99-24813. Safeguarding Classified National Security Information  

  • [Federal Register Volume 64, Number 185 (Friday, September 24, 1999)]
    [Rules and Regulations]
    [Pages 51854-51858]
    From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
    [FR Doc No: 99-24813]
    
    
    
    [[Page 51853]]
    
    _______________________________________________________________________
    
    Part III
    
    
    
    
    
    National Archives and Records Administration
    
    
    
    
    
    _______________________________________________________________________
    
    
    
    Information Security Oversight Office
    
    
    
    _______________________________________________________________________
    
    
    
    32 CFR Part 2004
    
    
    
    Safeguarding Classified National Security Information; Final Rule
    
    Federal Register / Vol. 64, No. 185 / Friday, September 24, 1999 / 
    Rules and Regulations
    
    [[Page 51854]]
    
    
    
    NATIONAL ARCHIVES AND RECORDS ADMINISTRATION
    
    Information Security Oversight Office
    
    32 CFR Part 2004
    
    RIN 3095-AA95
    
    
    Safeguarding Classified National Security Information
    
    AGENCY: Information Security Oversight Office (ISOO), National Archives 
    and Records Administration (NARA).
    
    ACTION: Final rule.
    
    -----------------------------------------------------------------------
    
    SUMMARY: This final rule promulgates a new Directive on Safeguarding 
    Classified National Security Information, which applies to Federal 
    agencies. It implements provisions of Executive Order 12958, Classified 
    National Security Information, that pertain to the handling, storage, 
    distribution, transmittal, destruction of, and accounting for 
    classified information.
    
    EFFECTIVE DATE: October 25, 1999.
    
    FOR FURTHER INFORMATION CONTACT: Dan L. Jacobson, Staff Director, 
    United States Security Policy Board, telephone 703-602-1030; or Steven 
    Garfinkel, Director, ISOO, telephone 202-219-5250.
    
    SUPPLEMENTARY INFORMATION: In accordance with section 5(c) of Executive 
    Order 12958, ``Classified National Security Information,'' the 
    President has approved the Directive for safeguarding classified 
    information contained in this final rule. On behalf of the United 
    States Security Policy Board, which prepared the Directive, and at the 
    direction of the Executive Office of the President, NARA/ISOO is 
    publishing this Directive as Part 2004 of Title 32, Code of Federal 
    Regulations. This Directive complements and supplements the ISOO 
    regulations in 32 CFR Chapter XX, which also implement particular 
    provisions of E.O. 12958. Most specifically, this Directive should be 
    read in conjunction with the Directive contained in 32 CFR part 2001 
    and with E.O. 12958.
        This rule is being issued as a final rule without prior notice of 
    proposed rulemaking as allowed by the Administrative Procedure Act, 5 
    U.S.C. 553(b)(3)(A) for rules of agency procedure. This rule is not a 
    significant regulatory action for the purposes of Executive Order 
    12866. This rule is not a major rule as defined in 5 U.S.C. Chapter 8, 
    Congressional Review of Agency Rulemaking. As required by the 
    Regulatory Flexibility Act, we certify that this rule will not have a 
    significant impact on a substantial number of small entities because it 
    applies only to Federal agencies.
    
    List of Subjects in 32 CFR Part 2004
    
        Archives and records, Authority delegations (Government agencies), 
    Classified information, Executive orders, Freedom of information, 
    Information, Intelligence, National defense, National security 
    information, Presidential document, Security information, Security 
    measures.
        For the reasons set forth in the preamble, NARA adds new part 2004 
    to Chapter XX of title 32, Code of Federal Regulations, as follows:
    
    PART 2004--DIRECTIVE ON SAFEGUARDING CLASSIFIED NATIONAL SECURITY 
    INFORMATION:
    
    Sec.
    2004.1  Authority.
    2004.2  General.
    2004.3  Definitions.
    2004.4  Responsibilities of holders.
    2004.5  Standards for security equipment.
    2004.6  Storage.
    2004.7  Information controls.
    2004.8  Transmission.
    2004.9  Destruction.
    2004.10  Loss, possible compromise or unauthorized disclosure.
    2004.11  Special access programs.
    2004.12  Telecommunications, automated information systems and 
    network security.
    2004.13  Technical security.
    2004.14 Emergency authority.
    
