FRIDAY JUNE 25, 1982 PART VIII INFORMATION SECURITY OVERSIGHT OFFICE NATIONAL SECURITY INFORMATION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP93B01194R001200040002-3
Release Decision:
RIFPUB
Original Classification:
K
Document Page Count:
8
Document Creation Date:
December 19, 2016
Document Release Date:
August 31, 2005
Sequence Number:
2
Case Number:
Publication Date:
June 25, 1982
Content Type:
OPEN
File:
Attachment | Size |
---|---|
CIA-RDP93B01194R001200040002-3.pdf | 999.71 KB |
Body:
Approved For FWease 2005/12/01 : CIA-RDP93B01194IQ01200040002-3
Friday
June 25, 1982
Part VIII
Information Security
Oversight Office
National Security Information
Approved For Release 2005/12/01 : CIA-RDP93B01194R001200040002-3
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3
Federal Register / Vole, No. 123 / Friday, June 25, 1982 / Rules d Regulations
INFORMATION SECURITY OVERSIGHT
OFFICE
32 CFA Part 2001
[Directive No. 11
National Security Information
AGENCY: Information Security Oversight
Office (ISOO).
ACTION: Implementing Directive; final
rule.
SUMMARY: The Information Security
Oversight Office is publishing this
Directive (final rule) pursuant to section
5.2(b)(1) of Executive Order 12356,
relating to national security information.
The National Security Council approved
this Directive on June 22, 1982. The
Executive order prescribes a uniform
information security system; it also
establishes a monitoring system to
enhance its effectiveness. This Directive
sets forth guidance to agencies on
original and derivative classification,
downgrading, declassification, and
safeguarding of national security
information.
EFFECTIVE DATE: August 1, 1982.
FOR FURTHER INFORMATION CONTACT:
Steven Garfinkel, Director, ISOO.
Telephone: 202-535-7251,
SUPPLEMENTARY INFORMATION: This
Directive is issued pursuant to the
provisions of section 5.2(b)(1) of
Executive Order 12356. The purpose of
the Directive is to assist In implementing
the Order; users of the Directive shall
refer concurrently to that Order for
guidance.
Last of Subjects In 32 CFR Part 2001
Archives and records, Authority
delegations, Classified information,
Executive orders, Freedom of
information, Information, Intelligence,
National defense, National security
information, Presidential documents,
Security Information, Security measures.
Title 32 of the Code of Federal
Regulations, Part 2001, is revised to read
as follows:
PART 2001-NATIONAL SECURITY
INFORMATION
Subpart A-Original Classification
Sec.
2001.1 Classification levels.
2001.2 Classification authority.
2001.3 Classification categories.
2001.4 Duration of classification.
2001.5 Identification and markings.
2001.6 Limitations on classification.
Subpart B-Derivative Classification
2001.20 Use of derivative classification.
2001.21 Classification guides.
Sec.
2001.22 Derivative Identification and
markings.
Subpart C-Declassification and
Downgrading
2001.30 Listing declassification and
downgrading authorities.
2001.31 Systematic review for
declassification.
2001.32 Mandatory review for
declassification.
2001.33 Assistance to the Department of
State.
2001.34 FOIA and Privacy Act requests.
Subpart D-Safeguarding
2001.40 General.
2001.41 Standards for security equipment.
2001.42 Accountability.
2001.43 Storage.
2001.44 Transmittal.
2001.45 Special access programs.
2001.48 Reproduction controls.
2001.47 Loss or possible compromise.
2001.48 Disposition and destruction.
2001.49 Responsibilities of holders.
2001.50 Emergency planning.
2001.51 Emergency authority.
Subpart E--Implementation and Review
2001.60 Agency regulations.
2001.61 Security education.
2001.82 Oversight.
Subpart F--General Provisions
2001.70 Definitions.
2001.71 Publication and effective date.
Authority: Section 5.2(b)(1), E.O. 12356. 47
FR 14874, April 6, 1982.
Subpart A-Original Classification
? 2001.1 Classification levels.
(a) Limitations [1.1(b)].' Markings
other than "Top Secret," "Secret," and
"Confidential," such as "For Official Use
Only" or "Limited Official Use," shall
not be used to identify national security
information. No other term or phrase
shall be used in conjunction with these
markings, such as "Secret Sensitive" or
"Agency Confidential," to identify
national security Information, The terms
"Top Secret," "Secret," and
"Confidential" should not be used to
identify nonclassified executive branch
information.
(b) Reasonable doubt [1.1(c)). (1)
When there is reasonable doubt about
the need to classify Information, the
information shall be safeguarded as if it
were "Confidential" information in
accordance with Subpart D, pending the
determination about its classification.
Upon the determination of a need for
classification, the information that is
classified shall be marked as provided
in ? 2001.5.
(2) When there Is reasonable doubt
about the appropriate classification
level, the information shall be
safeguarded at the higher level in
accordance with Subpart D, pending the
determination about its classification
level. Upon the-determination of its
classification level, the information shall
be marked as provided in ? 2001.5.
