;the'Archivist and approved by the
National Security Council;
(iii) Conduct systematic
declassification reviews of accessioned
records and presidential papers or
records as they become 90 years old,
except for file series concerning'
intelligence activities (induding spedal
activities). or intelligence sources or
methods created after 1945, and
information concerning cryptology
crated after 1945;
(iv) Conduct systematic
declassification reviews of accessioned
records and presidential papers or
records in file series concerning
intelligence activities [including spedal .
activities). or intelligence sources or
methods created after 1945 and
cryptology records created after 1945 as
they become fifty years old;
(v) Establish systematic review
priorities for accessioned records and
presidential papers or records based on
the degree of redearcher interest and the
potential for declassifying a significant
portion~of the information;
(vi) Re-review for declassification
accessioned records and presidential
papers or records upon the
determination that the followup review
will be productive, both in terms of
researcher interest and the potential for
declassifying a significant portion of the
information.
(2) The ArchivLt may review for
declassification. with the concurrence of
the originating agency, accessioned
records and presidential papers or
records, prior to the timeframes
established in paragraphs (c)(1) (iii) sad
(iv) of this section.
(3) Offidals delegated original
classification authority by the President
under the Order or predecessor orders
shall:
(i) Within six months of the effective
date of the Order issue guidelines for
systematic dedassification review and,
if applicable, for downgrading. These
guidelines shall be developed in
consultation with the Archivist and the
Director of the~Information Security
Oversight Office and be designed to
assist the Archivist in the conduct of
systematic reviews;
(ii) Designate experienced personnel
to provide timely assistance to the
Archivist in the systematic review
process;
(iii) Review and update guidelines for
systematic declassification review and
downgrading at least every five years
unless earlier review is requested by the
Archivist.
(4) Within six months of the effective
date of the Order the Director of the
Information Security Oversight Office
shall issue, in consultation with the
Archivist and the agendas having
declassification authority over the
information, general guidelines for the
systematic dedaesificetion review of
foreign government information. Also
within six months, agency heads may
issue, in consultation with the Archivist
and the Director of the Information
27839
Security Oversight Office. spedflc
systematic dedassification review
guidelines for foreign government
information over which the agency bead
has declassification authority. These
guidelines shall be reviewed and
updated every five yeah unless earlier
review V requested by the Archivist.
(d) Special procedures. All agency
heads shall be bound by the epedal
procedures for systematic review of
classified cryptologic?recorde and
classified records pertaining to
intelligence activities (including special
activities), or intelligence sources or
methods issued by the Secretary of
Defense and the Director of Central
Intelligence, respectively.
~ ~Ot11.9~ Wndatory nvNw for
dedassiflutlon [~].
,(a) U.S. originated information. (i) ,
Each agency head shall publish in the
Federal Register the identity of We
person(s) or office(s) to which
mandatory declassification review
requests may be addressed.
(2) Processing. (i) Requests for
classified recot+da to the custody of the
originating agency. A valid mandatory
declassification review request need not
identify the requested information by
date or title of the responsive records,
but must be of suffident particularity to
allow agency personnel to locate the
records containing the information
sought with a reasonable amount of
effort. Agency responses to mandatory
declassification review requests shall be
governed by the amount of search and
review time required to process the
request.-In responding to mandatory
declassification review requests,
agendas shall either make a prompt
dedassification determination and
notify the requester accordingly, or
inform the requester of the additional
time needed to process the request.
Agendas shall make a final
determination within one year from the
date of receipt except in unusual
dreumstances. When information
cannot be dedassified in its entirety,
agendas wiU make reasonable efforts to
re3ease, consistent with other applicable
law, those declassified portions of the
requested information that constitute e
coherent segment. Upon the denial of an
initial request, the agency shall also
notify the requester of the right of an
administrative appeal, which must be
filed within 80 days of receipt of the
denial.
(ii) Requests for classified records in
the custody of an agency other than the
origmatuRg agency. When an agency
receives a mandatory dedassification
review request for records in its
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
27840
Federal Register / VoL 47, No. 123 /Friday, June Z5, 1982 /Rules and Regulations
posaeasion that wen originated by
another agency. it shall forward the
nqueat to that agency. The forwarding
agency shall iadnde a copy of the
records requested together with its
recommendations for action. Upon
receipt. the originating agency shall
process the nqueat in accordance with
2001.32(a}(2)(i). Upon nqueat. the
originating agency shall communicate ib
dedasaification determination to the
referring agency.
(iii) Appeals of denials of mandatory
declassificationreviewnequeats. The
agency appellate authority-shall
normally make a determination within
30 working days following the receipt of
an appeal If additional time is nquiod
to make a determination, the agency
appellate authority shall notify the
nqueater of the additional time needed
and provide the requester with the
reason far the extension. The agency
appellate authority shall notify the
nqueater in writing of the final
determination and of the reason for any
denial
(b) Fot+eigrt $avernment information.