    Appendix A to Part 2004--Open Storage Areas.
    
    Appendix B to Part 2004--Foreign Government Information.
    
        Authority: E.O. 12958, 60 FR 19825, 3 CFR, 1995 Comp., p. 333.
    
    
    Sec. 2004.1  Authority.
    
        This Directive is issued pursuant to Section 5.2 (c) of Executive 
    Order (E.O.) 12958, ``Classified National Security Information.'' The 
    E.O. and this Directive set forth the requirements for the safeguarding 
    of classified national security information (hereinafter classified 
    information) and are applicable to all U.S. Government agencies.
    
    
    Sec. 2004.2  General.
    
        (a) Classified information, regardless of its form, shall be 
    afforded a level of protection against loss or unauthorized disclosure 
    commensurate with its level of classification.
        (b) Except for NATO and other foreign government information, 
    agency heads or their designee(s) (hereinafter referred to as agency 
    heads) may adopt alternative measures, using risk management 
    principles, to protect against loss or unauthorized disclosure when 
    necessary to meet operational requirements. When alternative measures 
    are used for other than temporary, unique situations, the alternative 
    measures shall be documented and provided to the Director, Information 
    Security Oversight Office (ISOO), to facilitate that office's oversight 
    responsibility. Upon request, the description shall be provided to any 
    other agency with which classified information or secure facilities are 
    shared. In all cases, the alternative measures shall provide protection 
    sufficient to reasonably deter and detect loss or unauthorized 
    disclosure. Risk management factors considered will include 
    sensitivity, value and crucial nature of the information; analysis of 
    known and anticipated threats; vulnerability; and countermeasures 
    benefits versus cost.
        (c) NATO classified information shall be safeguarded in compliance 
    with U.S. Security Authority for NATO Instructions I-69 and I-70. Other 
    foreign government information shall be safeguarded as described herein 
    for U.S. information except as required by an existing treaty, 
    agreement or other obligation (hereinafter, obligation). When the 
    information is to be safeguarded pursuant to an existing obligation, 
    the additional requirements at Appendix B may apply to the extent they 
    were required in the obligation as originally negotiated or are agreed 
    upon during amendment. Negotiations on new obligations or amendments to 
    existing obligations shall strive to bring provisions for safeguarding 
    foreign government information into accord with standards for 
    safeguarding U.S. information as described in this Directive.
        (d) An agency head who originates or handles classified information 
    shall refer any matter pertaining to the implementation of this 
    Directive that he or she cannot resolve to the Director, ISOO for 
    resolution.
    
    
    Sec. 2004.3  Definitions.
    
        (a) Open storage area. An area, constructed in accordance with 
    Appendix A and authorized by the agency head for open storage of 
    classified information.
        (b) Authorized person. A person who has a favorable determination 
    of eligibility for access to classified information, has signed an 
    approved nondisclosure agreement, and has a need-to-know for the 
    specific classified information in the performance of official duties.
        (c) Cleared commercial carrier. A carrier that is authorized by 
    law, regulatory body, or regulation, to transport SECRET and 
    CONFIDENTIAL
    
    [[Page 51855]]
    
    material and has been granted a SECRET facility clearance in accordance 
    with the National Industrial Security Program.
        (d) Security-in-depth. A determination by the agency head that a 
    facility's security program consists of layered and complementary 
    security controls sufficient to deter and detect unauthorized entry and 
    movement within the facility. Examples include, but are not limited to, 
    use of perimeter fences, employee and visitor access controls, use of 
    an Intrusion Detection System (IDS), random guard patrols throughout 
    the facility during non-working hours, closed circuit video monitoring 
    or other safeguards that mitigate the vulnerability of open storage 
    areas without alarms and security storage cabinets during non-working 
    hours.
        (e) Vault. An area approved by the agency head which is designed 
    and constructed of masonry units or steel lined construction to provide 
    protection against forced entry. A modular vault approved by the 
    General Services Administration (GSA) may be used in lieu of a vault as 
    prescribed in the first sentence of this paragraph (e). Vaults shall be 
    equipped with a GSA-approved vault door and lock.
    
