82_FR_3226 82 FR 3219 - National Industrial Security Program

82 FR 3219 - National Industrial Security Program

NATIONAL ARCHIVES AND RECORDS ADMINISTRATION
Information Security Oversight Office

Federal Register Volume 82, Issue 7 (January 11, 2017)

Page Range3219-3232
FR Document2017-00152

The Information Security Oversight Office (ISOO) of the National Archives and Records Administration (NARA), proposes to revise the National Industrial Security Program (NISP) Directive. The NISP safeguards classified information the Federal Government or foreign governments release to contractors, licensees, grantees, and certificate holders. This proposed revision adds provisions incorporating executive branch insider threat policy and minimum standards, identifies the Office of the Director of National Intelligence (ODNI) and the Department of Homeland Security (DHS) as new cognizant security agencies (CSAs), and adds responsibilities for all CSAs and non-CSA departments and agencies (to reflect oversight functions that are already detailed for private sector entities in the National Industrial Security Program Operating Manual (NISPOM)). The proposed revisions also make other administrative changes to be consistent with recent revisions to the NISPOM and with updated regulatory language and style.

Federal Register, Volume 82 Issue 7 (Wednesday, January 11, 2017)
[Federal Register Volume 82, Number 7 (Wednesday, January 11, 2017)]
[Proposed Rules]
[Pages 3219-3232]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2017-00152]


=======================================================================
-----------------------------------------------------------------------

NATIONAL ARCHIVES AND RECORDS ADMINISTRATION

Information Security Oversight Office

32 CFR Part 2004

[FDMS No. NARA-16-0006; Agency No. NARA-2017-017]
RIN 3095-AB79


National Industrial Security Program

AGENCY: Information Security Oversight Office, National Archives and 
Records Administration (NARA).

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: The Information Security Oversight Office (ISOO) of the 
National Archives and Records Administration (NARA), proposes to revise 
the National Industrial Security Program (NISP) Directive. The NISP 
safeguards classified information the Federal Government or foreign 
governments release to contractors, licensees, grantees, and 
certificate holders. This proposed revision adds provisions 
incorporating executive branch insider threat policy and minimum 
standards, identifies the Office of the Director of National 
Intelligence (ODNI) and the Department of Homeland Security (DHS) as 
new cognizant security agencies (CSAs), and adds responsibilities for 
all CSAs and non-CSA departments and agencies (to reflect oversight 
functions that are already detailed for private sector entities in the 
National Industrial Security Program Operating Manual (NISPOM)). The 
proposed revisions also make other administrative changes to be 
consistent with recent revisions to the NISPOM and with updated 
regulatory language and style.

[[Page 3220]]


DATES: Submit comments by February 10, 2017.

ADDRESSES: You may submit comments, identified by RIN 3095-AB79, by any 
of the following methods:
    [ssquf] Federal eRulemaking Portal: http://www.regulations.gov. 
Follow the instructions for submitting comments.
    [ssquf] Email: [email protected]. Include RIN 3095-AB79 
in the subject line of the message.
    [ssquf] Mail (for paper, disk, or CD-ROM submissions. Include RIN 
3095-AB79 on the submission): Regulations Comments Desk (External 
Policy Program, Strategy and Performance Division (SP)); Suite 4100; 
National Archives and Records Administration; 8601 Adelphi Road; 
College Park, MD 20740-6001.
    [ssquf] Hand delivery or courier: Deliver comments to the front 
desk at the address above.
    Instructions: You must include on all submissions the Regulatory 
Information Number (RIN) for this rulemaking (RIN 3095-AB79) and NARA's 
name. We may publish any comments we receive without changes, including 
any personal information you provide.

FOR FURTHER INFORMATION CONTACT: For information about this regulation 
and the regulatory process, contact Kimberly Keravuori, External Policy 
Program Manager, by email at [email protected], or by 
telephone at 301.837.3151. For information about the NISP and the 
requirements in this regulation, contact William A. Cira, Acting 
Director, ISOO, by telephone at 202-357-5323.

SUPPLEMENTARY INFORMATION: We have coordinated and vetted the proposed 
revisions through the CSAs listed in Executive Order (E.O.) 12829, 
National Industrial Security Program (January 6, 1993 (58 FR 3479)), as 
amended by E.O. 12885 (December 14, 1993 (58 FR 65863): Department of 
Defense, Department of Energy, Nuclear Regulatory Commission, Office of 
the Director of National Intelligence, and Department of Homeland 
Security. We have also coordinated this with the other executive branch 
agencies that are members of the National Industrial Security Program 
Policy Advisory Committee (NISPPAC) or that release classified 
information to contractors, licensees, grantees, or certificate 
holders, and with the industry members of the NISPPAC. The proposed 
revisions do not change requirements for industry (which are contained 
in the NISPOM), but instead clarify agency responsibilities.

Background

    The NISP is the Federal Government's single, integrated industrial 
security program. E.O. 12829 (amended in 1993) established the NISP to 
safeguard classified information in industry and preserve the nation's 
economic and technological interests. The President issued E.O. 13691, 
Promoting Private Sector Cybersecurity Information Sharing (February 
13, 2015 (80 FR 9347)), and E.O. 13708, Continuance or Reestablishment 
of Certain Federal Advisory Committees (September 30, 2015 (80 FR 
60271)), which further amended E.O. 12829.
    E.O. 12829, sec. 102(b), delegated oversight of the NISP to the 
Director of NARA's Information Security Oversight Office (ISOO). As 
part of ISOO's responsibilities under E.O. 12829, it is authorized to 
issue such directives as necessary to implement the E.O., which are 
binding on agencies. In 2006, ISOO issued, and periodically updates, 
this regulation, which functions as one of those directives.
    This regulation establishes uniform standards throughout the 
Program, and helps agencies implement requirements in E.O. 12829, as 
amended (collectively referred to as ``E.O. 12829''). This revision 
also establishes agency responsibilities for implementing the insider 
threat provisions of E.O. 13587, Structural Reforms to Improve the 
Security of Classified Networks and the Responsible Sharing and 
Safeguarding of Classified Information (October 7, 2011 (76 FR 63811)) 
within the NISP. However, the regulation does not stand alone; users 
should refer concurrently to the underlying executive orders for 
guidance.
    Nothing in this regulation supersedes the authority of the 
Secretary of Energy or the Nuclear Regulatory Commission under the 
Atomic Energy Act of 1954, as amended (42 U.S.C. 2011, et seq.); the 
authority of the Director of National Intelligence (or any intelligence 
community element) under the Intelligence Reform and Terrorism 
Prevention Act of 2004 (Pub. L. 108-458), the National Security Act of 
1947 (50 U.S.C. 401, et seq.), as amended, and E.O. 12333 (December 4, 
1981), as amended by E.O. 13355, Strengthened Management of the 
Intelligence Community (August 27, 2004) and E.O. 13470, Further 
Amendments to Executive Order 12333 (July 30, 2008); or the authority 
of the Secretary of Homeland Security, as the Executive Agent for the 
Classified National Security Information Program established under E.O. 
13549, Classified National Security Information Program for State, 
Local, Tribal, and Private Sector Entities (August 18, 2010), or by 
E.O. 13284, Amendment of Executive Orders, and Other Actions, in 
Connection with the Establishment of the Department of Homeland 
Security, (January 23, 2003).

Revision Process and Proposed Changes

    This proposed rule reflects a national level policy framework that 
should not change existing practices and procedures for any of the 
affected agencies or for entities in any significant way. A working 
group comprised of NISP CSA representatives, ISOO staff, the Department 
of Defense's (DoD) Defense Security Service (DSS), and the Central 
Intelligence Agency, drafted this proposed rule.
    We initiated the proposed revisions in 2013 to incorporate new 
insider threat program requirements as a result of E.O. 13587, 
Structural Reforms to Improve the Security of Classified Networks and 
the Responsible Sharing and Safeguarding of Classified Information, 
October 2011, and the associated National Insider Threat Policy and 
Minimum Standards from the White House in November 2012. The national 
insider threat policy directs that the Government apply insider threat 
provisions to private sector entities that access classified 
information, which the executive branch accomplishes through the 
National Industrial Security Program Operating Manual (NISPOM), issued 
by the NISP Executive Agent, DoD. The NISPOM also provides private 
sector entities that access classified information with other NISP 
requirements and procedures. On the other side of the equation, this 
NISP regulation gives policy direction and establishes responsibilities 
for the agencies that release classified information to private sector 
entities to ensure that the agencies provide consistent oversight of 
entity programs. We are therefore proposing revisions to the regulation 
to add the insider threat requirements that pertain to NISP oversight 
by agencies; similar provisions have been added to the NISPOM for 
private sector entities to follow. The NISP CSAs, ISOO, and the 
National Insider Threat Task Force (NITTF) collaborated on the proposed 
insider threat provisions that are incorporated.
    During review of the regulation, the working group determined that, 
although the NISPOM provides requirements and procedures for entities, 
this regulation did not include many of the coinciding oversight 
requirements for agencies. We therefore expanded the revision to 
include adding aspects of NISP implementation for which the agencies 
have a responsibility that weren't already spelled out in the 
regulation. These proposed changes include adding responsibility 
provisions

[[Page 3221]]

for CSAs and Government contracting activities (GCAs), standards by 
which they make entity and employee eligibility determinations for 
access to classified information, standards for assessing foreign 
ownership, control, or influence and for mitigating or negating it, and 
identifying CSA and non-CSA agency responsibilities for security 
classification and for authorizing entity information systems to 
process classified information. While CSAs and other agencies have been 
carrying out these responsibilities since the establishment of the NISP 
under E.O. 12829, and they have been spelled out in the NISPOM, they 
were not previously included in this regulation. We are including them 
to ensure agencies consistently apply the NISP requirements for all 
entities that have access to classified information and thereby aid in 
reducing processing burdens on entities. This affords agencies the 
opportunity to ensure that they are complying with existing NISP 
requirements, to include verifying that all current contracts or 
agreements with contractors, licensees, or grantees include appropriate 
security requirements. E.O. 12829 was amended by E.O. 13691, Promoting 
Private Sector Cybersecurity Information Sharing, in February 2015. The 
amendment established the DHS as a CSA, not limited to the classified 
critical infrastructure protection program (CCIPP). As part of its CSA 
responsibilities, DHS will perform oversight of critical sector 
entities participating in the CCIPP. We also incorporated DHS 
responsibilities as a CSA and the provisions of the CCIPP into this 
revision.
    We have also made some proposed revisions to more clearly set out 
items that were already in the regulation. One such proposed change is 
the approach to reciprocity. Because of the separate and unique 
authorities of the CSAs, one CSA might not, in some cases, reciprocally 
accept entity eligibility determinations made by another CSA. However, 
the proposed revision stipulates that CSAs will not require entities to 
go through duplicate steps for eligibility determinations. This should 
help reduce and streamline eligibility determinations for entities 
receiving classified information from more than one agency.
    We are also proposing some new, more general terminology (like 
``entity eligibility determination,'' which describes a process all 
CSAs do, instead of ``facility security clearance (FCL),'' which is an 
agency-specific term for a favorable determination resulting from that 
process). Our goal is to create a common framework that all CSAs can 
effectively use because it sets out requirements in terms that 
encompass CSA processes for varying types of classified information 
under the NISP. These terminology changes do not preclude the CSAs from 
using their traditional terminology in agency policies that implement 
this rule or in the NISPOM.
    The NISPOM currently includes a limited facility security clearance 
as an option for agencies to consider when foreign ownership, control, 
or influence (FOCI) of an entity cannot be mitigated or negated. We 
have added the limited eligibility determination option to this 
regulation, but have also expanded it to include limited eligibility 
for entities that are not under FOCI, but for which an agency considers 
it appropriate to limit access to a specific and narrow purpose.
    In addition, we have made some drafting changes to make the 
regulation more readable.

Regulatory Analysis

    The Office of Management and Budget (OMB) has reviewed this 
proposed regulation.

Review Under Executive Orders 12866 and 13563

    Executive Order 12866, Regulatory Planning and Review, 58 FR 51735 
(September 30, 1993), and Executive Order 13563, Improving Regulation 
and Regulation Review, 76 FR 23821 (January 18, 2011), direct agencies 
to assess all costs and benefits of available regulatory alternatives 
and, if regulation is necessary, to select regulatory approaches that 
maximize net benefits (including potential economic, environmental, 
public health and safety effects, distributive impacts, and equity). 
This proposed rule is ``significant'' under Executive Order 12866, sec. 
3(f), but is not a major rule as defined in 5 U.S.C. Chapter 8, 
Congressional Review of Agency Rulemaking. The Office of Management and 
Budget (OMB) has reviewed this proposed regulation.

Review Under the Regulatory Flexibility Act (5 U.S.C. 601, et seq.)

    This review requires an agency to prepare an initial regulatory 
flexibility analysis and publish it when the agency publishes the 
proposed rule. This requirement does not apply if the agency certifies 
that the rule will not, if promulgated, have a significant economic 
impact on a substantial number of small entities (5 U.S.C. 603). As 
required by the Regulatory Flexibility Act, we certify that this 
proposed rulemaking will not have a significant impact on a substantial 
number of small entities because it applies only to Federal agencies. 
This regulation does not establish requirements for entities; those 
requirements are established in the NISPOM. This rule sets out 
coinciding requirements for agencies. However, agencies implementing 
this regulation will do so through contracts with businesses (as well 
as other agreements with entities) and thus it indirectly affects those 
entities. Agencies have been applying the requirements and procedures 
contained in the NISPOM (and, to a lesser extent, contained in this 
regulation) to entities for 20 years, with the exception of insider 
threat provisions added to the NISPOM in 2016, and the proposed 
additions to this regulation do not substantially alter those 
requirements. Most of the provisions being added to this regulation 
have applied to entities through the NISPOM; we are simply 
incorporating the agency responsibilities for those requirements into 
the regulation.
    Other revisions to this regulation are primarily administrative, 
except the new insider threat requirements. The insider threat 
requirements make minor additions to training, oversight, information 
system security, and similar functions already being conducted by 
entities, and thus will not have a significant economic impact on a 
substantial number of small business entities.

Review Under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et 
seq.)

    This proposed rule contains information collection activities that 
are subject to review and approval by the Office of Management and 
Budget (OMB) under the Paperwork Reduction Act. We refer to the 
following OMB-approved DoD information collection in Sec. Sec.  
2004.34(b), 2004.34(c)(1) of this regulation: OMB control No. 0704-
0194, SF 328, Certificate Pertaining to Foreign Interests, approved 
through September 30, 2019. DoD published the information collection 
notice in the Federal Register in May 2015 (80 FR 27938, May 15, 2015) 
for public comment, and the notice of OMB review in the Federal 
Register in July 2016 (81 FR 47790, July 22, 2016), providing a second 
opportunity for public comment.

Review Under Executive Order 13132, Federalism, 64 FR 43255 (August 4, 
1999)

    Review under Executive Order 13132 requires that agencies review 
regulations for federalism effects on the

[[Page 3222]]

institutional interest of states and local governments, and, if the 
effects are sufficiently substantial, prepare a Federal assessment to 
assist senior policy makers. This proposed rule will not have any 
direct effects on State and local governments within the meaning of the 
Executive Order. Therefore, this rule does not include a federalism 
assessment.

List of Subjects in 32 CFR Part 2004

    Classified information, National Industrial Security Program.

    For the reasons stated in the preamble, the National Archives and 
Records Administration proposes to revise 32 CFR part 2004 to read as 
follows:

PART 2004--NATIONAL INDUSTRIAL SECURITY PROGRAM (NISP)

Subpart A--Implementation and Oversight
2004.1 Purpose and scope.
2004.4 Definitions that apply to this part.
2004.10 Responsibilities of the Director, Information Security 
Oversight Office (ISOO).
2004.11 CSA and agency implementing regulations, internal rules, or 
guidelines.
2004.12 ISOO reviews of agency NISP implementation.
Subpart B--Administration
2004.20 National Industrial Security Program Executive Agent (EA) 
and Operating Manual (NISPOM).
2004.22 Agency responsibilities.
2004.24 Insider threat program.
2004.26 Reviews of entity NISP implementation.
2004.28 Cost reports.
Subpart C--Operations
2004.30 Security classification requirements and guidance.
2004.32 Determining entity eligibility for access to classified 
information.
2004.34 Foreign ownership, control, or influence (FOCI).
2004.36 Determining entity employee eligibility for access to 
classified information.
2004.38 Safeguarding and marking.
2004.40 Information system security.
2004.42 International programs security. [Reserved]

Appendix A to Part 2004--Acronym Table

    Authority:  Section 102(b)(1) of E.O. 12829 (January 6, 1993), 
as amended by E.O. 12885 (December 14, 1993), E.O. 13691 (February 
12, 2015), and section 4 of E.O. 13708 (September 30, 2015).

Subpart A--Implementation and Oversight


Sec.  2004.1   Purpose and scope.

    (a) This part sets out the National Industrial Security Program 
(``NISP'' or ``the Program'') governing the protection of executive-
branch agency classified information released to Federal contractors, 
licensees, grantees, and certificate holders. It establishes uniform 
standards throughout the Program, and helps agencies implement 
requirements in E.O. 12829, National Industrial Security Program, as 
amended by E.O. 12558 and E.O.13691 (collectively referred to as ``E.O. 
12829''), E.O. 13691, Promoting Private Sector Cybersecurity 
Information Sharing, and E.O. 13587, Structural Reforms to Improve the 
Security of Classified Networks and the Responsible Sharing and 
Safeguarding of Classified Information. It applies to any executive 
branch agency that releases classified information to current, 
prospective, or former Federal contractors, licensees, grantees, or 
certificate holders. However, this part does not stand alone; users 
should refer concurrently to the underlying executive orders for 
guidance. ISOO maintains policy oversight over the NISP as established 
by E.O.12829.
    (b) This part also does not apply to release of classified 
information pursuant to criminal proceedings. The Classified 
Information Procedures Act (CIPA) (18 U.S.C. Appendix 3) governs 
release of classified information in criminal proceedings.
    (c) Nothing in this part supersedes the authority of the Secretary 
of Energy or the Nuclear Regulatory Commission under the Atomic Energy 
Act of 1954, as amended (42 U.S.C. 2011, et seq.) (collectively 
referred to as ``the Atomic Energy Act''); the authority of the 
Director of National Intelligence (or any intelligence community 
element) under the Intelligence Reform and Terrorism Prevention Act of 
2004 (Pub. L. 108-458), the National Security Act of 1947 as amended 
(50 U.S.C. 401, et seq.), and E.O. 12333 (December 4, 1981), as amended 
by E.O. 13355, Strengthened Management of the Intelligence Community 
(August 27, 2004) and E.O. 13470, Further Amendments to Executive Order 
12333 (July 30, 2008) (collectively referred to as ``E.O. 12333''); or 
the authority of the Secretary of Homeland Security, as the Executive 
Agent for the Classified National Security Information Program 
established under E.O. 13549, Classified National Security Information 
Program for State, Local, Tribal, and Private Sector Entities (August 
18, 2010), or as established by E.O. 13284, Amendment of Executive 
Orders, and Other Actions, in Connection with the Establishment of the 
Department of Homeland Security (January 23, 2003).


Sec.  2004.4   Definitions that apply to this part.

    (a) Access is the ability or opportunity to gain knowledge of 
classified information.
    (b) Agency(ies) are any ``Executive agency'' as defined in 5 U.S.C. 
105; any ``Military department'' as defined in 5 U.S.C. 102; and any 
other entity within the executive branch that releases classified 
information to private sector entities. This includes component 
agencies under another agency or under a cross-agency oversight office 
(such as ODNI with CIA), which are also agencies for purposes of this 
part.
    (c) Classified Critical Infrastructure Protection Program (CCIPP) 
is the DHS program established by E.O. 13691, ``Promoting Private 
Sector Cybersecurity Information Sharing.'' The Government uses this 
program to share classified threat information with employees of 
private sector entities that own or operate critical infrastructure. 
Critical infrastructure refers to systems and assets, whether physical 
or virtual, so vital to the United States that incapacitating or 
destroying such systems and assets would have a debilitating impact on 
security, national economic security, national public health or safety, 
or any combination thereof. These entities include banks and power 
plants, among others. The sectors of critical infrastructure are listed 
in Presidential Policy Directive 21, Critical Infrastructure Security 
and Resilience (February 12, 2013).
    (d) Classified Critical Infrastructure Protection Program (CCIPP) 
security point of contact (security POC) is an official whom a CCIPP 
entity designates to maintain eligibility information about the entity 
and its cleared employees, and to report that information to DHS. The 
CCIPP security POC must be eligible for access to classified 
information.
    (e) Classified information is information the Government designates 
as requiring protection against unauthorized disclosure in the interest 
of national security, pursuant to E.O. 13526, Classified National 
Security Information, or any predecessor order, and the Atomic Energy 
Act of 1954, as amended. Classified information includes national 
security information (NSI), restricted data (RD), and formerly 
restricted data (FRD), regardless of its physical form or 
characteristics (including tangible items other than documents).
    (f) Cognizance is the area over which a CSA has operational 
oversight. Normally, a statute or executive order establishes a CSA's 
cognizance over certain types of information, programs, or non-CSA 
agencies, although CSAs

