Nuclear Regulatory Commission Insider Threat Program Policy Statement, 9519-9520 [2016-04026]
Download as PDF
Federal Register / Vol. 81, No. 37 / Thursday, February 25, 2016 / Notices
For the Nuclear Regulatory Commission.
Alex Garmoe,
Acting Chief, Generic Communications
Branch, Division of Policy and Rulemaking,
Office of Nuclear Reactor Regulation.
[FR Doc. 2016–04023 Filed 2–24–16; 8:45 am]
BILLING CODE 7590–01–P
NUCLEAR REGULATORY
COMMISSION
[NRC–2016–0033]
Nuclear Regulatory Commission
Insider Threat Program Policy
Statement
Nuclear Regulatory
Commission.
ACTION: Policy statement; issuance.
AGENCY:
The U.S. Nuclear Regulatory
Commission (NRC) is issuing its Insider
Threat Program Policy Statement that
establishes the NRC Insider Threat
Program in accordance with Executive
Order (E.O.) 13587, ‘‘Structural Reforms
to Improve the Security of Classified
Networks and the Responsible Sharing
and Safeguarding of Classified
Information.’’ The purpose of the policy
statement is to ensure the responsible
sharing and safeguards of classified
information, including restricted data
and safeguards information, by deterring
employees, contractors, and detailees
holding national security clearances
from becoming insider threats, detecting
insiders who pose a risk to protected
information, and mitigating risks.
DATES: The NRC’s Insider Threat
Program Policy Statement is effective
February 25, 2016.
ADDRESSES: Please refer to Docket ID
NRC–2016–0033 when contacting the
NRC about the availability of
information for this policy statement.
You may access publicly-available
information related to this policy
statement by any of the following
methods:
• Federal Rulemaking Web Site: Go to
https://www.regulations.gov and search
for Docket ID NRC–2016–0033. Address
questions about NRC dockets to Carol
Gallagher; telephone: 301–287–3422;
email: Carol.Gallagher@nrc.gov. For
technical questions, contact the
individual listed in the FOR FURTHER
INFORMATION CONTACT section of this
document.
• NRC’s Agencywide Documents
Access and Management System
(ADAMS): You may obtain publiclyavailable documents online in the
ADAMS Public Documents collection at
https://www.nrc.gov/reading-rm/
adams.html. To begin the search, select
mstockstill on DSK4VPTVN1PROD with NOTICES
SUMMARY:
VerDate Sep<11>2014
18:07 Feb 24, 2016
Jkt 238001
9519
‘‘ADAMS Public Documents’’ and then
select ‘‘Begin Web-based ADAMS
Search.’’ For problems with ADAMS,
please contact the NRC’s Public
Document Room (PDR) reference staff at
1–800–397–4209, 301–415–4737, or by
email to pdr.resource@nrc.gov. The
ADAMS accession number for each
document referenced in this document
(if that document is available in
ADAMS) is provided the first time that
a document is referenced.
• NRC’s PDR: You may examine and
purchase copies of public documents at
the NRC’s PDR, Room O1–F21, One
White Flint North, 11555 Rockville
Pike, Rockville, Maryland 20852.
FOR FURTHER INFORMATION CONTACT:
Denis Brady, Office of Administration,
U.S. Nuclear Regulatory Commission,
Washington, DC 20555–0001; telephone:
301–415–5768; email: Denis.Brady@
nrc.gov.
becoming insider threats, detecting
insiders who pose a risk to protected
information, and mitigating risks. The
policy statement addresses the
background, purpose, applicability,
policy components, and references. This
policy statement is not applicable to
members of the public.
The NRC’s Insider Threat Program
Policy Statement is published in its
entirety in the attachment to this
document, and is also available in
ADAMS under Accession No.
ML16039A282.
SUPPLEMENTARY INFORMATION:
Congressional Review Act
This policy statement is not a rule as
defined in the Congressional Review
Act (5 U.S.C. 801–808).