    
    Sec. 2004.4  Responsibilities of holders.
    
        Authorized persons who have access to classified information are 
    responsible for:
        (a) Protecting it from persons without authorized access to that 
    information, to include securing it in approved equipment or facilities 
    whenever it is not under the direct control of an authorized person;
        (b) Meeting safeguarding requirements prescribed by the agency 
    head; and
        (c) Ensuring that classified information is not communicated over 
    unsecured voice or data circuits, in public conveyances or places, or 
    in any other manner that permits interception by unauthorized persons.
    
    
    Sec. 2004.5  Standards for security equipment.
    
        The Administrator of General Services shall, in coordination with 
    agency heads originating classified information, establish and publish 
    uniform standards, specifications and supply schedules for security 
    equipment designed to provide secure storage for and destruction of 
    classified information. Whenever new security equipment is procured, it 
    shall be in conformance with the standards and specifications 
    established by the Administratior of General Services, and shall, to 
    the maximum extent possible, be of the type available through the 
    Federal Supply System.
    
    
    Sec. 2004.6  Storage.
    
        (a) General. Classified information shall be stored only under 
    conditions designed to deter and detect unauthorized access to the 
    information. Storage at overseas locations shall be at U.S. Government 
    controlled facilities unless otherwise stipulated in treaties or 
    international agreements. Overseas storage standards for facilities 
    under a Chief of Mission are promulgated under the authority of the 
    Overseas Security Policy Board.
        (b) Requirements for physical protection. (1) Top Secret. Top 
    Secret information shall be stored by one of the following methods:
        (i) In a GSA-approved security container with one of the following 
    supplemental controls:
        (A) Continuous protection by cleared guard or duty personnel;
        (B) Inspection of the security container every two hours by cleared 
    guard or duty personnel;
        (C) An Intrusion Detection System (IDS) with the personnel 
    responding to the alarm arriving within 15 minutes of the alarm 
    annunciation [Acceptability of Intrusion Detection Equipment (IDE): All 
    IDE must be UL-listed (or equivalent as defined by the agency head) and 
    approved by the agency head. Government and proprietary installed, 
    maintained, or furnished systems are subject to approval only by the 
    agency head.]; or
        (D) Security-In-Depth conditions, provided the GSA-approved 
    container is equipped with a lock meeting Federal Specification FF-L-
    2740.
        (ii) An open storage area constructed in accordance with Appendix 
    A, which is equipped with an IDS with the personnel responding to the 
    alarm arriving within 15 minutes of the alarm annunciation if the area 
    is covered by Security-In-Depth or a five minute alarm response if it 
    is not.
        (iii) An IDS-equipped vault with the personnel responding to the 
    alarm arriving within 15 minutes of the alarm annunciation.
        (2) Secret. Secret information shall be stored by one of the 
    following methods:
        (i) In the same manner as prescribed for Top Secret information;
        (ii) In a GSA-approved security container or vault without 
    supplemental controls; or
        (iii) In either of the following:
        (A) Until October 1, 2012, in a non-GSA-approved container having a 
    built-in combination lock or in a non-GSA approved container secured 
    with a rigid metal lockbar and an agency head approved padlock; or
        (B) An open storage area. In either case, one of the following 
    supplemental controls is required:
        (1) The location that houses the container or open storage area 
    shall be subject to continuous protection by cleared guard or duty 
    personnel;
        (2) Cleared guard or duty personnel shall inspect the security 
    container or open storage area once every four hours; or
        (3) An IDS (per paragraph (b)(1)(i)(C) of this section) with the 
    personnel responding to the alarm arriving within 30 minutes of the 
    alarm annunciation. [In addition to one of these supplemental controls 
    specified in paragraphs (b)(2)(iii)(B)(1) through (3), security-in-
    depth as determined by the agency head is required as part of the 
    supplemental controls for a non-GSA approved container or open storage 
    area storing Secret information.]
        (3) Confidential. Confidential information shall be stored in the 
    same manner as prescribed for Top Secret or Secret information except 
    that supplemental controls are not required.
        (c) Combinations. Use and maintenance of dial-type locks and other 
    changeable combination locks.
        (1) Equipment in service. The classification of the combination 
    shall be the same as the highest level of classified information that 
    is protected by the lock. Combinations to dial-type locks shall be 
    changed only by persons having a favorable determination of eligibility 
    for access to classified information and authorized access to the level 
    of information protected unless other sufficient controls exist to 
    prevent access to the lock or knowledge of the combination. 
    Combinations shall be changed under the following conditions:
        (i) Whenever such equipment is placed into use;
        (ii) Whenever a person knowing the combination no longer requires 
    access to it unless other sufficient controls exist to prevent access 
    to the lock; or
        (iii) Whenever a combination has been subject to possible 
    unauthorized disclosure.
        (2) Equipment out of service. When security equipment is taken out 
    of service, it shall be inspected to ensure that no classified 
    information remains and the built-in combination lock shall be reset to 
    a standard combination.
        (d) Key operated locks. When special circumstances exist, an agency 
    head may approve the use of key operated locks for the storage of 
    Secret and Confidential information. Whenever such locks are used, 
    administrative procedures for the control and accounting of keys and 
    locks shall be established.
    