Except as provided in this paragraph.
agency heads shall process mandatory
dedassification review requests for
dassif[ed eecords oontaiaing foreign
government information in accordance
with ; 2001.32(a). The agency that
initially received or dassified the
foreign government Information shall be
responeIble for making a
dedaasification determination after
consultation with concerned agendas. If
the agency ncetving the ngaeat is not
the agency that received or classified
the foreign goveramaat Information. it
shall refer the request to the appropriate
ageacj for,actio~o. Consultation with the
foreign originator through appropriate
channels may be necessary prior to final
action on the request.
(c) Cryptologic and intelligence
information. Mandatory dedaasificatioa
review requests for cryptologic
information and information concerning
intelligence activities (induding apedal
activities) or intelligence seurees or
methods shall be processed solely is
accordance with apedal proceduoa
Issued by the Secretaq of Defense and -
the Director of Central Intelligence. ____..
respectively.
(d) Fees. Ia responding to mandatort
dedetiaification review nests for
dassi$ed records. agency heads may
charge flea in accordance with section
483a of?title 31. UNted States Code. The
achedales of fees published in the
Federal Regiastar by agendas in
implementation of Executive Order
12085 shall remain Ia effect untII they .
are revised.
!2001.31 Assistance to the Departnsant of
state [1.3(b)1
Heads of agendea should assist the
Department of State In its preparation of
the Foreign Relotions of the United
States (FRUS) series by fadlitating
access to approprtate dasai$ed material
in their custody and by expediting
dedaasification oview of documents
proposed for indusion in the FRUS.
~ 2001.34 t=OIA and Pris-ary Act requests
[3.41
Agency heads shall process oquests
for dedaasi$cation that are submitted
under the provisions of the Preedom of
Information Act, as amended or the
Privacy Act of 1974, in accordance with
the provisions of those Acta.
Subpart D-Safeguarding
; 2oot.4o General [4.t1
Information dassified pursuant to this
Order ar pndecesaor orders shall be
afforded a level of protection against
unauthorized disdosure commensurate
with its level of dasai$cation. For
information in apedal access programs
established Hader the provisions of
section 4.2 of the Order, the
safeguarding requirements of Subpart D
may be modified by the agency head
responsible for coating the apedal
access program as tong as the modified
requloments provide appropriate
protection for the Information.
it 2001.41 standards for security
?~~ I4.,tb~ and t~troll
Tha AdmIniatrator of General
Services shag in coordination with
agendea originating dasaified
information, establish and publish
uniform standards. spedfications, and
supply schedules for security equipment
designed to provide secuo storage for
and to destroy dasai$ed information. -
My agency may establish more
stringent standards for its own sae.
Whenever new security equipment Is
procured it shall be in conformance
with the standards and specifications
nferod to above and ahaU. to the
maximum extent pocticable, be of the
type available through the Federal
Sapply System. -
; 200f.42_AccountabilHy (4.t(b)1 . -
(a) Top Secrot Top Secret control
officials shall be designated to receive.
transmit. and maintain current access
and accountability records for Top
Secret information. M inventory of Top
Secret documents shall be made et least
annually. Agency heads may wain a the
requirement for an annual Inventory of
storage systems containing large
vdumes of Top Secret information aeon
a determination that the safeguarding of
this information is sot jeopardized by
the inventory waiver. Waivers shall be
in writing and be available for review
by the Information Security Oversight
Office.
(b) Secret and Confidential. Agency
heads shall prescribe accountability or
control requioments for Secret and
Confidential information.
f 200,.43 Storage [4.tN)1
Claasi$ed information shall be stored
only in facilities or under conditions
designed to prevent unauthorized
persona from gaining access to it.
(a) Minimum requirements for
physical barriers. (1) Top Secret Top
Secret information shall be stored in a
GSA-approved security container with
an approved, built-in, three-position,
dial-type changeable combination lodr,
in a vault protected by an alarm system
and response force; or in other types of
storage fadlitiea that meet the standards
for Top Secret eatabliahed under the
provisions of ;2001.41. In addition.
heads of agencies shall prescribe those
supplementary controls deemed
necessary to restrict unauthorized
access to aoaa In which such
information is etond.
(2) Secret and Confidential. Secret
and Confidential Information shall be
stood in a manner and under the
conditions pnscrIbed for Top Secret
information. of in a container, vault. or
alarmed area that meets the ?tandarda
for Secret or Confdential information
established under the provisions of
2001.41. Secret and Confidential
information may aLo be stood in a
safe-type filing cabinet having abuilt-
in. rhos-position. dial-type changeable
combination lode, or a steel filing
cabinet equipped with a steel lock bar
secured by aGSA-approved three-
position changeable combination
padlock. Heads of agendas shall
poacribe supplementary controls for
storage of Secret information in cabinets
equipped with a steel lock bar. Access
to bulky Secret and Confidential
material in weapons storage areas.
strong rooms, dosed aoaa or similar
fadlities shall be controlled in
accordance with oquioments
eetabliahed by the appropriate agency -
head At a minimum. such requirements
shall prescribe the use of key-operated.
high-security padlodu approved by the
General Services Adminiatretion.
