National Industrial Security Program Directive No. 1, 17305-17307 [2010-7776]
Download as PDF
Federal Register / Vol. 75, No. 65 / Tuesday, April 6, 2010 / Rules and Regulations
NATIONAL ARCHIVES AND RECORDS
ADMINISTRATION
Information Security Oversight Office
32 CFR Part 2004
[FDMS Docket ISOO–09–0001]
RIN 3095–AB63
National Industrial Security Program
Directive No. 1
AGENCY: Information Security Oversight
Office, NARA.
ACTION: Final rule.
sroberts on DSKD5P82C1PROD with RULES
SUMMARY: The Information Security
Oversight Office (ISOO), National
Archives and Records Administration
(NARA), has amended National
Industrial Security Program Directive
No. 1. This amendment to Directive No.
1 provides guidance to agencies on
release of certain classified information
(referred to as ‘‘proscribed information’’)
to contractors that are owned or under
the control of a foreign interest and have
had the foreign ownership or control
mitigated by an arrangement known as
an Special Security Agreement (SSA).
To date, there has been no Federal
standard across agencies on release of
proscribed information to this group.
This amendment provides
standardization and consistency to the
process across the Federal Government,
and enables greater efficiency in
determining the release of the
information as appropriate. This
amendment also moves the definitions
section to the beginning of the part for
easier use, and adds definitions for the
terms ‘‘Cognizant Security Office
(CSO),’’ ‘‘National Interest Determination
(NID),’’ and ‘‘Proscribed Information,’’ to
accompany the new guidelines. Finally,
this amendment makes a minor
typographical change to the authority
citation to make it more accurate.
DATES: This rule is effective May 6,
2010.
FOR FURTHER INFORMATION CONTACT:
William J. Bosanko, Director, ISOO, at
202–357–5250.
SUPPLEMENTARY INFORMATION: As of
November 17, 1995, ISOO became a part
of NARA and subsequently published
Part 2004, National Industrial Program
Directive No. 1, pursuant to section
102(b)(1) of E.O. 12829, January 6, 1993
(58 FR 3479), as amended by E.O.
12885, December 14, 1993, (58 FR
65863). The Executive Order established
a National Industrial Security Program
(NISP) to safeguard Federal Government
classified information released to
contractors, licensees, and grantees
VerDate Nov<24>2008
16:13 Apr 05, 2010
Jkt 220001
(collectively referred to here as
‘‘contractors’’) of the United States
Government. This amendment to
Directive No. 1 adds guidelines on
release of proscribed information to this
category of contractors.
ISOO maintains oversight over E.O.
12958, as amended, and policy
oversight over E.O. 12829, as amended,
and issuing this amendment fulfills one
of the ISOO Director’s delegated
responsibilities under these Executive
Orders. Nothing in Directive No. 1 or
this amendment shall be construed to
supersede the authority of the Secretary
of Energy or the Nuclear Regulatory
Commission under the Atomic Energy
Act of 1954, as amended (42 U.S.C.
2011, et seq.), or the authority of the
Director of National Intelligence under
the National Security Act of 1947, as
amended, E.O. 12333, December 8,
1981, and the Intelligence Reform and
Terrorism Prevention Act of 2004.
The interpretive guidance contained
in this amendment will only assist
agencies to implement E.O. 12829, as
amended; users of Directive No. 1 shall
refer concurrently to the Executive
Order for guidance.
On November 30, 2009, ISOO
published a proposed rule in the
Federal Register (74 FR 62531) for a 60day public comment period. A
correction to the proposed rule was
published on January 12, 2010,
changing the Federal Docket
Management System (FDMS) Docket
Number from NARA–09–0005 to ISOO–
09–0001 and the RIN from 3095–AB34
to 3095–AB63. These corrections are
reflected in this final rule. The proposed
rule made the changes as outlined in the
Summary above. The public comment
period closed on January 29, 2010. In
response, ISOO received comments
from three entities; a Federal agency, a
law firm, and a technological systems
design company. All the commenters in
general supported the proposed
amendments to the rule, but all three
also submitted suggested language
changes to address perceived clarity
problems, subordinate office designees,
and concerns regarding deadlines.
All three commenters raised concerns
about the use of the word ‘‘ordinarily’’ in
proposed § 2004.22, Operational
Responsibilities, subparagraphs
(c)(1)(iii), (c)(4), (c)(4)(i), and (c)(4)(ii).
