Safeguarding of Restricted Data by Access Permittees, 80612-80618 [2016-27414]
Download as PDF
80612
Proposed Rules
Federal Register
Vol. 81, No. 221
Wednesday, November 16, 2016
This section of the FEDERAL REGISTER
contains notices to the public of the proposed
issuance of rules and regulations. The
purpose of these notices is to give interested
persons an opportunity to participate in the
rule making prior to the adoption of the final
rules.
DEPARTMENT OF ENERGY
10 CFR Part 1016
[Docket No. DOE–HQ–2015–0029–0001]
RIN 1992–AA46
Safeguarding of Restricted Data by
Access Permittees
Department of Energy.
Notice of proposed rulemaking
and public hearings.
AGENCY:
ACTION:
The Department of Energy
(DOE or Department) proposes to revise
its regulations governing the standards
for safeguarding Restricted Data by
access permittees. The existing version
of this regulation was promulgated in
1983, which transferred the regulation
(originally promulgated in 1976). Since
1983, changes in organizations,
terminology, and DOE and national
policies render portions of the existing
regulation outdated. The proposed
revisions would update existing
requirements.
SUMMARY:
Written comments must be
received by DOE on or before December
16, 2016.
A public meeting will be held if one
is requested by November 23, 2016.
ADDRESSES: Written comments should
be addressed to: Mr. Matthew B. Moury,
Associate Under Secretary for
Environment, Health, Safety and
Security, Office of Environment, Health,
Safety and Security, AU–1/Forrestal
Building, Department of Energy, Docket
No. DOE–HQ–2015–0029–0001, 1000
Independence Avenue SW.,
Washington, DC 20585 or via email at
1992–AA46@hq.doe.gov. Questions
concerning submitting written
comments should be addressed to: Ms.
Linda Ruhnow, Office of Security
Policy, Office of Environment, Health,
Safety and Security, Department of
Energy, AU–51/Germantown Building,
1000 Independence Avenue SW.,
Washington, DC 20585–1290, (301) 903–
4053 or via email at 1992–AA46@
hq.doe.gov. Requests to hold a public
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
DATES:
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
meeting should be submitted by phone
or email to Ms. Ruhnow at the number
or email address provided. You may
submit comments, identified by [DOE–
HQ–2015–0029–0001 and/or 1992–
AA46], by any of the following methods:
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
• Email: 1992–AA46@hq.doe.gov.
Include [DOE–HQ–2015–0029–0001
and/or 1992–AA46] in the subject line
of the message.
• Mail: Mailing Address for paper,
disk, or CD–ROM submissions:
Department of Energy, Office of Security
Policy, (AU–51, Attn: Linda Ruhnow),
1000 Independence Ave. SW.,
Washington, DC 20585–1290.
• Hand Delivery/Courier: Street
Address: Department of Energy, Office
of Security Policy, (AU–51, Attn: Linda
Ruhnow), 1000 Independence Ave. SW.,
Washington, DC 20585–1290.
As a result of potential delays in the
receipt and processing of mail sent
through the U.S. Postal Service, DOE
encourages respondents to submit
comments electronically to ensure
timely receipt.
Instructions: All submissions received
must include the agency name and
docket number or Regulatory
Information Number (RIN) for this
rulemaking. All comments received will
be posted without change to https://
www.regulations.gov, including any
personal information provided.
Docket: For access to the docket to
read background documents or
comments received, go to https://
www.regulations.gov/
#!docketDetail;D=DOE-HQ-2015-0008 or
contact Linda Ruhnow at (301) 903–
4053 prior to visiting Department of
Energy, Office of Security Policy, (AU–
51), 19901 Germantown Rd.,
Germantown, MD 20874.
FOR FURTHER INFORMATION CONTACT: Ms.
Linda Ruhnow, Office of Security Policy
at (301) 903–4053; Linda.Ruhnow@
hq.doe.gov.
SUPPLEMENTARY INFORMATION:
I. Background
II. Section by Section Analysis
III. Regulatory Review and Procedural
Requirements
A. Review Under Executive Order 12866
B. Review Under the Regulatory Flexibility
Act
C. Review Under Paperwork Reduction Act
D. Review Under the National
Environmental Policy Act
PO 00000
Frm 00001
Fmt 4702
Sfmt 4702
E. Review Under Executive Order 13132
F. Review Under Executive Order 12988
G. Review Under the Unfunded Mandates
Reform Act of 1995
H. Review Under Executive Order 13211
I. Review Under the Treasury and General
Government Appropriations Act of 1999
IV. Opportunity for Public Comment
I. Background
The U.S. Department of Energy may
issue an access permit to any person, as
set forth in 10 CFR part 725, who
requires access to Restricted Data
applicable to civil uses of atomic energy
for use in his/her business, trade or
profession. 10 CFR part 725 specifies
the terms and conditions under which
the Department will issue an access
permit and provides for the amendment,
renewal, suspension, termination and
revocation of an access permit.
The regulations in 10 CFR part 1016
establish requirements for the
safeguarding of Secret and Confidential
Restricted Data received or developed
under an access permit. This part does
not apply to Top Secret information
because no such information may be
provided to an access permittee within
the scope of this regulation. The
regulations in this part apply to all
persons who may require access to
Restricted Data used, processed, stored,
reproduced, transmitted, or handled in
connection with an access permit.
The original regulations for the
safeguarding of Restricted Data were
Atomic Energy Commission regulations
that were transferred to the Energy
Research and Development
Administration (ERDA) upon its
formation in 1974 (Energy
Reorganization Act of 1974; Pub. L. 93–
438). The regulations were subsequently
revised to conform to ERDA’s
organization (41 FR 56775, 56785–
56788, Dec. 30, 1976). The regulations
were updated and transferred from 10
CFR part 795 to 10 CFR part 1016 in
1983. (48 FR 36432 (Aug. 10, 1983).
DOE has developed the proposed
modifications to 10 CFR part 1016 to
reflect organizational, terminology and
policy changes that have occurred since
the regulations were last revised.
The proposed modifications to the
sections of 10 CFR part 1016 that DOE
proposes to amend are described in the
Section by Section Analysis in section
II.
E:\FR\FM\16NOP1.SGM
16NOP1
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
II. Section by Section Analysis
The heading for this part would be
revised to Safeguarding of Restricted
Data by Access Permittees. The revision
is intended to more accurately reflect
the contents of the regulation.
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
Subpart A—General
In § 1016.3, Definitions, DOE
proposes to delete the term ‘‘Authorized
classifier’’. Instead, 10 CFR part 1045
would be referenced as the source of
classification requirements.
The terms ‘‘Document’’, ‘‘Material’’
and ‘‘Matter’’ would be deleted because
they are not used in any unique way in
this regulation.
The access authorization terms Q,
Q(X), L and L(X) would be updated to
specify the type of background
investigation required. For example,
single scope background investigations
are required for Q access authorizations.
The term ‘‘classified mail address’’
would be revised for better grammar.
The term ‘‘classified matter’’ would be
revised to include all documents,
material, electronic media and other
physical forms that reveal or contain
classified information.
The term ‘‘infraction’’ would be
revised to include non-compliance with
DOE approvals.
The term ‘‘intrusion alarm’’ would be
revised to ‘‘intrusion detection system’’
and updated for more accurate usage
consistent with current DOE policy.
The term ‘‘National Security
Information’’ would be revised for
consistency with Executive Order
13526, Classified National Security
Information.
The term ‘‘Security Plan’’ would be
revised to clarify that matter refers to
classified matter.
Proposed changes for § 1016.4 would
revise the addressee from the ‘‘Chief
Health, Safety and Security Officer’’, to
the ‘‘Associate Under Secretary of
Environment, Health, Safety and
Security’’ to address a recent
reorganization.
Proposed changes for § 1016.5 would
require that procedures submitted
pursuant to this section ensure that
access permit holder employees are
informed about classification and
declassification requirements in 10 CFR
part 1045.
DOE proposes to change the title of
§ 1016.8 to clarify the section topic.
The proposed changes for § 1016.9
and § 1016.10 revise grammar.
The proposed changes for § 1016.11
would revise ‘‘DOE Operations Office’’
to ‘‘the cognizant DOE office’’ to direct
notification to the relevant DOE
Element.
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
The proposed changes for § 1016.12
would update reference to reflect the
proposed renumbering of current
§ 1016.39.
DOE proposes to renumber
§§ 1016.21—1016.44 to eliminate the
gaps in section numbering that exist in
the current version of this regulation.
The renumbered § 1016.13, currently
§ 1016.21, would be revised to maintain
consistency with current national and
U.S. Department of Energy policies that
no longer allows storage of classified
matter in a locked steel file cabinet.
Proposed changes to the renumbered
§ 1016.14, currently § 1016.22, would
clarify that a person must have need-toknow in addition to the appropriate
access authorization. This revision does
not change the intent of the requirement
for protecting Restricted Data that is in
use.
Proposed changes to the renumbered
§ 1016.15, currently § 1016.23, would
update intrusion detection system
terminology consistent with DOE policy
and delete the word ‘‘may’’.
Proposed changes to the renumbered
§ 1016.17, currently § 1016.25, would
update the weapon specification to
match current DOE policy. DOE Order
473.3, Protection Program Operations
lists DOE-authorized firearms.
Proposed changes to the renumbered
§ 1016.18, currently § 1016.31, would
apply the need-to-know criterion for
Confidential as well as Secret Restricted
Data.
Proposed changes to the renumbered
§ 1016.19, currently § 1016.32, would
align requirements and terminology
with 10 CFR part 1045, Nuclear
Classification and Declassification.
Also, the title would be changed to more
accurately reflect the section and the
‘‘Office of Health, Safety and Security’’
would be replaced with ‘‘Office of
Environment, Health, Safety and
Security’’.
Proposed changes to the renumbered
§ 1016.20, currently § 1016.33, would
specify need-to-know as a basic criteria
for determining access; indicate
required approvals and remove the
telephone statement because it is a
subset of the telecommunication
statement.
Proposed changes to the renumbered
§ 1016.21, currently § 1016.34, would
reflect that classified matter (including
matter in electronic format) containing
Secret Restricted Data requires
accountability.
Proposed changes to the renumbered
§ 1016.23, currently § 1016.36, would
make changes in classification subject to
the requirements in 10 CFR part 1045,
Nuclear Classification and
Declassification.