1, 2001.2 Classification authority.
(a) Requests for original classification
authority [1.2 and 5.2[b)(5)]. A request
for original classification authority
pursuant to section 1.2 of Executive
Order 12356 (hereinafter "the Order")
shall include a complete justification for
the level of classification authority
sought, a description of the information
that will require original classification,
and the anticipated frequency of original
classification actions.
(b) Listing classification authorities
[1.2J. Agencies shall maintain a current
listing of officials delegated original
classification authority by name,
position, or other identifier. If possible,
this listing shall be unclassified.
(c) Exceptional cases [1.2(e)].
Information described in section 1.2(e)
of the Order shall be protected as
provided in ? 2001.1(b).
? 2001.3 Classification categories.
(a) Classification in context of related
information [1.3(b)]. Certain information
which would otherwise be unclassified
may require classification when
combined or associated with other
unclassified or classified Information.
Classification on this basis shall be
supported by a written explanation that,
at a minimum, shall be maintained with
the file or referenced on the record copy
of the information.
(b) Unofficial publication or
disclosure [1.3(d)]. Following an
Inadvertent or unauthorized publication
or disclosure of information identical or
similar to information that has been
classified in accordance with the Order
or predecessor orders, the agency of
primary interest shall determine the
degree of damage to the national
security, the need for continued
classification; and, in coordination with
-the agency in which the disclosure
occurred, what action must be taken to
prevent similar occurrences.
12001.4 Duration of classification.
(a) Information not marked for
declassification [1.4J. Information
classified under predecessor orders that
Is not subject to automatic
declassification shall remain classified
until reviewed for declassification.
(b) Authority to extend automatic
' Bracketed references pertain to related sections declassification determinations [1.4(bJJ.
of Executive Order 12356. The authority to extend the
Approved For Release 2005/12/01 CIA-RDP93B01194RO01200040002-3
Federal Regfist / Vol. 47, No. 123 Frids~v lone 25 1' J it~~lra^ n?~ tiQas
'+~'+n n r~ n w win w 2 (i [IA ~f7TA'fl'A rrrm 27$37
automatic Declassification under marking are clearly outweighed by the document >anctassit3esi transmittal
red
d
p
ecessor or
ers is limited to those increased administrative burdens.
officials who have classification Unless the portion marking requirement
authority over the information and are has been waived as authorized, each
designated in writing to have original portion of a document, including
classification authority at the level of subjects and titles, shall be marked by
the information to remain classified. placing a parenthetical designation
Any decision to extend this Immediately preceding or following the
classification on other than a document- text to which it applies. The symbols
by-document basis shall be reported to "(TS)" for Top Secret, "(S)" for Secret,
the Director of the Information Security "(C)" for Confidential, and "(U)" for
Oversight Office. Unclassified shall be used for this
? 2001.6 Identification and markings purpose. If the application of
[1.5(a), 1.6(b) and 1.5(c)l parenthetical designations is not
A uniform information security system practicable, the document shall contain
requires that standard markings be a statement sufficient to identify the
applied to national security information. level of that is classified and the
Except in extraordinary circumstances level of such classification, and the
as provided in section 1.5(a) of the information that Is not classified. If all
Order, or as indicated herein, the portions of a document are classified at
marking of paper documents created the same level, this fact may be
after the effective date of the Order indicated by a statement to that effect. If
shall not deviate from the following a subject or title requires classification,
prescribed formats. These markings an unclassified Identifier may be applied
shall also be affixed to material other to facilitate reference.
than paper documents, or the originator (b) Classification authority. If the
shall provide holders or recipients of the original classifier is other than the
information with written instructions for signer or approver of the document, the
protecting the information. identity shall be shown as follows:
(a) Classification level. The markings "CLASSIFIED BY (identification of original
"Top Secret," "Secret," and classification authority)"
"C
d
"
onfi
ential
are used to indicate: that
information requires protection as
national security information under the
Order; the highest level of classification
contained in a document; and the
classification level of each page and, in
abbreviated form, each portion of a
document.
(1) Overall marking. The highest level
of classification of information in a
document shall be marked in such a
way as to distinguish it clearly from the
informational text. These markings shall
appear at the top and bottom of the
outside of the front cover (if any), on the
title page (if any), on the first page, and
on the outside of the back cover (if any).
(2) Page marking. Each interior page
of a classified document shall be
marked at the top and bottom either
according to the highest classification of
the content of the page, including the
designation "Unclassified" when it is
applicable, or with the highest overall
classification of the document.
(3) Portion marking. Agency heads
may waive the portion marking
requirement for specified classes of
documents or information only upon a
written determination that: (I) There will
be minimal circulation of the specified
documents or information and minimal
potential usage of these documents or
information as a source for derivative
classification determinations; or (ia)
there is some other basis to conclude
classification of information subject to
(c) Agency and office of origin. If the
Identity of the originating agency and
office is not apparent on the face of a
document, it shall be placed below the
"CLASSIFIED BY" line.