[[Page 3223]]

may also have cognizance through an agreement with another CSA or non-
CSA agency or an entity. A CSA may have cognizance over a particular 
type(s) of classified information based on specific authorities (such 
as those listed in 2004.1(d)), and a CSA may have cognizance over 
certain agencies or cross-agency programs (such as DoD's cognizance 
over non-CSA agencies as the EA for NISP, or ODNI's oversight (if 
applicable) of all intelligence community elements within the executive 
branch). Entities fall under a CSA's cognizance when they enter or 
compete to enter contracts or agreements to access classified 
information under the CSA's cognizance, including when they enter or 
compete to enter such contracts or agreements with a non-CSA agency or 
another entity under the CSA's cognizance.
    (g) Cognizant security agencies (CSAs) are the agencies E.O. 12829, 
sec. 202, designates as having NISP implementation and security 
responsibilities for their own agencies (including component agencies) 
and any entities and non-CSA agencies under their cognizance. The CSAs 
are: Department of Defense (DoD); Department of Energy (DOE); Nuclear 
Regulatory Commission (NRC); Office of the Director of National 
Intelligence (ODNI); and Department of Homeland Security (DHS).
    (h) Cognizant security office (CSO) is an organizational unit to 
which the head of a CSA delegates authority to administer industrial 
security services on behalf of the CSA.
    (i) Contracts or agreements are any type of arrangement between an 
agency and an entity or an agency and another agency. They include, but 
are not limited to, contracts, sub-contracts, licenses, certificates, 
memoranda of understanding, inter-agency service agreements, other 
types of documents or arrangements setting out responsibilities, 
requirements, or terms agreed upon by the parties, programs, projects, 
and other legitimate U.S. or foreign government requirements. FOCI 
mitigation or negation measures, such as Voting Trust Agreements, that 
have the word ``agreement'' in their title are not included in the term 
``agreements'' within this part.
    (j) Controlling agency is an agency that owns or controls certain 
types of proscribed information and thus has authority over access to 
or release of the proscribed information. For communications security 
information (COMSEC), the controlling agency is NSA; for restricted 
data (RD), the controlling agency is DOE; and for sensitive 
compartmented information (SCI), the controlling agency is ODNI. For 
Top Secret and SAP information, the controlling agency is always the 
same agency as the GCA.
    (k) Entity is a generic and comprehensive term which may include 
sole proprietorships, partnerships, corporations, limited liability 
companies, societies, associations, institutions, contractors, 
licensees, grantees, certificate holders, and other organizations 
usually established and operating to carry out a commercial, 
industrial, educational, or other legitimate business, enterprise, or 
undertaking, or parts of these organizations. It may reference an 
entire organization, a prime contractor, parent organization, a branch 
or division, another type of sub-element, a sub-contractor, subsidiary, 
or other subordinate or connected entity (referred to as ``sub-
entities'' when necessary to distinguish such entities from prime or 
parent entities), a specific location or facility, or the headquarters/
official business location of the organization, depending upon the 
organization's business structure, the access needs involved, and the 
responsible CSA's procedures. The term ``entity'' as used in this part 
refers to the particular entity to which an agency might release, or is 
releasing, classified information, whether that entity is a parent or 
subordinate organization.
    (l) Entity eligibility determination is an assessment by the CSA as 
to whether an entity is eligible for access to classified information 
of a certain level (and all lower levels). Eligibility determinations 
may be broad or limited to specific contracts, sponsoring agencies, or 
circumstances. A favorable determination results in eligibility to 
access classified information under the cognizance of the responsible 
CSA to the level approved. When the entity would be accessing 
categories of information such as RD or SCI for which the CSA for that 
information has set additional requirements, CSAs must also assess 
whether the entity is eligible for access to that category. Some CSAs 
refer to their favorable determinations as facility security clearances 
(FCL). A favorable entity eligibility determination does not convey 
authority to store classified information.
    (m) Foreign interest is any foreign government, agency of a foreign 
government, or representative of a foreign government; any form of 
business enterprise or legal entity organized, chartered, or 
incorporated under the laws of any country other than the United States 
or its territories; and any person who is not a United States citizen 
or national.
    (n) Government contracting activity (GCA) is an agency component or 
subcomponent to which the agency head delegates broad authority 
regarding acquisition functions. A foreign government may also be a 
GCA.
    (o) Industrial security services are those activities performed by 
a CSA to verify that an entity is protecting classified information. 
They include, but are not limited to, conducting oversight reviews, 
making eligibility determinations, and providing agency and entity 
guidance and training.
    (p) Insider(s) are entity employees who are eligible to access 
classified information and may be authorized access to any U.S. 
Government or entity resource (such as personnel, facilities, 
information, equipment, networks, or systems).
    (q) Insider threat is the likelihood, risk, or potential that an 
insider will use his or her authorized access, wittingly or 
unwittingly, to do harm to the national security of the United States. 
Insider threats may include harm to entity or program information to 
the extent that the information impacts the entity's or agency's 
obligations to protect classified information.
    (r) Insider threat response action(s) are actions (such as 
investigations) an agency takes to ascertain whether an insider threat 
exists, and actions the agency takes to mitigate the threat. Agencies 
may conduct insider threat response actions through their 
counterintelligence (CI), security, law enforcement, or inspector 
general organizations, depending on the statutory authority and 
internal policies that govern the agency.
    (s) Insider threat program senior official (SO) is the official an 
agency head or entity designates with responsibility to manage, account 
for, and oversee the agency's or entity's insider threat program, 
pursuant to the National Insider Threat Policy and Minimum Standards. 
An agency may have more than one insider threat program SO.
    (t) Key managers and officials (KMO) are the senior management 
official (or authorized executive official under CCIPP), the entity's 
security officer (or security POC under CCIPP), the insider threat 
program senior official, and other entity employees whom the 
responsible CSA identifies as having authority, direct or indirect, to 
influence or decide matters affecting the entity's management or 
operations, its classified contracts, or national security interests. 
They may include individuals who hold majority ownership interest in 
the entity

[[Page 3224]]

(in the form of stock or other ownership interests).
    (u) Proscribed information is information that is classified as top 
secret (TS) information; communications security (COMSEC) information 
(excluding controlled cryptographic items when un-keyed or utilized 
with unclassified keys); restricted data (RD); special access program 
information (SAP); or sensitive compartmented information (SCI).
    (v) Security officer is a U.S. citizen employee the entity 
designates to supervise and direct security measures implementing 
NISPOM (or equivalent; such as DOE Orders) requirements. Some CSAs 
refer to this position as a facility security officer (FSO). The 
security officer must complete security training specified by the 
responsible CSA, and must have and maintain an employee eligibility 
determination level that is at least the same level as the entity's 
eligibility determination level.
    (w) Senior agency official for NISP (SAO for NISP) is the official 
an agency head designates to direct and administer the agency's 
National Industrial Security Program.
    (x) Senior management official (SMO) is the person in charge of an 
entity. Under the CCIPP, this is the authorized executive official with 
authority to sign the security agreement with DHS.
    (y) Sub-entity is an entity's branch or division, another type of 
sub-element, a sub-contractor, subsidiary, or other subordinate or 
connected entity. Sub-entities fall under the definition of ``entity,'' 
but this part refers to them as sub-entities when necessary to 
distinguish such entities from prime contractor or parent entities. See 
definition of ``entity'' at Sec.  2004.4(k) for more context.


Sec.  2004.10   Responsibilities of the Director, Information Security 
Oversight Office (ISOO).

    The Director, ISOO:
    (a) Implements E.O. 12829, including ensuring that:
    (1) The NISP operates as a single, integrated program across the 
executive branch of the Federal Government (i.e., such that agencies 
that release classified information to entities adhere to NISP 
principles);
    (2) A responsible CSA oversees each entity's NISP implementation in 
accordance with Sec.  2004.22;
    (3) All agencies that contract for classified work include the 
Security Requirements clause, 48 CFR 52.204-2, from the Federal 
Acquisition Regulation (FAR), or an equivalent clause, in contracts 
that require access to classified information;
    (4) Those agencies for which the Department of Defense (DoD) serves 
as the CSA or provides industrial security services have agreements 
with DoD defining the Secretary of Defense's responsibilities on behalf 
of their agency;
    (5) Each CSA issues directions to entities under their cognizance 
that are consistent with the NISPOM insider threat guidance;
    (6) CSAs share with each other, as lawful and appropriate, relevant 
information about entity employees that indicates an insider threat; 
and
    (7) CSAs conduct ongoing analysis and adjudication of adverse or 
relevant information about entity employees that indicates an insider 
threat.
    (b) Raises an issue to the National Security Council (NSC) for 
resolution if the EA's NISPOM coordination process cannot reach a 
consensus on NISPOM security standards (see Sec.  2004.20(d)).


Sec.  2004.11   CSA and agency implementing regulations, internal 
rules, or guidelines.

    (a) Each CSA implements NISP practices in part through policies and 
guidelines that are consistent with this part, so that agencies for 
which it serves as the CSA are aware of appropriate security standards, 
engage in consistent practices with entities, and so that practices 
effectively protect classified information those entities receive 
(including foreign government information that the U.S. Government must 
protect in the interest of national security).
    (b) Each CSA must also routinely review and update its NISP 
policies and guidelines and promptly issue revisions when needed 
(including when a change in national policy necessitates a change in 
agency NISP policies and guidelines).
    (c) Non-CSA agencies may choose to augment CSA NISP policies or 
guidelines as long as the agency policies or guidelines are consistent 
with the CSA's policies or guidelines and this part.


Sec.  2004.12   ISOO review of agency NISP implementation.

    (a) ISOO fulfills its oversight role based, in part, on information 
received from NISP Policy Advisory Committee (NISPPAC) members, from 
on-site reviews that ISOO conducts under the authority of E.O. 12829, 
and from any submitted complaints and suggestions. ISOO reports 
findings to the responsible CSA or agency.
    (b) ISOO reviews agency policies and guidelines to ensure 
consistency with NISP policies and procedures. ISOO may conduct reviews 
during routine oversight visits, when a problem or potential problem 
comes to ISOO's attention, or after a change in national policy that 
impacts agency policies and guidelines. ISOO provides the responsible 
agency with findings from these reviews.

Subpart B--Administration


Sec.  2004.20   National Industrial Security Program Executive Agent 
and Operating Manual (NISPOM).

    (a) The executive agent (EA) for NISP is the Secretary of Defense. 
The EA:
    (1) Provides industrial security services for agencies that are not 
CSAs but that release classified information to entities. The EA 
provides industrial security services only through an agreement with 
the agency. Non-CSA agencies must enter an agreement with the EA and 
comply with EA industrial security service processes before releasing 
classified information to an entity;
    (2) Provides services for other CSAs by agreement; and
    (3) Issues and maintains the National Industrial Security Program 
Operating Manual (NISPOM) in consultation with all affected agencies 
and with the concurrence of the other CSAs.
    (b) The NISPOM sets out the procedures and standards that entities 
must follow during all phases of the contracting process to safeguard 
any classified information an agency releases to an entity. The NISPOM 
requirements may apply to the entity directly (i.e., through FAR 
clauses or other contract clauses referring entities to the NISPOM) or 
through equivalent contract clauses or requirements documents that are 
consistent with NISPOM requirements.
    (c) The EA, in consultation with all affected agencies and with the 
concurrence of the other CSAs, develops the requirements, restrictions, 
and safeguards contained in the NISPOM. The EA uses security standards 
applicable to agencies as the basis for developing NISPOM entity 
standards to the extent practicable and reasonable.
    (d) The EA also facilitates the NISPOM coordination process, which 
addresses issues raised by entities, agencies, ISOO, or the NISPPAC, 
including requests to create or change NISPOM security standards.


Sec.  2004.22   Agency responsibilities.

    (a) Agency categories and general areas of responsibility. (1) 
Federal agencies fall into two categories for the purpose of NISP 
responsibilities:
    (i) CSAs. CSAs are responsible for carrying out NISP implementation 
within their agency, for providing NISP

[[Page 3225]]

industrial security services on behalf of non-CSA agencies by agreement 
when authorized, and for overseeing NISP compliance by entities that 
access classified information under the CSA's cognizance. When the CSA 
has oversight responsibilities for a particular non-CSA agency or for 
an entity, the CSA also functions as the responsible CSA;
    (ii) Non-CSA agencies. Non-CSA agencies are responsible for 
entering agreements with a designated CSA for industrial security 
services, and are responsible for carrying out NISP implementation 
within their agency consistently with the agreement, the CSA's 
guidelines and procedures, and this part;
    (2) Agencies that are components of another agency. Component 
agencies do not have itemized responsibilities under this part and do 
not independently need to enter agreements with a CSA, but they follow, 
and may have responsibilities under, implementing guidelines and 
procedures established by their CSA or non-CSA agency, or both.
    (b) Responsible CSA role. (1) The responsible CSA is the CSA (or 
its delegated CSO) that provides NISP industrial security services on 
behalf of an agency, determines an entity's eligibility for access, and 
monitors and inspects an entity's NISP implementation.
    (2) In general, the goal is to have one responsible CSA for each 
agency and for each entity, to minimize the burdens that can result 
from complying with differing CSA procedures and requirements.
    (i) With regard to agencies, NISP accomplishes this goal by a 
combination of designated CSAs and agreements between agencies and 
CSAs.
    (ii) With regard to entities, CSAs strive to reduce the number of 
responsible CSAs for a given entity as much as possible. To this end, 
when more than one CSA releases classified information to a given 
entity, those CSAs agree on which is the responsible CSA. However, due 
to certain unique agency authorities, there may be circumstances in 
which a given entity is under the oversight of more than one 
responsible CSA.
    (3) Responsible CSA for agencies. (i) In general, each CSA serves 
as the responsible CSA for classified information that it (or any of 
its component agencies) releases to entities, unless it enters an 
agreement otherwise with another CSA.
    (ii) DoD serves as the responsible CSA for DHS with the exception 
of the CCIPP, based on an agreement between the two CSAs.
    (iii) DoD serves as the responsible CSA on behalf of all non-CSA 
agencies, except CSA components, based on E.O. 12829 and its role as 
NISP EA.
    (iv) ODNI serves as the responsible CSA for CIA.
    (4) Responsible CSA for entities. When determining the responsible 
CSA for a given entity, the involved CSAs consider, at a minimum: 
Retained authorities, the information's classification level, number of 
classified contracts, location, number of Government customers, volume 
of classified activity, safeguarding requirements, responsibility for 
entity employee eligibility determinations, and any special 
requirements.
    (5) Responsible CSAs may delegate oversight responsibility to a 
cognizant security office (CSO) through CSA policy or by written 
delegation. The CSA must inform entities under its cognizance if it 
delegates responsibilities. For purposes of this rule, the term CSA 
also refers to the CSO.
    (c) CSA responsibilities. (1) The CSA may perform GCA 
responsibilities as its own GCA.
    (2) As CSA, the CSA performs or delegates the following 
responsibilities:
    (i) Designates a CSA senior agency official (SAO) for NISP;
    (ii) Identifies the insider threat senior official (SO) to the 
Director, ISOO;
    (iii) Shares insider threat information with other CSAs, as lawful 
and appropriate, including information that indicates an insider threat 
about entity employees eligible to access classified information;
    (iv) Acts upon and shares--with security management, GCAs, insider 
threat program employees, and Government program and CI officials--any 
relevant entity-reported information about security or CI concerns, as 
appropriate;
    (v) Submits reports to ISOO as required by this part; and
    (vi) Develops, coordinates, and provides concurrence on changes to 
the NISPOM when requested by the EA.
    (3) As a responsible CSA, the CSA also performs or delegates the 
following responsibilities:
    (i) Determines whether an entity is eligible for access to 
classified information (see Sec.  2004.32);
    (ii) Allocates funds, ensures appropriate investigations are 
conducted, and determines entity employee eligibility for access to 
classified information (see Sec.  2004.36);
    (iii) Reviews and approves entity safeguarding measures, including 
making safeguarding capability determinations (see Sec.  2004.38);
    (iv) Conducts periodic security reviews of entity operations (see 
Sec.  2004.26) to determine that entities: Effectively protect 
classified information provided to them; and follow NISPOM (or 
equivalent) requirements;
    (v) Provides and regularly updates guidance, training, training 
materials, and briefings to entities on:
    (A) Entity implementation of NISPOM (or equivalent) requirements, 
including: Responsibility for protecting classified information, 
requesting NISPOM interpretations, establishing training programs, and 
submitting required reports;
    (B) Initial security briefings and other briefings required for 
special categories of information;
    (C) Authorization measures for information systems processing 
classified information (except DHS) (see Sec.  2004.40);
    (D) Security training for security officers (or CCIPP POCs) and 
other employees whose official duties include performing NISP-related 
functions;
    (E) Insider threat programs in accordance with the National Insider 
Threat Policy and Minimum Standards; and
    (F) Other guidance and training as appropriate;
    (vi) Establishes a mechanism for entities to submit requests for 
waivers to NISPOM (or equivalent) provisions;
    (vii) Reviews, continuously analyzes, and adjudicates, as 
appropriate, reports from entities regarding events that:
    (A) Impact the status of the entity's eligibility for access to 
classisfied information;
    (B) Impact an employee's eligibility for access;
    (C) May indicate an employee poses an insider threat;
    (D) Affect proper safeguarding of classified information; or
    (E) Indicate that classified information has been lost or 
compromised.
    (viii) Verifies that reports offered in confidence and so marked by 
an entity may be withheld from public disclosure under applicable 
exemptions of the Freedom of Information Act (5 U.S.C. 552).
    (ix) Requests any additional information needed from an entity 
about involved employees to determine continued eligibility for access 
to classified information when the entity reports loss, possible 
compromise, or unauthorized disclosure of classified information; and
    (x) Posts hotline information on its Web site for entity access, or 
otherwise

[[Page 3226]]

disseminates contact numbers to the entities for which the CSA is 
responsible.
    (d) Non-CSA agency head responsibilities. The head of a non-CSA 
agency that is not a CSA component and that releases classified 
information to entities, performs the following responsibilities:
    (1) Designates an SAO for the NISP;
    (2) Identifies the SO for insider threat to ISOO to facilitate 
information sharing;
    (3) Enters into an agreement with the EA (except agencies that are 
components of another agency or a cross-agency oversight office) to act 
as the responsible CSA on the agency's behalf (see paragraph (a)(1)(ii) 
of this section);
    (4) Performs, or delegates in writing to a GCA, the following 
responsibilities:
    (i) Provides appropriate education and training to agency personnel 
who implement the NISP;
    (ii) Includes FAR security requirements clause 52.204-2, or 
equivalent (such as the DEAR clause 952.204-2), and a contract security 
classification specification into contracts and solicitations that 
require access to classified information (see Sec.  2004.30); and
    (iii) Reports to the appropriate CSA adverse information and 
insider threat activity pertaining to entity employees having access to 
classified information.


Sec.  2004.24   Insider threat program.

    (a) Responsible CSAs oversee and analyze entity activity to ensure 
entities implement an insider threat program in accordance with the 
National Insider Threat Policy and Minimum Standards (via requirements 
in the NISPOM or its equivalent) and guidance from the CSA, to include:
    (1) Verifying that entities appoint SOs for insider threat;
    (2) Requiring entities to monitor, report, and review insider 
threat program activities and response actions in accordance with the 
provisions set forth in the NISPOM (or equivalent);
    (3) Providing entities with access to data relevant to insider 
threat program activities and applicable reporting requirements and 
procedures;
    (4) Providing entities with a designated means to report insider 
threat-related activity; and
    (5) Advising entities on appropriate insider threat training for 
authorized entity employees.
    (b) CSAs share with other CSAs any insider threat information 
reported to them by entities, as lawful and appropriate.


Sec.  2004.26   Reviews of entity NISP implementation.

    (a) The responsible CSA conducts recurring oversight reviews of 
entities' NISP security programs to verify that the entity is 
protecting classified information and is implementing the provisions of 
the NISPOM (or equivalent). The CSA determines the scope and frequency 
of reviews. The CSA generally notifies entities when a review will take 
place, but may also conduct unannounced reviews at its discretion.
    (b) CSAs make every effort to avoid unnecessarily intruding into 
entity employee personal effects during the reviews.
    (c) A CSA may, on entity premises, physically examine the interior 
spaces of containers not authorized to store classified information in 
the presence of the entity's representative.
    (d) As part of a security review, the CSA:
    (1) Verifies that the entity limits entity employees with access to 
classified information to the minimum number necessary to perform on 
classified contracts.
    (2) Validates that the entity has not provided its employees 
unauthorized access to classified information;
    (3) Reviews the entity's self-inspection program and evaluates and 
records the entity's remedial actions; and
    (4) Verifies that the GCA approved any public release of 
information pertaining to a classified contract.
    (e) As a result of findings during the security review, the CSA 
may, as appropriate, notify:
    (1) GCAs if there are unfavorable results from the review; and
    (2) A prime entity if the CSA discovers unsatisfactory security 
conditions pertaining to a sub-entity.
    (f) The CSA maintains a record of reviews it conducts and the 
results. Based on review results, the responsible CSA determines 
whether an entity's eligibility for access to classified information 
may continue. See Sec.  2004.32(g).


Sec.  2004.28  Cost reports.

    (a) Agencies must annually report to the Director, ISOO, on their 
NISP implementation costs for the previous year.
    (b) CSAs must annually collect information on NISP implementation 
costs incurred by entities under their cognizance and submit a report 
to the Director, ISOO.

Subpart C--Operations


Sec.  2004.30   Security classification requirements and guidance.

    (a) Contract or agreement and solicition requirements. (1) The GCA 
must incorporate FAR clause 52.204-2, Security Requirements (or 
equivalent set of security requirements), into contracts or agreements 
and solicitations requiring access to classified information.
    (2) The GCA must also include a contract security classification 
specification (or equivalent guidance) with each contract or agreement 
and solicitation that requires access to classified information. The 
contract security classification specification (or equivalent guidance) 
must identify the specific elements of classified information involved 
in each phase of the contract or agreement life-cycle, such as:
    (i) Level of classification;
    (ii) Where the entity will access or store the classified 
information, and any requirements or limitations on transmitting 
classified information outside the entity;
    (iii) Any special accesses;
    (iv) Any classification guides or other guidance the entity needs 
to perform during that phase of the contract or agreement;
    (v) Any authorization to disclose information about the classified 
contract or agreement; and
    (vi) GCA personnel responsible for interpreting and applying the 
contract security specifications (or equivalent guidance).
    (3) The GCA revises the contract security classification 
specification (or equivalent guidance) throughout the contract or 
agreement life-cycle as security requirements change.
    (b) Guidance. Classification guidance is the exclusive 
responsibility of the GCA. The GCA prepares classification guidance in 
accordance with 32 CFR 2001.15, and provides appropriate security 
classification and declassification guidance to entities.
    (c) Requests for clarification and classification challenges. (1) 
The GCA responds to entity requests for clarification and 
classification challenges.
    (2) The responsible CSA assists entities to obtain appropriate 
classification guidance from the GCA, and to obtain a classification 
challenge response from the GCA.
    (d) Instructions upon contract or agreement termination. (1) The 
GCA provides instructions to the entity for returning or disposing of 
classified information upon contract or agreement

[[Page 3227]]

termination or when an entity no longer has a legitimate need to retain 
or possess classified information.
    (2) The GCA also determines whether the entity may retain 
classified information for particular purposes after the contract or 
agreement terminates, and if so, provides written authorization to the 
entity along with any instructions or limitations (such as which 
information, for how long, etc).


Sec.  2004.32   Determining entity eligibility for access to classified 
information.