The proposed provisions set forth 30day and 60-day deadlines in which
Government Contracting Activity (GCA)
determinations or NID decisions would
‘‘ordinarily’’ be made. All three
commenters stated that the word
‘‘ordinarily’’ was too vague, undercut the
deadlines, reduced accountability, and
PO 00000
Frm 00025
Fmt 4700
Sfmt 4700
17305
created the risk that the deadlines
would be treated as advisory only.
We agree with the commenters and
the proposal to remove the term
‘‘ordinarily’’ from these provisions.
ISOO has modified the proposed
subparagraphs to remove the term
‘‘ordinarily’’ from these provisions in the
final rule. This allows for instances in
which there is a need to exceed the 30to 60-day NID timeframe and also
requires the GCA to formally advise the
CSA if special circumstances apply.
Two of the commenters raised
concerns about the definition of a NID
contained in § 2004.5(d) and
§ 2004.22(c). The proposed amendment
stated that, in making a NID, the agency
will assess whether access to the
proscribed information ‘‘is consistent
with the national security interests of
the United States.’’ Both commenters
referred to NISPOM section 2–303c(2),
in which NID is defined as a
determination that access to the
proscribed information ‘‘shall not harm
the national security interests of the
United States,’’ rather than ‘‘is consistent
with.’’ The commenters emphasized that
prior to 2006 adoption of the ‘‘do no
harm’’ standard in the NISPOM
provision, the NID process was tedious,
time-consuming, often misinterpreted to
require sole-source determinations, and
discouraged many contractors from
pursuing NIDs. In addition, because this
amended rule does not replace or
amend NISPOM
2–303c, the commenters were
concerned that having a different
standard in this rule would create
confusion, uneven application of
standards, and a return to the pre-2006
period of excessively difficult NID
processing.
We respectfully disagree with this
comment. The proposed language meets
the standards of Executive Order 13526,
‘‘Classified National Security
Information’’ (the Order). Specifically,
section 1.1(a)(4) of the Order, which
states ‘‘* * * that the unauthorized
disclosure of the information reasonably
could be expected to result in damage
to the national security * * *.’’ The ‘‘do
no harm’’ national security language
exceeds the standards set in the Order
for originally classifying information,
and would create a requirement that is
extremely difficult or even impossible to
substantiate. Additionally, the current
NISPOM guidance concerning NIDs is
under revision and ultimately, the
requirements for processing NID
requests will be consistent with each
other in both documents.
One of the commenters included two
additional recommendations. First, that
§ 2004.22(c)(1)(ii) be changed from
E:\FR\FM\06APR1.SGM
06APR1
sroberts on DSKD5P82C1PROD with RULES
17306
Federal Register / Vol. 75, No. 65 / Tuesday, April 6, 2010 / Rules and Regulations
‘‘* * * the Cognizant Security Office
(CSO) shall notify the GCA of the need
for a NID’’ to ‘‘* * * the Cognizant
Security Agency, or when delegated, the
Cognizant Security Office (CSO) shall
* * *.’’ The comment stated that not all
CSAs may have established a CSO, and
some may want to retain this
responsibility centrally. This
recommended change would allow for
both options and would also keep the
language of this provision consistent
with the rest of the implementing
directive, which is written for the CSA
level. We concur with both the
recommendation and its rationale, and
have amended the rule accordingly.
Second, the commenter recommended
that § 2004.22(c)(4)(iii) be changed to
read ‘‘In such instances the GCA will
provide the CSA or its designee with
updates at 30-day intervals. This CSA,
or its designee, will, in turn. * * *’’
(commenter recommended language in
italics). The commenter’s rationale for
the proposed change was that it allows
the CSA to determine whether it, or a
designated CSO, will notify the
contractor, for similar reasons to the
recommendation in the paragraph
above. We concur with both the
recommendation and the rationale, and
have amended the rule accordingly.
One of the commenters also
commented on § 2004.22(c)(4)(iii). The
commenter raised concerns that
allowing NID determinations to exceed
the 30- or 60-day deadlines with only
status updates to be provided at 30-day
intervals would allow the government
the option of not adhering to the
amendment’s deadlines. The commenter
also raised concerns that this option
might become the rule, rather than the
exception, because there is no ‘‘actionforcing mechanism,’’ no required
justification for delay, and no sanction.