    [[Page 51856]]
    
    Sec. 2004.7  Information controls.
    
        (a) General. Agency heads shall establish a system of control 
    measures which assure that access to classified information is limited 
    to authorized persons. The control measures shall be appropriate to the 
    environment in which the access occurs and the nature and volume of the 
    information. The system shall include technical, physical, and 
    personnel control measures. Administrative control measures which may 
    include records of internal distribution, access, generation, 
    inventory, reproduction, and disposition of classified information 
    shall be required when technical, physical and personnel control 
    measures are insufficient to deter and detect access by unauthorized 
    persons.
        (b) Reproduction. Reproduction of classified information shall be 
    held to the minimum consistent with operational requirements. The 
    following additional control measures shall be taken:
        (1) Reproduction shall be accomplished by authorized persons 
    knowledgeable of the procedures for classified reproduction;
        (2) Unless restricted by the originating Agency, Top Secret, 
    Secret, and Confidential information may be reproduced to the extent 
    required by operational needs, or to facilitate review for 
    declassification;
        (3) Copies of classified information shall be subject to the same 
    controls as the original information; and
        (4) The use of technology that prevents, discourages, or detects 
    the unauthorized reproduction of classified information is encouraged.
    
    
    Sec. 2004.8  Transmission.
    
        (a) General. Classified information shall be transmitted and 
    received in an authorized manner which ensures that evidence of 
    tampering can be detected, that inadvertent access can be precluded, 
    and that provides a method which assures timely delivery to the 
    intended recipient. Persons transmitting classified information are 
    responsible for ensuring that intended recipients are authorized 
    persons with the capability to store classified information in 
    accordance with this Directive.
        (b) Dispatch. Agency heads shall establish procedures which ensure 
    that:
        (1) All classified information physically transmitted outside 
    facilities shall be enclosed in two layers, both of which provide 
    reasonable evidence of tampering and which conceal the contents. The 
    inner enclosure shall clearly identify the address of both the sender 
    and the intended recipient, the highest classification level of the 
    contents, and any appropriate warning notices. The outer enclosure 
    shall be the same except that no markings to indicate that the contents 
    are classified shall be visible. Intended recipients shall be 
    identified by name only as part of an attention line. The following 
    exceptions apply:
        (i) If the classified information is an internal component of a 
    packable item of equipment, the outside shell or body may be considered 
    as the inner enclosure provided it does not reveal classified 
    information;
        (ii) If the classified information is an inaccessible internal 
    component of a bulky item of equipment, the outside or body of the item 
    may be considered to be a sufficient enclosure provided observation of 
    it does not reveal classified information;
        (iii) If the classified information is an item of equipment that is 
    not reasonably packable and the shell or body is classified, it shall 
    be concealed with an opaque enclosure that will hide all classified 
    features;
        (iv) Specialized shipping containers, including closed cargo 
    transporters or diplomatic pouch, may be considered the outer enclosure 
    when used; and
        (v) When classified information is hand-carried outside a facility, 
    a locked briefcase may serve as the outer enclosure.
