32 CFR Parts 2001 and 2003 Classified National Security Information; Final Rule Classifi ed N ationalSecurity Inform ation AG EN CY Inform ation Security O versight O f f ce ISO O N ationalArchives i and Records Adm inistration N ARA AC TIO N Im plem enting directive fi n alrule ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ SU M M ARY The Inform ation Security O versight O f f ce ISO O N ational i Archives and Records Adm inistration N ARA is publishing this D irective as a fi n alrule and pursuant to Executive O rder 13526 hereafter the O rder relating to classifi ed nationalsecurity inform ation The Executive order prescribes a uniform system for classifying safeguarding and declassifying nationalsecurity inform ation It also establishes a m onitoring system to enhance its eff ectiveness This D irective sets forth guidance to agencies on originaland derivative classifi cation dow ngrading declassifi cation and safeguarding of classifi ed nationalsecurity inform ation D ATES Eff ective D ate June 25 2010 FO R FU RTH ER IN FO RM ATIO N CO N TACT W illiam J Bosanko D irector Inform ation Security O versight O f f ce at 202‐357‐5250 i SU PPLEM EN TARY IN FO RM ATIO N This fi n alrule is issued pursuant to the provisions of 5 1 a and b of Executive O rder 13526 issued D ecem ber 29 2009 and published January 5 2010 75 FR 707 and am ends 32 CFR part 2001 published on Septem ber 22 2003 68 FR 55168 The purpose of this D irective is to assist in im plem enting the O rder users of the D irective shallrefer concurrently to that O rder for guidance As of N ovem ber 17 1995 ISO O becam e a part of the N ationalArchives The Archivist of the U nited States the Archivist delegated the im plem entation and m onitoring functions of this program to the D irector of ISO O The drafting coordination and issuance of this D irective fulfi lls one of the responsibilities of the im plem entation delegated to the D irector of ISO O This rule is being issued as a fi nalrule w ithout prior notice of proposed rulem aking as allow ed by the Adm inistrative Procedure Act 5 U S C 553 b 3 A for rules of agency procedure and interpretation The interpretive guidance contained in this rule w illassist agencies in im plem enting Executive O rder 13526 w hich w as issued on D ecem ber 29 2009 N ARA has also determ ined that delaying the eff ective date for 30 days is unnecessary as this rule updates the existing D irective im plem enting Executive O rder 12958 as am ended M oreover since Executive O rder 13526 becom es eff ective on June 27 2010 Federal agencies w illbenefi t im m ediately by having up‐to‐date ISO O guidance and any delay in the eff ective date w ould hinder agency procedure and be contrary to the public interest Regulatory Im pact This rule is not a signifi cant regulatory action for the purposes of Executive O rder 12866 This rule is not a m ajor rule as defi ned in 5 U S C Chapter 8 CongressionalReview of Agency Rulem aking As required by the Regulatory Flexibility Act w e certify that this rule w illnot have a signifi cant im pact on a substantialnum ber of sm all entities because it applies only to Federalagencies List of Subjects in 32 CFR Parts 2001 and 2003 Archives and records Authority delegations G overnm ent agencies Classifi ed inform ation Executive orders Freedom of Inform ation Inform ation Intelligence N ationaldefense N ationalsecurity inform ation Presidentialdocum ents Security inform ation Security m easures Standard Form s 0 For the reasons set forth in the pream ble the Inform ation Security O versight O f i c fe N ARA is am ending 32 CFR Chapter XX as follow s 0 1 Title 32 of the Code of FederalRegulations part 2001 is revised to read as follow s PART 2001‐‐CLASSIFIED N ATIO N AL SECU RITY IN FO RM ATIO N Subpart A‐‐Scope of Part Sec 2001 1 Purpose and scope Subpart B‐‐Classifi cation 2001 10 Classifi cation standards 2001 11 O riginalclassifi cation authority 2001 12 D uration of classifi cation 2001 13 Classifi cation prohibitions and lim itations 2001 14 Classifi cation challenges 2001 15 Classifi cation guides 2001 16 Fundam entalclassifi cation guidance review Subpart C‐‐Identifi cation and M arkings 2001 20 G eneral 2001 21 O riginalclassifi cation 2001 22 D erivative classifi cation 2001 23 Classifi cation m arking in the electronic environm ent 2001 24 Additionalrequirem ents 2001 25 D eclassifi cation m arkings 2001 26 Autom atic declassifi cation exem ption m arkings Subpart D ‐‐D eclassifi cation 2001 30 Autom atic declassifi cation 2001 31 System atic declassifi cation review 2001 32 D eclassifi cation guides 2001 33 M andatory review for declassifi cation 2001 34 Referrals 2001 35 D iscretionary declassifi cation 2001 36 Classifi ed inform ation in the custody of private organizations or individuals 2001 37 Assistance to the D epartm ent of State Subpart E‐‐Safeguarding 2001 40 G eneral 2001 41 Responsibilities of holders 2001 42 Standards for security equipm ent 2001 43 Storage 2001 44 Reciprocity of use and inspection of facilities 2001 45 Inform ation controls 2001 46 Transm ission 2001 47 D estruction 2001 48 Loss possible com prom ise or unauthorized disclosure 2001 49 Specialaccess program s 2001 50 Telecom m unications autom ated inform ation system s and netw ork security 2001 51 Technicalsecurity 2001 52 Em ergency authority 2001 53 O pen storage areas 2001 54 Foreign governm ent inform ation 2001 55 Foreign disclosure of classifi ed inform ation Subpart F‐‐Self‐Inspections 2001 60 G eneral Subpart G ‐‐Security Education and Training 2001 70 G eneral 2001 71 Coverage Subpart H ‐‐Standard Form s 2001 80 Prescribed standard form s Subpart I‐‐Reporting and D efi n itions 2001 90 Agency annualreporting requirem ents 2001 91 O ther agency reporting requirem ents 2001 92 D efi n itions Authority Sections 5 1 a and b E O 13526 75 FR 707 January 5 2010 Subpart A‐‐Scope of Part Sec 2001 1 Purpose and scope a This part is issued under Executive O rder E O 13526 Classifi ed N ationalSecurity Inform ation the O rder Section 5 of the O rder provides that the D irector of the Inform ation Security O versight Of f ce ISO O shalldevelop and issue such directives as are necessary i to im plem ent the O rder Page 37255 b The O rder provides that these directives are binding on agencies Section 6 1 a of the O rder defi n es agency''to m ean any Executive agency''as defi n ed in 5 U S C 105 any M ilitary departm ent''as defi n ed in 5 U S C 102 and any other entity w ithin the executive branch that com es into the possession of classifi ed inform ation c For the convenience of the user the follow ing table provides references betw een the sections contained in this part and the relevant sections of the O rder ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ CFR section Related section of E O 13526 ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ 2001 10 Classifi cation standards 1 1 1 4 2001 11 O riginalclassifi cation authority 1 3 2001 12 D uration of classifi cation 1 5 2001 13 Classifi cation prohibitions and 1 7 lim itations 2001 14 Classifi cation challenges 1 8 2001 15 Classifi cation guides 2 2 2001 16 Fundam entalclassifi cation 1 9 guidance review 2001 20 G eneral 1 6 2001 21 O riginalclassifi cation 1 6 a 2001 22 D erivative classifi cation 2 1 2001 23 Classifi cation m arking in the 1 6 electronic environm ent 2001 24 Additionalrequirem ents 1 6 2001 25 D eclassifi cation m arkings 1 5 1 6 3 3 2001 26 Autom atic declassifi cation 3 3 exem ption m arkings 2001 30 Autom atic declassifi cation 3 3 3 7 2001 31 System atic declassifi cation 3 4 review 2001 32 D eclassifi cation guides 3 3 3 7 2001 33 M andatory review for 3 5 3 6 declassifi cation 2001 34 Referrals 3 3 3 6 3 7 2001 35 D iscretionary declassifi cation 3 1 2001 36 Classifi ed inform ation in the none custody of private organizations or individuals 2001 37 Assistance to the D epartm ent of none State 2001 40 G eneral 4 1 2001 41 Responsibilities of holders 4 1 2001 42 Standards for security equipm ent 4 1 2001 43 Storage 4 1 2001 44 Reciprocity of use and inspection 4 1 of facilities 2001 45 Inform ation controls 4 1 4 2 2001 46 Transm ission 4 1 4 2 2001 47 D estruction 4 1 4 2 2001 48 Loss possible com prom ise or 4 1 4 2 unauthorized disclosure 2001 49 Specialaccess program s 4 3 2001 50 Telecom m unications autom ated 4 1 4 2 inform ation system s and netw ork security 2001 51 Technicalsecurity 4 1 2001 52 Em ergency authority 4 2 2001 53 O pen storage areas 4 1 2001 54 Foreign governm ent inform ation 4 1 2001 55 Foreign disclosure of classifi ed 4 1 i 2 inform ation 2001 60 Self‐Inspections G eneral 5 4 2001 70 Security Education and Training 5 4 G eneral 2001 71 Coverage 1 3 d 2 1 d 3 7 b 4 1 b 5 4 d 3 2001 80 Prescribed standard form s 5 2 b 7 2001 90 Agency annualreporting 1 3 c 5 2 b 4 5 4 d 4 5 4 d 8 requirem ents 2001 91 O ther agency reporting 1 3 d 1 7 c 3 1 9 d 2 1 d 5 5 requirem ents 2001 92 D efi n itions 6 1 ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Subpart B‐‐Classifi cation Sec 2001 10 Classifi cation standards Identifying or describing dam age to the nationalsecurity Section 1 1 a of the O rder specifi es the conditions that m ust be m et w hen m aking classifi cation decisions Section 1 4 specifi es that inform ation shallnot be considered for classifi cation unless its unauthorized disclosure could reasonably be expected to cause identifi able or describable dam age to the nationalsecurity There is no requirem ent at the tim e of the decision for the originalclassifi cation authority to prepare a w ritten description of such dam age H ow ever the original classifi cation authority m ust be able to support the decision in w riting including identifying or describing the dam age should the classifi cation decision becom e the subject of a challenge or access dem and pursuant to the O rder or law Sec 2001 11 O riginalclassifi cation authority a G eneral Agencies shallestablish a training program for originalclassifi ers in accordance w ith subpart G of this part b Requests for originalclassifi cation authority Agencies not possessing such authority shallforw ard requests to the D irector of ISO O The agency head m ust m ake the request and shallprovide a specifi c justifi cation of the need for this authority The D irector of ISO O shallforw ard the request along w ith the D irector's recom m endation to the President through the N ationalSecurity Advisor w ithin 30 days Agencies w ishing to increase their assigned levelof originalclassifi cation authority shallforw ard requests in accordance w ith the procedures of this paragraph c Reporting delegations of originalclassifi cation authority All delegations of originalclassifi cation authority shallbe reported to the D irector of ISO O This can be accom plished by an initialsubm ission follow ed by updates on a frequency determ ined by the senior agency of f cial but at least annually i Page 37256 Sec 2001 12 D uration of classifi cation a D eterm ining duration of classifi cation for inform ation originally classifi ed under the O rder‐‐ 1 Establishing duration of classifi cation Except for inform ation that should clearly and dem onstrably be expected to revealthe identity of a confi d entialhum an source or a hum an intelligence source or key design concepts of w eapons of m ass destruction an originalclassifi cation authority shallfollow the sequence listed in paragraphs a 1 i ii and iii of this section w hen determ ining the duration of classifi cation for inform ation originally classifi ed under this O rder i The originalclassifi cation authority shallattem pt to determ ine a date or event that is less than 10 years from the date of originalclassifi cation and w hich coincides w ith the lapse of the inform ation's nationalsecurity sensitivity and shallassign such date or event as the declassifi cation instruction ii If unable to determ ine a date or event of less than 10 years the originalclassifi cation authority shallordinarily assign a declassifi cation date that is 10 years from the date of the original classifi cation decision iii If unable to determ ine a date or event of 10 years the originalclassifi cation authority shallassign a declassifi cation date not to exceed 25 years from the date of the originalclassifi cation decision 2 D uration of classifi cation of specialcategories of inform ation The only exceptions to the sequence in paragraph a 1 of this section are as follow s i If an originalclassifi cation authority is classifying inform ation that should clearly and dem onstrably be expected to reveal the identity of a confi d entialhum an source or a hum an intelligence source the duration shallbe up to 75 years and shallbe designated w ith the follow ing m arking 50X1‐H U M ''or ii If an originalclassifi cation authority is classifying inform ation that should clearly and dem onstrably be expected to reveal key design concepts of w eapons of m ass destruction the duration shall be up to 75 years and shallbe designated w ith the follow ing m arking 50X2‐W M D '' b Extending duration of classifi cation for inform ation classifi ed under the O rder Extensions of classifi cation are not autom atic If an originalclassifi cation authority w ith jurisdiction over the inform ation does not extend the classifi cation of inform ation assigned a date or event for declassifi cation the inform ation is autom atically declassifi ed upon the occurrence of the date or event 1 If the date or event assigned by the originalclassifi cation authority has not passed an originalclassifi cation authority w ith jurisdiction over the inform ation m ay extend the classifi cation duration of such inform ation for a period not to exceed 25 years from the date of origin of the record 2 If the date or event assigned by the originalclassifi cation authority has passed an originalclassifi cation authority w ith jurisdiction over the inform ation m ay reclassify the inform ation in accordance w ith the O rder and this D irective only if it m eets the standards for classifi cation under sections 1 1 and 1 5 of the O rder as w ellas section 3 3 of the O rder if appropriate 3 In allcases w hen extending the duration of classifi cation the originalclassifi cation authority m ust i Be an originalclassifi cation authority w ith jurisdiction over the inform ation ii Ensure that the inform ation continues to m eet the standards for classifi cation under the O rder and iii M ake reasonable attem pts to notify allknow n holders of the inform ation c D uration of inform ation classifi ed under prior orders‐‐ 1 Specifi c date or event U nless declassifi ed earlier inform ation m arked w ith a specifi c date or event for declassifi cation under a prior order is autom atically declassifi ed upon that date or event If the specifi c date or event has not passed an originalclassifi cation authority w ith jurisdiction over the inform ation m ay extend the duration in accordance w ith the requirem ents of paragraph b of this section If the date or event assigned by the originalclassifi cation authority has passed an originalclassifi cation authority w ith jurisdiction over the inform ation m ay only reclassify inform ation in accordance w ith the standards and procedures under the O rder and this D irective If the inform ation is contained in records determ ined to be perm anently valuable and the prescribed date or event w illtake place m ore than 25 years from the date of origin of the docum ent the declassifi cation of the inform ation w illinstead be subject to section 3 3 of the O rder 2 Indefi n ite duration of classifi cation For inform ation m arked w ith X1 X2 X3 X4 X5 X6 X7 or X8 O riginating Agency's D eterm ination Required''or its acronym O AD R '' M anualReview ''or its acronym M R '' D CIO nly '' D N IO nly ''and any other m arking indicating an indefi n ite duration of classifi cation under a prior order or in those cases w here a docum ent is m issing a required declassifi cation instruction or the instruction is not com plete i A declassifi cation authority as defi ned in section 3 1 b of the O rder m ay declassify it ii An originalclassifi cation authority w ith jurisdiction over the inform ation m ay re‐m ark the inform ation to establish a duration of classifi cation of no m ore than 25 years from the date of origin of the docum ent consistent w ith the requirem ents for inform ation originally classifi ed under the O rder as provided in paragraph a of this section or iii U nless declassifi ed earlier such inform ation contained in records determ ined to be perm anently valuable shallrem ain classifi ed for 25 years from the date of its origin at w hich tim e it w illbe subject to section 3 3 of the O rder 3 Release of im agery acquired by space‐based intelligence reconnaissance system s The duration of classifi cation of im agery as defi n ed in E O 12951 Release of Im agery Acquired by Space‐Based Intelligence Reconnaissance System s that is otherw ise m arked w ith an indefi n ite duration such as D CIO nly''or D N IO nly ''shallbe established by the D irector of N ationalIntelligence in accordance w ith E O 12951 and consistent w ith E O 13526 Any such inform ation shall be rem arked in accordance w ith instructions prescribed by the D irector of N ationalIntelligence Sec 2001 13 Classifi cation prohibitions and lim itations a D eclassifi cation w ithout proper authority C lassifi ed inform ation that has been declassifi ed w ithout proper authority as determ ined by an originalclassifi cation authority w ith jurisdiction over the inform ation rem ains classifi ed and adm inistrative action shallbe taken to restore m arkings and controls as appropriate All such determ inations shallbe reported to the senior agency of f cialw ho i shallprom ptly provide a w ritten report to the D irector of ISO O 1 If the inform ation at issue is in records in the physicaland legalcustody of the N ationalArchives and Records Adm inistration N ARA and has been m ade available to the public the original classifi cation authority w ith jurisdiction over the inform ation shall as part of determ ining w hether the restoration of m arkings and controls is appropriate consider w hether the rem ovalof the inform ation from public purview w illsignifi cantly m itigate the Page 37257 harm to nationalsecurity or otherw ise draw undue attention to the inform ation at issue W ritten notifi cation classifi ed w hen appropriate under the O rder shallbe m ade to the Archivist w hich shallinclude a description of the record s at issue the elem ents of inform ation that are classifi ed the duration of classifi cation and the specifi c authority for continued classifi cation If the inform ation at issue is m ore than 25 years of age and the Archivist does not agree w ith the decision the inform ation shallnonetheless be tem porarily w ithdraw n from public access and shallbe referred to the D irector of ISO O for resolution in collaboration w ith aff ected parties b Reclassifi cation after declassifi cation and release to the public under proper authority In m aking the decision to reclassify inform ation that has been declassifi ed and released to the public under proper authority the agency head m ust approve in w riting a determ ination on a docum ent‐by‐docum ent basis that the reclassifi cation is required to prevent signifi cant and dem onstrable dam age to the nationalsecurity As part of m aking such a determ ination the follow ing shallapply 1 The inform ation m ust be reasonably recoverable w ithout bringing undue attention to the inform ation w hich m eans that i M ost individualrecipients or holders are know n and can be contacted and allinstances of the inform ation to be reclassifi ed w ill not be m ore w idely dissem inated ii If the inform ation has been m ade available to the public via a m eans such as G overnm ent archives or reading room consideration is given to length of tim e the record has been available to the public the extent to w hich the record has been accessed for research and the extent to w hich the record and or classifi ed inform ation at issue has been copied referenced or publicized and iii If the inform ation has been m ade available to the public via electronic m eans such as the internet consideration is given as to the num ber of tim es the inform ation w as accessed the form of access and w hether the inform ation at issue has been copied referenced or publicized 2 If the reclassifi cation concerns a record in the physical custody of N ARA and has been available for public use reclassifi cation requires notifi cation to the Archivist and approvalby the D irector of ISO O 3 Any recipients or holders of the reclassifi ed inform ation w ho have current security clearances shallbe appropriately briefed about their continuing legalobligations and responsibilities to protect this inform ation from unauthorized disclosure The recipients or holders w ho do not have security clearances shall to the extent practicable be appropriately briefed about the reclassifi cation of the inform ation that they have had access to their obligation not to disclose the inform ation and be requested to sign an acknow ledgem ent of this briefi n g 4 The reclassifi ed inform ation m ust be appropriately m arked in accordance w ith section 2001 24 l and safeguarded The m arkings should include the authority for and the date of the reclassifi cation action 5 O nce the reclassifi cation action has occurred it m ust be reported to the N ationalSecurity Advisor and to the D irector of ISO O by the agency head or senior agency of f cialw ithin 30 days The i notifi cation m ust include details concerning paragraphs b 1 and 3 of this section c Classifi cation by com pilation A determ ination that inform ation is classifi ed through the com pilation of unclassifi ed inform ation is a derivative classifi cation action based upon existing original classifi cation guidance If the com pilation of unclassifi ed inform ation reveals a new aspect of inform ation that m eets the criteria for classifi cation it shallbe referred to an originalclassifi cation authority w ith jurisdiction over the inform ation to m ake an original classifi cation decision Sec 2001 14 Classifi cation challenges a Challenging classifi cation Authorized holders including authorized holders outside the classifying agency w ho w ant to challenge the classifi cation status of inform ation shallpresent such challenges to an originalclassifi cation authority w ith jurisdiction over the inform ation An authorized holder is any individualw ho has been granted access to specifi c classifi ed inform ation in accordance w ith the provisions of the O rder to include the specialconditions set forth in section 4 1 h of the O rder A form alchallenge under this provision m ust be in w riting but need not be any m ore specifi c than to question w hy inform ation is or is not classifi ed or is classifi ed at a certain level b Agency procedures 1 Because the O rder encourages authorized holders to challenge classifi cation as a m eans for prom oting proper and thoughtfulclassifi cation actions agencies shallensure that no retribution is taken against any authorized holders bringing such a challenge in good faith 2 Agencies shallestablish a system for processing tracking and recording form alclassifi