Department of Defense Personnel Security Program Regulation, 51474-51479 [E6-14361]
Download as PDF
51474
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
reacquisition of stock include amounts
paid by a corporation to reacquire its
stock from an ESOP that are used in a
manner described in section
404(k)(2)(A). See § 1.404(k)–3.
(b) Exceptions. Paragraph (a) of this
section does not apply to any—
(1) Deduction allowable under section
163 (relating to interest);
(2) Deduction for amounts that are
properly allocable to indebtedness and
amortized over the term of such
indebtedness;
(3) Deduction for dividends paid
(within the meaning of section 561); or
(4) Amount paid or incurred in
connection with the redemption of any
stock in a regulated investment
company that issues only stock which is
redeemable upon the demand of the
shareholder.
(c) Effective date. This section applies
with respect to amounts paid or
incurred on or after August 30, 2006.
I Par. 3. Section 1.404(k)–3 is added to
read as follows:
§ 1.404(k)–3 Disallowance of deduction for
reacquisition payments.
jlentini on PROD1PC65 with RULES
Q–1: Are payments to reacquire stock
held by an ESOP applicable dividends
that are deductible under section
404(k)(1)?
A–1: (a) Payments to reacquire stock
held by an ESOP, including
reacquisition payments that are used to
make benefit distributions to
participants or beneficiaries, are not
deductible under section 404(k)
because—
(1) Those payments do not constitute
applicable dividends under section
404(k)(2); and
(2) The treatment of those payments
as applicable dividends would
constitute, in substance, an avoidance or
evasion of taxation within the meaning
of section 404(k)(5).
(b) See also § 1.162(k)–1 concerning
the disallowance of deductions for
amounts paid or incurred by a
corporation in connection with the
reacquisition of its stock from an ESOP.
Q–2: What is the effective date of this
section?
A–2: This section applies with respect
to payments to reacquire stock that are
made on or after August 30, 2006.
Approved: August 22, 2006.
Mark E. Matthews,
Deputy Commissioner for Services and
Enforcement.
Eric Solomon,
Acting Deputy Assistant Secretary of the
Treasury (Tax Policy).
[FR Doc. E6–14420 Filed 8–29–06; 8:45 am]
BILLING CODE 4830–01–P
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
DEPARTMENT OF DEFENSE
Office of the Secretary
32 CFR Part 154
[DoD–2006–OS–0038]
Department of Defense Personnel
Security Program Regulation
Office of the Secretary, DoD.
Interim final rule.
AGENCY:
ACTION:
This rule is published to
streamline personnel security clearance
procedures and make the process more
efficient within the Department of
Defense. This will simplify security
processing and allow the deserving
public to obtain a security clearance in
a more efficient manner.
DATES: This rule is effective September
1, 2006. Written comments received at
the address indicated below by October
30, 2006 will be accepted.
ADDRESSES: You may submit comments,
identified by docket number and or RIN
number and title, by any of the
following methods:
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
• Mail: Federal Docket Management
System Office, 1160 Defense Pentagon,
Washington, DC 20301–1160.
Instructions: All submissions received
must include the agency name and
docket number or Regulatory
Information Number (RIN) for this
Federal Register document. The general
policy for comments and other
submissions from members of the public
is to make these submissions available
for public viewing on the Internet at
https://regulations.gov as they are
received without change, including any
personal identifiers or contact
information.
FOR FURTHER INFORMATION CONTACT:
Charleen Wright, 703–697–3039.
SUPPLEMENTARY INFORMATION: This rule
is published as an interim rule because
it takes effect on September 1 under the
authority of National Security Adviser
directing immediate implementation.
SUMMARY:
Executive Order 12866, ‘‘Regulatory
Planning and Review’’
It has been determined that 32 CFR
part 154 is not a significant regulatory
action. The rule does not:
(1) Have an annual effect on the
economy of $100 million or more or
adversely affect in a material way the
economy; a section of the economy;
productivity; competition; jobs; the
environment; public health or safety; or
State, local, or tribal governments or
communities;
PO 00000
Frm 00054
Fmt 4700
Sfmt 4700
(2) Create a serious inconsistency or
otherwise interfere with an action taken
or planned by another Agency;
(3) Materially alter the budgetary
impact of entitlements, grants, user fees,
or loan programs, or the rights and
obligations of recipients thereof; or
(4) Raise novel legal or policy issues
arising out of legal mandates, the
President’s priorities, or the principles
set forth in this Executive Order.
Unfunded Mandates Reform Act (Sec.
202, Pub. L. 104–4)
It has been certified that this rule does
not contain a Federal mandate that may
result in the expenditure by State, local
and tribal governments, in aggregate, or
by the private sector, of $100 million or
more in any one year.
Public Law 96–354, ‘‘Regulatory
Flexibility Act’’ (5 U.S.C. 601)
It has been certified that this rule is
not subject to the Regulatory Flexibility
Act (5 U.S.C. 601) because it would not,
if promulgated, have a significant
economic impact on a substantial
number of small entities. This part will
streamline personnel security clearance
procedures and make the process more
efficient.
Public Law 96–511, ‘‘Paperwork
Reduction Act’’ (44 U.S.C. Chapter 35)
It has been certified that this rule does
impose reporting or recordkeeping
requirements under the Paperwork
Reduction Act of 1995. The reporting
and recordkeeping requirements have
been submitted to OMB for review.
Executive Order 13132, ‘‘Federalism’’
It has been certified that this rule does
not have federalism implications, as set
forth in Executive Order 13132. This
rule does not have substantial direct
effects on:
(1) The States;
(2) The relationship between the
National Government and the States; or
(3) The distribution of power and
responsibilities among the various
levels of Government.
List of Subjects in 32 CFR Part 154
Classified information; Government
employees; Investigations; Security
measures.
I Accordingly, 32 CFR part 154 is
amended as follows:
PART 154—DEPARTMENT OF
DEFENSE PERSONNEL SECURITY
PROGRAM REGULATION
1. The authority citation for 32 CFR
part 154 continues to read as follows:
I
Authority: E.O. 10450, 18 FR 2489, 3 CFR,
1949–1953 Comp., p. 936; E.O. 12356, 47 FR
E:\FR\FM\30AUR1.SGM
30AUR1
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
14874 and 15557, 3 CFR, 1982 Comp., p. 166;
E.O. 10865, 25 FR 1583, 3 CFR, 1959–1963
Comp., p. 398; E.O. 12333, 46 FR 59941, 3
CFR, 1981 Comp., p. 200
2. Appendix H to part 154 is revised
to read as follows:
I
jlentini on PROD1PC65 with RULES
Appendix H to Part 154—Adjudicative
Guidelines for Determining Eligibility
for Access to Classified Information
1. Introduction. The following adjudicative
guidelines are established for all U.S.
Government civilian and military personnel,
consultants, contractors, employees of
contractors, licensees, certificate holders or
grantees and their employees, and other
individuals who require access to classified
information. They apply to persons being
considered for initial or continued eligibility
for access to classified information, to
include sensitive compartmented
information and special access programs, and
are to be used by government departments
and agencies in all final clearance
determinations. Government departments
and agencies may also choose to apply these
guidelines to analogous situations regarding
persons being considered for access to other
types of protected information.
Decisions regarding eligibility for access to
classified information take into account
factors that could cause a conflict of interest
and place a person in the position of having
to choose between his or her commitments to
the United States, including the commitment
to protect classified information, and any
other compelling loyalty. Accesses decisions
also take into account a person’s reliability,
trustworthiness and ability to protect
classified information. No coercive policing
could replace the self-discipline and integrity
of the person entrusted with the nation’s
secrets as the most effective means of
protecting them. When a person’s life history
shows evidence of unreliability or
untrustworthiness, questions arise whether
the person can be relied on and trusted to
exercise the responsibility necessary for
working in a secure environment where
protecting classified information is
paramount.
2. The adjudicative process.
(a) The adjudicative process is an
examination of a sufficient period of a
person’s life to make an affirmative
determination that the person is an
acceptable security risk. Eligibility for access
to classified information is predicated upon
the individual meeting these personnel
security guidelines. The adjudication process
is the careful weighing of a number of
variables known as the whole-person
concept. Available, reliable information
about the person, past and present, favorable
and unfavorable, should be considered in
reaching a determination. In evaluating the
relevance of an individual’s conduct, the
adjudicator should consider the following
factors:
(1) The nature, extent, and seriousness of
the conduct;
(2) The circumstances surrounding the
conduct, to include knowledgeable
participation;
(3) The frequency and recency of the
conduct;
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
(4) The individual’s age and maturity at the
time of the conduct;
(5) The extent to which participation is
voluntary;
(6) The presence or absence of
rehabilitation and other permanent
behavioral changes;
(7) The motivation for the conduct;
(8) The potential for pressure, coercion,
exploitation, or duress; and
(9) The likelihood of continuation or
recurrence;
(b) Each case must be judged on its own
merits, and final determination remains the
responsibility of the specific department or
agency. Any doubt concerning personnel
being considered for access to classified
information will be resolved in favor of the
national security.
(c) The ability to develop specific
thresholds for action under these guidelines
is limited by the nature and complexity of
human behavior. The ultimate determination
of whether the granting or continuing of
eligibility for a security clearance is clearly
consistent with the interests of national
security must be an overall common sense
judgment based upon careful consideration
of the following guidelines, each of which is
to be evaluated in the context of the whole
person.
(1) GUIDELINE A: Allegiance to the United
States;
(2) GUIDELINE B: Foreign Influence;
(3) GUIDELINE C: Foreign Preference;
(4) GUIDELINE D: Sexual Behavior;
(5) GUIDELINE E: Personal Conduct;
(6) GUIDELINE F: Financial
Considerations;
(7) GUIDELINE G: Alcohol Consumption;
(8) GUIDELINE H: Drug Involvement;
(9) GUIDELINE I: Psychological
Conditions;
(10) GUIDELINE J: Criminal Conduct;
(11) GUIDELINE K: Handling Protected
Information;
(12) GUIDELINE L: Outside Activities;
(13) GUIDELINE M: Use of Information
Technology Systems
(d) Although adverse information
concerning a single criterion may not be
sufficient for an unfavorable determination,
the individual may be disqualified if
available information reflects a recent or
recurring pattern of questionable judgment,
irresponsibility, or emotionally unstable
behavior. Notwithstanding the whole-person
concept, pursuit of further investigation may
be terminated by an appropriate adjudicative
agency in the face of reliable, significant,
disqualifying, adverse information.