        (2) Couriers and authorized persons designated to hand-carry 
    classified information shall ensure that the information remains under 
    their constant and continuous protection and that direct point-to-point 
    delivery is made. As an exception, agency heads may approve, as a 
    substitute for a courier on direct flights, the use of specialized 
    shipping containers that are of sufficient construction to provide 
    evidence of forced entry, are secured with a high security padlock, are 
    equipped with an electronic seal that would provide evidence of 
    surreptitious entry and are handled by the carrier in a manner to 
    ensure that the container is protected until its delivery is completed.
        (c) Transmission methods within and between the U.S., Puerto Rico, 
    or a U.S. possession or trust territory. (1) Top Secret. Top Secret 
    information shall be transmitted by direct contact between authorized 
    persons; the Defense Courier Service or an authorized government agency 
    courier service; a designated courier or escort with Top Secret 
    clearance; electronic means over approved communications systems. Under 
    no circumstances will Top Secret information be transmitted via the 
    U.S. Postal Service.
        (2) Secret. Secret information shall be transmitted by:
        (i) Any of the methods established for Top Secret; U.S. Postal 
    Service Express Mail and U.S. Postal Service Registered Mail, as long 
    as the Waiver of Signature and Indemnity block, item 11-B, on the U.S. 
    Postal Service Express Mail Label shall not be completed; and cleared 
    commercial carriers or cleared commercial messenger services. The use 
    of street-side mail collection boxes is strictly prohibited; and
        (ii) Agency heads may, on an exceptional basis and when an urgent 
    requirement exists for overnight delivery within the U.S. and its 
    Territories, authorize the use of the current holder of the General 
    Services Administration contract for overnight delivery of information 
    for the Executive Branch as long as applicable postal regulations (39 
    CFR chapter I) are met. Any such delivery service shall be U.S. owned 
    and operated, provide automated in-transit tracking of the classified 
    information, and ensure package integrity during transit. The contract 
    shall require cooperation with government inquiries in the event of a 
    loss, theft, or possible unauthorized disclosure of classified 
    information. The sender is responsible for ensuring that an authorized 
    person will be available to receive the delivery and verification of 
    the correct mailing address. The package may be addressed to the 
    recipient by name. The release signature block on the receipt label 
    shall not be executed under any circumstances. The use of external 
    (street side) collection boxes is prohibited. Classified Communications 
    Security Information, NATO, and foreign government information shall 
    not be transmitted in this manner.
        (3) Confidential. Confidential information shall be transmitted by 
    any of the methods established for Secret information or U.S. Postal 
    Service Certified Mail. In addition, when the recipient is a U.S. 
    Government facility, the confidential information may be transmitted 
    via U.S. First Class Mail. However, confidential information shall not 
    be transmitted to government contractor facilities via first class 
    mail. When first class mail is used, the envelope or outer wrapper 
    shall be marked to indicate that the information is not to be 
    forwarded, but is to be returned to sender. The use of street-side mail 
    collection boxes is prohibited.
        (d) Transmission methods to a U.S. Government facility located 
    outside the U.S. The transmission of classified information to a U.S. 
    Government facility located outside the 50 states, the District of 
    Columbia, the
    
