Nuclear Regulatory Commission Insider Threat Program Policy Statement, 9519-9520 [2016-04026]

Download as PDF Federal Register / Vol. 81, No. 37 / Thursday, February 25, 2016 / Notices For the Nuclear Regulatory Commission. Alex Garmoe, Acting Chief, Generic Communications Branch, Division of Policy and Rulemaking, Office of Nuclear Reactor Regulation. [FR Doc. 2016–04023 Filed 2–24–16; 8:45 am] BILLING CODE 7590–01–P NUCLEAR REGULATORY COMMISSION [NRC–2016–0033] Nuclear Regulatory Commission Insider Threat Program Policy Statement Nuclear Regulatory Commission. ACTION: Policy statement; issuance. AGENCY: The U.S. Nuclear Regulatory Commission (NRC) is issuing its Insider Threat Program Policy Statement that establishes the NRC Insider Threat Program in accordance with Executive Order (E.O.) 13587, ‘‘Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information.’’ The purpose of the policy statement is to ensure the responsible sharing and safeguards of classified information, including restricted data and safeguards information, by deterring employees, contractors, and detailees holding national security clearances from becoming insider threats, detecting insiders who pose a risk to protected information, and mitigating risks. DATES: The NRC’s Insider Threat Program Policy Statement is effective February 25, 2016. ADDRESSES: Please refer to Docket ID NRC–2016–0033 when contacting the NRC about the availability of information for this policy statement. You may access publicly-available information related to this policy statement by any of the following methods: • Federal Rulemaking Web Site: Go to https://www.regulations.gov and search for Docket ID NRC–2016–0033. Address questions about NRC dockets to Carol Gallagher; telephone: 301–287–3422; email: Carol.Gallagher@nrc.gov. For technical questions, contact the individual listed in the FOR FURTHER INFORMATION CONTACT section of this document. • NRC’s Agencywide Documents Access and Management System (ADAMS): You may obtain publiclyavailable documents online in the ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/ adams.html. To begin the search, select mstockstill on DSK4VPTVN1PROD with NOTICES SUMMARY: VerDate Sep<11>2014 18:07 Feb 24, 2016 Jkt 238001 9519 ‘‘ADAMS Public Documents’’ and then select ‘‘Begin Web-based ADAMS Search.’’ For problems with ADAMS, please contact the NRC’s Public Document Room (PDR) reference staff at 1–800–397–4209, 301–415–4737, or by email to pdr.resource@nrc.gov. The ADAMS accession number for each document referenced in this document (if that document is available in ADAMS) is provided the first time that a document is referenced. • NRC’s PDR: You may examine and purchase copies of public documents at the NRC’s PDR, Room O1–F21, One White Flint North, 11555 Rockville Pike, Rockville, Maryland 20852. FOR FURTHER INFORMATION CONTACT: Denis Brady, Office of Administration, U.S. Nuclear Regulatory Commission, Washington, DC 20555–0001; telephone: 301–415–5768; email: Denis.Brady@ nrc.gov. becoming insider threats, detecting insiders who pose a risk to protected information, and mitigating risks. The policy statement addresses the background, purpose, applicability, policy components, and references. This policy statement is not applicable to members of the public. The NRC’s Insider Threat Program Policy Statement is published in its entirety in the attachment to this document, and is also available in ADAMS under Accession No. ML16039A282. SUPPLEMENTARY INFORMATION: Congressional Review Act This policy statement is not a rule as defined in the Congressional Review Act (5 U.S.C. 801–808). I. Background Executive Order 13587, ‘‘Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information,’’ directs all executive branch departments and agencies that have access to classified information to implement reforms to ensure responsible sharing and safeguarding of classified information on computer networks, consistent with appropriate protections for privacy and civil liberties (76 FR 63811; October 13, 2011). The E.O. also established the National Insider Threat Task Force, which issued the ‘‘National Insider Threat Policy’’ and the ‘‘Minimum Standards for Executive Branch Insider Threat Programs’’ on November 21, 2012 (see https://www.whitehouse.gov/ the-press-office/2012/11/21/ presidential-memorandum-nationalinsider-threat-policy-and-minimumstand, last visited February 8, 2016). In order to execute its primary mission essential functions, the NRC has access to and possesses classified information, including classified information on computer networks, which it protects through appropriate security procedures. This policy statement establishes the NRC’s Insider Threat Program in accordance with E.O. 13587. II. Discussion The purpose of this policy statement is to ensure