(e) When information of security concern
becomes known about an individual who is
currently eligible for access to classified
information, the adjudicator should consider
whether the person:
(1) Voluntarily reported the information;
(2) Was truthful and complete in
responding to questions;
(3) Sought assistance and followed
professional guidance, where appropriate;
(4) Resolved or appears likely to favorably
resolve the security concern;
(5) Has demonstrated positive changes in
behavior and employment;
PO 00000
Frm 00055
Fmt 4700
Sfmt 4700
51475
(6) Should have his or her access
temporarily suspended pending final
adjudication of the information.
(f) If after evaluating information of
security concern, the adjudicator decides that
the information is not serious enough to
warrant a recommendation of disapproval or
revocation of the security clearance, it may
be appropriate to recommend approval with
a warning that future incidents of a similar
nature may result in revocation of access.
Guideline A: Allegiance To The United
States
3. The concern. An individual must be of
unquestioned allegiance to the United States.
The willingness to safeguard classified
information is in doubt if there is any reason
to suspect an individual’s allegiance to the
United States.
4. Conditions that could raise a security
concern and may be disqualifying include:
(a) Involvement in, support of, training to
commit, or advocacy of any act of sabotage,
espionage, treason, terrorism, or sedition
against the United States of America;
(b) Association or sympathy with persons
who are attempting to commit, or who are
committing, any of the above acts;
(c) Association or sympathy with persons
or organizations that advocate, threaten, or
use force or violence, or use any other illegal
or unconstitutional means, in an effort to:
(1) Overthrow or influence the government
of the United States or any state or local
government;
(2) Prevent Federal, state, or local
government personnel from performing their
official duties;
(3) Gain retribution for perceived wrongs
caused by the Federal, state, or local
government;
(4) Prevent others from exercising their
rights under the Constitution or laws of the
United States or of any state.
5. Conditions that could mitigate security
concerns include:
(a) The individual was unaware of the
unlawful aims of the individual or
organization and severed ties upon learning
of these;
(b) The individual’s involvement was only
with the lawful or humanitarian aspects of
such an organization;
(c) Involvement in the above activities
occurred for only a short period of time and
was attributable to curiosity or academic
interest;
(d) The involvement or association with
such activities occurred under such unusual
circumstances, or so much time has elapsed,
that it is unlikely to recur and does not cast
doubt on the individual’s current reliability,
trustworthiness, or loyalty.
Guideline B: Foreign Influence
6. The concern. Foreign contacts and
interests may be a security concern if the
individual has divided loyalties or foreign
financial interests, may be manipulated or
induced to help a foreign person, group,
organization, or government in a way that is
not in U.S. interests, or is vulnerable to
pressure or coercion by any foreign interest.
Adjudication under this Guideline can and
should consider the identity of the foreign
E:\FR\FM\30AUR1.SGM
30AUR1
jlentini on PROD1PC65 with RULES
51476
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
country in which the foreign contact or
financial interest is located, including, but
not limited to, such considerations as
whether the foreign country is known to
target United States citizens to obtain
protected information and/or is associated
with a risk of terrorism.
7. Conditions that could raise a security
concern and may be disqualifying include:
(a) Contact with a foreign family member,
business or professional associate, friend, or
other person who is a citizen of or resident
in a foreign country if that contact creates a
heightened risk of foreign exploitation,
inducement, manipulation, pressure, or
coercion;
(b) Connections to a foreign person, group,
government, or country that create a potential
conflict of interest between the individual’s
obligation to protect sensitive information or
technology and the individual’s desire to
help a foreign person, group, or country by
providing that information;
(c) Counterintelligence information, that
may be classified, indicates that the
individual’s access to protected information
may involve unacceptable risk to national
security;
(d) Sharing living quarters with a person or
persons, regardless of citizenship status, if
that relationship creates a heightened risk of
foreign inducement, manipulation, pressure,
or coercion;
(e) A substantial business, financial, or
property interest in a foreign country, or in
any foreign-owned or foreign-operated
business, which could subject the individual
to heightened risk of foreign influence or
exploitation;
(f) Failure to report, when required,
association with a foreign national;
(g) Unauthorized association with a
suspected or known agent, associate, or
employee of a foreign intelligence service;
(h) Indications that representatives or
nationals from a foreign country are acting to
increase the vulnerability of the individual to
possible future exploitation, inducement,
manipulation, pressure, or coercion;
(i) Conduct, especially while traveling
outside the U.S., which may make the
individual vulnerable to exploitation,
pressure, or coercion by a foreign person,
group, government, or country.
8. Conditions that could mitigate security
concerns include:
(a) The nature of the relationships with
foreign persons, the country in which these
persons are located, or the positions or
activities of those persons in that country are
such that it is unlikely the individual will be
placed in a position of having to choose
between the interests of a foreign individual,
group, organization, or government and the
interests of the U.S.;
(b) There is no conflict of interest, either
because the individual’s sense of loyalty or
obligation to the foreign person, group,
government, or country is so minimal, or the
individual has such deep and longstanding
relationships and loyalties in the U.S., that
the individual can be expected to resolve any
conflict of interest in favor of the U.S.
interest;
(c) Contact or communication with foreign
citizens is so casual and infrequent that there
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
is little likelihood that it could create a risk
for foreign influence or exploitation;
(d) The foreign contacts and activities are
on U.S. Government business or are
approved by the cognizant security authority;
(e) The individual has promptly complied
with existing agency requirements regarding
the reporting of contacts, requests, or threats
from persons, groups, or organizations from
a foreign country;
(f) The value or routine nature of the
foreign business, financial, or property
interests is such that they are unlikely to
result in a conflict and could not be used
effectively to influence, manipulate, or
pressure the individual.
Guideline C: Foreign Preference
9. The concern. When an individual acts in
such a way as to indicate a preference for a
foreign country over the United States, then
he or she may be prone to provide
information or make decisions that are
harmful to the interests of the United States.
10. Conditions that could raise a security
concern and may be disqualifying include:
(a) Exercise of any right, privilege or
obligation of foreign citizenship after
becoming a U.S. citizen or through the
foreign citizenship of a family member. This
includes but is not limited to:
(1) Possession of a current foreign passport;
(2) Military service or a willingness to bear
arms for a foreign country;
(3) Accepting educational, medical,
retirement, social welfare, or other such
benefits from a foreign country;
(4) Residence in a foreign country to meet
citizenship requirements;
(5) Using foreign citizenship to protect
financial or business interests in another
country;
(6) Seeking or holding political office in a
foreign country;
(7) Voting in a foreign election;
(b) Action to acquire or obtain recognition
of a foreign citizenship by an American
citizen;
(c) Performing or attempting to perform
duties, or otherwise acting, so as to serve the
interests of a foreign person, group,
organization, or government in conflict with
the national security interest;
(d) Any statement or action that shows
allegiance to a country other than the United
States: for example, declaration of intent to
renounce United States citizenship;
renunciation of United States citizenship.
11. Conditions that could mitigate security
concerns include:
(a) Dual citizenship is based solely on
parents’ citizenship or birth in a foreign
country;
(b) The individual has expressed a
willingness to renounce dual citizenship;
(c) Exercise of the rights, privileges, or
obligations of foreign citizenship occurred
before the individual became a U.S. citizen
or when the individual was a minor;
(d) Use of a foreign passport is approved
by the cognizant security authority.
(e) The passport has been destroyed,
surrendered to the cognizant security
authority, or otherwise invalidated;
(f) The vote in a foreign election was
encouraged by the United States
Government.
PO 00000
Frm 00056
Fmt 4700
Sfmt 4700
Guideline D: Sexual Behavior
12. The concern. Sexual behavior that
involves a criminal offense indicates a
personality or emotional disorder, reflects
lack of judgment or discretion, or which may
subject the individual to undue influence or
coercion, exploitation, or duress can raise
questions about an individual’s reliability,
trustworthiness and ability to protect
classified information. No adverse inference
concerning the standards in this Guideline
may be raised solely on the basis of the
sexual orientation of the individual.
13. Conditions that could raise a security
concern and may be disqualifying include:
(a) Sexual behavior of a criminal nature,
whether or not the individual has been
prosecuted;
(b) A pattern of compulsive, selfdestructive, or high risk sexual behavior that
the person is unable to stop or that may be
symptomatic of a personality disorder;
(c) Sexual behavior that causes an
individual to be vulnerable to coercion,
exploitation, or duress;
(d) Sexual behavior of a public nature and/
or that reflects lack of discretion or judgment.
14. Conditions that could mitigate security
concerns include:
(a) The behavior occurred prior to or
during adolescence and there is no evidence
of subsequent conduct of a similar nature;
(b) The sexual behavior happened so long
ago, so infrequently, or under such unusual
circumstances, that it is unlikely to recur and
does not cast doubt on the individual’s
current reliability, trustworthiness, or good
judgment;
(c) The behavior no longer serves as a basis
for coercion, exploitation, or duress.
(d) The sexual behavior is strictly private,
consensual, and discreet.
Guideline E: Personal Conduct
15. The concern. Conduct involving
questionable judgment, lack of candor,
dishonesty, or unwillingness to comply with
rules and regulations can raise questions
about an individual’s reliability,
trustworthiness and ability to protect
classified information. Of special interest is
any failure to provide truthful and candid
answers during the security clearance
process or any other failure to cooperate with
the security clearance process.
The following will normally result in an
unfavorable clearance action or
administrative termination of further
processing for clearance eligibility:
(a) Refusal, or failure without reasonable
cause, to undergo or cooperate with security
processing, including but not limited to
meeting with a security investigator for
subject interview, completing security forms
or releases, and cooperation with medical or
psychological evaluation;
(b) Refusal to provide full, frank and
truthful answers to lawful questions of
investigators, security officials, or other
official representatives in connection with a
personnel security or trustworthiness
determination.