    [[Page 51857]]
    
    Commonwealth of Puerto Rico, or a U.S. possession or trust territory, 
    shall be by methods specified above for Top Secret information or by 
    the Department of State Courier Service. U.S. Registered Mail through 
    Military Postal Service facilities may be used to transmit Secret and 
    Confidential information provided that the information does not at any 
    time pass out of U.S. citizen control nor pass through a foreign postal 
    system.
        (e) Transmission of U.S. classified information to foreign 
    governments. Such transmission shall take place between designated 
    government representatives using the transmission methods described in 
    paragraph (d) of this section. When classified information is 
    transferred to a foreign government or its representative a signed 
    receipt is required.
        (f) Receipt of classified information. Agency heads shall establish 
    procedures which ensure that classified information is received in a 
    manner which precludes unauthorized access, provides for inspection of 
    all classified information received for evidence of tampering and 
    confirmation of contents, and ensures timely acknowledgment of the 
    receipt of Top Secret and Secret information by an authorized 
    recipient. As noted in paragraph (e) of this section, a receipt 
    acknowledgment of all classified material transmitted to a foreign 
    government or its representative is required.
    
    
    Sec. 2004.9  Destruction.
    
        (a) General. Classified information identified for destruction 
    shall be destroyed completely to preclude recognition or reconstruction 
    of the classified information in accordance with procedures and methods 
    prescribed by agency heads. The methods and equipment used to routinely 
    destroy classified information include burning, cross-cut shredding, 
    wet-pulping, melting, mutilation, chemical decomposition or 
    pulverizing.
        (b) Technical guidance. Technical guidance concerning appropriate 
    methods, equipment, and standards for the destruction of classified 
    electronic media and processing equipment components may be obtained by 
    submitting all pertinent information to the National Security Agency/
    Central Security Service, Directorate for Information Systems Security, 
    Fort Meade, MD 20755. Specifications concerning appropriate equipment 
    and standards for the destruction of other storage media may be 
    obtained from the GSA.
    
    
    Sec. 2004.10  Loss, possible compromise or unauthorized disclosure.
    
        (a) General. Any person who has knowledge that classified 
    information has been or may have been lost, possibly compromised or 
    disclosed to an unauthorized person(s) shall immediately report the 
    circumstances to an official designated for this purpose.
        (b) Cases involving information originated by a foreign government 
    or another U.S. government agency. Whenever a loss or possible 
    unauthorized disclosure involves the classified information or 
    interests of a foreign government agency, or another government agency, 
    the department or agency in which the compromise occurred shall advise 
    the other government agency or foreign government of the circumstances 
    and findings that affect their information or interests. However, 
    foreign governments normally will not be advised of any security system 
    vulnerabilities that contributed to the compromise.
        (c) Inquiry/investigation and corrective actions. Agency heads 
    shall establish appropriate procedures to conduct an inquiry/
    investigation of a loss, possible compromise or unauthorized disclosure 
    of classified information, in order to implement appropriate corrective 
    actions, which may include disciplinary sanctions, and to ascertain the 
    degree of damage to national security.
        (d) Department of Justice and legal counsel coordination. Agency 
    heads shall establish procedures to ensure coordination with legal 
    counsel whenever a formal action, beyond a reprimand, is contemplated 
    against any person believed responsible for the unauthorized disclosure 
    of classified information. Whenever a criminal violation appears to 
    have occurred and a criminal prosecution is contemplated, agency heads 
    shall use established procedures to ensure coordination with--
        (1) The Department of Justice, and
        (2) The legal counsel of the agency where the individual 
    responsible is assigned or employed.
    
    
    Sec. 2004.11  Special access programs.
    