    (a) Eligibility determinations. (1) The responsible CSA determines 
whether an entity is eligible for access to classified information. An 
entity may not have access to classified information until the 
responsible CSA determines that it meets all the requirements in this 
section. In general, the entity must be eligible to access classified 
information at the appropriate level before the CSA may consider any of 
the entity's subsidiaries, sub-contractors, or other sub-entities for 
eligibility. However, when the subsidiary will perform all classified 
work, the CSA may instead exclude the parent entity from access to 
classified information rather than determining its eligibility. In 
either case, the CSA must consider all information relevant to 
assessing whether the entity's access poses an unacceptable risk to 
national security interests.
    (2) A favorable access eligibility determination is not the same as 
a safeguarding capability determination. Entities may access classified 
information with a favorable eligibility determination, but may possess 
classified information only if the CSA determines both access 
eligibility and safeguarding capability, based on the GCA's requirement 
in the contract security classification specification (or equivalent).
    (3) If an entity has an existing eligibility determination, a CSA 
will not duplicate eligibility determination processes performed by 
another CSA. If a CSA cannot acknowledge an entity eligibility 
determination to another CSA, that entity may be subject to duplicate 
processing.
    (4) Each CSA maintains a record of its entities' eligibility 
determinations (or critical infrastructure entity eligibility status 
under the CCIPP, for DHS) and responds to inquiries from GCAs or 
entities, as appropriate and to the extent authorized by law, regarding 
the eligibility status of entities under their cognizance.
    (b) Process. (1) The responsible CSA provides guidance to entities 
on the eligibility determination process and on how to maintain 
eligibility throughout the period of the agreement or as long as an 
entity continues to need access to classified information in connection 
with a legitimate U.S. or foreign government requirement.
    (2) The CSA coordinates with appropriate authorities to determine 
whether an entity meets the eligibility criteria in paragraph (e) of 
this section. This includes coordinating with appropriate U.S. 
Government regulatory authorities to determine entity compliance with 
laws and regulations.
    (3) An entity cannot apply for its own eligibility determination. A 
GCA or an eligible entity must sponsor the entity to the responsible 
CSA for an eligibility determination. The GCA or eligible entity may 
sponsor an entity at any point during the contracting or agreement 
life-cycle at which the entity must have access to classified 
information to participate (including the solicitation or competition 
phase). An entity with limited eligibility granted under paragraph (f) 
of this section may sponsor a sub-entity for a limited eligibility 
determination for the same contract, agreement, or circumstance so long 
as the sponsoring entity is not under FOCI (see Sec.  2004.34(i)).
    (4) The GCA must include enough lead time in each phase of the 
acquisition or agreement cycle to accomplish all required security 
actions. Required security actions include any eligibility 
determination necessary for an entity to participate in that phase of 
the cycle. The GCA may award a contract or agreement before the CSA 
completes the entity eligibility determination. However, in such cases, 
the entity may not begin performance on portions of the contract or 
agreement that require access to classified information until the CSA 
makes a favorable entity eligibility determination.
    (5) When a CSA is unable to make an eligibility determination in 
sufficient time to qualify an entity to participate in the particular 
procurement action or phase that gave rise to the GCA request (this 
includes both solicitation and performance phases), the GCA may request 
that the CSA continue the determination process to qualify the entity 
for future classified work, provided that the processing delay was not 
due to the entity's lack of cooperation.
    (c) Coverage. (1) A favorable eligibility determination allows an 
entity to access classified information at the determined eligibility 
level, or lower.
    (2) The CSA must ensure that all entities needing access to 
classified information as part of a legitimate U.S. or foreign 
government requirement have or receive a favorable eligibility 
determination before accessing classified information. This includes 
both prime or parent entities and sub-entities, even in cases in which 
an entity intends to have the classified work performed only by sub-
entities. A prime or parent entity must have a favorable eligibility 
determination at the same classification level or higher than its sub-
entity(ies), unless the CSA determined that the parent entity could be 
effectively excluded from access (see paragraph (a)(1) of this 
section).
    (3) If a parent and sub-entity need to share classified information 
with each other, the CSA must validate that both the parent and the 
sub-entity have favorable eligibility determinations at the level 
required for the classified information prior to sharing the 
information.
    (d) DHS Classified Critical Infrastructure Protection Program 
(CCIPP). DHS shares classified cybersecurity information with certain 
employees of entities under the Classified Critical Infrastructure 
Protection Program (CCIPP). The CCIPP applies only to entities that do 
not need to store classified information, have no other contracts or 
agreements already requiring access to classified information, and are 
not already determined eligible for access to classified information. 
DHS establishes and implements procedures consistent with the NISP to 
determine CCIPP entity eligibility for access to classified 
information.
    (e) Eligibility criteria. An entity must meet the following 
requirements to be eligible to access classified information:
    (1) It must need to access classified information as part of a 
legitimate U.S. Government or foreign government requirement, and 
access must be consistent with U.S. national security interests as 
determined by the CSA;
    (2) It must be organized and existing under the laws of any of the 
50 States, the District of Columbia, or an organized U.S. territory 
(Guam, Commonwealth of the Northern Mariana Island, Commonwealth of 
Puerto Rico, and the U.S. Virgin Islands); or an American Indian or 
Alaska native tribe formally acknowledged by the Assistant Secretary--
Indian Affairs, of the U.S. Department of the Interior;
    (3) It must be located in the United States or its territorial 
areas;
    (4) It must have a record of compliance with pertinent laws, 
regulations, and contracts (or other relevant agreements).
    (5) Its KMOs must each have and maintain eligibility for access to

[[Page 3228]]

classified information that is at least the same level as the entity 
eligibility level;
    (6) It and all of its KMOs must not be excluded by a Federal 
agency, contract review board, or other authorized official from 
participating in Federal contracts or agreements;
    (7) It must meet all requirements the CSA or the authorizing law, 
regulation, or Government-wide policy establishes for access to the 
type of classified information or program involved; and
    (8) If the CSA determines the entity is under foreign ownership, 
control, or influence (FOCI), the responsible CSA must:
    (i) Agree that sufficient security measures are in place to 
mitigate or negate risk to national security interests due to the FOCI 
(see Sec.  2004.34);
    (ii) Determine that it is appropriate to grant eligibility for a 
single, narrowly defined purpose (see Sec.  2004.34(i)); or
    (iii) Determine that the entity is not eligible to access 
classified information.
    (9) DoD and DOE cannot award a contract involving access to 
proscribed information to an entity effectively owned or controlled by 
a foreign government unless the Secretary of the agency first issues a 
waiver (see 10 U.S.C. 2536). A waiver is not required if the CSA 
determines the entity is eligible and it agrees to establish a voting 
trust agreement (VTA) or proxy agreement (PA) (see Sec.  2004.34(f)) 
because both VTAs and PAs effectively negate foreign government 
control.
    (f) Limited entity eligibility determination. CSAs may choose to 
allow GCAs to request limited entity eligibility determinations (this 
is not the same as limited entity eligibility in situations involving 
FOCI when the FOCI is not mitigated or negated; for more information on 
limited entity eligibility in such FOCI cases, see Sec.  2004.34(i)). 
If a CSA permits GCAs to request a limited entity eligibility 
determination, it must set out parameters within its implementing 
policies that are consistent with the requirements below:
    (1) The GCA, or an entity with limited eligibility, must first 
request a limited entity eligibility determination from the CSA for the 
relevant entity and provide justification for limiting eligibility in 
that case;
    (2) Limited entity eligibility is specific to the requesting GCA's 
classified information, and to a single, narrowly defined contract, 
agreement, or circumstance;
    (3) The entity must otherwise meet the requirements for entity 
eligibility set out in this part;
    (4) The CSA documents the requirements of each limited entity 
eligibility determination it makes, including the scope of, and any 
limitations on, access to classified information;
    (5) The CSA verifies limited entity eligibility determinations only 
to the requesting GCA or entity. In the case of multiple limited entity 
eligibility determinations for a single entity, the CSA verifies each 
one separately only to its requestor; and
    (6) CSAs administratively terminate the limited entity eligibility 
when there is no longer a need for access to the classified information 
for which the CSA approved the limited entity eligibility.
    (g) Terminating or revoking eligibility. (1) The responsible CSA 
terminates the entity's eligible status when the entity no longer has a 
need for access to classified information.
    (2) The responsible CSA revokes the entity's eligible status if the 
entity is unable or unwilling to protect classified information.
    (3) The CSA coordinates with the GCA(s) to take interim measures, 
as necessary, toward either termination or revocation.


Sec.  2004.34   Foreign ownership, control, or influence (FOCI).

    (a) FOCI determination. A U.S. entity is under foreign ownership, 
control, or influence (FOCI) when:
    (1) A foreign interest has the power to direct or decide matters 
affecting the entity's management or operations in a manner that could:
    (i) Result in unauthorized access to classified information; or
    (ii) Adversely affect performance of a classified contract or 
agreement; and
    (2) The foreign interest exercises that power:
    (i) Directly or indirectly;
    (ii) Through ownership of the U.S. entity's securities, by 
contractual arrangements, or other similar means;
    (iii) By the ability to control or influence the election or 
appointment of one or more members to the entity's governing board 
(e.g. board of directors, board of managers, board of trustees) or its 
equivalent; or
    (iv) Prospectively (i.e., is not currently exercising the power, 
but could).
    (b) CSA guidance. The CSA establishes guidance for entities on 
filling out and submitting a Standard Form (SF) 328, Certificate 
Pertaining to Foreign Interests (OMB Control No. 0704-0194), and on 
reporting changes in circumstances that might result in a determination 
that the entity is under FOCI or is no longer under FOCI. The CSA also 
advises entities on the Government appeal channels for disputing CSA 
FOCI determinations.
    (c) FOCI factors. To determine whether an entity is under FOCI, the 
CSA analyzes available information to determine the existence, nature, 
and source of FOCI. The CSA:
    (1) Considers information the entity or its parent provides on the 
SF 328 (OMB Control No. 0704-0194), and any other relevant information; 
and
    (2) Considers in the aggregate the following factors about the 
entity:
    (i) Record of espionage against U.S. targets, either economic or 
Government;
    (ii) Record of enforcement actions against the entity for 
transferring technology without authorization;
    (iii) Record of compliance with pertinent U.S. laws, regulations, 
and contracts or agreements;
    (iv) Type and sensitivity of the information the entity would 
access;
    (v) Source, nature, and extent of FOCI, including whether foreign 
interests hold a majority or minority position in the entity, taking 
into consideration the immediate, intermediate, and ultimate parent 
entities;
    (vi) Nature of any relevant bilateral and multilateral security and 
information exchange agreements;
    (vii) Ownership or control, in whole or in part, by a foreign 
government; and
    (viii) Any other factor that indicates or demonstrates foreign 
interest capability to control or influence the entity's operations or 
management.
    (d) Entity access while under FOCI. (1) If the CSA is determining 
whether an entity is eligible to access classified information and 
finds that the entity is under FOCI, the CSA must consider the entity 
ineligible for access to classified information. The CSA and the entity 
may then attempt to negotiate FOCI mitigation or negation measures 
sufficient to permit a favorable eligibility determination.
    (2) The CSA may not determine that the entity is eligible to access 
classified information until the entity has put into place appropriate 
security measures to negate or mitigate FOCI or is otherwise no longer 
under FOCI. If the degree of FOCI is such that no mitigation or 
negation efforts will be sufficient, or access to classified 
information would be inconsistent with national security interests, 
then the CSA will determine the entity ineligible for access to 
classified information.
    (3) If an entity comes under FOCI, the CSA may allow the existing 
eligibility status to continue while the CSA and the entity negotiate 
acceptable FOCI mitigation or negation measures, as long as there is no 
indication that classified information is at risk. If the entity does 
not actively negotiate mitigation or negation measures in good faith, 
or

[[Page 3229]]

there are no appropriate measures that will remove the possibility of 
unauthorized access or adverse effect on the entity's performance of 
contracts or agreements involving classified information, the CSA will 
take steps, in coordination with the GCA, to terminate eligibility.
    (e) FOCI and entities under the CCIPP. DHS may sponsor, as part of 
the CCIPP, a U.S. entity that is under FOCI, under the following 
circumstances:
    (1) The Secretary of DHS proposes appropriate FOCI risk mitigation 
or negation measures (see paragraph (f) of this section) to the other 
CSAs and ensures the anticipated release of classified information:
    (i) Is authorized for release to the country involved;
    (ii) Does not include information classified under the Atomic 
Energy Act; and
    (iii) Does not impede or interfere with the entity's ability to 
manage and comply with regulatory requirements imposed by other Federal 
agencies, such as the State Department's International Traffic in Arms 
Regulation.
    (2) If the CSAs agree the mitigation or negation measures are 
sufficient, DHS may proceed to enter a CCIPP information sharing 
agreement with the entity. If one or more CSAs disagree, the Secretary 
of DHS may seek a decision from the Assistant to the President for 
National Security Affairs before entering a CCIPP information sharing 
agreement with the entity.
    (f) Mitigation or negation measures to address FOCI. (1) The CSA-
approved mitigation or negation measures must assure that the entity 
can offset FOCI by effectively denying unauthorized people or entities 
access to classified information and preventing the foreign interest 
from adversely impacting the entity's performance on classified 
contracts or agreements.
    (2) Any mitigation or negation measures the CSA approves for an 
entity must not impede or interfere with the entity's ability to manage 
and comply with regulatory requirements imposed by other Federal 
agencies (such as Department of State's International Traffic in Arms 
Regulation).
    (3) If the CSA approves a FOCI mitigation or negation measure for 
an entity, it may agree that the measure, or particular portions of it, 
may apply to all of the present and future sub-entities within the 
entity's organization.
    (4) Mitigation or negation options are different for ownership 
versus control or influence; ownership necessitates a stronger 
mitigation or negation measure.
    (5) Methods to mitigate foreign control or influence (unrelated to 
ownership) may include:
    (i) Assigning specific oversight duties and responsibilities to 
independent board members;
    (ii) Formulating special executive-level security committees to 
consider and oversee matters that affect entity performance on 
classified contracts or agreements;
    (iii) Modifying or terminating loan agreements, contracts, 
agreements, and other understandings with foreign interests;
    (iv) Diversifying or reducing foreign-source income;
    (v) Demonstrating financial viability independent of foreign 
interests;
    (vi) Eliminating or resolving problem debt;
    (vii) Separating, physically or organizationally, the entity 
component performing on classified contracts or agreements;
    (viii) Adopting special board resolutions; and
    (ix) Other actions that effectively negate or mitigate foreign 
control or influence.
    (6) Methods to mitigate or negate foreign ownership include:
    (i) Board resolutions. The CSA and the entity may agree to a board 
resolution when a foreign interest does not own voting interests 
sufficient to elect, or is otherwise not entitled to representation on, 
the entity's governing board. The resolution must identify the foreign 
shareholders and their representatives (if any), note the extent of 
foreign ownership, certify that the foreign shareholders and their 
representatives will not require, will not have, and can be effectively 
excluded from, access to all classified information, and certify that 
the entity will not permit the foreign shareholders and their 
representatives to occupy positions that might enable them to influence 
the entity's policies and practices, affecting its performance on 
classified contracts or agreements.
    (ii) Security control agreements (SCAs). The CSA and the entity may 
agree to use an SCA when a foreign interest does not effectively own or 
control an entity (i.e., the entity is under U.S. control), but the 
foreign interest is entitled to representation on the entity's 
governing board. At least one cleared U.S. citizen must serve as an 
outside director on the entity's governing board.
    (iii) Special security agreements (SSAs). The CSA and the entity 
may agree to use an SSA when a foreign interest effectively owns or 
controls an entity. The SSA preserves the foreign owner's right to be 
represented on the entity's board or governing body with a direct voice 
in the entity's business management, while denying the foreign owner 
majority representation and unauthorized access to classified 
information. When a GCA requires an entity to have access to proscribed 
information, and the CSA proposes or approves an SSA as the mitigation 
measure, the GCA must also make a national interest determination (NID) 
before the CSA can determine an entity's eligibility for access. See 
paragraph (h) of this section for more information on NIDs.
    (iv) Voting trust agreements (VTAs) or proxy agreements (PAs). The 
CSA and the entity may agree to use one of these measures when a 
foreign interest effectively owns or controls an entity. The VTA and PA 
are substantially identical arrangements that vest the voting rights of 
the foreign-owned stock in cleared U.S. citizens approved by the CSA. 
Under the VTA, the foreign owner transfers legal title in the entity to 
the trustees approved by the CSA. Under the PA, the foreign owner 
conveys their voting rights to proxy holders approved by the CSA. The 
entity must be organized, structured, and financed to be capable of 
operating as a viable business entity independently from the foreign 
owner. Both VTAs and PAs can effectively negate foreign ownership and 
control; therefore, neither imposes any restrictions on the entity's 
eligibility to have access to classified information or to compete for 
classified contracts or agreements, including those involving 
proscribed information. Both VTAs and PAs can also effectively negate 
foreign government control.
    (v) Combinations of the above measures or other similar measures 
that effectively mitigate or negate the risks involved with foreign 
ownership.
    (g) Standards for FOCI mitigation or negation measures. The CSA 
must include the following requirements as part of any FOCI mitigation 
or negation measures, to ensure that entities implement necessary 
security and governing controls:
    (1) Annual certification and annual compliance reports by the 
entity's governing board and the KMOs;
    (2) The U.S. Government remedies in case the entity is not 
adequately protecting classified information or not adhering to the 
provisions of the mitigation or negation measure;
    (3) Supplements to FOCI mitigation or negation measures as the CSA 
deems necessary. In addition to the standard FOCI mitigation or 
negation measure's requirements, the CSA may require more procedures 
via a supplement, based upon the circumstances of an

[[Page 3230]]

entity's operations. The CSA may place these requirements in 
supplements to the FOCI mitigation or negation measure to allow 
flexibility as circumstances change without having to renegotiate the 
entire measure. When making use of supplements, the CSA does not 
consider the FOCI mitigation measure final until it approves the 
required supplements (e.g., technology control plan, electronic 
communication plan); and
    (4) For agreements to mitigate or negate ownership (PAs, VTAs, 
SSAs, and SCAs), the following additional requirements apply:
    (i) FOCI oversight. The CSA verifies that the entity establishes an 
oversight body consisting of trustees, proxy holders or outside 
directors, as applicable, and those officers or directors whom the CSA 
determines are eligible for access to classified information (see Sec.  
2004.36). The entity's security officer is the principal advisor to the 
oversight body and attends their meetings. The oversight body:
    (A) Maintains policies and procedures to safeguard classified 
information in the entity's possession with no adverse impact on 
classified contract or agreement performance; and
    (B) Verifies the entity is complying with the FOCI mitigation or 
negation measure and related documents, contract security requirements 
or equivalent, and the NISP;
    (ii) Qualifications of trustees, proxy holders, and outside 
directors. The CSA determines eligibility for access to classified 
information for trustees, proxy holders, and outside directors at the 
classification level of the entity's eligibility determination. 
Trustees, proxy holders, and outside directors must meet the following 
criteria:
    (A) Be resident U.S. citizens who can exercise management 
prerogatives relating to their position in a way that ensures that the 
foreign owner can be effectively insulated from the entity or 
effectively separated from the entity's classified work; and
    (B) Be completely disinterested individuals with no prior 
involvement with the entity, the entities with which it is affiliated, 
or the foreign owner;
    (C) No other circumstances that may affect an individual's ability 
to serve effectively; such as, the number of boards on which the 
individual serves, the length of time serving on any other boards.
    (iii) Annual meeting. The CSA meets at least annually with the 
oversight body to review the purpose and effectiveness of the FOCI 
mitigation or negation agreement; establish a common understanding of 
the operating requirements and their implementation; and provide 
guidance on matters related to FOCI mitigation and industrial security. 
These meetings include a CSA review of:
    (A) Compliance with the approved FOCI mitigation or negation 
measure;
    (B) Problems regarding practical implementation of the mitigation 
or negation measure; and
    (C) Security controls, practices, or procedures and whether they 
warrant adjustment; and
    (iv) Annual certification. The CSA reviews the entity's annual 
report; addresses, and resolves issues identified in the report; and 
documents the results of this review and any follow-up actions.
    (h) National Interest Determination (NID). (1) Requirement for a 
NID. When a GCA requires an entity to have access to proscribed 
information, and the CSA proposes or approves an SSA as the FOCI 
mitigation measure, the GCA must determine (with controlling agency 
concurrence when appropriate) whether releasing the proscribed 
information to the entity under an SSA is consistent with the national 
security interests of the United States. This determination is called a 
national interest determination (NID). A favorable NID confirms that an 
entity's access to the proscribed information is consistent with such 
interests and allows the CSA to make a positive entity eligibility 
determination in such cases if the entity meets the other eligibility 
requirements. If the NID is not favorable, an entity may not have 
access to the proscribed information.
    (i) The CSA requests a NID from the GCA for new contracts or 
agreements at any phase that requires access to proscribed information; 
and existing contracts or agreements (or any relevant sub-contracts or 
sub-agreements) when the GCA adds a requirement for access to 
proscribed information or adds a new sub-entity that operates under an 
SSA and requires access to proscribed information. The GCA may initiate 
a NID prior to receiving the request from the CSA, when appropriate.
    (ii) While CSAs normally request NIDs on a case-by-case contract- 
or agreement-specific basis, the CSA, GCA, and applicable controlling 
agency may decide to make a NID on another basis, using criteria the 
CSA establishes. In such cases, the GCA provides the CSA with a written 
statement that the NID covers a specific contract or program and all 
follow-on contracts associated that program, and lists all contracts or 
agreements covered by the NID in cases in which the GCA can identify 
them.
    (iii) When an entity has a favorable NID for a given contract or 
agreement, the CSA does not have to request a new NID for the same 
entity when the access requirements for proscribed information and 
terms remain unchanged for:
    (A) Renewal of the contract or agreement;
    (B) New task orders issued under the contract or agreement;
    (C) A new contract or agreement that contains the same provisions 
as the previous (this usually applies when the contract or agreement is 
for a program or project); or
    (D) Renewal of the SSA.
    (2) Process. (i) The CSA requests the NID from the GCA and provides 
the GCA with pertinent information, such as: The FOCI assessment; a 
copy of the SSA; and any other relevant information that might help the 
GCA make its determination.
    (ii) If another agency (or agencies) controls any category of the 
proscribed information involved, the GCA or CSA also coordinates with 
the controlling agency(ies) to request their concurrence on the GCA's 
NID. In cases involving one or more controlling agencies, a favorable 
NID is not final until the relevant controlling agencies concur with 
the determination in writing for the proscribed information under their 
control. The GCA or CSA provides the relevant controlling agency(ies) 
with: A statement that ``Access to the proscribed information by the 
entity is consistent with the national security interests of the United 
States''; the FOCI assessment; a copy of the SSA; a contract security 
classification specification (or equivalent); justification for access 
and a description of the proscribed information involved; and any other 
relevant information that might help the controlling agency consider 
the request.
    (iii) In cases in which the GCA has authority over all the 
categories of proscribed information involved, the CSA may make an 
entity eligibility determination or upgrade an existing eligibility 
level to top secret only after the GCA notifies the CSA in writing of a 
favorable NID, except as described in paragraph (h)(3)(iii)(A) of this 
section.
    (iv) In cases in which the GCA requests concurrence from one or 
more controlling agencies, it does not notify the CSA of its NID until 
the controlling agency concurs. In cases in which the CSA requests 
concurrence from the controlling agency, the CSA may not act upon a 
favorable GCA NID until it also receives written concurrence from the 
controlling agency(ies). In both cases, the CSA may not make an 
eligibility determination until all the relevant controlling agencies 
concur in writing on a favorable NID and the GCA notifies the CSA in 
writing of its final NID,