16. Conditions that could raise a security
concern and may be disqualifying include:
(a) Deliberate omission, concealment, or
falsification of relevant facts from any
E:\FR\FM\30AUR1.SGM
30AUR1
jlentini on PROD1PC65 with RULES
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
personnel security questionnaire, personal
history statement, or similar form used to
conduct investigations, determine
employment qualifications, award benefits or
status, determine security clearance
eligibility or trustworthiness, or award
fiduciary responsibilities;
(b) Deliberately providing false or
misleading information concerning relevant
facts to an employer, investigator, security
official, competent medical authority, or
other official government representative;
(c) Credible adverse information in several
adjudicative issue areas that is not sufficient
for an adverse determination under any other
single guideline, but which, when considered
as a whole, supports a whole-person
assessment of questionable judgment,
untrustworthiness, unreliability, lack of
candor, unwillingness to comply with rules
and regulations, or other characteristics
indicating that the person may not properly
safeguard protected information;
(d) Credible adverse information that is not
explicitly covered under any other guideline
and may not be sufficient by itself for an
adverse determination, but which, when
combined with all available information
supports a whole-person assessment of
questionable judgment, untrustworthiness,
unreliability, lack of candor, unwillingness to
comply with rules and regulations, or other
characteristics indicating that the person may
not properly safeguard protected information.
This includes but is not limited to
consideration of:
(1) Untrustworthy or unreliable behavior to
include breach of client confidentiality,
release of proprietary information,
unauthorized release of sensitive corporate or
other government protected information:
(2) Disruptive, violent, or other
inappropriate behavior in the workplace;
(3) A pattern of dishonesty or rule
violations;
(4) Evidence of significant misuse of
Government or other employer’s time or
resources;
(e) Personal conduct or concealment of
information about one’s conduct that creates
a vulnerability to exploitation, manipulation,
or duress, such as:
(1) Engaging in activities which, if known,
may affect the person’s personal,
professional, or community standing, or
(2) While in another country, engaging in
any activity that is illegal in that country or
that is legal in that country but illegal in the
United States and may serve as a basis for
exploitation or pressure by the foreign
security or intelligence service or other
group;
(f) violation of a written or recorded
commitment made by the individual to the
employer as a condition of employment;
(g) association with persons involved in
criminal activity.
17. Conditions that could mitigate security
concerns include:
(a) The individual made prompt, good-faith
efforts to correct the omission, concealment,
or falsification before being confronted with
the facts;
(b) The refusal or failure to cooperate,
omission, or concealment was caused or
significantly contributed to by improper or
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
inadequate advice of authorized personnel or
legal counsel advising or instructing the
individual specifically concerning the
security clearance process. Upon being made
aware of the requirement to cooperate or
provide the information, the individual
cooperated fully and truthfully.
(c) The offense is so minor, or so much
time has passed, or the behavior is so
infrequent, or it happened under such unique
circumstances that it is unlikely to recur and
does not cast doubt on the individual’s
reliability, trustworthiness, or good
judgment;
(d) The individual has acknowledged the
behavior and obtained counseling to change
the behavior or taken other positive steps to
alleviate the stressors, circumstances, or
factors that caused untrustworthy, unreliable,
or other inappropriate behavior, and such
behavior is unlikely to recur;
(e) The individual has taken positive steps
to reduce or eliminate vulnerability to
exploitation, manipulation, or duress;
(f) The information was unsubstantiated or
from a source of questionable reliability;
(g) Association with persons involved in
criminal activity has ceased or occurs under
circumstances that do not cast doubt upon
the individual’s reliability, trustworthiness,
judgment, or willingness to comply with
rules and regulations.
Guideline F: Financial Considerations
18. The concern. Failure or inability to live
within one’s means, satisfy debts, and meet
financial obligations may indicate poor selfcontrol, lack of judgment, or unwillingness to
abide by rules and regulations, all of which
can raise questions about an individual’s
reliability, trustworthiness and ability to
protect classified information. An individual
who is financially overextended is at risk of
having to engage in illegal acts to generate
funds. Compulsive gambling is a concern as
it may lead to financial crimes including
espionage. Affluence that cannot be
explained by known sources of income is
also a security concern. It may indicate
proceeds from financially profitable criminal
acts.
19. Conditions that could raise a security
concern and may be disqualifying include:
(a) Inability or unwillingness to satisfy
debts;
(b) Indebtedness caused by frivolous or
irresponsible spending and the absence of
any evidence of willingness or intent to pay
the debt or establish a realistic plan to pay
the debt.
(c) A history of not meeting financial
obligations;
(d) Deceptive or illegal financial practices
such as embezzlement, employee theft, check
fraud, income tax evasion, expense account
fraud, filing deceptive loan statements, and
other intentional financial breaches of trust;
(e) Consistent spending beyond one’s
means, which may be indicated by excessive
indebtedness, significant negative cash flow,
high debt-to-income ratio, and/or other
financial analysis;
(f) Financial problems that are linked to
drug abuse, alcoholism, gambling problems,
or other issues of security concern;
PO 00000
Frm 00057
Fmt 4700
Sfmt 4700
51477
(g) Failure to file annual Federal, state, or
local income tax returns as required or the
fraudulent filing of the same;
(h) Unexplained affluence, as shown by a
lifestyle or standard of living, increase in net
worth, or money transfers that cannot be
explained by subject’s known legal sources of
income;
(i) Compulsive or addictive gambling as
indicated by an unsuccessful attempt to stop
gambling, ‘‘chasing losses’’ (i.e. increasing
the bets or returning another day in an effort
to get even), concealment of gambling losses,
borrowing money to fund gambling or pay
gambling debts, family conflict or other
problems caused by gambling.
20. Conditions that could mitigate security
concerns include:
(a) The behavior happened so long ago,
was so infrequent, or occurred under such
circumstances that it is unlikely to recur and
does not cast doubt on the individual’s
current reliability, trustworthiness, or good
judgment;
(b) The conditions that resulted in the
financial problem were largely beyond the
person’s control (e.g., loss of employment, a
business downturn, unexpected medical
emergency, or a death, divorce or separation),
and the individual acted responsibly under
the circumstances;
(c) The person has received or is receiving
counseling for the problem and/or there are
clear indications that the problem is being
resolved or is under control;
(d) The individual initiated a good-faith
effort to repay overdue creditors or otherwise
resolve debts;
(e) The individual has a reasonable basis to
dispute the legitimacy of the past-due debt
which is the cause of the problem and
provides documented proof to substantiate
the basis of the dispute or provides evidence
of actions to resolve the issue;
(f) The affluence resulted from a legal
source of income.
Guideline G: Alcohol Consumption
21. The concern. Excessive alcohol
consumption often leads to the exercise of
questionable judgment or the failure to
control impulses, and can raise questions
about an individual’s reliability and
trustworthiness.
22. Conditions that could raise a security
concern and may be disqualifying include:
(a) Alcohol-related incidents away from
work, such as driving while under the
influence, fighting, child or spouse abuse,
disturbing the peace, or other incidents of
concern, regardless of whether the individual
is diagnosed as an alcohol abuser or alcohol
dependent;
(b) Alcohol-related incidents at work, such
as reporting for work or duty in an
intoxicated or impaired condition, or
drinking on the job, regardless of whether the
individual is diagnosed as an alcohol abuser
or alcohol dependent;
(c) Habitual or binge consumption of
alcohol to the point of impaired judgment,
regardless of whether the individual is
diagnosed as an alcohol abuser or alcohol
dependent;
(d) Diagnosis by a duly qualified medical
professional (e.g., physician, clinical
E:\FR\FM\30AUR1.SGM
30AUR1
51478
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
psychologist, or psychiatrist) of alcohol abuse
or alcohol dependence;
(e) Evaluation of alcohol abuse or alcohol
dependence by a licensed clinical social
worker who is a staff member of a recognized
alcohol treatment program;
(f) Relapse after diagnosis of alcohol abuse
or dependence and completion of an alcohol
rehabilitation program;
(g) Failure to follow any court order
regarding alcohol education, evaluation,
treatment, or abstinence.
23. Conditions that could mitigate security
concerns include:
(a) So much time has passed, or the
behavior was so infrequent, or it happened
under such unusual circumstances that it is
unlikely to recur or does not cast doubt on
the individual’s current reliability,
trustworthiness, or good judgment;
(b) The individual acknowledges his or her
alcoholism or issues of alcohol abuse,
provides evidence of actions taken to
overcome this problem, and has established
a pattern of abstinence (if alcohol dependent)
or responsible use (if an alcohol abuser);
(c) The individual is a current employee
who is participating in a counseling or
treatment program, has no history of previous
treatment and relapse, and is making
satisfactory progress;
(d) The individual has successfully
completed inpatient or outpatient counseling
or rehabilitation along with any required
aftercare, has demonstrated a clear and
established pattern of modified consumption
or abstinence in accordance with treatment
recommendations, such as participation in
meetings of Alcoholics Anonymous or a
similar organization and has received a
favorable prognosis by a duly qualified
medical professional or a licensed clinical
social worker who is a staff member of a
recognized alcohol treatment program.
jlentini on PROD1PC65 with RULES
Guideline H: Drug Involvement
24. The concern. Use of an illegal drug or
misuse of a prescription drug can raise
questions about an individual’s reliability
and trustworthiness, both because it may
impair judgment and because it raises
questions about a person’s ability or
willingness to comply with laws, rules, and
regulations.
(a) Drugs are defined as mood and behavior
altering substances, and include:
(1) Drugs, materials, and other chemical
compounds identified and listed in the
Controlled Substances Act of 1970, as
amended (e.g., marijuana or cannabis,
depressants, narcotics, stimulants, and
hallucinogens), and
(2) Inhalants and other similar substances;
(b) Drug abuse is the illegal use of a drug
or use of a legal drug in a manner that
deviates from approved medical direction.