cation challenges m ade by authorized holders Agencies shallconsider classifi cation challenges separately from Freedom of Inform ation Act or other access requests and shallnot process such challenges in turn w ith pending access requests 3 The agency shallprovide an initialw ritten response to a challenge w ithin 60 days If the agency is unable to respond to the challenge w ithin 60 days the agency m ust acknow ledge the challenge in w riting and provide a date by w hich the agency w illrespond The acknow ledgm ent m ust include a statem ent that if no agency response is received w ithin 120 days the challenger has the right to forw ard the challenge to the Interagency Security Classifi cation Appeals Panel Panel for a decision The challenger m ay also forw ard the challenge to the Panelif an agency has not responded to an internalappeal w ithin 90 days of the agency's receipt of the appeal Agency responses to those challenges it denies shallinclude the challenger's appeal rights to the Panel 4 W henever an agency receives a classifi cation challenge to inform ation that has been the subject of a challenge w ithin the past tw o years or that is the subject of pending litigation the agency is not required to process the challenge beyond inform ing the challenger of this fact and of the challenger's appealrights if any c Additionalconsiderations 1 Challengers and agencies shall attem pt to keep allchallenges appeals and responses unclassifi ed H ow ever classifi ed inform ation contained in a challenge an agency response or an appealshallbe handled and protected in accordance w ith the O rder and this D irective Inform ation being challenged for classifi cation shallrem ain classifi ed unless and untila fi n al decision is m ade to declassify it 2 The classifi cation challenge provision is not intended to prevent an authorized holder from inform ally questioning the classifi cation status of particular inform ation Such inform al inquiries should be encouraged as a m eans of holding dow n the num ber of form alchallenges and to ensure the integrity of the classifi cation process Sec 2001 15 Classifi cation guides a Preparation of classifi cation guides O riginators of classifi cation guides are encouraged to consult users of guides for input w hen developing or updating guides W hen possible originators of classifi cation guides are encouraged to com m unicate w ithin their agencies and w ith other agencies Page 37258 that are developing guidelines for sim ilar activities to ensure the consistency and uniform ity of classifi cation decisions Each agency shallm aintain a list of its classifi cation guides in use b G eneralcontent of classifi cation guides Classifi cation guides shall at a m inim um 1 Identify the subject m atter of the classifi cation guide 2 Identify the originalclassifi cation authority by nam e and position or personalidentifi er 3 Identify an agency point‐of‐contact or points‐of‐contact for questions regarding the classifi cation guide 4 Provide the date of issuance or last review 5 State precisely the elem ents of inform ation to be protected 6 State w hich classifi cation levelapplies to each elem ent of inform ation and w hen useful specify the elem ents of inform ation that are unclassifi ed 7 State w hen applicable specialhandling caveats 8 State a concise reason for classifi cation w hich at a m inim um cites the applicable classifi cation category or categories in section 1 4 of the O rder and 9 Prescribe a specifi c date or event for declassifi cation the m arking 50X1‐H U M ''or 50X2‐W M D ''as appropriate or one or m ore of the exem ption codes listed in 2001 26 a 2 provided that i The exem ption has been approved by the Panelunder section 3 3 j of the O rder ii The Panelis notifi ed of the intent to take such actions for specifi c inform ation in advance of approvaland the inform ation rem ains in active use and iii The exem ption code is accom panied w ith a declassifi cation date or event that has been approved by the Panel c D issem ination of classifi cation guides Classifi cation guides shallbe dissem inated as necessary to ensure the proper and uniform derivative classifi cation of inform ation d Review ing and updating classifi cation guides 1 Agencies shallincorporate originalclassifi cation decisions into classifi cation guides as soon as practicable 2 O riginators of classifi cation guides are encouraged to consult the users of guides and other subject m atter experts w hen review ing or updating guides Also users of classifi cation guides are encouraged to notify the originator of the guide w hen they acquire inform ation that suggests the need for change in the instructions contained in the guide Sec 2001 16 Fundam entalclassifi cation guidance review a Perform ance of fundam entalclassifi cation guidance review s An initialfundam entalclassifi cation guidance review shallbe com pleted by every agency w ith originalclassifi cation authority and w hich authors security classifi cation guides no later than June 27 2012 Agencies shallconduct fundam entalclassifi cation guidance review s on a periodic basis thereafter The frequency of the review s shallbe determ ined by each agency considering factors such as the num ber of classifi cation guides and the volum e and type of inform ation they cover H ow ever a review shallbe conducted at least once every fi ve years b Coverage of review s At a m inim um the fundam ental classifi cation guidance review shallfocus on 1 Evaluation of content i D eterm ining if the guidance conform s to current operationaland technicalcircum stances and ii D eterm ining if the guidance m eets the standards for classifi cation under section 1 4 of the O rder and an assessm ent of likely dam age under section 1 2 of the O rder and 2 Evaluation of use i D eterm ining if the dissem ination and availability of the guidance is appropriate tim ely and eff ective and ii An exam ination of recent classifi cation decisions that focuses on ensuring that classifi cation decisions refl ect the intent of the guidance as to w hat is classifi ed the appropriate level the duration and associated m arkings c Participation in review s The agency head or senior agency of f cialshalldirect the conduct of a fundam entalclassifi i cation guidance review and shallensure the appropriate agency subject m atter experts participate to obtain the broadest possible range of perspectives To the extent practicable input should also be obtained from externalsubject m atter experts and externalusers of the review ing agency's classifi cation guidance and decisions d Reports on results Agency heads shallprovide a detailed report sum m arizing the results of each classifi cation guidance review to ISO O and release an unclassifi ed version to the public except w hen the existence of the guide or program is itself classifi ed Subpart C‐‐Identifi cation and M arkings Sec 2001 20 G eneral A uniform security classifi cation system requires that standard m arkings or other indicia be applied to classifi ed inform ation Except in extraordinary circum stances or as approved by the D irector of ISO O the m arking of classifi ed inform ation shallnot deviate from the follow ing prescribed form ats If m arkings cannot be af f xed to specifi i c classifi ed inform ation or m aterials the originator shallprovide holders or recipients of the inform ation w ith w ritten instructions for protecting the inform ation M arkings shallbe uniform ly and conspicuously applied to leave no doubt about the classifi ed status of the inform ation the levelof protection required and the duration of classifi cation Sec 2001 21 O riginalclassifi cation a Prim ary m arkings At the tim e of originalclassifi cation the follow ing shallbe indicated in a m anner that is im m ediately apparent 1 Classifi cation authority The nam e and position or personal identifi er of the originalclassifi cation authority shallappear on the Classifi ed By''line An exam ple m ight appear as Classifi ed By D avid Sm ith Chief D ivision 5 or Classifi ed By ID IM N O 1 2 Agency and of f ce of origin If not otherw ise evident the i agency and of f ce of origin shallbe identifi i ed and follow the nam e on the Classifi ed By''line An exam ple m ight appear as Classifi ed By D avid Sm ith Chief D ivision 5 D epartm ent of G ood W orks O f f ce of Adm inistration i 3 Reason for classifi cation The originalclassifi cation authority shallidentify the reason s for the decision to classify The originalclassifi cation authority shallinclude on the Reason'' line the num ber 1 4 plus the letter s that corresponds to that classifi cation category in section 1 4 of the O rder i These categories as they appear in the O rder are as follow s A M ilitary plans w eapons system s or operations B Foreign governm ent inform ation C Intelligence activities including covert action intelligence sources or m ethods or cryptology D Foreign relations or foreign activities of the U nited States including confi d entialsources E Scientifi c technological or econom ic m atters relating to the nationalsecurity F U nited States G overnm ent program s for safeguarding nuclear m aterials or facilities G Vulnerabilities or capabilities of system s installations infrastructures projects plans or protection services relating to the nationalsecurity or Page 37259 H The developm ent production or use of w eapons of m ass destruction ii An exam ple m ight appear as Classifi ed By D avid Sm ith Chief D ivision 5 D epartm ent of G ood W orks O f f ce of Adm inistration Reason 1 4 g i 4 D eclassifi cation instructions The duration of the original classifi cation decision shallbe placed on the D eclassify O n''line W hen declassifi cation dates are displayed num erically the follow ing form at shallbe used YYYYM M D D Events m ust be reasonably defi nite and foreseeable The originalclassifi cation authority w illapply one of the follow ing instructions i A date or event for declassifi cation that corresponds to the lapse of the inform ation's nationalsecurity sensitivity w hich is equalto or less than 10 years from the date of the originaldecision The duration of classifi cation w ould be m arked as Classifi ed By D avid Sm ith Chief D ivision 5 D epartm ent of G ood W orks O f f ce of Adm inistration i Reason 1 4 g D eclassify O n 20201014 or D eclassify O n Com pletion of O peration ii A date not to exceed 25 years from the date of the original decision For exam ple on a docum ent that contains inform ation classifi ed on O ctober 10 2010 apply a date up to 25 years on the D eclassify O n''line Classifi ed By D avid Sm ith Chief D ivision 5 D epartm ent of G ood W orks O f f ce of Adm inistration i Reason 1 4 g D eclassify O n 20351010 iii If the classifi ed inform ation should clearly and dem onstrably be expected to revealthe identity of a confi d entialhum an source or a hum an intelligence source no date or event is required and the m arking 50X1‐H U M ''shallbe used in the D eclassify O n''line or iv If the classifi ed inform ation should clearly and dem onstrably be expected to revealkey design concepts of w eapons of m ass destruction no date or event is required and the m arking 50X2‐W M D '' shallbe used in the D eclassify O n''line b O verallm arking The highest levelof classifi cation is determ ined by the highest levelof any one portion w ithin the docum ent and shallappear in a w ay that w illdistinguish it clearly from the inform ationaltext 1 Conspicuously place the overallclassifi cation at the top and bottom of the outside of the front cover if any on the title page if any on the fi rst page and on the outside of the back cover if any 2 For docum ents containing inform ation classifi ed at m ore than one level the overallm arking shallbe the highest level For exam ple if a docum ent contains som e inform ation m arked Secret''and other inform ation m arked Confi d ential ''the overallm arking w ould be Secret '' 3 Each interior page of a classifi ed docum ent shallbe m arked at the top and bottom either w ith the highest levelof classifi cation of inform ation contained on that page including the designation U nclassifi ed''w hen it is applicable or w ith the highest overall classifi cation of the docum ent c Portion m arking Each portion of a docum ent ordinarily a paragraph but including subjects titles graphics tables charts bullet statem ents sub‐paragraphs classifi ed signature blocks bullets and other portions w ithin slide presentations and the like shallbe m arked to indicate w hich portions are classifi ed and w hich portions are unclassifi ed by placing a parentheticalsym bolim m ediately preceding the portion to w hich it applies 1 To indicate the appropriate classifi cation level the sym bols TS ''for Top Secret S ''for Secret and C ''for Confi d entialw illbe used 2 Portions w hich do not m eet the standards of the O rder for classifi cation shallbe m arked w ith U ''for U nclassifi ed 3 In cases w here portions are segm ented such as paragraphs sub‐ paragraphs bullets and sub‐bullets and the classifi cation levelis the sam e throughout it is suf f cient to put only one portion m arking i at the beginning of the m ain paragraph or m ain bullet If there are diff erent levels of classifi cation am ong these segm ents then all segm ents shallbe portion m arked separately in order to avoid over‐ classifi cation of any one segm ent If the inform ation contained in a sub‐paragraph or sub‐bullet is a higher levelof classifi cation than its parent paragraph or parent bullet this does not m ake the parent paragraph or parent bullet classifi ed at that sam e level Each portion shallrefl ect the classifi cation levelof that individualportion and not any other portions At the sam e tim e any portion no m atter w hat its status is stillcapable of determ ining the overallclassifi cation of the docum ent d D issem ination controland handling m arkings M any agencies require additionalcontroland handling m arkings that supplem ent the overallclassifi cation m arkings See Sec 2001 24 j for specifi c guidance e D ate of origin of docum ent The date of origin of the docum ent shallbe indicated in a m anner that is im m ediately apparent Sec 2001 22 D erivative classifi cation a G eneral Inform ation classifi ed derivatively on the basis of source docum ents or classifi cation guides shallbear allm arkings prescribed in Sec 2001 20 and Sec 2001 21 except as provided in this section Inform ation for these m arkings shallbe carried forw ard from the source docum ent or taken from instructions in the appropriate classifi cation guide b Identity of persons w ho apply derivative classifi cation m arkings D erivative classifi ers shallbe identifi ed by nam e and position or by personalidentifi er in a m anner that is im m ediately apparent on each derivatively classifi ed docum ent If not otherw ise evident the agency and of f ce of origin shallbe identifi i ed and follow the nam e on the Classifi ed By''line An exam ple m ight appear as Classifi ed By Peggy Jones Lead Analyst Research and Analysis D ivision or Classifi ed By ID IM N 01 c Source of derivative classifi cation 1 The derivative classifi er shallconcisely identify the source docum ent or the classifi cation guide on the D erived From ''line including the agency and w here available the of f ce of origin and the date of the source i or guide An exam ple m ight appear as D erived From M em o Funding Problem s ''O ctober 20 2008 O f f ce i of Adm inistration D epartm ent of G ood W orks or D erived From CG N o 1 D epartm ent of G ood W orks dated O ctober 20 2008 i W hen a docum ent is classifi ed derivatively on the basis of m ore than one source docum ent or classifi cation guide the D erived From '' line shallappear as D erived From M ultiple Sources ii The derivative classifi er shallinclude a listing of the source m aterials on or attached to each derivatively classifi ed docum ent 2 A docum ent derivatively classifi ed on the basis of a source docum ent that is itself m arked M ultiple Sources''shallcite the source docum ent on its D erived From ''line rather than the term M ultiple Sources ''An exam ple m ight appear as D erived From Report entitled N ew W eapons ''dated O ctober 20 2009 D epartm ent of G ood W orks O f f ce of Adm inistration i d Reason for classifi cation The reason for the original classifi cation decision as refl ected in the source docum ent s or classifi cation guide is Page 37260 not transferred in a derivative classifi cation action e D eclassifi cation instructions 1 The derivative classifi er shallcarry forw ard the instructions on the D eclassify O n''line from the source docum ent to the derivative docum ent or the duration instruction from the classifi cation or declassifi cation guide unless it contains one of the declassifi cation instructions as listed in paragraph e 3 of this section If the source docum ent is m issing the declassifi cation instruction then a calculated date of 25 years from the date of the source docum ent if available or the current date if the source docum ent date is not available shallbe carried forw ard by the derivative classifi er 2 W hen a docum ent is classifi ed derivatively on the basis of m ore than one source docum ent or m ore than one elem ent of a classifi cation guide the D eclassify O n''line shallrefl ect the longest duration of any of its sources 3 W hen a docum ent is classifi ed derivatively either from a source docum ent s or a classifi cation guide that contains one of the follow ing declassifi cation instructions O riginating Agency's D eterm ination Required '' O AD R ''or M anualReview '' M R ''or any of the exem ption m arkings X1 X2 X3 X4 X5 X6 X7 and X8 the derivative classifi er shallcalculate a date that is 25 years from the date of the source docum ent w hen determ ining a derivative docum ent's date or event to be placed in the D eclassify O n''line i If a docum ent is m arked w ith the declassifi cation instructions D CIO nly''or D N IO nly''and does not contain inform ation described in E O 12951 Release of Im agery Acquired by Space‐Based N ational Intelligence Reconnaissance System s ''the derivative classifi er shall calculate a date that is 25 years from the date of the source docum ent w hen determ ining a derivative docum ent's date or event to be placed in the D eclassify O n''line ii If a docum ent is m arked w ith D CIO nly''or D N IO nly''and the inform ation is subject to E O 12951 the derivative classifi er shalluse a date or event as prescribed by the D irector of N ational Intelligence 4 W hen determ ining the m ost restrictive declassifi cation instruction am ong m ultiple source docum ents adhere to the follow ing hierarchy for determ ining the declassifi cation instructions for the D eclassify O n''line i 50X1‐H U M or 50X2‐W M D or an ISO O ‐approved designator refl ecting the Panelapprovalfor classifi cation beyond 50 years in accordance w ith section 3 3 h 2 of the O rder ii 25X1 through 25X9 w ith a date or event iii A specifi c declassifi cation date or event w ithin 25 years iv Absent guidance from an originalclassifi cation authority w ith jurisdiction over the inform ation a calculated 25‐year date from the date of the source docum ent 5 W hen declassifi cation dates are displayed num erically the follow ing form at shallbe used YYYYM M D D f O verallm arking The derivative classifi er shallconspicuously m ark the classifi ed docum ent w ith the highest levelof classifi cation of inform ation included in the docum ent as provided in Sec 2001 21 b g Portion m arking Each portion of a derivatively classifi ed docum ent shallbe m arked im m ediately preceding the portion to w hich it applies in accordance w ith its source and as provided in Sec 2001 21 c h D issem ination controland handling m arkings M any agencies require additionalcontroland handling m arkings that supplem ent the overallclassifi cation m arkings See Sec 2001 24 j for specifi c guidance i D ate of origin of docum ent The date of origin of the docum ent shallbe indicated in a m anner that is im m ediately apparent Sec 2001 23 Classifi cation m arking in the electronic environm ent a G eneral Classifi ed nationalsecurity inform ation in the electronic environm ent shallbe 1 Subject to allrequirem ents of the O rder 2 M arked w ith proper classifi cation m arkings to the extent that such m arking is practical including portion m arking overall classifi cation Classifi ed By '' D erived From '' Reason''for classifi cation originally classifi ed inform ation only and D eclassify O n '' 3 M arked w ith proper classifi cation m arkings w hen appearing in an electronic output e g database query in w hich users of the inform ation w illneed to be alerted to the classifi cation status of the inform ation 4 M arked in accordance w ith derivative classifi cation procedures m aintaining traceability of classifi cation decisions to the original classifi cation authority In cases w here classifi ed inform ation in an electronic environm ent cannot be m arked in this m anner a w arning shall be applied to alert users that the inform ation m ay not be used as a source for derivative classifi cation and providing a point of contact and instructions for users to receive further guidance on the use and classifi cation of the inform ation 5 Prohibited from use as source of derivative classifi cation if it is dynam ic in nature e g w ikis and blogs and w here inform ation is not m arked in accordance w ith the O rder b M arkings on classifi ed e‐m ailm essages 1 E‐m ailtransm itted on or prepared for transm ission on classifi ed system s or netw orks shall be confi gured to display the overallclassifi cation at the top and bottom of the body of each m essage The overallclassifi cation m arking string for the e‐m ailshallrefl ect the classifi cation of the header and body of the m essage This includes the subject line the text of the e‐m ail a classifi ed signature block attachm ents included m essages and any other inform ation conveyed in the body of the e‐m ail A single linear text string show ing the overallclassifi cation and m arkings shallbe included in the fi rst line of text and at the end of the body of the m essage after the signature block 2 Classifi ed e‐m ailshallbe portion m arked Each portion shall be m arked to refl ect the highest levelof inform ation contained in that portion A text portion containing a uniform resource locator U R L or reference i e link to another docum ent shallbe portion m arked based on the classifi cation of the content of the U RL or link text even if the content to w hich it points refl ects a higher classifi cation m arking 3 A classifi ed signature block shallbe portion m arked to refl ect the highest classifi cation levelm arkings of the inform ation contained in the signature block itself 4 Subject lines shallbe portion m arked to refl ect the sensitivity of the inform ation in the subject line itself and shallnot refl ect any classifi cation m arkings for the e‐m ailcontent or attachm ents Subject lines and titles shallbe portion m arked before the subject or title 5 For a classifi ed e‐m ail the classifi cation authority block shallbe placed after the signature block but before the overall classifi cation m arking string at the end of the e‐m ail These blocks m ay appear as single