the responsible sharing and safeguards of classified information, including restricted data and safeguards information, by deterring employees, contractors, and detailees holding national security clearances from PO 00000 Frm 00101 Fmt 4703 Sfmt 4703 III. Procedural Requirements Paperwork Reduction Act Statement This policy statement does not contain information collection requirements and, therefore, is not subject to the requirements of the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.). Dated at Rockville, Maryland, this 18th day of February, 2016. For the Nuclear Regulatory Commission. Annette L. Vietti-Cook, Secretary of the Commission. Attachment—Nuclear Regulatory Commission Insider Threat Program Policy Statement 1. Background. Executive Order (E.O.) 13587, ‘‘Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information,’’ directs all executive branch departments and agencies that have access to classified information to implement reforms to ensure responsible sharing and safeguarding of classified information on computer networks that are consistent with appropriate protections for privacy and civil liberties (October 7, 2011). The Executive Order also established the National Insider Threat Task Force, which issued the ‘‘National Insider Threat Policy’’ and the ‘‘Minimum Standards for Executive Branch Insider Threat Programs’’ on November 21, 2012. In order to execute its primary mission essential functions, the Nuclear Regulatory Commission (NRC) has access to and possesses classified information, including classified information on computer networks, which it protects through appropriate security procedures. 2. Purpose. This document establishes the NRC Insider Threat Program (ITP) Policy in accordance with E.O. 13587 and the Atomic Energy Act of 1954, as amended (AEA). The primary purpose of the ITP is to protect information classified under E.O. 13526 or section 142 of the AEA (restricted data), or that is safeguards information under section 147 of the AEA, as well as any such information on classified networks, by E:\FR\FM\25FEN1.SGM 25FEN1 mstockstill on DSK4VPTVN1PROD with NOTICES 9520 Federal Register / Vol. 81, No. 37 / Thursday, February 25, 2016 / Notices deterring employees holding national security clearances from becoming insider threats, detecting insiders who pose a risk to the protected information, and mitigating risks. The establishment of an NRC ITP is intended to achieve these goals with respect to all NRC employees, contractors, and detailees with national security clearances and access to information classified under E.O. 13526 or section 142 of the AEA or that is safeguards information under section 147 of the AEA. 3. Applicability. This policy is applicable to all NRC employees, contractors, and detailees to the NRC from other government agencies who have national security clearances and access to information classified under E.O. 13526 or section 142 of the AEA or that is safeguards information under section 147 of the AEA. 4. Policy. It is NRC policy that: (a) All NRC employees, contractors, and detailees must comply with the requirements of all current and applicable Federal laws, regulations, and policies concerning the responsible sharing and safeguarding of classified information. This includes reporting insider threat information related to potential espionage, violent acts against the Government or the Nation, and unauthorized access to or disclosure of information classified under E.O. 13526 or section 142 of the AEA or that is safeguards information under section 147 of the AEA, and any such information that is available on interconnected U.S. Government computer networks and systems. (b) Consistent with established law and policy, including the Privacy Act, the ITP uses information made available to it to identify, analyze, and respond to potential insider threats at the NRC. The ITP itself does not maintain or store any personal information. The information is maintained by the program office in which the information resides. (c) All NRC employees, contractors, and detailees involved in any ITP actions (including, but not limited to, gathering information or conducting inquiries) do so in accordance with all applicable Federal laws, regulations, and policies, including those pertaining to whistleblower protections, civil liberties, civil rights, criminal rights, personnel records, medical records, and privacy rights. The ITP consults with and obtains the concurrence of the NRC’s Office of the General Counsel (OGC) on questions concerning these legal protections in insider threat activities, inquiries, assistance in investigations by law enforcement authorities, and other matters. (d) The ITP refers to the U.S. Federal Bureau of Investigation (FBI) information indicating that classified information