I. Background
Executive Order 13587, ‘‘Structural
Reforms to Improve the Security of
Classified Networks and the
Responsible Sharing and Safeguarding
of Classified Information,’’ directs all
executive branch departments and
agencies that have access to classified
information to implement reforms to
ensure responsible sharing and
safeguarding of classified information
on computer networks, consistent with
appropriate protections for privacy and
civil liberties (76 FR 63811; October 13,
2011). The E.O. also established the
National Insider Threat Task Force,
which issued the ‘‘National Insider
Threat Policy’’ and the ‘‘Minimum
Standards for Executive Branch Insider
Threat Programs’’ on November 21,
2012 (see https://www.whitehouse.gov/
the-press-office/2012/11/21/
presidential-memorandum-nationalinsider-threat-policy-and-minimumstand, last visited February 8, 2016). In
order to execute its primary mission
essential functions, the NRC has access
to and possesses classified information,
including classified information on
computer networks, which it protects
through appropriate security
procedures. This policy statement
establishes the NRC’s Insider Threat
Program in accordance with E.O. 13587.
II. Discussion
The purpose of this policy statement
is to ensure the responsible sharing and
safeguards of classified information,
including restricted data and safeguards
information, by deterring employees,
contractors, and detailees holding
national security clearances from
PO 00000
Frm 00101
Fmt 4703
Sfmt 4703
III. Procedural Requirements
Paperwork Reduction Act Statement
This policy statement does not
contain information collection
requirements and, therefore, is not
subject to the requirements of the
Paperwork Reduction Act of 1995 (44
U.S.C. 3501 et seq.).
Dated at Rockville, Maryland, this 18th day
of February, 2016.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
Attachment—Nuclear Regulatory
Commission Insider Threat Program
Policy Statement
1. Background. Executive Order (E.O.)
13587, ‘‘Structural Reforms to Improve the
Security of Classified Networks and the
Responsible Sharing and Safeguarding of
Classified Information,’’ directs all executive
branch departments and agencies that have
access to classified information to implement
reforms to ensure responsible sharing and
safeguarding of classified information on
computer networks that are consistent with
appropriate protections for privacy and civil
liberties (October 7, 2011). The Executive
Order also established the National Insider
Threat Task Force, which issued the
‘‘National Insider Threat Policy’’ and the
‘‘Minimum Standards for Executive Branch
Insider Threat Programs’’ on November 21,
2012. In order to execute its primary mission
essential functions, the Nuclear Regulatory
Commission (NRC) has access to and
possesses classified information, including
classified information on computer networks,
which it protects through appropriate
security procedures.
2. Purpose. This document establishes the
NRC Insider Threat Program (ITP) Policy in
accordance with E.O. 13587 and the Atomic
Energy Act of 1954, as amended (AEA). The
primary purpose of the ITP is to protect
information classified under E.O. 13526 or
section 142 of the AEA (restricted data), or
that is safeguards information under section
147 of the AEA, as well as any such
information on classified networks, by
E:\FR\FM\25FEN1.SGM
25FEN1
mstockstill on DSK4VPTVN1PROD with NOTICES
9520
Federal Register / Vol. 81, No. 37 / Thursday, February 25, 2016 / Notices
deterring employees holding national
security clearances from becoming insider
threats, detecting insiders who pose a risk to
the protected information, and mitigating
risks. The establishment of an NRC ITP is
intended to achieve these goals with respect
to all NRC employees, contractors, and
detailees with national security clearances
and access to information classified under
E.O. 13526 or section 142 of the AEA or that
is safeguards information under section 147
of the AEA.
3. Applicability. This policy is applicable
to all NRC employees, contractors, and
detailees to the NRC from other government
agencies who have national security
clearances and access to information
classified under E.O. 13526 or section 142 of
the AEA or that is safeguards information
under section 147 of the AEA.
4. Policy. It is NRC policy that:
(a) All NRC employees, contractors, and
detailees must comply with the requirements
of all current and applicable Federal laws,
regulations, and policies concerning the
responsible sharing and safeguarding of
classified information. This includes
reporting insider threat information related to
potential espionage, violent acts against the
Government or the Nation, and unauthorized
access to or disclosure of information
classified under E.O. 13526 or section 142 of
the AEA or that is safeguards information
under section 147 of the AEA, and any such
information that is available on
interconnected U.S. Government computer
networks and systems.
