§ 29.5 - Requirements for protection.  


Latest version.
  • § 29.5 Requirements for protection.

    (a) CII shall receive receives the protections of section 214 of the CII Act when:

    (1) Such information is voluntarily submitted, directly or indirectly, to the PCII Program Manager Office or the a PCII Program Manager's designeeDesignee;

    (2) The information is submitted for protected use regarding the security of critical infrastructure or protected systems, analysis, warning, interdependency study, recovery, reconstitution, or other appropriate purposes including, without limitation, for the identification, analysis, prevention, preemption, disruption, defense against and/or mitigation of terrorist threats to the homeland;

    (3) The information is labeled with an express statement as follows:

    (i) Documentary submissions. In the case of documentary submissions, a written marking on the information or records substantially similar to the following: “This information is voluntarily submitted to the Federal federal government in expectation of protection from disclosure as provided by the provisions of the Critical Infrastructure Information Act of 2002”; or 2002, as amended by the Cybersecurity and Infrastructure Security Act of 2018”;

    (ii) Oral submissions. In the case of oral informationsubmissions:

    (A) Through an oral statement, made at the time of the oral submission or within a reasonable period of time thereafter, indicating an expectation of protection from disclosure as provided by the provisions of the CII Act; and

    (B) Through a written statement substantially similar to the one specified above in paragraph (a)(3)(i) of this section accompanied by a document that memorializes the nature of the oral information submission initially provided received by to the PCII Program Manager Office or the PCII Program Manager's designee Designee within a reasonable period of time after using making the oral submission; and or

    (iii) Electronic submissions. In the case of electronic informationsubmissions:

    (A) Through an electronically submitted statement made within a reasonable period of time after making the electronic submission, indicating an expectation of protection from disclosure as provided by the provisions of the CII Act; and or

    (B) Through a non-electronically submitted written statement substantially similar to the one specified above in paragraph (a)(3)(i) of this section accompanied by a document that memorializes the nature of e-mailed information the electronic submission initially provided , to be received by the PCII Program Manager Office or the PCII Program Manager's designee Designee within a reasonable period after using e-mail submission. making the electronic submission; and

    (4) The submitted information additionally documentary, electronic, or oral submission is accompanied by a statement, signed by the submitting person or an authorized person on behalf of an entity identifying the submitting person or entity, containing such contact information as is considered necessary by the PCII Program ManagerOffice, and certifying that the information being submitted is not customarily in the public domain; .

    (b) Information that is not submitted to the PCII Program Manager Office or the PCII Program Manager's designees Designees will not qualify for protection under the CII Act. Only the PCII Program Manager Office or the a PCII Program Manager's designees Designee are authorized to acknowledge receipt of information being submitted for consideration of protection under the CII Act.

    (c) All Federal, State, and local Local government entities shall must protect and maintain information as required by these rules or this part and by the provisions of the CII Act when that information is provided to the entity by the PCII Program Manager or the a PCII Program Manager's designee Designee and is marked as required in 6 CFR § 29.6(c).

    (d) All submissions seeking PCII status shall be are presumed to have been submitted in good faith until validation or a determination not to validate is made pursuant to these rulesthis part.