is being, or may have been, disclosed in an unauthorized manner to a foreign power or an agent of a foreign power, in accordance with 50 U.S.C. 3381(e). Subject to an appropriate inquiry by the ITP, other information indicating unauthorized access to or misuse of classified information, classified networks, or safeguards information is referred to the NRC’s Office of Inspector General (OIG). OGC will provide ongoing legal advice to the ITP as appropriate. VerDate Sep<11>2014 18:07 Feb 24, 2016 Jkt 238001 5. References. A. The Atomic Energy Act of 1954, as amended; 42 U.S.C. 2011 et. seq. B. 50 U.S.C. 3381(e). C. Inspector General Act of 1978, as amended; 5 U.S.C. Appx § 1 et seq. D. Executive Order 10450, ‘‘Security Requirements for Government Employment,’’ April 27, 1953 (18 FR 2489; April 29, 1953). E. Executive Order 12333, ‘‘United States Intelligence Activities,’’ dated December 4, 1981 (as amended by Executive Orders 13284 (2003), 13355 (2004), and 13470 (2008) (46 FR 59941; December 8, 1981). F. Executive Order 12829, ‘‘National Industrial Security Program,’’ dated January 6, 1993 (58 FR 3479; January 8, 1993). G. Executive Order 12968, ‘‘Access to Classified Information,’’ dated August 4, 1995 (60 FR 40245; August 7, 1995). H. Executive Order 13526, ‘‘Classified National Security Information,’’ dated December 29, 2009 (75 FR 707; January 5, 2010). I. Executive Order 13587, ‘‘Structural Reforms to Improve the Security of Classified Networks and the Responsible Sharing and Safeguarding of Classified Information,’’ dated October 7, 2011 (76 FR 63811; October 13, 2011). J. NRC Management Directive 7.4, ‘‘Reporting Suspected Wrongdoing and Processing of OIG Referrals.’’ K. NRC Management Directive, Volume 12, ‘‘Security.’’ POSTAL SERVICE Product Change—First-Class Package Service Negotiated Service Agreement Postal ServiceTM. Notice. AGENCY: ACTION: The Postal Service gives notice of filing a request with the Postal Regulatory Commission to add a domestic shipping services contract to the list of Negotiated Service Agreements in the Mail Classification Schedule’s Competitive Products List. DATES: Effective date: February 25, 2016. FOR FURTHER INFORMATION CONTACT: Elizabeth A. Reed, 202–268–3179. SUPPLEMENTARY INFORMATION: The United States Postal Service® hereby gives notice that, pursuant to 39 U.S.C. 3642 and 3632(b)(3), on February 18, 2016, it filed with the Postal Regulatory Commission a Request of the United States Postal Service to Add First-Class Package Service Contract 44 to Competitive Product List. Documents are available at www.prc.gov, Docket Nos. MC2016–82, CP2016–107. SUMMARY: Stanley F. Mires, Attorney, Federal Compliance. [FR Doc. 2016–04026 Filed 2–24–16; 8:45 am] [FR Doc. 2016–03976 Filed 2–24–16; 8:45 am] BILLING CODE 7590–01–P BILLING CODE 7710–12–P POSTAL SERVICE POSTAL SERVICE Product Change—Priority Mail Negotiated Service Agreement Product Change—Priority Mail Negotiated Service Agreement Postal ServiceTM. ACTION: Notice. AGENCY: SUMMARY: The Postal Service gives notice of filing a request with the Postal Regulatory Commission to add a domestic shipping services contract to the list of Negotiated Service Agreements in the Mail Classification Schedule’s Competitive Products List. DATES: Effective date: February 25, 2016. FOR FURTHER INFORMATION CONTACT: Elizabeth A. Reed, 202–268–3179. SUPPLEMENTARY INFORMATION: The United States Postal Service® hereby gives notice that, pursuant to 39 U.S.C. 3642 and 3632(b)(3), on February 18, 2016, it filed with the Postal Regulatory Commission a Request of the United States Postal Service to Add Priority Mail Contract 187 to Competitive Product List. Documents are available at www.prc.gov, Docket Nos. MC2016–79, CP2016–104. The Postal Service gives notice of filing a request with the Postal Regulatory Commission to add a domestic shipping services contract to the list of Negotiated Service Agreements in the Mail Classification Schedule’s Competitive Products List. DATES: Effective date: February 25, 2016. FOR FURTHER INFORMATION CONTACT: Elizabeth A. Reed, 202–268–3179. SUPPLEMENTARY INFORMATION: The United States Postal Service® hereby gives notice that, pursuant to 39 U.S.C. 3642 and 3632(b)(3), on February 18, 2016, it filed with the Postal Regulatory Commission a Request of the United States Postal Service to Add Priority Mail Contract 188 to Competitive Product List. Documents are available at www.prc.gov, Docket Nos. MC2016–80, CP2016–105. Stanley F. Mires, Attorney, Federal Compliance. Stanley F. Mires, Attorney, Federal Compliance. [FR Doc. 2016–03970 Filed 2–24–16; 8:45 am] [FR Doc. 2016–03967 Filed 2–24–16; 8:45 am] BILLING CODE 7710–12–P BILLING CODE 7710–12–P AGENCY: PO 00000 Frm 00102 Fmt 4703 Sfmt 9990 ACTION: Postal ServiceTM. Notice. SUMMARY: E:\FR\FM\25FEN1.SGM 25FEN1