linear text strings instead of the traditional appearance of three lines of text 6 W hen forw arding or replying to an e‐m ail individuals shall ensure that in addition to the m arkings required for the content of the reply or forw ard e‐m ailitself the m arkings shallrefl ect the overallclassifi cation and declassifi cation instructions for the entire string of e‐m ails and attachm ents This w illinclude any new ly drafted m aterial m aterialreceived from previous senders and any attachm ents Page 37261 c M arking W eb pages w ith classifi ed content 1 W eb pages shall be classifi ed and m arked on their ow n content regardless of the classifi cation of the pages to w hich they link Any presentation of inform ation to w hich the w eb m aterials link shallalso be m arked based on its ow n content 2 The overallclassifi cation m arking string for every w eb page shallrefl ect the overallclassifi cation m arkings and any dissem ination controlor handling m arkings for the inform ation on that page Linear text appearing on both the top and bottom of the page is acceptable 3 If any graphicalrepresentation is utilized a text equivalent of the overallclassifi cation m arking string shallbe included in the hypertext statem ent and page m etadata This w illenable users w ithout graphic display to be aw are of the classifi cation levelof the page and allow s for the use of text translators 4 Classifi ed W eb pages shallbe portion m arked Each portion shallbe m arked to refl ect the highest levelof inform ation contained in that portion A portion containing a U RL or reference to another docum ent shallbe portion m arked based on the classifi cation of the content of the U RL itself even if the content to w hich it points refl ects a higher classifi cation m arking 5 Classifi ed W eb pages shallinclude the classifi cation authority block on either the top or bottom of the page These blocks m ay appear as single linear text strings instead of the traditionalappearance of three lines of text 6 Electronic m edia fi les such as video audio im ages or slides shallcarry the overallclassifi cation and classifi cation authority block unless the addition of such inform ation w ould render them inoperable In such cases another procedure shallbe used to ensure recipients are aw are of the classifi cation status of the inform ation and the declassifi cation instructions d M arking classifi ed U RLs U RLs provide unique addresses in the electronic environm ent for w eb content and shallbe portion m arked based on the classifi cation of the content of the U RL itself The U RL shallnot be portion m arked to refl ect the classifi cation of the content to w hich it points U RLs shallbe developed at an unclassifi ed levelw henever possible W hen a U RL is classifi ed a classifi cation portion m ark shallbe used in the text of the U RL string in a w ay that does not m ake the U RL inoperable to identify the U RL as a classifi ed portion in any textualreferences to that U RL An exam ple m ay appear as http w w w center xyz SECRET fi lenam e_ S htm l http w w w center xyz fi lenam e2_ TS htm l http w w w center xyz fi lenam e_ TS N F htm l e M arking classifi ed dynam ic docum ents and relationaldatabases 1 A dynam ic page contains electronic inform ation derived from a changeable source or ad hoc query such as a relationaldatabase The classifi cation levels of inform ation returned m ay vary depending upon the specifi c request 2 If there is a m echanism for determ ining the actual classifi cation m arkings for dynam ic docum ents the appropriate classifi cation m arkings shallbe applied to and displayed on the docum ent If such a m echanism does not exist the default should be the highest levelof inform ation in the database and a w arning shallbe applied at the top of each page of the docum ent Such content shallnot be used as a basis for derivative classifi cation An exam ple of such an applied w arning m ay appear as This content is classifi ed at the insert system ‐high classifi cation level leveland m ay contain elem ents of inform ation that are unclassifi ed or classifi ed at a low er levelthan the overallclassifi cation displayed This content m ay not be used as a source of derivative classifi cation refer instead to the pertinent classifi cation guide s 3 This w illalert the users of the inform ation that there m ay be elem ents of inform ation that m ay be either unclassifi ed or classifi ed at a low er levelthan the highest possible classifi cation of the inform ation returned U sers shallbe encouraged to m ake further inquiries concerning the status of individualelem ents in order to avoid unnecessary classifi cation and or im pedim ents to inform ation sharing Resources such as classifi cation guides and points of contact shallbe established to assist w ith these inquiries 4 U sers developing a docum ent based on query results from a database m ust properly m ark the docum ent in accordance w ith Sec 2001 22 If there is doubt about the correct m arkings users should contact the database originating agency for guidance f M arking classifi ed bulletin board postings and blogs 1 A blog an abbreviation of the term w eb log ''is a W eb site consisting of a series of entries often com m entary description of events or other m aterialsuch as graphics or video created by the sam e individualas in a journalor by m any individuals W hile the content of the overallblog is dynam ic entries are generally static in nature 2 The overallclassifi cation m arking string for every bulletin board or blog shallrefl ect the overallclassifi cation m arkings for the highest levelof inform ation allow ed in that space Linear text appearing on both the top and bottom of the page is acceptable 3 Subject lines of bulletin board postings blog entries or com m ents shallbe portion m arked to refl ect the sensitivity of the inform ation in the subject line itself not the content of the post 4 The overallclassifi cation m arking string for the bulletin board posting blog entry or com m ent shallrefl ect the classifi cation m arkings for the subject line the text of the posting and any other inform ation in the posting These strings shallbe entered m anually or utilizing an electronic classifi cation toolin the fi rst line of text and at the end of the body of the posting These strings m ay appear as single linear text 5 Bulletin board postings blog entries or com m ents shallbe portion m arked Each portion shallbe m arked to refl ect the highest levelof inform ation contained in that portion g M arking classifi ed w ikis 1 Initialw ikisubm issions shall include the overallclassifi cation m arking string portion m arking and the classifi cation authority block string in the sam e m anner as m entioned above for bulletin boards and blogs Allof these strings m ay appear as single line text 2 W hen users m odify existing entries w hich alter the classifi cation levelof the content or add new content they shall change the required m arkings to refl ect the classifi cation m arkings for the resulting inform ation System s shallprovide a m eans to log the identity of each user the changes m ade and the tim e and date of each change 3 W ikiarticles and entries shallbe portion m arked Each portion shallbe m arked to refl ect the highest levelof inform ation contained in that portion h Instant m essaging chat and chat room s 1 Instant m essages and chat conversations generally consist of brief textualm essages but m ay also include U RLs im ages or graphics Chat discussions captured for retention or printing shallbe m arked at the top and bottom of each page w ith the overallclassifi cation refl ecting allof the inform ation w ithin the discussion and for classifi ed discussions portion m arkings and the classifi cation authority block string shallalso appear 2 Chat room s shalldisplay system ‐high overallclassifi cation m arkings and shallcontain instructions inform ing users that the inform ation m ay not be used as a source for derivative classifi cation unless it is portion m arked contains an overall Page 37262 classifi cation m arking and a classifi cation authority block i Attached fi les W hen fi les are attached to another electronic m essage or docum ent the overallclassifi cation of the m essage or docum ent shallaccount for the classifi cation levelof the attachm ent and the m essage or docum ent shallbe m arked in accordance w ith Sec 2001 24 b ii Reserved Sec 2001 24 Additionalrequirem ents a M arking prohibitions M arkings other than Top Secret '' Secret ''and Confi d ential''shallnot be used to identify classifi ed nationalsecurity inform ation b Transm ittaldocum ents A transm ittaldocum ent shallindicate on its face the highest classifi cation levelof any classifi ed inform ation attached or enclosed The transm ittalshallalso include conspicuously on its face the follow ing or sim ilar instructions as appropriate U nclassifi ed W hen Classifi ed Enclosure Rem oved or U pon Rem ovalof Attachm ents This D ocum ent is Classifi cation Level c Foreign governm ent inform ation U nless otherw ise evident docum ents that contain foreign governm ent inform ation should include the m arking This D ocum ent Contains indicate country of origin Inform ation ''Agencies m ay also require that the portions of the docum ents that contain the foreign governm ent inform ation be m arked to indicate the governm ent and classifi cation level using accepted country code standards e g Country code‐‐C ''If the identity of the specifi c governm ent m ust be concealed the docum ent shallbe m arked This D ocum ent Contains Foreign G overnm ent Inform ation ''and pertinent portions shallbe m arked FG I''together w ith the classifi cation level e g FG I‐C ''In such cases a separate record that identifi es the foreign governm ent shallbe m aintained in order to facilitate subsequent declassifi cation actions If the fact that inform ation is foreign governm ent inform ation m ust be concealed the m arkings described in this paragraph shallnot be used and the docum ent shallbe m arked as if it w ere w holly of U S origin W hen classifi ed records are transferred to N ARA for storage or archival purposes the accom panying docum entation shall at a m inim um identify the boxes that contain foreign governm ent inform ation d W orking papers A w orking paper is defi n ed as docum ents or m aterials regardless of the m edia w hich are expected to be revised prior to the preparation of a fi n ished product for dissem ination or retention W orking papers containing classifi ed inform ation shallbe dated w hen created m arked w ith the highest classifi cation of any inform ation contained in them protected at that level and if otherw ise appropriate destroyed w hen no longer needed W hen any of the follow ing conditions applies w orking papers shallbe controlled and m arked in the sam e m anner prescribed for a fi n ished docum ent at the sam e classifi cation level 1 Released by the originator outside the originating activity 2 Retained m ore than 180 days from the date of origin or 3 Filed perm anently e O ther m aterial Bulky m aterial equipm ent and facilities etc shallbe clearly identifi ed in a m anner that leaves no doubt about the classifi cation status of the m aterial the levelof protection required and the duration of classifi cation U pon a fi n ding that identifi cation w ould itself revealclassifi ed inform ation such identifi cation is not required Supporting docum entation for such a fi n ding m ust be m aintained in the appropriate security facility f U nm arked m aterials Inform ation contained in unm arked records or presidentialor related m aterials and w hich pertains to the nationaldefense or foreign relations of the U nited States created m aintained and protected as classifi ed inform ation under prior orders shallcontinue to be treated as classifi ed inform ation under the O rder and is subject to its provisions regarding declassifi cation g Classifi cation by com pilation aggregation Com pilation of item s that are individually unclassifi ed m ay be classifi ed if the com piled inform ation m eets the standards established in section 1 2 of the O rder and reveals an additionalassociation or relationship as determ ined by the originalclassifi cation authority Any unclassifi ed portions w ill be portion m arked U w hile the overallm arkings w illrefl ect the classifi cation of the com piled inform ation even if allthe portions are m arked U In any such situation clear instructions m ust appear w ith the com piled inform ation as to the circum stances under w hich the individualportions constitute a classifi ed com pilation and w hen they do not h Com m ingling of Restricted D ata RD and Form erly Restricted D ata FRD w ith inform ation classifi ed under the O rder 1 To the extent practicable the com m ingling in the sam e docum ent of RD or FRD w ith inform ation classifi ed under the O rder should be avoided W hen it is not practicable to avoid such com m ingling the m arking requirem ents in the O rder and this D irective as w ellas the m arking requirem ents in 10 CFR part 1045 N uclear Classifi cation and D eclassifi cation m ust be follow ed 2 Autom atic declassifi cation of docum ents containing RD or FRD is prohibited D ocum ents m arked as containing RD or FRD are excluded from the autom atic declassifi cation provisions of the O rder untilthe R D or FRD designation is properly rem oved by the D epartm ent of Energy W hen the D epartm ent of Energy determ ines that an RD or FRD designation m ay be rem oved any rem aining inform ation classifi ed under the O rder m ust be referred to the appropriate agency in accordance w ith the declassifi cation provisions of the O rder and this D irective 3 For com m ingled docum ents the D eclassify O n''line required by the O rder and this D irective shallnot include a declassifi cation date or event and shallinstead be annotated w ith N ot Applicable or N A to RD FRD portions''and See source list for N SIportions ''The source list as described in Sec 2001 22 c 1 ii shallinclude the declassifi cation instruction for each of the source docum ents classifi ed under the O rder and shallnot appear on the front page of the docum ent 4 If an RD or FRD portion is extracted for use in a new docum ent the requirem ents of 10 CFR part 1045 m ust be follow ed 5 If a portion classifi ed under the O rder is extracted for use in a new docum ent the requirem ents of the O rder and this D irective m ust be follow ed The declassifi cation date for the extracted portion shall be determ ined by using the source list required by Sec 2001 22 c 1 ii the pertinent classifi cation guide or consultation w ith the originalclassifi cation authority w ith jurisdiction for the inform ation H ow ever if a com m ingled docum ent is not portion m arked it shallnot be used as a source for a derivatively classifi ed docum ent 6 If a com m ingled docum ent is not portion m arked based on appropriate authority annotating the source list w ith the declassifi cation instructions and including the D eclassify on''line in accordance w ith paragraph h 3 of this section are not required The lack of declassifi cation instructions does not elim inate the requirem ent to process com m ingled docum ents for declassifi cation in accordance w ith the O rder this D irective the Atom ic Energy Page 37263 Act or 10 C FR part 1045 w hen they are requested under statute or the O rder i Transclassifi ed Foreign N uclear Inform ation TFN I 1 As perm itted under 42 U S C 2162 e the D epartm ent of Energy shall rem ove from the Restricted D ata category such inform ation concerning the atom ic energy program s of other nations as the Secretary of Energy and the D irector of N ationalIntelligence jointly determ ine to be necessary to carry out the provisions of 50 U S C 403 and 403‐1 and safeguarded under applicable Executive orders as N ationalSecurity Inform ation''under a process called transclassifi cation 2 W hen Restricted D ata inform ation is transclassifi ed and is safeguarded as N ationalSecurity Inform ation ''it shallbe handled protected and classifi ed in conform ity w ith the provisions of the O rder and this D irective Such inform ation shallbe labeled as TFN I'' and w ith any additionalidentifi ers prescribed by the D epartm ent of Energy The label TFN I''shallbe included on docum ents to indicate the inform ation's transclassifi cation from the Restricted D ata category and its declassifi cation process governed by the Secretary of Energy under the Atom ic Energy Act 3 Autom atic declassifi cation of docum ents containing TFN Iis prohibited D ocum ents m arked as containing TFN Iare excluded from the autom atic declassifi cation provisions of the O rder untilthe TFN I designation is properly rem oved by the D epartm ent of Energy W hen the D epartm ent of Energy determ ines that a TFN Idesignation m ay be rem oved any rem aining inform ation classifi ed under the O rder m ust be referred to the appropriate agency in accordance w ith the declassifi cation provisions of the O rder and this D irective j Approved dissem ination controland handling m arkings 1 D issem ination controland handling m arkings identify the expansion or lim itation on the distribution of the inform ation These m arkings are in addition to and separate from the levelof classifi cation 2 O nly those externaldissem ination controland handling m arkings approved by ISO O or w ith respect to the Intelligence Com m unity by the D irector of N ationalIntelligence for intelligence and intelligence‐ related inform ation m ay be used by agencies to controland handle the dissem ination of classifi ed inform ation pursuant to agency regulations and to policy directives and guidelines issued under section 5 4 d 2 and section 6 2 b of the O rder Such approved m arkings shallbe uniform and binding on allagencies and m ust be available in a central registry 3 If used the dissem ination controland handling m arkings w ill appear at the top and bottom of each page after the levelof classifi cation k Portion m arking w aivers 1 An agency head or senior agency of f cialm ay request a w aiver from the portion m arking requirem ent for i a specifi c category of inform ation Such a request shallbe subm itted to the D irector of ISO O and should include the reasons that the benefi ts of portion m arking are outw eighed by other factors The request m ust also dem onstrate that the requested w aiver w illnot create im pedim ents to inform ation sharing Statem ents citing adm inistrative burden alone w illordinarily not be view ed as suf f cient grounds to i support a w aiver 2 Any approved portion m arking w aiver w illbe tem porary w ith specifi c expiration dates 3 Requests for portion m arking w aivers from elem ents of the Intelligence Com m unity to include pertinent elem ents of the D epartm ent of D efense should include a statem ent of support from the D irector of N ationalIntelligence or his or her designee Requests for portion m arking w aivers from elem ents of the D epartm ent of D efense to include pertinent elem ents of the Intelligence Com m unity should include a statem ent of support from the Secretary of D efense or his or her designee Requests for portion m arking w aivers from elem ents of the D epartm ent of H om eland Security should include a statem ent of support from the Secretary of H om eland Security or his or her designee 4 A docum ent not portion m arked based on an ISO O ‐approved w aiver m ust contain a w arning statem ent that it m ay not be used as a source for derivative classifi cation 5 If a classifi ed docum ent that is not portion m arked based on an ISO O ‐approved w aiver is transm itted outside the originating organization the docum ent m ust be portion m arked unless otherw ise explicitly provided in the w aiver approval l M arking inform ation that has been reclassifi ed Specifi c inform ation m ay only be reclassifi ed if allthe conditions of section 1 7 d of the O rder and its im plem enting directives have been m et 1 W hen taking this action an originalclassifi cation authority m ust include the follow ing m arkings on the inform ation i The levelof classifi cation ii The identity by nam e and position or by personalidentifi er of the originalclassifi cation authority iii D eclassifi cation instructions iv A concise reason for classifi cation including reference to the applicable classifi cation category from section 1 4 of the O rder and v The date the reclassifi cation action w as taken 2 The originalclassifi cation authority shallnotify allknow n authorized holders of this action m M arking of electronic storage m edia Classifi ed com puter m edia such as U SB sticks hard drives CD RO M s and diskettes shallbe m arked to indicate the highest overallclassifi cation of the inform ation contained w ithin the m edia Sec 2001 25 D eclassifi cation m arkings a G eneral A uniform security classifi cation system requires that standard m arkings be applied to declassifi ed inform ation Except in extraordinary circum stances or as approved by the D irector of ISO O the m arking of declassifi ed inform ation shallnot deviate from the follow ing prescribed form ats If declassifi cation m arkings cannot be af f xed to specifi i c inform ation or m aterials the originator shall provide holders or recipients of the inform ation w ith w ritten instructions for m arking the inform ation M arkings shallbe uniform ly and conspicuously applied to leave no doubt about the declassifi ed status of the inform ation and w ho authorized the declassifi cation b The follow ing m arkings shallbe applied to records or copies of records regardless of m edia 1 The w ord D eclassifi ed '' 2 The identity of the declassifi cation authority by nam e and position or by personalidentifi er or the title and date of the declassifi cation guide If the identity of the declassifi cation authority m ust be protected a personalidentifi er m ay be used or the inform ation m ay be retained in agency fi les 3 The date of declassifi cation and 4 The overallclassifi cation m arkings that appear on the cover page or fi rst page shallbe lined w ith an X''or straight line An exam ple m ight appear as SECRET D eclassifi ed by D avid Sm ith Chief D ivision 5 August 17 2008 Sec 2001 26 Autom atic declassifi cation exem ption m arkings a M arking inform ation exem pted from autom atic declassifi cation at 25 years 1 W hen the Panelhas approved an agency proposalto exem pt perm anently valuable inform ation from autom atic declassifi cation at 25 years the D eclassify O n''line shallbe revised to include the sym bol 25X''plus the Page 37264 num ber s that corresponds to the category ies in section 3 3 b of the O rder Except for w hen the exem ption pertains to inform ation that should clearly and dem onstrably be expected to revealthe identity of a confi d entialhum an source or a hum an intelligence source or key design concepts of w eapons of m ass destruction the revised D eclassify O n''line shallalso include the new date for declassifi cation as approved by the Panel not to exceed 50 years from the date of origin of the record Records that contain inform ation the release of w hich should clearly and dem onstrably be expected to reveal the identity of a confi d entialhum an source or a hum an