25. Conditions that could raise a security
concern and may be disqualifying include:
(a) Any drug abuse (see above definition); 1
(b) Testing positive for illegal drug use;
1 Under the provisions of 10 U.S.C. 986 any
person who is an unlawful user of, or is addicted
to, a controlled substance as defined in section 102
of the Controlled Substances Act (21 U.S.C. 802),
may not be granted or have renewed their access to
classified information.
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
(c) Illegal drug possession, including
cultivation, processing, manufacture,
purchase, sale, or distribution; or possession
of drug paraphernalia;
(d) Diagnosis by a duly qualified medical
professional (e.g., physician, clinical
psychologist, or psychiatrist) of drug abuse or
drug dependence;
(e) Evaluation of drug abuse or drug
dependence by a licensed clinical social
worker who is a staff member of a recognized
drug treatment program;
(f) Failure to successfully complete a drug
treatment program prescribed by a duly
qualified medical professional;
(g) Any illegal drug use after being granted
a security clearance;
(h) Expressed intent to continue illegal
drug use, or failure to clearly and
convincingly commit to discontinue drug
use.
26. Conditions that could mitigate security
concerns include:
(a) The behavior happened so long ago,
was so infrequent, or happened under such
circumstances that it is unlikely to recur or
does not cast doubt on the individual’s
current reliability, trustworthiness, or good
judgment;
(b) A demonstrated intent not to abuse any
drugs in the future, such as:
(1) Disassociation from drug-using
associates and contacts;
(2) Changing or avoiding the environment
where drugs were used;
(3) An appropriate period of abstinence;
(4) A signed statement of intent with
automatic revocation of clearance for any
violation;
(c) Abuse of prescription drugs was after a
severe or prolonged illness during which
these drugs were prescribed, and abuse has
since ended;
(d) Satisfactory completion of a prescribed
drug treatment program, including but not
limited to rehabilitation and aftercare
requirements, without recurrence of abuse,
and a favorable prognosis by a duly qualified
medical professional.
Guideline I: Psychological Conditions
27. The concern. Certain emotional,
mental, and personality conditions can
impair judgment, reliability, or
trustworthiness. A formal diagnosis of a
disorder is not required for there to be a
concern under this guideline. A duly
qualified mental health professional (e.g.,
clinical psychologist or psychiatrist)
employed by, or acceptable to and approved
by the U.S. Government, should be consulted
when evaluating potentially disqualifying
and mitigating information under this
guideline. No negative inference concerning
the standards in this Guideline may be raised
solely on the basis of seeking mental health
counseling.
28. Conditions that could raise a security
concern and may be disqualifying include:
(a) Behavior that casts doubt on an
individual’s judgment, reliability, or
trustworthiness that is not covered under any
other guideline, including but not limited to
emotionally unstable, irresponsible,
dysfunctional, violent, paranoid, or bizarre
behavior;
PO 00000
Frm 00058
Fmt 4700
Sfmt 4700
(b) An opinion by a duly qualified mental
health professional that the individual has a
condition not covered under any other
guideline that may impair judgment,
reliability, or trustworthiness; 2
(c) The individual has failed to follow
treatment advice related to a diagnosed
emotional, mental, or personality condition,
e.g., failure to take prescribed medication.
29. Conditions that could mitigate security
concerns include:
(a) The identified condition is readily
controllable with treatment, and the
individual has demonstrated ongoing and
consistent compliance with the treatment
plan;
(b) The individual has voluntarily entered
a counseling or treatment program for a
condition that is amenable to treatment, and
the individual is currently receiving
counseling or treatment with a favorable
prognosis by a duly qualified mental health
professional;
(c) Recent opinion by a duly qualified
mental health professional employed by, or
acceptable to and approved by the U.S.
Government that an individual’s previous
condition is under control or in remission,
and has a low probability of recurrence or
exacerbation;
(d) The past emotional instability was a
temporary condition (e.g., one caused by
death, illness, or marital breakup), the
situation has been resolved, and the
individual no longer shows indications of
emotional instability;
(e) There is no indication of a current
problem.
Guideline J: Criminal Conduct
30. The concern. Criminal activity creates
doubt about a person’s judgment, reliability,
and trustworthiness. By its very nature, it
calls into question a person’s ability or
willingness to comply with laws, rules and
regulations.
31. Conditions that could raise a security
concern and may be disqualifying include:
(a) A single serious crime or multiple lesser
offenses;
(b) Discharge or dismissal from the Armed
Forces under dishonorable conditions; 3
(c) Allegation or admission of criminal
conduct, regardless of whether the person
was formally charged, formally prosecuted or
convicted;
(d) Individual is currently on parole or
probation;
(e) Violation of parole or probation, or
failure to complete a court-mandated
rehabilitation program;
(f) Conviction in a Federal or State court,
including a court-martial of a crime,
2 Under the provisions of 10 U.S.C. 986, any
person who is mentally incompetent, as determined
by a credentialed mental health professional
approved by the Department of Defense, may not be
granted or have renewed their access to classified
information.
3 Under the provisions of 10 U.S.C. 986, a person
who has received a dishonorable discharge or has
been dismissed from the Armed Forces may not be
granted or have renewed access to classified
information. In a meritorious case, the Secretaries
of the Military Departments or designee; or the
Directors of WHS, DIA, NSA, DOHA or designee
may authorize a waiver of this prohibition.
E:\FR\FM\30AUR1.SGM
30AUR1
Federal Register / Vol. 71, No. 168 / Wednesday, August 30, 2006 / Rules and Regulations
sentenced to imprisonment for a term
exceeding one year and incarcerated as a
result of that sentence for not less than a
year.4
32. Conditions that could mitigate security
concerns include:
(a) So much time has elapsed since the
criminal behavior happened, or it happened
under such unusual circumstances that it is
unlikely to recur and does not cast doubt on
the individual’s reliability, trustworthiness,
or good judgment;
(b) The person was pressured or coerced
into committing the act and those pressures
are no longer present in the person’s life;
(c) Evidence that the person did not
commit the offense;
(d) There is evidence of successful
rehabilitation; including but not limited to
the passage of time without recurrence of
criminal activity, remorse or restitution, job
training or higher education, good
employment record, or constructive
community involvement;
(e) Potentially disqualifying conditions 31.
(b) and (f) may not be mitigated unless,
where meritorious circumstances exist, the
Secretaries of the Military Departments or
designee; or the Directors of Washington
Headquarters Services (WHS), Defense
Intelligence Agency (DIA), National Security
Agency (NSA), Defense Office of Hearings
and Appeals (DOHA) or designee has granted
a waiver.
jlentini on PROD1PC65 with RULES
Guideline K: Handling Protected
Information
33. The concern. Deliberate or negligent
failure to comply with rules and regulations
for protecting classified or other sensitive
information raises doubt about an
individual’s trustworthiness, judgment,
reliability, or willingness and ability to
safeguard such information, and is a serious
security concern.
34. Conditions that could raise a security
concern and may be disqualifying include:
(a) Deliberate or negligent disclosure of
classified or other protected information to
unauthorized persons, including but not
limited to personal or business contacts, to
the media, or to persons present at seminars,
meetings, or conferences;
(b) Collecting or storing classified or other
protected information at home or in any
other unauthorized location;
(c) Loading, drafting, editing, modifying,
storing, transmitting, or otherwise handling
classified reports, data, or other information
on any unapproved equipment including but
not limited to any typewriter, word
processor, or computer hardware, software,
drive, system, gameboard, handheld, ‘‘palm’’
or pocket device or other adjunct equipment;
(d) Inappropriate efforts to obtain or view
classified or other protected information
outside one’s need to know;
(e) Copying classified or other protected
information in a manner designed to conceal
4 Under the above mentioned statute, a person
who has been convicted in a Federal or State court,
including courts martial, sentenced to
imprisonment for a term exceeding one year and
incarcerated for not less than one year, may not be
granted or have renewed access to classified
information. The same waiver provision also
applies.
VerDate Aug<31>2005
16:32 Aug 29, 2006
Jkt 208001
or remove classification or other document
control markings;
(f) Viewing or downloading information
from a secure system when the information
is beyond the individual’s need-to-know;
(g) Any failure to comply with rules for the
protection of classified or other sensitive
information;
(h) Negligence or lax security habits that
persist despite counseling by management.
(i) Failure to comply with rules or
regulations that results in damage to the
National Security, regardless of whether it
was deliberate or negligent.
35. Conditions that could mitigate security
concerns include:
(a) So much time has elapsed since the
behavior, or it has happened so infrequently
or under such unusual circumstances, that it
is unlikely to recur and does not cast doubt
on the individual’s current reliability,
trustworthiness, or good judgment;
(b) The individual responded favorably to
counseling or remedial security training and
now demonstrates a positive attitude toward
the discharge of security responsibilities;
(c) The security violations were due to
improper or inadequate training.
Guideline L: Outside Activities
36. The concern. Involvement in certain
types of outside employment or activities is
of security concern if it poses a conflict of
interest with an individual’s security
responsibilities and could create an increased
risk of unauthorized disclosure of classified
information.
37. Conditions that could raise a security
concern and may be disqualifying include:
(a) Any employment or service, whether
compensated or volunteer, with:
(1) The government of a foreign country;
(2) Any foreign national, organization, or
other entity;
(3) A representative of any foreign interest;
(4) Any foreign, domestic, or international
organization or person engaged in analysis,
discussion, or publication of material on
intelligence, defense, foreign affairs, or
protected technology;
(b) Failure to report or fully disclose an
outside activity when this is required.
38. Conditions that could mitigate security
concerns include:
(a) Evaluation of the outside employment
or activity by the appropriate security or
counterintelligence office indicates that it
does not pose a conflict with an individual’s
security responsibilities or with the national
security interests of the United States;
(b) The individual terminated the
employment or discontinued the activity
upon being notified that it was in conflict
with his or her security responsibilities.
computer hardware, software, firmware, and
data used for the communication,
transmission, processing, manipulation,
storage, or protection of information.