[[Page 3231]]

except as described in paragraph (h)(3)(iii)(B) of this section.
    (3) Timing. (i) When the GCA has authority over all of the 
categories of proscribed information involved, the GCA provides a 
final, written NID to the CSA, with a copy to the entity, within 30 
days after the GCA receives the NID request.
    (ii) If a controlling agency controls any of the involved 
categories of proscribed information, the GCA provides a final, written 
NID to the CSA, with a copy to the entity, within 60 days after the GCA 
receives the NID request.
    (A) In such cases, the GCA notifies the relevant controlling 
agency(ies) of its NID in writing within 30 days after it receives the 
NID request, and each controlling agency concurs or non-concurs in 
writing to the GCA or CSA within the next 30 days unless there are 
extenuating circumstances.
    (B) In cases in which there are extenuating circumstances, the 
controlling agency responds to the GCA or CSA within 30 days to explain 
the extenuating circumstances, request additional information as 
needed, and coordinate a plan and timeline for completion.
    (iii) If the GCA cannot make the NID within the 30- or 60-day 
timeframes in paragraphs (h)(3)(i) and (h)(3)(ii) of this section, the 
GCA must notify the CSA in writing and explain the extenuating 
circumstances causing the delay. The GCA must provide written updates 
to the CSA, or its designee, every 30 days until it makes the 
determination. In turn, the CSA provides the entity with updates every 
30 days.
    (A) When the GCA has authority over all the categories of the 
proscribed information involved, if the GCA does not provide the CSA 
with a NID within 30 days, the CSA does not have to delay any longer to 
make the entity eligibility determination or upgrade it to top secret 
and implement an SSA to wait for the NID, as long as the GCA does not 
indicate that the NID might be negative. However, the entity must not 
have access to proscribed information under a new contract until the 
GCA makes a favorable NID.
    (B) In some cases in which one or more controlling agencies have 
authority over any category of the proscribed information involved, the 
GCA or CSA might receive concurrence on a favorable NID from some of 
the controlling agencies within 60 days, but not others. In such cases, 
the CSA may proceed with an eligibility determination or upgrade it to 
top secret eligibility and implement an SSA, but only for those 
categories of proscribed information for which a controlling agency has 
concurred. The entity must not have access to any category of 
proscribed information for which a controlling agency that has not yet 
concurred.
    (iv) Unless cancelled sooner by the GCA that made the NID, a NID 
remains in effect for the duration of the contract or agreement. When a 
NID is not contract- or agreement-specific, the CSA, the GCA, and any 
applicable controlling agency determine how long the NID remains in 
effect based on the criteria used to make the NID.
    (i) Limited eligibility determinations (for entities under FOCI 
without mitigation or negation). (1) In exceptional circumstances when 
an entity is under FOCI, the CSA may decide that limited eligibility 
for access to classified information is appropriate when the entity is 
unable or unwilling to implement FOCI mitigation or negation measures 
(this is not the same as limited eligibility in other circumstances; 
for more information on limited eligibility in other cases, see Sec.  
2004.32(f)).
    (2) The GCA first decides whether to request a limited eligibility 
determination for the entity and must articulate a compelling need for 
it that is in accordance with U.S. national security interests. The GCA 
must verify that access to classified information is essential to 
contract or agreement performance, and accept the risk inherent in not 
mitigating or negating the FOCI.
    (3) The CSA may grant a limited eligibility determination if the 
GCA requests and the entity meets all other eligibility criteria in 
Sec.  2004.32(e).
    (4) A foreign government may sponsor a U.S. sub-entity of a foreign 
entity for limited eligibility when the foreign government desires to 
award a contract or agreement to the U.S. sub-entity that involves 
access to classified information for which the foreign government is 
the original classification authority (i.e., foreign government 
information), and there is no other need for the U.S. sub-entity to 
have access to classified information.
    (5) Limited eligibility determinations are specific to the 
classified information of the requesting GCA or foreign government, and 
specific to a single, narrowly defined contract, agreement, or 
circumstance of that GCA or foreign government.
    (6) The access limitations of a favorable limited eligibility 
determination apply to all of the entity's employees, regardless of 
citizenship.
    (7) A limited eligibility determination is not an option for 
entities that require access to proscribed information when a foreign 
government has ownership or control over the entity. See Sec.  
2004.32(e)(9).
    (8) The CSA administratively terminates the entity's limited 
eligibility when there is no longer a need for access to the classified 
information for which the CSA made the favorable limited eligibility 
determination. Terminating one limited eligibility status does not 
impact other ones the entity may have.


Sec.  2004.36   Determining entity employee eligibility for access to 
classified information.

    (a) Making employee eligibility determinations. (1) The responsible 
CSA:
    (i) Determines whether entity employees meet the criteria 
established in the Revised Adjudicative Guidelines for Determining 
Eligibility for Access to Classified Information issued by White House 
memorandum, December 29, 2005, and in accordance with applicable 
executive branch procedures. Entity employees must have a legitimate 
requirement (i.e., need to know) for access to classified information 
in the performance of assigned duties and eligibility must be clearly 
consistent with the interest of the national security.
    (ii) Notifies entities of its determinations of employee 
eligibility for access to classified information.
    (iii) Terminates eligibility status when there is no longer a need 
for access to classified information by entity employees.
    (2) The responsible CSA maintains:
    (i) SF 312s, Classified Information Nondisclosure Agreements, or 
other approved nondisclosure agreements, executed by entity employees, 
as prescribed by ODNI in accordance with 32 CFR 2001.80 and E.O. 13526; 
and
    (ii) Records of its entity employee eligibility determinations, 
suspensions, and revocations.
    (3) CSAs ensure that entities limit the number of employees with 
access to classified information to the minimum number necessary to 
work on classified contracts or agreements.
    (4) The CSA determines the need for event-driven reinvestigations 
for entity employees.
    (5) CSAs use the Federal Investigative Standards (FIS) issued 
jointly by the Suitability and Security Executive Agents.
    (6) The CSA provides guidance to entities on:
    (i) Requesting employee eligibility determinations, to include 
guidance for submitting fingerprints; and
    (ii) Granting employee access to classified information when the

[[Page 3232]]

employee has had a break in access or a break in employment.
    (7) If the CSA receives adverse information about an eligible 
entity employee, the CSA should consider and possibly investigate to 
determine whether the employee's eligibility to access classified 
information remains clearly consistent with the interests of national 
security. If the CSA determines that an entity employee's continued 
eligibility is not in the interest of national security, the CSA 
implements procedures leading to suspension and ultimate revocation of 
the employee's eligible status, and notifies the entity.
    (b) Consultants. A consultant is an individual under contract or 
agreement to provide professional or technical assistance to an entity 
in a capacity requiring access to classified information. A consultant 
is considered an entity employee for security purposes. The CSA makes 
eligibility determinations for entity consultants in the same way it 
does for entity employees.
    (c) Reciprocity. The responsible CSA determines if an entity 
employee was previously investigated or determined eligible by another 
CSA. CSAs reciprocally accept existing employee eligibility 
determinations in accordance with applicable and current national level 
personnel security policy, and do not duplicate employee eligibility 
investigations conducted by another CSA.
    (d) Limited access authorization (LAA). (1) CSAs may make LAA 
determinations for non-U.S. citizen entity employees in rare 
circumstances, when:
    (i) A non-U.S. citizen employee possesses unique or unusual skill 
or expertise that the agency urgently needs to support a specific U.S. 
Government contract or agreement; and
    (ii) A U.S. citizen with those skills is not available.
    (2) A CSA may grant LAAs up to the secret classified level.
    (3) CSAs may not use LAAs for access to:
    (i) Top secret (TS) information;
    (ii) RD or FRD information;
    (iii) Information that a Government-designated disclosure authority 
has not determined releasable to the country of which the individual is 
a citizen;
    (iv) COMSEC information;
    (v) Intelligence information, to include SCI;
    (vi) NATO information, except as follows: Foreign nationals of a 
NATO member nation may be authorized access to NATO information subject 
to the terms of the contract, if the responsible CSA obtains a NATO 
security clearance certificate from the individual's country of 
citizenship. NATO access is limited to performance on a specific NATO 
contract;
    (vii) Information for which the U.S. Government has prohibited 
foreign disclosure in whole or in part; or
    (viii) Information provided to the U.S. Government by another 
government that is classified or provided in confidence.
    (4) The responsible CSA provides specific procedures to entities 
for requesting LAAs. The GCA must concur on an entity's LAA request 
before the CSA may grant it.


Sec.  2004.38   Safeguarding and marking.

    (a) Safeguarding approval. (1) The CSA determines whether an 
entity's safeguarding capability meets requirements established in 32 
CFR 2001, and other applicable national level policy (e.g., Atomic 
Energy Act for RD). If the CSA makes a favorable determination, the 
entity may store classified information at that level or below. If the 
determination is not favorable, the CSA must ensure that the entity 
does not possess classified information or does not possess information 
at a level higher than the approved safeguarding level.
    (2) The CSA maintains records of its safeguarding capability 
determinations and, upon request from GCAs or entities, and as 
appropriate and to the extent authorized by law, verifies that it has 
made a favorable safeguarding determination for a given entity and at 
what level.
    (b) Marking. The GCA provides guidance to entities that meets 
requirements in 32 CFR 2001.22, 2001.23, 2001.24, and 2001.25, 
Derivative classification, Classification marking in the electronic 
environment, Additional requirements, and Declassification markings; 
ISOO's marking guide, Marking Classified National Security Information; 
and other applicable national level policy (e.g., Atomic Energy Act for 
RD) for marking classified information and material.


Sec.  2004.40   Information system security.

    (a) The responsible CSA must authorize an entity information system 
before the entity can use it to process classified information. The CSA 
must use the most complete, accurate, and trustworthy information to 
make a timely, credible, and risk-based decision whether to authorize 
an entity's system.
    (b) The responsible CSA issues to entities guidance that 
establishes protection measures for entity information systems that 
process classified information. The responsible CSA must base the 
guidance on standards applicable to Federal systems, which must include 
the Federal Information Security Modernization Act of 2014 (FISMA), 
Public Law 113-283, and may include National Institute of Standards and 
Technology (NIST) publications, Committee on National Security Systems 
(CNSS) publications, and Federal information processing standards 
(FIPS).


Sec.  2004.42   International programs security. [Reserved]

Appendix A to Part 2004--Acronym Table

    For details on many of these terms, see the definitions at Sec.  
2004.4.
CCIPP--Classified Critical Infrastructure Protection Program
CCIPP POC--Entity point of contact under the CCIPP program
CIA--Central Intelligence Agency
CSA--Cognizant security agency
CNSS--Committee on National Security Systems
COMSEC--Communications security
CSO--Cognizant security office
DHS--Department of Homeland Security
DoD--Department of Defense
DOE--Department of Energy
EA--Executive agent (the NISP executive agent is DoD)
E.O.--Executive Order
FAR--Federal Aquisition Regulation
FOCI--Foreign ownership, control, or influence
GCA--Government contracting activity
Insider threat SO--insider threat senior official (for an agency or 
for an entity)
ISOO--Information Security Oversight Office of the National Archives 
and Records Administration (NARA)
KMO--Key managers and officials (of an entity)
LAA--Limited access authorization
NID--National interest determination
NISPOM--National Industrial Security Program Operating Manual
NRC--Nuclear Regulatory Commission
NSA--National Security Agency
ODNI--Office of the Director of National Intelligence
PA--Proxy agreement
RD--Restricted data
SF--Standard Form
SAO--Senior agency official for NISP
SAP--Special access program
SCA--Security control agreement
SCI--Sensitive compartmented information
SSA--Special security agreement
TS--Top secret (classification level)
VT--Voting trust

    Dated: January 3, 2017.
David S. Ferriero,
Archivist of the United States.

[FR Doc. 2017-00152 Filed 1-10-17; 8:45 am]
 BILLING CODE 7515-01-P



                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                                  3219

                                                    (1) Model 328–100 airplanes, on which                   (1) 328 Support Services GmbH Alert                    (2) For service information identified in
                                                  Dornier 328 Service Bulletin SB–328–28–                 Service Bulletin ASB–328–28–041, dated                 this AD, contact 328 Support Services GmbH,
                                                  490, has been incorporated.                             June 14, 2016.                                         Global Support Center, P.O. Box 1252, D–
                                                    (2) Model 328–300 airplanes, on which                   (2) 328 Support Services GmbH Alert                  82231 Wessling, Federal Republic of
                                                  Dornier 328J Service Bulletin SB–328J–28–               Service Bulletin ASB–328J–28–018, dated                Germany; telephone +49 8153 88111 6666;
                                                  241, has been incorporated.                             June 3, 2016.                                          fax +49 8153 88111 6565; email gsc.op@
                                                                                                                                                                 328support.de; Internet http://
                                                  (d) Subject                                             (k) Other FAA AD Provisions
                                                                                                                                                                 www.328support.de. You may view this
                                                    Air Transport Association (ATA) of                       The following provisions also apply to this         service information at the FAA, Transport
                                                  America Code 28, Fuel.                                  AD:                                                    Airplane Directorate, 1601 Lind Avenue SW.,
                                                                                                             (1) Alternative Methods of Compliance               Renton, WA. For information on the
                                                  (e) Reason                                              (AMOCs): The Manager, International                    availability of this material at the FAA, call
                                                     This AD was prompted by reports of                   Branch, ANM–116, Transport Airplane                    425–227–1221.
                                                  broken bonding wires of certain fuel line               Directorate, FAA, has the authority to
                                                  clamps. We are issuing this AD to prevent the           approve AMOCs for this AD, if requested                  Issued in Renton, Washington, on
                                                  loss of bonding function, which, in                     using the procedures found in 14 CFR 39.19.            December 27, 2016.
                                                  combination with a lightning strike, could              In accordance with 14 CFR 39.19, send your             Jeffrey E. Duven,
                                                  create a source of ignition in a fuel tank,             request to your principal inspector or local           Manager, Transport Airplane Directorate,
                                                  possibly resulting in a fire or explosion and           Flight Standards District Office, as                   Aircraft Certification Service.
                                                  consequent loss of the airplane.                        appropriate. If sending information directly
                                                                                                          to the International Branch, send it to ATTN:          [FR Doc. 2016–31965 Filed 1–10–17; 8:45 am]
                                                  (f) Compliance
                                                                                                          Todd Thompson, Aerospace Engineer,                     BILLING CODE 4910–13–P
                                                     Comply with this AD within the                       International Branch, ANM–116, Transport
                                                  compliance times specified, unless already              Airplane Directorate, FAA, 1601 Lind
                                                  done.                                                   Avenue SW., Renton, WA 98057–3356;
                                                                                                          telephone 425–227–1175; fax 425–227–1149.              NATIONAL ARCHIVES AND RECORDS
                                                  (g) Inspection
                                                                                                          Information may be emailed to: 9-ANM-116-              ADMINISTRATION
                                                     Within 6 months after the effective date of          AMOC-REQUESTS@faa.gov. Before using
                                                  this AD, do a one-time general visual                   any approved AMOC, notify your appropriate             Information Security Oversight Office
                                                  inspection for discrepancies, as identified in,         principal inspector, or lacking a principal
                                                  and in accordance with, the Accomplishment              inspector, the manager of the local flight
                                                  Instructions of the service information
                                                                                                                                                                 32 CFR Part 2004
                                                                                                          standards district office/certificate holding
                                                  specified in paragraph (g)(1) or (g)(2) of this         district office.                                       [FDMS No. NARA–16–0006; Agency No.
                                                  AD, as applicable.                                         (2) Contacting the Manufacturer: For any            NARA–2017–017]
                                                     (1) 328 Support Services GmbH Alert                  requirement in this AD to obtain corrective
                                                  Service Bulletin ASB–328–28–041, Revision
                                                                                                          actions from a manufacturer, the action must           RIN 3095–AB79
                                                  1, dated October 13, 2016 (Model 328–100
                                                                                                          be accomplished using a method approved
                                                  airplanes).
                                                                                                          by the Manager, International Branch, ANM–             National Industrial Security Program
                                                     (2) 328 Support Services GmbH Alert
                                                                                                          116, Transport Airplane Directorate, FAA; or
                                                  Service Bulletin ASB–328J–28–018, Revision                                                                     AGENCY:  Information Security Oversight
                                                                                                          the European Aviation Safety Agency
                                                  1, dated October 13, 2016 (Model 328–300
                                                  airplanes).
                                                                                                          (EASA); or 328 Support Services GmbH’s                 Office, National Archives and Records
                                                                                                          EASA Design Organization Approval (DOA).               Administration (NARA).
                                                  (h) Replacement of Parts                                If approved by the DOA, the approval must
                                                                                                                                                                 ACTION: Proposed rule.
                                                     If any discrepancy is found during the               include the DOA-authorized signature.
                                                  inspection required by paragraph (g) of this               (3) Reporting Requirements: A federal
                                                                                                                                                                 SUMMARY:   The Information Security
                                                  AD, before further flight, replace the affected         agency may not conduct or sponsor, and a
                                                                                                          person is not required to respond to, nor              Oversight Office (ISOO) of the National
                                                  clamp in accordance with the                                                                                   Archives and Records Administration
                                                  Accomplishment Instructions of the service              shall a person be subject to a penalty for
                                                  information specified in paragraph (g)(1) or            failure to comply with a collection of                 (NARA), proposes to revise the National
                                                  (g)(2) of this AD, as applicable.                       information subject to the requirements of             Industrial Security Program (NISP)
                                                                                                          the Paperwork Reduction Act unless that                Directive. The NISP safeguards
                                                  (i) Reporting                                           collection of information displays a current           classified information the Federal
                                                     At the applicable time specified in                  valid OMB Control Number. The OMB                      Government or foreign governments
                                                  paragraph (i)(1) or (i)(2) of this AD, report the       Control Number for this information                    release to contractors, licensees,
                                                  inspection results, positive or negative, to            collection is 2120–0056. Public reporting for
                                                                                                          this collection of information is estimated to         grantees, and certificate holders. This
                                                  328 Support Services, GmbH, Global Support
                                                  Center, P.O. Box 1252, D–82231 Wessling,                be approximately 5 minutes per response,               proposed revision adds provisions
                                                  Federal Republic of Germany; fax +49 8153               including the time for reviewing instructions,         incorporating executive branch insider
                                                  88111 6565; email gsc.op@328support.de.                 completing and reviewing the collection of             threat policy and minimum standards,
                                                  The report must include findings on fuel line           information. All responses to this collection          identifies the Office of the Director of
                                                  clamps, aircraft serial number, total flight            of information are mandatory. Comments                 National Intelligence (ODNI) and the
                                                  hours, and total landings.                              concerning the accuracy of this burden and             Department of Homeland Security
                                                     (1) If the inspection was done on or after           suggestions for reducing the burden should             (DHS) as new cognizant security
                                                  the effective date of this AD: Submit the               be directed to the FAA at: 800 Independence
                                                  report within 30 days after the inspection.             Ave. SW., Washington, DC 20591, Attn:                  agencies (CSAs), and adds
                                                     (2) If the inspection was done before the            Information Collection Clearance Officer,              responsibilities for all CSAs and non-
                                                  effective date of this AD: Submit the report            AES–200.                                               CSA departments and agencies (to
                                                  within 30 days after the effective date of this                                                                reflect oversight functions that are
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                                                                          (l) Related Information
                                                  AD.                                                                                                            already detailed for private sector
                                                                                                             (1) Refer to Mandatory Continuing                   entities in the National Industrial
                                                  (j) Credit for Previous Actions                         Airworthiness Information (MCAI) EASA                  Security Program Operating Manual
                                                     This paragraph provides credit for actions           Airworthiness Directive 2016–0169, dated
                                                  required by paragraphs (g) and (h) of this AD,          August 17, 2016, for related information.
                                                                                                                                                                 (NISPOM)). The proposed revisions also
                                                  if those actions were performed before the              This MCAI may be found in the AD docket                make other administrative changes to be
                                                  effective date of this AD using the service             on the Internet at http://www.regulations.gov          consistent with recent revisions to the
                                                  information specified in paragraph (j)(1) or            by searching for and locating Docket No.               NISPOM and with updated regulatory
                                                  (j)(2) of this AD.                                      FAA–2016–9568.                                         language and style.