intelligence source or key design concepts of w eapons of m ass destruction are exem pt from autom atic declassifi cation at 50 years 2 The pertinent exem ptions using the language of section 3 3 b of the O rder are 25X1 revealthe identity of a confi dentialhum an source a hum an intelligence source a relationship w ith an intelligence or security service of a foreign governm ent or international organization or a non‐hum an intelligence source or im pair the eff ectiveness of an intelligence m ethod currently in use available for use or under developm ent 25X2 revealinform ation that w ould assist in the developm ent production or use of w eapons of m ass destruction 25X3 revealinform ation that w ould im pair U S cryptologic system s or activities 25X4 revealinform ation that w ould im pair the application of state‐of‐the‐art technology w ithin a U S w eapon system 25X5 revealform ally nam ed or num bered U S m ilitary w ar plans that rem ain in eff ect or revealoperationalor tacticalelem ents of prior plans that are contained in such active plans 25X6 revealinform ation including foreign governm ent inform ation that w ould cause serious harm to relations betw een the U nited States and a foreign governm ent or to ongoing diplom atic activities of the U nited States 25X7 revealinform ation that w ould im pair the current ability of U nited States G overnm ent of f cials to protect the President Vice i President and other protectees for w hom protection services in the interest of the nationalsecurity are authorized 25X8 revealinform ation that w ould seriously im pair current nationalsecurity em ergency preparedness plans or revealcurrent vulnerabilities of system s installations or infrastructures relating to the nationalsecurity or 25X9 violate a statute treaty or internationalagreem ent that does not perm it the autom atic or unilateraldeclassifi cation of inform ation at 25 years 3 The pertinent portion of the m arking w ould appear as D eclassify O n 25X4 20501001 4 D ocum ents should not be m arked w ith a 25X''m arking untilthe agency has been inform ed that the Panelconcurs w ith the proposed exem ption 5 Agencies need not apply a 25X''m arking to individual docum ents contained in a fi le series exem pted from autom atic declassifi cation under section 3 3 c of the O rder untilthe individual docum ent is rem oved from the fi le and m ay only apply such a m arking as approved by the Panelunder section 3 3 j of the O rder 6 Inform ation containing foreign governm ent inform ation w illbe m arked w ith a date in the D eclassify O n''line that is no m ore than 25 years from the date of the docum ent unless the originating agency has applied for and received Panelapprovalto exem pt foreign governm ent inform ation from declassifi cation at 25 years U pon receipt of Panelapproval the agency m ay use either the 25X6 or 25X9 exem ption m arkings as appropriate in the D eclassify O n''follow ed by a date that has also been approved by the Panel An exam ple m ight appear as 25X6 20600129 or 25X9 20600627 The m arking subject to treaty or internationalagreem ent''is not to be used at any tim e b M arking inform ation exem pted from autom atic declassifi cation at 50 years Records exem pted from autom atic declassifi cation at 50 years shallbe autom atically declassifi ed on D ecem ber 31 of a year that is no m ore than 75 years from the date of origin unless an agency head w ithin fi ve years of that date proposes to exem pt specifi c inform ation from declassifi cation at 75 years and the proposalis form ally approved by the Panel 1 W hen the inform ation clearly and dem onstrably could be expected to revealthe identity of a confi d entialhum an source or a hum an intelligence source the m arking shallbe 50X1‐H U M '' 2 W hen the inform ation clearly and dem onstrably could revealkey design concepts of w eapons of m ass destruction the m arking shallbe 50X2‐W M D '' 3 In extraordinary cases in w hich the Panelhas approved an exem ption from declassifi cation at 50 years under section 3 3 h of the O rder the sam e procedures as those under Sec 2001 26 a w illbe follow ed w ith the exception that the num ber 50''w illbe used in place of the 25 '' 4 Requests for exem ption from autom atic declassifi cation at 50 years from elem ents of the Intelligence Com m unity to include pertinent elem ents of the D epartm ent of D efense should include a statem ent of support from the D irector of N ationalIntelligence or his or her designee Requests for autom atic declassifi cation exem ptions from elem ents of the D epartm ent of D efense to include pertinent elem ents of the Intelligence com m unity should include a statem ent of support from the Secretary of D efense or his or her designee Requests for autom atic declassifi cation exem ptions from elem ents of the D epartm ent of H om eland Security should include a statem ent of support from the Secretary of the D epartm ent of H om eland Security or his or her designee c M arking inform ation exem pted from autom atic declassifi cation at 75 years Records exem pted from autom atic declassifi cation at 75 years shallbe autom atically declassifi ed on D ecem ber 31 of the year that has been form ally approved by the Panel 1 Inform ation approved by the Panelas exem pt from autom atic declassifi cation at 75 years shallbe m arked 75X''w ith the appropriate autom atic declassifi cation exem ption category num ber follow ed by the approved declassifi cation date or event 2 Requests for exem ption from autom atic declassifi cation at 75 years from elem ents of the Intelligence Com m unity to include pertinent elem ents of the D epartm ent of D efense should include a statem ent of support from the D irector of N ationalIntelligence or his or her designee Requests for autom atic declassifi cation exem ptions from elem ents of the D epartm ent of D efense to include pertinent elem ents of the Intelligence com m unity should include a statem ent of support from the Secretary of D efense or his or her designee Subpart D ‐‐D eclassifi cation Sec 2001 30 Autom atic declassifi cation a G eneral Alldepartm ents and agencies that have original classifi cation authority or previously had originalclassifi cation authority or m aintain records determ ined to be perm anently valuable that contain classifi ed nationalsecurity inform ation shallcom ply w ith the autom atic declassifi cation provisions of the O rder All agencies w ith originalclassifi cation authority shallcooperate w ith N ARA in m anaging autom atic declassifi cation of accessioned Federal records presidentialpapers and records and donated historical m aterials under the controlof the Archivist b Presidentialpapers m aterials and records The Archivist shallestablish procedures for the declassifi cation of presidential vice‐presidential or W hite H ouse m aterials transferred to the legal Page 37265 custody of N ARA or m aintained in the presidentiallibraries c Classifi ed inform ation in the custody of contractors licensees certifi cate holders or grantees Pursuant to the provisions of the N ationalIndustrialSecurity Program agencies m ust provide security classifi cation declassifi cation guidance to such entities or individuals w ho possess classifi ed inform ation Agencies m ust also determ ine if classifi ed Federalrecords are held by such entities or individuals and if so w hether they are perm anent records of historicalvalue and thus subject to section 3 3 of the O rder U ntil such a determ ination has been m ade by an appropriate agency of f cial i such records shallnot be subject to autom atic declassifi cation or destroyed and shallbe safeguarded in accordance w ith the m ost recent security classifi cation declassifi cation guidance provided by the agency d Transferred inform ation In the case of classifi ed inform ation transferred in conjunction w ith a transfer of functions and not m erely for storage the receiving agency shallbe deem ed to be the originating agency e U nof f cially transferred inform ation In the case of classifi i ed inform ation that is not of f cially transferred as described in i paragraph d of this section but that originated in an agency that has ceased to exist and for w hich there is no successor agency the agency in possession shallserve as the originating agency and shallbe responsible for actions for those records in accordance w ith section 3 3 of the O rder and in consultation w ith the D irector of the N ational D eclassifi cation Center N D C f Processing records originated by another agency W hen an agency uncovers classifi ed records originated by another agency that appear to m eet the criteria for referralaccording to section 3 3 d of the O rder the fi n ding agency shallidentify those records for referralto the originating agency as described in Sec 2001 34 g U nscheduled records Classifi ed inform ation in records that have not been scheduled for disposalor retention by N ARA is not subject to section 3 3 of the O rder Classifi ed inform ation in records that becom e scheduled as perm anently valuable w hen that inform ation is already m ore than 20 years old shallbe subject to the autom atic declassifi cation provisions of section 3 3 of the O rder fi ve years from the date the records are scheduled Classifi ed inform ation in records that becom e scheduled as perm anently valuable w hen that inform ation is less than 20 years old shallbe subject to the autom atic declassifi cation provisions of section 3 3 of the O rder at 25 years h Tem porary records and non‐record m aterials Classifi ed inform ation contained in records determ ined not to be perm anently valuable or non‐record m aterials shallbe processed in accordance w ith section 3 6 c of the O rder i Foreign governm ent inform ation The declassifying agency is the agency that initially received or classifi ed the inform ation W hen foreign governm ent inform ation appears to be subject to autom atic declassifi cation the declassifying agency shalldeterm ine w hether the inform ation is subject to a treaty or internationalagreem ent that does not perm it autom atic or unilateraldeclassifi cation The declassifying agency shallalso determ ine if another exem ption under section 3 3 b of the O rder such as the exem ption that pertains to U nited States foreign relations m ay apply to the inform ation If the declassifying agency believes such an exem ption m ay apply it should consult w ith any other concerned agencies in m aking its declassifi cation determ ination The declassifying agency or the D epartm ent of State as appropriate m ay consult w ith the foreign governm ent prior to declassifi cation j Assistance to the Archivist of the U nited States Agencies shallconsult w ith the D irector of the N D C established in section 3 7 of the O rder concerning their autom atic declassifi cation program s At the request of the Archivist agencies shallcooperate w ith the D irector of the N D C in developing priorities for the declassifi cation of records to ensure that declassifi cation is accom plished ef f ciently i and in a tim ely m anner Agencies shallconsult w ith N ARA and the D irector of the N D C before review ing records in their holdings to ensure that appropriate procedures are established for m aintaining the integrity of the records and that N ARA receives accurate and suf f cient i inform ation about agency declassifi cation actions including m etadata and other processing inform ation w hen records are accessioned by N ARA This data shallinclude certifi cation by the agency that the records have been review ed in accordance w ith Public Law 105‐261 section 3161 governing Restricted D ata and Form erly Restricted D ata k U se of approved declassifi cation guides Approved declassifi cation guides are the sole basis for the exem ption from autom atic declassifi cation of specifi c inform ation as provided in section 3 3 b of the O rder and the sole basis for the continued classifi cation of inform ation under section 3 3 h of the O rder These guides m ust be prepared in accordance w ith section 3 3 j of the O rder and include additionalpertinent detailrelating to the exem ptions described in sections 3 3 b and 3 3 h of the O rder and follow the form at required of declassifi cation guides as described in Sec 2001 32 D uring a review under section 3 3 of the O rder it is expected that agencies w illuse these guides to identify specifi c inform ation for exem ption from autom atic declassifi cation It is further expected that the guides or detailed declassifi cation guidance w illbe m ade available to the N D C under section 3 7 b of the O rder and to appropriately cleared individuals of other agencies to support equity recognition l Autom atic declassifi cation date N o later than D ecem ber 31 of the year that is 25 years from the date of origin classifi ed records determ ined to be perm anently valuable shallbe autom atically declassifi ed unless autom atic declassifi cation has been delayed for any reason as provided in Sec 2001 30 n and sections 3 3 b and c of the O rder If the date of origin of an individualrecord cannot be readily determ ined the date of originalclassifi cation shallbe used instead m Exem ption from Autom atic D eclassifi cation at 25 50 or 75 years Agencies m ay propose to exem pt from autom atic declassifi cation specifi c inform ation either by reference to inform ation in specifi c records in specifi c fi le series of records or in the form of a declassifi cation guide in accordance w ith section 3 3 j of the O rder Agencies m ay propose to exem pt inform ation w ithin fi ve years of but not later than one year before the inform ation is subject to autom atic declassifi cation The agency head or senior agency of f cial w ithin the i specifi ed tim efram e shallnotify the D irector of ISO O serving as the Executive Secretary of the Panel of the specifi c inform ation being proposed for exem ption from autom atic declassifi cation n D elays in the onset of autom atic declassifi cation‐‐ 1 M edia that m ake a review for possible declassifi cation exem ptions m ore dif f cult or costly An agency head or senior agency of f i cialshall i consult w ith the D irector of the N D C before delaying autom atic declassifi cation for up to fi ve years for classifi ed inform ation contained in m edia that m ake a review for possible declassifi cation m ore dif f cult or costly W hen determ ined by N ARA or jointly determ ined i by N ARA and another agency the follow ing m ay be delayed Page 37266 due to the increased dif f culty and cost of conducting declassifi i cation processing i Records requiring extraordinary preservation or conservation treatm ent to include reform atting to preclude dam age to the records by declassifi cation processing ii Records w hich pose a potentialm enace to health life or property due to contam ination by a hazardous substance and iii Electronic m edia if the m edia is subject to issues of softw are or hardw are obsolescence or degraded data 2 Referred records Records containing classifi ed inform ation that originated w ith other agencies or the disclosure of w hich w ould aff ect the interests or activities of other agencies and could reasonably be expected to fallunder one or m ore of the exem ption categories of section 3 3 b of the O rder shallbe identifi ed prior to the onset of autom atic declassifi cation for later referralto those agencies D eclassifi cation review ers shallbe trained periodically on other agency equities to aid in the proper identifi cation of other agency equities eligible for referral i Inform ation properly identifi ed as a referralto another agency contained in records accessioned by N ARA or in the custody of the presidentiallibraries shallbe subject to autom atic declassifi cation only after the referralhas been m ade available by N ARA for agency review in accordance w ith Sec 2001 34 provided the inform ation has not otherw ise been properly exem pted by an equity holding agency under section 3 3 of the O rder ii Inform ation properly identifi ed as a referralto another agency contained in records m aintained in the physical but not legal custody of N ARA shallbe subject to autom atic declassifi cation after accessioning and in accordance w ith Sec 2001 34 provided the inform ation has not otherw ise been properly exem pted by an equity holding agency under section 3 3 of the O rder 3 N ew ly discovered records An agency head or senior agency of f cialm ust consult w ith the D irector of ISO O on any decision to i delay autom atic declassifi cation of new ly discovered records no later than 90 days from the discovery of the records The notifi cation shall identify the records their volum e the anticipated date for declassifi cation and the circum stances of the discovery An agency m ay be granted up to three years from the date of discovery to m ake a declassifi cation exem ption or referraldeterm ination If referrals to other agencies are properly identifi ed they w illbe handled in accordance w ith subparagraphs 2 i and 2 ii above 4 Integralfi le blocks Classifi ed records w ithin an integral fi le block that are otherw ise subject to autom atic declassifi cation under section 3 3 of the O rder shallnot be autom atically declassifi ed untilD ecem ber 31 of the year that is 25 years from the date of the m ost recent record w ithin the fi le block For purposes of autom atic declassifi cation integralfi le blocks shallcontain only records dated w ithin ten years of the oldest record in the fi le block Integralfi le blocks applied prior to D ecem ber 29 2009 that cover m ore than ten years rem ain in eff ect untilD ecem ber 31 2012 unless an agency requests an extension from the D irector of ISO O on a case‐by‐case basis prior to D ecem ber 31 2011 w hich is subsequently approved 5 File series exem ptions Agencies seeking to delay the autom atic declassifi cation of a specifi c series of records as defi ned in section 6 1 r of the O rder because it alm ost invariably contains inform ation that falls w ithin one or m ore of the exem ption categories under section 3 3 b m ust subm it their request in accordance w ith section 3 3 c of the O rder to the D irector of ISO O serving as Executive Secretary of the Panel at least one year prior to the onset of autom atic declassifi cation O nce approved by the Panel the records in the fi le series exem ption rem ain subject to section 3 5 of the O rder This delay applies only to records w ithin the specifi c fi le series Copies of records w ithin the specifi c fi le series or records of a sim ilar topic to the specifi c fi le series located elsew here m ay be exem pted in accordance w ith exem ptions approved by the Panel o Redaction standard Agencies are encouraged but are not required to redact docum ents that contain inform ation that is exem pt from autom atic declassifi cation under section 3 3 of the O rder especially if the inform ation that m ust rem ain classifi ed com prises a relatively sm allportion of the docum ent Any such redactions shallbe perform ed in accordance w ith policies and procedures established in accordance w ith Sec 2001 45 d p Restricted D ata and Form erly Restricted D ata 1 Restricted D ata and Form erly Restricted D ata are excluded from the autom atic declassifi cation requirem ents in section 3 3 of the O rder because they are classifi ed under the Atom ic Energy Act of 1954 as am ended Restricted D ata concerns i The design m anufacture or utilization of atom ic w eapons ii The production of specialnuclear m aterial e g enriched uranium or plutonium or iii The use of specialnuclear m aterialin the production of energy 2 Form erly Restricted D ata is inform ation that is still classifi ed under the Atom ic Energy Act of 1954 as am ended but w hich has been rem oved from the Restricted D ata category because it is related prim arily to the m ilitary utilization of atom ic w eapons 3 Any docum ent m arked as containing Restricted D ata or Form erly Restricted D ata or identifi ed as potentially containing unm arked Restricted D ata or Form erly Restricted D ata shallbe referred to the D epartm ent of Energy in accordance w ith Sec 2001 34 b 8 4 Autom atic declassifi cation of docum ents containing Restricted D ata or Form erly Restricted D ata is prohibited D ocum ents m arked as containing Restricted D ata or Form erly Restricted D ata are excluded from the autom atic declassifi cation provisions of the O rder untilthe Restricted D ata or Form erly Restricted D ata designation is properly rem oved by the D epartm ent of Energy W hen the D epartm ent of Energy determ ines that a Restricted D ata or Form erly Restricted D ata designation m ay be rem oved any rem aining inform ation classifi ed under the O rder m ust be referred to the appropriate agency in accordance w ith the declassifi cation provisions of the O rder and this D irective 5 Any docum ent containing inform ation concerning foreign nuclear program s that w as rem oved from the Restricted D ata category in order to carry out provisions of the N ationalSecurity Act of 1947 as am ended shallbe referred to the D epartm ent of Energy 6 The Secretary of Energy shalldeterm ine w hen inform ation concerning foreign nuclear program s that w as rem oved from the Restricted D ata category in order to carry out the provisions of the N ationalSecurity Act of 1947 as am ended m ay be declassifi ed U nless otherw ise determ ined inform ation concerning foreign nuclear program s e g intelligence assessm ents or reports foreign nuclear program inform ation provided to the U S G overnm ent shallbe declassifi ed w hen com parable inform ation concerning the U nited States nuclear program is declassifi ed W hen the Secretary of Energy determ ines that inform ation concerning foreign nuclear program s m ay be declassifi ed any rem aining inform ation classifi ed under the O rder m ust be referred to the appropriate agency in accordance w ith the declassifi cation Page 37267 provisions of the O rder and this D irective Sec 2001 31 System atic declassifi cation review a G eneral Agencies shallestablish system atic review program s for those records containing inform ation exem pted from autom atic declassifi cation This includes individualrecords as w ellas fi le series of records Agencies shallprioritize their review of such records in accordance w ith priorities established by the N D C Sec 2001 32 D eclassifi cation guides a Preparation of declassifi cation guides Beginning one year after the eff ective date of this directive declassifi cation guides m ust be subm itted to the D irector of ISO O serving as the Executive Secretary of the Panel at least one year prior to the onset of autom atic declassifi cation for approvalby the Panel Currently approved guides rem ain in eff ect untila new guide is approved to the extent they are otherw ise applied consistent w ith section 3 3 b of the O rder The inform ation to be exem pted m ust be narrow ly defi n ed w ith suf f cient specifi i city to allow the user to identify the inform ation w ith precision Exem ptions m ust be based upon specifi c content and not type of docum ent Exem ptions for generalcategories of inform ation are not acceptable Agencies m ust prepare guides that clearly delineate betw een the exem ptions proposed under sections 3 