(b) Consistent with established law and
policy, including the Privacy Act, the ITP
uses information made available to it to
identify, analyze, and respond to potential
insider threats at the NRC. The ITP itself does
not maintain or store any personal
information. The information is maintained
by the program office in which the
information resides.
(c) All NRC employees, contractors, and
detailees involved in any ITP actions
(including, but not limited to, gathering
information or conducting inquiries) do so in
accordance with all applicable Federal laws,
regulations, and policies, including those
pertaining to whistleblower protections, civil
liberties, civil rights, criminal rights,
personnel records, medical records, and
privacy rights. The ITP consults with and
obtains the concurrence of the NRC’s Office
of the General Counsel (OGC) on questions
concerning these legal protections in insider
threat activities, inquiries, assistance in
investigations by law enforcement
authorities, and other matters.
(d) The ITP refers to the U.S. Federal
Bureau of Investigation (FBI) information
indicating that classified information is
being, or may have been, disclosed in an
unauthorized manner to a foreign power or
an agent of a foreign power, in accordance
with 50 U.S.C. 3381(e). Subject to an
appropriate inquiry by the ITP, other
information indicating unauthorized access
to or misuse of classified information,
classified networks, or safeguards
information is referred to the NRC’s Office of
Inspector General (OIG). OGC will provide
ongoing legal advice to the ITP as
appropriate.
VerDate Sep<11>2014
18:07 Feb 24, 2016
Jkt 238001
5. References.
A. The Atomic Energy Act of 1954, as
amended; 42 U.S.C. 2011 et. seq.
B. 50 U.S.C. 3381(e).
C. Inspector General Act of 1978, as
amended; 5 U.S.C. Appx § 1 et seq.
D. Executive Order 10450, ‘‘Security
Requirements for Government Employment,’’
April 27, 1953 (18 FR 2489; April 29, 1953).
E. Executive Order 12333, ‘‘United States
Intelligence Activities,’’ dated December 4,
1981 (as amended by Executive Orders 13284
(2003), 13355 (2004), and 13470 (2008) (46
FR 59941; December 8, 1981).
F. Executive Order 12829, ‘‘National
Industrial Security Program,’’ dated January
6, 1993 (58 FR 3479; January 8, 1993).
G. Executive Order 12968, ‘‘Access to
Classified Information,’’ dated August 4,
1995 (60 FR 40245; August 7, 1995).
H. Executive Order 13526, ‘‘Classified
National Security Information,’’ dated
December 29, 2009 (75 FR 707; January 5,
2010).
I. Executive Order 13587, ‘‘Structural
Reforms to Improve the Security of Classified
Networks and the Responsible Sharing and
Safeguarding of Classified Information,’’
dated October 7, 2011 (76 FR 63811; October
13, 2011).
J. NRC Management Directive 7.4,
‘‘Reporting Suspected Wrongdoing and
Processing of OIG Referrals.’’
K. NRC Management Directive, Volume 12,
‘‘Security.’’
POSTAL SERVICE
Product Change—First-Class Package
Service Negotiated Service Agreement
Postal ServiceTM.
Notice.
AGENCY:
ACTION:
The Postal Service gives
notice of filing a request with the Postal
Regulatory Commission to add a
domestic shipping services contract to
the list of Negotiated Service
Agreements in the Mail Classification
Schedule’s Competitive Products List.
DATES: Effective date: February 25, 2016.
FOR FURTHER INFORMATION CONTACT:
Elizabeth A. Reed, 202–268–3179.
SUPPLEMENTARY INFORMATION: The
United States Postal Service® hereby
gives notice that, pursuant to 39 U.S.C.
3642 and 3632(b)(3), on February 18,
2016, it filed with the Postal Regulatory
Commission a Request of the United
States Postal Service to Add First-Class
Package Service Contract 44 to
Competitive Product List. Documents
are available at www.prc.gov, Docket
Nos. MC2016–82, CP2016–107.
SUMMARY:
Stanley F. Mires,
Attorney, Federal Compliance.