(d) Declassification and downgrading
instructions. Declassification and as
applicable, downgrading instructions
shall be shown as follows:
(1) For information to be declassified
automatically on a specific date:
"DECLASSIFY ON. (date)"
(2) For information to be declassified
automatically upon occurrence of a
specific event:
"DECLASSIFY ON: (description of event)"
(3) For information not to be
declassified automatically:
"DECLASSIFY ON: ORIGINATING
AGENCY'S DETERMINATION REQUIRED
or 'OADR` -
(4) For information to be downgraded
automatically on a specific date or upon
occurrence of a specific event:
"DOWNGRADE TO (classification level)
ON (date or description of event)"
(e) Special markings.-{1) Transmittal
documents (1.5(c)]. A transmittal
document shall indicate on its face the
highest classification of any information
transmitted by it. It shall also include
the following or similar instruction:
"UNCLASSIFIED WHEN CLASSIFIED
ENCLOSURE IS REMOVED"
(ii) For a classified transmittal
document:
'UPON REMOVAL OF ATTACHMENTS
THIS DOCUMENT IS (classification level of
the transmittal document standing alone)'
(2) "Restricted Data"and "Formerly
Restricted Data" j6.2(a)J. "Restricted
Data" and "Formerly Restricted Data"
shall be marked In accordance with
regulations issued under the Atomic
Energy Act of 1954, as amended.
(3) Intelligence sources or methods
[1.5(c)]. Documents that contain
information relating to Intelligence
sources or methods shall include the
following marking unless otherwise
proscribed by the Director of Central
Intelligence:
"WARNING NOTICE-INrEu GENcg
SOURCES OR METHODS INVOLVED"
(4) Foreign government information
[1.5(c)]. Documents that contain foreign
government Information shall include
either the marking "FOREIGN
GOVERNMENT INFORMATION," or a
marking that otherwise indicates that
the information is foreign government
information. If the fact that information
is foreign government information must
be concealed, the marking shall not be
used and the document shall be marked
as if it were wholly of U.S. origin.
(5) Computer output [1.5(c)]..
Documents that are generated as
computer output may be marked
automatically by systems software. If
automatic marking is not practicable,
such documents must be marked
manually.
(B) Agency prescribed mwarkings
[1.5(c), 4.2(a), and L3(c)J Officials
delegated original classification
authority by the president may prescribe
additional markings to control
reproduction and dissemination,
including markings required for special
access programs authorized by section
4.2(a) of the Order.
(f) Electrically transmitted
information (messages) [1.5(c)J. National
security information that is transmitted
electrically shall be marked as follows:
(1) The highest level of classification
shall appear before the first line of text;
(2) A "CLASSIFIED BY" line is not
required;
(3) The duration of classification shall
appear as follows:
(I) For Information to be declassified
automatically on a specific date:
"DECL: (date)"
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3
27838 Fel 3*c [RbW a Naa3.6F,drlov_ Iasuw,Ri..1982,1_,,.~IeB, ,R ll one
(ii) For information to be declassified
upon occurrence of a specific event:
"DELL: (description of event)"
(iii) For information not to be
automatically declassified which
requires the originating agency's
determination (see also ? 2001.5(d)(3)):
"DECL: OADR"
(iv) For information to be
automatically downgraded:
"DNG (abbreviation of classification level
to which the information is to be downgraded
and date or descpption of event on which
downgrading is fo occur)"
(4) Portion marking shall be as
prescribed in ? 2001.5(a)(3);
(5) Special markings as prescribed in
? 2001.5(e) (2), (3), and (4) shall appear
after the marking for the highest level of
classification. These include:
(i) "Restricted Data" and "Formerly
Restricted Data" shall be marked in
accordance with regulations issued
under the Atomic Energy Act of 1954, as
amended;
(iii) Information concerning
intelligence sources or methods:
"WNINTEL," unless proscribed by the
Director of Central Intelligence;
(iii) Foreign government information:
"FGI," or a marking that otherwise
indicates that the Information is foreign
government information. If the fact that
information is foreign government
information must be concealed, the
marking shall not be used and the
message shall be marked as if it were
wholly of US. origin.
(6) Paper copies of electrically
transmitted messages shall be marked
as provided in ? 2001.5(a) (1) and (2).
(g) Changes in classification markings
[1.4(b) and 4.1(b)]. When a change is
made in the duration of classified
information, all holders of record shall
be promptly notified. If practicable,
holders of record shall also be notified
of a change in the level of classification.
Holders shall alter the markings to
conform to the change, citing the
authority for it. If the remarking of large
quantities of information is unduly
burdensome, the holder may attach a
change of classification notice to the
storage unit in lieu of the marking action
otherwise required. Items withdrawn
from the collection fot purposes other
than transfer for storage shall be
marked promptly in accordance with the
change notice.
? 2001.6 Umltations on classification
[1.6(c)].