The commenter feared that such delays
could drag on for months without
stronger language, and recommended
that the rule be amended to make clear
that extensions of the deadlines will be
allowed only in extraordinary cases. In
addition, the commenter proposed that,
given the damage that delay could cause
to the procurement process, delays
beyond 60 days should require approval
at the Assistant Secretary level.
We respectfully disagree in part with
the commenter’s recommendations. We
believe that acceptance of proposed
language above to address concerns
about use of the term ‘‘ordinarily’’
addresses a portion of the comment’s
concern. However, we have also added
the following language to the end of
§ 2004.22(c)(1)(iii) to clarify when an
extension of the timeframe is necessary
with formal advisement to the CSA:
VerDate Nov<24>2008
16:13 Apr 05, 2010
Jkt 220001
‘‘* * * unless the GCA requires
additional time for the NID process due
to special circumstances. The GCA shall
formally advise the CSA, if special
circumstances apply.’’ And we have
added the following language to the
middle of § 2004.22(c)(4)(iii) for the
same purpose: ‘‘* * * GCA, in addition
to formally notifying the CSA of the
special circumstances, per
§ 2004.22(c)(1)(iii). * * *’’ We believe
that this language is sufficient to
address the deadline issue raised in the
comment. We also believe that
extensions for NIDs should remain
under the GCA. The GCA is the legal
authority that directs the contract
activity with the contractor on behalf of
the CSA. The GCA advises the CSA
regarding the extension of the deadline,
but this advisement could be elevated to
a higher level at the agency’s discretion.
We have therefore not made the
recommended changes to the amended
rule.
Regulatory Impact
This rule is not a significant
regulatory action for the purposes of
E.O. 12866. The rule is also not a major
rule as defined in 5 U.S.C. Chapter 8,
Congressional Review of Agency
Rulemaking. As required by the
Regulatory Flexibility Act, we certify
that the final rule will not have a
significant impact on a substantial
number of small entities because it
applies only to Federal agencies.
List of Subjects in 32 CFR Part 2004
Classified information.
For the reasons stated in the preamble,
NARA amends Title 32 of the Code of
Federal Regulations, part 2004, as
follows:
■
PART 2004—NATIONAL INDUSTRIAL
SECURITY PROGRAM
DIRECTIVE NO. 1
1. The authority citation for part 2004
is revised to read as follows:
■
Authority: Executive Order 12829, January
6, 1993, 58 FR 3479, as amended by
Executive Order 12885, December 14, 1993,
58 FR 65863.
§ 2004.24
[Redesignated as § 2004.5]
2. Redesignate § 2004.24 as § 2004.5.
■ 3. In the newly redesignated § 2004.5,
redesignate paragraph (b) as paragraph
(c), and add new paragraphs (b), (d), and
(e), to read as follows:
■
§ 2004.5
Definitions.
*
*
*
*
*
(b) ‘‘Cognizant Security Office (CSO)’’
means the organizational entity
delegated by the Head of a CSA to
PO 00000
Frm 00026
Fmt 4700
Sfmt 4700
administer industrial security on behalf
of the CSA.
*
*
*
*
*
(d) ‘‘National Interest Determination
(NID)’’ means a determination that
access to proscribed information is
consistent with the national security
interests of the United States.
(e) ‘‘Proscribed information’’ means
Top Secret; Communications Security,
except classified keys used for data
transfer; Restricted Data; Special Access
Program; or Sensitive Compartmented
Information.
■ 4. Amend § 2004.22 by adding new
paragraph (c) to read as follows:
§ 2004.22
[202(a)].
Operational Responsibilities
*
*
*
*
*
(c) National Interest Determinations
(NIDs). Executive branch departments
and agencies shall make a National
Interest Determination (NID) before
authorizing contractors, cleared or in
process for clearance under a Special
Security Agreement (SSA), to have
access to proscribed information. To
make a NID, the agency shall assess
whether release of the proscribed
information is consistent with the
national security interests of the United
States.
(1) The requirement for a NID applies
to new contracts, including pre-contract
activities in which access to proscribed
information is required, and to existing
contracts when contractors are acquired
by foreign interests and an SSA is the
proposed foreign ownership, control, or
influence mitigation method.
(i) If access to proscribed information
is required to complete pre-contract
award actions or to perform on a new
contract, the Government Contracting
Activity (GCA) shall determine if release
of the information is consistent with
national security interests.