PO 00000
Frm 00002
Fmt 4702
Sfmt 4702
80613
Proposed changes to the renumbered
§ 1016.24, currently § 1016.37, would
amend the title to replace ‘‘documents
or material’’ with ‘‘classified matter’’
and would delete provisions that are
duplicative with the renumbered
§ 1016.21 regarding accountability of
classified matter that contains Restricted
Data.
Proposed new § 1016.25, Storage, use,
processing, transmission and
destruction of classified information on
computers, computer networks,
electronic devices/media, and mobile
devices, would be added to include
additional direction regarding newer
forms of media (electronic) that may
contain Restricted Data.
Proposed changes to the renumbered
§ 1016.27, currently § 1016.39 would
clarify that termination of the security
facility approval will be in accordance
with the requirements in this part.
Proposed changes to the renumbered
§ 1016.31, currently § 1016.43, would
update the reference to Executive Order
13526.
Throughout the proposed changes, the
term ‘‘classified matter’’ is used so as to
include documents and material.
III. Rulemaking Requirements
A. Review Under Executive Order 12866
This action does not constitute a
‘‘significant regulatory action’’ as
defined in section 3(f) of Executive
Order 12866, ‘‘Regulatory Planning and
Review’’ (58 FR 51735).
B. Review Under the Regulatory
Flexibility Act
The Regulatory Flexibility Act (5
U.S.C. 601 et seq.) requires preparation
of a regulatory flexibility analysis for
any rule that by law must be proposed
for public comment, unless the agency
certifies that the rule, if promulgated,
will not have a significant economic
impact on a substantial number of small
entities. As required by Executive Order
13272, ‘‘Proper Consideration of Small
Entities in Agency Rulemaking’’ (67 FR
53461, Aug. 16, 2002), DOE published
procedures and policies on February 19,
2003, to ensure that the potential
impacts of its rules on small entities are
properly considered during the
rulemaking process. DOE has made its
procedures and policies available on the
Office of the General Counsel’s Web site
(www.gc.doe.gov).
DOE has reviewed this proposed rule
under the Regulatory Flexibility Act and
certifies that, if adopted, the rule would
not have a significant impact on a
substantial number of small entities.
This proposed action would amend an
existing rule which establishes
E:\FR\FM\16NOP1.SGM
16NOP1
80614
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
safeguarding of Restricted Data by
persons granted an Access Permit
according to 10 CFR part 725. The rule
would only apply to Access Permittees,
of which there are historically very few
(e.g., between zero and five), and the
proposed changes are administrative
changes (such as renumbering of several
parts and changing office names to
reflect a recent reorganization), updates
to enable consistency with current
policies and practices, and clarification
of requirements.
Because these standards and
requirements consist of clarifications
and updates to existing standards and
requirements, DOE does not expect that
the impact on any Access Permittees
would be significant. DOE seeks
comment on its estimate of the number
of small entities and the expected effects
of this proposed rule.
For the above reasons, DOE certifies
that the proposed rule, if adopted, will
not have a significant economic impact
on a substantial number of small
entities.
C. Review Under Paperwork Reduction
Act
This proposed rule does not contain
a collection of information subject to
OMB approval under the Paperwork
Reduction Act.
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
D. Review Under the National
Environmental Policy Act
This proposed rule amends existing
policies and procedures establishing
safeguarding of Restricted Data
standards and requirements for Access
Permittees and has no significant
environmental impact. Consequently,
the Department has determined that this
rule is covered under Categorical
Exclusion A–5, of Appendix A to
Subpart D, 10 CFR part 1021, which
applies to a rulemaking that addresses
amending an existing rule or regulation
that does not change the environmental
effect of the rule or regulation being
amended. Accordingly, neither an
environmental assessment nor an
environmental impact statement is
required.
E. Review Under Executive Order 13132
Executive Order 13132, ‘‘Federalism,’’
(64 FR 43255, August 4, 1999), imposes
certain requirements on agencies
formulating and implementing policies
or regulations that preempt State law or
that have federalism implications.
Agencies are required to develop a
formal process to ensure meaningful
and timely input by State and local
officials in the development of
regulatory policies that have
‘‘federalism implications.’’ Policies that
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
have federalism implications are
defined in the Executive Order to
include regulations that have
‘‘substantial direct effects on the States,
on the relationship between the national
government and the States, or on the
distribution of power and
responsibilities among the various
levels of government.’’ On March 7,
2011, DOE published a statement of
policy describing the intergovernmental
consultation process it will follow in the
development of such regulations (65 FR
13735, March 14, 2000).
DOE has examined the proposed and
revised rule and has determined that it
does not have a substantial direct effect
on the States, on the relationship
between the national government and
the States, or on the distribution of
power and responsibilities among the
various levels of government. No further
action is required by Executive Order
13132.
F. Review Under Executive Order 12988
Section 3 of Executive Order 12988,
(61 FR 4729, February 7, 1996), instructs
each agency to adhere to certain
requirements in promulgating new
regulations. These requirements, set
forth in section 3(a) and (b), include
eliminating drafting errors and needless
ambiguity, drafting the regulations to
minimize litigation, providing clear and
certain legal standards for affected legal
conduct, and promoting simplification
and burden reduction. Agencies are also
instructed to make every reasonable
effort to ensure that the regulation
describes any administrative proceeding
to be available prior to judicial review
and any provisions for the exhaustion of
administrative remedies. The
Department has determined that this
regulatory action meets the
requirements of section 3(a) and (b) of
Executive Order 12988.
G. Review Under the Unfunded
Mandates Reform Act of 1995
Title II of the Unfunded Mandates
Reform Act of 1995 (UMRA) requires
each Federal agency to assess the effects
of Federal regulatory action on state,
local and tribal governments and the
private sector. For proposed regulatory
actions likely to result in a rule that may
cause expenditures by State, local, and
Tribal governments, in the aggregate, or
by the private sector of $100 million or
more in any one year (adjusted annually
for inflation), section 202 of UMRA
requires a Federal agency to publish
estimates of the resulting costs, benefits,
and other effects on the national
economy. UMRA also requires Federal
agencies to develop an effective process
to permit timely input by elected
PO 00000
Frm 00003
Fmt 4702
Sfmt 4702
officers of State, local, and Tribal
governments on a proposed ‘‘significant
intergovernmental mandate.’’ In
addition, UMRA requires an agency
plan for giving notice and opportunity
for timely input to small governments
that may be affected before establishing
a requirement that might significantly or
uniquely affect them. On March 18,
1997, DOE published a statement of
policy on its process for
intergovernmental consultation under
UMRA (62 FR 12820, March 18, 1997).
(This policy is also available at https://
www.gc.doe.gov). This proposed rule
contains neither an intergovernmental
mandate, nor a mandate that may result
in the expenditure of $100 million or
more in any year, so these requirements
do not apply.
H. Review Under Executive Order 13211
Executive Order 13211, ‘‘Actions
Concerning Regulations That
Significantly Affect Energy Supply,
Distribution, or Use,’’ (66 FR 28355,
May 22, 2001) requires Federal agencies
to prepare and submit to the Office of
Information and Regulatory Affairs
(OIRA), Office of Management and
Budget, a Statement of Energy Effects for
any proposed significant energy action.
A ‘‘significant energy action’’ is defined
as any action by an agency that
promulgates or is expected to lead to the
promulgation of a final rule, and that:
(1) Is a significant regulatory action
under Executive Order 12866, or any
successor order; and (2) is likely to have
a significant adverse effect on the
supply, distribution, or use of energy; or
(3) is designated by the Administrator of
OIRA as a significant energy action. For
any proposed significant energy action,
the agency must give a detailed
statement of any adverse effects on
energy supply, distribution, or use
should the proposal be implemented,
and of reasonable alternates to the
action and their expected benefits on
energy supply, distribution, and use.
This proposed rule is not a significant
energy action, nor has it been
designated as such by the Administrator
of OIRA. Accordingly, DOE has not
prepared a Statement of Energy Effects.
I. Review Under the Treasury and
General Government Appropriations
Act, 1999
Section 654 of the Treasury and
General Government Appropriations
Act, 1999 (Pub. L. 105–277) requires
Federal agencies to issue a Family
Policymaking Assessment for any
proposed rule or policy that may affect
family well-being. This proposed rule
would not have any impact on the
autonomy or integrity of the family as
E:\FR\FM\16NOP1.SGM
16NOP1
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
an institution. Accordingly, DOE has
concluded that it is not necessary to
prepare a Family Policymaking
Assessment.
IV. Opportunity for Public Comment
A. Participation in Rulemaking
DOE encourages the maximum level
of public participation in this
rulemaking. Interested persons are
encouraged to participate in the public
hearings at the times and places
indicated at the beginning of this
proposed rulemaking.
DOE has established a period of thirty
days following publication of this
proposed rulemaking for persons and
organizations to comment. All public
comments, hearing transcripts, and
other docket material will be available
for review and copying at the DOE
offices at each of the hearing sites. The
docket material will be filed under
‘‘DOE–HQ–2015–0029–0001.’’
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
B. Written Comment Procedures
Interested persons are invited to
participate in this proceeding by
submitting written data, views or
arguments with respect to the subjects
set forth in this proposed rulemaking.
Instructions for submitting written
comments are set forth at the beginning
of this notice and below. Where
possible, comments should identify the
specific section they address.
Comments should be labeled both on
the envelope and on the documents,
‘‘Docket No. DOE–HQ–2015–0029–
0001’’ and must be received by the date
specified at the beginning of this
proposed rulemaking. All comments
and other relevant information received
by the date specified at the beginning of
this proposed rulemaking will be
considered by DOE in the subsequent
stages of the rulemaking process.
Pursuant to the provisions of 10 CFR
part 1004, any person submitting
information or data that is believed to be
confidential and exempt by law from
public disclosure should submit one
complete copy of the document and
three copies, if possible, from which the
information believed to be confidential
has been deleted. DOE will make its
own determination with regard to the
confidential status of the information or
data and treat it according to its
determination.
C. Public Hearings
The dates, times and places of the
public hearings are indicated at the
beginning of this proposed rulemaking.
DOE invites any person or organization
who has an interest in these proceedings
to make a request to make an oral
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
presentation at one of the public
hearings. Requests can be phoned in
advance to the telephone number
indicated at the beginning of this
proposed rulemaking. The person
making the request should provide a
telephone number where he or she may
be contacted.
DOE reserves the right to schedule the
presentations, and to establish the
procedures governing the conduct of the
hearings.