Agencies

[Federal Register Volume 81, Number 37 (Thursday, February 25, 2016)]
[Notices]
[Pages 9519-9520]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-04026]


-----------------------------------------------------------------------

NUCLEAR REGULATORY COMMISSION

[NRC-2016-0033]


Nuclear Regulatory Commission Insider Threat Program Policy 
Statement

AGENCY: Nuclear Regulatory Commission.

ACTION: Policy statement; issuance.

-----------------------------------------------------------------------

SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is issuing its 
Insider Threat Program Policy Statement that establishes the NRC 
Insider Threat Program in accordance with Executive Order (E.O.) 13587, 
``Structural Reforms to Improve the Security of Classified Networks and 
the Responsible Sharing and Safeguarding of Classified Information.'' 
The purpose of the policy statement is to ensure the responsible 
sharing and safeguards of classified information, including restricted 
data and safeguards information, by deterring employees, contractors, 
and detailees holding national security clearances from becoming 
insider threats, detecting insiders who pose a risk to protected 
information, and mitigating risks.

DATES: The NRC's Insider Threat Program Policy Statement is effective 
February 25, 2016.

ADDRESSES: Please refer to Docket ID NRC-2016-0033 when contacting the 
NRC about the availability of information for this policy statement. 
You may access publicly-available information related to this policy 
statement by any of the following methods:
     Federal Rulemaking Web Site: Go to https://www.regulations.gov and search for Docket ID NRC-2016-0033. Address 
questions about NRC dockets to Carol Gallagher; telephone: 301-287-
3422; email: Carol.Gallagher@nrc.gov. For technical questions, contact 
the individual listed in the FOR FURTHER INFORMATION CONTACT section of 
this document.
     NRC's Agencywide Documents Access and Management System 
(ADAMS): You may obtain publicly-available documents online in the 
ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/adams.html. To begin the search, select ``ADAMS Public Documents'' and 
then select ``Begin Web-based ADAMS Search.'' For problems with ADAMS, 
please contact the NRC's Public Document Room (PDR) reference staff at 
1-800-397-4209, 301-415-4737, or by email to pdr.resource@nrc.gov. The 
ADAMS accession number for each document referenced in this document 
(if that document is available in ADAMS) is provided the first time 
that a document is referenced.
     NRC's PDR: You may examine and purchase copies of public 
documents at the NRC's PDR, Room O1-F21, One White Flint North, 11555 
Rockville Pike, Rockville, Maryland 20852.