(ii) For contractors that have existing
contracts that require access to
proscribed information, have been or are
in the process of being acquired by
foreign interests, and have proposed an
SSA to mitigate foreign ownership, the
Cognizant Security Agency (CSA), or
when delegated, the Cognizant Security
Office (CSO) shall notify the GCA of the
need for a NID.
(iii) The GCA(s) shall determine,
within 30 days, per § 2004.22(c)(4)(i), or
60 days, per § 2004.22(c)(4)(ii), whether
release of the proscribed information is
consistent with national security
interests unless the GCA requires
additional time for the NID process due
to special circumstances. The GCA shall
formally advise the CSA, if special
circumstances apply.
E:\FR\FM\06APR1.SGM
06APR1
Federal Register / Vol. 75, No. 65 / Tuesday, April 6, 2010 / Rules and Regulations
(2) In accordance with 10 U.S.C. 2536,
DoD and the Department of Energy
(DOE) cannot award a contract
involving access to proscribed
information to a contractor effectively
owned or controlled by a foreign
government unless a waiver has been
issued by the Secretary of Defense or
Secretary of Energy.
(3) NIDs may be program-, project-, or
contract-specific. For program and
project NIDs, a separate NID is not
required for each contract. The CSO
may require the GCA to identify all
contracts covered by the NID. NID
decisions shall be made by officials as
specified by CSA policy or as
designated by the agency head.
(4) NID decisions shall be made
within 30 days.
(i) Where no interagency coordination
is required because the department or
agency owns or controls all of the
proscribed information in question, the
GCA shall provide a final documented
decision to the applicable CSO, with a
copy to the contractor, within 30 days
of the date of the request for the NID.
(ii) If the proscribed information is
owned by, or under the control of, a
department or agency other than the
GCA (e.g., National Security Agency
(NSA) for Communications Security, the
Office of the Director of National
Intelligence (ODNI) for Sensitive
Compartmented Information, and DOE
for Restricted Data), the GCA shall
provide written notice to that
department or agency that its written
concurrence is required. Such notice
shall be provided within 30 days of
being informed by the CSO of the
requirement for a NID. The GCA shall
provide a final documented decision to
the applicable CSO, with a copy to the
contractor, within 60 days of the date of
the request for the NID.
(iii) If the NID decision is not
provided within 30 days, per
§ 2004.22(c)(4)(i), or 60 days, per
§ 2004.22(c)(4)(ii), the CSA shall
Local agency
2–8–302
4–2–020
4–2–030
4–4
sroberts on DSKD5P82C1PROD with RULES
4–5
4–7
4–9
16:13 Apr 05, 2010
Dated: March 30, 2010.
William J. Bosanko,
Director, Information Security Oversight
Office.
Approved: March 30, 2010.
David S. Ferriero,
Archivist of the United States.
[FR Doc. 2010–7776 Filed 4–5–10; 8:45 am]
BILLING CODE 7515–01–P
ENVIRONMENTAL PROTECTION
AGENCY
40 CFR Part 52
[EPA–R09–OAR–2009–0521; FRL–9096–8]
Revisions to the Arizona State
Implementation Plan; Pinal County
Environmental Protection
Agency (EPA).
AGENCY:
Rule No.
Pinal County .................................
VerDate Nov<24>2008
intercede to request the GCA to provide
a decision. In such instances, the GCA,
in addition to formally notifying the
CSA of the special circumstances, per
§ 2004.22(c)(1)(iii), will provide the CSA
or its designee with updates at 30-day
intervals. The CSA, or its designee, will,
in turn, provide the contractor with
updates at 30-day intervals until the
NID decision is made.
(5) The CSO shall not delay
implementation of an SSA pending
completion of a GCA’s NID processing,
provided there is no indication that a
NID will be denied either by the GCA
or the owner of the information (i.e.,
NSA, DOE, or ODNI). However, the
contractor shall not have access to
additional proscribed information under
a new contract until the GCA
determines that the release of the
information is consistent with national
security interests and issues a NID.
(6) The CSO shall not upgrade an
existing contractor clearance under an
SSA to Top Secret unless an approved
NID covering the prospective Top Secret
access has been issued.
Jkt 220001
ACTION:
Final rule.
SUMMARY: EPA is finalizing approval of
revisions to the Pinal County portion of
the Arizona State Implementation Plan
(SIP). These revisions were proposed in
the Federal Register on August 17, 2009
and concern particulate matter (PM)
emissions from construction,
earthmoving, and related activities, and
commercial and residential unpaved
parking lots. We are approving these
local rules that regulate these emission
sources under the Clean Air Act as
amended in 1990 (CAA or the Act).