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00009   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3220                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  DATES:  Submit comments by February                     program. E.O. 12829 (amended in 1993)                  Connection with the Establishment of
                                                  10, 2017.                                               established the NISP to safeguard                      the Department of Homeland Security,
                                                  ADDRESSES: You may submit comments,                     classified information in industry and                 (January 23, 2003).
                                                  identified by RIN 3095–AB79, by any of                  preserve the nation’s economic and
                                                                                                                                                                 Revision Process and Proposed Changes
                                                  the following methods:                                  technological interests. The President
                                                     D Federal eRulemaking Portal: http://                issued E.O. 13691, Promoting Private                     This proposed rule reflects a national
                                                  www.regulations.gov. Follow the                         Sector Cybersecurity Information                       level policy framework that should not
                                                  instructions for submitting comments.                   Sharing (February 13, 2015 (80 FR                      change existing practices and
                                                     D Email: Regulation_comments@                        9347)), and E.O. 13708, Continuance or                 procedures for any of the affected
                                                  nara.gov. Include RIN 3095–AB79 in the                  Reestablishment of Certain Federal                     agencies or for entities in any significant
                                                  subject line of the message.                            Advisory Committees (September 30,                     way. A working group comprised of
                                                     D Mail (for paper, disk, or CD–ROM                   2015 (80 FR 60271)), which further                     NISP CSA representatives, ISOO staff,
                                                  submissions. Include RIN 3095–AB79 on                   amended E.O. 12829.                                    the Department of Defense’s (DoD)
                                                  the submission): Regulations Comments                      E.O. 12829, sec. 102(b), delegated                  Defense Security Service (DSS), and the
                                                  Desk (External Policy Program, Strategy                 oversight of the NISP to the Director of               Central Intelligence Agency, drafted this
                                                  and Performance Division (SP)); Suite                   NARA’s Information Security Oversight                  proposed rule.
                                                  4100; National Archives and Records                     Office (ISOO). As part of ISOO’s                         We initiated the proposed revisions in
                                                  Administration; 8601 Adelphi Road;                      responsibilities under E.O. 12829, it is               2013 to incorporate new insider threat
                                                  College Park, MD 20740–6001.                            authorized to issue such directives as                 program requirements as a result of E.O.
                                                     D Hand delivery or courier: Deliver                  necessary to implement the E.O., which                 13587, Structural Reforms to Improve
                                                  comments to the front desk at the                       are binding on agencies. In 2006, ISOO                 the Security of Classified Networks and
                                                  address above.                                          issued, and periodically updates, this                 the Responsible Sharing and
                                                     Instructions: You must include on all                regulation, which functions as one of                  Safeguarding of Classified Information,
                                                  submissions the Regulatory Information                  those directives.                                      October 2011, and the associated
                                                  Number (RIN) for this rulemaking (RIN                      This regulation establishes uniform                 National Insider Threat Policy and
                                                  3095–AB79) and NARA’s name. We                          standards throughout the Program, and                  Minimum Standards from the White
                                                  may publish any comments we receive                     helps agencies implement requirements                  House in November 2012. The national
                                                  without changes, including any                          in E.O. 12829, as amended (collectively                insider threat policy directs that the
                                                  personal information you provide.                       referred to as ‘‘E.O. 12829’’). This                   Government apply insider threat
                                                  FOR FURTHER INFORMATION CONTACT: For                    revision also establishes agency                       provisions to private sector entities that
                                                  information about this regulation and                   responsibilities for implementing the                  access classified information, which the
                                                  the regulatory process, contact Kimberly                insider threat provisions of E.O. 13587,               executive branch accomplishes through
                                                  Keravuori, External Policy Program                      Structural Reforms to Improve the                      the National Industrial Security Program
                                                  Manager, by email at regulation_                        Security of Classified Networks and the                Operating Manual (NISPOM), issued by
                                                  comments@nara.gov, or by telephone at                   Responsible Sharing and Safeguarding                   the NISP Executive Agent, DoD. The
                                                  301.837.3151. For information about the                 of Classified Information (October 7,                  NISPOM also provides private sector
                                                  NISP and the requirements in this                       2011 (76 FR 63811)) within the NISP.                   entities that access classified
                                                  regulation, contact William A. Cira,                    However, the regulation does not stand                 information with other NISP
                                                  Acting Director, ISOO, by telephone at                  alone; users should refer concurrently to              requirements and procedures. On the
                                                  202–357–5323.                                           the underlying executive orders for                    other side of the equation, this NISP
                                                  SUPPLEMENTARY INFORMATION: We have                      guidance.                                              regulation gives policy direction and
                                                  coordinated and vetted the proposed                        Nothing in this regulation supersedes               establishes responsibilities for the
                                                  revisions through the CSAs listed in                    the authority of the Secretary of Energy               agencies that release classified
                                                  Executive Order (E.O.) 12829, National                  or the Nuclear Regulatory Commission                   information to private sector entities to
                                                  Industrial Security Program (January 6,                 under the Atomic Energy Act of 1954,                   ensure that the agencies provide
                                                  1993 (58 FR 3479)), as amended by E.O.                  as amended (42 U.S.C. 2011, et seq.); the              consistent oversight of entity programs.
                                                  12885 (December 14, 1993 (58 FR                         authority of the Director of National                  We are therefore proposing revisions to
                                                  65863): Department of Defense,                          Intelligence (or any intelligence                      the regulation to add the insider threat
                                                  Department of Energy, Nuclear                           community element) under the                           requirements that pertain to NISP
                                                  Regulatory Commission, Office of the                    Intelligence Reform and Terrorism                      oversight by agencies; similar provisions
                                                  Director of National Intelligence, and                  Prevention Act of 2004 (Pub. L. 108–                   have been added to the NISPOM for
                                                  Department of Homeland Security. We                     458), the National Security Act of 1947                private sector entities to follow. The
                                                  have also coordinated this with the                     (50 U.S.C. 401, et seq.), as amended, and              NISP CSAs, ISOO, and the National
                                                  other executive branch agencies that are                E.O. 12333 (December 4, 1981), as                      Insider Threat Task Force (NITTF)
                                                  members of the National Industrial                      amended by E.O. 13355, Strengthened                    collaborated on the proposed insider
                                                  Security Program Policy Advisory                        Management of the Intelligence                         threat provisions that are incorporated.
                                                  Committee (NISPPAC) or that release                     Community (August 27, 2004) and E.O.                      During review of the regulation, the
                                                  classified information to contractors,                  13470, Further Amendments to                           working group determined that,
                                                  licensees, grantees, or certificate                     Executive Order 12333 (July 30, 2008);                 although the NISPOM provides
                                                  holders, and with the industry members                  or the authority of the Secretary of                   requirements and procedures for
                                                                                                          Homeland Security, as the Executive                    entities, this regulation did not include
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  of the NISPPAC. The proposed revisions
                                                  do not change requirements for industry                 Agent for the Classified National                      many of the coinciding oversight
                                                  (which are contained in the NISPOM),                    Security Information Program                           requirements for agencies. We therefore
                                                  but instead clarify agency                              established under E.O. 13549, Classified               expanded the revision to include adding
                                                  responsibilities.                                       National Security Information Program                  aspects of NISP implementation for
                                                                                                          for State, Local, Tribal, and Private                  which the agencies have a responsibility
                                                  Background                                              Sector Entities (August 18, 2010), or by               that weren’t already spelled out in the
                                                    The NISP is the Federal Government’s                  E.O. 13284, Amendment of Executive                     regulation. These proposed changes
                                                  single, integrated industrial security                  Orders, and Other Actions, in                          include adding responsibility provisions


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00010   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3221

                                                  for CSAs and Government contracting                     common framework that all CSAs can                     proposed rulemaking will not have a
                                                  activities (GCAs), standards by which                   effectively use because it sets out                    significant impact on a substantial
                                                  they make entity and employee                           requirements in terms that encompass                   number of small entities because it
                                                  eligibility determinations for access to                CSA processes for varying types of                     applies only to Federal agencies. This
                                                  classified information, standards for                   classified information under the NISP.                 regulation does not establish
                                                  assessing foreign ownership, control, or                These terminology changes do not                       requirements for entities; those
                                                  influence and for mitigating or negating                preclude the CSAs from using their                     requirements are established in the
                                                  it, and identifying CSA and non-CSA                     traditional terminology in agency                      NISPOM. This rule sets out coinciding
                                                  agency responsibilities for security                    policies that implement this rule or in                requirements for agencies. However,
                                                  classification and for authorizing entity               the NISPOM.                                            agencies implementing this regulation
                                                  information systems to process                             The NISPOM currently includes a                     will do so through contracts with
                                                  classified information. While CSAs and                  limited facility security clearance as an              businesses (as well as other agreements
                                                  other agencies have been carrying out                   option for agencies to consider when                   with entities) and thus it indirectly
                                                  these responsibilities since the                        foreign ownership, control, or influence               affects those entities. Agencies have
                                                  establishment of the NISP under E.O.                    (FOCI) of an entity cannot be mitigated                been applying the requirements and
                                                  12829, and they have been spelled out                   or negated. We have added the limited                  procedures contained in the NISPOM
                                                  in the NISPOM, they were not                            eligibility determination option to this               (and, to a lesser extent, contained in this
                                                  previously included in this regulation.                 regulation, but have also expanded it to               regulation) to entities for 20 years, with
                                                  We are including them to ensure                         include limited eligibility for entities               the exception of insider threat
                                                  agencies consistently apply the NISP                    that are not under FOCI, but for which                 provisions added to the NISPOM in
                                                  requirements for all entities that have                 an agency considers it appropriate to                  2016, and the proposed additions to this
                                                  access to classified information and                    limit access to a specific and narrow                  regulation do not substantially alter
                                                  thereby aid in reducing processing                      purpose.                                               those requirements. Most of the
                                                  burdens on entities. This affords                          In addition, we have made some                      provisions being added to this
                                                  agencies the opportunity to ensure that                 drafting changes to make the regulation                regulation have applied to entities
                                                  they are complying with existing NISP                   more readable.                                         through the NISPOM; we are simply
                                                  requirements, to include verifying that                                                                        incorporating the agency
                                                                                                          Regulatory Analysis                                    responsibilities for those requirements
                                                  all current contracts or agreements with
                                                  contractors, licensees, or grantees                       The Office of Management and Budget                  into the regulation.
                                                  include appropriate security                            (OMB) has reviewed this proposed                          Other revisions to this regulation are
                                                  requirements. E.O. 12829 was amended                    regulation.                                            primarily administrative, except the
                                                  by E.O. 13691, Promoting Private Sector                                                                        new insider threat requirements. The
                                                                                                          Review Under Executive Orders 12866
                                                  Cybersecurity Information Sharing, in                                                                          insider threat requirements make minor
                                                                                                          and 13563
                                                  February 2015. The amendment                                                                                   additions to training, oversight,
                                                  established the DHS as a CSA, not                          Executive Order 12866, Regulatory                   information system security, and similar
                                                  limited to the classified critical                      Planning and Review, 58 FR 51735                       functions already being conducted by
                                                  infrastructure protection program                       (September 30, 1993), and Executive                    entities, and thus will not have a
                                                  (CCIPP). As part of its CSA                             Order 13563, Improving Regulation and                  significant economic impact on a
                                                  responsibilities, DHS will perform                      Regulation Review, 76 FR 23821                         substantial number of small business
                                                  oversight of critical sector entities                   (January 18, 2011), direct agencies to                 entities.
                                                  participating in the CCIPP. We also                     assess all costs and benefits of available
                                                                                                          regulatory alternatives and, if regulation             Review Under the Paperwork Reduction
                                                  incorporated DHS responsibilities as a
                                                                                                          is necessary, to select regulatory                     Act of 1995 (44 U.S.C. 3501 et seq.)
                                                  CSA and the provisions of the CCIPP
                                                  into this revision.                                     approaches that maximize net benefits                    This proposed rule contains
                                                     We have also made some proposed                      (including potential economic,                         information collection activities that are
                                                  revisions to more clearly set out items                 environmental, public health and safety                subject to review and approval by the
                                                  that were already in the regulation. One                effects, distributive impacts, and                     Office of Management and Budget
                                                  such proposed change is the approach                    equity). This proposed rule is                         (OMB) under the Paperwork Reduction
                                                  to reciprocity. Because of the separate                 ‘‘significant’’ under Executive Order                  Act. We refer to the following OMB-
                                                  and unique authorities of the CSAs, one                 12866, sec. 3(f), but is not a major rule              approved DoD information collection in
                                                  CSA might not, in some cases,                           as defined in 5 U.S.C. Chapter 8,                      §§ 2004.34(b), 2004.34(c)(1) of this
                                                  reciprocally accept entity eligibility                  Congressional Review of Agency                         regulation: OMB control No. 0704–0194,
                                                  determinations made by another CSA.                     Rulemaking. The Office of Management                   SF 328, Certificate Pertaining to Foreign
                                                  However, the proposed revision                          and Budget (OMB) has reviewed this                     Interests, approved through September
                                                  stipulates that CSAs will not require                   proposed regulation.                                   30, 2019. DoD published the
                                                  entities to go through duplicate steps for                                                                     information collection notice in the
                                                                                                          Review Under the Regulatory Flexibility
                                                  eligibility determinations. This should                                                                        Federal Register in May 2015 (80 FR
                                                                                                          Act (5 U.S.C. 601, et seq.)
                                                  help reduce and streamline eligibility                                                                         27938, May 15, 2015) for public
                                                  determinations for entities receiving                     This review requires an agency to                    comment, and the notice of OMB review
                                                  classified information from more than                   prepare an initial regulatory flexibility              in the Federal Register in July 2016 (81
                                                  one agency.                                             analysis and publish it when the agency
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                                                                                                                                 FR 47790, July 22, 2016), providing a
                                                     We are also proposing some new,                      publishes the proposed rule. This                      second opportunity for public comment.
                                                  more general terminology (like ‘‘entity                 requirement does not apply if the
                                                  eligibility determination,’’ which                      agency certifies that the rule will not, if            Review Under Executive Order 13132,
                                                  describes a process all CSAs do, instead                promulgated, have a significant                        Federalism, 64 FR 43255 (August 4,
                                                  of ‘‘facility security clearance (FCL),’’               economic impact on a substantial                       1999)
                                                  which is an agency-specific term for a                  number of small entities (5 U.S.C. 603).                 Review under Executive Order 13132
                                                  favorable determination resulting from                  As required by the Regulatory                          requires that agencies review
                                                  that process). Our goal is to create a                  Flexibility Act, we certify that this                  regulations for federalism effects on the


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00011   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3222                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  institutional interest of states and local              of executive-branch agency classified                  § 2004.4   Definitions that apply to this part.
                                                  governments, and, if the effects are                    information released to Federal                           (a) Access is the ability or opportunity
                                                  sufficiently substantial, prepare a                     contractors, licensees, grantees, and                  to gain knowledge of classified
                                                  Federal assessment to assist senior                     certificate holders. It establishes                    information.
                                                  policy makers. This proposed rule will                  uniform standards throughout the                          (b) Agency(ies) are any ‘‘Executive
                                                  not have any direct effects on State and                Program, and helps agencies implement                  agency’’ as defined in 5 U.S.C. 105; any
                                                  local governments within the meaning                    requirements in E.O. 12829, National                   ‘‘Military department’’ as defined in 5
                                                  of the Executive Order. Therefore, this                 Industrial Security Program, as                        U.S.C. 102; and any other entity within
                                                  rule does not include a federalism                      amended by E.O. 12558 and E.O.13691                    the executive branch that releases
                                                  assessment.                                             (collectively referred to as ‘‘E.O.                    classified information to private sector
                                                                                                          12829’’), E.O. 13691, Promoting Private                entities. This includes component
                                                  List of Subjects in 32 CFR Part 2004                                                                           agencies under another agency or under
                                                                                                          Sector Cybersecurity Information
                                                    Classified information, National                      Sharing, and E.O. 13587, Structural                    a cross-agency oversight office (such as
                                                  Industrial Security Program.                            Reforms to Improve the Security of                     ODNI with CIA), which are also
                                                    For the reasons stated in the                         Classified Networks and the                            agencies for purposes of this part.
                                                  preamble, the National Archives and                     Responsible Sharing and Safeguarding                      (c) Classified Critical Infrastructure
                                                  Records Administration proposes to                      of Classified Information. It applies to               Protection Program (CCIPP) is the DHS
                                                  revise 32 CFR part 2004 to read as                      any executive branch agency that                       program established by E.O. 13691,
                                                  follows:                                                                                                       ‘‘Promoting Private Sector Cybersecurity
                                                                                                          releases classified information to
                                                                                                                                                                 Information Sharing.’’ The Government
                                                                                                          current, prospective, or former Federal
                                                  PART 2004—NATIONAL INDUSTRIAL                                                                                  uses this program to share classified
                                                                                                          contractors, licensees, grantees, or
                                                  SECURITY PROGRAM (NISP)                                                                                        threat information with employees of
                                                                                                          certificate holders. However, this part
                                                                                                                                                                 private sector entities that own or
                                                  Subpart A—Implementation and Oversight                  does not stand alone; users should refer               operate critical infrastructure. Critical
                                                  2004.1 Purpose and scope.                               concurrently to the underlying                         infrastructure refers to systems and
                                                  2004.4 Definitions that apply to this part.             executive orders for guidance. ISOO                    assets, whether physical or virtual, so
                                                  2004.10 Responsibilities of the Director,               maintains policy oversight over the                    vital to the United States that
                                                      Information Security Oversight Office               NISP as established by E.O.12829.                      incapacitating or destroying such
                                                      (ISOO).
                                                                                                             (b) This part also does not apply to                systems and assets would have a
                                                  2004.11 CSA and agency implementing
                                                      regulations, internal rules, or guidelines.         release of classified information                      debilitating impact on security, national
                                                  2004.12 ISOO reviews of agency NISP                     pursuant to criminal proceedings. The                  economic security, national public
                                                      implementation.                                     Classified Information Procedures Act                  health or safety, or any combination
                                                                                                          (CIPA) (18 U.S.C. Appendix 3) governs                  thereof. These entities include banks
                                                  Subpart B—Administration                                                                                       and power plants, among others. The
                                                                                                          release of classified information in
                                                  2004.20 National Industrial Security                    criminal proceedings.                                  sectors of critical infrastructure are
                                                      Program Executive Agent (EA) and                                                                           listed in Presidential Policy Directive
                                                      Operating Manual (NISPOM).                             (c) Nothing in this part supersedes the
                                                                                                          authority of the Secretary of Energy or                21, Critical Infrastructure Security and
                                                  2004.22 Agency responsibilities.
                                                                                                                                                                 Resilience (February 12, 2013).
                                                  2004.24 Insider threat program.                         the Nuclear Regulatory Commission
                                                  2004.26 Reviews of entity NISP
                                                                                                                                                                    (d) Classified Critical Infrastructure
                                                                                                          under the Atomic Energy Act of 1954,                   Protection Program (CCIPP) security
                                                      implementation.                                     as amended (42 U.S.C. 2011, et seq.)
                                                  2004.28 Cost reports.                                                                                          point of contact (security POC) is an
                                                                                                          (collectively referred to as ‘‘the Atomic              official whom a CCIPP entity designates
                                                  Subpart C—Operations                                    Energy Act’’); the authority of the                    to maintain eligibility information about
                                                  2004.30 Security classification                         Director of National Intelligence (or any              the entity and its cleared employees,
                                                      requirements and guidance.                          intelligence community element) under                  and to report that information to DHS.
                                                  2004.32 Determining entity eligibility for              the Intelligence Reform and Terrorism                  The CCIPP security POC must be
                                                      access to classified information.                   Prevention Act of 2004 (Pub. L. 108–                   eligible for access to classified
                                                  2004.34 Foreign ownership, control, or                  458), the National Security Act of 1947
                                                      influence (FOCI).
                                                                                                                                                                 information.
                                                                                                          as amended (50 U.S.C. 401, et seq.), and                  (e) Classified information is
                                                  2004.36 Determining entity employee
                                                                                                          E.O. 12333 (December 4, 1981), as                      information the Government designates
                                                      eligibility for access to classified
                                                      information.                                        amended by E.O. 13355, Strengthened                    as requiring protection against
                                                  2004.38 Safeguarding and marking.                       Management of the Intelligence                         unauthorized disclosure in the interest
                                                  2004.40 Information system security.                    Community (August 27, 2004) and E.O.                   of national security, pursuant to E.O.
                                                  2004.42 International programs security.                13470, Further Amendments to                           13526, Classified National Security
                                                      [Reserved]                                          Executive Order 12333 (July 30, 2008)                  Information, or any predecessor order,
                                                  Appendix A to Part 2004—Acronym Table                   (collectively referred to as ‘‘E.O.                    and the Atomic Energy Act of 1954, as
                                                                                                          12333’’); or the authority of the                      amended. Classified information
                                                     Authority: Section 102(b)(1) of E.O. 12829           Secretary of Homeland Security, as the                 includes national security information
                                                  (January 6, 1993), as amended by E.O. 12885             Executive Agent for the Classified                     (NSI), restricted data (RD), and formerly
                                                  (December 14, 1993), E.O. 13691 (February               National Security Information Program                  restricted data (FRD), regardless of its
                                                  12, 2015), and section 4 of E.O. 13708
                                                                                                          established under E.O. 13549, Classified               physical form or characteristics
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  (September 30, 2015).
                                                                                                          National Security Information Program                  (including tangible items other than
                                                  Subpart A—Implementation and                            for State, Local, Tribal, and Private                  documents).
                                                  Oversight                                               Sector Entities (August 18, 2010), or as                  (f) Cognizance is the area over which
                                                                                                          established by E.O. 13284, Amendment                   a CSA has operational oversight.
                                                  § 2004.1   Purpose and scope.                           of Executive Orders, and Other Actions,                Normally, a statute or executive order
                                                     (a) This part sets out the National                  in Connection with the Establishment of                establishes a CSA’s cognizance over
                                                  Industrial Security Program (‘‘NISP’’ or                the Department of Homeland Security                    certain types of information, programs,
                                                  ‘‘the Program’’) governing the protection               (January 23, 2003).                                    or non-CSA agencies, although CSAs


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00012   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3223