FOR FURTHER INFORMATION CONTACT: Denis Brady, Office of Administration, 
U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001; 
telephone: 301-415-5768; email: Denis.Brady@nrc.gov.

SUPPLEMENTARY INFORMATION:

I. Background

    Executive Order 13587, ``Structural Reforms to Improve the Security 
of Classified Networks and the Responsible Sharing and Safeguarding of 
Classified Information,'' directs all executive branch departments and 
agencies that have access to classified information to implement 
reforms to ensure responsible sharing and safeguarding of classified 
information on computer networks, consistent with appropriate 
protections for privacy and civil liberties (76 FR 63811; October 13, 
2011). The E.O. also established the National Insider Threat Task 
Force, which issued the ``National Insider Threat Policy'' and the 
``Minimum Standards for Executive Branch Insider Threat Programs'' on 
November 21, 2012 (see https://www.whitehouse.gov/the-press-office/2012/11/21/presidential-memorandum-national-insider-threat-policy-and-minimum-stand, last visited February 8, 2016). In order to execute its 
primary mission essential functions, the NRC has access to and 
possesses classified information, including classified information on 
computer networks, which it protects through appropriate security 
procedures. This policy statement establishes the NRC's Insider Threat 
Program in accordance with E.O. 13587.

II. Discussion

    The purpose of this policy statement is to ensure the responsible 
sharing and safeguards of classified information, including restricted 
data and safeguards information, by deterring employees, contractors, 
and detailees holding national security clearances from becoming 
insider threats, detecting insiders who pose a risk to protected 
information, and mitigating risks. The policy statement addresses the 
background, purpose, applicability, policy components, and references. 
This policy statement is not applicable to members of the public.
    The NRC's Insider Threat Program Policy Statement is published in 
its entirety in the attachment to this document, and is also available 
in ADAMS under Accession No. ML16039A282.

III. Procedural Requirements

Paperwork Reduction Act Statement

    This policy statement does not contain information collection 
requirements and, therefore, is not subject to the requirements of the 
Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.).

Congressional Review Act

    This policy statement is not a rule as defined in the Congressional 
Review Act (5 U.S.C. 801-808).

    Dated at Rockville, Maryland, this 18th day of February, 2016.

    For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.

Attachment--Nuclear Regulatory Commission Insider Threat Program Policy 
Statement

    1. Background. Executive Order (E.O.) 13587, ``Structural 
Reforms to Improve the Security of Classified Networks and the 
Responsible Sharing and Safeguarding of Classified Information,'' 
directs all executive branch departments and agencies that have 
access to classified information to implement reforms to ensure 
responsible sharing and safeguarding of classified information on 
computer networks that are consistent with appropriate protections 
for privacy and civil liberties (October 7, 2011). The Executive 
Order also established the National Insider Threat Task Force, which 
issued the ``National Insider Threat Policy'' and the ``Minimum 
Standards for Executive Branch Insider Threat Programs'' on November 
21, 2012. In order to execute its primary mission essential 
functions, the Nuclear Regulatory Commission (NRC) has access to and 
possesses classified information, including classified information 
on computer networks, which it protects through appropriate security 
procedures.
    2. Purpose. This document establishes the NRC Insider Threat 
Program (ITP) Policy in accordance with E.O. 13587 and the Atomic 
Energy Act of 1954, as amended (AEA). The primary purpose of the ITP 
is to protect information classified under E.O. 13526 or section 142 
of the AEA (restricted data), or that is safeguards information 
under section 147 of the AEA, as well as any such information on 
classified networks, by