[FR Doc. 2016–04026 Filed 2–24–16; 8:45 am]
[FR Doc. 2016–03976 Filed 2–24–16; 8:45 am]
BILLING CODE 7590–01–P
BILLING CODE 7710–12–P
POSTAL SERVICE
POSTAL SERVICE
Product Change—Priority Mail
Negotiated Service Agreement
Product Change—Priority Mail
Negotiated Service Agreement
Postal ServiceTM.
ACTION: Notice.
AGENCY:
SUMMARY:
The Postal Service gives
notice of filing a request with the Postal
Regulatory Commission to add a
domestic shipping services contract to
the list of Negotiated Service
Agreements in the Mail Classification
Schedule’s Competitive Products List.
DATES: Effective date: February 25, 2016.
FOR FURTHER INFORMATION CONTACT:
Elizabeth A. Reed, 202–268–3179.
SUPPLEMENTARY INFORMATION: The
United States Postal Service® hereby
gives notice that, pursuant to 39 U.S.C.
3642 and 3632(b)(3), on February 18,
2016, it filed with the Postal Regulatory
Commission a Request of the United
States Postal Service to Add Priority
Mail Contract 187 to Competitive
Product List. Documents are available at
www.prc.gov, Docket Nos. MC2016–79,
CP2016–104.
The Postal Service gives
notice of filing a request with the Postal
Regulatory Commission to add a
domestic shipping services contract to
the list of Negotiated Service
Agreements in the Mail Classification
Schedule’s Competitive Products List.
DATES: Effective date: February 25, 2016.
FOR FURTHER INFORMATION CONTACT:
Elizabeth A. Reed, 202–268–3179.
SUPPLEMENTARY INFORMATION: The
United States Postal Service® hereby
gives notice that, pursuant to 39 U.S.C.
3642 and 3632(b)(3), on February 18,
2016, it filed with the Postal Regulatory
Commission a Request of the United
States Postal Service to Add Priority
Mail Contract 188 to Competitive
Product List. Documents are available at
www.prc.gov, Docket Nos. MC2016–80,
CP2016–105.
Stanley F. Mires,
Attorney, Federal Compliance.
Stanley F. Mires,
Attorney, Federal Compliance.
[FR Doc. 2016–03970 Filed 2–24–16; 8:45 am]
[FR Doc. 2016–03967 Filed 2–24–16; 8:45 am]
BILLING CODE 7710–12–P
BILLING CODE 7710–12–P
AGENCY:
PO 00000
Frm 00102
Fmt 4703
Sfmt 9990
ACTION:
Postal ServiceTM.
Notice.
SUMMARY:
E:\FR\FM\25FEN1.SGM
25FEN1
Agencies
[Federal Register Volume 81, Number 37 (Thursday, February 25, 2016)]
[Notices]
[Pages 9519-9520]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-04026]
-----------------------------------------------------------------------
NUCLEAR REGULATORY COMMISSION
[NRC-2016-0033]
Nuclear Regulatory Commission Insider Threat Program Policy
Statement
AGENCY: Nuclear Regulatory Commission.
ACTION: Policy statement; issuance.
-----------------------------------------------------------------------
SUMMARY: The U.S. Nuclear Regulatory Commission (NRC) is issuing its
Insider Threat Program Policy Statement that establishes the NRC
Insider Threat Program in accordance with Executive Order (E.O.) 13587,
``Structural Reforms to Improve the Security of Classified Networks and
the Responsible Sharing and Safeguarding of Classified Information.''
The purpose of the policy statement is to ensure the responsible
sharing and safeguards of classified information, including restricted
data and safeguards information, by deterring employees, contractors,
and detailees holding national security clearances from becoming
insider threats, detecting insiders who pose a risk to protected
information, and mitigating risks.
DATES: The NRC's Insider Threat Program Policy Statement is effective
February 25, 2016.
ADDRESSES: Please refer to Docket ID NRC-2016-0033 when contacting the
NRC about the availability of information for this policy statement.
You may access publicly-available information related to this policy
statement by any of the following methods:
Federal Rulemaking Web Site: Go to https://www.regulations.gov and search for Docket ID NRC-2016-0033. Address
questions about NRC dockets to Carol Gallagher; telephone: 301-287-
3422; email: Carol.Gallagher@nrc.gov. For technical questions, contact
the individual listed in the FOR FURTHER INFORMATION CONTACT section of
this document.