DATES: Effective Date: This rule is
effective on May 6, 2010.
ADDRESSES: EPA has established docket
number EPA–R09–OAR–2009–0521 for
this action. The index to the docket is
available electronically at https://
www.regulations.gov and in hard copy
at EPA Region IX, 75 Hawthorne Street,
San Francisco, California. While all
documents in the docket are listed in
the index, some information may be
publicly available only at the hard copy
location (e.g., copyrighted material), and
some may not be publicly available in
either location (e.g., CBI). To inspect the
hard copy materials, please schedule an
appointment during normal business
hours with the contact listed in the FOR
FURTHER INFORMATION CONTACT section.
FOR FURTHER INFORMATION CONTACT: Jerry
Wamsley, EPA Region IX, (415) 947–
4111, wamsley.jerry@epa.gov.
SUPPLEMENTARY INFORMATION:
Throughout this document, ‘‘we,’’ ‘‘us’’
and ‘‘our’’ refer to EPA.
Table of Contents
I. Proposed Action
II. Public Comments and EPA Responses
III. EPA Action
IV. Statutory and Executive Order Reviews
I. Proposed Action
On August 17, 2009 (74 FR 41357),
EPA proposed to approve into the
Arizona SIP the rules listed below.
Rule title
Adopted
Performance Standards—Hayden PM10 Non-attainment Area .......
Fugitive Dust—General .....................................................................
Fugitive Dust—Definitions .................................................................
PM–10 Non-attainment Area Rules; Dustproofing and Stabilization
for Commercial Unpaved Parking, Drive and Working Yards.
PM–10 Non-attainment Area Rules; Stabilization for Residential
Parking and Drives.
Construction Sites in Non-Attainment Areas—Fugitive Dust ...........
Test Methods ....................................................................................
PO 00000
Frm 00027
Fmt 4700
Sfmt 4700
17307
E:\FR\FM\06APR1.SGM
06APR1
Submitted
01/07/09
12/04/02
12/04/02
06/03/09
06/12/09
06/12/09
06/12/09
06/12/09
06/03/09
06/12/09
06/03/09
06/03/09
06/12/09
06/12/09
Agencies
[Federal Register Volume 75, Number 65 (Tuesday, April 6, 2010)]
[Rules and Regulations]
[Pages 17305-17307]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: 2010-7776]
[[Page 17305]]
=======================================================================
-----------------------------------------------------------------------
NATIONAL ARCHIVES AND RECORDS ADMINISTRATION
Information Security Oversight Office
32 CFR Part 2004
[FDMS Docket ISOO-09-0001]
RIN 3095-AB63
National Industrial Security Program Directive No. 1
AGENCY: Information Security Oversight Office, NARA.
ACTION: Final rule.
-----------------------------------------------------------------------
SUMMARY: The Information Security Oversight Office (ISOO), National
Archives and Records Administration (NARA), has amended National
Industrial Security Program Directive No. 1. This amendment to
Directive No. 1 provides guidance to agencies on release of certain
classified information (referred to as ``proscribed information'') to
contractors that are owned or under the control of a foreign interest
and have had the foreign ownership or control mitigated by an
arrangement known as an Special Security Agreement (SSA). To date,
there has been no Federal standard across agencies on release of
proscribed information to this group. This amendment provides
standardization and consistency to the process across the Federal
Government, and enables greater efficiency in determining the release
of the information as appropriate. This amendment also moves the
definitions section to the beginning of the part for easier use, and
adds definitions for the terms ``Cognizant Security Office (CSO),''
``National Interest Determination (NID),'' and ``Proscribed
Information,'' to accompany the new guidelines. Finally, this amendment
makes a minor typographical change to the authority citation to make it
more accurate.
DATES: This rule is effective May 6, 2010.
FOR FURTHER INFORMATION CONTACT: William J. Bosanko, Director, ISOO, at
202-357-5250.
SUPPLEMENTARY INFORMATION: As of November 17, 1995, ISOO became a part
of NARA and subsequently published Part 2004, National Industrial
Program Directive No. 1, pursuant to section 102(b)(1) of E.O. 12829,
January 6, 1993 (58 FR 3479), as amended by E.O. 12885, December 14,
1993, (58 FR 65863). The Executive Order established a National
Industrial Security Program (NISP) to safeguard Federal Government
classified information released to contractors, licensees, and grantees
(collectively referred to here as ``contractors'') of the United States
Government. This amendment to Directive No. 1 adds guidelines on
release of proscribed information to this category of contractors.