A DOE official will be designated to
preside at the hearings and ask
questions. Any necessary procedural
rules regarding proper conduct of the
hearings will be determined by the
presiding official.
Transcripts of the hearings will be
made and the entire record of this
rulemaking, including the transcripts,
will be retained by DOE and made
available for inspection and copying as
provided at the beginning of this
proposed rulemaking as well as being
posted on www.regulations.gov under
Docket Number DOE–HQ–2015–0029–
0001. Any person may also purchase a
copy of a transcript from the
transcribing reporter.
List of Subjects in 10 CFR Part 1016
Classified information, Nuclear
energy, Reporting and recordkeeping
requirements, Security measures.
Issued in Washington, DC, on November 1,
2016.
Matthew B. Moury,
Associate Under Secretary for Environment,
Health, Safety and Security.
For the reasons set out in the
preamble, DOE proposes to amend part
1016 of title 10 of the Code of Federal
Regulations as set forth below:
PART 1016—SAFEGUARDING OF
RESTRICTED DATA BY ACCESS
PERMITTEES
1. The authority citation for part 1016
continues to read as follows:
■
Authority: Sec. 161i of the Atomic Energy
Act of 1954, 68 Stat. 948 (42 U.S.C. 2201).
2. The part heading for part 1016 is
revised as set forth above.
■ 3. Section 1016.3 is amended by:
■ a. Revising paragraph (a).
■ b. Removing paragraphs (c).
■ c. Redesignating paragraphs (d) and
(e) as paragraphs (c) and (d),
respectively.
■ d. Revising newly designated
paragraphs (c) and (d).
■ e. Redesignating paragraphs (f) and (g)
as paragraphs (e) and (f), respectively.
■ f. Removing paragraph (h).
■ g. Redesignating paragraphs (i)
through (k) as paragraphs (g) through (i),
respectively.
■
PO 00000
Frm 00004
Fmt 4702
Sfmt 4702
80615
h. Revising newly designated
paragraphs (h) and (i).
■ i. Removing paragraphs (l) and (m).
■ j. Redesignating paragraphs (n)
through (z) as paragraphs (j) through (v),
respectively.
■ k. Revising newly designated
paragraphs (k) and (u).
The revisions read as follows:
■
§ 1016.3
Definitions.
(a) Access authorization. An
administrative determination by DOE
that an individual who is either a DOE
employee, applicant for employment,
consultant, assignee, other Federal
department or agency employee (or
other persons who may be designated by
the Secretary of Energy), or a DOE
contractor or subcontractor employee, or
an access permittee is eligible for access
to Restricted Data. Access
authorizations granted by DOE are
designated as ‘‘Q,’’ ‘‘Q(X),’’ ‘‘L,’’ or
‘‘L(X).’’
(1) ‘‘Q’’ access authorizations are
based upon single scope background
investigations as set forth in applicable
DOE and national-level directives. They
permit an individual who has ‘‘need to
know’’ access to Top Secret, Secret and
Confidential Restricted Data, Formerly
Restricted Data, National Security
Information, or special nuclear material
in Category I or II quantities as required
in the performance of duties, subject to
additional determination that permitting
this access will not endanger the
common defense or national security of
the United States. There may be
additional requirements for access to
specific types of RD information.
(2) ‘‘Q(X)’’ access authorizations are
based upon the same level of
investigation required for a Q access
authorization when ‘‘Q’’ access
authorizations are granted to access
permittees they are identified as ‘‘Q(X)’’
access authorizations and, as need-toknow applies, authorize access only to
the type of Secret Restricted Data as
specified in the permit and consistent
with appendix A, 10 CFR part 725,
‘‘Categories of Restricted Data
Available.’’
(3) ‘‘L’’ access authorizations are
based upon National Agency Check
with Local Agency Checks and Credit
Check background investigation as set
forth in applicable DOE and nationallevel directives. They permit an
individual who has ‘‘need to know’’
access to Confidential Restricted Data,
Secret and Confidential Formerly
Restricted Data, or Secret and
Confidential National Security
Information, required in the
performance of duties, provided such
information is not designated
E:\FR\FM\16NOP1.SGM
16NOP1
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
80616
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
‘‘CRYPTO’’ (classified cryptographic
information), other classified
communications security (‘‘COMSEC’’)
information, or intelligence information
and subject to additional determination
that permitting this access will not
endanger the common defense or
national security of the United States.
There may be additional requirements
for access to specific types of RD
information.
(4) ‘‘L(X)’’ access authorizations are
based upon the same level of
investigation required for an L access
authorization When ‘‘L’’ access
authorizations are granted to access
permittees, they are identified as ‘‘L(X)’’
access authorizations and, as need to
know applies, authorize access only to
the type of Confidential Restricted Data
as specified in the permit and consistent
with appendix A, 10 CFR part 725,
‘‘Categories of Restricted Data
Available.’’
*
*
*
*
*
(c) Classified mail address. A mail
address established for each access
permittee and approved by the DOE to
be used when sending Restricted Data to
the permittee.
(d) Classified matter. Anything in
physical form (including, but not
limited to documents and material) that
contains or reveals classified
information.
*
*
*
*
*
(h) Infraction. An act or omission
involving failure to comply with DOE
safeguards and security orders,
directives, or approvals and may
include a violation of law.
(i) Intrusion detection system. A
security system consisting of sensors
capable of detecting one or more types
of phenomena, signal media,
annunciators, energy sources, alarm
assessment systems, and alarm reporting
elements including alarm
communications and information
display equipment.
*
*
*
*
*
(k) National Security Information.
Information that has been determined
pursuant to Executive Order 13526, as
amended ‘‘Classified National Security
Information’’ or any predecessor or
successor order to require protection
against unauthorized disclosure and is
marked to indicate its classified status
when in documentary form.
(u) Security Plan. A written plan by
the access permittee, and submitted to
the DOE for approval, which outlines
the permittee’s proposed security
procedures and controls for the
protection of Restricted Data and which
includes a floor plan of the area in
which the classified matter is to be
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
used, processed, stored, reproduced,
transmitted, or handled.
*
*
*
*
*
■ 4. Section 1016.4 is revised to read as
follows:
§ 1016.4
Communications.
Communications concerning
rulemaking, i.e., petition to change part
1016, should be addressed to the
Associate Under Secretary, Office of
Environment, Health, Safety and
Security, AU–1/Forrestal Building,
Office of Environment, Health, Safety
and Security, U.S. Department of
Energy, 1000 Independence Avenue
SW., Washington, DC 20585. All other
communications concerning the
regulations in this part should be
addressed to the cognizant DOE or
National Nuclear Security
Administration (NNSA) office.
■ 5. Section 1016.5 is revised to read as
follows:
§ 1016.5 Submission of procedures by
access permit holder.
No access permit holder shall have
access to Restricted Data until he has
submitted to the DOE a written
statement of his procedures for the
safeguarding of Restricted Data and for
the security education of his employees,
and DOE shall have determined and
informed the permittee that his
procedures for the safeguarding of
Restricted Data are in compliance with
the regulations in this part and that his
procedures for the security education of
his employees, who will have access to
Restricted Data, are informed about and
understand the regulations in this part.
These procedures must ensure that
employees with access to Restricted
Data are informed about and understand
who is authorized or required to classify
and declassify RD and FRD information
and classified matter as well as how
documents containing RD or FRD are
marked (see 10 CFR part 1045) and
safeguarded.
■ 6. The section heading for § 1016.8 is
revised to read as follows:
§ 1016.8 Request for security facility
approval.
7. Section 1016.9 is revised to read as
follows:
■
§ 1016.9 Processing security facility
approval.
Following receipt of an acceptable
request for security facility approval, the
DOE will perform an initial security
survey of the permittee’s facility to
determine that granting a security
facility approval would be consistent
with the national security. If DOE makes
such a determination, security facility
approval will be granted. If not, security
PO 00000
Frm 00005
Fmt 4702
Sfmt 4702
facility approval will be withheld
pending compliance with the security
survey recommendations or until a
waiver is granted pursuant to § 1016.6 of
this part.
■ 8. Section 1016.10 is revised to read
as follows:
§ 1016.10 Granting, denial, or suspension
of security facility approval.
Notification of the DOE’s granting,
denial, or suspension of security facility
approval will be furnished the permittee
in writing, or orally with written
confirmation. This information may also
be furnished to representatives of the
DOE, DOE contractors, or other Federal
agencies having a need to transmit
Restricted Data to the permittee.
■ 9. Section 1016.11 is revised to read
as follows:
§ 1016.11 Cancellation of requests for
security facility approval.
When a request for security facility
approval is to be withdrawn or
cancelled, the cognizant DOE Office will
be notified by the requester immediately
by telephone and confirmed in writing
so that processing of this approval may
be terminated.
■ 10. Section 1016.12 is revised to read
as follows:
§ 1016.12 Termination of security facility
approval.
Security facility approval will be
terminated when:
(a) There is no longer a need to use,
process, store, reproduce, transmit, or
handle Restricted Data at the facility; or
(b) The DOE makes a determination
that continued security facility approval
is not in the interest of common defense
and security.
The permittee will be notified in
writing of a determination to terminate
facility approval, and the procedures
outlined in § 1016.27 of this part will
apply.
§§ 1016.21 through 1016.23 [Redesignated
as §§ 1016.13 through 1016.15]
11. Sections 1016.21 through 1016.23
are redesignated as §§ 1016.13 through
1016.15 and revised to read as follows:
■
§ 1016.13
storage.
Protection of Restricted Data in
(a) Persons who possess Restricted
Data pursuant to an Access Permit shall
store the Restricted Data classified
matter when not in use in a locked
storage container or DOE-approved
vault to which only persons with
appropriate access authorization and a
need to know the information contained
have access. Storage containers used for
storing classified matter must conform
to U.S. General Services Administration
(GSA) standards and specifications.
E:\FR\FM\16NOP1.SGM
16NOP1
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
(b) Changes of combination: Each
permittee shall change the combination
on locks of his safekeeping equipment
whenever such equipment is placed in
use, whenever an individual knowing
the combination no longer requires
access to the repository as a result of
change in duties or position in the
permittee’s organization, or termination
of employment with the permittee or
whenever the combination has been
subjected to compromise, and in any
event at least once a year. Permittees
shall classify records of combinations
no lower than the highest classification
of the classified matter authorized for
storage in the safekeeping equipment
concerned.
§ 1016.14 Protection of Restricted Data
while in use.