40. Conditions that could raise a security
concern and may be disqualifying include:
(a) Illegal or unauthorized entry into any
information technology system or component
thereof;
(b) Illegal or unauthorized modification,
destruction, manipulation or denial of access
to information, software, firmware, or
hardware in an information technology
system;
(c) Use of any information technology
system to gain unauthorized access to
another system or to a compartmented area
within the same system;
(d) Downloading, storing, or transmitting
classified information on or to any
unauthorized software, hardware, or
information technology system;
(e) Unauthorized use of a government or
other information technology system;
(f) Introduction, removal, or duplication of
hardware, firmware, software, or media to or
from any information technology system
without authorization, when prohibited by
rules, procedures, guidelines or regulations;
(g) Negligence or lax security habits in
handling information technology that persist
despite counseling by management;
(h) Any misuse of information technology,
whether deliberate or negligent, that results
in damage to the national security.
41. Conditions that could mitigate security
concerns include:
(a) So much time has elapsed since the
behavior happened, or it happened under
such unusual circumstances, that it is
unlikely to recur and does not cast doubt on
the individual’s reliability, trustworthiness,
or good judgment;
(b) The misuse was minor and done only
in the interest of organizational efficiency
and effectiveness, such as letting another
person use one’s password or computer when
no other timely alternative was readily
available;
(c) The conduct was unintentional or
inadvertent and was followed by a prompt,
good-faith effort to correct the situation and
by notification of supervisor.
Dated: August 23, 2006.
L.M. Bynum,
OSD Federal Register Liaison Officer, DoD.
[FR Doc. E6–14361 Filed 8–29–06; 8:45 am]
BILLING CODE 5001–06–P
Guideline M: Use of Information Technology
Systems
39. The concern. Noncompliance with
rules, procedures, guidelines or regulations
pertaining to information technology systems
may raise security concerns about an
individual’s reliability and trustworthiness,
calling into question the willingness or
ability to properly protect sensitive systems,
networks, and information. Information
Technology Systems include all related
PO 00000
Frm 00059
Fmt 4700
Sfmt 4700
51479
E:\FR\FM\30AUR1.SGM
30AUR1
Agencies
[Federal Register Volume 71, Number 168 (Wednesday, August 30, 2006)]
[Rules and Regulations]
[Pages 51474-51479]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E6-14361]
=======================================================================
-----------------------------------------------------------------------
DEPARTMENT OF DEFENSE
Office of the Secretary
32 CFR Part 154
[DoD-2006-OS-0038]
Department of Defense Personnel Security Program Regulation
AGENCY: Office of the Secretary, DoD.
ACTION: Interim final rule.
-----------------------------------------------------------------------
SUMMARY: This rule is published to streamline personnel security
clearance procedures and make the process more efficient within the
Department of Defense. This will simplify security processing and allow
the deserving public to obtain a security clearance in a more efficient
manner.
DATES: This rule is effective September 1, 2006. Written comments
received at the address indicated below by October 30, 2006 will be
accepted.
ADDRESSES: You may submit comments, identified by docket number and or
RIN number and title, by any of the following methods:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Mail: Federal Docket Management System Office, 1160
Defense Pentagon, Washington, DC 20301-1160.
Instructions: All submissions received must include the agency name
and docket number or Regulatory Information Number (RIN) for this
Federal Register document. The general policy for comments and other
submissions from members of the public is to make these submissions
available for public viewing on the Internet at https://regulations.gov
as they are received without change, including any personal identifiers
or contact information.
FOR FURTHER INFORMATION CONTACT: Charleen Wright, 703-697-3039.
SUPPLEMENTARY INFORMATION: This rule is published as an interim rule
because it takes effect on September 1 under the authority of National
Security Adviser directing immediate implementation.
Executive Order 12866, ``Regulatory Planning and Review''
It has been determined that 32 CFR part 154 is not a significant
regulatory action. The rule does not:
(1) Have an annual effect on the economy of $100 million or more or
adversely affect in a material way the economy; a section of the
economy; productivity; competition; jobs; the environment; public
health or safety; or State, local, or tribal governments or
communities;
(2) Create a serious inconsistency or otherwise interfere with an
action taken or planned by another Agency;
(3) Materially alter the budgetary impact of entitlements, grants,
user fees, or loan programs, or the rights and obligations of
recipients thereof; or
(4) Raise novel legal or policy issues arising out of legal
mandates, the President's priorities, or the principles set forth in
this Executive Order.
Unfunded Mandates Reform Act (Sec. 202, Pub. L. 104-4)
It has been certified that this rule does not contain a Federal
mandate that may result in the expenditure by State, local and tribal
governments, in aggregate, or by the private sector, of $100 million or
more in any one year.
Public Law 96-354, ``Regulatory Flexibility Act'' (5 U.S.C. 601)
It has been certified that this rule is not subject to the
Regulatory Flexibility Act (5 U.S.C. 601) because it would not, if
promulgated, have a significant economic impact on a substantial number
of small entities. This part will streamline personnel security
clearance procedures and make the process more efficient.
Public Law 96-511, ``Paperwork Reduction Act'' (44 U.S.C. Chapter 35)
It has been certified that this rule does impose reporting or
recordkeeping requirements under the Paperwork Reduction Act of 1995.
The reporting and recordkeeping requirements have been submitted to OMB
for review.
Executive Order 13132, ``Federalism''
It has been certified that this rule does not have federalism
implications, as set forth in Executive Order 13132. This rule does not
have substantial direct effects on:
(1) The States;
(2) The relationship between the National Government and the
States; or
(3) The distribution of power and responsibilities among the
various levels of Government.
List of Subjects in 32 CFR Part 154
Classified information; Government employees; Investigations;
Security measures.
0
Accordingly, 32 CFR part 154 is amended as follows:
PART 154--DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM
REGULATION
0
1. The authority citation for 32 CFR part 154 continues to read as
follows:
Authority: E.O. 10450, 18 FR 2489, 3 CFR, 1949-1953 Comp., p.
936; E.O. 12356, 47 FR
[[Page 51475]]
14874 and 15557, 3 CFR, 1982 Comp., p. 166; E.O. 10865, 25 FR 1583,
3 CFR, 1959-1963 Comp., p. 398; E.O. 12333, 46 FR 59941, 3 CFR, 1981
Comp., p. 200
0
2. Appendix H to part 154 is revised to read as follows:
Appendix H to Part 154--Adjudicative Guidelines for Determining
Eligibility for Access to Classified Information
1. Introduction. The following adjudicative guidelines are
established for all U.S. Government civilian and military personnel,
consultants, contractors, employees of contractors, licensees,
certificate holders or grantees and their employees, and other
individuals who require access to classified information. They apply
to persons being considered for initial or continued eligibility for
access to classified information, to include sensitive compartmented
information and special access programs, and are to be used by
government departments and agencies in all final clearance
determinations. Government departments and agencies may also choose
to apply these guidelines to analogous situations regarding persons
being considered for access to other types of protected information.
Decisions regarding eligibility for access to classified
information take into account factors that could cause a conflict of
interest and place a person in the position of having to choose
between his or her commitments to the United States, including the
commitment to protect classified information, and any other
compelling loyalty. Accesses decisions also take into account a
person's reliability, trustworthiness and ability to protect
classified information. No coercive policing could replace the self-
discipline and integrity of the person entrusted with the nation's
secrets as the most effective means of protecting them. When a
person's life history shows evidence of unreliability or
untrustworthiness, questions arise whether the person can be relied
on and trusted to exercise the responsibility necessary for working
in a secure environment where protecting classified information is
paramount.
2. The adjudicative process.
(a) The adjudicative process is an examination of a sufficient
period of a person's life to make an affirmative determination that
the person is an acceptable security risk. Eligibility for access to
classified information is predicated upon the individual meeting
these personnel security guidelines. The adjudication process is the
careful weighing of a number of variables known as the whole-person
concept. Available, reliable information about the person, past and
present, favorable and unfavorable, should be considered in reaching
a determination. In evaluating the relevance of an individual's
conduct, the adjudicator should consider the following factors:
(1) The nature, extent, and seriousness of the conduct;
(2) The circumstances surrounding the conduct, to include
knowledgeable participation;
(3) The frequency and recency of the conduct;
(4) The individual's age and maturity at the time of the
conduct;
(5) The extent to which participation is voluntary;
(6) The presence or absence of rehabilitation and other
permanent behavioral changes;
(7) The motivation for the conduct;
(8) The potential for pressure, coercion, exploitation, or
duress; and
(9) The likelihood of continuation or recurrence;
(b) Each case must be judged on its own merits, and final
determination remains the responsibility of the specific department
or agency. Any doubt concerning personnel being considered for
access to classified information will be resolved in favor of the
national security.
(c) The ability to develop specific thresholds for action under
these guidelines is limited by the nature and complexity of human
behavior. The ultimate determination of whether the granting or
continuing of eligibility for a security clearance is clearly
consistent with the interests of national security must be an
overall common sense judgment based upon careful consideration of
the following guidelines, each of which is to be evaluated in the
context of the whole person.
(1) GUIDELINE A: Allegiance to the United States;
(2) GUIDELINE B: Foreign Influence;
(3) GUIDELINE C: Foreign Preference;
(4) GUIDELINE D: Sexual Behavior;
(5) GUIDELINE E: Personal Conduct;
(6) GUIDELINE F: Financial Considerations;
(7) GUIDELINE G: Alcohol Consumption;
(8) GUIDELINE H: Drug Involvement;
(9) GUIDELINE I: Psychological Conditions;
(10) GUIDELINE J: Criminal Conduct;
(11) GUIDELINE K: Handling Protected Information;
(12) GUIDELINE L: Outside Activities;
(13) GUIDELINE M: Use of Information Technology Systems
(d) Although adverse information concerning a single criterion
may not be sufficient for an unfavorable determination, the
individual may be disqualified if available information reflects a
recent or recurring pattern of questionable judgment,
irresponsibility, or emotionally unstable behavior. Notwithstanding
the whole-person concept, pursuit of further investigation may be
terminated by an appropriate adjudicative agency in the face of
reliable, significant, disqualifying, adverse information.