ISOO maintains oversight over E.O. 12958, as amended, and policy
oversight over E.O. 12829, as amended, and issuing this amendment
fulfills one of the ISOO Director's delegated responsibilities under
these Executive Orders. Nothing in Directive No. 1 or this amendment
shall be construed to supersede the authority of the Secretary of
Energy or the Nuclear Regulatory Commission under the Atomic Energy Act
of 1954, as amended (42 U.S.C. 2011, et seq.), or the authority of the
Director of National Intelligence under the National Security Act of
1947, as amended, E.O. 12333, December 8, 1981, and the Intelligence
Reform and Terrorism Prevention Act of 2004.
The interpretive guidance contained in this amendment will only
assist agencies to implement E.O. 12829, as amended; users of Directive
No. 1 shall refer concurrently to the Executive Order for guidance.
On November 30, 2009, ISOO published a proposed rule in the Federal
Register (74 FR 62531) for a 60-day public comment period. A correction
to the proposed rule was published on January 12, 2010, changing the
Federal Docket Management System (FDMS) Docket Number from NARA-09-0005
to ISOO-09-0001 and the RIN from 3095-AB34 to 3095-AB63. These
corrections are reflected in this final rule. The proposed rule made
the changes as outlined in the Summary above. The public comment period
closed on January 29, 2010. In response, ISOO received comments from
three entities; a Federal agency, a law firm, and a technological
systems design company. All the commenters in general supported the
proposed amendments to the rule, but all three also submitted suggested
language changes to address perceived clarity problems, subordinate
office designees, and concerns regarding deadlines.
All three commenters raised concerns about the use of the word
``ordinarily'' in proposed Sec. 2004.22, Operational Responsibilities,
subparagraphs (c)(1)(iii), (c)(4), (c)(4)(i), and (c)(4)(ii). The
proposed provisions set forth 30-day and 60-day deadlines in which
Government Contracting Activity (GCA) determinations or NID decisions
would ``ordinarily'' be made. All three commenters stated that the word
``ordinarily'' was too vague, undercut the deadlines, reduced
accountability, and created the risk that the deadlines would be
treated as advisory only.
We agree with the commenters and the proposal to remove the term
``ordinarily'' from these provisions. ISOO has modified the proposed
subparagraphs to remove the term ``ordinarily'' from these provisions
in the final rule. This allows for instances in which there is a need
to exceed the 30- to 60-day NID timeframe and also requires the GCA to
formally advise the CSA if special circumstances apply.
Two of the commenters raised concerns about the definition of a NID
contained in Sec. 2004.5(d) and Sec. 2004.22(c). The proposed
amendment stated that, in making a NID, the agency will assess whether
access to the proscribed information ``is consistent with the national
security interests of the United States.'' Both commenters referred to
NISPOM section 2-303c(2), in which NID is defined as a determination
that access to the proscribed information ``shall not harm the national
security interests of the United States,'' rather than ``is consistent
with.'' The commenters emphasized that prior to 2006 adoption of the
``do no harm'' standard in the NISPOM provision, the NID process was
tedious, time-consuming, often misinterpreted to require sole-source
determinations, and discouraged many contractors from pursuing NIDs. In
addition, because this amended rule does not replace or amend NISPOM 2-
303c, the commenters were concerned that having a different standard in
this rule would create confusion, uneven application of standards, and
a return to the pre-2006 period of excessively difficult NID
processing.
We respectfully disagree with this comment. The proposed language
meets the standards of Executive Order 13526, ``Classified National
Security Information'' (the Order). Specifically, section 1.1(a)(4) of
the Order, which states ``* * * that the unauthorized disclosure of the
information reasonably could be expected to result in damage to the
national security * * *.'' The ``do no harm'' national security
language exceeds the standards set in the Order for originally
classifying information, and would create a requirement that is
extremely difficult or even impossible to substantiate. Additionally,
the current NISPOM guidance concerning NIDs is under revision and
ultimately, the requirements for processing NID requests will be
consistent with each other in both documents.
One of the commenters included two additional recommendations.