3 b 3 3 h 1 and 2 and 3 3 h 3 b G eneralcontent of declassifi cation guides D eclassifi cation guides m ust be specifi c and detailed as to the inform ation requiring continued classifi cation and clearly and dem onstrably explain the reasons for continued classifi cation D eclassifi cation guides shall 1 Be subm itted by the agency head or the designated senior agency of f cial i 2 Provide the date of issuance or last review 3 State precisely the inform ation that the agency proposes to exem pt from autom atic declassifi cation and to specifi cally declassify 4 Identify any related fi les series that have been exem pted from autom atic declassifi cation pursuant to section 3 3 c of the O rder and 5 To the extent a guide is used in conjunction w ith the autom atic declassifi cation provisions in section 3 3 of the O rder state precisely the elem ents of inform ation to be exem pted from declassifi cation to include i The appropriate exem ption category listed in section 3 3 b and if appropriate section 3 3 h of the O rder and ii A date or event for declassifi cation that is in accordance w ith section 3 3 b or section 3 3 h c Internalreview and update Agency declassifi cation guides shallbe review ed and updated as circum stances require but at least once every fi ve years Each agency shallm aintain a list of its declassifi cation guides in use d D issem ination of guides 1 D eclassifi cation guides shallbe dissem inated w ithin the agency to be used by allpersonnelw ith declassifi cation review responsibilities 2 D eclassifi cation guides or detailed declassifi cation guidance shallbe subm itted to the D irector of the N D C in accordance w ith section 3 7 b 3 of the O rder Sec 2001 33 M andatory review for declassifi cation a U S originated inform ation‐‐ 1 Regulations Each agency shall publish and update as needed or required in the FederalRegister regulations concerning the handling of m andatory declassifi cation review requests to include the identity of the person s or of f ce s i to w hich requests should be addressed 2 Processing‐‐ i Requests for classifi ed records in the custody of the originating agency A valid m andatory declassifi cation review request m ust be of suf f cient specifi i city to allow agency personnelto locate the records containing the inform ation sought w ith a reasonable am ount of eff ort Requests for broad types of inform ation entire fi le series of records or sim ilar non‐specifi c requests m ay be denied by agencies for processing under this section In responding to m andatory declassifi cation review requests agencies shallm ake a fi n al determ ination w ithin one year from the date of receipt W hen inform ation cannot be declassifi ed in its entirety agencies shallm ake reasonable eff orts to release consistent w ith other applicable law s those declassifi ed portions of the requested inform ation that constitute a coherent segm ent U pon denial in w hole or in part of an initialrequest the agency shallalso notify the requestor of the right of an adm inistrative appeal w hich m ust be fi led w ithin 60 days of receipt of the denial Agencies receiving m andatory review requests are expected to conduct a line‐by‐line review of the record s for public access and are expected to release the inform ation to the requestor unless that inform ation is prohibited from release under the provisions of a statutory authority such as but not lim ited to the Freedom of Inform ation Act 5 U S C 552 as am ended the PresidentialRecords Act of 1978 44 U S C 2201‐2207 or the N ational Security Act of 1947 Pub L 235 61 Stat 496 50 U S C Chapter 15 ii Requests for classifi ed records in the custody of an agency other than the originating agency W hen an agency receives a m andatory declassifi cation review request for records in its possession that w ere originated by another agency it shallrefer the request and the pertinent records to the originating agency H ow ever if the originating agency has previously agreed that the custodialagency m ay review its records the custodialagency shallreview the requested records in accordance w ith declassifi cation guides or guidelines provided by the originating agency U pon receipt of a request from the referring agency the originating agency shallprom ptly process the request for declassifi cation and release in accordance w ith this section The originating agency shallcom m unicate its declassifi cation determ ination to the referring agency The referring agency is responsible for collecting allagency review results and inform ing the requestor of any fi n aldecision regarding the declassifi cation of the requested inform ation unless a prior arrangem ent has been m ade w ith the originating agency iii Appeals of denials of m andatory declassifi cation review requests The agency appellate authority shallnorm ally m ake a determ ination w ithin 60 w orking days follow ing the receipt of an appeal If additionaltim e is required to m ake a determ ination the agency appellate authority shallnotify the requester of the additional tim e needed and provide the requester w ith the reason for the extension The agency appellate authority shallnotify the requestor in w riting of the fi n aldeterm ination and of the reasons for any denial The appellate authority m ust inform the requestor of his or her fi n al appealrights to the Panel iv Appeals to the Interagency Security Classifi cation Appeals Panel In accordance w ith section 5 3 c of the O rder the Panelshall publish in the FederalRegister the rules and procedures for bringing m andatory declassifi cation appeals before it v Records subject to m andatory declassifi cation review Records containing inform ation exem pted from autom atic declassifi cation in accordance w ith section 3 3 c of the O rder or w ith Sec 2001 30 n 1 are stillsubject to the m andatory declassifi cation review provisions of section 3 5 of the O rder Page 37268 b Foreign governm ent inform ation Except as provided in this paragraph agencies shallprocess m andatory declassifi cation review requests for classifi ed records containing foreign governm ent inform ation in accordance w ith this section The declassifying agency is the agency that initially received or classifi ed the inform ation W hen foreign governm ent inform ation is being considered for declassifi cation the declassifying agency shalldeterm ine w hether the inform ation is subject to a treaty or internationalagreem ent that does not perm it autom atic or unilateraldeclassifi cation The declassifying agency or the D epartm ent of State as appropriate m ay consult w ith the foreign governm ent s prior to declassifi cation c Cryptologic inform ation M andatory declassifi cation review requests for cryptologic inform ation shallbe processed in accordance w ith specialprocedures issued by the Secretary of D efense and w hen cryptologic inform ation pertains to intelligence activities the D irector of N ationalIntelligence d Intelligence inform ation M andatory declassifi cation review requests for inform ation pertaining to intelligence sources m ethods and activities shallbe processed in accordance w ith specialprocedures issued by the D irector of N ationalIntelligence e Fees In responding to m andatory declassifi cation review requests for classifi ed records agency heads m ay charge fees in accordance w ith 31 U S C 9701 or relevant fee provisions in other applicable statutes f Requests fi led under m andatory declassifi cation review and the Freedom of Inform ation Act W hen a requester subm its a request both under m andatory declassifi cation review and the Freedom of Inform ation Act FO IA the agency shallrequire the requestor to select one process or the other If the requestor fails to select one or the other the request w illbe treated as a FO IA request unless the requested m aterials are subject only to m andatory declassifi cation review g FO IA and Privacy Act requests Agency heads shallprocess requests for declassifi cation that are subm itted under the provisions of the FO IA as am ended or the Privacy Act of 1974 5 U S C 552a as am ended in accordance w ith the provisions of those Acts h Redaction standard Agencies shallredact docum ents that are the subject of an access dem and unless the overallm eaning or inform ationalvalue of the docum ent is clearly distorted by redaction The specifi c reason for the redaction as provided for in section 1 4 or 3 3 b of the O rder as applicable m ust be included for each redaction Inform ation that is redacted due to a statutory authority m ust be clearly m arked w ith the specifi c authority that authorizes the redaction Any such redactions shallbe perform ed in accordance w ith policies and procedures established in accordance w ith Sec 2001 45 d i Lim itations on requests Requests for m andatory declassifi cation review m ade to an elem ent of the Intelligence Com m unity by anyone other than a citizen of the U nited States or an alien law fully adm itted for perm anent residence m ay be denied by the receiving Intelligence Com m unity elem ent D ocum ents required to be subm itted for pre‐publication review or other adm inistrative process pursuant to an approved nondisclosure agreem ent are not subject to m andatory declassifi cation review Sec 2001 34 Referrals a G eneral Referrals are required under sections 3 3 d 3 and 3 6 b of the O rder in order to ensure the tim ely ef f cient and i eff ective processing of review s and requests and in order to protect classifi ed inform ation from inadvertent disclosure b Autom atic declassifi cation The referralprocess for records subject to autom atic declassifi cation entails identifi cation of records containing classifi ed inform ation that originated w ith other agencies or the disclosure of w hich w ould aff ect the interests or activities of other agencies Those records that could reasonably be expected to fall under one or m ore of the exem ptions in section 3 3 b of the O rder are eligible for referral The referralprocess also entails form al notifi cation to those agencies m aking the records available for review by those agencies and recording fi n alagency determ inations 1 In accordance w ith section 3 3 d 3 of the O rder the identifi cation of records eligible for referralis the responsibility of the prim ary review ing agency and shallbe com pleted prior to the date of autom atic declassifi cation established by section 3 3 a of the O rder 2 Except as otherw ise determ ined by the D irector of the N D C prim ary review ing agencies shallutilize the Standard Form 715 G overnm ent D eclassifi cation Review Tab to tab and identify any Federal record requiring referraland record the referralin a m anner that provides the referralinform ation in an N D C database system 3 N otifi cation of referralof records accessioned into N ARA or in the custody of the presidentiallibraries and m aking the records available for review is the responsibility of N ARA and shallbe accom plished through the N D C 4 W ithin 180 days of the eff ective date of this provision the N D C shalldevelop and provide the aff ected agencies w ith a com prehensive and prioritized schedule for the resolution of referrals contained in accessioned Federalrecords and Presidentialrecords The schedule shallbe developed in consultation w ith the aff ected agencies consider the public interest in the records and be in accordance w ith the authorized delays to autom atic declassifi cation set forth in section 3 3 d of the O rder The initialschedule shallcover the balance of the fi rst eff ective fi scalyear and four subsequent fi scal years Thereafter the schedule shallcover fi ve fi scalyears The N D C shallconsult w ith the aff ected agencies and update and provide such schedules annually 5 The N D C shallprovide form alnotifi cation of the availability of a referralto the receiving agency and records w illbe subject to autom atic declassifi cation in accordance w ith the schedule prom ulgated by the N D C in paragraph b 4 of this section unless the inform ation has been properly exem pted by an equity holding agency under section 3 3 of the O rder 6 Records in the physicalbut not legalcustody of N ARA shallbe subject to autom atic declassifi cation after accessioning and in accordance w ith paragraphs b 3 and b 5 of this section 7 Agencies that establish a centralized facility as described in section 3 7 e m ay m ake direct referrals provided such activities fall w ithin the priorities and schedule established by the N D C and the activity is otherw ise coordinated w ith the N D C In such cases the centralized facility is responsible for providing form alnotifi cation of a referralto receiving agencies and for m aking the records available for review or direct form alreferralto agencies by providing a copy of the records unless another m echanism is identifi ed in coordination w ith the N D C As established in section 3 3 d 3 B referrals to agencies from a centralized agency records facility as described in section 3 7 e of the O rder w illbe autom atically declassifi ed up to three years after the form alnotifi cation has been m ade if the receiving agency fails to provide a fi n aldeterm ination 8 Records m arked as containing Restricted D ata or Form erly Restricted D ata or identifi ed as potentially Page 37269 containing unm arked Restricted D ata or Form erly Restricted D ata shall be referred to the D epartm ent of Energy through the N D C If the D epartm ent of Energy confi rm s that the docum ent contains Restricted D ata or Form erly Restricted D ata it shallthen be excluded from the autom atic declassifi cation provisions of the O rder untilthe Restricted D ata or Form erly Restricted D ata designation is properly rem oved i W hen the D epartm ent of Energy provides notifi cation that a Restricted D ata or Form erly Restricted D ata designation is not appropriate or w hen it is properly rem oved the record shallbe processed for autom atic declassifi cation through the N D C ii In allcases should the record be the subject of an access dem and m ade pursuant to the O rder or provision of law the inform ation classifi ed pursuant to Executive order rather than the Atom ic Energy Act as am ended m ust stand on its ow n m erits 9 The N D C as w ellas any centralized agency facility established under section 3 7 e of the O rder shalltrack and docum ent referral actions and decisions in a m anner that facilitates archivalprocessing for public access Centralagency facilities m ust w ork w ith the N D C to ensure docum entation m eets N D C requirem ents and transfer all docum entation on pending referralactions and referraldecisions to the N D C w hen transferring the records to N ARA 10 In allcases receiving agencies shallacknow ledge receipt of form alreferralnotifi cations in a tim ely m anner If a disagreem ent arises concerning referralnotifi cations the D irector of ISO O w ill determ ine the autom atic declassifi cation date and notify the senior agency of f cial as w ellas the N D C or the prim ary review ing agency i 11 Rem ote Archives Capture RAC Presidentialrecords or m aterials scanned in the RAC process shallbe prioritized and scheduled for review by the N D C The initialnotifi cation shallbe m ade to the agency w ith prim ary equity w hich shallhave up to one year to act on its inform ation and to identify allother equities eligible for referral Allsuch additionalreferrals in an individualrecord shall be m ade at the sam e tim e and once notifi ed by the N D C of an eligible referral such receiving agencies shallhave up to one year to review the records before the onset of autom atic declassifi cation c Agencies eligible to receive referrals The D irector of ISO O w illpublish annually a list of those agencies eligible to receive referrals for each calendar year d System atic declassifi cation review The identifi cation of equities shallbe accom plished in accordance w ith paragraph b of this section Priorities for review w illbe established by the N D C e Identifi cation of interests other than nationalsecurity Referrals under sections 3 3 d 3 and 3 6 b of the O rder shallbe assum ed to be intended for later public release unless w ithholding is otherw ise authorized and w arranted under applicable law If a receiving agency proposes to w ithhold any such inform ation it m ust notify the referring agency at the tim e they otherw ise respond to the referral Such notifi cation shallidentify the specifi c inform ation at issue and the pertinent law Sec 2001 35 D iscretionary declassifi cation a In accordance w ith section 3 1 d of the O rder agencies m ay declassify inform ation w hen the public interest in disclosure outw eighs the need for continued classifi cation b Agencies m ay also establish a discretionary declassifi cation program that is separate from their autom atic system atic and m andatory review program s Sec 2001 36 Classifi ed inform ation in the custody of private organizations or individuals a Authorized holders Agencies m ay allow for the holding of classifi ed inform ation by a private organization or individualprovided that allaccess and safeguarding requirem ents of the O rder have been m et Agencies m ust provide declassifi cation assistance to such organizations or individuals b O thers Anyone w ho becom es aw are of organizations or individuals w ho possess potentially classifi ed nationalsecurity inform ation outside of governm ent controlm ust contact the D irector of ISO O for guidance and assistance The D irector of ISO O in consultation w ith other agencies as appropriate w illensure that the safeguarding and declassifi cation requirem ents of the O rder are m et Sec 2001 37 Assistance to the D epartm ent of State H eads of agencies shallassist the D epartm ent of State in its preparation of the Foreign Relations of the U nited States FRU S series by facilitating access to appropriate classifi ed m aterials in their custody and by expediting declassifi cation review of docum ents proposed for inclusion in the FRU S If an agency fails to provide a fi nal declassifi cation review determ ination regarding a D epartm ent of State referralw ithin 120 days of the date of the referral or if applicable w ithin 120 days of the date of a H igh LevelPaneldecision the D epartm ent of State consistent w ith 22 U S C 4353 and any im plem enting agency procedures m ay seek the assistance of the Panel Subpart E‐‐Safeguarding Sec 2001 40 G eneral a Classifi ed inform ation regardless of its form shallbe aff orded a levelof protection against loss or unauthorized disclosure com m ensurate w ith its levelof classifi cation b Except for foreign governm ent inform ation agency heads or their designee s m ay adopt alternative m easures using risk m anagem ent principles to protect against loss or unauthorized disclosure w hen necessary to m eet operationalrequirem ents W hen alternative m easures are used for other than tem porary unique situations the alternative m easures shallbe docum ented and provided to the D irector of ISO O U pon request the description shallbe provided to any other agency w ith w hich classifi ed inform ation or secure facilities are shared In all cases the alternative m easures shallprovide protection suf f cient to i reasonably deter and detect loss or unauthorized disclosure Risk m anagem ent factors considered w illinclude sensitivity value and crucialnature of the inform ation analysis of know n and anticipated threats vulnerability and counterm easure benefi ts versus cost c N orth Atlantic Treaty O rganization N ATO classifi ed inform ation shallbe safeguarded in com pliance w ith U S Security Authority for N ATO Instruction U SSAN 1‐07 O ther foreign governm ent inform ation shallbe safeguarded as described herein for U S inform ation except as required by an existing treaty agreem ent or other obligation hereinafter obligation W hen the inform ation is to be safeguarded pursuant to an existing obligation the additional requirem ents at Sec 2001 54 m ay apply to the extent they w ere required in the obligation as originally negotiated or are agreed upon during am endm ent N egotiations on new obligations or am endm ents to existing obligations shallstrive to bring provisions for safeguarding foreign governm ent inform ation into accord w ith standards for safeguarding U S inform ation as described in this D irective d N eed‐to‐know determ inations 1 Agency heads through their designees shallidentify organizationalm issions Page 37270 and personnelrequiring access to classifi ed inform ation to perform or assist in authorized governm entalfunctions These m ission and personnelrequirem ents are determ ined by the functions of an agency or the roles and responsibilities of personnelin the course of their of f cialduties Personneldeterm inations shallbe consistent w ith i section 4 1 a of the O rder 2 In instances w here the provisions of section 4 1 a of the O rder are m et but there is a countervailing need to restrict the inform ation disagreem ents that cannot be resolved shallbe referred by agency heads or designees to either the D irector of ISO O or w ith respect to the Intelligence Com m unity the D irector of N ational Intelligence as appropriate D isagreem ents concerning inform ation protected under section 4 3 of the O rder shallinstead be referred to the appropriate of f cialnam ed in section 4 3 of the O rder i Sec 2001 41 Responsibilities of holders Authorized persons w ho have access to classifi ed inform ation are responsible for a Protecting it from persons w ithout authorized access to that inform ation to include securing it in approved equipm ent or facilities w henever it is not under the direct controlof an authorized person b M eeting safeguarding requirem ents prescribed by the agency head and c Ensuring that classifi ed inform ation is not com m unicated over unsecured voice or data circuits in public conveyances or places or in any other m anner that perm its interception by unauthorized persons Sec 2001 42 Standards for security equipm ent a Storage The Adm inistrator of the G eneralServices Adm inistration G SA shall in coordination w ith agency heads originating classifi ed inform ation establish and publish uniform standards specifi cations qualifi ed product lists or databases and supply schedules for security equipm ent designed to provide secure storage for classifi ed inform ation W henever new secure storage equipm ent is procured it shallbe in conform ance w ith the standards and specifi cations established by the Adm inistrator of the G SA and shall to the m axim um extent possible be of the type available through the FederalSupply System b D estruction Eff ective January 1 2011 only equipm ent listed on an Evaluated Products List EPL issued by the N ationalSecurity Agency N SA m ay be utilized to destroy classifi ed inform ation using any m ethod covered by an EPL H ow ever equipm ent approved for use prior to January 1 2011 and not found on an EPL m ay be utilized for the destruction of classifi ed inform ation untilD ecem ber 31 2016 U nless N SA determ ines otherw ise w henever an EPL is revised equipm ent rem oved from an EPL m ay be utilized for the destruction of classifi ed inform ation up to six years from the date of its rem ovalfrom an EPL In allcases if any such previously