Before reclassifying information as
provided in section 1.6(c) of the Order,
the authorized official shall consider the
following factors, which shall be
addressed in the report to the Director of
the Information Security Oversight
Office:
(a) The elapsed time following
disclosure;
(b) The nature and extent of
disclosure:
(c) The ability to bring the fact of
reclassification to the attention of
persons to whom the information was.
disclosed;
(d) The ability to prevent further
disclosure; and
(e) The ability to retrieve the -
information voluntarily from persons not
authorized access in its reclassified
state.
Subpart B-Derivative Classification
? 200120 Use of derivative classification
[2.1].
The application of derivative
classification markings is a
responsibility of those who incorporate,
paraphrase, restate, or generate in new
form information that is already
classified, and of those who apply
markings in accordance with
instructions from an authorized original
classifier or in accordance with an
authorized classification guide. If a
person who applies derivative
classification markings believes that the
paraphrasing, restating, or summarizing
of classified information has changed
the level of or removed the basis for
classification, that person must consult
for a determination an appropriate
official of the originating agency or
office of origin who has the authority to
upgrade, downgrade, or declassify the
information.
? 2001.21 Classification guides.
(a) General [2.2(a)]. Classification
guides shall, at a minimum:
(1) Identify or categorize the elements
of information to be protected;
(2) State which classification level
applies to each element or category of
information; and
(3) Prescribe declassification
instructions for each element or
category of information in terms of (i) a
period of time, (ii) the occurrence of an
event, or (iii) a notation that the
information shall not be declassified
automatically without the approval of
the originating agency.
(b) Requirement for review [2.2(a)].
Classification guides shall be reviewed
at least every two years and updated as
necessary. Each agency shall
maintain a list of its classification
guides in current use.
(c) Waivers [2.2(c)). An authorized
official's decision to waive the
requirement to issue classification
guides for specific classes of documents
or information should be based, at a
minimum, on an evaluation of the
following factors:
(1) The ability to segregate and
describe the elements of information;
(2) The practicality of producing or
disseminating the guide because of the
nature of the information;
(3) The anticipated usage of the guide
as a basis for derivative classification;
and
(4) The availability of alternative
sources for derivatively classifying the
Information in a uniform manner.
? 2001.22 Derivative identification and
markings [1.5(c) and 2.1(b)].
Documents classified derivatively on
the basis of source documents or
classification guides shall bear all
markings prescribed in ? 2001y5(a)
through (e) as are applicable.
Information for these markings shall be
taken from the source document or
instructions in the appropriate
classification guide.
(a) Classification authority. The
authority for classification shall be
shown as follows:
"CLASSIFIED BY (description of source
document or classification guide)"
If a document is classified on the basis
of more than one source document or
classification guide, the authority for
classification shall be shown. as follows:
"CLASSIFIED BY MULTIPLE SOURCES"
In these cases the derivative classifier
shall maintain the identification of each
source with the file or record copy of the
derivatively classified document. A
document derivatively classified on the
basis of a source document that is
marked "CLASSIFIED BY MULTIPLE
SOURCES" shall cite the source
document in its "CLASSIFIED BY" line
rather than the term "MULTIPLE
SOURCES."
(b) Declassification and downgrading
instructions. Dates or events for
automatic declassification or
downgrading, or the notation
"ORIGINATING AGENCY'S
DETERMINATION REQUIRED" to
indicate that the document is not to be
declassified automatically, shall be
carried forward from the source
document, or as directed by a
classification guide, and shown on a
"DECLASSIFY ON" line as follows:
"DECLASSIFY ON: (date; description of
event; or 'ORIGINATING AGENCY'S
DETERMINATION REQUIRED' (OADR))"
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3
Approved For Release 2005/12/01 : CIA-RDP93B01194RU01200040002-3
Federal Register I Vol. 47, .No. 123 day, june 25, 1982 / Rules and Regulations 27839
Subpart C-Daclaasificatlon and activities), or intelligence sources or Security Oversight Office, specific
Downgrading methods created after 1945, and
tion review
112001.30 ].]sting declassification and formation concerning cryptology guidelines cfor foreign government
created after 1945; ign downgrading authorities [3.1(b)]. Conduct systematic information over which the the agency head
(iv)
Agencies shall maintain a current declassification reviews of accessioned gugas ide elilines es shall be viewedy. These
listing of officials delegated shall be reviewed and
dti g of
or downgrding records and presidential papers or updated every five years unless earlier
a by or
uthossi ca name, position, another records in file series concerning review is requested by the Archivist.
identifier. If possible, this listing shall be aintelligence activities ctivities), or intelligence sources oecial (d) Special procedures. All agency
unclassified, methods created after 1945 and heads shall be bound by the special
? 2001.31 Systematic review for cryptology records created after 1945 as procedures for systematic review of
declassification (3.3). they become fifty years old; classified records logic
pertaining pe records to and
(a) Permanent records. Systematic (v) Establish systematic review classified recorrtaining to
review is applicable only to those priorities for accessioned records and intelligence activities nincluding special
classified records and presidential presidential papers or records based on methods issued by of
papers or records that the Archivist of the degree of researcher interest and the Defense and the tec Se of Central
the United States, acting under the potential for declassifying a significant ense and the Director of Central
Federal Records Act, has determined to Intelligence, respective]
portion of the information;
y.