NRC's Agencywide Documents Access and Management System
(ADAMS): You may obtain publicly-available documents online in the
ADAMS Public Documents collection at https://www.nrc.gov/reading-rm/adams.html. To begin the search, select ``ADAMS Public Documents'' and
then select ``Begin Web-based ADAMS Search.'' For problems with ADAMS,
please contact the NRC's Public Document Room (PDR) reference staff at
1-800-397-4209, 301-415-4737, or by email to pdr.resource@nrc.gov. The
ADAMS accession number for each document referenced in this document
(if that document is available in ADAMS) is provided the first time
that a document is referenced.
NRC's PDR: You may examine and purchase copies of public
documents at the NRC's PDR, Room O1-F21, One White Flint North, 11555
Rockville Pike, Rockville, Maryland 20852.
FOR FURTHER INFORMATION CONTACT: Denis Brady, Office of Administration,
U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001;
telephone: 301-415-5768; email: Denis.Brady@nrc.gov.
SUPPLEMENTARY INFORMATION:
I. Background
Executive Order 13587, ``Structural Reforms to Improve the Security
of Classified Networks and the Responsible Sharing and Safeguarding of
Classified Information,'' directs all executive branch departments and
agencies that have access to classified information to implement
reforms to ensure responsible sharing and safeguarding of classified
information on computer networks, consistent with appropriate
protections for privacy and civil liberties (76 FR 63811; October 13,
2011). The E.O. also established the National Insider Threat Task
Force, which issued the ``National Insider Threat Policy'' and the
``Minimum Standards for Executive Branch Insider Threat Programs'' on
November 21, 2012 (see https://www.whitehouse.gov/the-press-office/2012/11/21/presidential-memorandum-national-insider-threat-policy-and-minimum-stand, last visited February 8, 2016). In order to execute its
primary mission essential functions, the NRC has access to and
possesses classified information, including classified information on
computer networks, which it protects through appropriate security
procedures. This policy statement establishes the NRC's Insider Threat
Program in accordance with E.O. 13587.
II. Discussion
The purpose of this policy statement is to ensure the responsible
sharing and safeguards of classified information, including restricted
data and safeguards information, by deterring employees, contractors,
and detailees holding national security clearances from becoming
insider threats, detecting insiders who pose a risk to protected
information, and mitigating risks. The policy statement addresses the
background, purpose, applicability, policy components, and references.
This policy statement is not applicable to members of the public.
The NRC's Insider Threat Program Policy Statement is published in
its entirety in the attachment to this document, and is also available
in ADAMS under Accession No. ML16039A282.
III. Procedural Requirements
Paperwork Reduction Act Statement
This policy statement does not contain information collection
requirements and, therefore, is not subject to the requirements of the
Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et seq.).
Congressional Review Act
This policy statement is not a rule as defined in the Congressional
Review Act (5 U.S.C. 801-808).
Dated at Rockville, Maryland, this 18th day of February, 2016.
For the Nuclear Regulatory Commission.
Annette L. Vietti-Cook,
Secretary of the Commission.
Attachment--Nuclear Regulatory Commission Insider Threat Program Policy
Statement
1. Background. Executive Order (E.O.) 13587, ``Structural
Reforms to Improve the Security of Classified Networks and the
Responsible Sharing and Safeguarding of Classified Information,''
directs all executive branch departments and agencies that have
access to classified information to implement reforms to ensure
responsible sharing and safeguarding of classified information on
computer networks that are consistent with appropriate protections
for privacy and civil liberties (October 7, 2011). The Executive
Order also established the National Insider Threat Task Force, which
issued the ``National Insider Threat Policy'' and the ``Minimum
Standards for Executive Branch Insider Threat Programs'' on November
21, 2012. In order to execute its primary mission essential
functions, the Nuclear Regulatory Commission (NRC) has access to and
possesses classified information, including classified information
on computer networks, which it protects through appropriate security
procedures.