While in use, classified matter
containing Restricted Data shall be
under the direct control of a person with
the appropriate access authorization and
need to know. Unauthorized access to
the Restricted Data shall be precluded.
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
§ 1016.15
Establishment of security areas.
(a) When, because of their nature or
size, it is impracticable to safeguard
classified matter containing Restricted
Data in accordance with the provisions
of §§ 1016.13 and 1016.14, a security
area to protect such classified matter
shall be established.
(b) The following controls shall apply
to security areas:
(1) Security areas shall be separated
from adjacent areas by a physical barrier
designed to prevent entrance into such
areas, and access to the Restricted Data
within the areas, by unauthorized
individuals.
(2) During working hours, admittance
shall be controlled by an appropriately
cleared individual posted at each
unlocked entrance.
(3) During nonworking hours,
admittance shall be controlled by
protective personnel on patrol, with
protective personnel posted at unlocked
entrances, or by such intrusion
detection system as DOE approves.
(4) Each individual authorized to
enter a security area shall be issued a
distinctive badge or pass when the
number of employees assigned to the
area exceeds thirty.
§ 1016.24
[Redesignated as § 1016.16]
12. Section 1016.24 is redesignated as
§ 1016.16.
■
§ 1016.25
[Redesignated as § 1016.17]
13. Section 1016.25 is redesignated as
§ 1016.17 and revised to read as follows:
■
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
§ 1016.17
Protective personnel.
Whenever armed protective personnel
are required in accordance with
§ 1016.15, such protective personnel
shall:
(a) Possess a ‘‘Q’’ or ‘‘L’’ access
authorization or ‘‘Q(X)’’ or ‘‘L(X)’’
access authorization if the Restricted
Data being protected is classified
Confidential, or a ‘‘Q’’ access
authorization or ‘‘Q(X)’’ access
authorization if the Restricted Data
being protected is classified Secret.
(b) Be armed with sidearms of 9mm
or greater.
§§ 1016.31 through 1016.34 [Redesignated
as §§ 1016.18 through 1016.21]
14. Sections 1016.31 through 1016.34
are redesignated as §§ 1016.18 through
1016.21 and revised to read as follows:
■
§ 1016.18
Access to Restricted Data.
(a) Except as DOE may authorize, no
person subject to the regulations in this
part shall permit any individual to have
access to Restricted Data in his
possession unless the individual has an
appropriate access authorization granted
by DOE, or has been certified by DOD
or NASA through DOE, and;
(1) The individual is authorized by an
Access Permit to receive Restricted Data
in the categories involved and the
permittee determines that such access is
required in the course of his duties, or
(2) The individual needs such access
in connection with such duties as a DOE
employee or DOE contractor employee,
or as certified by DOD or NASA.
(b) Inquiries concerning the access
authorization status of individuals, the
scope of Access Permits, or the nature
of contracts should be addressed to the
cognizant DOE or NNSA office.
§ 1016.19 Review, classification and
marking of classified information.
(a) Classification. Restricted Data
generated or possessed by an Access
Permit holder must be appropriately
classified and marked in accordance
with 10 CFR part 1045 or its successor.
CG–DAR–2, ‘‘Guide to the Declassified
Areas of Nuclear Energy Research U 08/
98,’’ will be furnished each permittee. In
the event a permittee originates
classified information which falls
within the definition of Restricted Data
or information for which the permittee
is not positive that the information is
outside of that definition and CG–DAR–
2 does not provide positive
classification guidance for such
information, the permittee shall
designate the information as
Confidential, Restricted Data and
request classification guidance from the
DOE through the Classification Officer
PO 00000
Frm 00006
Fmt 4702
Sfmt 4702
80617
at the cognizant DOE or NNSA office. If
the DOE Classification Officer does not
have authority to provide the guidance,
he will refer the request to the Director,
Office of Classification, AU–60/
Germantown Building, Office of
Environment, Health, Safety and
Security, U.S. Department of Energy,
1000 Independence Avenue SW.,
Washington, DC 20585–1290.
(b) Challenges. If a person receives a
document or other classified matter
which, in his opinion, is not properly
classified, or omits the appropriate
classification markings, he is
encouraged to challenge the
classification and there shall be no
retribution for submitting a challenge.
Challenges shall be submitted in
accordance with 10 CFR part 1045.
(c) Classification markings. Restricted
Data generated or possessed by an
individual approved for access must be
appropriately identified and marked in
accordance with 10 CFR part 1045,
Nuclear Classification and
Declassification. Questions and requests
for additional direction or guidance
regarding the marking of classified
matter may be submitted to the Director,
Office of Classification, AU–60/
Germantown Building, Office of
Environment, Health, Safety and
Security, U.S. Department of Energy,
1000 Independence Avenue SW.,
Washington, DC 20585–1290
§ 1016.20 External transmission of
Restricted Data.
(a) Restrictions. (1) Restricted Data
shall be transmitted only to persons
who possess appropriate access
authorization, need to know, and are
otherwise eligible for access under the
requirements of § 1016.18.
(2) In addition, such classified matter
containing Restricted Data shall be
transmitted only to persons who possess
approved facilities for their physical
security consistent with this part. Any
person subject to the regulations in this
part who transmits such Restricted Data
containing Restricted Data shall be
deemed to have fulfilled his obligations
under this subparagraph by securing a
written certification from the
prospective recipient that such recipient
possesses facilities for its physical
security consistent with this part.
(3) Restricted Data shall not be
exported from the United States without
prior authorization from DOE.
(b) Preparation of documents.
Documents containing Restricted Data
shall be prepared for transmission
outside an individual installation in
accordance with the following:
(1) They shall be enclosed in two
sealed, opaque envelopes or wrappers.
E:\FR\FM\16NOP1.SGM
16NOP1
asabaliauskas on DSK3SPTVN1PROD with PROPOSALS
80618
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 / Proposed Rules
(2) The inner envelope or wrapper
shall be addressed in the ordinary
manner and sealed with tape, the
appropriate classification shall be
marked on both sides of the envelope,
and any additional marking required by
10 CFR part 1045 shall be applied.
(3) The outer envelope or wrapper
shall be addressed in the ordinary
manner. No classification, additional
marking, or other notation shall be
affixed which indicates that the
document enclosed therein contains
classified information or Restricted
Data.
(4) A receipt which identifies the
document, the date of transfer, the
recipient, and the person transferring
the document shall accompany the
document and shall be signed by the
recipient and returned to the sender
whenever the custody of a document
containing Secret Restricted Data is
transferred.
(c) Preparation of other classified
matter. Classified matter, other than
documents, containing Restricted Data
shall be prepared for shipment outside
an individual installation in accordance
with the following:
(1) The classified matter shall be so
packaged that the classified
characteristics will not be revealed.
(2) A receipt which identifies the
classified matter, the date of shipment,
the recipient, and the person
transferring the classified matter shall
accompany the classified matter, and
the recipient shall sign such receipt
whenever the custody of classified
matter containing Secret Restricted Data
is transferred.
(d) Methods of transportation. (1)
Secret classified matter shall be
transported only by one of the following
methods:
(i) By messenger-courier system
specifically created for that purpose and
approved for use by DOE.
(ii) Registered mail.
(iii) By protective services provided
by United States air or surface
commercial carriers under such
conditions as may be preserved by the
DOE.
(iv) Individuals possessing
appropriate DOE access authorization
who have been given written authority
by their employers.
(2) Confidential classified matter may
be transported by one of the methods set
forth in paragraph (d)(1) of this section
or by U.S. first class, express, or
certified mail.
(e) Telecommunication of classified
information. There shall be no
telecommunication of Restricted Data
unless the secure telecommunication
system has been approved by the DOE.
VerDate Sep<11>2014
16:17 Nov 15, 2016
Jkt 241001
§ 1016.21 Accountability for Secret
Restricted Data.
Each permittee possessing classified
matter (including classified matter in
electronic format) containing Secret
Restricted Data shall establish
accountability procedures and shall
maintain logs to document access to and
record comprehensive disposition
information for all such classified
matter that has been in his custody at
any time.
§ 1016.35
[Redesignated as § 1016.22]
15. Section 1016.35 is redesignated as
§ 1016.22.
■
§§ 1016.36 and 1016.37 [Redesignated as
§§ 1016.23 and 1016.24]
16. Sections 1016.36 and 1016.37 are
redesignated as §§ 1016.23 and 1016.24
and revised to read as follows:
■
§ 1016.23
Changes in classification.
Classified matter containing
Restricted Data shall not be downgraded
or declassified except as authorized by
DOE and in accordance with 10 CFR
part 1045.
§ 1016.24 Destruction of classified matter
containing Restricted Data.
Documents containing Restricted Data
may be destroyed by burning, pulping,
or another method that assures complete
destruction of the information which
they contain. Restricted Data contained
in classified matter, other than
documents, may be destroyed only by a
method that assures complete
obliteration, removal, or destruction of
the Restricted Data.
■ 17. Add § 1016.25 to read as follows:
§ 1016.25 Storage, use, processing,
transmission and destruction of classified
information on computers, computer
networks, electronic devices/media and
mobile devices.
Storage, use, processing, and
transmission of Restricted Data on
computers, computer networks,
electronic devices/media and mobile
devices must be approved by DOE.
DOE–approved methods must be used
when destroying classified information
that is in electronic format.
§ 1016.38
[Redesignated as § 1016.26]
18. Section 1016.38 is redesignated as
§ 1016.26.
■
§ 1016.39
[Redesignated as § 1016.27]
19. Section 1016.39 is redesignated as
§ 1016.27 and revised to read as follows:
■
§ 1016.27 Termination, suspension, or
revocation of security facility approval.
(a) In accordance with § 1016.12, if
the need to use, process, store,
reproduce, transmit, or handle classified
PO 00000
Frm 00007
Fmt 4702
Sfmt 4702
matter no longer exists, the security
facility approval will be terminated. The
permittee may deliver all Restricted
Data to the DOE or to a person
authorized to receive them; or the
permittee may destroy all such
Restricted Data. In either case, the
facility must submit a certification of
non-possession of Restricted Data to the
DOE.
(b) In any instance where security
facility approval has been suspended or
revoked based on a determination of the
DOE that further possession of classified
matter by the permittee would endanger
the common defense and national
security, the permittee shall, upon
notice from the DOE, immediately
deliver all Restricted Data to the DOE
along with a certificate of nonpossession of Restricted Data.