approved equipm ent needs to be replaced or otherw ise requires a rebuild or replacem ent of a critical assem bly the unit m ust be taken out of service for the destruction in accordance w ith this section The Adm inistrator of the G SA shall to the m axim um extent possible coordinate supply schedules and otherw ise seek to m ake equipm ent on an EPL available through the FederalSupply System Sec 2001 43 Storage a G eneral Classifi ed inform ation shallbe stored only under conditions designed to deter and detect unauthorized access to the inform ation Storage at overseas locations shallbe at U S G overnm ent‐ controlled facilities unless otherw ise stipulated in treaties or internationalagreem ents O verseas storage standards for facilities under a Chief of M ission are prom ulgated under the authority of the O verseas Security Policy Board b Requirem ents for physicalprotection‐‐ 1 Top Secret Top Secret inform ation shallbe stored in a G SA‐approved security container a vault built to FederalStandard FED STD 832 or an open storage area constructed in accordance w ith Sec 2001 53 In addition supplem entalcontrols are required as follow s i For G SA‐approved containers one of the follow ing supplem ental controls A Inspection of the container every tw o hours by an em ployee cleared at least to the Secret level B An Intrusion D etection System ID S w ith the personnel responding to the alarm arriving w ithin 15 m inutes of the alarm annunciation Acceptability of Intrusion D etection Equipm ent ID E All ID E m ust be in accordance w ith standards approved by ISO O G overnm ent and proprietary installed m aintained or furnished system s are subject to approvalonly by the agency head or C Security‐In‐D epth coverage of the area in w hich the container is located provided the container is equipped w ith a lock m eeting FederalSpecifi cation FF‐L‐2740 ii For open storage areas covered by Security‐In‐D epth an ID S w ith the personnelresponding to the alarm arriving w ithin 15 m inutes of the alarm annunciation iii For open storage areas not covered by Security‐In‐D epth personnelresponding to the alarm shallarrive w ithin fi ve m inutes of the alarm annunciation 2 Secret Secret inform ation shallbe stored in the sam e m anner as Top Secret inform ation or untilO ctober 1 2012 in a non‐G SA‐ approved container having a built‐in com bination lock or in a non‐G SA‐ approved container secured w ith a rigid m etallockbar and an agency head approved padlock Security‐In‐D epth is required in areas in w hich a non‐G SA‐approved container or open storage area is located Except for storage in a G SA‐approved container or a vault built to FED STD 832 one of the follow ing supplem entalcontrols is required i Inspection of the container or open storage area every four hours by an em ployee cleared at least to the Secret level or ii An ID S w ith the personnelresponding to the alarm arriving w ithin 30 m inutes of the alarm annunciation 3 Confi d ential Confi d entialinform ation shallbe stored in the sam e m anner as prescribed for Top Secret or Secret inform ation except that supplem entalcontrols are not required c Com binations U se and m aintenance of dial‐type locks and other changeable com bination locks 1 Equipm ent in service Com binations to dial‐type locks shallbe changed only by persons authorized access to the levelof inform ation protected unless other suf f cient controls exist to prevent access to i the lock or know ledge of the com bination Com binations shallbe changed under the follow ing conditions i W henever such equipm ent is placed into use ii W henever a person know ing the com bination no longer requires access to it unless other suf f cient controls exist to prevent access i to the lock or iii W henever a com bination has been subject to possible unauthorized disclosure 2 Equipm ent out of service W hen security equipm ent is taken out of service it shallbe inspected to ensure that no classifi ed inform ation rem ains and the com bination lock should be reset to a standard com bination of 50‐25‐50 for built‐in com bination locks or 10‐ 20‐30 for com bination padlocks d Key operated locks W hen specialcircum stances exist an agency head m ay approve the use of key operated locks for the storage of Secret and Confi d entialinform ation W henever such locks are used adm inistrative Page 37271 procedures for the controland accounting of keys and locks shallbe included in im plem enting regulations required under section 5 4 d 2 of the O rder e Repairs The neutralization and repair of G SA‐approved security containers and vault doors w illbe in accordance w ith FED STD 809 Sec 2001 44 Reciprocity of use and inspection of facilities a O nce a facility is authorized approved certifi ed or accredited for classifi ed use then allagencies desiring to conduct classifi ed w ork in the designated space s at the sam e security level shallaccept the authorization approval certifi cation or accreditation w ithout change enhancem ents or upgrades provided that no w aiver exception or deviation has been issued or approved In the event that a w aiver exception or deviation w as granted in the original accreditation of the designated space s an agency seeking to utilize the designated facility space m ay require that a risk m itigation strategy be im plem ented or agreed upon prior to using the space s b Subsequent security inspections or review s for authorization approval certifi cation or accreditation purposes shallnorm ally be conducted no m ore frequently than annually unless otherw ise required due to a change in the designated facility space s or due to a change in the use or ow nership of the facility space s This does not im ply a form alone‐year inspection or review requirem ent or establish any other form alperiod for inspections or review Sec 2001 45 Inform ation controls a G eneral Agency heads shallestablish a system of control m easures w hich assure that access to classifi ed inform ation is provided to authorized persons The controlm easures shallbe appropriate to the environm ent in w hich the access occurs and the nature and volum e of the inform ation The system shallinclude technical physical and personnelcontrolm easures Adm inistrative controlm easures w hich m ay include records of internaldistribution access generation inventory reproduction and disposition of classifi ed inform ation shallbe required w hen technical physicaland personnelcontrol m easures are insuf f cient to deter and detect access by unauthorized i persons 1 Com binations Com binations to locks used to secure vaults open storage areas and security containers that are approved for the safeguarding of classifi ed inform ation shallbe protected in the sam e m anner as the highest levelof classifi ed inform ation that the vault open storage area or security container is used to protect 2 Com puter and inform ation system passw ords Passw ords shallbe protected in the sam e m anner as the highest levelof classifi ed inform ation that the com puter or system is certifi ed and accredited to process Passw ords shallbe changed on a frequency determ ined to be suf f cient to m eet the levelof risk assessed by the agency i b Reproduction Reproduction of classifi ed inform ation shallbe held to the m inim um consistent w ith operationalrequirem ents The follow ing additionalcontrolm easures shallbe taken 1 Reproduction shallbe accom plished by authorized persons know ledgeable of the procedures for classifi ed reproduction 2 U nless restricted by the originating agency Top Secret Secret and Confi d entialinform ation m ay be reproduced to the extent required by operationalneeds or to facilitate review for declassifi cation 3 Copies of classifi ed inform ation shallbe subject to the sam e controls as the originalinform ation and 4 The use of technology that prevents discourages or detects the unauthorized reproduction of classifi ed inform ation is encouraged c Form s The use of standard form s prescribed in Subpart H of this part is m andatory for allagencies that create and or handle nationalsecurity inform ation d Redaction‐‐ 1 Policies and procedures Classifi ed inform ation m ay be subject to loss com prom ise or unauthorized disclosure if it is not correctly redacted Agencies shallestablish policies and procedures for the redaction of classifi ed inform ation from docum ents intended for release Such policies and procedures require the approval of the agency head and shallbe suf f ciently detailed to ensure that i redaction is perform ed consistently and reliably using only approved redaction m ethods that perm anently rem ove the classifi ed inform ation from copies of the docum ents intended for release Agencies shall ensure that personnelw ho perform redaction fully understand the policies procedures and m ethods and are aw are of the vulnerabilities surrounding the process 2 Technicalguidance for redaction Technicalguidance concerning appropriate m ethods equipm ent and standards for the redaction of classifi ed electronic and opticalm edia shallbe issued by N SA Sec 2001 46 Transm ission a G eneral Classifi ed inform ation shallbe transm itted and received in an authorized m anner w hich ensures that evidence of tam pering can be detected that inadvertent access can be precluded and that provides a m ethod w hich assures tim ely delivery to the intended recipient Persons transm itting classifi ed inform ation are responsible for ensuring that intended recipients are authorized persons w ith the capability to store classifi ed inform ation in accordance w ith this D irective b D ispatch Agency heads shallestablish procedures w hich ensure that 1 Allclassifi ed inform ation physically transm itted outside facilities shallbe enclosed in tw o layers both of w hich provide reasonable evidence of tam pering and w hich concealthe contents The inner enclosure shallclearly identify the address of both the sender and the intended recipient the highest classifi cation levelof the contents and any appropriate w arning notices The outer enclosure shallbe the sam e except that no m arkings to indicate that the contents are classifi ed shallbe visible Intended recipients shallbe identifi ed by nam e only as part of an attention line The follow ing exceptions apply i If the classifi ed inform ation is an internalcom ponent of a packable item of equipm ent the outside shellor body m ay be considered as the inner enclosure provided it does not revealclassifi ed inform ation ii If the classifi ed inform ation is an inaccessible internal com ponent of a bulky item of equipm ent the outside or body of the item m ay be considered to be a suf f cient enclosure provided observation of i it does not revealclassifi ed inform ation iii If the classifi ed inform ation is an item of equipm ent that is not reasonably packable and the shellor body is classifi ed it shall be concealed w ith an opaque enclosure that w illhide allclassifi ed features iv Specialized shipping containers including closed cargo transporters or diplom atic pouch m ay be considered the outer enclosure w hen used and v W hen classifi ed inform ation is hand‐carried outside a facility a locked briefcase m ay serve as the outer enclosure 2 Couriers and authorized persons designated to hand‐carry classifi ed inform ation shallensure that the inform ation rem ains under their constant and continuous protection and that direct point‐to‐point delivery is m ade As an exception agency heads m ay approve as a substitute for a courier on direct fl ights the use of Page 37272 specialized shipping containers that are of suf f cient construction to i provide evidence of forced entry are secured w ith a com bination padlock m eeting FederalSpecifi cation FF‐P‐110 are equipped w ith an electronic sealthat w ould provide evidence of surreptitious entry and are handled by the carrier in a m anner to ensure that the container is protected untilits delivery is com pleted c Transm ission m ethods w ithin and betw een the U S Puerto Rico or a U S possession or trust territory 1 Top Secret Top Secret inform ation shallbe transm itted by direct contact betw een authorized persons the D efense Courier Service or an authorized governm ent agency courier service a designated courier or escort w ith Top Secret clearance electronic m eans over approved com m unications system s U nder no circum stances w illTop Secret inform ation be transm itted via the U S PostalService or any other cleared or uncleared com m ercialcarrier 2 Secret Secret inform ation shallbe transm itted by i Any of the m ethods established for Top Secret U S Postal Service Express M ailand U S PostalService Registered M ail as long as the W aiver of Signature block on the U S PostalService Express M ailLabelshallnot be com pleted and cleared com m ercialcarriers or cleared com m ercialm essenger services The use of street‐side m ail collection boxes is strictly prohibited and ii Agency heads m ay w hen a requirem ent exists for overnight delivery w ithin the U S and its Territories authorize the use of the current holder of the G SA contract for overnight delivery of inform ation for the Executive Branch as long as applicable postal regulations 39 CFR Chapter I are m et Any such delivery service shallbe U S ow ned and operated provide autom ated in‐transit tracking of the classifi ed inform ation and ensure package integrity during transit The contract shallrequire cooperation w ith governm ent inquiries in the event of a loss theft or possible unauthorized disclosure of classifi ed inform ation The sender is responsible for ensuring that an authorized person w illbe available to receive the delivery and verifi cation of the correct m ailing address The package m ay be addressed to the recipient by nam e The release signature block on the receipt labelshallnot be executed under any circum stances The use of external street side collection boxes is prohibited Classifi ed Com m unications Security Inform ation N ATO and foreign governm ent inform ation shallnot be transm itted in this m anner 3 Confi d ential Confi d entialinform ation shallbe transm itted by any of the m ethods established for Secret inform ation or U S Postal Service Certifi ed M ail In addition w hen the recipient is a U S G overnm ent facility the Confi d entialinform ation m ay be transm itted via U S First Class M ail H ow ever Confi d entialinform ation shallnot be transm itted to governm ent contractor facilities via fi rst class m ail W hen fi rst class m ailis used the envelope or outer w rapper shallbe m arked to indicate that the inform ation is not to be forw arded but is to be returned to sender The use of streetside m ail collection boxes is prohibited d Transm ission m ethods to a U S G overnm ent facility located outside the U S The transm ission of classifi ed inform ation to a U S G overnm ent facility located outside the 50 states the D istrict of Colum bia the Com m onw ealth of Puerto Rico or a U S possession or trust territory shallbe by m ethods specifi ed above for Top Secret inform ation or by the D epartm ent of State Courier Service U S Registered M ailthrough M ilitary PostalService facilities m ay be used to transm it Secret and Confi d entialinform ation provided that the inform ation does not at any tim e pass out of U S citizen controlnor pass through a foreign postalsystem e Transm ission of U S classifi ed inform ation to foreign governm ents Such transm ission shalltake place betw een designated governm ent representatives using the governm ent‐to‐governm ent transm ission m ethods described in paragraph d of this section or through channels agreed to by the N ationalSecurity Authorities of the tw o governm ents W hen classifi ed inform ation is transferred to a foreign governm ent or its representative a signed receipt is required f Receipt of classifi ed inform ation Agency heads shallestablish procedures w hich ensure that classifi ed inform ation is received in a m anner w hich precludes unauthorized access provides for inspection of allclassifi ed inform ation received for evidence of tam pering and confi rm ation of contents and ensures tim ely acknow ledgm ent of the receipt of Top Secret and Secret inform ation by an authorized recipient As noted in paragraph e of this section a receipt acknow ledgm ent of allclassifi ed m aterialtransm itted to a foreign governm ent or its representative is required Sec 2001 47 D estruction Classifi ed inform ation identifi ed for destruction shallbe destroyed com pletely to preclude recognition or reconstruction of the classifi ed inform ation in accordance w ith procedures and m ethods prescribed by agency heads The m ethods and equipm ent used to routinely destroy classifi ed inform ation include burning cross‐cut shredding w et‐pulping m elting m utilation chem icaldecom position or pulverizing Agencies shallcom ply w ith the destruction equipm ent standard stated in Sec 2001 42 b of this D irective Sec 2001 48 Loss possible com prom ise or unauthorized disclosure a G eneral Any person w ho has know ledge that classifi ed inform ation has been or m ay have been lost possibly com prom ised or disclosed to an unauthorized person s shallim m ediately report the circum stances to an of f cialdesignated for this purpose i b Cases involving inform ation originated by a foreign governm ent or another U S governm ent agency W henever a loss or possible unauthorized disclosure involves the classifi ed inform ation or interests of a foreign governm ent agency or another U S governm ent agency the departm ent or agency in w hich the com prom ise occurred shall advise the other governm ent agency or foreign governm ent of the circum stances and fi ndings that aff ect their inform ation or interests H ow ever foreign governm ents norm ally w illnot be advised of any security system vulnerabilities that contributed to the com prom ise c Inquiry investigation and corrective actions Agency heads shallestablish appropriate procedures to conduct an inquiry investigation of a loss possible com prom ise or unauthorized disclosure of classifi ed inform ation in order to im plem ent appropriate corrective actions w hich m ay include disciplinary sanctions and to ascertain the degree of dam age to nationalsecurity d Reports to ISO O In accordance w ith section 5 5 e 2 of the O rder agency heads or senior agency of f cials shallnotify the i D irector of ISO O w hen a violation occurs under paragraphs 5 5 b 1 2 or 3 of the O rder that 1 Is reported to oversight com m ittees in the Legislative branch 2 M ay attract signifi cant public attention 3 Involves large am ounts of classifi ed inform ation or 4 Reveals a potentialsystem ic w eakness in classifi cation safeguarding or declassifi cation policy or practices e D epartm ent of Justice and legalcounselcoordination Agency heads shallestablish procedures to ensure coordination w ith legal counselw henever a form alaction beyond a Page 37273 reprim and is contem plated against any person believed responsible for the unauthorized disclosure of classifi ed inform ation W henever a crim inalviolation appears to have occurred and a crim inalprosecution is contem plated agency heads shalluse established procedures to ensure coordination w ith 1 The D epartm ent of Justice and 2 The legalcounselof the agency w here the individual responsible is assigned or em ployed Sec 2001 49 Specialaccess program s a G eneral The safeguarding requirem ents of this D irective m ay be enhanced for inform ation in specialaccess program s SAP established under the provisions of section 4 3 of the O rder by the agency head responsible for creating the SAP Agency heads shallensure that the enhanced controls are based on an assessm ent of the value critical nature and vulnerability of the inform ation b Signifi cant interagency support requirem ents Agency heads m ust ensure that a M em orandum of Agreem ent U nderstanding is established for each SAP that has signifi cant interagency support requirem ents to appropriately and fully address support requirem ents and supporting agency oversight responsibilities for that SAP Sec 2001 50 Telecom m unications autom ated inform ation system s and netw ork security Each agency head shallensure that classifi ed inform ation electronically accessed processed stored or transm itted is protected in accordance w ith applicable nationalpolicy issuances identifi ed in the C om m ittee on N ationalSecurity System s CN SS issuances and the Intelligence Com m unity D irective ICD 503 Intelligence Com m unity Inform ation Technology System s Security Risk M anagem ent Certifi cation and Accreditation Sec 2001 51 Technicalsecurity Based upon the risk m anagem ent factors referenced in Sec 2001 40 of this directive agency heads shalldeterm ine the requirem ent for technicalcounterm easures such as TechnicalSurveillance Counterm easures and TEM PEST necessary to detect or deter exploitation of classifi ed inform ation through technicalcollection m ethods and m ay apply counterm easures in accordance w ith N STISSI7000 TEM PEST Counterm easures for Facilities and SPB Issuance 6‐97 N ationalPolicy on TechnicalSurveillance Counterm easures Sec 2001 52 Em ergency authority a Agency heads or any designee m ay prescribe specialprovisions for the dissem ination transm ission safeguarding and destruction of classifi ed inform ation during certain em ergency situations b In em ergency situations in w hich there is an im m inent threat to life or in defense of the hom eland agency heads or designees m ay authorize the disclosure of classifi ed inform ation to an individualor individuals w ho are otherw ise not routinely eligible for access under the follow ing conditions 1 Lim it the am ount of classifi ed inform ation disclosed to the absolute m inim um to achieve the purpose 2 Lim it the num ber of individuals w ho receive it 3 Transm it the classifi ed inform ation via approved Federal G overnm ent channels by the m ost secure and expeditious m ethod to include those required in Sec 2001 46 or other m eans deem ed necessary w hen tim e is of the essence 4 Provide instructions about w hat specifi c inform ation is classifi ed and how it should be safeguarded physicalcustody of classifi ed inform ation m ust rem ain w ith an authorized Federal G overnm ent entity in allbut the m ost extraordinary circum stances 5 Provide appropriate briefi n gs to the recipients on their responsibilities not to disclose the inform ation and obtain a signed nondisclosure agreem ent 6 W ithin 72 hours of the disclosure of classifi ed inform ation or the earliest opportunity that the em ergency perm its but no later than 30 days after the release the disclosing authority m ust notify the originating agency of the inform ation by providing the follow ing inform ation i A description of the disclosed inform ation ii To w hom the inform ation w as disclosed iii H ow the inform ation w as disclosed and transm itted iv Reason for the em ergency release v H ow the inform ation is being safeguarded and vi A description of the briefi n gs provided and a copy of the nondisclosure agreem ents signed 7 Inform ation disclosed in em ergency situations shallnot be required to be declassifi ed as a result of such disclosure or subsequent use by a recipient Sec 2001 53 O pen storage areas This