2. Purpose. This document establishes the NRC Insider Threat
Program (ITP) Policy in accordance with E.O. 13587 and the Atomic
Energy Act of 1954, as amended (AEA). The primary purpose of the ITP
is to protect information classified under E.O. 13526 or section 142
of the AEA (restricted data), or that is safeguards information
under section 147 of the AEA, as well as any such information on
classified networks, by
[[Page 9520]]
deterring employees holding national security clearances from
becoming insider threats, detecting insiders who pose a risk to the
protected information, and mitigating risks. The establishment of an
NRC ITP is intended to achieve these goals with respect to all NRC
employees, contractors, and detailees with national security
clearances and access to information classified under E.O. 13526 or
section 142 of the AEA or that is safeguards information under
section 147 of the AEA.
3. Applicability. This policy is applicable to all NRC
employees, contractors, and detailees to the NRC from other
government agencies who have national security clearances and access
to information classified under E.O. 13526 or section 142 of the AEA
or that is safeguards information under section 147 of the AEA.
4. Policy. It is NRC policy that:
(a) All NRC employees, contractors, and detailees must comply
with the requirements of all current and applicable Federal laws,
regulations, and policies concerning the responsible sharing and
safeguarding of classified information. This includes reporting
insider threat information related to potential espionage, violent
acts against the Government or the Nation, and unauthorized access
to or disclosure of information classified under E.O. 13526 or
section 142 of the AEA or that is safeguards information under
section 147 of the AEA, and any such information that is available
on interconnected U.S. Government computer networks and systems.
(b) Consistent with established law and policy, including the
Privacy Act, the ITP uses information made available to it to
identify, analyze, and respond to potential insider threats at the
NRC. The ITP itself does not maintain or store any personal
information. The information is maintained by the program office in
which the information resides.
(c) All NRC employees, contractors, and detailees involved in
any ITP actions (including, but not limited to, gathering
information or conducting inquiries) do so in accordance with all
applicable Federal laws, regulations, and policies, including those
pertaining to whistleblower protections, civil liberties, civil
rights, criminal rights, personnel records, medical records, and
privacy rights. The ITP consults with and obtains the concurrence of
the NRC's Office of the General Counsel (OGC) on questions
concerning these legal protections in insider threat activities,
inquiries, assistance in investigations by law enforcement
authorities, and other matters.
(d) The ITP refers to the U.S. Federal Bureau of Investigation
(FBI) information indicating that classified information is being,
or may have been, disclosed in an unauthorized manner to a foreign
power or an agent of a foreign power, in accordance with 50 U.S.C.
3381(e). Subject to an appropriate inquiry by the ITP, other
information indicating unauthorized access to or misuse of
classified information, classified networks, or safeguards
information is referred to the NRC's Office of Inspector General
(OIG). OGC will provide ongoing legal advice to the ITP as
appropriate.
5. References.
A. The Atomic Energy Act of 1954, as amended; 42 U.S.C. 2011 et.
seq.
B. 50 U.S.C. 3381(e).
C. Inspector General Act of 1978, as amended; 5 U.S.C. Appx
Sec. 1 et seq.
D. Executive Order 10450, ``Security Requirements for Government
Employment,'' April 27, 1953 (18 FR 2489; April 29, 1953).
E. Executive Order 12333, ``United States Intelligence
Activities,'' dated December 4, 1981 (as amended by Executive Orders
13284 (2003), 13355 (2004), and 13470 (2008) (46 FR 59941; December
8, 1981).
F. Executive Order 12829, ``National Industrial Security
Program,'' dated January 6, 1993 (58 FR 3479; January 8, 1993).
G. Executive Order 12968, ``Access to Classified Information,''
dated August 4, 1995 (60 FR 40245; August 7, 1995).
H. Executive Order 13526, ``Classified National Security
Information,'' dated December 29, 2009 (75 FR 707; January 5, 2010).
I. Executive Order 13587, ``Structural Reforms to Improve the
Security of Classified Networks and the Responsible Sharing and
Safeguarding of Classified Information,'' dated October 7, 2011 (76
FR 63811; October 13, 2011).
J. NRC Management Directive 7.4, ``Reporting Suspected
Wrongdoing and Processing of OIG Referrals.''
K. NRC Management Directive, Volume 12, ``Security.''
[FR Doc. 2016-04026 Filed 2-24-16; 8:45 am]
BILLING CODE 7590-01-P