(b) Combinations. (1) Equipment in
service. Combinations to dial-type lode
shall be changed ody by persona having
an appropriate security dearance, and
shall be changed whenever such
equipment 1a placed in use; whenever a
person knowing the combination no
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Approved For Release 2011/08/17 :CIA-RDP89B01330R000400610006-1
Fadatral Rester / YoL 47. No. 123 /Friday. jime ?5.1982 / ~ Rules and Regulations
longer requires access to it; whenever a
combination has been subjected to
possible compromise; whenever the
equipmentL taken out of service; or at
leant ontx every year. Knowledge of
combinations shall be limited to the
minimum number of persons necessary
for operating purposes. Records of
combinations shall be classified ao
lower than the highest level of dassified
information that is protected by the lock.
(2) Bquipmerrt out of service. When
security equipment V taken out of
service it shall be inspected to ensure
that no classified information remains,
and thebuilt-ia combination lock shall
be reset to the standard combination b0-
25-50. Combination padloclu shall be
reset to the standard combination it}
20-90.
(c) Keys. Heads of agendas shall
establish administrative procedures for
the control and accountability of keys
and locks whenever key-operated, high-
security padlocks are utilized. The level
of protection provided such keys shall
be equivalent to that afforded the
classified information being protected
by the padlock.
!f 2001.44 Transmittal I4.,ro)1
(a) Pnepamtion and t+eceiptueg.
Classified information to be transmitted
outside of a fadlity shall be enclosed is
opaque inner and outer covers. The
inner cover shall be a sealed wrapper or
envelope plainly marked with the
assigned daasification and addresses of
both sender and addressee. The outer
cover shall be sealed and addressed
with no identification of the
dassfficaton of its contents. A receipt
shall be attached to or enclosed in the
inner cover, except that Confidential
information shall require a receipt only
if the sender deems it necessary. The
receipt shall identify the sender, the
addressee, and the document, but shall
contain no classified information. It
shall be immediately signed by the
redpient and returned to the sender.
Any of these wrapping and receipting
requirements may be waived by agency
heads if conditions provide at least
equivalent protection to prevent access
by unauthorized persona.
(b) Transmittal of Top Secret The
transmittal of Top Secret information
outside of n facility shall be by
specifically designated personnel, by
State Department diplomatic pouch, by
8 messenger-courier system authorized
for the purpose, or over authorized
secure communications circuits.
(c) Transmittal of Secret The
transmittal of Secret information shall
be effected in the following manner:
(i) The 50 States, the Districtbf
Columbia, and Puerto Rico. Secret
information may be transmitted within
and between the 60 States, the Dbtrlct
of Cohrmbia, and the Commonwealth of
Puerto Rico by one of the mesas
authorised for Top Secret information,
by the U.S. Postal Service registered
mail. or by protective services provided
by U.S. air or surface commercial
carriers ender such conditions as may
be prescribed by the head of the agency
_ coacemed.
(2) Other areeas. Secret information
may be transmitted from, to. or within
areas other than those spedfied is
2001.44(c)(i) by one of the means
established for Top Secret information.
or by U.S. registered mail through
Military Postal Service fadlities
provided that the information does not
at any time pass out of U.S. dtizen
control and does not pans through a
foreign postal system. Transmittal
outside such areas may also be
accomplished under escort of
appropriately cleared personnel aboard
U.S. Government end U.S. Government
contract vehidee or aircraft. ships of the
United States Navy, dvil service
manned U.S. Naval ships. and ships of
U.S. registry. Operators of vehidea,
captains or masters of vessel, and
pilots of aircraft who are U.S.~dtizeas
and who are appropriately cleared may
be designated ae escorts.
(d) Transmittal of Confidential.
Oonfidential information shall be
transmitted within and between the 50
States, the District of Columbia, the
Commonwealth of Puerto Rico, and U.S.
territories or possessions by one of the
means established for higher
dasaifications, or by the U.S. Postal
Service certified, first dean, or express
mail service when prescribed by an
agency head. Outside these areas,
Confidential information shall be
transmitted only as is authorized for
higher dassificationa.
(e) Hand carrying of classified
information. Agency regulations shall
prescribe procedures and appropriate
restrictions concerning the escort or
hand carrying of dassified information,
induding the hand carrying of
dasaeified information on commercial
canters. _
~ 2001.45 Spacial access programs [ 1.2ta)
and 4.2(a)L
Agency heads designated pursuant to
section 1.2(a) of the Order may create or
continue a spedal access program if:
(a) Normal management and
safeguarding procedures do not limit
access suffidently; and
(b) t)ie bomber of persons with access
iR limited to the minimum necessary to
meet the objective of providing extra
protection for the information.
27841
! s