section describes the m inim um construction standards for open storage areas a Construction The perim eter w alls fl oors and ceiling w illbe perm anently constructed and attached to each other Allconstruction m ust be done in a m anner as to provide visualevidence of unauthorized penetration b D oors D oors shallbe constructed of w ood m etal or other solid m aterial Entrance doors shallbe secured w ith a built‐in G SA‐ approved three‐position com bination lock W hen specialcircum stances exist the agency head m ay authorize other locks on entrance doors for Secret and Confi d entialstorage D oors other than those secured w ith the aforem entioned locks shallbe secured from the inside w ith either deadbolt em ergency egress hardw are a deadbolt or a rigid w ood or m etalbar w hich extends across the w idth of the door or by other m eans approved by the agency head c Vents ducts and m iscellaneous openings Allvents ducts and sim ilar openings in excess of 96 square inches and over 6 inches in its sm allest dim ension that enter or pass through an open storage area shallbe protected w ith either bars expanded m etalgrills com m ercial m etalsounds baf f es or an intrusion detection system l d W indow s 1 Allw indow s w hich m ight reasonably aff ord visual observation of classifi ed activities w ithin the facility shallbe m ade opaque or equipped w ith blinds drapes or other coverings 2 W indow s w ithin 18 feet of the ground w illbe constructed from or covered w ith m aterials w hich provide protection from forced entry The protection provided to the w indow s need be no stronger than the strength of the contiguous w alls O pen storage areas w hich are located w ithin a controlled com pound or equivalent m ay elim inate the requirem ent for forced entry protection if the w indow s are m ade inoperable either by perm anently sealing them or equipping them on the inside w ith a locking m echanism and they are covered by an ID S either independently or by the m otion detection sensors w ithin the area Sec 2001 54 Foreign governm ent inform ation The requirem ents described below are additionalbaseline safeguarding standards that m ay be necessary for foreign governm ent inform ation other than N ATO inform ation that requires protection pursuant to an existing treaty agreem ent bilateralexchange or other obligation N ATO classifi ed inform ation shallbe safeguarded in com pliance w ith U SSAN 1‐07 To the extent practical and to facilitate its control foreign governm ent inform ation Page 37274 should be stored separately from other classifi ed inform ation To avoid additionalcosts separate storage m ay be accom plished by m ethods such as separate draw ers of a container The safeguarding standards described in paragraphs a through e of this section m ay be m odifi ed if required or perm itted by treaties or agreem ents or for other obligations w ith the prior w ritten consent of the N ationalSecurity Authority of the originating governm ent hereafter originating governm ent '' a Top Secret Records shallbe m aintained of the receipt internaldistribution destruction access reproduction and transm ittalof foreign governm ent Top Secret inform ation Reproduction requires the consent of the originating governm ent D estruction w illbe w itnessed b Secret Records shallbe m aintained of the receipt external dispatch and destruction of foreign governm ent Secret inform ation O ther records m ay be necessary if required by the originator Secret foreign governm ent inform ation m ay be reproduced to m eet m ission requirem ents unless prohibited by the originator Reproduction shallbe recorded unless this requirem ent is w aived by the originator c Confi dential Records need not be m aintained for foreign governm ent Confi d entialinform ation unless required by the originator d Restricted and other foreign governm ent inform ation provided in confi d ence In order to assure the protection of other foreign governm ent inform ation provided in confi d ence e g foreign governm ent Restricted '' D esignated ''or unclassifi ed provided in confi d ence such inform ation m ust be classifi ed under the O rder The receiving agency or a receiving U S contractor licensee grantee or certifi cate holder acting in accordance w ith instructions received from the U S G overnm ent shallprovide a degree of protection to the foreign governm ent inform ation at least equivalent to that required by the governm ent or internationalorganization that provided the inform ation W hen adequate to achieve equivalency these standards m ay be less restrictive than the safeguarding standards that ordinarily apply to U S Confi d entialinform ation If the foreign protection requirem ent is low er than the protection required for U S Confi dential inform ation the follow ing requirem ents shallbe m et 1 D ocum ents m ay retain their originalforeign m arkings if the responsible agency determ ines that these m arkings are adequate to m eet the purposes served by U S classifi cation m arkings O therw ise docum ents shallbe m arked This docum ent contains insert nam e of country insert classifi cation level inform ation to be treated as U S insert classifi cation level ''The notation M odifi ed H andling Authorized ''m ay be added to either the foreign or U S m arkings authorized for foreign governm ent inform ation If rem arking foreign originated docum ents or m atter is im practical an approved cover sheet is an authorized option 2 D ocum ents shallbe provided only to persons in accordance w ith sections 4 1 a and h of the O rder 3 Individuals being given access shallbe notifi ed of applicable handling instructions This m ay be accom plished by a briefi ng w ritten instructions or by applying specifi c handling requirem ents to an approved cover sheet 4 D ocum ents shallbe stored in such a m anner so as to prevent unauthorized access 5 D ocum ents shallbe transm itted in a m ethod approved for classifi ed inform ation unless this m ethod is w aived by the originating governm ent e Third‐country transfers The release or disclosure of foreign governm ent inform ation to any third‐country entity m ust have the prior consent of the originating governm ent if required by a treaty agreem ent bilateralexchange or other obligation Sec 2001 55 Foreign disclosure of classifi ed inform ation Classifi ed inform ation originating in one agency m ay be dissem inated by any other agency to w hich it has been m ade available to a foreign governm ent or internationalorganization of governm ents or any elem ent thereof in accordance w ith statute the O rder directives im plem enting the O rder direction of the President or w ith the consent of the originating agency unless the originating agency has determ ined that prior authorization is required for such dissem ination and has m arked or indicated such requirem ent on the m edium containing the classifi ed inform ation M arkings used to im plem ent this section shall be approved in accordance w ith Sec 2001 24 j W ith respect to the Intelligence Com m unity the D irector of N ationalIntelligence m ay issue policy directives or guidelines pursuant to section 6 2 b of the O rder that m odify such prior authorization Subpart F‐‐Self‐Inspections Sec 2001 60 G eneral a Purpose This subpart sets standards for establishing and m aintaining an ongoing agency self‐inspection program w hich shall include regular review s of representative sam ples of the agency's originaland derivative classifi cation actions b Responsibility The senior agency of f cialis responsible for i directing and adm inistering the agency's self‐inspection program The senior agency of f cialshalldesignate agency personnelto assist in i carrying out this responsibility The program shallbe structured to provide the senior agency of f cialw ith inform ation necessary to assess i the eff ectiveness of the classifi ed nationalsecurity inform ation program w ithin individualagency activities and the agency as a w hole in order to enable the senior agency of f cialto fulfi i llhis or her responsibility to oversee the agency's program under section 5 4 d of the O rder c Approach The senior agency of f cialshalldeterm ine the m eans i and m ethods for the conduct of self‐inspections 1 Self‐inspections should evaluate the adherence to the principles and requirem ents of the O rder and this directive and the eff ectiveness of agency program s covering originalclassifi cation derivative classifi cation declassifi cation safeguarding security violations security education and training and m anagem ent and oversight 2 Regular review s of representative sam ples of the agency's originaland derivative classifi cation actions shallencom pass all agency activities that generate classifi ed inform ation They shall include a sam ple of varying types of classifi ed inform ation in docum ent and electronic form at such as e‐m ail to provide a representative sam ple of the activity's classifi cation actions The sam ple shallbe proportionally suf f cient to enable a credible i assessm ent of the agency's classifi ed product Agency personnelw ho are assigned to conduct review s of agencies'originaland derivative classifi cation actions shallbe know ledgeable of the classifi cation and m arking requirem ents of the O rder and this directive and have access to pertinent security classifi cation guides In accordance w ith section 5 4 d 4 of the O rder the senior agency of f cialshallauthorize i appropriate agency of f cials to correct m isclassifi i cation actions 3 Self‐inspections should include a review of relevant security directives and instructions as w ellas interview s w ith producers and users of classifi ed inform ation d Frequency Self‐inspections shallbe regular ongoing and conducted at least annually w ith the senior agency Page 37275 of f cialsetting the frequency on the basis of program needs and the i degree of classifi cation activity Activities that generate signifi cant am ounts of classifi ed inform ation shallinclude a representative sam ple of their originaland derivative classifi cation actions e Coverage The senior agency of f cialshallestablish self‐ i inspection coverage requirem ents based on program and policy needs Agencies w ith specialaccess program s shallevaluate those program s in accordance w ith sections 4 3 b 2 and 4 of the O rder at least annually f Reporting Agencies shalldocum ent the fi n dings of self‐ inspections internally 1 Internal The senior agency of i c fialshallset the form at for docum enting self‐inspection fi ndings As part of corrective action for fi n dings and other concerns of a system ic nature refresher security education and training should address the underlying cause s of the issue 2 External The senior agency of f cialshallreport annually to i the D irector of ISO O on the agency's self‐inspection program This report shallinclude i A description of the agency's self‐inspection program to include activities assessed program areas covered and m ethodology utilized ii The assessm ent and a sum m ary of the fi n dings of the agency self‐inspections in the follow ing program areas O riginal classifi cation derivative classifi cation declassifi cation safeguarding security violations security education and training and m anagem ent and oversight iii Specifi c inform ation w ith regard to the fi n dings of the annualreview of the agency's originaland derivative classifi cation actions to include the volum e of classifi ed m aterials review ed and the num ber and type of discrepancies that w ere identifi ed iv Actions that have been taken or are planned to correct identifi ed defi ciencies or m isclassifi cation actions and to deter their reoccurrence and v Best practices that w ere identifi ed during self‐inspections Subpart G ‐‐Security Education and Training Sec 2001 70 G eneral a Purpose This subpart sets standards for agency security education and training program s Im plem entation of these standards should 1 Ensure that allexecutive branch em ployees w ho create process or handle classifi ed inform ation have a satisfactory know ledge and understanding of classifi cation safeguarding and declassifi cation policies and procedures 2 Increase uniform ity in the conduct of agency security education and training program s and 3 Reduce instances of over‐classifi cation or im proper classifi cation im proper safeguarding and inappropriate or inadequate declassifi cation practices b Responsibility The senior agency of f cialis responsible for i the agency's security education and training program The senior agency of f cialshalldesignate agency personnel as necessary to assist in i carrying out this responsibility c Approach Security education and training should be tailored to m eet the specifi c needs of the agency's security program and the specifi c roles em ployees are expected to play in that program The agency of f cial s responsible for the program shalldeterm ine the i m eans and m ethods for providing security education and training Training m ethods m ay include briefi n gs interactive videos dissem ination of instructionalm aterials on‐line presentations and other m edia and m ethods Each agency shallm aintain records about the program s it has off ered and em ployee participation in them d Frequency The frequency of agency security education and training w illvary in accordance w ith the needs of the agency's security classifi cation program subject to the follow ing requirem ents 1 Initialtraining shallbe provided to every person w ho has m et the standards for access to classifi ed inform ation in accordance w ith section 4 1 of the O rder 2 O riginalclassifi cation authorities shallreceive training in proper classifi cation and declassifi cation prior to originally classifying inform ation and at least once each calendar year thereafter 3 Persons w ho apply derivative classifi cation m arkings shall receive training in the proper application of the derivative classifi cation principles of the O rder prior to derivatively classifying inform ation and at least once every tw o years 4 Each agency shallprovide som e form of refresher security education and training at least annually for allits personnelw ho handle or generate classifi ed inform ation Sec 2001 71 Coverage a G eneral Each departm ent or agency shallestablish and m aintain a form alsecurity education and training program w hich provides for initialtraining refresher training specialized training and term ination briefi n gs This subpart establishes fundam entalsecurity education and training standards for originalclassifi cation authorities derivative classifi ers declassifi cation authorities security m anagers classifi cation m anagem ent of f cers security i specialists and allother personnelw hose duties signifi cantly involve the creation or handling of classifi ed inform ation Agency of f cials i responsible for the security education and training program s should determ ine the specifi c training to be provided according to the agency's program and policy needs b Initialtraining Allcleared agency personnelshallreceive initialtraining on basic security policies principles practices and crim inal civil and adm inistrative penalties Such training m ust be provided in conjunction w ith the granting of a security clearance and prior to accessing classifi ed inform ation c Training for originalclassifi cation authorities O riginal classifi cation authorities shallbe provided detailed training on proper classifi cation and declassifi cation w ith an em phasis on the avoidance of over‐classifi cation At a m inim um the training shall cover classifi cation standards classifi cation levels classifi cation authority classifi cation categories duration of classifi cation identifi cation and m arkings classifi cation prohibitions and lim itations sanctions classifi cation challenges security classifi cation guides and inform ation sharing 1 Personnelshallreceive this training prior to originally classifying inform ation 2 In addition to this initialtraining originalclassifi cation authorities shallreceive training in proper classifi cation and declassifi cation at least once each calendar year 3 O riginalclassifi cation authorities w ho do not receive such m andatory training at least once w ithin a calendar year shallhave their classifi cation authority suspended untilsuch training has taken place i An agency head deputy agency head or senior agency of f cial i m ay grant a w aiver of this requirem ent if an individualis unable to receive this training due to unavoidable circum stances Allsuch w aivers shallbe docum ented ii W henever such a w aiver is granted the individualshall receive the required training as soon as practicable d Training for persons w ho apply derivative classifi cation m arkings Persons w ho apply derivative classifi cation m arkings shall receive Page 37276 training in the proper application of the derivative classifi cation principles of the O rder em phasizing the avoidance of over‐ classifi cation At a m inim um the training shallcover the principles of derivative classifi cation classifi cation levels duration of classifi cation identifi cation and m arkings classifi cation prohibitions and lim itations sanctions classifi cation challenges security classifi cation guides and inform ation sharing 1 Personnelshallreceive this training prior to derivatively classifying inform ation 2 In addition to this preparatory training derivative classifi ers shallreceive such training at least once every tw o years 3 D erivative classifi ers w ho do not receive such m andatory training at least once every tw o years shallhave their authority to apply derivative classifi cation m arkings suspended untilthey have received such training i An agency head deputy agency head or senior agency of f cial i m ay grant a w aiver of this requirem ent if an individualis unable to receive this training due to unavoidable circum stances Allsuch w aivers shallbe docum ented ii W henever such a w aiver is granted the individualshall receive the required training as soon as practicable e O ther specialized security education and training Classifi cation m anagem ent of f cers security m anagers security i specialists declassifi cation authorities and allother personnel w hose duties signifi cantly involve the creation or handling of classifi ed inform ation shallreceive m ore detailed or additional training no later than six m onths after assum ption of duties that require other specialized training f Annualrefresher security education and training Agencies shallprovide annualrefresher training to em ployees w ho create process or handle classifi ed inform ation Annualrefresher training should reinforce the policies principles and procedures covered in initialand specialized training Annualrefresher training should also address identifi cation and handling of other agency‐originated inform ation and foreign governm ent inform ation as w ellas the threat and the techniques em ployed by foreign intelligence activities attem pting to obtain classifi ed inform ation and advise personnelof penalties for engaging in espionage activities Annualrefresher training should also address issues or concerns identifi ed during agency self‐inspections g Term ination briefi n gs Except in extraordinary circum stances each agency shallensure that each em ployee w ho is granted access to classifi ed inform ation and w ho leaves the service of the agency receives a term ination briefi ng Also each agency em ployee w hose clearance is w ithdraw n or revoked m ust receive such a briefi n g At a m inim um term ination briefi ngs m ust im press upon each em ployee the continuing responsibility not to disclose any classifi ed inform ation to w hich the em ployee had access and the potentialpenalties for non‐ com pliance and the obligation to return to the appropriate agency of f cialallclassifi i ed docum ents and m aterials in the em ployee's possession h O ther security education and training Agencies are encouraged to develop additionalsecurity education and training according to program and policy needs Such security education and training could include 1 Practices applicable to U S of f cials traveling overseas i 2 Procedures for protecting classifi ed inform ation processed and stored in autom ated inform ation system s 3 M ethods for dealing w ith uncleared personnelw ho w ork in proxim ity to classifi ed inform ation 4 Responsibilities of personnelserving as couriers of classifi ed inform ation and 5 Security requirem ents that govern participation in internationalprogram s Subpart H ‐‐Standard Form s Sec 2001 80 Prescribed standard form s a G eneral The purpose of the standard form s is to prom ote the im plem entation of the governm ent‐w ide inform ation security program Standard form s are prescribed w hen their use w illenhance the protection of nationalsecurity inform ation and or w illreduce the costs associated w ith its protection The use of the standard form s prescribed is m andatory for agencies of the executive branch that create or handle nationalsecurity inform ation As appropriate these agencies m ay m andate the use of these form s by their contractors licensees or grantees w ho are authorized access to nationalsecurity inform ation b W aivers Except for the SF 312 Classifi ed Inform ation N ondisclosure Agreem ent ''and the SF 714 FinancialD isclosure Report '' w hich are w aiverable by the D irector of N ational Intelligence as the Security Executive Agent under E O 13467 Reform ing Processes Related to Suitability for G overnm ent Em ploym ent Fitness for Contractor Em ployees and Eligibility for Access to Classifi ed N ationalSecurity Inform ation only the D irector of ISO O m ay grant a w aiver from the use of the prescribed standard form s To apply for a w aiver an agency m ust subm it its proposed alternative form to the D irector of ISO O along w ith its justifi cation for use The D irector of ISO O w illreview the request and notify the agency of the decision W aivers approved prior to D ecem ber 29 2009 rem ain in eff ect and are subject to review c Availability Agencies m ay obtain copies of the standard form s prescribed by ordering through FED STRIP M ILSTRIP or from the G SA Consum er G lobalSupply Centers or the G SA Advantage on‐line service Som e of these standard form s can be dow nloaded from the G SA Form s Library d Standard Form s Standard form s required for application to nationalsecurity inform ation are as follow s 1 SF 311 Agency Security Classifi cation M anagem ent Program D ata The SF 311 is a data collection form com pleted by only those executive branch agencies that create and or handle classifi ed nationalsecurity inform ation The form is a record of classifi cation m anagem ent data provided by the agencies The agencies subm it the com pleted form s on an annualbasis to ISO O no later than N ovem ber 15 follow ing the reporting period for inclusion in a report to the President 2 SF 312 Classifi ed Inform ation N ondisclosure Agreem ent i The SF 312 is a nondisclosure agreem ent betw een the U nited States and an em ployee of the FederalG overnm ent or one of its contractors licensees or grantees The prior execution of this form by an individualis necessary before the U nited States G overnm ent m ay grant that