Fe a al cie Act, has d other to (vi) Re-review for declassification ? 2001.32 Mandatory review for
b of suffi permanent retention. or oth. value accessioned records and presidential declassification [3.41.
to wa (b) Non-permanent records. Non- papers or records upon the (a) U.S. originated information. (1)
disposed permanent classi
De(b) nfied records shall be determination that the followup review Each agency head shall publish in the
accordance with will be productive, both in terms of of in schedules a by researcher interest and the potential for Federal Register the identity of the
approved b the p person(s) or office(s) to to which
Administrator of General Services under declassifying a significant portion of the
information. mandatory declassification review
the Records Disposal Act. These requests may fy b be e addressed.
scheduler shall provide for the (2) The Archivist may review for
continued
s shall eor th subject to declassification, with the concurrence of (2) Processing. (i) Requests for
co ongoing mandatory review for the originating agency, accessioned classified records in the custody of the retention of declassification request records and presidential papers or originating agency. A valid mandatory
(c) Responsibilities. (1) In meeting ecords, prior to the timeframes declassification review request need not
re spa pones assigned s. (1 by section established in paragraphs (c)(1) (iii) and identify the requested information by
3.3(a) of the Order, the Archivist shall: (iv) of this section. date or title of the responsive records,
(I) Eof the O procedures, hi (3) Officials delegated original but must be of sufficient particularity to blish consultation with the Director of the classification authority by the President allow agency personnel to locate the
Information Security Dirsectctor of thee, under the Order or predecessor orders records containing the information
for the systematic declassification shall: sought with a reasonable amount of
review of permanent classified records (i) Within six months of the effective effort. Agency responses to mandatory
rev ew fedrmo the classified
Archives date of the Order issue guidelines for declassification review requests shall be
acc scion d into the National
papers or systematic declassification review and, governed by the amount of search and
recordd classified presidential
under the Archivist's control; if applicable, for downgrading. These review time required to process the
[ii) sunder systematic guidelines shall be developed in request. In responding to mandatory
decla C ifica ct s reviews in accordance consultation with the Archivist and the declassification review requests,
with guidelines provided in the head of Director of the Information Security agencies shall either make a prompt
the
the agency that originated the Oversight Office and be designed to declassification determination and
;art with r ed t to fore' assist the Archivist in the conduct of notify the requester accordingly, or
government nor,
formation, in ance (ii) with es e t tooreign systematic reviews; inform the requester of the additional
with guidelines provided by the head of to provide ~timely assistance toethenel Agencies time needed to process hall make a final eeueat.
the agency having declassification Archivist in the systematic review determination within one year from the
jurisdiction over the information, or, if process; d of no guidelines have been provided, in (iii) Review and update guidelines for cirtcumstancest eWhen information
accordance with the general guidelines systematic declassification review and cannot be declassified in its entirety,
provided by the Director of the
Information Security Oversight Office unless earrlie review is requested by the re ase, co sissttent with other applicable e reasonable efforts to
after coordination with the agencies Archivist. law, those declassified portions of the
having declassification authority over (4) Within six months of the effective requested information that constitute a
the information; or, with respect to date of the Order the Director of the coherent segment. Upon the denial of an
presidential papers or records, in Information Security Oversight Office initial request, the agency shall also
accordance with guidelines developed shall issue, in consultation with the notify the requester of the right of an
by the,'Archivist and approved by the Archivist and the agencies having administrative appeal, which must be
National Security Council; declassification authority over the filed within 60 days of receipt of the
(iii) Conduct systematic information, general guidelines for the denial.
declassification reviews of accessioned systematic declassification review of
records and presidential papers or foreign (ii) Requests for classified records in
records as they become 30 years old, within six _months, agency heads may the custody ng gen ?~ncy stn agency than the
except for file series concerning issue, in consultation with the Archivist receives a mandatory decnle n
intelligence activities (including special and the Director of the Information
review request for records in its
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3
Approved For Releelere 2005/12/01 : CIA-RDP93B01194RO01200040002-3
27840 Federal Register / vol. 47, No. 123 / Friday, June 25, 1982 / Res and Regulations
possession that were originated by
another agency, it shall forward the
request to that agency. The forwarding
agency shall include a copy of the
records requested together with its
recommendations for action. Upon
receipt, the originating agency shall
process the request in accordance with
I 2001.32(a)(2)(i). Upon request, the
originating agency shall communicate its
declassification determination to the
referring agency.
(iii) Appeals of denials of mandatory
declassification review requests. The
agency appellate authority shall
normally make a determination within
30 working days following the receipt of
an appeal. If additional time is required
to make a determination, the agency
appellate authority shall notify the
requester of the additional time needed
and provide the requester with the
reason for the extension. The agency
appellate authority shall notify the
requester in writing of the final
determination and of the reasons for any
denial.