[[Page 9520]]

deterring employees holding national security clearances from 
becoming insider threats, detecting insiders who pose a risk to the 
protected information, and mitigating risks. The establishment of an 
NRC ITP is intended to achieve these goals with respect to all NRC 
employees, contractors, and detailees with national security 
clearances and access to information classified under E.O. 13526 or 
section 142 of the AEA or that is safeguards information under 
section 147 of the AEA.
    3. Applicability. This policy is applicable to all NRC 
employees, contractors, and detailees to the NRC from other 
government agencies who have national security clearances and access 
to information classified under E.O. 13526 or section 142 of the AEA 
or that is safeguards information under section 147 of the AEA.
    4. Policy. It is NRC policy that:
    (a) All NRC employees, contractors, and detailees must comply 
with the requirements of all current and applicable Federal laws, 
regulations, and policies concerning the responsible sharing and 
safeguarding of classified information. This includes reporting 
insider threat information related to potential espionage, violent 
acts against the Government or the Nation, and unauthorized access 
to or disclosure of information classified under E.O. 13526 or 
section 142 of the AEA or that is safeguards information under 
section 147 of the AEA, and any such information that is available 
on interconnected U.S. Government computer networks and systems.
    (b) Consistent with established law and policy, including the 
Privacy Act, the ITP uses information made available to it to 
identify, analyze, and respond to potential insider threats at the 
NRC. The ITP itself does not maintain or store any personal 
information. The information is maintained by the program office in 
which the information resides.
    (c) All NRC employees, contractors, and detailees involved in 
any ITP actions (including, but not limited to, gathering 
information or conducting inquiries) do so in accordance with all 
applicable Federal laws, regulations, and policies, including those 
pertaining to whistleblower protections, civil liberties, civil 
rights, criminal rights, personnel records, medical records, and 
privacy rights. The ITP consults with and obtains the concurrence of 
the NRC's Office of the General Counsel (OGC) on questions 
concerning these legal protections in insider threat activities, 
inquiries, assistance in investigations by law enforcement 
authorities, and other matters.
    (d) The ITP refers to the U.S. Federal Bureau of Investigation 
(FBI) information indicating that classified information is being, 
or may have been, disclosed in an unauthorized manner to a foreign 
power or an agent of a foreign power, in accordance with 50 U.S.C. 
3381(e). Subject to an appropriate inquiry by the ITP, other 
information indicating unauthorized access to or misuse of 
classified information, classified networks, or safeguards 
information is referred to the NRC's Office of Inspector General 
(OIG). OGC will provide ongoing legal advice to the ITP as 
appropriate.
    5. References.
    A. The Atomic Energy Act of 1954, as amended; 42 U.S.C. 2011 et. 
seq.
    B. 50 U.S.C. 3381(e).
    C. Inspector General Act of 1978, as amended; 5 U.S.C. Appx 
Sec.  1 et seq.
    D. Executive Order 10450, ``Security Requirements for Government 
Employment,'' April 27, 1953 (18 FR 2489; April 29, 1953).
    E. Executive Order 12333, ``United States Intelligence 
Activities,'' dated December 4, 1981 (as amended by Executive Orders 
13284 (2003), 13355 (2004), and 13470 (2008) (46 FR 59941; December 
8, 1981).
    F. Executive Order 12829, ``National Industrial Security 
Program,'' dated January 6, 1993 (58 FR 3479; January 8, 1993).
    G. Executive Order 12968, ``Access to Classified Information,'' 
dated August 4, 1995 (60 FR 40245; August 7, 1995).
    H. Executive Order 13526, ``Classified National Security 
Information,'' dated December 29, 2009 (75 FR 707; January 5, 2010).
    I. Executive Order 13587, ``Structural Reforms to Improve the 
Security of Classified Networks and the Responsible Sharing and 
Safeguarding of Classified Information,'' dated October 7, 2011 (76 
FR 63811; October 13, 2011).
    J. NRC Management Directive 7.4, ``Reporting Suspected 
Wrongdoing and Processing of OIG Referrals.''
    K. NRC Management Directive, Volume 12, ``Security.''

[FR Doc. 2016-04026 Filed 2-24-16; 8:45 am]
BILLING CODE 7590-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.