                                                  may also have cognizance through an                     sensitive compartmented information                    and any person who is not a United
                                                  agreement with another CSA or non-                      (SCI), the controlling agency is ODNI.                 States citizen or national.
                                                  CSA agency or an entity. A CSA may                      For Top Secret and SAP information,                       (n) Government contracting activity
                                                  have cognizance over a particular                       the controlling agency is always the                   (GCA) is an agency component or
                                                  type(s) of classified information based                 same agency as the GCA.                                subcomponent to which the agency
                                                  on specific authorities (such as those                     (k) Entity is a generic and                         head delegates broad authority
                                                  listed in 2004.1(d)), and a CSA may                     comprehensive term which may include                   regarding acquisition functions. A
                                                  have cognizance over certain agencies or                sole proprietorships, partnerships,                    foreign government may also be a GCA.
                                                  cross-agency programs (such as DoD’s                    corporations, limited liability                           (o) Industrial security services are
                                                  cognizance over non-CSA agencies as                     companies, societies, associations,                    those activities performed by a CSA to
                                                  the EA for NISP, or ODNI’s oversight (if                institutions, contractors, licensees,                  verify that an entity is protecting
                                                  applicable) of all intelligence                         grantees, certificate holders, and other               classified information. They include,
                                                  community elements within the                           organizations usually established and                  but are not limited to, conducting
                                                  executive branch). Entities fall under a                operating to carry out a commercial,                   oversight reviews, making eligibility
                                                  CSA’s cognizance when they enter or                     industrial, educational, or other                      determinations, and providing agency
                                                  compete to enter contracts or                           legitimate business, enterprise, or                    and entity guidance and training.
                                                  agreements to access classified                         undertaking, or parts of these                            (p) Insider(s) are entity employees
                                                  information under the CSA’s                                                                                    who are eligible to access classified
                                                                                                          organizations. It may reference an entire
                                                  cognizance, including when they enter                                                                          information and may be authorized
                                                                                                          organization, a prime contractor, parent
                                                  or compete to enter such contracts or                                                                          access to any U.S. Government or entity
                                                                                                          organization, a branch or division,
                                                  agreements with a non-CSA agency or                                                                            resource (such as personnel, facilities,
                                                                                                          another type of sub-element, a sub-
                                                  another entity under the CSA’s                                                                                 information, equipment, networks, or
                                                                                                          contractor, subsidiary, or other
                                                  cognizance.                                                                                                    systems).
                                                                                                          subordinate or connected entity                           (q) Insider threat is the likelihood,
                                                     (g) Cognizant security agencies (CSAs)               (referred to as ‘‘sub-entities’’ when
                                                  are the agencies E.O. 12829, sec. 202,                                                                         risk, or potential that an insider will use
                                                                                                          necessary to distinguish such entities                 his or her authorized access, wittingly
                                                  designates as having NISP                               from prime or parent entities), a specific
                                                  implementation and security                                                                                    or unwittingly, to do harm to the
                                                                                                          location or facility, or the headquarters/             national security of the United States.
                                                  responsibilities for their own agencies                 official business location of the
                                                  (including component agencies) and any                                                                         Insider threats may include harm to
                                                                                                          organization, depending upon the                       entity or program information to the
                                                  entities and non-CSA agencies under                     organization’s business structure, the
                                                  their cognizance. The CSAs are:                                                                                extent that the information impacts the
                                                                                                          access needs involved, and the                         entity’s or agency’s obligations to
                                                  Department of Defense (DoD);                            responsible CSA’s procedures. The term
                                                  Department of Energy (DOE); Nuclear                                                                            protect classified information.
                                                                                                          ‘‘entity’’ as used in this part refers to the             (r) Insider threat response action(s)
                                                  Regulatory Commission (NRC); Office of
                                                                                                          particular entity to which an agency                   are actions (such as investigations) an
                                                  the Director of National Intelligence
                                                                                                          might release, or is releasing, classified             agency takes to ascertain whether an
                                                  (ODNI); and Department of Homeland
                                                                                                          information, whether that entity is a                  insider threat exists, and actions the
                                                  Security (DHS).
                                                     (h) Cognizant security office (CSO) is               parent or subordinate organization.                    agency takes to mitigate the threat.
                                                  an organizational unit to which the head                   (l) Entity eligibility determination is             Agencies may conduct insider threat
                                                  of a CSA delegates authority to                         an assessment by the CSA as to whether                 response actions through their
                                                  administer industrial security services                 an entity is eligible for access to                    counterintelligence (CI), security, law
                                                  on behalf of the CSA.                                   classified information of a certain level              enforcement, or inspector general
                                                     (i) Contracts or agreements are any                  (and all lower levels). Eligibility                    organizations, depending on the
                                                  type of arrangement between an agency                   determinations may be broad or limited                 statutory authority and internal policies
                                                  and an entity or an agency and another                  to specific contracts, sponsoring                      that govern the agency.
                                                  agency. They include, but are not                       agencies, or circumstances. A favorable                   (s) Insider threat program senior
                                                  limited to, contracts, sub-contracts,                   determination results in eligibility to                official (SO) is the official an agency
                                                  licenses, certificates, memoranda of                    access classified information under the                head or entity designates with
                                                  understanding, inter-agency service                     cognizance of the responsible CSA to                   responsibility to manage, account for,
                                                  agreements, other types of documents or                 the level approved. When the entity                    and oversee the agency’s or entity’s
                                                  arrangements setting out                                would be accessing categories of                       insider threat program, pursuant to the
                                                  responsibilities, requirements, or terms                information such as RD or SCI for which                National Insider Threat Policy and
                                                  agreed upon by the parties, programs,                   the CSA for that information has set                   Minimum Standards. An agency may
                                                  projects, and other legitimate U.S. or                  additional requirements, CSAs must                     have more than one insider threat
                                                  foreign government requirements. FOCI                   also assess whether the entity is eligible             program SO.
                                                  mitigation or negation measures, such as                for access to that category. Some CSAs                    (t) Key managers and officials (KMO)
                                                  Voting Trust Agreements, that have the                  refer to their favorable determinations as             are the senior management official (or
                                                  word ‘‘agreement’’ in their title are not               facility security clearances (FCL). A                  authorized executive official under
                                                  included in the term ‘‘agreements’’                     favorable entity eligibility determination             CCIPP), the entity’s security officer (or
                                                  within this part.                                       does not convey authority to store                     security POC under CCIPP), the insider
                                                     (j) Controlling agency is an agency                  classified information.                                threat program senior official, and other
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  that owns or controls certain types of                     (m) Foreign interest is any foreign                 entity employees whom the responsible
                                                  proscribed information and thus has                     government, agency of a foreign                        CSA identifies as having authority,
                                                  authority over access to or release of the              government, or representative of a                     direct or indirect, to influence or decide
                                                  proscribed information. For                             foreign government; any form of                        matters affecting the entity’s
                                                  communications security information                     business enterprise or legal entity                    management or operations, its classified
                                                  (COMSEC), the controlling agency is                     organized, chartered, or incorporated                  contracts, or national security interests.
                                                  NSA; for restricted data (RD), the                      under the laws of any country other                    They may include individuals who hold
                                                  controlling agency is DOE; and for                      than the United States or its territories;             majority ownership interest in the entity


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00013   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3224                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  (in the form of stock or other ownership                  (4) Those agencies for which the                     potential problem comes to ISOO’s
                                                  interests).                                             Department of Defense (DoD) serves as                  attention, or after a change in national
                                                     (u) Proscribed information is                        the CSA or provides industrial security                policy that impacts agency policies and
                                                  information that is classified as top                   services have agreements with DoD                      guidelines. ISOO provides the
                                                  secret (TS) information;                                defining the Secretary of Defense’s                    responsible agency with findings from
                                                  communications security (COMSEC)                        responsibilities on behalf of their                    these reviews.
                                                  information (excluding controlled                       agency;
                                                  cryptographic items when un-keyed or                      (5) Each CSA issues directions to                    Subpart B—Administration
                                                  utilized with unclassified keys);                       entities under their cognizance that are               § 2004.20 National Industrial Security
                                                  restricted data (RD); special access                    consistent with the NISPOM insider                     Program Executive Agent and Operating
                                                  program information (SAP); or sensitive                 threat guidance;                                       Manual (NISPOM).
                                                  compartmented information (SCI).                          (6) CSAs share with each other, as
                                                                                                                                                                    (a) The executive agent (EA) for NISP
                                                     (v) Security officer is a U.S. citizen               lawful and appropriate, relevant
                                                                                                                                                                 is the Secretary of Defense. The EA:
                                                  employee the entity designates to                       information about entity employees that
                                                                                                                                                                    (1) Provides industrial security
                                                  supervise and direct security measures                  indicates an insider threat; and
                                                                                                                                                                 services for agencies that are not CSAs
                                                  implementing NISPOM (or equivalent;                       (7) CSAs conduct ongoing analysis
                                                                                                                                                                 but that release classified information to
                                                  such as DOE Orders) requirements.                       and adjudication of adverse or relevant
                                                                                                                                                                 entities. The EA provides industrial
                                                  Some CSAs refer to this position as a                   information about entity employees that
                                                                                                                                                                 security services only through an
                                                  facility security officer (FSO). The                    indicates an insider threat.
                                                                                                                                                                 agreement with the agency. Non-CSA
                                                  security officer must complete security                   (b) Raises an issue to the National
                                                                                                                                                                 agencies must enter an agreement with
                                                  training specified by the responsible                   Security Council (NSC) for resolution if
                                                                                                                                                                 the EA and comply with EA industrial
                                                  CSA, and must have and maintain an                      the EA’s NISPOM coordination process
                                                                                                                                                                 security service processes before
                                                  employee eligibility determination level                cannot reach a consensus on NISPOM
                                                                                                                                                                 releasing classified information to an
                                                  that is at least the same level as the                  security standards (see § 2004.20(d)).
                                                                                                                                                                 entity;
                                                  entity’s eligibility determination level.
                                                                                                          § 2004.11 CSA and agency implementing                     (2) Provides services for other CSAs
                                                     (w) Senior agency official for NISP
                                                                                                          regulations, internal rules, or guidelines.            by agreement; and
                                                  (SAO for NISP) is the official an agency
                                                                                                             (a) Each CSA implements NISP                           (3) Issues and maintains the National
                                                  head designates to direct and administer
                                                                                                          practices in part through policies and                 Industrial Security Program Operating
                                                  the agency’s National Industrial
                                                                                                          guidelines that are consistent with this               Manual (NISPOM) in consultation with
                                                  Security Program.
                                                     (x) Senior management official (SMO)                 part, so that agencies for which it serves             all affected agencies and with the
                                                  is the person in charge of an entity.                   as the CSA are aware of appropriate                    concurrence of the other CSAs.
                                                  Under the CCIPP, this is the authorized                 security standards, engage in consistent                  (b) The NISPOM sets out the
                                                  executive official with authority to sign               practices with entities, and so that                   procedures and standards that entities
                                                  the security agreement with DHS.                        practices effectively protect classified               must follow during all phases of the
                                                     (y) Sub-entity is an entity’s branch or              information those entities receive                     contracting process to safeguard any
                                                  division, another type of sub-element, a                (including foreign government                          classified information an agency
                                                  sub-contractor, subsidiary, or other                    information that the U.S. Government                   releases to an entity. The NISPOM
                                                  subordinate or connected entity. Sub-                   must protect in the interest of national               requirements may apply to the entity
                                                  entities fall under the definition of                   security).                                             directly (i.e., through FAR clauses or
                                                  ‘‘entity,’’ but this part refers to them as                (b) Each CSA must also routinely                    other contract clauses referring entities
                                                  sub-entities when necessary to                          review and update its NISP policies and                to the NISPOM) or through equivalent
                                                  distinguish such entities from prime                    guidelines and promptly issue revisions                contract clauses or requirements
                                                  contractor or parent entities. See                      when needed (including when a change                   documents that are consistent with
                                                  definition of ‘‘entity’’ at § 2004.4(k) for             in national policy necessitates a change               NISPOM requirements.
                                                  more context.                                           in agency NISP policies and guidelines).                  (c) The EA, in consultation with all
                                                                                                             (c) Non-CSA agencies may choose to                  affected agencies and with the
                                                  § 2004.10 Responsibilities of the Director,             augment CSA NISP policies or                           concurrence of the other CSAs, develops
                                                  Information Security Oversight Office                   guidelines as long as the agency policies              the requirements, restrictions, and
                                                  (ISOO).                                                 or guidelines are consistent with the                  safeguards contained in the NISPOM.
                                                     The Director, ISOO:                                  CSA’s policies or guidelines and this                  The EA uses security standards
                                                     (a) Implements E.O. 12829, including                 part.                                                  applicable to agencies as the basis for
                                                  ensuring that:                                                                                                 developing NISPOM entity standards to
                                                     (1) The NISP operates as a single,                   § 2004.12 ISOO review of agency NISP                   the extent practicable and reasonable.
                                                  integrated program across the executive                 implementation.                                           (d) The EA also facilitates the
                                                  branch of the Federal Government (i.e.,                    (a) ISOO fulfills its oversight role                NISPOM coordination process, which
                                                  such that agencies that release classified              based, in part, on information received                addresses issues raised by entities,
                                                  information to entities adhere to NISP                  from NISP Policy Advisory Committee                    agencies, ISOO, or the NISPPAC,
                                                  principles);                                            (NISPPAC) members, from on-site                        including requests to create or change
                                                     (2) A responsible CSA oversees each                  reviews that ISOO conducts under the                   NISPOM security standards.
                                                  entity’s NISP implementation in                         authority of E.O. 12829, and from any
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  accordance with § 2004.22;                              submitted complaints and suggestions.                  § 2004.22   Agency responsibilities.
                                                     (3) All agencies that contract for                   ISOO reports findings to the responsible                 (a) Agency categories and general
                                                  classified work include the Security                    CSA or agency.                                         areas of responsibility. (1) Federal
                                                  Requirements clause, 48 CFR 52.204–2,                      (b) ISOO reviews agency policies and                agencies fall into two categories for the
                                                  from the Federal Acquisition Regulation                 guidelines to ensure consistency with                  purpose of NISP responsibilities:
                                                  (FAR), or an equivalent clause, in                      NISP policies and procedures. ISOO                       (i) CSAs. CSAs are responsible for
                                                  contracts that require access to                        may conduct reviews during routine                     carrying out NISP implementation
                                                  classified information;                                 oversight visits, when a problem or                    within their agency, for providing NISP


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00014   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3225

                                                  industrial security services on behalf of               CCIPP, based on an agreement between                   making safeguarding capability
                                                  non-CSA agencies by agreement when                      the two CSAs.                                          determinations (see § 2004.38);
                                                  authorized, and for overseeing NISP                        (iii) DoD serves as the responsible                    (iv) Conducts periodic security
                                                  compliance by entities that access                      CSA on behalf of all non-CSA agencies,                 reviews of entity operations (see
                                                  classified information under the CSA’s                  except CSA components, based on E.O.                   § 2004.26) to determine that entities:
                                                  cognizance. When the CSA has                            12829 and its role as NISP EA.                         Effectively protect classified
                                                  oversight responsibilities for a particular                (iv) ODNI serves as the responsible                 information provided to them; and
                                                  non-CSA agency or for an entity, the                    CSA for CIA.                                           follow NISPOM (or equivalent)
                                                  CSA also functions as the responsible                      (4) Responsible CSA for entities.                   requirements;
                                                  CSA;                                                    When determining the responsible CSA                      (v) Provides and regularly updates
                                                     (ii) Non-CSA agencies. Non-CSA                       for a given entity, the involved CSAs                  guidance, training, training materials,
                                                  agencies are responsible for entering                   consider, at a minimum: Retained                       and briefings to entities on:
                                                  agreements with a designated CSA for                    authorities, the information’s                            (A) Entity implementation of NISPOM
                                                  industrial security services, and are                   classification level, number of classified             (or equivalent) requirements, including:
                                                  responsible for carrying out NISP                       contracts, location, number of                         Responsibility for protecting classified
                                                  implementation within their agency                      Government customers, volume of                        information, requesting NISPOM
                                                  consistently with the agreement, the                    classified activity, safeguarding                      interpretations, establishing training
                                                  CSA’s guidelines and procedures, and                    requirements, responsibility for entity                programs, and submitting required
                                                  this part;                                              employee eligibility determinations, and               reports;
                                                     (2) Agencies that are components of                  any special requirements.                                 (B) Initial security briefings and other
                                                  another agency. Component agencies do                      (5) Responsible CSAs may delegate                   briefings required for special categories
                                                  not have itemized responsibilities under                oversight responsibility to a cognizant                of information;
                                                  this part and do not independently need                 security office (CSO) through CSA                         (C) Authorization measures for
                                                  to enter agreements with a CSA, but                     policy or by written delegation. The                   information systems processing
                                                  they follow, and may have                               CSA must inform entities under its                     classified information (except DHS) (see
                                                  responsibilities under, implementing                    cognizance if it delegates                             § 2004.40);
                                                  guidelines and procedures established                   responsibilities. For purposes of this                    (D) Security training for security
                                                  by their CSA or non-CSA agency, or                      rule, the term CSA also refers to the                  officers (or CCIPP POCs) and other
                                                  both.                                                   CSO.                                                   employees whose official duties include
                                                     (b) Responsible CSA role. (1) The                       (c) CSA responsibilities. (1) The CSA               performing NISP-related functions;
                                                  responsible CSA is the CSA (or its                      may perform GCA responsibilities as its                   (E) Insider threat programs in
                                                  delegated CSO) that provides NISP                       own GCA.                                               accordance with the National Insider
                                                  industrial security services on behalf of                  (2) As CSA, the CSA performs or                     Threat Policy and Minimum Standards;
                                                  an agency, determines an entity’s                       delegates the following responsibilities:              and
                                                                                                             (i) Designates a CSA senior agency                     (F) Other guidance and training as
                                                  eligibility for access, and monitors and
                                                                                                          official (SAO) for NISP;                               appropriate;
                                                  inspects an entity’s NISP
                                                                                                             (ii) Identifies the insider threat senior              (vi) Establishes a mechanism for
                                                  implementation.
                                                                                                          official (SO) to the Director, ISOO;                   entities to submit requests for waivers to
                                                     (2) In general, the goal is to have one                 (iii) Shares insider threat information             NISPOM (or equivalent) provisions;
                                                  responsible CSA for each agency and for                 with other CSAs, as lawful and                            (vii) Reviews, continuously analyzes,
                                                  each entity, to minimize the burdens                    appropriate, including information that                and adjudicates, as appropriate, reports
                                                  that can result from complying with                     indicates an insider threat about entity               from entities regarding events that:
                                                  differing CSA procedures and                            employees eligible to access classified                   (A) Impact the status of the entity’s
                                                  requirements.                                           information;                                           eligibility for access to classisfied
                                                     (i) With regard to agencies, NISP                       (iv) Acts upon and shares—with                      information;
                                                  accomplishes this goal by a combination                 security management, GCAs, insider                        (B) Impact an employee’s eligibility
                                                  of designated CSAs and agreements                       threat program employees, and                          for access;
                                                  between agencies and CSAs.                              Government program and CI officials—                      (C) May indicate an employee poses
                                                     (ii) With regard to entities, CSAs                   any relevant entity-reported information               an insider threat;
                                                  strive to reduce the number of                          about security or CI concerns, as                         (D) Affect proper safeguarding of
                                                  responsible CSAs for a given entity as                  appropriate;                                           classified information; or
                                                  much as possible. To this end, when                        (v) Submits reports to ISOO as                         (E) Indicate that classified information
                                                  more than one CSA releases classified                   required by this part; and                             has been lost or compromised.
                                                  information to a given entity, those                       (vi) Develops, coordinates, and                        (viii) Verifies that reports offered in
                                                  CSAs agree on which is the responsible                  provides concurrence on changes to the                 confidence and so marked by an entity
                                                  CSA. However, due to certain unique                     NISPOM when requested by the EA.                       may be withheld from public disclosure
                                                  agency authorities, there may be                           (3) As a responsible CSA, the CSA                   under applicable exemptions of the
                                                  circumstances in which a given entity is                also performs or delegates the following               Freedom of Information Act (5 U.S.C.
                                                  under the oversight of more than one                    responsibilities:                                      552).
                                                  responsible CSA.                                           (i) Determines whether an entity is                    (ix) Requests any additional
                                                     (3) Responsible CSA for agencies. (i)                eligible for access to classified                      information needed from an entity about
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  In general, each CSA serves as the                      information (see § 2004.32);                           involved employees to determine
                                                  responsible CSA for classified                             (ii) Allocates funds, ensures                       continued eligibility for access to
                                                  information that it (or any of its                      appropriate investigations are                         classified information when the entity
                                                  component agencies) releases to entities,               conducted, and determines entity                       reports loss, possible compromise, or
                                                  unless it enters an agreement otherwise                 employee eligibility for access to                     unauthorized disclosure of classified
                                                  with another CSA.                                       classified information (see § 2004.36);                information; and
                                                     (ii) DoD serves as the responsible CSA                  (iii) Reviews and approves entity                      (x) Posts hotline information on its
                                                  for DHS with the exception of the                       safeguarding measures, including                       Web site for entity access, or otherwise


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00015   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3226                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  disseminates contact numbers to the                     § 2004.26 Reviews of entity NISP                       Subpart C—Operations
                                                  entities for which the CSA is                           implementation.
                                                  responsible.                                                                                                   § 2004.30 Security classification
                                                                                                             (a) The responsible CSA conducts                    requirements and guidance.
                                                    (d) Non-CSA agency head                               recurring oversight reviews of entities’
                                                  responsibilities. The head of a non-CSA                 NISP security programs to verify that                     (a) Contract or agreement and
                                                  agency that is not a CSA component and                  the entity is protecting classified                    solicition requirements. (1) The GCA
                                                  that releases classified information to                 information and is implementing the                    must incorporate FAR clause 52.204–2,
                                                  entities, performs the following                        provisions of the NISPOM (or                           Security Requirements (or equivalent set
                                                  responsibilities:                                       equivalent). The CSA determines the                    of security requirements), into contracts
                                                    (1) Designates an SAO for the NISP;                   scope and frequency of reviews. The                    or agreements and solicitations
                                                    (2) Identifies the SO for insider threat              CSA generally notifies entities when a                 requiring access to classified
                                                  to ISOO to facilitate information                       review will take place, but may also                   information.
                                                  sharing;                                                                                                          (2) The GCA must also include a
                                                                                                          conduct unannounced reviews at its
                                                    (3) Enters into an agreement with the                                                                        contract security classification
                                                                                                          discretion.
                                                  EA (except agencies that are                                                                                   specification (or equivalent guidance)
                                                                                                             (b) CSAs make every effort to avoid                 with each contract or agreement and
                                                  components of another agency or a                       unnecessarily intruding into entity
                                                  cross-agency oversight office) to act as                                                                       solicitation that requires access to
                                                                                                          employee personal effects during the                   classified information. The contract
                                                  the responsible CSA on the agency’s                     reviews.
                                                  behalf (see paragraph (a)(1)(ii) of this                                                                       security classification specification (or
                                                                                                             (c) A CSA may, on entity premises,                  equivalent guidance) must identify the
                                                  section);                                               physically examine the interior spaces
                                                    (4) Performs, or delegates in writing to                                                                     specific elements of classified
                                                                                                          of containers not authorized to store                  information involved in each phase of
                                                  a GCA, the following responsibilities:                  classified information in the presence of              the contract or agreement life-cycle,
                                                    (i) Provides appropriate education                    the entity’s representative.                           such as:
                                                  and training to agency personnel who
                                                                                                             (d) As part of a security review, the                  (i) Level of classification;
                                                  implement the NISP;                                                                                               (ii) Where the entity will access or
                                                                                                          CSA:
                                                    (ii) Includes FAR security                                                                                   store the classified information, and any
                                                  requirements clause 52.204–2, or                           (1) Verifies that the entity limits entity
                                                                                                          employees with access to classified                    requirements or limitations on
                                                  equivalent (such as the DEAR clause                                                                            transmitting classified information
                                                  952.204–2), and a contract security                     information to the minimum number
                                                                                                          necessary to perform on classified                     outside the entity;
                                                  classification specification into                                                                                 (iii) Any special accesses;
                                                  contracts and solicitations that require                contracts.
                                                                                                                                                                    (iv) Any classification guides or other
                                                  access to classified information (see                      (2) Validates that the entity has not
                                                                                                                                                                 guidance the entity needs to perform
                                                  § 2004.30); and                                         provided its employees unauthorized
                                                                                                                                                                 during that phase of the contract or
                                                    (iii) Reports to the appropriate CSA                  access to classified information;
                                                                                                                                                                 agreement;
                                                  adverse information and insider threat                     (3) Reviews the entity’s self-                         (v) Any authorization to disclose
                                                  activity pertaining to entity employees                 inspection program and evaluates and                   information about the classified contract
                                                  having access to classified information.                records the entity’s remedial actions;                 or agreement; and
                                                                                                          and                                                       (vi) GCA personnel responsible for
                                                  § 2004.24   Insider threat program.
                                                                                                             (4) Verifies that the GCA approved                  interpreting and applying the contract
                                                    (a) Responsible CSAs oversee and                      any public release of information                      security specifications (or equivalent
                                                  analyze entity activity to ensure entities              pertaining to a classified contract.                   guidance).
                                                  implement an insider threat program in                                                                            (3) The GCA revises the contract
                                                                                                             (e) As a result of findings during the
                                                  accordance with the National Insider                                                                           security classification specification (or
                                                                                                          security review, the CSA may, as
                                                  Threat Policy and Minimum Standards                                                                            equivalent guidance) throughout the
                                                                                                          appropriate, notify:
                                                  (via requirements in the NISPOM or its                                                                         contract or agreement life-cycle as
                                                  equivalent) and guidance from the CSA,                     (1) GCAs if there are unfavorable
                                                                                                          results from the review; and                           security requirements change.
                                                  to include:                                                                                                       (b) Guidance. Classification guidance
                                                    (1) Verifying that entities appoint SOs                  (2) A prime entity if the CSA                       is the exclusive responsibility of the
                                                  for insider threat;                                     discovers unsatisfactory security                      GCA. The GCA prepares classification
                                                    (2) Requiring entities to monitor,                    conditions pertaining to a sub-entity.                 guidance in accordance with 32 CFR
                                                  report, and review insider threat                          (f) The CSA maintains a record of                   2001.15, and provides appropriate
                                                  program activities and response actions                 reviews it conducts and the results.                   security classification and
                                                  in accordance with the provisions set                   Based on review results, the responsible               declassification guidance to entities.
                                                  forth in the NISPOM (or equivalent);                    CSA determines whether an entity’s                        (c) Requests for clarification and
                                                    (3) Providing entities with access to                 eligibility for access to classified                   classification challenges. (1) The GCA
                                                  data relevant to insider threat program                 information may continue. See                          responds to entity requests for
                                                  activities and applicable reporting                     § 2004.32(g).                                          clarification and classification
                                                  requirements and procedures;                                                                                   challenges.
                                                                                                          § 2004.28    Cost reports.
                                                    (4) Providing entities with a                                                                                   (2) The responsible CSA assists
                                                  designated means to report insider                        (a) Agencies must annually report to                 entities to obtain appropriate
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  threat-related activity; and                            the Director, ISOO, on their NISP                      classification guidance from the GCA,
                                                    (5) Advising entities on appropriate                  implementation costs for the previous                  and to obtain a classification challenge
                                                  insider threat training for authorized                  year.                                                  response from the GCA.
                                                  entity employees.                                         (b) CSAs must annually collect                          (d) Instructions upon contract or
                                                    (b) CSAs share with other CSAs any                    information on NISP implementation                     agreement termination. (1) The GCA
                                                  insider threat information reported to                  costs incurred by entities under their                 provides instructions to the entity for
                                                  them by entities, as lawful and                         cognizance and submit a report to the                  returning or disposing of classified
                                                  appropriate.                                            Director, ISOO.                                        information upon contract or agreement