(b) Foreign government information.
Except as provided in this paragraph,
agency heads shall process mandatory
declassification. review requests for
classified records containing foreign
government information in accordance
with IE 2001.32(a). The agency that
initially received or classified the
foreign government information shall be
responsible for making a
declassification determination after
consultation with concerned agencies. If
the agency receiving the request is not
the agency that received or classified
the foreign government information. it
shall refer the request to the appropriate
agency for action. Consultation with the
foreign originator through appropriate
channels may be necessary prior to final
action on the request.
(c) Cryptologic and intelligence
information. Mandatory declassification
review requests for cryptologic
information and information concerning
intelligence activities (including special
activities) or intelligence sources or
methods shall be processed solely in
accordance with special procedures
issued by the Secretary of Defense and
the Director of Central Intelligence,
respectively.
(d) Fees. In responding to mandatory
declassification review requests for
classified records, agency heads may
charge fees in accordance with section
483a of title 31, United States Code. The
schedules of fees published in the
Federal Register by agencies in
implementation of Executive Order
12065 shall remain in-effect until they
are revised.
1200133 Assistance to the Department of
State [3.3(b)].
Heads of agencies should assist the
Department of State in its preparation of
the Foreign Relations of the United
States (FRUS) series by facilitating
access to appropriate classified material
in their custody and by expediting
declassification review of documents
proposed for inclusion in the FRUS.
? 2001.34 F01A and Privacy Act requests
[3.4].
Agency heads shall process requests
for declassification that are submitted
under the provisions of the Freedom of
Information Act, as amended, or the
Privacy Act of 1974, in accordance with
the provisions of those Acts.
Subpart D-Safeguarding
12001.40 General 14.1].
Information classified pursuant to this
Order or predecessor orders shall be
afforded a level of protection against
unauthorized disclosure commensurate
with its level of classification. For
information in special access programs
established under the provisions of
section 4.2 of the Order, the
safeguarding requirements of Subpart D
may be modified by the agency head
responsible for creating the special
access program as long as the modified
requirements provide appropriate
protection for the information.
? 2001.41 Standards for security
equipment [4.1(b) and 5.1(b)].
The Administrator of General
Services shall, in coordination with
agencies originating classified
information, establish and publish
uniform standards, specifications, and
supply schedules for security equipment
designed to provide secure storage for
and to destroy classified information.
Any agency may establish more
stringent standards for its own use.
Whenever new security equipment is
procured, it shall be in conformance
with the standards and specifications
referred to above and shall, to the
maximum extent practicable, be of the
type available through the Federal
Supply System.
2001.42 Accountability [4.1(b)].
(a) Top Secret. Top Secret control
officials shall be designated to receive,
transmit, and maintain current access
and accountability records for Top
Secret information. An inventory of Top
Secret documents shall be made at least
annually. Agency heads may waive the
requirement for an annual inventory of
storage systems containing large
volumes of Top Secret information upon
a determination that the safeguarding of
this information Is not jeopardized by
the inventory waiver. Waivers shall be
in writing and be available for review
by the Information Security Oversight
Office.
(b) Secret and Confidential. Agency
heads shall prescribe accountability or
control requirements for Secret and
Confidential information.
$ 2001.43 Storage [4.1(b)].
Classified information shall be stored
only in facilities or under conditions
designed to prevent unauthorized
persons from gaining access to it.
(a) Minimum requirements for
physical barriers. (1) Top Secret. Top
Secret information shall be stored in a
GSA-approved security container with
an approved, built-in, three-position,
dial-type changeable combination lock;
in a vault protected by an alarm system
and response force; or in other types of
storage facilities that meet the standards
for Top Secret established under the
provisions of 12001.41. In addition,
heads of agencies shall prescribe those
supplementary controls deemed
necessary to restrict unauthorized
access to areas in which such
information is stored.
(2) Secret and Confidential. Secret
and Confidential information shall be
stored in a manner and under the
conditions prescribed for Top Secret
information, or in a container, vault, or
alarmed area that meets the standards
for Secret or Confidential information
established under the provisions of
1 2001.41. Secret and Confidential
information may also be stored in a
safe-type filing cabinet having a built-
in, three-position. dial-type changeable
combination lock, or a steel filing
cabinet equipped with a steel lock bar
secured by a GSA-approved three-
position changeable combination
padlock. Heads of agencies shall
prescribe supplementary controls for
storage of Secret information in cabinets
equipped with a steel lock bar. Access
to bulky Secret and Confidential
material in weapons storage areas,
strong rooms, dosed areas or similar
facilities shall be controlled in
accordance with requirements
established by the appropriate agency
head. At a minimum, such requirements
shall prescribe the use of key-operated,
high-security padlocks approved by the
General Services Administration.