(e) When information of security concern becomes known about an
individual who is currently eligible for access to classified
information, the adjudicator should consider whether the person:
(1) Voluntarily reported the information;
(2) Was truthful and complete in responding to questions;
(3) Sought assistance and followed professional guidance, where
appropriate;
(4) Resolved or appears likely to favorably resolve the security
concern;
(5) Has demonstrated positive changes in behavior and
employment;
(6) Should have his or her access temporarily suspended pending
final adjudication of the information.
(f) If after evaluating information of security concern, the
adjudicator decides that the information is not serious enough to
warrant a recommendation of disapproval or revocation of the
security clearance, it may be appropriate to recommend approval with
a warning that future incidents of a similar nature may result in
revocation of access.
Guideline A: Allegiance To The United States
3. The concern. An individual must be of unquestioned allegiance
to the United States. The willingness to safeguard classified
information is in doubt if there is any reason to suspect an
individual's allegiance to the United States.
4. Conditions that could raise a security concern and may be
disqualifying include:
(a) Involvement in, support of, training to commit, or advocacy
of any act of sabotage, espionage, treason, terrorism, or sedition
against the United States of America;
(b) Association or sympathy with persons who are attempting to
commit, or who are committing, any of the above acts;
(c) Association or sympathy with persons or organizations that
advocate, threaten, or use force or violence, or use any other
illegal or unconstitutional means, in an effort to:
(1) Overthrow or influence the government of the United States
or any state or local government;
(2) Prevent Federal, state, or local government personnel from
performing their official duties;
(3) Gain retribution for perceived wrongs caused by the Federal,
state, or local government;
(4) Prevent others from exercising their rights under the
Constitution or laws of the United States or of any state.
5. Conditions that could mitigate security concerns include:
(a) The individual was unaware of the unlawful aims of the
individual or organization and severed ties upon learning of these;
(b) The individual's involvement was only with the lawful or
humanitarian aspects of such an organization;
(c) Involvement in the above activities occurred for only a
short period of time and was attributable to curiosity or academic
interest;
(d) The involvement or association with such activities occurred
under such unusual circumstances, or so much time has elapsed, that
it is unlikely to recur and does not cast doubt on the individual's
current reliability, trustworthiness, or loyalty.
Guideline B: Foreign Influence
6. The concern. Foreign contacts and interests may be a security
concern if the individual has divided loyalties or foreign financial
interests, may be manipulated or induced to help a foreign person,
group, organization, or government in a way that is not in U.S.
interests, or is vulnerable to pressure or coercion by any foreign
interest. Adjudication under this Guideline can and should consider
the identity of the foreign
[[Page 51476]]
country in which the foreign contact or financial interest is
located, including, but not limited to, such considerations as
whether the foreign country is known to target United States
citizens to obtain protected information and/or is associated with a
risk of terrorism.
7. Conditions that could raise a security concern and may be
disqualifying include:
(a) Contact with a foreign family member, business or
professional associate, friend, or other person who is a citizen of
or resident in a foreign country if that contact creates a
heightened risk of foreign exploitation, inducement, manipulation,
pressure, or coercion;
(b) Connections to a foreign person, group, government, or
country that create a potential conflict of interest between the
individual's obligation to protect sensitive information or
technology and the individual's desire to help a foreign person,
group, or country by providing that information;
(c) Counterintelligence information, that may be classified,
indicates that the individual's access to protected information may
involve unacceptable risk to national security;
(d) Sharing living quarters with a person or persons, regardless
of citizenship status, if that relationship creates a heightened
risk of foreign inducement, manipulation, pressure, or coercion;
(e) A substantial business, financial, or property interest in a
foreign country, or in any foreign-owned or foreign-operated
business, which could subject the individual to heightened risk of
foreign influence or exploitation;
(f) Failure to report, when required, association with a foreign
national;
(g) Unauthorized association with a suspected or known agent,
associate, or employee of a foreign intelligence service;
(h) Indications that representatives or nationals from a foreign
country are acting to increase the vulnerability of the individual
to possible future exploitation, inducement, manipulation, pressure,
or coercion;
(i) Conduct, especially while traveling outside the U.S., which
may make the individual vulnerable to exploitation, pressure, or
coercion by a foreign person, group, government, or country.
8. Conditions that could mitigate security concerns include:
(a) The nature of the relationships with foreign persons, the
country in which these persons are located, or the positions or
activities of those persons in that country are such that it is
unlikely the individual will be placed in a position of having to
choose between the interests of a foreign individual, group,
organization, or government and the interests of the U.S.;
(b) There is no conflict of interest, either because the
individual's sense of loyalty or obligation to the foreign person,
group, government, or country is so minimal, or the individual has
such deep and longstanding relationships and loyalties in the U.S.,
that the individual can be expected to resolve any conflict of
interest in favor of the U.S. interest;
(c) Contact or communication with foreign citizens is so casual
and infrequent that there is little likelihood that it could create
a risk for foreign influence or exploitation;
(d) The foreign contacts and activities are on U.S. Government
business or are approved by the cognizant security authority;
(e) The individual has promptly complied with existing agency
requirements regarding the reporting of contacts, requests, or
threats from persons, groups, or organizations from a foreign
country;
(f) The value or routine nature of the foreign business,
financial, or property interests is such that they are unlikely to
result in a conflict and could not be used effectively to influence,
manipulate, or pressure the individual.
Guideline C: Foreign Preference
9. The concern. When an individual acts in such a way as to
indicate a preference for a foreign country over the United States,
then he or she may be prone to provide information or make decisions
that are harmful to the interests of the United States.
10. Conditions that could raise a security concern and may be
disqualifying include:
(a) Exercise of any right, privilege or obligation of foreign
citizenship after becoming a U.S. citizen or through the foreign
citizenship of a family member. This includes but is not limited to:
(1) Possession of a current foreign passport;
(2) Military service or a willingness to bear arms for a foreign
country;
(3) Accepting educational, medical, retirement, social welfare,
or other such benefits from a foreign country;
(4) Residence in a foreign country to meet citizenship
requirements;
(5) Using foreign citizenship to protect financial or business
interests in another country;
(6) Seeking or holding political office in a foreign country;
(7) Voting in a foreign election;
(b) Action to acquire or obtain recognition of a foreign
citizenship by an American citizen;
(c) Performing or attempting to perform duties, or otherwise
acting, so as to serve the interests of a foreign person, group,
organization, or government in conflict with the national security
interest;
(d) Any statement or action that shows allegiance to a country
other than the United States: for example, declaration of intent to
renounce United States citizenship; renunciation of United States
citizenship.
11. Conditions that could mitigate security concerns include:
(a) Dual citizenship is based solely on parents' citizenship or
birth in a foreign country;
(b) The individual has expressed a willingness to renounce dual
citizenship;
(c) Exercise of the rights, privileges, or obligations of
foreign citizenship occurred before the individual became a U.S.
citizen or when the individual was a minor;
(d) Use of a foreign passport is approved by the cognizant
security authority.
(e) The passport has been destroyed, surrendered to the
cognizant security authority, or otherwise invalidated;
(f) The vote in a foreign election was encouraged by the United
States Government.
Guideline D: Sexual Behavior
12. The concern. Sexual behavior that involves a criminal
offense indicates a personality or emotional disorder, reflects lack
of judgment or discretion, or which may subject the individual to
undue influence or coercion, exploitation, or duress can raise
questions about an individual's reliability, trustworthiness and
ability to protect classified information. No adverse inference
concerning the standards in this Guideline may be raised solely on
the basis of the sexual orientation of the individual.
13. Conditions that could raise a security concern and may be
disqualifying include:
(a) Sexual behavior of a criminal nature, whether or not the
individual has been prosecuted;
(b) A pattern of compulsive, self-destructive, or high risk
sexual behavior that the person is unable to stop or that may be
symptomatic of a personality disorder;
(c) Sexual behavior that causes an individual to be vulnerable
to coercion, exploitation, or duress;
(d) Sexual behavior of a public nature and/or that reflects lack
of discretion or judgment.
14. Conditions that could mitigate security concerns include:
(a) The behavior occurred prior to or during adolescence and
there is no evidence of subsequent conduct of a similar nature;
(b) The sexual behavior happened so long ago, so infrequently,
or under such unusual circumstances, that it is unlikely to recur
and does not cast doubt on the individual's current reliability,
trustworthiness, or good judgment;
(c) The behavior no longer serves as a basis for coercion,
exploitation, or duress.
(d) The sexual behavior is strictly private, consensual, and
discreet.
Guideline E: Personal Conduct
15. The concern. Conduct involving questionable judgment, lack
of candor, dishonesty, or unwillingness to comply with rules and
regulations can raise questions about an individual's reliability,
trustworthiness and ability to protect classified information. Of
special interest is any failure to provide truthful and candid
answers during the security clearance process or any other failure
to cooperate with the security clearance process.
The following will normally result in an unfavorable clearance
action or administrative termination of further processing for
clearance eligibility:
(a) Refusal, or failure without reasonable cause, to undergo or
cooperate with security processing, including but not limited to
meeting with a security investigator for subject interview,
completing security forms or releases, and cooperation with medical
or psychological evaluation;
(b) Refusal to provide full, frank and truthful answers to
lawful questions of investigators, security officials, or other
official representatives in connection with a personnel security or
trustworthiness determination.