§§ 1016.40 through 1016.42 [Redesignated
as §§ 1016.28 through 1016.30]
20. §§ 1016.40 through 1016.42 are
redesignated as §§ 1016.28 through
1016.30.
■
§ 1016.43
[Redesignated as § 1016.31]
21. Section 1016.43 is redesignated as
§ 1016.31 and revised to read as follows:
■
§ 1016.31
Inspections.
The DOE shall make such inspections
and surveys of the premises, activities,
records, and procedures of any person
subject to the regulations in this part as
DOE deems necessary to effectuate the
purposes of the Act, Executive Order
13526, and DOE orders and procedures.
§ 1016.44
[Redesignated as § 1016.32]
22. Section 1016.44 is redesignated as
§ 1016.32.
■
[FR Doc. 2016–27414 Filed 11–15–16; 8:45 am]
BILLING CODE 6450–01–P
DEPARTMENT OF TRANSPORTATION
Federal Aviation Administration
14 CFR Part 71
[Docket No. FAA–2016–9193; Airspace
Docket No. 16–AGL–26]
Proposed Establishment of Class E
Airspace; Wessington Springs, SD
Federal Aviation
Administration (FAA), DOT.
ACTION: Notice of proposed rulemaking
(NPRM).
AGENCY:
This action proposes to
establish Class E airspace at Wessington
Springs, SD. Controlled airspace is
necessary to accommodate new
Standard Instrument Approach
SUMMARY:
E:\FR\FM\16NOP1.SGM
16NOP1
Agencies
[Federal Register Volume 81, Number 221 (Wednesday, November 16, 2016)]
[Proposed Rules]
[Pages 80612-80618]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2016-27414]
========================================================================
Proposed Rules
Federal Register
________________________________________________________________________
This section of the FEDERAL REGISTER contains notices to the public of
the proposed issuance of rules and regulations. The purpose of these
notices is to give interested persons an opportunity to participate in
the rule making prior to the adoption of the final rules.
========================================================================
Federal Register / Vol. 81, No. 221 / Wednesday, November 16, 2016 /
Proposed Rules
[[Page 80612]]
DEPARTMENT OF ENERGY
10 CFR Part 1016
[Docket No. DOE-HQ-2015-0029-0001]
RIN 1992-AA46
Safeguarding of Restricted Data by Access Permittees
AGENCY: Department of Energy.
ACTION: Notice of proposed rulemaking and public hearings.
-----------------------------------------------------------------------
SUMMARY: The Department of Energy (DOE or Department) proposes to
revise its regulations governing the standards for safeguarding
Restricted Data by access permittees. The existing version of this
regulation was promulgated in 1983, which transferred the regulation
(originally promulgated in 1976). Since 1983, changes in organizations,
terminology, and DOE and national policies render portions of the
existing regulation outdated. The proposed revisions would update
existing requirements.
DATES: Written comments must be received by DOE on or before December
16, 2016.
A public meeting will be held if one is requested by November 23,
2016.
ADDRESSES: Written comments should be addressed to: Mr. Matthew B.
Moury, Associate Under Secretary for Environment, Health, Safety and
Security, Office of Environment, Health, Safety and Security, AU-1/
Forrestal Building, Department of Energy, Docket No. DOE-HQ-2015-0029-
0001, 1000 Independence Avenue SW., Washington, DC 20585 or via email
at 1992-AA46@hq.doe.gov. Questions concerning submitting written
comments should be addressed to: Ms. Linda Ruhnow, Office of Security
Policy, Office of Environment, Health, Safety and Security, Department
of Energy, AU-51/Germantown Building, 1000 Independence Avenue SW.,
Washington, DC 20585-1290, (301) 903-4053 or via email at 1992-AA46@hq.doe.gov. Requests to hold a public meeting should be submitted
by phone or email to Ms. Ruhnow at the number or email address
provided. You may submit comments, identified by [DOE-HQ-2015-0029-0001
and/or 1992-AA46], by any of the following methods:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments.
Email: 1992-AA46@hq.doe.gov. Include [DOE-HQ-2015-0029-
0001 and/or 1992-AA46] in the subject line of the message.
Mail: Mailing Address for paper, disk, or CD-ROM
submissions: Department of Energy, Office of Security Policy, (AU-51,
Attn: Linda Ruhnow), 1000 Independence Ave. SW., Washington, DC 20585-
1290.
Hand Delivery/Courier: Street Address: Department of
Energy, Office of Security Policy, (AU-51, Attn: Linda Ruhnow), 1000
Independence Ave. SW., Washington, DC 20585-1290.
As a result of potential delays in the receipt and processing of
mail sent through the U.S. Postal Service, DOE encourages respondents
to submit comments electronically to ensure timely receipt.
Instructions: All submissions received must include the agency name
and docket number or Regulatory Information Number (RIN) for this
rulemaking. All comments received will be posted without change to
https://www.regulations.gov, including any personal information
provided.
Docket: For access to the docket to read background documents or
comments received, go to https://www.regulations.gov/#!docketDetail;D=DOE-HQ-2015-0008 or contact Linda Ruhnow at (301) 903-
4053 prior to visiting Department of Energy, Office of Security Policy,
(AU-51), 19901 Germantown Rd., Germantown, MD 20874.
FOR FURTHER INFORMATION CONTACT: Ms. Linda Ruhnow, Office of Security
Policy at (301) 903-4053; Linda.Ruhnow@hq.doe.gov.
SUPPLEMENTARY INFORMATION:
I. Background
II. Section by Section Analysis
III. Regulatory Review and Procedural Requirements
A. Review Under Executive Order 12866
B. Review Under the Regulatory Flexibility Act
C. Review Under Paperwork Reduction Act
D. Review Under the National Environmental Policy Act
E. Review Under Executive Order 13132
F. Review Under Executive Order 12988
G. Review Under the Unfunded Mandates Reform Act of 1995
H. Review Under Executive Order 13211
I. Review Under the Treasury and General Government
Appropriations Act of 1999
IV. Opportunity for Public Comment
I. Background
The U.S. Department of Energy may issue an access permit to any
person, as set forth in 10 CFR part 725, who requires access to
Restricted Data applicable to civil uses of atomic energy for use in
his/her business, trade or profession. 10 CFR part 725 specifies the
terms and conditions under which the Department will issue an access
permit and provides for the amendment, renewal, suspension, termination
and revocation of an access permit.
The regulations in 10 CFR part 1016 establish requirements for the
safeguarding of Secret and Confidential Restricted Data received or
developed under an access permit. This part does not apply to Top
Secret information because no such information may be provided to an
access permittee within the scope of this regulation. The regulations
in this part apply to all persons who may require access to Restricted
Data used, processed, stored, reproduced, transmitted, or handled in
connection with an access permit.
The original regulations for the safeguarding of Restricted Data
were Atomic Energy Commission regulations that were transferred to the
Energy Research and Development Administration (ERDA) upon its
formation in 1974 (Energy Reorganization Act of 1974; Pub. L. 93-438).
The regulations were subsequently revised to conform to ERDA's
organization (41 FR 56775, 56785-56788, Dec. 30, 1976). The regulations
were updated and transferred from 10 CFR part 795 to 10 CFR part 1016
in 1983. (48 FR 36432 (Aug. 10, 1983). DOE has developed the proposed
modifications to 10 CFR part 1016 to reflect organizational,
terminology and policy changes that have occurred since the regulations
were last revised.
The proposed modifications to the sections of 10 CFR part 1016 that
DOE proposes to amend are described in the Section by Section Analysis
in section II.
[[Page 80613]]
II. Section by Section Analysis
The heading for this part would be revised to Safeguarding of
Restricted Data by Access Permittees. The revision is intended to more
accurately reflect the contents of the regulation.
Subpart A--General
In Sec. 1016.3, Definitions, DOE proposes to delete the term
``Authorized classifier''. Instead, 10 CFR part 1045 would be
referenced as the source of classification requirements.
The terms ``Document'', ``Material'' and ``Matter'' would be
deleted because they are not used in any unique way in this regulation.
The access authorization terms Q, Q(X), L and L(X) would be updated
to specify the type of background investigation required. For example,
single scope background investigations are required for Q access
authorizations.
The term ``classified mail address'' would be revised for better
grammar.
The term ``classified matter'' would be revised to include all
documents, material, electronic media and other physical forms that
reveal or contain classified information.
The term ``infraction'' would be revised to include non-compliance
with DOE approvals.
The term ``intrusion alarm'' would be revised to ``intrusion
detection system'' and updated for more accurate usage consistent with
current DOE policy.
The term ``National Security Information'' would be revised for
consistency with Executive Order 13526, Classified National Security
Information.
The term ``Security Plan'' would be revised to clarify that matter
refers to classified matter.
Proposed changes for Sec. 1016.4 would revise the addressee from
the ``Chief Health, Safety and Security Officer'', to the ``Associate
Under Secretary of Environment, Health, Safety and Security'' to
address a recent reorganization.
Proposed changes for Sec. 1016.5 would require that procedures
submitted pursuant to this section ensure that access permit holder
employees are informed about classification and declassification
requirements in 10 CFR part 1045.
DOE proposes to change the title of Sec. 1016.8 to clarify the
section topic.
The proposed changes for Sec. 1016.9 and Sec. 1016.10 revise
grammar.
The proposed changes for Sec. 1016.11 would revise ``DOE
Operations Office'' to ``the cognizant DOE office'' to direct
notification to the relevant DOE Element.
The proposed changes for Sec. 1016.12 would update reference to
reflect the proposed renumbering of current Sec. 1016.39.
DOE proposes to renumber Sec. Sec. 1016.21--1016.44 to eliminate
the gaps in section numbering that exist in the current version of this
regulation.
The renumbered Sec. 1016.13, currently Sec. 1016.21, would be
revised to maintain consistency with current national and U.S.
Department of Energy policies that no longer allows storage of
classified matter in a locked steel file cabinet.
Proposed changes to the renumbered Sec. 1016.14, currently Sec.
1016.22, would clarify that a person must have need-to-know in addition
to the appropriate access authorization. This revision does not change
the intent of the requirement for protecting Restricted Data that is in
use.
Proposed changes to the renumbered Sec. 1016.15, currently Sec.
1016.23, would update intrusion detection system terminology consistent
with DOE policy and delete the word ``may''.
Proposed changes to the renumbered Sec. 1016.17, currently Sec.
1016.25, would update the weapon specification to match current DOE
policy. DOE Order 473.3, Protection Program Operations lists DOE-
authorized firearms.
Proposed changes to the renumbered Sec. 1016.18, currently Sec.
1016.31, would apply the need-to-know criterion for Confidential as
well as Secret Restricted Data.
Proposed changes to the renumbered Sec. 1016.19, currently Sec.
1016.32, would align requirements and terminology with 10 CFR part
1045, Nuclear Classification and Declassification. Also, the title
would be changed to more accurately reflect the section and the
``Office of Health, Safety and Security'' would be replaced with
``Office of Environment, Health, Safety and Security''.
Proposed changes to the renumbered Sec. 1016.20, currently Sec.
1016.33, would specify need-to-know as a basic criteria for determining
access; indicate required approvals and remove the telephone statement
because it is a subset of the telecommunication statement.
Proposed changes to the renumbered Sec. 1016.21, currently Sec.
1016.34, would reflect that classified matter (including matter in
electronic format) containing Secret Restricted Data requires
accountability.
Proposed changes to the renumbered Sec. 1016.23, currently Sec.
1016.36, would make changes in classification subject to the
requirements in 10 CFR part 1045, Nuclear Classification and
Declassification.
Proposed changes to the renumbered Sec. 1016.24, currently Sec.
1016.37, would amend the title to replace ``documents or material''
with ``classified matter'' and would delete provisions that are
duplicative with the renumbered Sec. 1016.21 regarding accountability
of classified matter that contains Restricted Data.
Proposed new Sec. 1016.25, Storage, use, processing, transmission
and destruction of classified information on computers, computer
networks, electronic devices/media, and mobile devices, would be added
to include additional direction regarding newer forms of media
(electronic) that may contain Restricted Data.
Proposed changes to the renumbered Sec. 1016.27, currently Sec.
1016.39 would clarify that termination of the security facility
approval will be in accordance with the requirements in this part.
Proposed changes to the renumbered Sec. 1016.31, currently Sec.
1016.43, would update the reference to Executive Order 13526.
Throughout the proposed changes, the term ``classified matter'' is
used so as to include documents and material.
III. Rulemaking Requirements
A. Review Under Executive Order 12866
This action does not constitute a ``significant regulatory action''
as defined in section 3(f) of Executive Order 12866, ``Regulatory
Planning and Review'' (58 FR 51735).
B. Review Under the Regulatory Flexibility Act
The Regulatory Flexibility Act (5 U.S.C. 601 et seq.) requires
preparation of a regulatory flexibility analysis for any rule that by
law must be proposed for public comment, unless the agency certifies
that the rule, if promulgated, will not have a significant economic
impact on a substantial number of small entities. As required by
Executive Order 13272, ``Proper Consideration of Small Entities in
Agency Rulemaking'' (67 FR 53461, Aug. 16, 2002), DOE published
procedures and policies on February 19, 2003, to ensure that the
potential impacts of its rules on small entities are properly
considered during the rulemaking process. DOE has made its procedures
and policies available on the Office of the General Counsel's Web site
(www.gc.doe.gov).
DOE has reviewed this proposed rule under the Regulatory
Flexibility Act and certifies that, if adopted, the rule would not have
a significant impact on a substantial number of small entities. This
proposed action would amend an existing rule which establishes
[[Page 80614]]
safeguarding of Restricted Data by persons granted an Access Permit
according to 10 CFR part 725. The rule would only apply to Access
Permittees, of which there are historically very few (e.g., between
zero and five), and the proposed changes are administrative changes
(such as renumbering of several parts and changing office names to
reflect a recent reorganization), updates to enable consistency with
current policies and practices, and clarification of requirements.
Because these standards and requirements consist of clarifications
and updates to existing standards and requirements, DOE does not expect
that the impact on any Access Permittees would be significant. DOE
seeks comment on its estimate of the number of small entities and the
expected effects of this proposed rule.
For the above reasons, DOE certifies that the proposed rule, if
adopted, will not have a significant economic impact on a substantial
number of small entities.
C. Review Under Paperwork Reduction Act
This proposed rule does not contain a collection of information
subject to OMB approval under the Paperwork Reduction Act.
D. Review Under the National Environmental Policy Act
This proposed rule amends existing policies and procedures
establishing safeguarding of Restricted Data standards and requirements
for Access Permittees and has no significant environmental impact.
Consequently, the Department has determined that this rule is covered
under Categorical Exclusion A-5, of Appendix A to Subpart D, 10 CFR
part 1021, which applies to a rulemaking that addresses amending an
existing rule or regulation that does not change the environmental
effect of the rule or regulation being amended. Accordingly, neither an
environmental assessment nor an environmental impact statement is
required.
E. Review Under Executive Order 13132
Executive Order 13132, ``Federalism,'' (64 FR 43255, August 4,
1999), imposes certain requirements on agencies formulating and
implementing policies or regulations that preempt State law or that
have federalism implications. Agencies are required to develop a formal
process to ensure meaningful and timely input by State and local
officials in the development of regulatory policies that have
``federalism implications.'' Policies that have federalism implications
are defined in the Executive Order to include regulations that have
``substantial direct effects on the States, on the relationship between
the national government and the States, or on the distribution of power
and responsibilities among the various levels of government.'' On March
7, 2011, DOE published a statement of policy describing the
intergovernmental consultation process it will follow in the
development of such regulations (65 FR 13735, March 14, 2000).
DOE has examined the proposed and revised rule and has determined
that it does not have a substantial direct effect on the States, on the
relationship between the national government and the States, or on the
distribution of power and responsibilities among the various levels of
government. No further action is required by Executive Order 13132.
F. Review Under Executive Order 12988
Section 3 of Executive Order 12988, (61 FR 4729, February 7, 1996),
instructs each agency to adhere to certain requirements in promulgating
new regulations. These requirements, set forth in section 3(a) and (b),
include eliminating drafting errors and needless ambiguity, drafting
the regulations to minimize litigation, providing clear and certain
legal standards for affected legal conduct, and promoting
simplification and burden reduction. Agencies are also instructed to
make every reasonable effort to ensure that the regulation describes
any administrative proceeding to be available prior to judicial review
and any provisions for the exhaustion of administrative remedies. The
Department has determined that this regulatory action meets the
requirements of section 3(a) and (b) of Executive Order 12988.
G. Review Under the Unfunded Mandates Reform Act of 1995
Title II of the Unfunded Mandates Reform Act of 1995 (UMRA)
requires each Federal agency to assess the effects of Federal
regulatory action on state, local and tribal governments and the
private sector. For proposed regulatory actions likely to result in a
rule that may cause expenditures by State, local, and Tribal
governments, in the aggregate, or by the private sector of $100 million
or more in any one year (adjusted annually for inflation), section 202
of UMRA requires a Federal agency to publish estimates of the resulting
costs, benefits, and other effects on the national economy. UMRA also
requires Federal agencies to develop an effective process to permit
timely input by elected officers of State, local, and Tribal
governments on a proposed ``significant intergovernmental mandate.'' In
addition, UMRA requires an agency plan for giving notice and
opportunity for timely input to small governments that may be affected
before establishing a requirement that might significantly or uniquely
affect them. On March 18, 1997, DOE published a statement of policy on
its process for intergovernmental consultation under UMRA (62 FR 12820,
March 18, 1997). (This policy is also available at https://www.gc.doe.gov). This proposed rule contains neither an
intergovernmental mandate, nor a mandate that may result in the
expenditure of $100 million or more in any year, so these requirements
do not apply.
H. Review Under Executive Order 13211
Executive Order 13211, ``Actions Concerning Regulations That
Significantly Affect Energy Supply, Distribution, or Use,'' (66 FR
28355, May 22, 2001) requires Federal agencies to prepare and submit to
the Office of Information and Regulatory Affairs (OIRA), Office of
Management and Budget, a Statement of Energy Effects for any proposed
significant energy action. A ``significant energy action'' is defined
as any action by an agency that promulgates or is expected to lead to
the promulgation of a final rule, and that: (1) Is a significant
regulatory action under Executive Order 12866, or any successor order;
and (2) is likely to have a significant adverse effect on the supply,
distribution, or use of energy; or (3) is designated by the
Administrator of OIRA as a significant energy action. For any proposed
significant energy action, the agency must give a detailed statement of
any adverse effects on energy supply, distribution, or use should the
proposal be implemented, and of reasonable alternates to the action and
their expected benefits on energy supply, distribution, and use.
This proposed rule is not a significant energy action, nor has it
been designated as such by the Administrator of OIRA. Accordingly, DOE
has not prepared a Statement of Energy Effects.
I. Review Under the Treasury and General Government Appropriations Act,
1999
Section 654 of the Treasury and General Government Appropriations
Act, 1999 (Pub. L. 105-277) requires Federal agencies to issue a Family
Policymaking Assessment for any proposed rule or policy that may affect
family well-being. This proposed rule would not have any impact on the
autonomy or integrity of the family as
[[Page 80615]]
an institution. Accordingly, DOE has concluded that it is not necessary
to prepare a Family Policymaking Assessment.
IV. Opportunity for Public Comment
A. Participation in Rulemaking
DOE encourages the maximum level of public participation in this
rulemaking. Interested persons are encouraged to participate in the
public hearings at the times and places indicated at the beginning of
this proposed rulemaking.
DOE has established a period of thirty days following publication
of this proposed rulemaking for persons and organizations to comment.
All public comments, hearing transcripts, and other docket material
will be available for review and copying at the DOE offices at each of
the hearing sites. The docket material will be filed under ``DOE-HQ-
2015-0029-0001.''
B. Written Comment Procedures
Interested persons are invited to participate in this proceeding by
submitting written data, views or arguments with respect to the
subjects set forth in this proposed rulemaking. Instructions for
submitting written comments are set forth at the beginning of this
notice and below. Where possible, comments should identify the specific
section they address.
Comments should be labeled both on the envelope and on the
documents, ``Docket No. DOE-HQ-2015-0029-0001'' and must be received by
the date specified at the beginning of this proposed rulemaking. All
comments and other relevant information received by the date specified
at the beginning of this proposed rulemaking will be considered by DOE
in the subsequent stages of the rulemaking process.
Pursuant to the provisions of 10 CFR part 1004, any person
submitting information or data that is believed to be confidential and
exempt by law from public disclosure should submit one complete copy of
the document and three copies, if possible, from which the information
believed to be confidential has been deleted. DOE will make its own
determination with regard to the confidential status of the information
or data and treat it according to its determination.
C. Public Hearings
The dates, times and places of the public hearings are indicated at
the beginning of this proposed rulemaking. DOE invites any person or
organization who has an interest in these proceedings to make a request
to make an oral presentation at one of the public hearings. Requests
can be phoned in advance to the telephone number indicated at the
beginning of this proposed rulemaking. The person making the request
should provide a telephone number where he or she may be contacted.
DOE reserves the right to schedule the presentations, and to
establish the procedures governing the conduct of the hearings.
A DOE official will be designated to preside at the hearings and
ask questions. Any necessary procedural rules regarding proper conduct
of the hearings will be determined by the presiding official.
Transcripts of the hearings will be made and the entire record of
this rulemaking, including the transcripts, will be retained by DOE and
made available for inspection and copying as provided at the beginning
of this proposed rulemaking as well as being posted on
www.regulations.gov under Docket Number DOE-HQ-2015-0029-0001. Any
person may also purchase a copy of a transcript from the transcribing
reporter.
List of Subjects in 10 CFR Part 1016
Classified information, Nuclear energy, Reporting and recordkeeping
requirements, Security measures.
Issued in Washington, DC, on November 1, 2016.
Matthew B. Moury,
Associate Under Secretary for Environment, Health, Safety and Security.
For the reasons set out in the preamble, DOE proposes to amend part
1016 of title 10 of the Code of Federal Regulations as set forth below:
PART 1016--SAFEGUARDING OF RESTRICTED DATA BY ACCESS PERMITTEES
0
1. The authority citation for part 1016 continues to read as follows:
Authority: Sec. 161i of the Atomic Energy Act of 1954, 68 Stat.
948 (42 U.S.C. 2201).
0
2. The part heading for part 1016 is revised as set forth above.
0
3. Section 1016.3 is amended by:
0
a. Revising paragraph (a).
0
b. Removing paragraphs (c).
0
c. Redesignating paragraphs (d) and (e) as paragraphs (c) and (d),
respectively.
0
d. Revising newly designated paragraphs (c) and (d).
0
e. Redesignating paragraphs (f) and (g) as paragraphs (e) and (f),
respectively.
0
f. Removing paragraph (h).
0
g. Redesignating paragraphs (i) through (k) as paragraphs (g) through
(i), respectively.
0
h. Revising newly designated paragraphs (h) and (i).
0
i. Removing paragraphs (l) and (m).
0
j. Redesignating paragraphs (n) through (z) as paragraphs (j) through
(v), respectively.
0
k. Revising newly designated paragraphs (k) and (u).
The revisions read as follows:
Sec. 1016.3 Definitions.
(a) Access authorization. An administrative determination by DOE
that an individual who is either a DOE employee, applicant for
employment, consultant, assignee, other Federal department or agency
employee (or other persons who may be designated by the Secretary of
Energy), or a DOE contractor or subcontractor employee, or an access
permittee is eligible for access to Restricted Data. Access
authorizations granted by DOE are designated as ``Q,'' ``Q(X),'' ``L,''
or ``L(X).''
(1) ``Q'' access authorizations are based upon single scope
background investigations as set forth in applicable DOE and national-
level directives. They permit an individual who has ``need to know''
access to Top Secret, Secret and Confidential Restricted Data, Formerly
Restricted Data, National Security Information, or special nuclear
material in Category I or II quantities as required in the performance
of duties, subject to additional determination that permitting this
access will not endanger the common defense or national security of the
United States. There may be additional requirements for access to
specific types of RD information.
(2) ``Q(X)'' access authorizations are based upon the same level of
investigation required for a Q access authorization when ``Q'' access
authorizations are granted to access permittees they are identified as
``Q(X)'' access authorizations and, as need-to-know applies, authorize
access only to the type of Secret Restricted Data as specified in the
permit and consistent with appendix A, 10 CFR part 725, ``Categories of
Restricted Data Available.''
(3) ``L'' access authorizations are based upon National Agency
Check with Local Agency Checks and Credit Check background
investigation as set forth in applicable DOE and national-level
directives. They permit an individual who has ``need to know'' access
to Confidential Restricted Data, Secret and Confidential Formerly
Restricted Data, or Secret and Confidential National Security
Information, required in the performance of duties, provided such
information is not designated
[[Page 80616]]
``CRYPTO'' (classified cryptographic information), other classified
communications security (``COMSEC'') information, or intelligence
information and subject to additional determination that permitting
this access will not endanger the common defense or national security
of the United States. There may be additional requirements for access
to specific types of RD information.
(4) ``L(X)'' access authorizations are based upon the same level of
investigation required for an L access authorization When ``L'' access
authorizations are granted to access permittees, they are identified as
``L(X)'' access authorizations and, as need to know applies, authorize
access only to the type of Confidential Restricted Data as specified in
the permit and consistent with appendix A, 10 CFR part 725,
``Categories of Restricted Data Available.''
* * * * *
(c) Classified mail address. A mail address established for each
access permittee and approved by the DOE to be used when sending
Restricted Data to the permittee.
(d) Classified matter. Anything in physical form (including, but
not limited to documents and material) that contains or reveals
classified information.
* * * * *
(h) Infraction. An act or omission involving failure to comply with
DOE safeguards and security orders, directives, or approvals and may
include a violation of law.
(i) Intrusion detection system. A security system consisting of
sensors capable of detecting one or more types of phenomena, signal
media, annunciators, energy sources, alarm assessment systems, and
alarm reporting elements including alarm communications and information
display equipment.
* * * * *
(k) National Security Information. Information that has been
determined pursuant to Executive Order 13526, as amended ``Classified
National Security Information'' or any predecessor or successor order
to require protection against unauthorized disclosure and is marked to
indicate its classified status when in documentary form.
(u) Security Plan. A written plan by the access permittee, and
submitted to the DOE for approval, which outlines the permittee's
proposed security procedures and controls for the protection of
Restricted Data and which includes a floor plan of the area in which
the classified matter is to be used, processed, stored, reproduced,
transmitted, or handled.
* * * * *
0
4. Section 1016.4 is revised to read as follows:
Sec. 1016.4 Communications.
Communications concerning rulemaking, i.e., petition to change part
1016, should be addressed to the Associate Under Secretary, Office of
Environment, Health, Safety and Security, AU-1/Forrestal Building,
Office of Environment, Health, Safety and Security, U.S. Department of
Energy, 1000 Independence Avenue SW., Washington, DC 20585. All other
communications concerning the regulations in this part should be
addressed to the cognizant DOE or National Nuclear Security
Administration (NNSA) office.
0
5. Section 1016.5 is revised to read as follows:
Sec. 1016.5 Submission of procedures by access permit holder.
No access permit holder shall have access to Restricted Data until
he has submitted to the DOE a written statement of his procedures for
the safeguarding of Restricted Data and for the security education of
his employees, and DOE shall have determined and informed the permittee
that his procedures for the safeguarding of Restricted Data are in
compliance with the regulations in this part and that his procedures
for the security education of his employees, who will have access to
Restricted Data, are informed about and understand the regulations in
this part. These procedures must ensure that employees with access to
Restricted Data are informed about and understand who is authorized or
required to classify and declassify RD and FRD information and
classified matter as well as how documents containing RD or FRD are
marked (see 10 CFR part 1045) and safeguarded.
0
6. The section heading for Sec. 1016.8 is revised to read as follows:
Sec. 1016.8 Request for security facility approval.
0
7. Section 1016.9 is revised to read as follows:
Sec. 1016.9 Processing security facility approval.
Following receipt of an acceptable request for security facility
approval, the DOE will perform an initial security survey of the
permittee's facility to determine that granting a security facility
approval would be consistent with the national security. If DOE makes
such a determination, security facility approval will be granted. If
not, security facility approval will be withheld pending compliance
with the security survey recommendations or until a waiver is granted
pursuant to Sec. 1016.6 of this part.
0
8. Section 1016.10 is revised to read as follows:
Sec. 1016.10 Granting, denial, or suspension of security facility
approval.
Notification of the DOE's granting, denial, or suspension of
security facility approval will be furnished the permittee in writing,
or orally with written confirmation. This information may also be
furnished to representatives of the DOE, DOE contractors, or other
Federal agencies having a need to transmit Restricted Data to the
permittee.
0
9. Section 1016.11 is revised to read as follows:
Sec. 1016.11 Cancellation of requests for security facility
approval.
When a request for security facility approval is to be withdrawn or
cancelled, the cognizant DOE Office will be notified by the requester
immediately by telephone and confirmed in writing so that processing of
this approval may be terminated.
0
10. Section 1016.12 is revised to read as follows:
Sec. 1016.12 Termination of security facility approval.
Security facility approval will be terminated when:
(a) There is no longer a need to use, process, store, reproduce,
transmit, or handle Restricted Data at the facility; or
(b) The DOE makes a determination that continued security facility
approval is not in the interest of common defense and security.
The permittee will be notified in writing of a determination to
terminate facility approval, and the procedures outlined in Sec.
1016.27 of this part will apply.
Sec. Sec. 1016.21 through 1016.23 [Redesignated as Sec. Sec. 1016.13
through 1016.15]
0
11. Sections 1016.21 through 1016.23 are redesignated as Sec. Sec.
1016.13 through 1016.15 and revised to read as follows:
Sec. 1016.13 Protection of Restricted Data in storage.
(a) Persons who possess Restricted Data pursuant to an Access
Permit shall store the Restricted Data classified matter when not in
use in a locked storage container or DOE-approved vault to which only
persons with appropriate access authorization and a need to know the
information contained have access. Storage containers used for storing
classified matter must conform to U.S. General Services Administration
(GSA) standards and specifications.
[[Page 80617]]
(b) Changes of combination: Each permittee shall change the
combination on locks of his safekeeping equipment whenever such
equipment is placed in use, whenever an individual knowing the
combination no longer requires access to the repository as a result of
change in duties or position in the permittee's organization, or
termination of employment with the permittee or whenever the
combination has been subjected to compromise, and in any event at least
once a year. Permittees shall classify records of combinations no lower
than the highest classification of the classified matter authorized for
storage in the safekeeping equipment concerned.
Sec. 1016.14 Protection of Restricted Data while in use.
While in use, classified matter containing Restricted Data shall be
under the direct control of a person with the appropriate access
authorization and need to know. Unauthorized access to the Restricted
Data shall be precluded.
Sec. 1016.15 Establishment of security areas.
(a) When, because of their nature or size, it is impracticable to
safeguard classified matter containing Restricted Data in accordance
with the provisions of Sec. Sec. 1016.13 and 1016.14, a security area
to protect such classified matter shall be established.
(b) The following controls shall apply to security areas:
(1) Security areas shall be separated from adjacent areas by a
physical barrier designed to prevent entrance into such areas, and
access to the Restricted Data within the areas, by unauthorized
individuals.
(2) During working hours, admittance shall be controlled by an
appropriately cleared individual posted at each unlocked entrance.
(3) During nonworking hours, admittance shall be controlled by
protective personnel on patrol, with protective personnel posted at
unlocked entrances, or by such intrusion detection system as DOE
approves.
(4) Each individual authorized to enter a security area shall be
issued a distinctive badge or pass when the number of employees
assigned to the area exceeds thirty.
Sec. 1016.24 [Redesignated as Sec. 1016.16]
0
12. Section 1016.24 is redesignated as Sec. 1016.16.
Sec. 1016.25 [Redesignated as Sec. 1016.17]
0
13. Section 1016.25 is redesignated as Sec. 1016.17 and revised to
read as follows:
Sec. 1016.17 Protective personnel.
Whenever armed protective personnel are required in accordance with
Sec. 1016.15, such protective personnel shall:
(a) Possess a ``Q'' or ``L'' access authorization or ``Q(X)'' or
``L(X)'' access authorization if the Restricted Data being protected is
classified Confidential, or a ``Q'' access authorization or ``Q(X)''
access authorization if the Restricted Data being protected is
classified Secret.
(b) Be armed with sidearms of 9mm or greater.
Sec. Sec. 1016.31 through 1016.34 [Redesignated as Sec. Sec. 1016.18
through 1016.21]
0
14. Sections 1016.31 through 1016.34 are redesignated as Sec. Sec.
1016.18 through 1016.21 and revised to read as follows:
Sec. 1016.18 Access to Restricted Data.
(a) Except as DOE may authorize, no person subject to the
regulations in this part shall permit any individual to have access to
Restricted Data in his possession unless the individual has an
appropriate access authorization granted by DOE, or has been certified
by DOD or NASA through DOE, and;
(1) The individual is authorized by an Access Permit to receive
Restricted Data in the categories involved and the permittee determines
that such access is required in the course of his duties, or
(2) The individual needs such access in connection with such duties
as a DOE employee or DOE contractor employee, or as certified by DOD or
NASA.
(b) Inquiries concerning the access authorization status of
individuals, the scope of Access Permits, or the nature of contracts
should be addressed to the cognizant DOE or NNSA office.
Sec. 1016.19 Review, classification and marking of classified
information.
(a) Classification. Restricted Data generated or possessed by an
Access Permit holder must be appropriately classified and marked in
accordance with 10 CFR part 1045 or its successor. CG-DAR-2, ``Guide to
the Declassified Areas of Nuclear Energy Research U 08/98,'' will be
furnished each permittee. In the event a permittee originates
classified information which falls within the definition of Restricted
Data or information for which the permittee is not positive that the
information is outside of that definition and CG-DAR-2 does not provide
positive classification guidance for such information, the permittee
shall designate the information as Confidential, Restricted Data and
request classification guidance from the DOE through the Classification
Officer at the cognizant DOE or NNSA office. If the DOE Classification
Officer does not have authority to provide the guidance, he will refer
the request to the Director, Office of Classification, AU-60/Germantown
Building, Office of Environment, Health, Safety and Security, U.S.
Department of Energy, 1000 Independence Avenue SW., Washington, DC
20585-1290.
(b) Challenges. If a person receives a document or other classified
matter which, in his opinion, is not properly classified, or omits the
appropriate classification markings, he is encouraged to challenge the
classification and there shall be no retribution for submitting a
challenge. Challenges shall be submitted in accordance with 10 CFR part
1045.
(c) Classification markings. Restricted Data generated or possessed
by an individual approved for access must be appropriately identified
and marked in accordance with 10 CFR part 1045, Nuclear Classification
and Declassification. Questions and requests for additional direction
or guidance regarding the marking of classified matter may be submitted
to the Director, Office of Classification, AU-60/Germantown Building,
Office of Environment, Health, Safety and Security, U.S. Department of
Energy, 1000 Independence Avenue SW., Washington, DC 20585-1290
Sec. 1016.20 External transmission of Restricted Data.
(a) Restrictions. (1) Restricted Data shall be transmitted only to
persons who possess appropriate access authorization, need to know, and
are otherwise eligible for access under the requirements of Sec.
1016.18.
(2) In addition, such classified matter containing Restricted Data
shall be transmitted only to persons who possess approved facilities
for their physical security consistent with this part. Any person
subject to the regulations in this part who transmits such Restricted
Data containing Restricted Data shall be deemed to have fulfilled his
obligations under this subparagraph by securing a written certification
from the prospective recipient that such recipient possesses facilities
for its physical security consistent with this part.
(3) Restricted Data shall not be exported from the United States
without prior authorization from DOE.
(b) Preparation of documents. Documents containing Restricted Data
shall be prepared for transmission outside an individual installation
in accordance with the following:
(1) They shall be enclosed in two sealed, opaque envelopes or
wrappers.
[[Page 80618]]
(2) The inner envelope or wrapper shall be addressed in the
ordinary manner and sealed with tape, the appropriate classification
shall be marked on both sides of the envelope, and any additional
marking required by 10 CFR part 1045 shall be applied.
(3) The outer envelope or wrapper shall be addressed in the
ordinary manner. No classification, additional marking, or other
notation shall be affixed which indicates that the document enclosed
therein contains classified information or Restricted Data.
(4) A receipt which identifies the document, the date of transfer,
the recipient, and the person transferring the document shall accompany
the document and shall be signed by the recipient and returned to the
sender whenever the custody of a document containing Secret Restricted
Data is transferred.
(c) Preparation of other classified matter. Classified matter,
other than documents, containing Restricted Data shall be prepared for
shipment outside an individual installation in accordance with the
following:
(1) The classified matter shall be so packaged that the classified
characteristics will not be revealed.
(2) A receipt which identifies the classified matter, the date of
shipment, the recipient, and the person transferring the classified
matter shall accompany the classified matter, and the recipient shall
sign such receipt whenever the custody of classified matter containing
Secret Restricted Data is transferred.
(d) Methods of transportation. (1) Secret classified matter shall
be transported only by one of the following methods:
(i) By messenger-courier system specifically created for that
purpose and approved for use by DOE.
(ii) Registered mail.
(iii) By protective services provided by United States air or
surface commercial carriers under such conditions as may be preserved
by the DOE.
(iv) Individuals possessing appropriate DOE access authorization
who have been given written authority by their employers.
(2) Confidential classified matter may be transported by one of the
methods set forth in paragraph (d)(1) of this section or by U.S. first
class, express, or certified mail.
(e) Telecommunication of classified information. There shall be no
telecommunication of Restricted Data unless the secure
telecommunication system has been approved by the DOE.
Sec. 1016.21 Accountability for Secret Restricted Data.
Each permittee possessing classified matter (including classified
matter in electronic format) containing Secret Restricted Data shall
establish accountability procedures and shall maintain logs to document
access to and record comprehensive disposition information for all such
classified matter that has been in his custody at any time.
Sec. 1016.35 [Redesignated as Sec. 1016.22]
0
15. Section 1016.35 is redesignated as Sec. 1016.22.
Sec. Sec. 1016.36 and 1016.37 [Redesignated as Sec. Sec. 1016.23 and
1016.24]
0
16. Sections 1016.36 and 1016.37 are redesignated as Sec. Sec. 1016.23
and 1016.24 and revised to read as follows:
Sec. 1016.23 Changes in classification.
Classified matter containing Restricted Data shall not be
downgraded or declassified except as authorized by DOE and in
accordance with 10 CFR part 1045.
Sec. 1016.24 Destruction of classified matter containing Restricted
Data.
Documents containing Restricted Data may be destroyed by burning,
pulping, or another method that assures complete destruction of the
information which they contain. Restricted Data contained in classified
matter, other than documents, may be destroyed only by a method that
assures complete obliteration, removal, or destruction of the
Restricted Data.
0
17. Add Sec. 1016.25 to read as follows:
Sec. 1016.25 Storage, use, processing, transmission and destruction
of classified information on computers, computer networks, electronic
devices/media and mobile devices.
Storage, use, processing, and transmission of Restricted Data on
computers, computer networks, electronic devices/media and mobile
devices must be approved by DOE. DOE-approved methods must be used when
destroying classified information that is in electronic format.
Sec. 1016.38 [Redesignated as Sec. 1016.26]
0
18. Section 1016.38 is redesignated as Sec. 1016.26.
Sec. 1016.39 [Redesignated as Sec. 1016.27]
0
19. Section 1016.39 is redesignated as Sec. 1016.27 and revised to
read as follows:
Sec. 1016.27 Termination, suspension, or revocation of security
facility approval.
(a) In accordance with Sec. 1016.12, if the need to use, process,
store, reproduce, transmit, or handle classified matter no longer
exists, the security facility approval will be terminated. The
permittee may deliver all Restricted Data to the DOE or to a person
authorized to receive them; or the permittee may destroy all such
Restricted Data. In either case, the facility must submit a
certification of non-possession of Restricted Data to the DOE.
(b) In any instance where security facility approval has been
suspended or revoked based on a determination of the DOE that further
possession of classified matter by the permittee would endanger the
common defense and national security, the permittee shall, upon notice
from the DOE, immediately deliver all Restricted Data to the DOE along
with a certificate of non-possession of Restricted Data.
Sec. Sec. 1016.40 through 1016.42 [Redesignated as Sec. Sec. 1016.28
through 1016.30]
0
20. Sec. Sec. 1016.40 through 1016.42 are redesignated as Sec. Sec.
1016.28 through 1016.30.
Sec. 1016.43 [Redesignated as Sec. 1016.31]
0
21. Section 1016.43 is redesignated as Sec. 1016.31 and revised to
read as follows:
Sec. 1016.31 Inspections.
The DOE shall make such inspections and surveys of the premises,
activities, records, and procedures of any person subject to the
regulations in this part as DOE deems necessary to effectuate the
purposes of the Act, Executive Order 13526, and DOE orders and
procedures.
Sec. 1016.44 [Redesignated as Sec. 1016.32]
0
22. Section 1016.44 is redesignated as Sec. 1016.32.
[FR Doc. 2016-27414 Filed 11-15-16; 8:45 am]
BILLING CODE 6450-01-P