(b) Combinations. (1) Equipment in
service. Combinations to dial-type locks
shall be changed only by persons having
an appropriate security clearance, and
shall be changed whenever such
equipment is placed in use; whenever a
person knowing the combination no
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3
27841
9a6pt j e A, (6140 / c 1 WA$2(}G QW11 NaWationa
longer requires access to it whenever a
combination has been subjected to
possible compromise; whenever the
equipment is taken out of service; or at
least once every year. Knowledge of
combinations shall be limited to the
minimum number of persons necessary
for operating purposes. Records of
combinations shall be classified no
lower than the highest level of classified
information that is protected by the lock.
(2) Equipment out of service. When
security equipment is taken out of
service it shall be inspected to ensure
that no classified information remains,
and the built-in combination lock shall
be reset to the standard combination 50-
25-50. Combination padlocks shall be
reset to the standard combination 10-
20-30.
(c) Keys. Heads of agencies shall
establish administrative procedures for
the control and accountability of keys
and locks whenever key-operated, high-
security padlocks are utilized. The level
of protection provided such keys shall
be equivalent to that afforded the
Alassified information being protected
by the padlock.
2001.44 Transmittal [4.1(b)].
(a) Preparation and receipting.
Classified information to be transmitted
outside of a facility shall be enclosed in
opaque inner and outer covers. The
inner cover shall be a sealed wrapper or
envelope plainly marked with the
assigned classification and addresses of
both sender and addressee. The outer
cover shall be sealed and addressed
with no identification of the
classification of its contents. A receipt
shall be attached to or enclosed in the
inner cover, except that Confidential
information shall require a receipt only
if the sender deems it necessary. The
receipt shall identify the sender, the
addressee, and the document, but shall
contain no classified information. It
shall be immediately signed by the
recipient and returned to the sender.
Any of these wrapping and receipting
requirements may be waived by agency
heads if conditions provide at least
equivalent protection to prevent access
by unauthorized persons.
(b) Transmittal of Top Secret. The
transmittal of Top Secret information
outside of a facility shall be by
specifically designated personnel, by
State Department diplomatic pouch, by
a messenger-courier system authorized
for the purpose, or over authorized
secure communications circuits.
(c) Transmittal of Secret. The
transmittal of Secret information shall
be effected in the following manner:
(1) The 50 States, the District of
Columbia, and Puerto Rico. Secret
information may be transmitted within
and between the 50 States, the District
of Columbia, and the Commonwealth of
Puerto Rico by one of the means
authorized for Top Secret information.
by the U.S. Postal Service registered
mail, or by protective services provided
by U.S. air or surface commercial
carriers under such conditions as may
be prescribed by the head of the agency
concerned.
(2) Other areas. Secret information
may be transmitted from, to, or within
areas other than those specified in
? 2001.44(c)(1) by one of the means
established for Top Secret information,
or by U.S. registered mail through
Military Postal Service facilities
provided that the information does not
at any time pass out of U.S. citizen
control and does not pass through a
foreign postal system. Transmittal
outside such areas may also be
accomplished under escort of
appropriately cleared personnel aboard
U.S. Government and U.S. Government
contract vehicles or aircraft, ships of the
United States Navy, civil service
manned U.S. Naval ships, and ships of
U.S. registry. Operators of vehicles,
captains or masters of vessels, and
pilots of aircraft who are U.S. citizens
and who are appropriately cleared may
be designated as escorts.
(d) Transmittal of Confidential.
Confidential information shall be
transmitted within and between the 50
States, the District of Columbia, the
Commonwealth of Puerto Rico, and U.S.
territories or possessions by one of the
means established for higher
classifications, or by the U.S. Postal
Service certified, first class, or express
mail service when prescribed by an
agency head. Outside these areas,
Confidential information shall be
transmitted only as is authorized for
higher classifications.
(e) Hand carrying of classified
information. Agency regulations shall
prescribe procedures and appropriate
restrictions concerning the escort or
hand carrying of classified information,
including the hand carrying of
classsified information on commercial
carriers.
? 2001.45 Special access programs [1.2(a)
and 4.2(a)].
Agency heads designated pursuant to
section 1.2(a) of the Order may create or
continue a special access program if:
(a) Normal management and
safeguarding procedures do not limit
access sufficiently; and
(b) the number of persons with access
is limited to the minimum necessary to
meet the objective of providing extra
protection for the information.
1 2001.46 Reproduction oontrola [4.1(b)).
(a) Top Secret documents, except for
the controlled initial distribution of
information processed or received
electrically, shall not be reproduced
without the consent of the originator.
(b) Unless restricted by the originating
agency, Secret and Confidential
documents may be reproduced to the
extent required by operational needs.
(c) Reproduced copies of classified
documents shall be subject to the same
accountability and controls as the
original documents. -
(d) Paragraphs (a) and (b) of this
section shall not restrict the
reproduction of documents to facilitate
review for declassification.
12001.47 Loss or possible compromise
[4.1(b)].