16. Conditions that could raise a security concern and may be
disqualifying include:
(a) Deliberate omission, concealment, or falsification of
relevant facts from any
[[Page 51477]]
personnel security questionnaire, personal history statement, or
similar form used to conduct investigations, determine employment
qualifications, award benefits or status, determine security
clearance eligibility or trustworthiness, or award fiduciary
responsibilities;
(b) Deliberately providing false or misleading information
concerning relevant facts to an employer, investigator, security
official, competent medical authority, or other official government
representative;
(c) Credible adverse information in several adjudicative issue
areas that is not sufficient for an adverse determination under any
other single guideline, but which, when considered as a whole,
supports a whole-person assessment of questionable judgment,
untrustworthiness, unreliability, lack of candor, unwillingness to
comply with rules and regulations, or other characteristics
indicating that the person may not properly safeguard protected
information;
(d) Credible adverse information that is not explicitly covered
under any other guideline and may not be sufficient by itself for an
adverse determination, but which, when combined with all available
information supports a whole-person assessment of questionable
judgment, untrustworthiness, unreliability, lack of candor,
unwillingness to comply with rules and regulations, or other
characteristics indicating that the person may not properly
safeguard protected information. This includes but is not limited to
consideration of:
(1) Untrustworthy or unreliable behavior to include breach of
client confidentiality, release of proprietary information,
unauthorized release of sensitive corporate or other government
protected information:
(2) Disruptive, violent, or other inappropriate behavior in the
workplace;
(3) A pattern of dishonesty or rule violations;
(4) Evidence of significant misuse of Government or other
employer's time or resources;
(e) Personal conduct or concealment of information about one's
conduct that creates a vulnerability to exploitation, manipulation,
or duress, such as:
(1) Engaging in activities which, if known, may affect the
person's personal, professional, or community standing, or
(2) While in another country, engaging in any activity that is
illegal in that country or that is legal in that country but illegal
in the United States and may serve as a basis for exploitation or
pressure by the foreign security or intelligence service or other
group;
(f) violation of a written or recorded commitment made by the
individual to the employer as a condition of employment;
(g) association with persons involved in criminal activity.
17. Conditions that could mitigate security concerns include:
(a) The individual made prompt, good-faith efforts to correct
the omission, concealment, or falsification before being confronted
with the facts;
(b) The refusal or failure to cooperate, omission, or
concealment was caused or significantly contributed to by improper
or inadequate advice of authorized personnel or legal counsel
advising or instructing the individual specifically concerning the
security clearance process. Upon being made aware of the requirement
to cooperate or provide the information, the individual cooperated
fully and truthfully.
(c) The offense is so minor, or so much time has passed, or the
behavior is so infrequent, or it happened under such unique
circumstances that it is unlikely to recur and does not cast doubt
on the individual's reliability, trustworthiness, or good judgment;
(d) The individual has acknowledged the behavior and obtained
counseling to change the behavior or taken other positive steps to
alleviate the stressors, circumstances, or factors that caused
untrustworthy, unreliable, or other inappropriate behavior, and such
behavior is unlikely to recur;
(e) The individual has taken positive steps to reduce or
eliminate vulnerability to exploitation, manipulation, or duress;
(f) The information was unsubstantiated or from a source of
questionable reliability;
(g) Association with persons involved in criminal activity has
ceased or occurs under circumstances that do not cast doubt upon the
individual's reliability, trustworthiness, judgment, or willingness
to comply with rules and regulations.
Guideline F: Financial Considerations
18. The concern. Failure or inability to live within one's
means, satisfy debts, and meet financial obligations may indicate
poor self-control, lack of judgment, or unwillingness to abide by
rules and regulations, all of which can raise questions about an
individual's reliability, trustworthiness and ability to protect
classified information. An individual who is financially
overextended is at risk of having to engage in illegal acts to
generate funds. Compulsive gambling is a concern as it may lead to
financial crimes including espionage. Affluence that cannot be
explained by known sources of income is also a security concern. It
may indicate proceeds from financially profitable criminal acts.
19. Conditions that could raise a security concern and may be
disqualifying include:
(a) Inability or unwillingness to satisfy debts;
(b) Indebtedness caused by frivolous or irresponsible spending
and the absence of any evidence of willingness or intent to pay the
debt or establish a realistic plan to pay the debt.
(c) A history of not meeting financial obligations;
(d) Deceptive or illegal financial practices such as
embezzlement, employee theft, check fraud, income tax evasion,
expense account fraud, filing deceptive loan statements, and other
intentional financial breaches of trust;
(e) Consistent spending beyond one's means, which may be
indicated by excessive indebtedness, significant negative cash flow,
high debt-to-income ratio, and/or other financial analysis;
(f) Financial problems that are linked to drug abuse,
alcoholism, gambling problems, or other issues of security concern;
(g) Failure to file annual Federal, state, or local income tax
returns as required or the fraudulent filing of the same;
(h) Unexplained affluence, as shown by a lifestyle or standard
of living, increase in net worth, or money transfers that cannot be
explained by subject's known legal sources of income;
(i) Compulsive or addictive gambling as indicated by an
unsuccessful attempt to stop gambling, ``chasing losses'' (i.e.
increasing the bets or returning another day in an effort to get
even), concealment of gambling losses, borrowing money to fund
gambling or pay gambling debts, family conflict or other problems
caused by gambling.
20. Conditions that could mitigate security concerns include:
(a) The behavior happened so long ago, was so infrequent, or
occurred under such circumstances that it is unlikely to recur and
does not cast doubt on the individual's current reliability,
trustworthiness, or good judgment;
(b) The conditions that resulted in the financial problem were
largely beyond the person's control (e.g., loss of employment, a
business downturn, unexpected medical emergency, or a death, divorce
or separation), and the individual acted responsibly under the
circumstances;
(c) The person has received or is receiving counseling for the
problem and/or there are clear indications that the problem is being
resolved or is under control;
(d) The individual initiated a good-faith effort to repay
overdue creditors or otherwise resolve debts;
(e) The individual has a reasonable basis to dispute the
legitimacy of the past-due debt which is the cause of the problem
and provides documented proof to substantiate the basis of the
dispute or provides evidence of actions to resolve the issue;
(f) The affluence resulted from a legal source of income.
Guideline G: Alcohol Consumption
21. The concern. Excessive alcohol consumption often leads to
the exercise of questionable judgment or the failure to control
impulses, and can raise questions about an individual's reliability
and trustworthiness.
22. Conditions that could raise a security concern and may be
disqualifying include:
(a) Alcohol-related incidents away from work, such as driving
while under the influence, fighting, child or spouse abuse,
disturbing the peace, or other incidents of concern, regardless of
whether the individual is diagnosed as an alcohol abuser or alcohol
dependent;
(b) Alcohol-related incidents at work, such as reporting for
work or duty in an intoxicated or impaired condition, or drinking on
the job, regardless of whether the individual is diagnosed as an
alcohol abuser or alcohol dependent;
(c) Habitual or binge consumption of alcohol to the point of
impaired judgment, regardless of whether the individual is diagnosed
as an alcohol abuser or alcohol dependent;
(d) Diagnosis by a duly qualified medical professional (e.g.,
physician, clinical
[[Page 51478]]
psychologist, or psychiatrist) of alcohol abuse or alcohol
dependence;
(e) Evaluation of alcohol abuse or alcohol dependence by a
licensed clinical social worker who is a staff member of a
recognized alcohol treatment program;
(f) Relapse after diagnosis of alcohol abuse or dependence and
completion of an alcohol rehabilitation program;
(g) Failure to follow any court order regarding alcohol
education, evaluation, treatment, or abstinence.
23. Conditions that could mitigate security concerns include:
(a) So much time has passed, or the behavior was so infrequent,
or it happened under such unusual circumstances that it is unlikely
to recur or does not cast doubt on the individual's current
reliability, trustworthiness, or good judgment;
(b) The individual acknowledges his or her alcoholism or issues
of alcohol abuse, provides evidence of actions taken to overcome
this problem, and has established a pattern of abstinence (if
alcohol dependent) or responsible use (if an alcohol abuser);
(c) The individual is a current employee who is participating in
a counseling or treatment program, has no history of previous
treatment and relapse, and is making satisfactory progress;
(d) The individual has successfully completed inpatient or
outpatient counseling or rehabilitation along with any required
aftercare, has demonstrated a clear and established pattern of
modified consumption or abstinence in accordance with treatment
recommendations, such as participation in meetings of Alcoholics
Anonymous or a similar organization and has received a favorable
prognosis by a duly qualified medical professional or a licensed
clinical social worker who is a staff member of a recognized alcohol
treatment program.
Guideline H: Drug Involvement
24. The concern. Use of an illegal drug or misuse of a
prescription drug can raise questions about an individual's
reliability and trustworthiness, both because it may impair judgment
and because it raises questions about a person's ability or
willingness to comply with laws, rules, and regulations.
(a) Drugs are defined as mood and behavior altering substances,
and include:
(1) Drugs, materials, and other chemical compounds identified
and listed in the Controlled Substances Act of 1970, as amended
(e.g., marijuana or cannabis, depressants, narcotics, stimulants,
and hallucinogens), and
(2) Inhalants and other similar substances;
(b) Drug abuse is the illegal use of a drug or use of a legal
drug in a manner that deviates from approved medical direction.
25. Conditions that could raise a security concern and may be
disqualifying include:
(a) Any drug abuse (see above definition); \1\
---------------------------------------------------------------------------
\1\ Under the provisions of 10 U.S.C. 986 any person who is an
unlawful user of, or is addicted to, a controlled substance as
defined in section 102 of the Controlled Substances Act (21 U.S.C.
802), may not be granted or have renewed their access to classified
information.
---------------------------------------------------------------------------
(b) Testing positive for illegal drug use;
(c) Illegal drug possession, including cultivation, processing,
manufacture, purchase, sale, or distribution; or possession of drug
paraphernalia;
(d) Diagnosis by a duly qualified medical professional (e.g.,
physician, clinical psychologist, or psychiatrist) of drug abuse or
drug dependence;
(e) Evaluation of drug abuse or drug dependence by a licensed
clinical social worker who is a staff member of a recognized drug
treatment program;
(f) Failure to successfully complete a drug treatment program
prescribed by a duly qualified medical professional;
(g) Any illegal drug use after being granted a security
clearance;
(h) Expressed intent to continue illegal drug use, or failure to
clearly and convincingly commit to discontinue drug use.