        (a) General. The safeguarding requirements of this Directive may be 
    enhanced for information in Special Access Programs (SAP), established 
    under the provisions of Section 4.4 of E.O. 12958, by the agency head 
    responsible for creating the SAP. Agency heads shall ensure that the 
    enhanced controls are based on an assessment of the value, critical 
    nature, and vulnerability of the information.
        (b) Significant interagency support requirements. Agency heads must 
    ensure that a Memorandum of Agreement/Understanding (MOA/MOU) is 
    established for each Special Access Program that has significant 
    interagency support requirements, to appropriately and fully address 
    support requirements and supporting agency oversight responsibilities 
    for that SAP.
    
    
    Sec. 2004.12  Telecommunications, automated information systems and 
    network security.
    
        Each agency head shall ensure that classified information 
    electronically accessed, processed, stored or transmitted is protected 
    in accordance with applicable national policy issuances identified in 
    the Index of National Security Telecommunications and Information 
    Systems Security Issuances (NSTISSI) and Director of Central 
    Intelligence Directive (DCID)
    6/3.
    
    
    Sec. 2004.13  Technical security.
    
        Based upon the risk management factors referenced in Sec. 2004.2 of 
    this directive agency heads shall determine the requirement for 
    technical countermeasures such as Technical Surveillance 
    Countermeasures (TSCM) and TEMPEST necessary to detect or deter 
    exploitation of classified information through technical collection 
    methods and may apply countermeasures in accordance with NSTISSI 7000, 
    entitled Tempest Countermeasures for Facilities, and SPB Issuance 6-97, 
    entitled National Policy on Technical Surveillance Countermeasures.
    
    
    Sec. 2004.14  Emergency authority.
    
        Agency heads may prescribe special provisions for the 
    dissemination, transmittal, destruction, and safeguarding of classified 
    information during military operations or other emergency situations.
    
    Appendix A to Part 2004--Open Storage Areas
    
        This Appendix describes the construction standards for open 
    storage areas.
        1. Construction. The perimeter walls, floors, and ceiling will 
    be permanently constructed and attached to each other. All 
    construction must be done in a manner as to provide visual evidence 
    of unauthorized penetration.
        2. Doors. Doors shall be constructed of wood, metal, or other 
    solid material. Entrance doors shall be secured with a built-in GSA-
    approved three-position combination lock. When special circumstances 
    exist, the agency head may authorize other locks on entrance doors 
    for Secret and Confidential storage. Doors other than those secured 
    with the aforementioned locks shall be secured from the inside with 
    either deadbolt
    
    [[Page 51858]]
    
    emergency egress hardware, a deadbolt, or a rigid wood or metal bar 
    which extends across the width of the door, or by other means 
    approved by the agency head.
        3. Vents, ducts, and miscellaneous openings. All vents, ducts, 
    and similar openings in excess of 96 square inches (and over 6 
    inches in its smallest dimension) that enter or pass through an open 
    storage area shall be protected with either bars, expanded metal 
    grills, commercial metal sound baffles, or an intrusion detection 
    system.
        4. Windows.
        a. All windows which might reasonably afford visual observation 
    of classified activities within the facility shall be made opaque or 
    equipped with blinds, drapes, or other coverings.
        b. Windows at ground level will be constructed from or covered 
    with materials which provide protection from forced entry. The 
    protection provided to the windows need be no stronger than the 
    strength of the contiguous walls. Open storage areas which are 
    located within a controlled compound or equivalent may eliminate the 
    requirement for forced entry protection if the windows are made 
    inoperable either by permanently sealing them or equipping them on 
    the inside with a locking mechanism and they are covered by an IDS 
    (either independently or by the motion detection sensors within the 
    area.)
    