First, that Sec. 2004.22(c)(1)(ii) be changed from
[[Page 17306]]
``* * * the Cognizant Security Office (CSO) shall notify the GCA of the
need for a NID'' to ``* * * the Cognizant Security Agency, or when
delegated, the Cognizant Security Office (CSO) shall * * *.'' The
comment stated that not all CSAs may have established a CSO, and some
may want to retain this responsibility centrally. This recommended
change would allow for both options and would also keep the language of
this provision consistent with the rest of the implementing directive,
which is written for the CSA level. We concur with both the
recommendation and its rationale, and have amended the rule
accordingly.
Second, the commenter recommended that Sec. 2004.22(c)(4)(iii) be
changed to read ``In such instances the GCA will provide the CSA or its
designee with updates at 30-day intervals. This CSA, or its designee,
will, in turn. * * *'' (commenter recommended language in italics). The
commenter's rationale for the proposed change was that it allows the
CSA to determine whether it, or a designated CSO, will notify the
contractor, for similar reasons to the recommendation in the paragraph
above. We concur with both the recommendation and the rationale, and
have amended the rule accordingly.
One of the commenters also commented on Sec. 2004.22(c)(4)(iii).
The commenter raised concerns that allowing NID determinations to
exceed the 30- or 60-day deadlines with only status updates to be
provided at 30-day intervals would allow the government the option of
not adhering to the amendment's deadlines. The commenter also raised
concerns that this option might become the rule, rather than the
exception, because there is no ``action-forcing mechanism,'' no
required justification for delay, and no sanction. The commenter feared
that such delays could drag on for months without stronger language,
and recommended that the rule be amended to make clear that extensions
of the deadlines will be allowed only in extraordinary cases. In
addition, the commenter proposed that, given the damage that delay
could cause to the procurement process, delays beyond 60 days should
require approval at the Assistant Secretary level.
We respectfully disagree in part with the commenter's
recommendations. We believe that acceptance of proposed language above
to address concerns about use of the term ``ordinarily'' addresses a
portion of the comment's concern. However, we have also added the
following language to the end of Sec. 2004.22(c)(1)(iii) to clarify
when an extension of the timeframe is necessary with formal advisement
to the CSA: ``* * * unless the GCA requires additional time for the NID
process due to special circumstances. The GCA shall formally advise the
CSA, if special circumstances apply.'' And we have added the following
language to the middle of Sec. 2004.22(c)(4)(iii) for the same
purpose: ``* * * GCA, in addition to formally notifying the CSA of the
special circumstances, per Sec. 2004.22(c)(1)(iii). * * *'' We believe
that this language is sufficient to address the deadline issue raised
in the comment. We also believe that extensions for NIDs should remain
under the GCA. The GCA is the legal authority that directs the contract
activity with the contractor on behalf of the CSA. The GCA advises the
CSA regarding the extension of the deadline, but this advisement could
be elevated to a higher level at the agency's discretion. We have
therefore not made the recommended changes to the amended rule.
Regulatory Impact
This rule is not a significant regulatory action for the purposes
of E.O. 12866. The rule is also not a major rule as defined in 5 U.S.C.
Chapter 8, Congressional Review of Agency Rulemaking. As required by
the Regulatory Flexibility Act, we certify that the final rule will not
have a significant impact on a substantial number of small entities
because it applies only to Federal agencies.
List of Subjects in 32 CFR Part 2004
Classified information.
0
For the reasons stated in the preamble, NARA amends Title 32 of the
Code of Federal Regulations, part 2004, as follows:
PART 2004--NATIONAL INDUSTRIAL SECURITY PROGRAM DIRECTIVE NO. 1
0
1. The authority citation for part 2004 is revised to read as follows:
Authority: Executive Order 12829, January 6, 1993, 58 FR 3479,
as amended by Executive Order 12885, December 14, 1993, 58 FR 65863.
Sec. 2004.24 [Redesignated as Sec. 2004.5]
0
2. Redesignate Sec. 2004.24 as Sec. 2004.5.
0
3. In the newly redesignated Sec. 2004.5, redesignate paragraph (b) as
paragraph (c), and add new paragraphs (b), (d), and (e), to read as
follows:
Sec. 2004.5 Definitions.
* * * * *
(b) ``Cognizant Security Office (CSO)'' means the organizational
entity delegated by the Head of a CSA to administer industrial security
on behalf of the CSA.
* * * * *
(d) ``National Interest Determination (NID)'' means a determination
that access to proscribed information is consistent with the national
security interests of the United States.