individualaccess to classifi ed inform ation w ith the exception of an em ergency as defi n ed in section 4 2 b of the O rder ii Electronic signatures on SF‐312s are prohibited iii The SF 312 is the current authorized form if an em ployee originally signed the now outdated SF 189 or SF 189‐A or a form under an approved w aiver as agreem ent to nondisclosure the form s rem ain valid The SF 189 and SF 189‐A are no longer available for use w ith new em ployees iv The use of the Security D ebriefi n g Acknow ledgem ent''portion of the SF 312 is optionalat the discretion of the im plem enting agency If an agency chooses not to record its debriefi n g by signing dating the debriefi n g section of the SF 312 then Page 37277 the agency shallprovide an alternative record v An authorized representative of a contractor licensee grantee or other non‐G overnm ent organization acting as a designated agent of the U nited States m ay w itness the execution of the SF 312 by another non‐G overnm ent em ployee and m ay accept it on behalf of the U nited States Also an em ployee of a U nited States agency m ay w itness the execution of the SF 312 by an em ployee contractor licensee or grantee of another U nited States agency provided that an authorized U nited States G overnm ent of f cialor for non‐G overnm ent em ployees i only a designated agent of the U nited States subsequently accepts by signature the SF 312 on behalf of the U nited States vi The provisions of the SF 312 the SF 189 and the SF 189‐A do not supersede the provisions of 5 U S C 2302 w hich pertain to the protected disclosure of inform ation by G overnm ent em ployees or any other law s of the U nited States vii Each agency m ust retain its executed copies of the SF 312 SF 189 and SF 189‐A in fi le system s from w hich an agreem ent can be expeditiously retrieved in the event that the U nited States m ust seek its enforcem ent or a subsequent em ployer m ust confi rm its prior execution The original or a legally enforceable facsim ile that is retained in lieu of the original such as m icrofi che m icrofi lm com puter disk or electronic storage m edium m ust be retained for 50 years follow ing its date of execution For agreem ents executed by civilian em ployees of the U nited States G overnm ent an agency m ay store the executed copy of the SF 312 and SF 189 in the U nited States O f f ce i of PersonnelM anagem ent's O f f cialPersonnelFolder as a long‐term i right side docum ent for that em ployee An agency m ay perm it its contractors licensees and grantees to retain the executed agreem ents of their em ployees during the tim e of em ploym ent U pon the term ination of em ploym ent the contractors licensee or grantee shalldeliver the originalor legally enforceable facsim ile of the executed SF 312 SF 189 or SF 189‐A of that em ployee to the G overnm ent agency prim arily responsible for his or her classifi ed w ork A contractor licensee or grantee of an agency participating in the N ationalIndustrialSecurity Program shallprovide the copy or legally enforceable facsim ile of the executed SF 312 SF 189 or SF 189‐A of a term inated em ployee to their cognizant security of f ce Each agency shallinform ISO O of the fi i le system s that it uses to store these agreem ents for each category of aff ected individuals viii O nly the D irector of N ationalIntelligence as the Security Executive Agent m ay grant an agency's request for a w aiver from the use of the SF 312 To apply for a w aiver an agency m ust subm it its proposed alternative nondisclosure agreem ent to the D irector of the SpecialSecurity Center SSC O f f ce of the D irector of N ational i Intelligence along w ith a justifi cation for its use The D irector SSC shallrequest a determ ination about the alternative agreem ent's enforceability from the D epartm ent of Justice ix The nationalstock num ber for the SF 312 is 7540‐01‐280‐5499 3 SF 700 Security Container Inform ation The SF 700 provides the nam es addresses and telephone num bers of em ployees w ho are to be contacted if the security container to w hich the form pertains is found open and unattended The form also includes the m eans to m aintain a current record of the security container's com bination and provides the envelope to be used to forw ard this inform ation to the appropriate agency activity or of f cial If an agency determ ines as part of its i risk m anagem ent strategy that a security container inform ation form is required the SF 700 shallbe used Parts 2 and 2A of each com pleted copy of SF 700 shallbe classifi ed at the highest levelof classifi cation of the inform ation authorized for storage in the security container A new SF 700 m ust be com pleted each tim e the com bination to the security container is changed The nationalstock num ber for the SF 700 is 7540‐01‐214‐5372 4 SF 701 Activity Security Checklist The SF 701 provides a system atic m eans to m ake a thorough end‐of‐day security inspection for a particular w ork area and to allow for em ployee accountability in the event that irregularities are discovered If an agency determ ines as part of its risk m anagem ent strategy that an activity security checklist is required the SF 701 w illbe used Com pletion storage and disposition of SF 701 w illbe in accordance w ith each agency's security regulations The nationalstock num ber for the SF 701 is 7540‐ 01‐213‐7899 5 SF 702 Security Container Check Sheet The SF 702 provides a record of the nam es and tim es that persons have opened closed or checked a particular container that holds classifi ed inform ation If an agency determ ines as part of its risk m anagem ent strategy that a security container check sheet is required the SF 702 w illbe used Com pletion storage and disposalof the SF 702 w illbe in accordance w ith each agency's security regulations The nationalstock num ber of the SF 702 is 7540‐01‐213‐7900 6 SF 703 TO P SECRET Cover Sheet The SF 703 serves as a shield to protect Top Secret classifi ed inform ation from inadvertent disclosure and to alert observers that Top Secret inform ation is attached to it If an agency determ ines as part of its risk m anagem ent strategy that a TO P SECRET cover sheet is required the SF 703 w illbe used The SF 703 is af f xed to the top of the Top Secret docum ent and i rem ains attached untilthe docum ent is dow ngraded requiring the appropriate classifi cation levelcover sheet declassifi ed or destroyed W hen the SF 703 has been appropriately rem oved it m ay depending upon its condition be reused The nationalstock num ber of the SF 703 is 7540‐01‐213‐7901 7 SF 704 SECRET Cover Sheet The SF 704 serves as a shield to protect Secret classifi ed inform ation from inadvertent disclosure and to alert observers that Secret inform ation is attached to it If an agency determ ines as part of its risk m anagem ent strategy that a SECRET cover sheet is required the SF 704 w illbe used The SF 704 is af f xed to the top of the Secret docum ent and rem ains attached until i the docum ent is dow ngraded requiring the appropriate classifi cation levelcover sheet declassifi ed or destroyed W hen the SF 704 has been appropriately rem oved it m ay depending upon its condition be reused The nationalstock num ber of the SF 704 is 7540‐01‐213‐7902 8 SF 705 CO N FID EN TIAL Cover Sheet The SF 705 serves as a shield to protect Confi d entialclassifi ed inform ation from inadvertent disclosure and to alert observers that Confi dentialinform ation is attached to it If an agency determ ines as part of its risk m anagem ent strategy that a CO N FID EN TIAL cover sheet is required the SF 705 w ill be used The SF 705 is af f xed to the top of the Confi i d entialdocum ent and rem ains attached untilthe docum ent is destroyed W hen the SF 705 has been appropriately rem oved it m ay depending upon its condition be reused The nationalstock num ber of the SF 704 is 7540‐01‐213‐7903 9 SF 706 TO P SECRET Label The SF 706 is used to identify and protect electronic m edia and other m edia that contain Top Secret inform ation The SF 706 is used instead of the SF 703 for m edia other than docum ents If an agency determ ines as part of its risk m anagem ent strategy that a TO P SECRET labelis required the SF 706 w illbe used The SF 706 is af f xed to the m edium containing Top Secret i Page 37278 inform ation in a m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used O nce the labelhas been applied it cannot be rem oved The nationalstock num ber of the SF 706 is 7540‐ 01‐207‐5536 10 SF 707 SECRET Label The SF 707 is used to identify and protect electronic m edia and other m edia that contain Secret inform ation The SF 707 is used instead of the SF 704 for m edia other than docum ents If an agency determ ines as part of its risk m anagem ent strategy that a SECRET labelis required the SF 707 w illbe used The SF 707 is af f xed to the m edium containing Secret inform ation in a i m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used O nce the labelhas been applied it cannot be rem oved The nationalstock num ber of the SF 707 is 7540‐01‐207‐5537 11 SF 708 CO N FID EN TIAL Label The SF 708 is used to identify and protect electronic m edia and other m edia that contain Confi d ential inform ation The SF 708 is used instead of the SF 705 for m edia other than docum ents If an agency determ ines as part of its risk m anagem ent strategy that a CO N FID EN TIAL labelis required the SF 708 w illbe used The SF 708 is af f xed to the m edium containing C onfi i d ential inform ation in a m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used O nce the labelhas been applied it cannot be rem oved The nationalstock num ber of the SF 708 is 7540‐ 01‐207‐5538 12 SF 709 CLASSIFIED Label The SF 709 is used to identify and protect electronic m edia and other m edia that contain classifi ed inform ation pending a determ ination by the classifi er of the specifi c classifi cation levelof the inform ation If an agency determ ines as part of its risk m anagem ent strategy that a CLASSIFIED labelis required the SF 709 w illbe used The SF 709 is af f xed to the m edium i containing classifi ed inform ation in a m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used O nce the labelhas been applied it cannot be rem oved W hen a classifi er has m ade a determ ination of the specifi c levelof classifi cation of the inform ation contained on the m edium either the SF 706 SF 707 or SF 708 shallbe af f xed on top of the SF 709 so that only the SF 706 SF i 707 or SF 708 is visible The nationalstock num ber of the SF 709 is 7540‐01‐207‐5540 13 SF 710 U N CLASSIFIED Label In a m ixed environm ent in w hich classifi ed and unclassifi ed inform ation are being processed or stored the SF 710 is used to identify electronic m edia and other m edia that contain unclassifi ed inform ation Its function is to aid in distinguishing am ong those m edia that contain either classifi ed or unclassifi ed inform ation in a m ixed environm ent If an agency determ ines as part of its risk m anagem ent strategy that an U N CLASSIFIED labelis required the SF 710 w illbe used The SF 710 is af f xed to the m edium containing unclassifi i ed inform ation in a m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used O nce the labelhas been applied it cannot be rem oved H ow ever the labelis sm allenough so that it can be w holly covered by a SF 706 SF 707 SF 708 or SF 709 if the m edium subsequently contains classifi ed inform ation The nationalstock num ber of the SF 710 is 7540‐01‐207‐5539 14 SF 711 D ATA D ESCRIPTO R Label The SF 711 is used to identify additionalsafeguarding controls that pertain to classifi ed inform ation that is stored or contained on electronic or other m edia If an agency determ ines as part of its risk m anagem ent strategy that a D ATA D ESCRIPTO R labelis required the SF 711 w illbe used The SF 711 is af f xed to the electronic m edium containing classifi i ed inform ation in a m anner that w ould not adversely aff ect operation of equipm ent in w hich the m edium is used The SF 711 is ordinarily used in conjunction w ith the SF 706 SF 707 SF 708 or SF 709 as appropriate O nce the label has been applied it cannot be rem oved The SF 711 provides spaces for inform ation that should be com pleted as required The nationalstock num ber of the SF 711 is 7540‐01‐207‐5541 15 SF 714 FinancialD isclosure Report W hen required by an agency head or by the D irector of N ationalIntelligence as the Security Executive Agent the SF 714 contains inform ation that is used to m ake personnelsecurity determ inations including w hether to grant a security clearance to allow access to classifi ed inform ation sensitive areas and equipm ent or to perm it assignm ent to sensitive nationalsecurity positions The data m ay later be used as a part of a review process to evaluate continued eligibility for access to classifi ed inform ation or as evidence in legalproceedings The SF 714 assists law enforcem ent agencies in obtaining pertinent inform ation in the prelim inary stages of potentialespionage and counter terrorism cases 16 SF 715 G overnm ent D eclassifi cation Review Tab The SF 715 is used to record the status of classifi ed nationalsecurity inform ation review ed for declassifi cation The SF 715 shallbe used in all situations that callfor the use of a tab as part of the processing of records determ ined to be of perm anent historicalvalue The national stock num ber for the SF 715 is 7540‐01‐537‐4689 Subpart I‐‐Reporting and D efi n itions Sec 2001 90 Agency annualreporting requirem ents a D elegations of originalclassifi cation authority Agencies shallreport delegations of originalclassifi cation authority to ISO O annually in accordance w ith section 1 3 c of the O rder and Sec 2001 11 c b Statisticalreporting Each agency that creates or safeguards classifi ed inform ation shallreport annually to the D irector of ISO O statistics related to its security classifi cation program The D irector w illinstruct agencies w hat data elem ents are required and how and w hen they are to be reported c Accounting for costs 1 Inform ation on the costs associated w ith the im plem entation of the O rder w illbe collected from the agencies The agencies w ill provide data to ISO O on the cost estim ates for classifi cation‐related activities ISO O w illreport these cost estim ates annually to the President The agency senior of f cialshould w ork closely w ith the i agency com ptroller to ensure that the best estim ates are collected 2 The Secretary of D efense acting as the executive agent for the N ationalIndustrialSecurity Program under E O 12829 as am ended N ationalIndustrialSecurity Program and consistent w ith agreem ents entered into under section 202 of E O 12989 as am ended w illcollect cost estim ates for classifi cation‐related activities of contractors licensees certifi cate holders and grantees and report them to ISO O annually ISO O w illreport these cost estim ates annually to the President d Self‐Inspections Agencies shallreport annually to the D irector of ISO O as required by section 5 4 d 4 of the O rder and outlined in Sec 2001 60 f Sec 2001 91 O ther agency reporting requirem ents a Inform ation declassifi ed w ithout proper authority D eterm inations that classifi ed inform ation has been declassifi ed w ithout proper authority shallbe prom ptly reported in w riting to the D irector of ISO O in accordance w ith Sec 2001 13 a b Reclassifi cation actions Reclassifi cation of inform ation that has been declassifi ed and released under Page 37279 proper authority shallbe reported prom ptly to the N ationalSecurity Advisor and the D irector of ISO O in accordance w ith section 1 7 c 3 of the O rder and Sec 2001 13 b c Fundam entalclassifi cation guidance review The initial fundam entalguidance review is to be com pleted no later than June 27 2012 Agency heads shallprovide a detailed report sum m arizing the results of each classifi cation guidance review to ISO O and release an unclassifi ed version to the public in accordance w ith section 1 9 of the O rder and Sec 2001 16 d d Violations of the O rder Agency heads or senior agency of f cials shallnotify the D irector of ISO O w hen a violation occurs i under sections 5 5 b 1 2 or 3 of the O rder and Sec 2001 48 d Sec 2001 92 D efi n itions a Accessioned records m eans records of perm anent historicalvalue in the legalcustody of N ARA b Authorized person m eans a person w ho has a favorable determ ination of eligibility for access to classifi ed inform ation has signed an approved nondisclosure agreem ent and has a need‐to‐know c Classifi cation m anagem ent m eans the life‐cycle m anagem ent of classifi ed nationalsecurity inform ation from originalclassifi cation to declassifi cation d Cleared com m ercialcarrier m eans a carrier that is authorized by law regulatory body or regulation to transport Secret and Confi d entialm aterialand has been granted a Secret facility clearance in accordance w ith the N ationalIndustrialSecurity Program e Controlm eans the authority of the agency that originates inform ation or its successor in function to regulate access to the inform ation f Em ployee m eans a person other than the President and Vice President em ployed by detailed or assigned to an agency including m em bers of the Arm ed Forces an expert or consultant to an agency an industrialor com m ercialcontractor licensee certifi cate holder or grantee of an agency including allsubcontractors a personalservices contractor or any other category of person w ho acts for or on behalf of an agency as determ ined by the appropriate agency head g Equity refers to inform ation 1 O riginally classifi ed by or under the controlof an agency 2 In the possession of the receiving agency in the event of transfer of function or 3 In the possession of a successor agency for an agency that has ceased to exist h Exem pted m eans nom enclature and m arkings indicating inform ation has been determ ined to fallw ithin an enum erated exem ption from autom atic declassifi cation under the O rder i Facility m eans an activity of an agency authorized by appropriate authority to conduct classifi ed operations or to perform classifi ed w ork j Federalrecord includes allbooks papers m aps photographs m achine‐readable m aterials or other docum entary m aterials regardless of physicalform or characteristics m ade or received by an agency of the U nited States G overnm ent under Federallaw or in connection w ith the transaction of public business and preserved or appropriate for preservation by that agency or its legitim ate successor as evidence of the organization functions policies decisions procedures operations or other activities of the G overnm ent or because of the inform ationalvalue of data in them Library and m useum m aterialm ade or acquired and preserved solely for reference and stocks of publications and processed docum ents are not included 44 U S C 3301 k N ew ly discovered records m eans records that w ere inadvertently not review ed prior to the eff ective date of autom atic declassifi cation because the appropriate agency personnelw ere unaw are of their existence l O pen storage area m eans an area constructed in accordance w ith Sec 2001 53 of this part and authorized by the agency head for open storage of classifi ed inform ation m O riginalclassifi cation authority w ith jurisdiction over the inform ation includes 1 The of i c fialw ho authorized the originalclassifi cation if that of f cialis stillserving in the sam e position i 2 The originator's current successor in function 3 A supervisory of f cialof either or i 4 The senior agency of f cialunder the O rder i n Perm anent records m eans any Federalrecord that has been determ ined by the N ationalArchives to have suf f cient value to w arrant i its preservation in the N ationalArchives Perm anent records include allrecords accessioned by the N ationalArchives into the N ational Archives and later increm ents of the sam e records and those for w hich the disposition is perm anent on SF 115s Request for Records D isposition Authority approved by the N ationalArchives on or after M ay 14 1973 o Perm anently valuable inform ation or perm anent historicalvalue refers to inform ation contained in 1 Records that have been accessioned by the N ationalArchives 2 Records that have been scheduled as perm anent under a records disposition schedule approved by the N ationalArchives and 3 Presidentialhistoricalm aterials presidentialrecords or donated historicalm aterials located in the N ationalArchives a presidentiallibrary or any other approved repository p Presidentialpapers historicalm aterials and records m eans the papers or records of the form er Presidents under the legalcontrol of the Archivist pursuant to sections 2111 2111 note or 2203 of title 44 U S C q Redaction m eans the rem ovalof classifi ed inform ation from copies of a docum ent such that recovery of the inform ation on the copy is not possible using any reasonably know n technique or analysis r Risk m anagem ent principles m eans the principles applied for assessing threats and vulnerabilities and im plem enting security counterm easures w hile m axim izing the sharing of inform ation to achieve an acceptable levelof risk at an acceptable cost s Security‐in‐depth m eans a determ ination by the agency head that a facility's security program consists of layered and com plem entary security controls suf f cient to deter and detect unauthorized entry and i m ovem ent w ithin the facility Exam ples include but are not lim ited to use of perim eter fences em ployee and visitor access controls use of an Intrusion D etection System ID S random guard patrols throughout the facility during nonw orking hours closed circuit video m onitoring or other safeguards that m itigate the vulnerability of open storage areas w ithout alarm s and security storage cabinets during nonw orking hours t Supplem entalcontrols m eans prescribed procedures or system s that provide security controlm easures designed to augm ent the physical protection of classifi ed inform ation Exam ples of supplem entalcontrols include intrusion detection system s periodic inspections of security containers or areas and security‐in‐depth u Tem porary records m eans Federalrecords approved by N ARA for disposal either im m ediately or after a specifi ed retention period Also called disposable records v Transclassifi cation m eans inform ation that has been rem oved from Page 37280 the Restricted D ata category in order to carry out provisions of the N ationalSecurity Act of 1947 as am ended and safeguarded under applicable Executive orders as N ationalSecurity Inform ation '' w U nscheduled records m eans Federalrecords w hose fi n al disposition has not been approved by N ARA Allrecords that fallunder a N ARA approved records controlschedule are considered to be scheduled records PART 2003‐‐ REM O VED 0 2 U nder the authority of E O 12958 60 FR 19825 3 CFR Com p p 333 as am ended by E O 13292 68 FR 15315 M arch 28 2003 rem ove and reserve 32 CFR part 2003 D ated June 22 2010 W illiam J Bosanko D irector Inform ation Security O versight O f f ce i Approved June 22 2010 D avid S Ferriero Archivist of the U nited States FR D oc 2010‐15443 Filed 6‐25‐10 8 45 am BILLIN G CO D E 7515‐01‐P
OCR of the Document
View the Document >>