26. Conditions that could mitigate security concerns include:
(a) The behavior happened so long ago, was so infrequent, or
happened under such circumstances that it is unlikely to recur or
does not cast doubt on the individual's current reliability,
trustworthiness, or good judgment;
(b) A demonstrated intent not to abuse any drugs in the future,
such as:
(1) Disassociation from drug-using associates and contacts;
(2) Changing or avoiding the environment where drugs were used;
(3) An appropriate period of abstinence;
(4) A signed statement of intent with automatic revocation of
clearance for any violation;
(c) Abuse of prescription drugs was after a severe or prolonged
illness during which these drugs were prescribed, and abuse has
since ended;
(d) Satisfactory completion of a prescribed drug treatment
program, including but not limited to rehabilitation and aftercare
requirements, without recurrence of abuse, and a favorable prognosis
by a duly qualified medical professional.
Guideline I: Psychological Conditions
27. The concern. Certain emotional, mental, and personality
conditions can impair judgment, reliability, or trustworthiness. A
formal diagnosis of a disorder is not required for there to be a
concern under this guideline. A duly qualified mental health
professional (e.g., clinical psychologist or psychiatrist) employed
by, or acceptable to and approved by the U.S. Government, should be
consulted when evaluating potentially disqualifying and mitigating
information under this guideline. No negative inference concerning
the standards in this Guideline may be raised solely on the basis of
seeking mental health counseling.
28. Conditions that could raise a security concern and may be
disqualifying include:
(a) Behavior that casts doubt on an individual's judgment,
reliability, or trustworthiness that is not covered under any other
guideline, including but not limited to emotionally unstable,
irresponsible, dysfunctional, violent, paranoid, or bizarre
behavior;
(b) An opinion by a duly qualified mental health professional
that the individual has a condition not covered under any other
guideline that may impair judgment, reliability, or trustworthiness;
\2\
---------------------------------------------------------------------------
\2\ Under the provisions of 10 U.S.C. 986, any person who is
mentally incompetent, as determined by a credentialed mental health
professional approved by the Department of Defense, may not be
granted or have renewed their access to classified information.
---------------------------------------------------------------------------
(c) The individual has failed to follow treatment advice related
to a diagnosed emotional, mental, or personality condition, e.g.,
failure to take prescribed medication.
29. Conditions that could mitigate security concerns include:
(a) The identified condition is readily controllable with
treatment, and the individual has demonstrated ongoing and
consistent compliance with the treatment plan;
(b) The individual has voluntarily entered a counseling or
treatment program for a condition that is amenable to treatment, and
the individual is currently receiving counseling or treatment with a
favorable prognosis by a duly qualified mental health professional;
(c) Recent opinion by a duly qualified mental health
professional employed by, or acceptable to and approved by the U.S.
Government that an individual's previous condition is under control
or in remission, and has a low probability of recurrence or
exacerbation;
(d) The past emotional instability was a temporary condition
(e.g., one caused by death, illness, or marital breakup), the
situation has been resolved, and the individual no longer shows
indications of emotional instability;
(e) There is no indication of a current problem.
Guideline J: Criminal Conduct
30. The concern. Criminal activity creates doubt about a
person's judgment, reliability, and trustworthiness. By its very
nature, it calls into question a person's ability or willingness to
comply with laws, rules and regulations.
31. Conditions that could raise a security concern and may be
disqualifying include:
(a) A single serious crime or multiple lesser offenses;
(b) Discharge or dismissal from the Armed Forces under
dishonorable conditions; \3\
---------------------------------------------------------------------------
\3\ Under the provisions of 10 U.S.C. 986, a person who has
received a dishonorable discharge or has been dismissed from the
Armed Forces may not be granted or have renewed access to classified
information. In a meritorious case, the Secretaries of the Military
Departments or designee; or the Directors of WHS, DIA, NSA, DOHA or
designee may authorize a waiver of this prohibition.
---------------------------------------------------------------------------
(c) Allegation or admission of criminal conduct, regardless of
whether the person was formally charged, formally prosecuted or
convicted;
(d) Individual is currently on parole or probation;
(e) Violation of parole or probation, or failure to complete a
court-mandated rehabilitation program;
(f) Conviction in a Federal or State court, including a court-
martial of a crime,
[[Page 51479]]
sentenced to imprisonment for a term exceeding one year and
incarcerated as a result of that sentence for not less than a
year.\4\
---------------------------------------------------------------------------
\4\ Under the above mentioned statute, a person who has been
convicted in a Federal or State court, including courts martial,
sentenced to imprisonment for a term exceeding one year and
incarcerated for not less than one year, may not be granted or have
renewed access to classified information. The same waiver provision
also applies.
---------------------------------------------------------------------------
32. Conditions that could mitigate security concerns include:
(a) So much time has elapsed since the criminal behavior
happened, or it happened under such unusual circumstances that it is
unlikely to recur and does not cast doubt on the individual's
reliability, trustworthiness, or good judgment;
(b) The person was pressured or coerced into committing the act
and those pressures are no longer present in the person's life;
(c) Evidence that the person did not commit the offense;
(d) There is evidence of successful rehabilitation; including
but not limited to the passage of time without recurrence of
criminal activity, remorse or restitution, job training or higher
education, good employment record, or constructive community
involvement;
(e) Potentially disqualifying conditions 31. (b) and (f) may not
be mitigated unless, where meritorious circumstances exist, the
Secretaries of the Military Departments or designee; or the
Directors of Washington Headquarters Services (WHS), Defense
Intelligence Agency (DIA), National Security Agency (NSA), Defense
Office of Hearings and Appeals (DOHA) or designee has granted a
waiver.
Guideline K: Handling Protected Information
33. The concern. Deliberate or negligent failure to comply with
rules and regulations for protecting classified or other sensitive
information raises doubt about an individual's trustworthiness,
judgment, reliability, or willingness and ability to safeguard such
information, and is a serious security concern.
34. Conditions that could raise a security concern and may be
disqualifying include:
(a) Deliberate or negligent disclosure of classified or other
protected information to unauthorized persons, including but not
limited to personal or business contacts, to the media, or to
persons present at seminars, meetings, or conferences;
(b) Collecting or storing classified or other protected
information at home or in any other unauthorized location;
(c) Loading, drafting, editing, modifying, storing,
transmitting, or otherwise handling classified reports, data, or
other information on any unapproved equipment including but not
limited to any typewriter, word processor, or computer hardware,
software, drive, system, gameboard, handheld, ``palm'' or pocket
device or other adjunct equipment;
(d) Inappropriate efforts to obtain or view classified or other
protected information outside one's need to know;
(e) Copying classified or other protected information in a
manner designed to conceal or remove classification or other
document control markings;
(f) Viewing or downloading information from a secure system when
the information is beyond the individual's need-to-know;
(g) Any failure to comply with rules for the protection of
classified or other sensitive information;
(h) Negligence or lax security habits that persist despite
counseling by management.
(i) Failure to comply with rules or regulations that results in
damage to the National Security, regardless of whether it was
deliberate or negligent.
35. Conditions that could mitigate security concerns include:
(a) So much time has elapsed since the behavior, or it has
happened so infrequently or under such unusual circumstances, that
it is unlikely to recur and does not cast doubt on the individual's
current reliability, trustworthiness, or good judgment;
(b) The individual responded favorably to counseling or remedial
security training and now demonstrates a positive attitude toward
the discharge of security responsibilities;
(c) The security violations were due to improper or inadequate
training.
Guideline L: Outside Activities
36. The concern. Involvement in certain types of outside
employment or activities is of security concern if it poses a
conflict of interest with an individual's security responsibilities
and could create an increased risk of unauthorized disclosure of
classified information.
37. Conditions that could raise a security concern and may be
disqualifying include:
(a) Any employment or service, whether compensated or volunteer,
with:
(1) The government of a foreign country;
(2) Any foreign national, organization, or other entity;
(3) A representative of any foreign interest;
(4) Any foreign, domestic, or international organization or
person engaged in analysis, discussion, or publication of material
on intelligence, defense, foreign affairs, or protected technology;
(b) Failure to report or fully disclose an outside activity when
this is required.
38. Conditions that could mitigate security concerns include:
(a) Evaluation of the outside employment or activity by the
appropriate security or counterintelligence office indicates that it
does not pose a conflict with an individual's security
responsibilities or with the national security interests of the
United States;
(b) The individual terminated the employment or discontinued the
activity upon being notified that it was in conflict with his or her
security responsibilities.
Guideline M: Use of Information Technology Systems
39. The concern. Noncompliance with rules, procedures,
guidelines or regulations pertaining to information technology
systems may raise security concerns about an individual's
reliability and trustworthiness, calling into question the
willingness or ability to properly protect sensitive systems,
networks, and information. Information Technology Systems include
all related computer hardware, software, firmware, and data used for
the communication, transmission, processing, manipulation, storage,
or protection of information.
40. Conditions that could raise a security concern and may be
disqualifying include:
(a) Illegal or unauthorized entry into any information
technology system or component thereof;
(b) Illegal or unauthorized modification, destruction,
manipulation or denial of access to information, software, firmware,
or hardware in an information technology system;
(c) Use of any information technology system to gain
unauthorized access to another system or to a compartmented area
within the same system;
(d) Downloading, storing, or transmitting classified information
on or to any unauthorized software, hardware, or information
technology system;
(e) Unauthorized use of a government or other information
technology system;
(f) Introduction, removal, or duplication of hardware, firmware,
software, or media to or from any information technology system
without authorization, when prohibited by rules, procedures,
guidelines or regulations;
(g) Negligence or lax security habits in handling information
technology that persist despite counseling by management;
(h) Any misuse of information technology, whether deliberate or
negligent, that results in damage to the national security.
41. Conditions that could mitigate security concerns include:
(a) So much time has elapsed since the behavior happened, or it
happened under such unusual circumstances, that it is unlikely to
recur and does not cast doubt on the individual's reliability,
trustworthiness, or good judgment;
(b) The misuse was minor and done only in the interest of
organizational efficiency and effectiveness, such as letting another
person use one's password or computer when no other timely
alternative was readily available;
(c) The conduct was unintentional or inadvertent and was
followed by a prompt, good-faith effort to correct the situation and
by notification of supervisor.
Dated: August 23, 2006.
L.M. Bynum,
OSD Federal Register Liaison Officer, DoD.
[FR Doc. E6-14361 Filed 8-29-06; 8:45 am]
BILLING CODE 5001-06-P