(e) ``Proscribed information'' means Top Secret; Communications
Security, except classified keys used for data transfer; Restricted
Data; Special Access Program; or Sensitive Compartmented Information.
0
4. Amend Sec. 2004.22 by adding new paragraph (c) to read as follows:
Sec. 2004.22 Operational Responsibilities [202(a)].
* * * * *
(c) National Interest Determinations (NIDs). Executive branch
departments and agencies shall make a National Interest Determination
(NID) before authorizing contractors, cleared or in process for
clearance under a Special Security Agreement (SSA), to have access to
proscribed information. To make a NID, the agency shall assess whether
release of the proscribed information is consistent with the national
security interests of the United States.
(1) The requirement for a NID applies to new contracts, including
pre-contract activities in which access to proscribed information is
required, and to existing contracts when contractors are acquired by
foreign interests and an SSA is the proposed foreign ownership,
control, or influence mitigation method.
(i) If access to proscribed information is required to complete
pre-contract award actions or to perform on a new contract, the
Government Contracting Activity (GCA) shall determine if release of the
information is consistent with national security interests.
(ii) For contractors that have existing contracts that require
access to proscribed information, have been or are in the process of
being acquired by foreign interests, and have proposed an SSA to
mitigate foreign ownership, the Cognizant Security Agency (CSA), or
when delegated, the Cognizant Security Office (CSO) shall notify the
GCA of the need for a NID.
(iii) The GCA(s) shall determine, within 30 days, per Sec.
2004.22(c)(4)(i), or 60 days, per Sec. 2004.22(c)(4)(ii), whether
release of the proscribed information is consistent with national
security interests unless the GCA requires additional time for the NID
process due to special circumstances. The GCA shall formally advise the
CSA, if special circumstances apply.
[[Page 17307]]
(2) In accordance with 10 U.S.C. 2536, DoD and the Department of
Energy (DOE) cannot award a contract involving access to proscribed
information to a contractor effectively owned or controlled by a
foreign government unless a waiver has been issued by the Secretary of
Defense or Secretary of Energy.
(3) NIDs may be program-, project-, or contract-specific. For
program and project NIDs, a separate NID is not required for each
contract. The CSO may require the GCA to identify all contracts covered
by the NID. NID decisions shall be made by officials as specified by
CSA policy or as designated by the agency head.
(4) NID decisions shall be made within 30 days.
(i) Where no interagency coordination is required because the
department or agency owns or controls all of the proscribed information
in question, the GCA shall provide a final documented decision to the
applicable CSO, with a copy to the contractor, within 30 days of the
date of the request for the NID.
(ii) If the proscribed information is owned by, or under the
control of, a department or agency other than the GCA (e.g., National
Security Agency (NSA) for Communications Security, the Office of the
Director of National Intelligence (ODNI) for Sensitive Compartmented
Information, and DOE for Restricted Data), the GCA shall provide
written notice to that department or agency that its written
concurrence is required. Such notice shall be provided within 30 days
of being informed by the CSO of the requirement for a NID. The GCA
shall provide a final documented decision to the applicable CSO, with a
copy to the contractor, within 60 days of the date of the request for
the NID.
(iii) If the NID decision is not provided within 30 days, per Sec.
2004.22(c)(4)(i), or 60 days, per Sec. 2004.22(c)(4)(ii), the CSA
shall intercede to request the GCA to provide a decision. In such
instances, the GCA, in addition to formally notifying the CSA of the
special circumstances, per Sec. 2004.22(c)(1)(iii), will provide the
CSA or its designee with updates at 30-day intervals. The CSA, or its
designee, will, in turn, provide the contractor with updates at 30-day
intervals until the NID decision is made.
(5) The CSO shall not delay implementation of an SSA pending
completion of a GCA's NID processing, provided there is no indication
that a NID will be denied either by the GCA or the owner of the
information (i.e., NSA, DOE, or ODNI). However, the contractor shall
not have access to additional proscribed information under a new
contract until the GCA determines that the release of the information
is consistent with national security interests and issues a NID.
(6) The CSO shall not upgrade an existing contractor clearance
under an SSA to Top Secret unless an approved NID covering the
prospective Top Secret access has been issued.
Dated: March 30, 2010.
William J. Bosanko,
Director, Information Security Oversight Office.
Approved: March 30, 2010.
David S. Ferriero,
Archivist of the United States.
[FR Doc. 2010-7776 Filed 4-5-10; 8:45 am]
BILLING CODE 7515-01-P