Any person who has knowledge of the
loss or possible compromise of
classified information shall immediately
report the circumstances to an official
designated for this purpose by the
person's agency or organization. The
agency that originated the information
shall be notified of the loss or possible
compromise so that a damage
assessment may be conducted and
appropriate measures taken to negate or
minimize any adverse effect of the
compromise. The agency under whose
cognizance the loss or possible
compromise occurred shall Initiate an
inquiry to (a) determine cause, (b) place
responsibility, and (c) take corrective
measures and appropriate
administrative, disciplinary, or legal
action.
? 2001.46 Disposition and destruction
[4.1(b)].
Classified information no longer
needed in current working files or for
reference or record purposes shall be
processed for appropriate disposition in
accordance with the provisions of
chapters 21 and 33 of title 44, United
States Code, which govern disposition of
Federal records. Classified information
approved for destruction shall be
destroyed in accordance with
procedures and methods prescribed by
the head of the agency. The method of
destruction must preclude recognition or
reconstruction of the classified
information or material.
? 2001.49 Responsibilities of holders
14.1(b)].
Any person having access to and
possession of classified information is
responsible for. (a) Protecting it from
persons not authorized access to it, to
include securing it in approved
equipment or facilities whenever it is
not under the direct supervision of
Approved For Release 2005/12/01 : CIA-RDP93B01194R00i200040002-3
Federal Re lster / V ' 47, No. 123 / Friday, June 26, 1962 1
authorized persons; and (b) meeting
accountability requirements prescribed
by the head of the agency.
12001.50 Emergency planning [4.1(b)].
Agencies shall develop plans for the
protection, removal, or destruction of
classified material in case of fire,
natural disaster. civil disturbance, or
enemy action. These plans shall include
the disposition of classified information
located in foreign countries.
12001.51 Emergency authority 14.1(b)].
Those officials delegated original
classification authority by the President
may prescribe by regulation special
provisions for the dissemination,
transmittal, destruction, and
safeguarding of national security
information during combat or other
emergency situations which pose an
imminent threat to national security
izlformation.
Subpart E-implementation and
Review
2001.60 Agency regulations 15.3(b)].
Each head of an agency shall issue
regulations In accordance with 5 U.S.C.
552(a) to implement the Order and 32
CFR Part 2001 no later than December
31, 1982 Those portions that affect
members of the public shall include, at a
minimum, Information relating to the
agency's mandatory declassification
review program and instructions for
submitting suggestions or complaints
regarding the agency's information
security program.
12001.61 Security education [5.3(a)].
Each agency that creates or handles
national security information is required
under the Order to establish a security
`is and Regulations
education program. The program
established shall be sufficient to
familiarize all necessary personnel with
the provisions of the Order and its
implementing directives and regulations
and to impress upon them their
individual security responsibilities. The
program shall also provide for initial,
refresher, and termination briefings.
f 2001.62 Oversight [6.3(a)].
Agency heads shall require that
periodic formal reviews be made to
ensure compliance with the provisions
of the Order and ISOO directives.
Subpart F-General Provisions
? 2001.70 Definitions [6.1].
(a) Original classification authority.
The authority vested in an executive
branch official to make an initial
determination that information requires
protection against unauthorized
disclosure in the interest of national
security.
(b) Classification guide. A document
issued by an authorized original
classifier that prescribes the level of
classification and appropriate
declassification instructions for
specified information to be classified on
a derivative basis.
(c) Originating agency. The agency
responsible for the initial determination
that particular information is classified.
(d) Multiple sources. The term used to
indicate that a document is derivatively
classified when it contains classified
information derived from more than one
source.
(e) Portion. A segment of a document
for purposes of expressing a unified
theme; ordinarily a paragraph.
. (f) Special access program. Any
program imposing "need-to-know" or
access controls beyond those normally
provided for access to Confidential,
Secret, or Top Secret information. Such
a program may include, but is not
limited to, special clearance,
adjudication, or investigative
requirements, special designations of
officials authorized to determine "need-
to-know," or special lists of persons
determined to have a "need-to-know."
(g) Intelligence activity. An activity
that an agency within the Intelligence
Community is authorized to conduct
pursuant to Executive Order 12333.
(h) Special activity. An activity
conducted in support of national foreign
policy objectives abroad which is
planned and executed so that the role of
the United States Government is not
apparent or acknowledged publicly, and
functions in support of such activity, but
which is not intended to influence
United States political processes. public
opinion, policies, or media and does not
include diplomatic activities or the
collection and production of intelligence
or related support functions.
(I) Unauthorized disclosure. A
communication or physical transfer of
classified information to an
unauthorized recipient.
2001.71 PubNcation and effective date
[6.2(e)].
Part 2001 shall be published in the
Federal Register. It shall become
effective August 1, 1982.
Steven Garfinkel,
Director, Information Security Oversight
Office.
June 23, 1962.
[FR Doc. 82-17285 Piled 6-23-ft Ia37 anJ
sILLSCO CODE e520-AF-M
Approved For Release 2005/12/01 : CIA-RDP93B01194RO01200040002-3