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00016   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3227

                                                  termination or when an entity no longer                 the period of the agreement or as long                 or receive a favorable eligibility
                                                  has a legitimate need to retain or                      as an entity continues to need access to               determination before accessing
                                                  possess classified information.                         classified information in connection                   classified information. This includes
                                                    (2) The GCA also determines whether                   with a legitimate U.S. or foreign                      both prime or parent entities and sub-
                                                  the entity may retain classified                        government requirement.                                entities, even in cases in which an
                                                  information for particular purposes after                  (2) The CSA coordinates with                        entity intends to have the classified
                                                  the contract or agreement terminates,                   appropriate authorities to determine                   work performed only by sub-entities. A
                                                  and if so, provides written authorization               whether an entity meets the eligibility                prime or parent entity must have a
                                                  to the entity along with any instructions               criteria in paragraph (e) of this section.             favorable eligibility determination at the
                                                  or limitations (such as which                           This includes coordinating with                        same classification level or higher than
                                                  information, for how long, etc).                        appropriate U.S. Government regulatory                 its sub-entity(ies), unless the CSA
                                                                                                          authorities to determine entity                        determined that the parent entity could
                                                  § 2004.32 Determining entity eligibility for            compliance with laws and regulations.
                                                  access to classified information.
                                                                                                                                                                 be effectively excluded from access (see
                                                                                                             (3) An entity cannot apply for its own              paragraph (a)(1) of this section).
                                                     (a) Eligibility determinations. (1) The              eligibility determination. A GCA or an                    (3) If a parent and sub-entity need to
                                                  responsible CSA determines whether an                   eligible entity must sponsor the entity to             share classified information with each
                                                  entity is eligible for access to classified             the responsible CSA for an eligibility                 other, the CSA must validate that both
                                                  information. An entity may not have                     determination. The GCA or eligible                     the parent and the sub-entity have
                                                  access to classified information until the              entity may sponsor an entity at any                    favorable eligibility determinations at
                                                  responsible CSA determines that it                      point during the contracting or                        the level required for the classified
                                                  meets all the requirements in this                      agreement life-cycle at which the entity               information prior to sharing the
                                                  section. In general, the entity must be                 must have access to classified                         information.
                                                  eligible to access classified information               information to participate (including the                 (d) DHS Classified Critical
                                                  at the appropriate level before the CSA                 solicitation or competition phase). An                 Infrastructure Protection Program
                                                  may consider any of the entity’s                        entity with limited eligibility granted                (CCIPP). DHS shares classified
                                                  subsidiaries, sub-contractors, or other                 under paragraph (f) of this section may                cybersecurity information with certain
                                                  sub-entities for eligibility. However,                  sponsor a sub-entity for a limited
                                                                                                                                                                 employees of entities under the
                                                  when the subsidiary will perform all                    eligibility determination for the same
                                                                                                                                                                 Classified Critical Infrastructure
                                                  classified work, the CSA may instead                    contract, agreement, or circumstance so
                                                                                                                                                                 Protection Program (CCIPP). The CCIPP
                                                  exclude the parent entity from access to                long as the sponsoring entity is not
                                                                                                                                                                 applies only to entities that do not need
                                                  classified information rather than                      under FOCI (see § 2004.34(i)).
                                                                                                             (4) The GCA must include enough                     to store classified information, have no
                                                  determining its eligibility. In either case,
                                                                                                          lead time in each phase of the                         other contracts or agreements already
                                                  the CSA must consider all information
                                                                                                          acquisition or agreement cycle to                      requiring access to classified
                                                  relevant to assessing whether the
                                                                                                          accomplish all required security actions.              information, and are not already
                                                  entity’s access poses an unacceptable
                                                                                                          Required security actions include any                  determined eligible for access to
                                                  risk to national security interests.
                                                     (2) A favorable access eligibility                   eligibility determination necessary for                classified information. DHS establishes
                                                  determination is not the same as a                      an entity to participate in that phase of              and implements procedures consistent
                                                  safeguarding capability determination.                  the cycle. The GCA may award a                         with the NISP to determine CCIPP entity
                                                  Entities may access classified                          contract or agreement before the CSA                   eligibility for access to classified
                                                  information with a favorable eligibility                completes the entity eligibility                       information.
                                                  determination, but may possess                          determination. However, in such cases,                    (e) Eligibility criteria. An entity must
                                                  classified information only if the CSA                  the entity may not begin performance on                meet the following requirements to be
                                                  determines both access eligibility and                  portions of the contract or agreement                  eligible to access classified information:
                                                  safeguarding capability, based on the                   that require access to classified                         (1) It must need to access classified
                                                  GCA’s requirement in the contract                       information until the CSA makes a                      information as part of a legitimate U.S.
                                                  security classification specification (or               favorable entity eligibility                           Government or foreign government
                                                  equivalent).                                            determination.                                         requirement, and access must be
                                                     (3) If an entity has an existing                        (5) When a CSA is unable to make an                 consistent with U.S. national security
                                                  eligibility determination, a CSA will not               eligibility determination in sufficient                interests as determined by the CSA;
                                                  duplicate eligibility determination                     time to qualify an entity to participate                  (2) It must be organized and existing
                                                  processes performed by another CSA. If                  in the particular procurement action or                under the laws of any of the 50 States,
                                                  a CSA cannot acknowledge an entity                      phase that gave rise to the GCA request                the District of Columbia, or an organized
                                                  eligibility determination to another                    (this includes both solicitation and                   U.S. territory (Guam, Commonwealth of
                                                  CSA, that entity may be subject to                      performance phases), the GCA may                       the Northern Mariana Island,
                                                  duplicate processing.                                   request that the CSA continue the                      Commonwealth of Puerto Rico, and the
                                                     (4) Each CSA maintains a record of its               determination process to qualify the                   U.S. Virgin Islands); or an American
                                                  entities’ eligibility determinations (or                entity for future classified work,                     Indian or Alaska native tribe formally
                                                  critical infrastructure entity eligibility              provided that the processing delay was                 acknowledged by the Assistant
                                                  status under the CCIPP, for DHS) and                    not due to the entity’s lack of                        Secretary—Indian Affairs, of the U.S.
                                                  responds to inquiries from GCAs or                      cooperation.                                           Department of the Interior;
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  entities, as appropriate and to the extent                 (c) Coverage. (1) A favorable eligibility              (3) It must be located in the United
                                                  authorized by law, regarding the                        determination allows an entity to access               States or its territorial areas;
                                                  eligibility status of entities under their              classified information at the determined                  (4) It must have a record of
                                                  cognizance.                                             eligibility level, or lower.                           compliance with pertinent laws,
                                                     (b) Process. (1) The responsible CSA                    (2) The CSA must ensure that all                    regulations, and contracts (or other
                                                  provides guidance to entities on the                    entities needing access to classified                  relevant agreements).
                                                  eligibility determination process and on                information as part of a legitimate U.S.                  (5) Its KMOs must each have and
                                                  how to maintain eligibility throughout                  or foreign government requirement have                 maintain eligibility for access to


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00017   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3228                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  classified information that is at least the             eligibility determination it makes,                       (c) FOCI factors. To determine
                                                  same level as the entity eligibility level;             including the scope of, and any                        whether an entity is under FOCI, the
                                                     (6) It and all of its KMOs must not be               limitations on, access to classified                   CSA analyzes available information to
                                                  excluded by a Federal agency, contract                  information;                                           determine the existence, nature, and
                                                  review board, or other authorized                          (5) The CSA verifies limited entity                 source of FOCI. The CSA:
                                                  official from participating in Federal                  eligibility determinations only to the                    (1) Considers information the entity or
                                                  contracts or agreements;                                requesting GCA or entity. In the case of               its parent provides on the SF 328 (OMB
                                                     (7) It must meet all requirements the                multiple limited entity eligibility                    Control No. 0704–0194), and any other
                                                  CSA or the authorizing law, regulation,                 determinations for a single entity, the                relevant information; and
                                                  or Government-wide policy establishes                   CSA verifies each one separately only to                  (2) Considers in the aggregate the
                                                  for access to the type of classified                    its requestor; and                                     following factors about the entity:
                                                  information or program involved; and                       (6) CSAs administratively terminate                    (i) Record of espionage against U.S.
                                                     (8) If the CSA determines the entity is              the limited entity eligibility when there              targets, either economic or Government;
                                                  under foreign ownership, control, or                    is no longer a need for access to the                     (ii) Record of enforcement actions
                                                  influence (FOCI), the responsible CSA                   classified information for which the                   against the entity for transferring
                                                  must:                                                   CSA approved the limited entity                        technology without authorization;
                                                     (i) Agree that sufficient security                   eligibility.                                              (iii) Record of compliance with
                                                  measures are in place to mitigate or                       (g) Terminating or revoking eligibility.            pertinent U.S. laws, regulations, and
                                                  negate risk to national security interests              (1) The responsible CSA terminates the                 contracts or agreements;
                                                  due to the FOCI (see § 2004.34);                        entity’s eligible status when the entity                  (iv) Type and sensitivity of the
                                                     (ii) Determine that it is appropriate to             no longer has a need for access to                     information the entity would access;
                                                  grant eligibility for a single, narrowly                classified information.                                   (v) Source, nature, and extent of FOCI,
                                                  defined purpose (see § 2004.34(i)); or                     (2) The responsible CSA revokes the                 including whether foreign interests hold
                                                     (iii) Determine that the entity is not               entity’s eligible status if the entity is              a majority or minority position in the
                                                  eligible to access classified information.              unable or unwilling to protect classified              entity, taking into consideration the
                                                     (9) DoD and DOE cannot award a                       information.                                           immediate, intermediate, and ultimate
                                                  contract involving access to proscribed                    (3) The CSA coordinates with the                    parent entities;
                                                  information to an entity effectively                    GCA(s) to take interim measures, as                       (vi) Nature of any relevant bilateral
                                                  owned or controlled by a foreign                        necessary, toward either termination or                and multilateral security and
                                                  government unless the Secretary of the                  revocation.                                            information exchange agreements;
                                                  agency first issues a waiver (see 10                                                                              (vii) Ownership or control, in whole
                                                                                                          § 2004.34 Foreign ownership, control, or
                                                  U.S.C. 2536). A waiver is not required                  influence (FOCI).                                      or in part, by a foreign government; and
                                                  if the CSA determines the entity is                                                                               (viii) Any other factor that indicates
                                                                                                             (a) FOCI determination. A U.S. entity               or demonstrates foreign interest
                                                  eligible and it agrees to establish a                   is under foreign ownership, control, or
                                                  voting trust agreement (VTA) or proxy                                                                          capability to control or influence the
                                                                                                          influence (FOCI) when:                                 entity’s operations or management.
                                                  agreement (PA) (see § 2004.34(f))                          (1) A foreign interest has the power to
                                                  because both VTAs and PAs effectively                                                                             (d) Entity access while under FOCI. (1)
                                                                                                          direct or decide matters affecting the
                                                  negate foreign government control.                                                                             If the CSA is determining whether an
                                                                                                          entity’s management or operations in a
                                                     (f) Limited entity eligibility                                                                              entity is eligible to access classified
                                                                                                          manner that could:
                                                  determination. CSAs may choose to                                                                              information and finds that the entity is
                                                                                                             (i) Result in unauthorized access to
                                                  allow GCAs to request limited entity                                                                           under FOCI, the CSA must consider the
                                                                                                          classified information; or
                                                  eligibility determinations (this is not the                (ii) Adversely affect performance of a              entity ineligible for access to classified
                                                  same as limited entity eligibility in                   classified contract or agreement; and                  information. The CSA and the entity
                                                  situations involving FOCI when the                         (2) The foreign interest exercises that             may then attempt to negotiate FOCI
                                                  FOCI is not mitigated or negated; for                   power:                                                 mitigation or negation measures
                                                  more information on limited entity                         (i) Directly or indirectly;                         sufficient to permit a favorable
                                                  eligibility in such FOCI cases, see                        (ii) Through ownership of the U.S.                  eligibility determination.
                                                  § 2004.34(i)). If a CSA permits GCAs to                 entity’s securities, by contractual                       (2) The CSA may not determine that
                                                  request a limited entity eligibility                    arrangements, or other similar means;                  the entity is eligible to access classified
                                                  determination, it must set out                             (iii) By the ability to control or                  information until the entity has put into
                                                  parameters within its implementing                      influence the election or appointment of               place appropriate security measures to
                                                  policies that are consistent with the                   one or more members to the entity’s                    negate or mitigate FOCI or is otherwise
                                                  requirements below:                                     governing board (e.g. board of directors,              no longer under FOCI. If the degree of
                                                     (1) The GCA, or an entity with limited               board of managers, board of trustees) or               FOCI is such that no mitigation or
                                                  eligibility, must first request a limited               its equivalent; or                                     negation efforts will be sufficient, or
                                                  entity eligibility determination from the                  (iv) Prospectively (i.e., is not currently          access to classified information would
                                                  CSA for the relevant entity and provide                 exercising the power, but could).                      be inconsistent with national security
                                                  justification for limiting eligibility in                  (b) CSA guidance. The CSA                           interests, then the CSA will determine
                                                  that case;                                              establishes guidance for entities on                   the entity ineligible for access to
                                                     (2) Limited entity eligibility is specific           filling out and submitting a Standard                  classified information.
                                                  to the requesting GCA’s classified                      Form (SF) 328, Certificate Pertaining to                  (3) If an entity comes under FOCI, the
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  information, and to a single, narrowly                  Foreign Interests (OMB Control No.                     CSA may allow the existing eligibility
                                                  defined contract, agreement, or                         0704–0194), and on reporting changes                   status to continue while the CSA and
                                                  circumstance;                                           in circumstances that might result in a                the entity negotiate acceptable FOCI
                                                     (3) The entity must otherwise meet                   determination that the entity is under                 mitigation or negation measures, as long
                                                  the requirements for entity eligibility set             FOCI or is no longer under FOCI. The                   as there is no indication that classified
                                                  out in this part;                                       CSA also advises entities on the                       information is at risk. If the entity does
                                                     (4) The CSA documents the                            Government appeal channels for                         not actively negotiate mitigation or
                                                  requirements of each limited entity                     disputing CSA FOCI determinations.                     negation measures in good faith, or


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00018   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3229

                                                  there are no appropriate measures that                    (5) Methods to mitigate foreign                      entity’s board or governing body with a
                                                  will remove the possibility of                          control or influence (unrelated to                     direct voice in the entity’s business
                                                  unauthorized access or adverse effect on                ownership) may include:                                management, while denying the foreign
                                                  the entity’s performance of contracts or                  (i) Assigning specific oversight duties              owner majority representation and
                                                  agreements involving classified                         and responsibilities to independent                    unauthorized access to classified
                                                  information, the CSA will take steps, in                board members;                                         information. When a GCA requires an
                                                  coordination with the GCA, to terminate                   (ii) Formulating special executive-                  entity to have access to proscribed
                                                  eligibility.                                            level security committees to consider                  information, and the CSA proposes or
                                                     (e) FOCI and entities under the CCIPP.               and oversee matters that affect entity                 approves an SSA as the mitigation
                                                  DHS may sponsor, as part of the CCIPP,                  performance on classified contracts or                 measure, the GCA must also make a
                                                  a U.S. entity that is under FOCI, under                 agreements;                                            national interest determination (NID)
                                                  the following circumstances:                              (iii) Modifying or terminating loan                  before the CSA can determine an
                                                                                                          agreements, contracts, agreements, and                 entity’s eligibility for access. See
                                                     (1) The Secretary of DHS proposes
                                                                                                          other understandings with foreign                      paragraph (h) of this section for more
                                                  appropriate FOCI risk mitigation or
                                                                                                          interests;                                             information on NIDs.
                                                  negation measures (see paragraph (f) of
                                                                                                            (iv) Diversifying or reducing foreign-                  (iv) Voting trust agreements (VTAs) or
                                                  this section) to the other CSAs and
                                                                                                          source income;                                         proxy agreements (PAs). The CSA and
                                                  ensures the anticipated release of                        (v) Demonstrating financial viability                the entity may agree to use one of these
                                                  classified information:                                 independent of foreign interests;                      measures when a foreign interest
                                                     (i) Is authorized for release to the                   (vi) Eliminating or resolving problem                effectively owns or controls an entity.
                                                  country involved;                                       debt;                                                  The VTA and PA are substantially
                                                     (ii) Does not include information                      (vii) Separating, physically or                      identical arrangements that vest the
                                                  classified under the Atomic Energy Act;                 organizationally, the entity component                 voting rights of the foreign-owned stock
                                                  and                                                     performing on classified contracts or                  in cleared U.S. citizens approved by the
                                                     (iii) Does not impede or interfere with              agreements;                                            CSA. Under the VTA, the foreign owner
                                                  the entity’s ability to manage and                        (viii) Adopting special board                        transfers legal title in the entity to the
                                                  comply with regulatory requirements                     resolutions; and                                       trustees approved by the CSA. Under
                                                  imposed by other Federal agencies, such                   (ix) Other actions that effectively                  the PA, the foreign owner conveys their
                                                  as the State Department’s International                 negate or mitigate foreign control or                  voting rights to proxy holders approved
                                                  Traffic in Arms Regulation.                             influence.                                             by the CSA. The entity must be
                                                     (2) If the CSAs agree the mitigation or                (6) Methods to mitigate or negate                    organized, structured, and financed to
                                                  negation measures are sufficient, DHS                   foreign ownership include:                             be capable of operating as a viable
                                                  may proceed to enter a CCIPP                              (i) Board resolutions. The CSA and                   business entity independently from the
                                                  information sharing agreement with the                  the entity may agree to a board                        foreign owner. Both VTAs and PAs can
                                                  entity. If one or more CSAs disagree, the               resolution when a foreign interest does                effectively negate foreign ownership and
                                                  Secretary of DHS may seek a decision                    not own voting interests sufficient to                 control; therefore, neither imposes any
                                                  from the Assistant to the President for                 elect, or is otherwise not entitled to                 restrictions on the entity’s eligibility to
                                                  National Security Affairs before entering               representation on, the entity’s governing              have access to classified information or
                                                  a CCIPP information sharing agreement                   board. The resolution must identify the                to compete for classified contracts or
                                                  with the entity.                                        foreign shareholders and their                         agreements, including those involving
                                                                                                          representatives (if any), note the extent              proscribed information. Both VTAs and
                                                     (f) Mitigation or negation measures to
                                                                                                          of foreign ownership, certify that the                 PAs can also effectively negate foreign
                                                  address FOCI. (1) The CSA-approved
                                                                                                          foreign shareholders and their                         government control.
                                                  mitigation or negation measures must
                                                                                                          representatives will not require, will not                (v) Combinations of the above
                                                  assure that the entity can offset FOCI by
                                                                                                          have, and can be effectively excluded                  measures or other similar measures that
                                                  effectively denying unauthorized people
                                                                                                          from, access to all classified                         effectively mitigate or negate the risks
                                                  or entities access to classified
                                                                                                          information, and certify that the entity               involved with foreign ownership.
                                                  information and preventing the foreign
                                                                                                          will not permit the foreign shareholders                  (g) Standards for FOCI mitigation or
                                                  interest from adversely impacting the
                                                                                                          and their representatives to occupy                    negation measures. The CSA must
                                                  entity’s performance on classified
                                                                                                          positions that might enable them to                    include the following requirements as
                                                  contracts or agreements.
                                                                                                          influence the entity’s policies and                    part of any FOCI mitigation or negation
                                                     (2) Any mitigation or negation                       practices, affecting its performance on                measures, to ensure that entities
                                                  measures the CSA approves for an entity                 classified contracts or agreements.                    implement necessary security and
                                                  must not impede or interfere with the                     (ii) Security control agreements                     governing controls:
                                                  entity’s ability to manage and comply                   (SCAs). The CSA and the entity may                        (1) Annual certification and annual
                                                  with regulatory requirements imposed                    agree to use an SCA when a foreign                     compliance reports by the entity’s
                                                  by other Federal agencies (such as                      interest does not effectively own or                   governing board and the KMOs;
                                                  Department of State’s International                     control an entity (i.e., the entity is under              (2) The U.S. Government remedies in
                                                  Traffic in Arms Regulation).                            U.S. control), but the foreign interest is             case the entity is not adequately
                                                     (3) If the CSA approves a FOCI                       entitled to representation on the entity’s             protecting classified information or not
                                                  mitigation or negation measure for an                   governing board. At least one cleared                  adhering to the provisions of the
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  entity, it may agree that the measure, or               U.S. citizen must serve as an outside                  mitigation or negation measure;
                                                  particular portions of it, may apply to                 director on the entity’s governing board.                 (3) Supplements to FOCI mitigation or
                                                  all of the present and future sub-entities                (iii) Special security agreements                    negation measures as the CSA deems
                                                  within the entity’s organization.                       (SSAs). The CSA and the entity may                     necessary. In addition to the standard
                                                     (4) Mitigation or negation options are               agree to use an SSA when a foreign                     FOCI mitigation or negation measure’s
                                                  different for ownership versus control or               interest effectively owns or controls an               requirements, the CSA may require
                                                  influence; ownership necessitates a                     entity. The SSA preserves the foreign                  more procedures via a supplement,
                                                  stronger mitigation or negation measure.                owner’s right to be represented on the                 based upon the circumstances of an