    Appendix B to Part 2004--Foreign Government Information
    
        The requirements described below are additional baseline 
    safeguarding standards that may be necessary for foreign government 
    information, other than NATO information, that requires protection 
    pursuant to an existing treaty, agreement, or other obligation. NATO 
    classified information shall be safeguarded in compliance with 
    United States Security Authority for NATO Instructions I-69 and I-
    70. To the extent practical, and to facilitate its control, foreign 
    government information should be stored separately from other 
    classified information. To avoid additional costs, separate storage 
    may be accomplished by methods such as separate drawers of a 
    container. The safeguarding standards described below may be 
    modified if required or permitted by treaties or agreements, or for 
    other obligations, with the prior written consent of the National 
    Security Authority of the originating government.
        1. Top Secret. Records shall be maintained of the receipt, 
    internal distribution, destruction, access, reproduction, and 
    transmittal of foreign government Top Secret information. 
    Reproduction requires the consent of the originating government. 
    Destruction will be witnessed.
        2. Secret. Records shall be maintained of the receipt, external 
    dispatch and destruction of foreign government Secret information. 
    Other records may be necessary if required by the originator. Secret 
    foreign government information may be reproduced to meet mission 
    requirements unless prohibited by the originator. Reproduction shall 
    be recorded unless this requirement is waived by the originator.
        3. Confidential. Records need not be maintained for foreign 
    government Confidential information unless required by the 
    originator.
        4. Restricted and other foreign government information provided 
    in confidence. In order to assure the protection of other foreign 
    government information provided in confidence (e.g., foreign 
    government ``Restricted,'' ``Designated,'' or unclassified provided 
    in confidence), such information must be classified under E.O. 
    12958. The receiving agency, or a receiving U.S. contractor, 
    licensee, grantee, or certificate holder acting in accordance with 
    instructions received from the U.S. Government, shall provide a 
    degree of protection to the foreign government information at least 
    equivalent to that required by the government or international 
    organization that provided the information. When adequate to achieve 
    equivalency, these standards may be less restrictive than the 
    safeguarding standards that ordinarily apply to US CONFIDENTIAL 
    information. If the foreign protection requirement is lower than the 
    protection required for US CONFIDENTIAL information, the following 
    requirements shall be met:
        a. Documents may retain their original foreign markings if the 
    responsible agency determines that these markings are adequate to 
    meet the purposes served by U.S. classification markings. Otherwise, 
    documents shall be marked, ``This document contains (insert name of 
    country) (insert classification level) information to be treated as 
    US (insert classification level).'' The notation, ``Modified 
    Handling Authorized,'' may be added to either the foreign or U.S. 
    markings authorized for foreign government information. If remarking 
    foreign originated documents or matter is impractical, an approved 
    cover sheet is an authorized option;
        b. Documents shall be provided only to those who have an 
    established need-to-know, and where access is required by official 
    duties;
        c. Individuals being given access shall be notified of 
    applicable handling instructions. This may be accomplished by a 
    briefing, written instructions, or by applying specific handling 
    requirements to an approved cover sheet;
        d. Documents shall be stored in such a manner so as to prevent 
    unauthorized access;
        e. Documents shall be transmitted in a method approved for 
    classified information, unless this method is waived by the 
    originating government.
        5. Third-country transfers. The release or disclosure of foreign 
    government information to any third-country entity must have the 
    prior consent of the originating government if required by a treaty, 
    agreement, bilateral exchange, or other obligation.
    
        Dated: September 17, 1999.
    John W. Carlin,
    Archivist of the United States.
    [FR Doc. 99-24813 Filed 9-23-99; 8:45 am]
    BILLING CODE 7515-01-P
    
    
    

Document Information

Effective Date:
10/25/1999
Published:
09/24/1999
Department:
Information Security Oversight Office
Entry Type:
Rule
Action:
Final rule.
Document Number:
99-24813
Dates:
October 25, 1999.
Pages:
51854-51858 (5 pages)
RINs:
3095-AA95
PDF File:
99-24813.pdf
CFR: (14)
32 CFR 2004.1
32 CFR 2004.2
32 CFR 2004.3
32 CFR 2004.4
32 CFR 2004.5
More ...