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00019   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3230                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  entity’s operations. The CSA may place                  and provide guidance on matters related                NID for the same entity when the access
                                                  these requirements in supplements to                    to FOCI mitigation and industrial                      requirements for proscribed information
                                                  the FOCI mitigation or negation measure                 security. These meetings include a CSA                 and terms remain unchanged for:
                                                  to allow flexibility as circumstances                   review of:                                                (A) Renewal of the contract or
                                                  change without having to renegotiate                       (A) Compliance with the approved                    agreement;
                                                  the entire measure. When making use of                  FOCI mitigation or negation measure;                      (B) New task orders issued under the
                                                  supplements, the CSA does not consider                     (B) Problems regarding practical                    contract or agreement;
                                                  the FOCI mitigation measure final until                 implementation of the mitigation or                       (C) A new contract or agreement that
                                                  it approves the required supplements                    negation measure; and                                  contains the same provisions as the
                                                  (e.g., technology control plan, electronic                 (C) Security controls, practices, or                previous (this usually applies when the
                                                  communication plan); and                                procedures and whether they warrant                    contract or agreement is for a program
                                                     (4) For agreements to mitigate or                    adjustment; and                                        or project); or
                                                  negate ownership (PAs, VTAs, SSAs,                         (iv) Annual certification. The CSA                     (D) Renewal of the SSA.
                                                  and SCAs), the following additional                     reviews the entity’s annual report;                       (2) Process. (i) The CSA requests the
                                                  requirements apply:                                     addresses, and resolves issues identified              NID from the GCA and provides the
                                                     (i) FOCI oversight. The CSA verifies                 in the report; and documents the results               GCA with pertinent information, such
                                                  that the entity establishes an oversight                of this review and any follow-up                       as: The FOCI assessment; a copy of the
                                                  body consisting of trustees, proxy                      actions.                                               SSA; and any other relevant information
                                                  holders or outside directors, as                           (h) National Interest Determination                 that might help the GCA make its
                                                  applicable, and those officers or                       (NID). (1) Requirement for a NID. When                 determination.
                                                  directors whom the CSA determines are                   a GCA requires an entity to have access                   (ii) If another agency (or agencies)
                                                  eligible for access to classified                       to proscribed information, and the CSA                 controls any category of the proscribed
                                                  information (see § 2004.36). The entity’s               proposes or approves an SSA as the                     information involved, the GCA or CSA
                                                  security officer is the principal advisor               FOCI mitigation measure, the GCA must                  also coordinates with the controlling
                                                  to the oversight body and attends their                 determine (with controlling agency                     agency(ies) to request their concurrence
                                                  meetings. The oversight body:                           concurrence when appropriate) whether                  on the GCA’s NID. In cases involving
                                                     (A) Maintains policies and procedures                releasing the proscribed information to                one or more controlling agencies, a
                                                  to safeguard classified information in                  the entity under an SSA is consistent                  favorable NID is not final until the
                                                  the entity’s possession with no adverse                 with the national security interests of                relevant controlling agencies concur
                                                  impact on classified contract or                        the United States. This determination is               with the determination in writing for
                                                  agreement performance; and                              called a national interest determination               the proscribed information under their
                                                     (B) Verifies the entity is complying                 (NID). A favorable NID confirms that an                control. The GCA or CSA provides the
                                                  with the FOCI mitigation or negation                    entity’s access to the proscribed                      relevant controlling agency(ies) with: A
                                                  measure and related documents,                          information is consistent with such                    statement that ‘‘Access to the proscribed
                                                  contract security requirements or                       interests and allows the CSA to make a                 information by the entity is consistent
                                                  equivalent, and the NISP;                               positive entity eligibility determination              with the national security interests of
                                                     (ii) Qualifications of trustees, proxy               in such cases if the entity meets the                  the United States’’; the FOCI
                                                  holders, and outside directors. The CSA                 other eligibility requirements. If the NID             assessment; a copy of the SSA; a
                                                  determines eligibility for access to                    is not favorable, an entity may not have               contract security classification
                                                  classified information for trustees, proxy              access to the proscribed information.                  specification (or equivalent);
                                                  holders, and outside directors at the                      (i) The CSA requests a NID from the                 justification for access and a description
                                                  classification level of the entity’s                    GCA for new contracts or agreements at                 of the proscribed information involved;
                                                  eligibility determination. Trustees,                    any phase that requires access to                      and any other relevant information that
                                                  proxy holders, and outside directors                    proscribed information; and existing                   might help the controlling agency
                                                  must meet the following criteria:                       contracts or agreements (or any relevant               consider the request.
                                                     (A) Be resident U.S. citizens who can                sub-contracts or sub-agreements) when                     (iii) In cases in which the GCA has
                                                  exercise management prerogatives                        the GCA adds a requirement for access                  authority over all the categories of
                                                  relating to their position in a way that                to proscribed information or adds a new                proscribed information involved, the
                                                  ensures that the foreign owner can be                   sub-entity that operates under an SSA                  CSA may make an entity eligibility
                                                  effectively insulated from the entity or                and requires access to proscribed                      determination or upgrade an existing
                                                  effectively separated from the entity’s                 information. The GCA may initiate a                    eligibility level to top secret only after
                                                  classified work; and                                    NID prior to receiving the request from                the GCA notifies the CSA in writing of
                                                     (B) Be completely disinterested                      the CSA, when appropriate.                             a favorable NID, except as described in
                                                  individuals with no prior involvement                      (ii) While CSAs normally request                    paragraph (h)(3)(iii)(A) of this section.
                                                  with the entity, the entities with which                NIDs on a case-by-case contract- or                       (iv) In cases in which the GCA
                                                  it is affiliated, or the foreign owner;                 agreement-specific basis, the CSA, GCA,                requests concurrence from one or more
                                                     (C) No other circumstances that may                  and applicable controlling agency may                  controlling agencies, it does not notify
                                                  affect an individual’s ability to serve                 decide to make a NID on another basis,                 the CSA of its NID until the controlling
                                                  effectively; such as, the number of                     using criteria the CSA establishes. In                 agency concurs. In cases in which the
                                                  boards on which the individual serves,                  such cases, the GCA provides the CSA                   CSA requests concurrence from the
                                                  the length of time serving on any other                 with a written statement that the NID                  controlling agency, the CSA may not act
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                  boards.                                                 covers a specific contract or program                  upon a favorable GCA NID until it also
                                                     (iii) Annual meeting. The CSA meets                  and all follow-on contracts associated                 receives written concurrence from the
                                                  at least annually with the oversight                    that program, and lists all contracts or               controlling agency(ies). In both cases,
                                                  body to review the purpose and                          agreements covered by the NID in cases                 the CSA may not make an eligibility
                                                  effectiveness of the FOCI mitigation or                 in which the GCA can identify them.                    determination until all the relevant
                                                  negation agreement; establish a common                     (iii) When an entity has a favorable                controlling agencies concur in writing
                                                  understanding of the operating                          NID for a given contract or agreement,                 on a favorable NID and the GCA notifies
                                                  requirements and their implementation;                  the CSA does not have to request a new                 the CSA in writing of its final NID,


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00020   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                                        Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules                                             3231

                                                  except as described in paragraph                        agency has concurred. The entity must                  foreign government has ownership or
                                                  (h)(3)(iii)(B) of this section.                         not have access to any category of                     control over the entity. See
                                                    (3) Timing. (i) When the GCA has                      proscribed information for which a                     § 2004.32(e)(9).
                                                  authority over all of the categories of                 controlling agency that has not yet                      (8) The CSA administratively
                                                  proscribed information involved, the                    concurred.                                             terminates the entity’s limited eligibility
                                                  GCA provides a final, written NID to the                   (iv) Unless cancelled sooner by the                 when there is no longer a need for
                                                  CSA, with a copy to the entity, within                  GCA that made the NID, a NID remains                   access to the classified information for
                                                  30 days after the GCA receives the NID                  in effect for the duration of the contract             which the CSA made the favorable
                                                  request.                                                or agreement. When a NID is not                        limited eligibility determination.
                                                     (ii) If a controlling agency controls                contract- or agreement-specific, the                   Terminating one limited eligibility
                                                  any of the involved categories of                       CSA, the GCA, and any applicable                       status does not impact other ones the
                                                  proscribed information, the GCA                         controlling agency determine how long                  entity may have.
                                                  provides a final, written NID to the CSA,               the NID remains in effect based on the
                                                  with a copy to the entity, within 60 days               criteria used to make the NID.                         § 2004.36 Determining entity employee
                                                                                                                                                                 eligibility for access to classified
                                                  after the GCA receives the NID request.                    (i) Limited eligibility determinations
                                                                                                                                                                 information.
                                                     (A) In such cases, the GCA notifies the              (for entities under FOCI without
                                                  relevant controlling agency(ies) of its                 mitigation or negation). (1) In                           (a) Making employee eligibility
                                                  NID in writing within 30 days after it                  exceptional circumstances when an                      determinations. (1) The responsible
                                                  receives the NID request, and each                      entity is under FOCI, the CSA may                      CSA:
                                                  controlling agency concurs or non-                                                                                (i) Determines whether entity
                                                                                                          decide that limited eligibility for access
                                                  concurs in writing to the GCA or CSA                                                                           employees meet the criteria established
                                                                                                          to classified information is appropriate
                                                  within the next 30 days unless there are                                                                       in the Revised Adjudicative Guidelines
                                                                                                          when the entity is unable or unwilling
                                                  extenuating circumstances.                                                                                     for Determining Eligibility for Access to
                                                                                                          to implement FOCI mitigation or
                                                     (B) In cases in which there are                                                                             Classified Information issued by White
                                                                                                          negation measures (this is not the same
                                                  extenuating circumstances, the                                                                                 House memorandum, December 29,
                                                                                                          as limited eligibility in other
                                                  controlling agency responds to the GCA                                                                         2005, and in accordance with applicable
                                                                                                          circumstances; for more information on
                                                  or CSA within 30 days to explain the                                                                           executive branch procedures. Entity
                                                                                                          limited eligibility in other cases, see                employees must have a legitimate
                                                  extenuating circumstances, request                      § 2004.32(f)).
                                                  additional information as needed, and                                                                          requirement (i.e., need to know) for
                                                                                                             (2) The GCA first decides whether to
                                                  coordinate a plan and timeline for                                                                             access to classified information in the
                                                                                                          request a limited eligibility
                                                  completion.                                                                                                    performance of assigned duties and
                                                                                                          determination for the entity and must
                                                     (iii) If the GCA cannot make the NID                                                                        eligibility must be clearly consistent
                                                                                                          articulate a compelling need for it that
                                                  within the 30- or 60-day timeframes in                                                                         with the interest of the national
                                                                                                          is in accordance with U.S. national
                                                  paragraphs (h)(3)(i) and (h)(3)(ii) of this                                                                    security.
                                                                                                          security interests. The GCA must verify                   (ii) Notifies entities of its
                                                  section, the GCA must notify the CSA in                 that access to classified information is
                                                  writing and explain the extenuating                                                                            determinations of employee eligibility
                                                                                                          essential to contract or agreement                     for access to classified information.
                                                  circumstances causing the delay. The                    performance, and accept the risk
                                                  GCA must provide written updates to                                                                               (iii) Terminates eligibility status when
                                                                                                          inherent in not mitigating or negating                 there is no longer a need for access to
                                                  the CSA, or its designee, every 30 days                 the FOCI.
                                                  until it makes the determination. In                                                                           classified information by entity
                                                                                                             (3) The CSA may grant a limited                     employees.
                                                  turn, the CSA provides the entity with                  eligibility determination if the GCA                      (2) The responsible CSA maintains:
                                                  updates every 30 days.                                  requests and the entity meets all other                   (i) SF 312s, Classified Information
                                                     (A) When the GCA has authority over                  eligibility criteria in § 2004.32(e).                  Nondisclosure Agreements, or other
                                                  all the categories of the proscribed                       (4) A foreign government may sponsor                approved nondisclosure agreements,
                                                  information involved, if the GCA does                   a U.S. sub-entity of a foreign entity for              executed by entity employees, as
                                                  not provide the CSA with a NID within                   limited eligibility when the foreign                   prescribed by ODNI in accordance with
                                                  30 days, the CSA does not have to delay                 government desires to award a contract                 32 CFR 2001.80 and E.O. 13526; and
                                                  any longer to make the entity eligibility               or agreement to the U.S. sub-entity that                  (ii) Records of its entity employee
                                                  determination or upgrade it to top secret               involves access to classified information              eligibility determinations, suspensions,
                                                  and implement an SSA to wait for the                    for which the foreign government is the                and revocations.
                                                  NID, as long as the GCA does not                        original classification authority (i.e.,                  (3) CSAs ensure that entities limit the
                                                  indicate that the NID might be negative.                foreign government information), and                   number of employees with access to
                                                  However, the entity must not have                       there is no other need for the U.S. sub-               classified information to the minimum
                                                  access to proscribed information under                  entity to have access to classified                    number necessary to work on classified
                                                  a new contract until the GCA makes a                    information.                                           contracts or agreements.
                                                  favorable NID.                                             (5) Limited eligibility determinations                 (4) The CSA determines the need for
                                                     (B) In some cases in which one or                    are specific to the classified information             event-driven reinvestigations for entity
                                                  more controlling agencies have                          of the requesting GCA or foreign                       employees.
                                                  authority over any category of the                      government, and specific to a single,                     (5) CSAs use the Federal Investigative
                                                  proscribed information involved, the                    narrowly defined contract, agreement,                  Standards (FIS) issued jointly by the
                                                  GCA or CSA might receive concurrence                    or circumstance of that GCA or foreign
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                                                                                                                                 Suitability and Security Executive
                                                  on a favorable NID from some of the                     government.                                            Agents.
                                                  controlling agencies within 60 days, but                   (6) The access limitations of a                        (6) The CSA provides guidance to
                                                  not others. In such cases, the CSA may                  favorable limited eligibility                          entities on:
                                                  proceed with an eligibility                             determination apply to all of the entity’s                (i) Requesting employee eligibility
                                                  determination or upgrade it to top secret               employees, regardless of citizenship.                  determinations, to include guidance for
                                                  eligibility and implement an SSA, but                      (7) A limited eligibility determination             submitting fingerprints; and
                                                  only for those categories of proscribed                 is not an option for entities that require                (ii) Granting employee access to
                                                  information for which a controlling                     access to proscribed information when a                classified information when the


                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00021   Fmt 4702   Sfmt 4702   E:\FR\FM\11JAP1.SGM   11JAP1


                                                  3232                  Federal Register / Vol. 82, No. 7 / Wednesday, January 11, 2017 / Proposed Rules

                                                  employee has had a break in access or                   security clearance certificate from the                CSA must base the guidance on
                                                  a break in employment.                                  individual’s country of citizenship.                   standards applicable to Federal systems,
                                                     (7) If the CSA receives adverse                      NATO access is limited to performance                  which must include the Federal
                                                  information about an eligible entity                    on a specific NATO contract;                           Information Security Modernization Act
                                                  employee, the CSA should consider and                      (vii) Information for which the U.S.                of 2014 (FISMA), Public Law 113–283,
                                                  possibly investigate to determine                       Government has prohibited foreign                      and may include National Institute of
                                                  whether the employee’s eligibility to                   disclosure in whole or in part; or                     Standards and Technology (NIST)
                                                  access classified information remains                      (viii) Information provided to the U.S.             publications, Committee on National
                                                  clearly consistent with the interests of                Government by another government that                  Security Systems (CNSS) publications,
                                                  national security. If the CSA determines                is classified or provided in confidence.               and Federal information processing
                                                  that an entity employee’s continued                        (4) The responsible CSA provides                    standards (FIPS).
                                                  eligibility is not in the interest of                   specific procedures to entities for
                                                  national security, the CSA implements                   requesting LAAs. The GCA must concur                   § 2004.42 International programs security.
                                                  procedures leading to suspension and                    on an entity’s LAA request before the                  [Reserved]
                                                  ultimate revocation of the employee’s                   CSA may grant it.                                      Appendix A to Part 2004—Acronym
                                                  eligible status, and notifies the entity.                                                                      Table
                                                                                                          § 2004.38    Safeguarding and marking.
                                                     (b) Consultants. A consultant is an
                                                  individual under contract or agreement                     (a) Safeguarding approval. (1) The                    For details on many of these terms, see the
                                                  to provide professional or technical                    CSA determines whether an entity’s                     definitions at § 2004.4.
                                                  assistance to an entity in a capacity                   safeguarding capability meets                          CCIPP—Classified Critical Infrastructure
                                                  requiring access to classified                          requirements established in 32 CFR                       Protection Program
                                                  information. A consultant is considered                 2001, and other applicable national                    CCIPP POC—Entity point of contact under
                                                                                                          level policy (e.g., Atomic Energy Act for                the CCIPP program
                                                  an entity employee for security
                                                                                                          RD). If the CSA makes a favorable                      CIA—Central Intelligence Agency
                                                  purposes. The CSA makes eligibility
                                                                                                          determination, the entity may store                    CSA—Cognizant security agency
                                                  determinations for entity consultants in
                                                                                                          classified information at that level or                CNSS—Committee on National Security
                                                  the same way it does for entity
                                                                                                          below. If the determination is not                       Systems
                                                  employees.                                                                                                     COMSEC—Communications security
                                                     (c) Reciprocity. The responsible CSA                 favorable, the CSA must ensure that the
                                                                                                          entity does not possess classified                     CSO—Cognizant security office
                                                  determines if an entity employee was                                                                           DHS—Department of Homeland Security
                                                  previously investigated or determined                   information or does not possess
                                                                                                          information at a level higher than the                 DoD—Department of Defense
                                                  eligible by another CSA. CSAs                                                                                  DOE—Department of Energy
                                                  reciprocally accept existing employee                   approved safeguarding level.
                                                                                                             (2) The CSA maintains records of its                EA—Executive agent (the NISP executive
                                                  eligibility determinations in accordance                                                                         agent is DoD)
                                                  with applicable and current national                    safeguarding capability determinations
                                                                                                                                                                 E.O.—Executive Order
                                                  level personnel security policy, and do                 and, upon request from GCAs or
                                                                                                                                                                 FAR—Federal Aquisition Regulation
                                                  not duplicate employee eligibility                      entities, and as appropriate and to the
                                                                                                                                                                 FOCI—Foreign ownership, control, or
                                                  investigations conducted by another                     extent authorized by law, verifies that it
                                                                                                                                                                   influence
                                                  CSA.                                                    has made a favorable safeguarding                      GCA—Government contracting activity
                                                     (d) Limited access authorization                     determination for a given entity and at                Insider threat SO—insider threat senior
                                                  (LAA). (1) CSAs may make LAA                            what level.                                              official (for an agency or for an entity)
                                                  determinations for non-U.S. citizen                        (b) Marking. The GCA provides                       ISOO—Information Security Oversight Office
                                                  entity employees in rare circumstances,                 guidance to entities that meets                          of the National Archives and Records
                                                  when:                                                   requirements in 32 CFR 2001.22,                          Administration (NARA)
                                                     (i) A non-U.S. citizen employee                      2001.23, 2001.24, and 2001.25,                         KMO—Key managers and officials (of an
                                                  possesses unique or unusual skill or                    Derivative classification, Classification                entity)
                                                  expertise that the agency urgently needs                marking in the electronic environment,                 LAA—Limited access authorization
                                                  to support a specific U.S. Government                   Additional requirements, and                           NID—National interest determination
                                                  contract or agreement; and                              Declassification markings; ISOO’s                      NISPOM—National Industrial Security
                                                     (ii) A U.S. citizen with those skills is             marking guide, Marking Classified                        Program Operating Manual
                                                  not available.                                          National Security Information; and                     NRC—Nuclear Regulatory Commission
                                                     (2) A CSA may grant LAAs up to the                   other applicable national level policy                 NSA—National Security Agency
                                                  secret classified level.                                (e.g., Atomic Energy Act for RD) for                   ODNI—Office of the Director of National
                                                     (3) CSAs may not use LAAs for access                 marking classified information and                       Intelligence
                                                  to:                                                     material.                                              PA—Proxy agreement
                                                     (i) Top secret (TS) information;                                                                            RD—Restricted data
                                                     (ii) RD or FRD information;                          § 2004.40    Information system security.              SF—Standard Form
                                                     (iii) Information that a Government-                   (a) The responsible CSA must                         SAO—Senior agency official for NISP
                                                  designated disclosure authority has not                 authorize an entity information system                 SAP—Special access program
                                                  determined releasable to the country of                 before the entity can use it to process                SCA—Security control agreement
                                                  which the individual is a citizen;                      classified information. The CSA must                   SCI—Sensitive compartmented information
                                                     (iv) COMSEC information;                             use the most complete, accurate, and                   SSA—Special security agreement
sradovich on DSK3GMQ082PROD with PROPOSALS




                                                     (v) Intelligence information, to                     trustworthy information to make a                      TS—Top secret (classification level)
                                                  include SCI;                                            timely, credible, and risk-based decision              VT—Voting trust
                                                     (vi) NATO information, except as                     whether to authorize an entity’s system.                 Dated: January 3, 2017.
                                                  follows: Foreign nationals of a NATO                      (b) The responsible CSA issues to                    David S. Ferriero,
                                                  member nation may be authorized                         entities guidance that establishes
                                                                                                                                                                 Archivist of the United States.
                                                  access to NATO information subject to                   protection measures for entity
                                                  the terms of the contract, if the                       information systems that process                       [FR Doc. 2017–00152 Filed 1–10–17; 8:45 am]
                                                  responsible CSA obtains a NATO                          classified information. The responsible                BILLING CODE 7515–01–P




                                             VerDate Sep<11>2014   19:15 Jan 10, 2017   Jkt 241001   PO 00000   Frm 00022   Fmt 4702   Sfmt 9990   E:\FR\FM\11JAP1.SGM   11JAP1



Document Created: 2018-02-01 14:59:14
Document Modified: 2018-02-01 14:59:14
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionProposed Rules
ActionProposed rule.
DatesSubmit comments by February 10, 2017.
ContactFor information about this regulation and the regulatory process, contact Kimberly Keravuori, External Policy Program Manager, by email at [email protected], or by telephone at 301.837.3151. For information about the NISP and the requirements in this regulation, contact William A. Cira, Acting Director, ISOO, by telephone at 202-357-5323.
FR Citation82 FR 3219 
RIN Number3095-AB79
CFR AssociatedClassified Information and National Industrial Security Program

2025 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR