83_FR_20038 83 FR 19950 - National Industrial Security Program

83 FR 19950 - National Industrial Security Program

NATIONAL ARCHIVES AND RECORDS ADMINISTRATION
Information Security Oversight Office

Federal Register Volume 83, Issue 88 (May 7, 2018)

Page Range19950-19963
FR Document2018-09465

The Information Security Oversight Office (ISOO) of the National Archives and Records Administration (NARA), is revising the National Industrial Security Program (NISP) Directive. The NISP safeguards classified information the Federal Government or foreign governments release to contractors, licensees, grantees, and certificate holders. This revision adds provisions incorporating executive branch insider threat policy and minimum standards, identifies the Office of the Director of National Intelligence (ODNI) and the Department of Homeland Security (DHS) as new cognizant security agencies (CSAs), and adds responsibilities for all CSAs and non-CSA departments and agencies (to reflect oversight functions that are already detailed for private sector entities in the National Industrial Security Program Operating Manual (NISPOM)). This revision also makes other administrative changes to be consistent with recent revisions to the NISPOM and with updated regulatory language and style.

Federal Register, Volume 83 Issue 88 (Monday, May 7, 2018)
[Federal Register Volume 83, Number 88 (Monday, May 7, 2018)]
[Rules and Regulations]
[Pages 19950-19963]
From the Federal Register Online  [www.thefederalregister.org]
[FR Doc No: 2018-09465]



[[Page 19950]]

=======================================================================
-----------------------------------------------------------------------

NATIONAL ARCHIVES AND RECORDS ADMINISTRATION

Information Security Oversight Office

32 CFR Part 2004

[FDMS No. NARA-16-0006; Agency No. NARA-2018-032]
RIN 3095-AB79


National Industrial Security Program

AGENCY: National Archives and Records Administration (NARA).

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: The Information Security Oversight Office (ISOO) of the 
National Archives and Records Administration (NARA), is revising the 
National Industrial Security Program (NISP) Directive. The NISP 
safeguards classified information the Federal Government or foreign 
governments release to contractors, licensees, grantees, and 
certificate holders. This revision adds provisions incorporating 
executive branch insider threat policy and minimum standards, 
identifies the Office of the Director of National Intelligence (ODNI) 
and the Department of Homeland Security (DHS) as new cognizant security 
agencies (CSAs), and adds responsibilities for all CSAs and non-CSA 
departments and agencies (to reflect oversight functions that are 
already detailed for private sector entities in the National Industrial 
Security Program Operating Manual (NISPOM)). This revision also makes 
other administrative changes to be consistent with recent revisions to 
the NISPOM and with updated regulatory language and style.

DATES: This rule is effective on May 7, 2018.

ADDRESSES: National Archives and Records Administration; ATTN: External 
Policy Program, Suite 4100, 8601 Adelphi Road; College Park, MD 20740.

FOR FURTHER INFORMATION CONTACT: For information about this regulation 
and the regulatory process, contact Kimberly Keravuori, External Policy 
Program Manager, by email at [email protected], or by 
telephone at 301.837.3151. For information about the NISP and the 
requirements in this regulation, contact Mark A. Bradley, Director, 
ISOO, by telephone at 202-357-5205.

SUPPLEMENTARY INFORMATION: We published proposed revisions to this rule 
in the Federal Register on January 11, 2017 (82 FR 3219) and received 
seven sets of public comments in response, from companies, industry 
representative organizations, and law firms. The vast majority of the 
comments were on 32 CFR 2004.32 and 2004.34, relating to national 
interest determinations (NIDs) made when an entity is under foreign 
ownership, control, or influence (FOCI) and the proposed mitigation 
method is a special security agreement. Overall, commenters strongly 
recommended that NIDs be eliminated, but, if not possible to do so, the 
commenters suggested ways in which to streamline the process and the 
regulatory provisions, including granting the Defense Security Service 
(DSS) authority to make NIDs concurrently with making eligibility 
determinations, establishing a presumption of approval if an entity 
otherwise has a favorable record, and making NIDs prior to contract 
awards.
    We are not at this time able to eliminate NIDs because certain 
categories of classified information involve assessment of factors 
specific to that information. The regulation is also not drafted on the 
basis of what DSS may or may not do, as DSS is not one of the cognizant 
security agencies (CSAs) specifically named in Executive Order (E.O.) 
12829. DSS has authority granted to it by the Department of Defense, 
one of the CSAs, and each CSA has equivalent authority under the NISP 
to make entity eligibility determinations and NIDs. We decline to 
create a presumption of approval because of the potential risk to 
national security, particularly with regard to certain categories of 
proscribed information. In addition, no agency has the capability to 
evaluate companies for a NID prior to any acquisition activity so as to 
include the NID in contract award documents.
    Nonetheless, we have taken the comments and suggestions into 
consideration and made changes to further streamline the NID process 
and these regulatory sections in response to the public comments. We 
have established that the CSA (or DSS for the CSA, in the case of DoD 
determinations) makes the NID and does so concurrently with making the 
entity eligibility determination. In this manner, for several 
categories of classified information, the NID will take no longer than 
the entity eligibility determination. In cases in which the proscribed 
information does not require concurrence from a controlling agency, the 
entity's access may begin as soon as a positive determination is made. 
Now, only in cases in which the proscribed information requires 
concurrence from a controlling agency (RD, COMSEC, SCI), must the 
entity wait in order to have access to that information. We have 
revised the process to also allow an entity to begin accessing a 
category of proscribed information once the CSA informs the entity that 
the controlling agency concurs, even if other categories of proscribed 
information are pending concurrence. This allows entities to begin work 
and have access to at least part of the information at a faster rate.
    In addition, we revised the regulation to allow an entity's access 
to SCI, RD, or COMSEC to remain in effect so long as the entity remains 
eligible for access to classified information and the contract or 
agreement imposing the requirement for access to those categories of 
proscribed information remains in effect, except under certain 
circumstances, and to remain in effect across contract renewals, new 
task orders, and SSA renewals (except under certain circumstances). 
Both of these revisions reduce the number of NIDs an entity must 
undergo and reduce the potential disruptions and burdens of previous 
NID frequency. We believe these regulations significantly streamline 
the NID process and reduce burdens on entities by: (1) Allowing the CSA 
to render NIDs for certain categories of information concurrently with 
eligibility determinations, (2) allowing access to information as NID 
concurrences are received rather than waiting for all concurrences, and 
(3) establishing a 30-day timeline for concurrence (this was included 
in the proposed rule).
    We have coordinated and vetted the comments and resulting revisions 
through the CSAs listed in E. O. 12829, National Industrial Security 
Program (January 6, 1993 (58 FR 3479)), as amended by E.O. 13691 
(February 13, 2015 (80 FR 9347)): Department of Defense, Department of 
Energy, Nuclear Regulatory Commission, Office of the Director of 
National Intelligence, and Department of Homeland Security. We have 
also coordinated this rule with the other executive branch agencies 
that are members of the National Industrial Security Program Policy 
Advisory Committee (NISPPAC) or that release classified information to 
contractors, licensees, grantees, or certificate holders, and with the 
industry members of the NISPPAC. These revisions do not change 
requirements for industry (which are contained in the NISPOM), but 
instead clarify agency responsibilities.

Background

    The NISP is the Federal Government's single, integrated industrial 
security program. E.O. 12829 (amended in 1993) established the NISP to 
safeguard classified information in industry and

[[Page 19951]]

preserve the nation's economic and technological interests. The 
President issued E.O. 13691, Promoting Private Sector Cybersecurity 
Information Sharing (February 13, 2015 (80 FR 9347)), and E.O. 13708, 
Continuance or Reestablishment of Certain Federal Advisory Committees 
(September 30, 2015 (80 FR 60271)), which further amended E.O. 12829.
    E.O. 12829, sec. 102(b), delegated oversight of the NISP to the 
Director of NARA's Information Security Oversight Office (ISOO). As 
part of ISOO's responsibilities under E.O. 12829, it is authorized to 
issue such directives as necessary to implement the E.O., which are 
binding on agencies. In 2006, ISOO issued, and periodically updates, 
this regulation, which functions as one of those directives.
    This regulation establishes uniform standards throughout the 
Program, and helps agencies implement requirements in E.O. 12829, as 
amended (collectively referred to as ``E.O. 12829'').
    This revision also establishes agency responsibilities for 
implementing the insider threat provisions of E.O. 13587, Structural 
Reforms to Improve the Security of Classified Networks and the 
Responsible Sharing and Safeguarding of Classified Information (October 
7, 2011 (76 FR 63811)) within the NISP. However, the regulation does 
not stand alone; users should refer concurrently to the underlying 
executive orders for guidance.
    Nothing in this regulation supersedes the authority of the 
Secretary of Energy or the Nuclear Regulatory Commission under the 
Atomic Energy Act of 1954, as amended (42 U.S.C. 2011, et seq.); the 
authority of the Director of National Intelligence (or any intelligence 
community element) under the Intelligence Reform and Terrorism 
Prevention Act of 2004 (Pub. L. 108-458), the National Security Act of 
1947 (50 U.S.C. 401, et seq.), as amended, and E.O. 12333 (December 4, 
1981), as amended by E.O. 13355, Strengthened Management of the 
Intelligence Community (August 27, 2004) and E.O. 13470, Further 
Amendments to Executive Order 12333 (July 30, 2008); or the authority 
of the Secretary of Homeland Security, as the Executive Agent for the 
Classified National Security Information Program established under E.O. 
13549, Classified National Security Information Program for State, 
Local, Tribal, and Private Sector Entities (August 18, 2010), or by E. 
O. 13284, Amendment of Executive Orders, and Other Actions, in 
Connection with the Establishment of the Department of Homeland 
Security, (January 23, 2003).

Regulatory Analysis

    The Office of Management and Budget (OMB) has reviewed this 
proposed regulation.

Review Under Executive Orders 12866 and 13563

    Executive Order 12866, Regulatory Planning and Review, 58 FR 51735 
(September 30, 1993), and Executive Order 13563, Improving Regulation 
and Regulation Review, 76 FR 23821 (January 18, 2011), direct agencies 
to assess all costs and benefits of available regulatory alternatives 
and, if regulation is necessary, to select regulatory approaches that 
maximize net benefits (including potential economic, environmental, 
public health and safety effects, distributive impacts, and equity). 
This rule is not ``significant'' under Executive Order 12866, sec. 
3(f), and is not a major rule as defined in 5 U.S.C. Chapter 8, 
Congressional Review of Agency Rulemaking. The Office of Management and 
Budget (OMB) has reviewed this regulation.

Review Under the Regulatory Flexibility Act (5 U.S.C. 601, et seq.)

    This review requires an agency to prepare an initial regulatory 
flexibility analysis and publish it when the agency publishes the 
proposed rule. This requirement does not apply if the agency certifies 
that the rule will not, if promulgated, have a significant economic 
impact on a substantial number of small entities (5 U.S.C. 603). As 
required by the Regulatory Flexibility Act, we certify that this 
rulemaking will not have a significant impact on a substantial number 
of small entities because it applies only to Federal agencies. This 
regulation does not establish requirements for entities; those 
requirements are established in the NISPOM. This rule sets out 
coinciding requirements for agencies. However, agencies implementing 
this regulation will do so through contracts with businesses (as well 
as other agreements with entities) and thus it indirectly affects those 
entities. Agencies have been applying the requirements and procedures 
contained in the NISPOM (and, to a lesser extent, contained in this 
regulation) to entities for 20 years, with the exception of insider 
threat provisions added to the NISPOM in 2016, and the additions to 
this regulation do not substantially alter those requirements. Most of 
the provisions being added to this regulation have applied to entities 
through the NISPOM; we are simply incorporating the agency 
responsibilities for those requirements into the regulation. Other 
revisions to this regulation are primarily administrative, except the 
new insider threat requirements. The insider threat requirements make 
minor additions to training, oversight, information system security, 
and similar functions already being conducted by entities, and thus 
will not have a significant economic impact on a substantial number of 
small business entities.

Review Under the Paperwork Reduction Act of 1995 (44 U.S.C. 3501 et 
seq.)

    This rule contains information collection activities that are 
subject to review and approval by the Office of Management and Budget 
(OMB) under the Paperwork Reduction Act. We refer to the following OMB-
approved DoD information collection in Sec.  2004.34(b) and (c)(1) of 
this regulation: OMB control No. 0704-0194, SF 328/CF 328, Certificate 
Pertaining to Foreign Interests, approved through September 30, 2019. 
DoD published the information collection notice in the Federal Register 
in May 2015 (80 FR 27938, May 15, 2015) for public comment, and the 
notice of OMB review in the Federal Register in July 2016 (81 FR 47790, 
July 22, 2016), providing a second opportunity for public comment.

Review Under Executive Order 13132, Federalism, 64 FR 43255 (August 4, 
1999)

    Review under Executive Order 13132 requires that agencies review 
regulations for federalism effects on the institutional interest of 
states and local governments, and, if the effects are sufficiently 
substantial, prepare a Federal assessment to assist senior policy 
makers. This rule will not have any direct effects on State and local 
governments within the meaning of the Executive Order. Therefore, this 
rule does not include a federalism assessment.

Review Under Executive Order 13771

    This final rule is not subject to the requirements of Executive 
Order 13771 because this final rule is related to agency organization, 
management, or personnel.

List of Subjects in 32 CFR Part 2004

    Classified information, National Industrial Security Program.

0
For the reasons stated in the preamble, the National Archives and 
Records Administration amends 32 CFR chapter XX by revising part 2004 
to read as follows:

[[Page 19952]]

PART 2004--NATIONAL INDUSTRIAL SECURITY PROGRAM (NISP)

Subpart A--Implementation and Oversight
Sec.
2004.1 Purpose and scope.
2004.4 Definitions that apply to this part.
2004.10 Responsibilities of the Director, Information Security 
Oversight Office (ISOO).
2004.11 CSA and agency implementing regulations, internal rules, or 
guidelines.
2004.12 ISOO reviews of agency NISP implementation.
Subpart B--Administration
2004.20 National Industrial Security Program Executive Agent (EA) 
and Operating Manual (NISPOM).
2004.22 Agency responsibilities.
2004.24 Insider threat program.
2004.26 Reviews of entity NISP implementation.
2004.28 Cost reports.
Subpart C--Operations
2004.30 Security classification requirements and guidance.
2004.32 Determining entity eligibility for access to classified 
information.
2004.34 Foreign ownership, control, or influence (FOCI).
2004.36 Determining entity employee eligibility for access to 
classified information.
2004.38 Safeguarding and marking.
2004.40 Information system security.
2004.42 [Reserved]
Appendix A to Part 2004--Acronym Table

    Authority:  Section 102(b)(1) of E.O. 12829 (January 6, 1993), 
as amended by E.O. 12885 (December 14, 1993), E.O. 13691 (February 
12, 2015), and section 4 of E.O. 13708 (September 30, 2015).

Subpart A--Implementation and Oversight


Sec.  2004.1   Purpose and scope.

    (a) This part sets out the National Industrial Security Program 
(``NISP'' or ``the Program'') governing the protection of agency 
classified information released to Federal contractors, licensees, 
grantees, and certificate holders. It establishes uniform standards 
throughout the Program, and helps agencies implement requirements in 
E.O. 12829, National Industrial Security Program, as amended by E.O. 
12558 and E.O.13691 (collectively referred to as ``E.O. 12829''), E.O. 
13691, Promoting Private Sector Cybersecurity Information Sharing, and 
E.O. 13587, Structural Reforms to Improve the Security of Classified 
Networks and the Responsible Sharing and Safeguarding of Classified 
Information. It applies to any executive branch agency that releases 
classified information to current, prospective, or former Federal 
contractors, licensees, grantees, or certificate holders. However, this 
part does not stand alone; users should refer concurrently to the 
underlying executive orders for guidance. ISOO maintains policy 
oversight over the NISP as established by E.O.12829.
    (b) This part also does not apply to release of classified 
information pursuant to criminal proceedings. The Classified 
Information Procedures Act (CIPA) (18 U.S.C. Appendix 3) governs 
release of classified information in criminal proceedings.
    (c) Nothing in this part supersedes the authority of the Secretary 
of Energy or the Nuclear Regulatory Commission under the Atomic Energy 
Act of 1954, as amended (42 U.S.C. 2011, et seq.) (collectively 
referred to as ``the Atomic Energy Act''); the authority of the 
Director of National Intelligence (or any intelligence community 
element) under the Intelligence Reform and Terrorism Prevention Act of 
2004 (Pub. L. 108-458), the National Security Act of 1947 as amended 
(50 U.S.C. 401, et seq.), and E.O. 12333 (December 4, 1981), as amended 
by E.O. 13355, Strengthened Management of the Intelligence Community 
(August 27, 2004) and E.O. 13470, Further Amendments to Executive Order 
12333 (July 30, 2008) (collectively referred to as ``E.O. 12333''); or 
the authority of the Secretary of Homeland Security, as the Executive 
Agent for the Classified National Security Information Program 
established under E.O. 13549, Classified National Security Information 
Program for State, Local, Tribal, and Private Sector Entities (August 
18, 2010), or as established by E.O. 13284, Amendment of Executive 
Orders, and Other Actions, in Connection with the Establishment of the 
Department of Homeland Security (January 23, 2003). In exercising these 
authorities, CSAs make every effort to facilitate reciprocity, avoid 
duplication of regulatory requirements, and facilitate uniform 
standards.


Sec.  2004.4   Definitions that apply to this part.

    (a) Access is the ability or opportunity to gain knowledge of 
classified information.
    (b) Agency(ies) are any ``Executive agency'' as defined in 5 U.S.C. 
105; any ``Military department'' as defined in 5 U.S.C. 102; and any 
other entity within the executive branch that releases classified 
information to private sector entities. This includes component 
agencies under another agency or under a cross-agency oversight office 
(such as ODNI with CIA), which are also agencies for purposes of this 
regulation.
    (c) Classified Critical Infrastructure Protection Program (CCIPP) 
is the DHS program that executes the classified infrastructure 
protection program designated by E.O. 13691, ``Promoting Private Sector 
Cybersecurity Information Sharing.'' The Government uses this program 
to share classified cybersecurity-related information with employees of 
private sector entities that own or operate critical infrastructure. 
Critical infrastructure refers to systems and assets, whether physical 
or virtual, so vital to the United States that incapacitating or 
destroying such systems and assets would have a debilitating impact on 
security, national economic security, national public health or safety, 
or any combination thereof. These entities include banks and power 
plants, among others. The sectors of critical infrastructure are listed 
in Presidential Policy Directive 21, Critical Infrastructure Security 
and Resilience (February 12, 2013).
    (d) Classified Critical Infrastructure Protection Program (CCIPP) 
security point of contact (security POC) is an official whom a CCIPP 
entity designates to maintain eligibility information about the entity 
and its cleared employees, and to report that information to DHS. The 
CCIPP security POC must be eligible for access to classified 
information.
    (e) Classified information is information the Government designates 
as requiring protection against unauthorized disclosure in the interest 
of national security, pursuant to E.O. 13526, Classified National 
Security Information, or any predecessor order, and the Atomic Energy 
Act of 1954, as amended. Classified information includes national 
security information (NSI), restricted data (RD), and formerly 
restricted data (FRD), regardless of its physical form or 
characteristics (including tangible items other than documents).
    (f) Cognizance is the area over which a CSA has operational 
oversight. Normally, a statute or executive order establishes a CSA's 
cognizance over certain types of information, programs, or non-CSA 
agencies, although CSAs may also have cognizance through an agreement 
with another CSA or non-CSA agency or an entity. A CSA may have 
cognizance over a particular type(s) of classified information based on 
specific authorities (such as those listed in Sec.  2004.1(c)), and a 
CSA may have cognizance over certain agencies or cross-agency programs 
(such as DoD's cognizance over non-CSA agencies as the EA for NISP, or 
ODNI's oversight (if applicable) of all intelligence community elements 
within the executive branch). Entities fall under a CSA's cognizance 
when they enter or compete to enter contracts or agreements to access 
classified

[[Page 19953]]

information under the CSA's cognizance, including when they enter or 
compete to enter such contracts or agreements with a non-CSA agency or 
another entity under the CSA's cognizance.
    (g) Cognizant security agencies (CSAs) are the agencies E.O. 12829, 
sec. 202, designates as having NISP implementation and security 
responsibilities for their own agencies (including component agencies) 
and any entities and non-CSA agencies under their cognizance. The CSAs 
are: Department of Defense (DoD); Department of Energy (DOE); Nuclear 
Regulatory Commission (NRC); Office of the Director of National 
Intelligence (ODNI); and Department of Homeland Security (DHS).
    (h) Cognizant security office (CSO) is an organizational unit to 
which the head of a CSA delegates authority to administer industrial 
security services on behalf of the CSA.
    (i) Contracts or agreements are any type of arrangement between an 
agency and an entity or an agency and another agency. They include, but 
are not limited to, contracts, sub-contracts, licenses, certificates, 
memoranda of understanding, inter-agency service agreements, other 
types of documents or arrangements setting out responsibilities, 
requirements, or terms agreed upon by the parties, programs, projects, 
and other legitimate U.S. or foreign government requirements. FOCI 
mitigation or negation measures, such as Voting Trust Agreements, that 
have the word ``agreement'' in their title are not included in the term 
``agreements'' within this part.
    (j) Controlling agency is an agency that owns or controls the 
following categories of proscribed information and thus has authority 
over access to or release of the information: NSA for communications 
security information (COMSEC); DOE for restricted data (RD); and ODNI 
for sensitive compartmented information (SCI).
    (k) Entity is a generic and comprehensive term which may include 
sole proprietorships, partnerships, corporations, limited liability 
companies, societies, associations, institutions, contractors, 
licensees, grantees, certificate holders, and other organizations 
usually established and operating to carry out a commercial, 
industrial, educational, or other legitimate business, enterprise, or 
undertaking, or parts of these organizations. It may reference an 
entire organization, a prime contractor, parent organization, a branch 
or division, another type of sub-element, a sub-contractor, subsidiary, 
or other subordinate or connected entity (referred to as ``sub-
entities'' when necessary to distinguish such entities from prime or 
parent entities), a specific location or facility, or the headquarters/
official business location of the organization, depending upon the 
organization's business structure, the access needs involved, and the 
responsible CSA's procedures. The term ``entity'' as used in this part 
refers to the particular entity to which an agency might release, or is 
releasing, classified information, whether that entity is a parent or 
subordinate organization.
    (l) Entity eligibility determination is an assessment by the CSA as 
to whether an entity is eligible for access to classified information 
of a certain level (and all lower levels). Eligibility determinations 
may be broad or limited to specific contracts, sponsoring agencies, or 
circumstances. A favorable determination results in eligibility to 
access classified information under the cognizance of the responsible 
CSA to the level approved. When the entity would be accessing 
categories of information such as RD or SCI for which the CSA for that 
information has set additional requirements, CSAs must also assess 
whether the entity is eligible for access to that category. Some CSAs 
refer to their favorable determinations as facility security clearances 
(FCL). A favorable entity eligibility determination does not convey 
authority to store classified information.
    (m) Foreign interest is any foreign government, element of a 
foreign government, or representative of a foreign government; any form 
of business enterprise or legal entity organized, chartered, or 
incorporated under the laws of any country other than the United States 
or its territories; and any person who is not a United States citizen 
or national.
    (n) Government contracting activity (GCA) is an agency component or 
subcomponent to which the agency head delegates broad authority 
regarding acquisition functions. A foreign government may also be a 
GCA.
    (o) Industrial security services are those activities performed by 
a CSA to verify that an entity is protecting classified information. 
They include, but are not limited to, conducting oversight reviews, 
making eligibility determinations, and providing agency and entity 
guidance and training.
    (p) Insider(s) are entity employees who are eligible to access 
classified information and may be authorized access to any U.S. 
Government or entity resource (such as personnel, facilities, 
information, equipment, networks, or systems).
    (q) Insider threat is the likelihood, risk, or potential that an 
insider will use his or her authorized access, wittingly or 
unwittingly, to do harm to the national security of the United States. 
Insider threats may include harm to entity or program information to 
the extent that the information impacts the entity's or agency's 
obligations to protect classified information.
    (r) Insider threat response action(s) are actions (such as 
investigations) an agency takes to ascertain whether an insider threat 
exists, and actions the agency takes to mitigate the threat. Agencies 
may conduct insider threat response actions through their 
counterintelligence (CI), security, law enforcement, or inspector 
general organizations, depending on the statutory authority and 
internal policies that govern the agency.
    (s) Insider threat program senior official (SO) is the official an 
agency head or entity designates with responsibility to manage, account 
for, and oversee the agency's or entity's insider threat program, 
pursuant to the National Insider Threat Policy and Minimum Standards. 
An agency may have more than one insider threat program SO.
    (t) Key managers and officials (KMO) are the senior management 
official (or authorized executive official under CCIPP), the entity's 
security officer (or security POC under CCIPP), the insider threat 
program senior official, and other entity employees whom the 
responsible CSA identifies as having authority, direct or indirect, to 
influence or decide matters affecting the entity's management or 
operations, its contracts requiring access to classified information, 
or national security interests. They may include individuals who hold 
majority ownership interest in the entity (in the form of stock or 
other ownership interests).
    (u) Proscribed information is information that is classified as top 
secret (TS) information; communications security (COMSEC) information 
(excluding controlled cryptographic items when un-keyed or utilized 
with unclassified keys); restricted data (RD); special access program 
information (SAP); or sensitive compartmented information (SCI).
    (v) Security officer is a U.S. citizen employee the entity 
designates to supervise and direct security measures implementing 
NISPOM (or equivalent; such as DOE Orders) requirements. Some CSAs 
refer to this position as a facility security officer (FSO). The 
security officer must complete security training specified by the 
responsible CSA, and must have and maintain an

[[Page 19954]]

employee eligibility determination level that is at least the same 
level as the entity's eligibility determination level.
    (w) Senior agency official for NISP (SAO for NISP) is the official 
an agency head designates to direct and administer the agency's 
National Industrial Security Program.
    (x) Senior management official (SMO) is the person in charge of an 
entity. Under the CCIPP, this is the authorized executive official with 
authority to sign the security agreement with DHS.
    (y) Sub-entity is an entity's branch or division, another type of 
sub-element, a sub-contractor, subsidiary, or other subordinate or 
connected entity. Sub-entities fall under the definition of ``entity,'' 
but this part refers to them as sub-entities when necessary to 
distinguish such entities from prime contractor or parent entities. See 
definition of ``entity'' in paragraph (k) of this section for more 
context.


Sec.  2004.10   Responsibilities of the Director, Information Security 
Oversight Office (ISOO).

    The Director, ISOO:
    (a) Implements E.O. 12829, including ensuring that:
    (1) The NISP operates as a single, integrated program across the 
executive branch of the Federal Government (i.e., such that agencies 
that release classified information to entities adhere to NISP 
principles);
    (2) A responsible CSA oversees each entity's NISP implementation in 
accordance with Sec.  2004.22;
    (3) All agencies that contract for classified work include the 
Security Requirements clause, 48 CFR 52.204-2, from the Federal 
Acquisition Regulation (FAR), or an equivalent clause, in contracts 
that require access to classified information;
    (4) Those agencies for which the Department of Defense (DoD) serves 
as the CSA or provides industrial security services have agreements 
with DoD defining the Secretary of Defense's responsibilities on behalf 
of their agency;
    (5) Each CSA issues directions to entities under their cognizance 
that are consistent with the NISPOM insider threat guidance;
    (6) CSAs share with each other, as lawful and appropriate, relevant 
information about entity employees that indicates an insider threat; 
and
    (7) CSAs conduct ongoing analysis and adjudication of adverse or 
relevant information about entity employees that indicates an insider 
threat.
    (b) Raises an issue to the National Security Council (NSC) for 
resolution if the EA's NISPOM coordination process cannot reach a 
consensus on NISPOM security standards (see Sec.  2004.20(d)).


Sec.  2004.11   CSA and agency implementing regulations, internal 
rules, or guidelines.

    (a) Each CSA implements NISP practices in part through policies and 
guidelines that are consistent with this regulation, so that agencies 
for which it serves as the CSA are aware of appropriate security 
standards, engage in consistent practices with entities, and so that 
practices effectively protect classified information those entities 
receive (including foreign government information that the U.S. 
Government must protect in the interest of national security).
    (b) Each CSA must also routinely review and update its NISP 
policies and guidelines and promptly issue revisions when needed 
(including when a change in national policy necessitates a change in 
agency NISP policies and guidelines).
    (c) Non-CSA agencies may choose to augment CSA NISP policies or 
guidelines as long as the agency policies or guidelines are consistent 
with the CSA's policies or guidelines and this regulation.


Sec.  2004.12   ISOO review of agency NISP implementation.

    (a) ISOO fulfills its oversight role based, in part, on information 
received from NISP Policy Advisory Committee (NISPPAC) members, from 
on-site reviews that ISOO conducts under the authority of E.O. 12829, 
and from any submitted complaints and suggestions. ISOO reports 
findings to the responsible CSA or agency.
    (b) ISOO reviews agency policies and guidelines to ensure 
consistency with NISP policies and procedures. ISOO may conduct reviews 
during routine oversight visits, when a problem or potential problem 
comes to ISOO's attention, or after a change in national policy that 
impacts agency policies and guidelines. ISOO provides the responsible 
agency with findings from these reviews.

Subpart B--Administration


Sec.  2004.20   National Industrial Security Program Executive Agent 
and Operating Manual.

    (a) The executive agent (EA) for NISP is the Secretary of Defense. 
The EA:
    (1) Provides industrial security services for agencies that are not 
CSAs but that release classified information to entities. The EA 
provides industrial security services only through an agreement with 
the agency. Non-CSA agencies must enter an agreement with the EA and 
comply with EA industrial security service processes before releasing 
classified information to an entity;
    (2) Provides services for other CSAs by agreement; and
    (3) Issues and maintains the National Industrial Security Program 
Operating Manual (NISPOM) in consultation with all affected agencies 
and with the concurrence of the other CSAs.
    (b) The NISPOM sets out the procedures and standards that entities 
must follow during all phases of the contracting process to safeguard 
any classified information an agency releases to an entity. The NISPOM 
requirements may apply to the entity directly (i.e., through FAR 
clauses or other contract clauses referring entities to the NISPOM) or 
through equivalent contract clauses or requirements documents that are 
consistent with NISPOM requirements.
    (c) The EA, in consultation with all affected agencies and with the 
concurrence of the other CSAs, develops the requirements, restrictions, 
and safeguards contained in the NISPOM. The EA uses security standards 
applicable to agencies as the basis for developing NISPOM entity 
standards to the extent practicable and reasonable.
    (d) The EA also facilitates the NISPOM coordination process, which 
addresses issues raised by entities, agencies, ISOO, or the NISPPAC, 
including requests to create or change NISPOM security standards.


Sec.  2004.22   Agency responsibilities.

    (a) Agency categories and general areas of responsibility. Federal 
agencies fall into three categories for the purpose of NISP 
responsibilities:
    (1) CSAs. CSAs are responsible for carrying out NISP implementation 
within their agency, for providing NISP industrial security services on 
behalf of non-CSA agencies by agreement when authorized, and for 
overseeing NISP compliance by entities that access classified 
information under the CSA's cognizance. When the CSA has oversight 
responsibilities for a particular non-CSA agency or for an entity, the 
CSA also functions as the responsible CSA;
    (2) Non-CSA agencies. Non-CSA agencies are responsible for entering 
agreements with a designated CSA for industrial security services, and 
are responsible for carrying out NISP implementation within their 
agency consistently with the agreement, the CSA's guidelines and 
procedures, and this regulation; or
    (3) Agencies that are components of another agency. Component 
agencies do not have itemized responsibilities under this regulation 
and do not

[[Page 19955]]

independently need to enter agreements with a CSA, but they follow, and 
may have responsibilities under, implementing guidelines and procedures 
established by their CSA or non-CSA agency, or both.
    (b) Responsible CSA role. (1) The responsible CSA is the CSA (or 
its delegated CSO) that provides NISP industrial security services on 
behalf of an agency, determines an entity's eligibility for access, and 
monitors and inspects an entity's NISP implementation.
    (2) In general, the goal is to have one responsible CSA for each 
agency and for each entity, to minimize the burdens that can result 
from complying with differing CSA procedures and requirements.
    (i) With regard to agencies, NISP accomplishes this goal by a 
combination of designated CSAs and agreements between agencies and 
CSAs.
    (ii) With regard to entities, CSAs strive to reduce the number of 
responsible CSAs for a given entity as much as possible. To this end, 
when more than one CSA releases classified information to a given 
entity, those CSAs agree on which is the responsible CSA. However, due 
to certain unique agency authorities, there may be circumstances in 
which a given entity is under the oversight of more than one 
responsible CSA.
    (3) Responsible CSA for agencies:
    (i) In general, each CSA serves as the responsible CSA for 
classified information that it (or any of its component agencies) 
releases to entities, unless it enters an agreement otherwise with 
another CSA.
    (ii) DoD serves as the responsible CSA for DHS with the exception 
of the CCIPP, based on an agreement between the two CSAs.
    (iii) DoD serves as the responsible CSA on behalf of all non-CSA 
agencies, except CSA components, based on E.O. 12829 and its role as 
NISP EA.
    (iv) ODNI serves as the responsible CSA for CIA.
    (4) Responsible CSA for entities: When determining the responsible 
CSA for a given entity, the involved CSAs consider, at a minimum: 
retained authorities, the information's classification level, number of 
contracts requiring access to classified information, location, number 
of Government customers, volume of classified activity, safeguarding 
requirements, responsibility for entity employee eligibility 
determinations, and any special requirements.
    (5) Responsible CSAs may delegate oversight responsibility to a 
cognizant security office (CSO) through CSA policy or by written 
delegation. The CSA must inform entities under its cognizance if it 
delegates responsibilities. For purposes of this rule, the term CSA 
also refers to the CSO.
    (c) CSA responsibilities. (1) The CSA may perform GCA 
responsibilities as its own GCA.
    (2) As CSA, the CSA performs or delegates the following 
responsibilities:
    (i) Designates a CSA senior agency official (SAO) for NISP;
    (ii) Identifies the insider threat program senior official (SO) to 
the Director, ISOO;
    (iii) Shares insider threat information with other CSAs, as lawful 
and appropriate, including information that indicates an insider threat 
about entity employees eligible to access classified information;
    (iv) Acts upon and shares--with security management, GCAs, insider 
threat program employees, and Government program and CI officials--any 
relevant entity-reported information about security or CI concerns, as 
appropriate;
    (v) Submits reports to ISOO as required by this part; and
    (vi) Develops, coordinates, and provides concurrence on changes to 
the NISPOM when requested by the EA.
    (3) As a responsible CSA, the CSA also performs or delegates the 
following responsibilities:
    (i) Determines whether an entity is eligible for access to 
classified information (see Sec.  2004.32);
    (ii) Allocates funds, ensures appropriate investigations are 
conducted, and determines entity employee eligibility for access to 
classified information (see Sec.  2004.36);
    (iii) Reviews and approves entity safeguarding measures, including 
making safeguarding capability determinations (see Sec.  2004.38);
    (iv) Conducts periodic security reviews of entity operations (see 
Sec.  2004.26) to determine that entities: effectively protect 
classified information provided to them; and follow NISPOM (or 
equivalent) requirements;
    (v) Provides and regularly updates guidance, training, training 
materials, and briefings to entities on:
    (A) Entity implementation of NISPOM (or equivalent) requirements, 
including: responsibility for protecting classified information, 
requesting NISPOM interpretations, establishing training programs, and 
submitting required reports;
    (B) Initial security briefings and other briefings required for 
special categories of information;
    (C) Authorization measures for information systems processing 
classified information (except DHS) (see Sec.  2004.40);
    (D) Security training for security officers (or CCIPP POCs) and 
other employees whose official duties include performing NISP-related 
functions;
    (E) Insider threat programs in accordance with the National Insider 
Threat Policy and Minimum Standards for Executive Branch Insider Threat 
Programs; and
    (F) Other guidance and training as appropriate;
    (vi) Establishes a mechanism for entities to submit requests for 
waivers to NISPOM (or equivalent) provisions;
    (vii) Reviews, continuously analyzes, and adjudicates, as 
appropriate, reports from entities regarding events that:
    (A) Impact the status of the entity's eligibility for access to 
classisfied information;
    (B) Impact an employee's eligibility for access;
    (C) May indicate an employee poses an insider threat;
    (D) Affect proper safeguarding of classified information; or
    (E) Indicate that classified information has been lost or 
compromised;
    (viii) Verifies that reports offered in confidence and so marked by 
an entity may be withheld from public disclosure under applicable 
exemptions of the Freedom of Information Act (5 U.S.C. 552);
    (ix) Requests any additional information needed from an entity 
about involved employees to determine continued eligibility for access 
to classified information when the entity reports loss, possible 
compromise, or unauthorized disclosure of classified information; and
    (x) Posts hotline information on its website for entity access, or 
otherwise disseminates contact numbers to the entities for which the 
CSA is responsible.
    (d) Non-CSA agency head responsibilities. The head of a non-CSA 
agency that is not a CSA component and that releases classified 
information to entities, performs the following responsibilities:
    (1) Designates an SAO for the NISP;
    (2) Identifies the insider threat program SO to ISOO to facilitate 
information sharing;
    (3) Enters into an agreement with the EA (except agencies that are 
components of another agency or a cross-agency oversight office) to act 
as the responsible CSA on the agency's behalf (see paragraph (a)(1)(ii) 
of this section);
    (4) Performs, or delegates in writing to a GCA, the following 
responsibilities:

[[Page 19956]]

    (i) Provides appropriate education and training to agency personnel 
who implement the NISP;
    (ii) Includes FAR security requirements clause 52.204-2, or 
equivalent (such as the DEAR clause 952.204-2), and a contract security 
classification specification (or equivalent guidance) into contracts 
and solicitations that require access to classified information (see 
Sec.  2004.30); and
    (iii) Reports to the appropriate CSA adverse information and 
insider threat activity pertaining to entity employees having access to 
classified information.


Sec.  2004.24   Insider threat program.

    (a) Responsible CSAs oversee and analyze entity activity to ensure 
entities implement an insider threat program in accordance with the 
National Insider Threat Policy and Minimum Standards for Executive 
Branch Insider Threat Programs (via requirements in the NISPOM or its 
equivalent) and guidance from the CSA. CSA oversight responsibilities 
include, but are not limited to:
    (1) Verifying that entities appoint insider threat program SOs;
    (2) Requiring entities to monitor, report, and review insider 
threat program activities and response actions in accordance with the 
provisions set forth in the NISPOM (or equivalent);
    (3) Providing entities with access to data relevant to insider 
threat program activities and applicable reporting requirements and 
procedures;
    (4) Providing entities with a designated means to report insider 
threat-related activity; and
    (5) Advising entities on appropriate insider threat training for 
entity employees eligible for access to classified information.
    (b) CSAs share with other CSAs any insider threat information 
reported to them by entities, as lawful and appropriate.


Sec.  2004.26   Reviews of entity NISP implementation.

    (a) The responsible CSA conducts recurring oversight reviews of 
entities' NISP security programs to verify that the entity is 
protecting classified information and is implementing the provisions of 
the NISPOM (or equivalent). The CSA determines the scope and frequency 
of reviews. The CSA generally notifies entities when a review will take 
place, but may also conduct unannounced reviews at its discretion.
    (b) CSAs make every effort to avoid unnecessarily intruding into 
entity employee personal effects during the reviews.
    (c) A CSA may, on entity premises, physically examine the interior 
spaces of containers not authorized to store classified information in 
the presence of the entity's representative.
    (d) As part of a security review, the CSA:
    (1) Verifies that the entity limits entity employees with access to 
classified information to the minimum number necessary to perform on 
contracts requiring access to classified information.
    (2) Validates that the entity has not provided its employees 
unauthorized access to classified information;
    (3) Reviews the entity's self-inspection program and evaluates and 
records the entity's remedial actions; and
    (4) Verifies that the GCA approved any public release of 
information pertaining to a contract requiring access to classified 
information.
    (e) As a result of findings during the security review, the CSA 
may, as appropriate, notify:
    (1) GCAs if there are unfavorable results from the review; and
    (2) A prime entity if the CSA discovers unsatisfactory security 
conditions pertaining to a sub-entity.
    (f) The CSA maintains a record of reviews it conducts and the 
results. Based on review results, the responsible CSA determines 
whether an entity's eligibility for access to classified information 
may continue. See Sec.  2004.32(g).


Sec.  2004.28   Cost reports.

    (a) Agencies must annually report to the Director, ISOO, on their 
NISP implementation costs for the previous year.
    (b) CSAs must annually collect information on NISP implementation 
costs incurred by entities under their cognizance and submit a report 
to the Director, ISOO.

Subpart C--Operations


Sec.  2004.30   Security classification requirements and guidance.

    (a) Contract or agreement and solicition requirements. (1) The GCA 
must incorporate FAR clause 52.204-2, Security Requirements (or 
equivalent set of security requirements), into contracts or agreements 
and solicitations requiring access to classified information.
    (2) The GCA must also include a contract security classification 
specification (or equivalent guidance) with each contract or agreement 
and solicitation that requires access to classified information. The 
contract security classification specification (or equivalent guidance) 
must identify the specific elements of classified information involved 
in each phase of the contract or agreement life-cycle, such as:
    (i) Level of classification;
    (ii) Where the entity will access or store the classified 
information, and any requirements or limitations on transmitting 
classified information outside the entity;
    (iii) Any special accesses;
    (iv) Any classification guides or other guidance the entity needs 
to perform during that phase of the contract or agreement;
    (v) Any authorization to disclose information about the contract or 
agreement requiring access to classified information; and
    (vi) GCA personnel responsible for interpreting and applying the 
contract security specifications (or equivalent guidance).
    (3) The GCA revises the contract security classification 
specification (or equivalent guidance) throughout the contract or 
agreement life-cycle as security requirements change.
    (b) Guidance. Classification guidance is the exclusive 
responsibility of the GCA. The GCA prepares classification guidance in 
accordance with 32 CFR 2001.15, and provides appropriate security 
classification and declassification guidance to entities.
    (c) Requests for clarification and classification challenges. (1) 
The GCA responds to entity requests for clarification and 
classification challenges.
    (2) The responsible CSA assists entities to obtain appropriate 
classification guidance from the GCA, and to obtain a classification 
challenge response from the GCA.
    (d) Instructions upon contract or agreement completion or 
termination. (1) The GCA provides instructions to the entity for 
returning or disposing of classified information upon contract or 
agreement completion or termination, or when an entity no longer has a 
legitimate need to retain or possess classified information.
    (2) The GCA also determines whether the entity may retain 
classified information for particular purposes after the contract or 
agreement terminates, and if so, provides written authorization to the 
entity along with any instructions or limitations (such as which 
information, for how long, etc).


Sec.  2004.32   Determining entity eligibility for access to classified 
information.

    (a) Eligibility determinations. (1) The responsible CSA determines 
whether an

[[Page 19957]]

entity is eligible for access to classified information. An entity may 
not have access to classified information until the responsible CSA 
determines that it meets all the requirements in this section. In 
general, the entity must be eligible to access classified information 
at the appropriate level before the CSA may consider any of the 
entity's subsidiaries, sub-contractors, or other sub-entities for 
eligibility. However, when the subsidiary will perform all classified 
work, the CSA may instead exclude the parent entity from access to 
classified information rather than determining its eligibility. In 
either case, the CSA must consider all information relevant to 
assessing whether the entity's access poses an unacceptable risk to 
national security interests.
    (2) A favorable access eligibility determination is not the same as 
a safeguarding capability determination. Entities may access classified 
information with a favorable eligibility determination, but may possess 
classified information only if the CSA determines both access 
eligibility and safeguarding capability, based on the GCA's requirement 
in the contract security classification specification (or equivalent).
    (3) If an entity has an existing eligibility determination, a CSA 
will not duplicate eligibility determination processes performed by 
another CSA. If a CSA cannot acknowledge an entity eligibility 
determination to another CSA, that entity may be subject to duplicate 
processing.
    (4) Each CSA maintains a record of its entities' eligibility 
determinations (or critical infrastructure entity eligibility status 
under the CCIPP, for DHS) and responds to inquiries from GCAs or 
entities, as appropriate and to the extent authorized by law, regarding 
the eligibility status of entities under their cognizance.
    (b) Process. (1) The responsible CSA provides guidance to entities 
on the eligibility determination process and on how to maintain 
eligibility throughout the period of the agreement or as long as an 
entity continues to need access to classified information in connection 
with a legitimate U.S. or foreign government requirement.
    (2) The CSA coordinates with appropriate authorities to determine 
whether an entity meets the eligibility criteria in paragraph (e) of 
this section. This includes coordinating with appropriate U.S. 
Government regulatory authorities to determine entity compliance with 
laws and regulations.
    (3) An entity cannot apply for its own eligibility determination. A 
GCA or an eligible entity must sponsor the entity to the responsible 
CSA for an eligibility determination. The GCA or eligible entity may 
sponsor an entity at any point during the contracting or agreement 
life-cycle at which the entity must have access to classified 
information to participate (including the solicitation or competition 
phase). An entity with limited eligibility granted under paragraph (f) 
of this section may sponsor a sub-entity for a limited eligibility 
determination for the same contract, agreement, or circumstance so long 
as the sponsoring entity is not under FOCI (see Sec.  2004.34(i)).
    (4) The GCA must include enough lead time in each phase of the 
acquisition or agreement cycle to accomplish all required security 
actions. Required security actions include any eligibility 
determination necessary for an entity to participate in that phase of 
the cycle. The GCA may award a contract or agreement before the CSA 
completes the entity eligibility determination. However, in such cases, 
the entity may not begin performance on portions of the contract or 
agreement that require access to classified information until the CSA 
makes a favorable entity eligibility determination.
    (5) When a CSA is unable to make an eligibility determination in 
sufficient time to qualify an entity to participate in the particular 
procurement action or phase that gave rise to the GCA request (this 
includes both solicitation and performance phases), the GCA may request 
that the CSA continue the determination process to qualify the entity 
for future classified work for any GCA, provided that the processing 
delay was not due to the entity's lack of cooperation. Once the CSA 
determines that an entity is eligible for access to classified 
information, but a GCA does not award a contract or agreement requiring 
access to classified information to the entity, or the entity's 
eligibility status changes, the CSA terminates the entity eligibility 
determination in accordance with paragraph (g) of this section.
    (c) Coverage. (1) A favorable eligibility determination allows an 
entity to access classified information at the determined eligibility 
level, or lower.
    (2) The CSA must ensure that all entities needing access to 
classified information as part of a legitimate U.S. or foreign 
government requirement have or receive a favorable eligibility 
determination before accessing classified information. This includes 
both prime or parent entities and sub-entities, even in cases in which 
an entity intends to have the classified work performed only by sub-
entities. A prime or parent entity must have a favorable eligibility 
determination at the same classification level or higher than its sub-
entity(ies), unless the CSA determined that the parent entity could be 
effectively excluded from access (see paragraph (a)(1) of this 
section).
    (3) If a parent and sub-entity need to share classified information 
with each other, the CSA must validate that both the parent and the 
sub-entity have favorable eligibility determinations at the level 
required for the classified information prior to sharing the 
information.
    (d) DHS Classified Critical Infrastructure Protection Program 
(CCIPP). DHS shares classified cybersecurity information with certain 
employees of entities under the Classified Critical Infrastructure 
Protection Program (CCIPP). The CCIPP applies only to entities that do 
not need to store classified information, have no other contracts or 
agreements already requiring access to classified information, and are 
not already determined eligible for access to classified information. 
DHS establishes and implements procedures consistent with the NISP to 
determine CCIPP entity eligibility for access to classified 
information.
    (e) Eligibility criteria. An entity must meet the following 
requirements to be eligible to access classified information:
    (1) It must need to access classified information as part of a 
legitimate U.S. Government or foreign government requirement, and 
access must be consistent with U.S. national security interests as 
determined by the CSA;
    (2) It must be organized and existing under the laws of any of the 
50 States, the District of Columbia, or an organized U.S. territory 
(Guam, Commonwealth of the Northern Marianas Islands, Commonwealth of 
Puerto Rico, and the U.S. Virgin Islands); or an American Indian or 
Alaska native tribe formally acknowledged by the Assistant Secretary--
Indian Affairs, of the U.S. Department of the Interior;
    (3) It must be located in the United States or its territorial 
areas;
    (4) It must have a record of compliance with pertinent laws, 
regulations, and contracts (or other relevant agreements);
    (5) Its KMOs must each have and maintain eligibility for access to 
classified information that is at least the same level as the entity 
eligibility level;
    (6) It and all of its KMOs must not be excluded by a Federal 
agency, contract review board, or other authorized official from 
participating in Federal contracts or agreements;

[[Page 19958]]

    (7) It must meet all requirements the CSA or the authorizing law, 
regulation, or Government-wide policy establishes for access to the 
type of classified information or program involved; and
    (8) If the CSA determines the entity is under foreign ownership, 
control, or influence (FOCI), the responsible CSA must:
    (i) Agree that sufficient security measures are in place to 
mitigate or negate risk to national security interests due to the FOCI 
(see Sec.  2004.34);
    (ii) Determine that it is appropriate to grant eligibility for a 
single, narrowly defined purpose (see Sec.  2004.34(i)); or
    (iii) Determine that the entity is not eligible to access 
classified information.
    (9) DoD and DOE cannot award a contract involving access to 
proscribed information to an entity effectively owned or controlled by 
a foreign government unless the Secretary of the agency first issues a 
waiver (see 10 U.S.C. 2536). A waiver is not required if the CSA 
determines the entity is eligible and it agrees to establish a voting 
trust agreement (VTA) or proxy agreement (PA) (see Sec.  2004.34(f)) 
because both VTAs and PAs effectively negate foreign government 
control.
    (f) Limited entity eligibility determination. CSAs may choose to 
allow GCAs to request limited entity eligibility determinations (this 
is not the same as limited entity eligibility in situations involving 
FOCI when the FOCI is not mitigated or negated; for more information on 
limited entity eligibility in such FOCI cases, see Sec.  2004.34(i)). 
If a CSA permits GCAs to request a limited entity eligibility 
determination, it must set out parameters within its implementing 
policies that are consistent with the following requirements:
    (1) The GCA, or an entity with limited eligibility, must first 
request a limited entity eligibility determination from the CSA for the 
relevant entity and provide justification for limiting eligibility in 
that case;
    (2) Limited entity eligibility is specific to the requesting GCA's 
classified information, and to a single, narrowly defined contract, 
agreement, or circumstance;
    (3) The entity must otherwise meet the requirements for entity 
eligibility set out in this part;
    (4) The CSA documents the requirements of each limited entity 
eligibility determination it makes, including the scope of, and any 
limitations on, access to classified information;
    (5) The CSA verifies limited entity eligibility determinations only 
to the requesting GCA or entity. In the case of multiple limited entity 
eligibility determinations for a single entity, the CSA verifies each 
one separately only to its requestor; and
    (6) CSAs administratively terminate the limited entity eligibility 
when there is no longer a need for access to the classified information 
for which the CSA approved the limited entity eligibility.
    (g) Terminating or revoking eligibility. (1) The responsible CSA 
terminates the entity's eligible status when the entity no longer has a 
need for access to classified information.
    (2) The responsible CSA revokes the entity's eligible status if the 
entity is unable or unwilling to protect classified information.
    (3) The CSA coordinates with the GCA(s) to take interim measures, 
as necessary, toward either termination or revocation.


Sec.  2004.34   Foreign ownership, control, or influence (FOCI).

    (a) FOCI determination. A U.S. entity is under foreign ownership, 
control, or influence (FOCI) when:
    (1) A foreign interest has the power to direct or decide matters 
affecting the entity's management or operations in a manner that could:
    (i) Result in unauthorized access to classified information; or
    (ii) Adversely affect performance of a contract or agreement 
requiring access to classified information; and
    (2) The foreign interest exercises that power:
    (i) Directly or indirectly;
    (ii) Through ownership of the U.S. entity's securities, by 
contractual arrangements, or other similar means;
    (iii) By the ability to control or influence the election or 
appointment of one or more members to the entity's governing board 
(e.g., board of directors, board of managers, board of trustees) or its 
equivalent; or
    (iv) Prospectively (i.e., is not currently exercising the power, 
but could).
    (b) CSA guidance. The CSA establishes guidance for entities on 
filling out and submitting a Standard Form (SF) 328, Certificate 
Pertaining to Foreign Interests (OMB Control No. 0704-0194), and on 
reporting changes in circumstances that might result in a determination 
that the entity is under FOCI or is no longer under FOCI. The CSA also 
advises entities on the Government appeal channels for disputing CSA 
FOCI determinations.
    (c) FOCI factors. To determine whether an entity is under FOCI, the 
CSA analyzes available information to determine the existence, nature, 
and source of FOCI. The CSA:
    (1) Considers information the entity or its parent provides on the 
SF 328/CF 328 (OMB Control No. 0704-0194), and any other relevant 
information; and
    (2) Considers in the aggregate the following factors about the 
entity:
    (i) Record of espionage against U.S. targets, either economic or 
Government;
    (ii) Record of enforcement actions against the entity for 
transferring technology without authorization;
    (iii) Record of compliance with pertinent U.S. laws, regulations, 
and contracts or agreements;
    (iv) Type and sensitivity of the information the entity would 
access;
    (v) Source, nature, and extent of FOCI, including whether foreign 
interests hold a majority or minority position in the entity, taking 
into consideration the immediate, intermediate, and ultimate parent 
entities;
    (vi) Nature of any relevant bilateral and multilateral security and 
information exchange agreements;
    (vii) Ownership or control, in whole or in part, by a foreign 
government; and
    (viii) Any other factor that indicates or demonstrates foreign 
interest capability to control or influence the entity's operations or 
management.
    (d) Entity access while under FOCI. (1) If the CSA is determining 
whether an entity is eligible to access classified information and 
finds that the entity is under FOCI, the CSA must consider the entity 
ineligible for access to classified information. The CSA and the entity 
may then attempt to negotiate FOCI mitigation or negation measures 
sufficient to permit a favorable eligibility determination.
    (2) The CSA may not determine that the entity is eligible to access 
classified information until the entity has put into place appropriate 
security measures to negate or mitigate FOCI or is otherwise no longer 
under FOCI. If the degree of FOCI is such that no mitigation or 
negation efforts will be sufficient, or access to classified 
information would be inconsistent with national security interests, 
then the CSA will determine the entity ineligible for access to 
classified information.
    (3) If an entity comes under FOCI, the CSA may allow the existing 
eligibility status to continue while the CSA and the entity negotiate 
acceptable FOCI mitigation or negation measures, as long as there is no 
indication that classified information is at risk. If the entity does 
not actively negotiate mitigation or negation measures in good faith, 
or there are no appropriate measures that will remove the possibility 
of unauthorized access to classified information or adverse effect on 
the entity's performance of contracts or

[[Page 19959]]

agreements involving classified information, the CSA will take steps, 
in coordination with the GCA, to terminate eligibility.
    (e) FOCI and entities under the CCIPP. DHS may sponsor, as part of 
the CCIPP, a U.S. entity that is under FOCI, under the following 
circumstances:
    (1) The Secretary of DHS proposes appropriate FOCI risk mitigation 
or negation measures (see paragraph (f) of this section) to the other 
CSAs and ensures the anticipated release of classified information:
    (i) Is authorized for release to the country involved;
    (ii) Does not include information classified under the Atomic 
Energy Act; and
    (iii) Does not impede or interfere with the entity's ability to 
manage and comply with regulatory requirements imposed by other Federal 
agencies, such as the State Department's International Traffic in Arms 
Regulation.
    (2) If the CSAs agree the mitigation or negation measures are 
sufficient, DHS may proceed to enter a CCIPP information sharing 
agreement with the entity. If one or more CSAs disagree, the Secretary 
of DHS may seek a decision from the Assistant to the President for 
National Security Affairs before entering a CCIPP information sharing 
agreement with the entity.
    (f) Mitigation or negation measures to address FOCI. (1) The CSA-
approved mitigation or negation measures must assure that the entity 
can offset FOCI by effectively denying unauthorized people or entities 
access to classified information and preventing the foreign interest 
from adversely impacting the entity's performance on contracts or 
agreements requiring access to classified information.
    (2) Any mitigation or negation measures the CSA approves for an 
entity must not impede or interfere with the entity's ability to manage 
and comply with regulatory requirements imposed by other Federal 
agencies (such as Department of State's International Traffic in Arms 
Regulation).
    (3) If the CSA approves a FOCI mitigation or negation measure for 
an entity, it may agree that the measure, or particular portions of it, 
may apply to all of the present and future sub-entities within the 
entity's organization.
    (4) Mitigation or negation measures are different for ownership 
versus control or influence.
    (5) Methods to mitigate foreign control or influence (unrelated to 
ownership) may include:
    (i) Assigning specific oversight duties and responsibilities to 
independent board members;
    (ii) Formulating special executive-level security committees to 
consider and oversee matters that affect entity performance on 
contracts or agreements requiring access to classified information;
    (iii) Modifying or terminating loan agreements, contracts, 
agreements, and other understandings with foreign interests;
    (iv) Diversifying or reducing foreign-source income;
    (v) Demonstrating financial viability independent of foreign 
interests;
    (vi) Eliminating or resolving problem debt;
    (vii) Separating, physically or organizationally, the entity 
component performing on contracts or agreements requiring access to 
classified information;
    (viii) Adopting special board resolutions;
    (ix) A combination of these methods, as determined by the CSA; or
    (x) Other actions that effectively negate or mitigate foreign 
control or influence.
    (6) Methods to mitigate or negate foreign ownership include:
    (i) Board resolutions. The CSA and the entity may agree to a board 
resolution when a foreign interest does not own voting interests 
sufficient to elect, or is otherwise not entitled to representation on, 
the entity's governing board. The resolution must identify the foreign 
shareholders and their representatives (if any), note the extent of 
foreign ownership, certify that the foreign shareholders and their 
representatives will not require, will not have, and can be effectively 
excluded from, access to all classified information, and certify that 
the entity will not permit the foreign shareholders and their 
representatives to occupy positions that might enable them to influence 
the entity's policies and practices, affecting its performance on 
contracts or agreements requiring access to classified information.
    (ii) Security control agreements (SCAs). The CSA and the entity may 
agree to use an SCA when a foreign interest does not effectively own or 
control an entity (i.e., the entity is under U.S. control), but the 
foreign interest is entitled to representation on the entity's 
governing board. At least one cleared U.S. citizen must serve as an 
outside director on the entity's governing board.
    (iii) Special security agreements (SSAs). The CSA and the entity 
may agree to use an SSA when a foreign interest effectively owns or 
controls an entity. The SSA preserves the foreign owner's right to be 
represented on the entity's board or governing body with a direct voice 
in the entity's business management, while denying the foreign owner 
majority representation and unauthorized access to classified 
information. When a GCA requires an entity to have access to proscribed 
information, and the CSA proposes an SSA as the mitigation measure, the 
CSA makes a national interest determination (NID) as part of 
determining an entity's eligibility for access. See paragraph (h) of 
this section for more information on NIDs.
    (iv) Voting trust agreements (VTAs) or proxy agreements (PAs). The 
CSA and the entity may agree to use one of these measures when a 
foreign interest effectively owns or controls an entity. The VTA and PA 
are arrangements that vest the voting rights of the foreign-owned stock 
in cleared U.S. citizens approved by the CSA. Under the VTA, the 
foreign owner transfers legal title in the entity to the trustees 
approved by the CSA. Under the PA, the foreign owner conveys their 
voting rights to proxy holders approved by the CSA. The entity must be 
organized, structured, and financed to be capable of operating as a 
viable business entity independently from the foreign owner. Both VTAs 
and PAs can effectively negate foreign ownership and control; 
therefore, neither imposes any restrictions on the entity's eligibility 
to have access to classified information or to compete for contracts or 
agreements requiring access to classified information, including those 
involving proscribed information. Both VTAs and PAs can also 
effectively negate foreign government control.
    (v) Combinations of the measures in paragraphs (f)(6)(i) through 
(iv) of this section or other similar measures that effectively 
mitigate or negate the risks involved with foreign ownership. CSAs must 
identify combination agreements in a way that distinguishes them from 
other agreements (e.g., a combination SSA-proxy agreement cannot be 
identified as either an SSA or a proxy agreement beause those names 
would not distinguish the combination agreement from either of the 
other types). CSAs must also coordinate terms in combination agreements 
with the controlling agency prior to releasing proscribed information.
    (g) Standards for FOCI mitigation or negation measures. The CSA 
must include the following requirements as part of any FOCI mitigation 
or negation measures, to ensure that entities implement necessary 
security and governing controls:
    (1) Annual certification and annual compliance reports by the 
entity's governing board and the KMOs;

[[Page 19960]]

    (2) The U.S. Government remedies in case the entity is not 
adequately protecting classified information or not adhering to the 
provisions of the mitigation or negation measure;
    (3) Supplements to FOCI mitigation or negation measures as the CSA 
deems necessary. In addition to the standard FOCI mitigation or 
negation measure's requirements, the CSA may require more procedures 
via a supplement, based upon the circumstances of an entity's 
operations. The CSA may place these requirements in supplements to the 
FOCI mitigation or negation measure to allow flexibility as 
circumstances change without having to renegotiate the entire measure. 
When making use of supplements, the CSA does not consider the FOCI 
mitigation measure final until it approves the required supplements 
(e.g., technology control plan, electronic communication plan); and
    (4) For agreements to mitigate or negate ownership (PAs, VTAs, 
SSAs, and SCAs), the following additional requirements apply:
    (i) FOCI oversight. The CSA verifies that the entity establishes an 
oversight body consisting of trustees, proxy holders or outside 
directors, as applicable, and those officers or directors whom the CSA 
determines are eligible for access to classified information (see Sec.  
2004.36). The entity's security officer is the principal advisor to the 
oversight body and attends their meetings. The oversight body:
    (A) Maintains policies and procedures to safeguard classified 
information in the entity's possession with no adverse impact on 
performance of contracts or agreements requiring access to classified 
information; and
    (B) Verifies the entity is complying with the FOCI mitigation or 
negation measure and related documents, contract security requirements 
or equivalent, and the NISP;
    (ii) Qualifications of trustees, proxy holders, and outside 
directors. The CSA determines eligibility for access to classified 
information for trustees, proxy holders, and outside directors at the 
classification level of the entity's eligibility determination. 
Trustees, proxy holders, and outside directors must meet the following 
criteria:
    (A) Be a U.S. citizen residing in the United States who can 
exercise management prerogatives relating to their position in a way 
that ensures that the foreign owner can be effectively insulated from 
the entity or effectively separated from the entity's classified work;
    (B) Be completely disinterested individuals with no prior 
involvement with the entity, the entities with which it is affiliated, 
or the foreign owner and its affiliates. Individuals who are serving as 
trustees, proxy holders, or outside directors as part of a mitigation 
measure for the entity are not considered to have prior involvement 
solely by performing that role; and
    (C) Be involved in no other circumstances that may affect an 
individual's ability to serve effectively, such as the number of boards 
on which the individual serves or the length of time serving on any 
other boards;
    (iii) Annual meeting. The CSA meets at least annually with the 
oversight body to review the purpose and effectiveness of the FOCI 
mitigation or negation agreement; establish a common understanding of 
the operating requirements and their implementation; and provide 
guidance on matters related to FOCI mitigation and industrial security. 
These meetings include a CSA review of:
    (A) Compliance with the approved FOCI mitigation or negation 
measure;
    (B) Problems regarding practical implementation of the mitigation 
or negation measure; and
    (C) Security controls, practices, or procedures and whether they 
warrant adjustment; and
    (iv) Annual certification. The CSA reviews the entity's annual 
report; addresses, and resolves issues identified in the report; and 
documents the results of this review and any follow-up actions.
    (h) National interest determination (NID)--(1) Requirement for a 
NID. (i) The CSA must determine whether allowing an entity access to 
proscribed information under an SSA is consistent with national 
security interests of the United States as part of making an entity 
eligibility determination in cases in which:
    (A) The GCA requires an entity to have access to proscribed 
information;
    (B) The entity is under FOCI; and
    (C) The CSA proposes an SSA to mitigate the FOCI.
    (ii) This determination is called a national interest determination 
(NID). A favorable NID confirms that an entity's access to the 
proscribed information under an SSA is consistent with national 
security interests. If the CSA is unable to render a favorable NID, it 
must consider other FOCI mitigation measures instead of an SSA or 
reassess the entity's eligibility for access to classified information.
    (2) NID process. (i) The CSA makes the NID for any categories of 
proscribed information for which the entity requires access.
    (ii) In cases in which any category of the proscribed information 
is controlled by another agency (ODNI for SCI, DOE for RD, NSA for 
COMSEC), the CSA asks that controlling agency to concur on the NID for 
that category of information.
    (iii) The CSA informs the GCA and the entity when the NID is 
complete. In cases involving SCI, RD, or COMSEC, the CSA also informs 
the GCA and the entity when a controlling agency concurs or non-concurs 
on that agency's category of proscribed information. The entity may 
begin accessing a category of proscribed information once the CSA 
informs the GCA and the entity that the controlling agency concurs, 
even if other categories of proscribed information are pending 
concurrence.
    (iv) An entity's access to SCI, RD, or COMSEC remains in effect so 
long as the entity remains eligible for access to classified 
information and the contract or agreement (or program or project) which 
imposes the requirement for access to those categories of proscribed 
information remains in effect, except under the following 
circumstances:
    (A) The CSA, GCA, or controlling agency becomes aware of adverse 
information that impacts the entity eligibility determination;
    (B) The CSA's threat assessment pertaining to the entity indicates 
a risk to one of the categories of proscribed information;
    (C) The CSA becomes aware of any material change regarding the 
source, nature, and extent of FOCI; or
    (D) The entity's record of NISP compliance, based on CSA reviews in 
accordance with Sec.  2004.26, becomes less than satisfactory.
    (v) Under any of these circumstances, the CSA determines whether an 
entity may continue being eligible for access to classified 
information, it must change the FOCI mitigation measure in order to 
remain eligible, or the CSA must terminate or revoke access.
    (3) Process for concurring or non-concurring on a NID. (i) Each 
controlling agency tells the CSAs what information the controlling 
agency requires to consider a NID. ODNI identifies the information it 
requires to assess a NID for access to SCI, DOE identifies the 
information it requires to assess a NID for access to RD, and NSA 
identifies the information it requires to assess a NID for access to 
COMSEC.
    (ii) The CSA requests from the GCA justification for access, a 
description of the proscribed information involved, and other 
information the controlling agency requires to concur or non-concur on 
the NID.
    (iii) The CSA requests concurrence on the NID from the controlling 
agency for the relevant category of proscribed information (ODNI for 
SCI, DOE for RD,

[[Page 19961]]

NSA for COMSEC), and provides the information that controlling agency 
identified.
    (iv) The relevant controlling agency (ODNI for SCI, DOE for RD, NSA 
for COMSEC) responds in writing to the CSA's request for concurrence.
    (A) The controlling agency may concur with the NID for access under 
a particular contract or agreement, access under a program or project, 
or for all future access to the same category of proscribed 
information.
    (B) If the relevant controlling agency does not concur with the 
NID, the controlling agency informs the CSA in writing, citing the 
reasons why it does not concur. The CSA notifies the applicable GCA 
and, in coordination with the GCA, then notifies the entity. The entity 
cannot have access to the category of proscribed information under the 
control of that agency (i.e., if ODNI does not concur, the entity may 
not have access to SCI; if DOE does not concur, the entity may not have 
access to RD; and if NSA does not concur, the entity may not have 
access to COMSEC). The CSA, in consultation with the applicable GCA, 
must decide whether the reason the controlling agency did not concur 
otherwise affects the entity's eligibility for access to classified 
information (see Sec.  2004.32(g)), or requires changing the FOCI 
mitigation measure (see paragraph (f) of this section).
    (v) When an entity is eligible for access to classified information 
that includes a favorable NID for SCI, RD, or COMSEC, the CSA does not 
have to request a new NID concurrence for the same entity if the access 
requirements for the relevant category of proscribed information and 
terms remain unchanged for:
    (A) Renewing the contract or agreement;
    (B) New task orders issued under the contract or agreement;
    (C) A new contract or agreement that contains the same provisions 
as the previous one (this usually applies when the contract or 
agreement is for a program or project); or
    (D) Renewing the SSA.
    (vi) When making the decision whether or not to concur with a NID 
for proscribed information under its control, the controlling agency 
will not duplicate work already performed by the GCA during the 
contract award process or by the CSA when determining entity 
eligibility for access to classified information.
    (4) Timing for concurrence process. (i) The CSA requests NID 
concurrence from the controlling agency as soon as the CSA has made a 
NID, if the entity needs access to SCI, RD, or COMSEC.
    (ii) The controlling agency provides a final, written concurrence 
or non-concurrence to the CSA within 30 days after receiving the 
request for concurrence from the CSA.
    (iii) In cases when a controlling agency requires clarification or 
additional information from the CSA, the controlling agency responds to 
the CSA within 30 days to request clarification or additional 
information as needed, and to coordinate a plan and timeline for 
concurring or non-concurring. The controlling agency must provide 
written updates to the CSA every 30 days until it concurs or non-
concurs. In turn, the CSA provides the GCA and the entity with updates 
every 30 days.
    (i) Limited eligibility determinations (for entities under FOCI 
without mitigation or negation). (1) In exceptional circumstances when 
an entity is under FOCI, the CSA may decide that limited eligibility 
for access to classified information is appropriate when the entity is 
unable or unwilling to implement FOCI mitigation or negation measures 
(this is not the same as limited eligibility in other circumstances; 
for more information on limited eligibility in other cases, see Sec.  
2004.32(f)).
    (2) The GCA first decides whether to request a limited eligibility 
determination for the entity and must articulate a compelling need for 
it to the CSA that is in accordance with U.S. national security 
interests. The GCA must verify to the CSA that access to classified 
information is essential to contract or agreement performance, and 
accept the risk inherent in not mitigating or negating the FOCI. See 
Sec.  2004.32(b)(3).
    (3) The CSA may grant a limited eligibility determination if the 
GCA requests and the entity meets all other eligibility criteria in 
Sec.  2004.32(e).
    (4) A foreign government may sponsor a U.S. sub-entity of a foreign 
entity for limited eligibility when the foreign government desires to 
award a contract or agreement to the U.S. sub-entity that involves 
access to classified information for which the foreign government is 
the original classification authority (i.e., foreign government 
information), and there is no other need for the U.S. sub-entity to 
have access to classified information.
    (5) Limited eligibility determinations are specific to the 
classified information of the requesting GCA or foreign government, and 
specific to a single, narrowly defined contract, agreement, or 
circumstance of that GCA or foreign government.
    (6) The access limitations of a favorable limited eligibility 
determination apply to all of the entity's employees, regardless of 
citizenship.
    (7) A limited eligibility determination is not an option for 
entities that require access to proscribed information when a foreign 
government has ownership or control over the entity. See Sec.  
2004.32(e)(9).
    (8) The CSA administratively terminates the entity's limited 
eligibility when there is no longer a need for access to the classified 
information for which the CSA made the favorable limited eligibility 
determination. Terminating one limited eligibility status does not 
impact other ones the entity may have.


Sec.  2004.36   Determining entity employee eligibility for access to 
classified information.

    (a) Making employee eligibility determinations. (1) The responsible 
CSA:
    (i) Determines whether entity employees meet the criteria 
established in the Security Executive Agent Directive (SEAD) 4, 
National Security Adjudicative Guidelines (December 10, 2016). Entity 
employees must have a legitimate requirement (i.e., need to know) for 
access to classified information in the performance of assigned duties 
and eligibility must be clearly consistent with the interest of the 
national security.
    (ii) Notifies entities of its determinations of employee 
eligibility for access to classified information.
    (iii) Terminates eligibility status when there is no longer a need 
for access to classified information by entity employees.
    (2) The responsible CSA maintains:
    (i) SF 312s, Classified Information Nondisclosure Agreements, or 
other approved nondisclosure agreements, executed by entity employees, 
as prescribed by ODNI in accordance with 32 CFR 2001.80 and E.O. 13526; 
and
    (ii) Records of its entity employee eligibility determinations, 
suspensions, and revocations.
    (3) CSAs ensure that entities limit the number of employees with 
access to classified information to the minimum number necessary to 
work on contracts or agreements requiring access to classified 
information.
    (4) The CSA determines the need for event-driven reinvestigations 
for entity employees.
    (5) CSAs use the Federal Investigative Standards (FIS) issued 
jointly by the Suitability and Security Executive Agents.

[[Page 19962]]

    (6) The CSA provides guidance to entities on:
    (i) Requesting employee eligibility determinations, to include 
guidance for submitting fingerprints; and
    (ii) Granting employee access to classified information when the 
employee has had a break in access or a break in employment.
    (7) If the CSA receives adverse information about an eligible 
entity employee, the CSA should consider and possibly investigate, as 
authorized, to determine whether the employee's eligibility to access 
classified information remains clearly consistent with the interests of 
national security. If the CSA determines that an entity employee's 
continued eligibility is not in the interest of national security, the 
CSA implements procedures leading to suspension and ultimate revocation 
of the employee's eligible status, and notifies the entity.
    (b) Consultants. A consultant is an individual under contract or 
agreement to provide professional or technical assistance to an entity 
in a capacity requiring access to classified information. A consultant 
is considered an entity employee for security purposes. The CSA makes 
eligibility determinations for entity consultants in the same way it 
does for entity employees.
    (c) Reciprocity. The responsible CSA determines if an entity 
employee was previously investigated or determined eligible by another 
CSA. CSAs reciprocally accept existing employee eligibility 
determinations in accordance with applicable and current national level 
personnel security policy, and must not duplicate employee eligibility 
investigations conducted by another CSA.
    (d) Limited access authorization (LAA). (1) CSAs may make LAA 
determinations for non-U.S. citizen entity employees in rare 
circumstances, when:
    (i) A non-U.S. citizen employee possesses unique or unusual skill 
or expertise that the agency urgently needs to support a specific U.S. 
Government contract or agreement; and
    (ii) A U.S. citizen with those skills is not available.
    (2) A CSA may grant LAAs up to the secret classified level.
    (3) CSAs may not use LAAs for access to:
    (i) Top secret (TS) information;
    (ii) RD or FRD information;
    (iii) Information that a Government-designated disclosure authority 
has not determined releasable to the country of which the individual is 
a citizen;
    (iv) COMSEC information;
    (v) Intelligence information, to include SCI;
    (vi) NATO information, except as follows: Foreign nationals of a 
NATO member nation may be authorized access to NATO information subject 
to the terms of the contract, if the responsible CSA obtains a NATO 
security clearance certificate from the individual's country of 
citizenship. NATO access is limited to performance on a specific NATO 
contract;
    (vii) Information for which the U.S. Government has prohibited 
foreign disclosure in whole or in part; or
    (viii) Information provided to the U.S. Government by another 
government that is classified or provided in confidence.
    (4) The responsible CSA provides specific procedures to entities 
for requesting LAAs. The GCA must concur on an entity's LAA request 
before the CSA may grant it.


Sec.  2004.38   Safeguarding and marking.

    (a) Safeguarding approval. (1) The CSA determines whether an 
entity's safeguarding capability meets requirements established in 32 
CFR part 2001, and other applicable national level policy (e.g., Atomic 
Energy Act for RD). If the CSA makes a favorable determination, the 
entity may store classified information at that level or below. If the 
determination is not favorable, the CSA must ensure that the entity 
does not possess classified information or does not possess information 
at the classification level denied or a higher level.
    (2) The CSA maintains records of its safeguarding capability 
determinations and, upon request from GCAs or entities, and as 
appropriate and to the extent authorized by law, verifies that it has 
made a favorable safeguarding determination for a given entity and at 
what level.
    (b) Marking. The GCA provides guidance to entities that meets 
requirements in 32 CFR 2001.22, 2001.23, 2001.24, and 2001.25, 
Derivative classification, Classification marking in the electronic 
environment, Additional requirements, and Declassification markings; 
ISOO's marking guide, Marking Classified National Security Information; 
and other applicable national level policy (e.g., Atomic Energy Act for 
RD) for marking classified information and material.


Sec.  2004.40   Information system security.

    (a) The responsible CSA must authorize an entity information system 
before the entity can use it to process classified information. The CSA 
must use the most complete, accurate, and trustworthy information to 
make a timely, credible, and risk-based decision whether to authorize 
an entity's system.
    (b) The responsible CSA issues to entities guidance that 
establishes protection measures for entity information systems that 
process classified information. The responsible CSA must base the 
guidance on standards applicable to Federal systems, which must include 
the Federal Information Security Modernization Act of 2014 (FISMA), 
Public Law 113-283, and may include National Institute of Standards and 
Technology (NIST) publications, Committee on National Security Systems 
(CNSS) publications, and Federal information processing standards 
(FIPS).


Sec.  2004.42   [Reserved]

Appendix A to Part 2004--Acronym Table

    For details on many of these terms, see the definitions at Sec.  
2004.4.

CCIPP--Classified Critical Infrastructure Protection Program
CCIPP POC--Entity point of contact under the CCIPP program
CIA--Central Intelligence Agency
CSA--Cognizant security agency
CNSS--Committee on National Security Systems
COMSEC--Communications security
CSO--Cognizant security office
DHS--Department of Homeland Security
DoD--Department of Defense
DOE--Department of Energy
EA--Executive agent (the NISP executive agent is DoD)
E.O.--Executive Order
FAR--Federal Aquisition Regulation
FOCI--Foreign ownership, control, or influence
GCA--Government contracting activity
Insider threat program SO--insider threat senior official (for an 
agency or for an entity)
ISOO--Information Security Oversight Office of the National Archives 
and Records Administration (NARA)
KMO--Key managers and officials (of an entity)
LAA--Limited access authorization
NID--National interest determination
NISPOM--National Industrial Security Program Operating Manual
NRC--Nuclear Regulatory Commission
NSA--National Security Agency
ODNI--Office of the Director of National Intelligence
PA--Proxy agreement
RD--Restricted data
SF--Standard Form
SAO--Senior agency official for NISP
SAP--Special access program
SCA--Security control agreement
SCI--Sensitive compartmented information
SSA--Special security agreement
TS--Top secret (classification level)

[[Page 19963]]

VT--Voting trust

David S. Ferriero,
Archivist of the United States.
[FR Doc. 2018-09465 Filed 5-4-18; 8:45 am]
 BILLING CODE 7515-01-P



                                             19950                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                             NATIONAL ARCHIVES AND RECORDS                           response, from companies, industry                    revised the process to also allow an
                                             ADMINISTRATION                                          representative organizations, and law                 entity to begin accessing a category of
                                                                                                     firms. The vast majority of the                       proscribed information once the CSA
                                             Information Security Oversight Office                   comments were on 32 CFR 2004.32 and                   informs the entity that the controlling
                                                                                                     2004.34, relating to national interest                agency concurs, even if other categories
                                             32 CFR Part 2004                                        determinations (NIDs) made when an                    of proscribed information are pending
                                                                                                     entity is under foreign ownership,                    concurrence. This allows entities to
                                             [FDMS No. NARA–16–0006; Agency No.
                                             NARA–2018–032]
                                                                                                     control, or influence (FOCI) and the                  begin work and have access to at least
                                                                                                     proposed mitigation method is a special               part of the information at a faster rate.
                                             RIN 3095–AB79                                           security agreement. Overall,                             In addition, we revised the regulation
                                                                                                     commenters strongly recommended that                  to allow an entity’s access to SCI, RD,
                                             National Industrial Security Program                    NIDs be eliminated, but, if not possible              or COMSEC to remain in effect so long
                                                                                                     to do so, the commenters suggested                    as the entity remains eligible for access
                                             AGENCY:  National Archives and Records
                                                                                                     ways in which to streamline the process               to classified information and the
                                             Administration (NARA).
                                                                                                     and the regulatory provisions, including              contract or agreement imposing the
                                             ACTION: Final rule.                                                                                           requirement for access to those
                                                                                                     granting the Defense Security Service
                                             SUMMARY:   The Information Security                     (DSS) authority to make NIDs                          categories of proscribed information
                                             Oversight Office (ISOO) of the National                 concurrently with making eligibility                  remains in effect, except under certain
                                                                                                     determinations, establishing a                        circumstances, and to remain in effect
                                             Archives and Records Administration
                                                                                                     presumption of approval if an entity                  across contract renewals, new task
                                             (NARA), is revising the National
                                                                                                     otherwise has a favorable record, and                 orders, and SSA renewals (except under
                                             Industrial Security Program (NISP)
                                                                                                     making NIDs prior to contract awards.                 certain circumstances). Both of these
                                             Directive. The NISP safeguards
                                                                                                        We are not at this time able to                    revisions reduce the number of NIDs an
                                             classified information the Federal
                                                                                                     eliminate NIDs because certain                        entity must undergo and reduce the
                                             Government or foreign governments
                                                                                                     categories of classified information                  potential disruptions and burdens of
                                             release to contractors, licensees,
                                                                                                     involve assessment of factors specific to             previous NID frequency. We believe
                                             grantees, and certificate holders. This
                                                                                                     that information. The regulation is also              these regulations significantly
                                             revision adds provisions incorporating
                                                                                                     not drafted on the basis of what DSS                  streamline the NID process and reduce
                                             executive branch insider threat policy
                                                                                                     may or may not do, as DSS is not one                  burdens on entities by: (1) Allowing the
                                             and minimum standards, identifies the                   of the cognizant security agencies                    CSA to render NIDs for certain
                                             Office of the Director of National                      (CSAs) specifically named in Executive                categories of information concurrently
                                             Intelligence (ODNI) and the Department                  Order (E.O.) 12829. DSS has authority                 with eligibility determinations, (2)
                                             of Homeland Security (DHS) as new                       granted to it by the Department of                    allowing access to information as NID
                                             cognizant security agencies (CSAs), and                 Defense, one of the CSAs, and each CSA                concurrences are received rather than
                                             adds responsibilities for all CSAs and                  has equivalent authority under the NISP               waiting for all concurrences, and (3)
                                             non-CSA departments and agencies (to                    to make entity eligibility determinations             establishing a 30-day timeline for
                                             reflect oversight functions that are                    and NIDs. We decline to create a                      concurrence (this was included in the
                                             already detailed for private sector                     presumption of approval because of the                proposed rule).
                                             entities in the National Industrial                     potential risk to national security,                     We have coordinated and vetted the
                                             Security Program Operating Manual                       particularly with regard to certain                   comments and resulting revisions
                                             (NISPOM)). This revision also makes                     categories of proscribed information. In              through the CSAs listed in E. O. 12829,
                                             other administrative changes to be                      addition, no agency has the capability to             National Industrial Security Program
                                             consistent with recent revisions to the                 evaluate companies for a NID prior to                 (January 6, 1993 (58 FR 3479)), as
                                             NISPOM and with updated regulatory                      any acquisition activity so as to include             amended by E.O. 13691 (February 13,
                                             language and style.                                     the NID in contract award documents.                  2015 (80 FR 9347)): Department of
                                             DATES: This rule is effective on May 7,                    Nonetheless, we have taken the                     Defense, Department of Energy, Nuclear
                                             2018.                                                   comments and suggestions into                         Regulatory Commission, Office of the
                                             ADDRESSES: National Archives and                        consideration and made changes to                     Director of National Intelligence, and
                                             Records Administration; ATTN:                           further streamline the NID process and                Department of Homeland Security. We
                                             External Policy Program, Suite 4100,                    these regulatory sections in response to              have also coordinated this rule with the
                                             8601 Adelphi Road; College Park, MD                     the public comments. We have                          other executive branch agencies that are
                                             20740.                                                  established that the CSA (or DSS for the              members of the National Industrial
                                                                                                     CSA, in the case of DoD determinations)               Security Program Policy Advisory
                                             FOR FURTHER INFORMATION CONTACT:    For                 makes the NID and does so concurrently                Committee (NISPPAC) or that release
                                             information about this regulation and                   with making the entity eligibility                    classified information to contractors,
                                             the regulatory process, contact Kimberly                determination. In this manner, for                    licensees, grantees, or certificate
                                             Keravuori, External Policy Program                      several categories of classified                      holders, and with the industry members
                                             Manager, by email at regulation_                        information, the NID will take no longer              of the NISPPAC. These revisions do not
                                             comments@nara.gov, or by telephone at                   than the entity eligibility determination.            change requirements for industry
                                             301.837.3151. For information about the                 In cases in which the proscribed                      (which are contained in the NISPOM),
                                             NISP and the requirements in this                       information does not require                          but instead clarify agency
                                             regulation, contact Mark A. Bradley,                    concurrence from a controlling agency,                responsibilities.
                                             Director, ISOO, by telephone at 202–
daltland on DSKBBV9HB2PROD with RULES




                                                                                                     the entity’s access may begin as soon as
                                             357–5205.                                               a positive determination is made. Now,                Background
                                             SUPPLEMENTARY INFORMATION: We                           only in cases in which the proscribed                   The NISP is the Federal Government’s
                                             published proposed revisions to this                    information requires concurrence from a               single, integrated industrial security
                                             rule in the Federal Register on January                 controlling agency (RD, COMSEC, SCI),                 program. E.O. 12829 (amended in 1993)
                                             11, 2017 (82 FR 3219) and received                      must the entity wait in order to have                 established the NISP to safeguard
                                             seven sets of public comments in                        access to that information. We have                   classified information in industry and


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00046   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19951

                                             preserve the nation’s economic and                      Regulatory Analysis                                   into the regulation. Other revisions to
                                             technological interests. The President                    The Office of Management and Budget                 this regulation are primarily
                                             issued E.O. 13691, Promoting Private                    (OMB) has reviewed this proposed                      administrative, except the new insider
                                             Sector Cybersecurity Information                        regulation.                                           threat requirements. The insider threat
                                             Sharing (February 13, 2015 (80 FR                                                                             requirements make minor additions to
                                             9347)), and E.O. 13708, Continuance or                  Review Under Executive Orders 12866                   training, oversight, information system
                                             Reestablishment of Certain Federal                      and 13563                                             security, and similar functions already
                                             Advisory Committees (September 30,                         Executive Order 12866, Regulatory                  being conducted by entities, and thus
                                             2015 (80 FR 60271)), which further                      Planning and Review, 58 FR 51735                      will not have a significant economic
                                             amended E.O. 12829.                                     (September 30, 1993), and Executive                   impact on a substantial number of small
                                                E.O. 12829, sec. 102(b), delegated                                                                         business entities.
                                                                                                     Order 13563, Improving Regulation and
                                             oversight of the NISP to the Director of
                                                                                                     Regulation Review, 76 FR 23821                        Review Under the Paperwork
                                             NARA’s Information Security Oversight
                                                                                                     (January 18, 2011), direct agencies to                Reduction Act of 1995 (44 U.S.C. 3501
                                             Office (ISOO). As part of ISOO’s
                                                                                                     assess all costs and benefits of available            et seq.)
                                             responsibilities under E.O. 12829, it is
                                                                                                     regulatory alternatives and, if regulation
                                             authorized to issue such directives as                                                                          This rule contains information
                                                                                                     is necessary, to select regulatory
                                             necessary to implement the E.O., which                                                                        collection activities that are subject to
                                                                                                     approaches that maximize net benefits
                                             are binding on agencies. In 2006, ISOO                                                                        review and approval by the Office of
                                                                                                     (including potential economic,
                                             issued, and periodically updates, this                                                                        Management and Budget (OMB) under
                                             regulation, which functions as one of                   environmental, public health and safety
                                                                                                     effects, distributive impacts, and                    the Paperwork Reduction Act. We refer
                                             those directives.                                                                                             to the following OMB-approved DoD
                                                This regulation establishes uniform                  equity). This rule is not ‘‘significant’’
                                                                                                     under Executive Order 12866, sec. 3(f),               information collection in § 2004.34(b)
                                             standards throughout the Program, and
                                                                                                     and is not a major rule as defined in 5               and (c)(1) of this regulation: OMB
                                             helps agencies implement requirements
                                             in E.O. 12829, as amended (collectively                 U.S.C. Chapter 8, Congressional Review                control No. 0704–0194, SF 328/CF 328,
                                             referred to as ‘‘E.O. 12829’’).                         of Agency Rulemaking. The Office of                   Certificate Pertaining to Foreign
                                                This revision also establishes agency                Management and Budget (OMB) has                       Interests, approved through September
                                             responsibilities for implementing the                   reviewed this regulation.                             30, 2019. DoD published the
                                             insider threat provisions of E.O. 13587,                                                                      information collection notice in the
                                                                                                     Review Under the Regulatory                           Federal Register in May 2015 (80 FR
                                             Structural Reforms to Improve the                       Flexibility Act (5 U.S.C. 601, et seq.)
                                             Security of Classified Networks and the                                                                       27938, May 15, 2015) for public
                                             Responsible Sharing and Safeguarding                      This review requires an agency to                   comment, and the notice of OMB review
                                             of Classified Information (October 7,                   prepare an initial regulatory flexibility             in the Federal Register in July 2016 (81
                                             2011 (76 FR 63811)) within the NISP.                    analysis and publish it when the agency               FR 47790, July 22, 2016), providing a
                                             However, the regulation does not stand                  publishes the proposed rule. This                     second opportunity for public comment.
                                             alone; users should refer concurrently to               requirement does not apply if the
                                                                                                                                                           Review Under Executive Order 13132,
                                             the underlying executive orders for                     agency certifies that the rule will not, if
                                                                                                                                                           Federalism, 64 FR 43255 (August 4,
                                             guidance.                                               promulgated, have a significant
                                                                                                                                                           1999)
                                                Nothing in this regulation supersedes                economic impact on a substantial
                                             the authority of the Secretary of Energy                number of small entities (5 U.S.C. 603).                Review under Executive Order 13132
                                             or the Nuclear Regulatory Commission                    As required by the Regulatory                         requires that agencies review
                                             under the Atomic Energy Act of 1954,                    Flexibility Act, we certify that this                 regulations for federalism effects on the
                                             as amended (42 U.S.C. 2011, et seq.); the               rulemaking will not have a significant                institutional interest of states and local
                                             authority of the Director of National                   impact on a substantial number of small               governments, and, if the effects are
                                             Intelligence (or any intelligence                       entities because it applies only to                   sufficiently substantial, prepare a
                                             community element) under the                            Federal agencies. This regulation does                Federal assessment to assist senior
                                             Intelligence Reform and Terrorism                       not establish requirements for entities;              policy makers. This rule will not have
                                             Prevention Act of 2004 (Pub. L. 108–                    those requirements are established in                 any direct effects on State and local
                                             458), the National Security Act of 1947                 the NISPOM. This rule sets out                        governments within the meaning of the
                                             (50 U.S.C. 401, et seq.), as amended, and               coinciding requirements for agencies.                 Executive Order. Therefore, this rule
                                             E.O. 12333 (December 4, 1981), as                       However, agencies implementing this                   does not include a federalism
                                             amended by E.O. 13355, Strengthened                     regulation will do so through contracts               assessment.
                                             Management of the Intelligence                          with businesses (as well as other
                                             Community (August 27, 2004) and E.O.                    agreements with entities) and thus it                 Review Under Executive Order 13771
                                             13470, Further Amendments to                            indirectly affects those entities.                      This final rule is not subject to the
                                             Executive Order 12333 (July 30, 2008);                  Agencies have been applying the                       requirements of Executive Order 13771
                                             or the authority of the Secretary of                    requirements and procedures contained                 because this final rule is related to
                                             Homeland Security, as the Executive                     in the NISPOM (and, to a lesser extent,               agency organization, management, or
                                             Agent for the Classified National                       contained in this regulation) to entities             personnel.
                                             Security Information Program                            for 20 years, with the exception of
                                             established under E.O. 13549, Classified                insider threat provisions added to the                List of Subjects in 32 CFR Part 2004
                                             National Security Information Program                   NISPOM in 2016, and the additions to
                                                                                                                                                             Classified information, National
                                             for State, Local, Tribal, and Private                   this regulation do not substantially alter
daltland on DSKBBV9HB2PROD with RULES




                                                                                                                                                           Industrial Security Program.
                                             Sector Entities (August 18, 2010), or by                those requirements. Most of the
                                             E. O. 13284, Amendment of Executive                     provisions being added to this                        ■ For the reasons stated in the preamble,
                                             Orders, and Other Actions, in                           regulation have applied to entities                   the National Archives and Records
                                             Connection with the Establishment of                    through the NISPOM; we are simply                     Administration amends 32 CFR chapter
                                             the Department of Homeland Security,                    incorporating the agency                              XX by revising part 2004 to read as
                                             (January 23, 2003).                                     responsibilities for those requirements               follows:


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00047   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19952                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                             PART 2004—NATIONAL INDUSTRIAL                           does not stand alone; users should refer              designated by E.O. 13691, ‘‘Promoting
                                             SECURITY PROGRAM (NISP)                                 concurrently to the underlying                        Private Sector Cybersecurity
                                                                                                     executive orders for guidance. ISOO                   Information Sharing.’’ The Government
                                             Subpart A—Implementation and Oversight                  maintains policy oversight over the                   uses this program to share classified
                                             Sec.                                                    NISP as established by E.O.12829.                     cybersecurity-related information with
                                             2004.1 Purpose and scope.                                  (b) This part also does not apply to               employees of private sector entities that
                                             2004.4 Definitions that apply to this part.             release of classified information                     own or operate critical infrastructure.
                                             2004.10 Responsibilities of the Director,               pursuant to criminal proceedings. The                 Critical infrastructure refers to systems
                                                  Information Security Oversight Office
                                                  (ISOO).
                                                                                                     Classified Information Procedures Act                 and assets, whether physical or virtual,
                                             2004.11 CSA and agency implementing                     (CIPA) (18 U.S.C. Appendix 3) governs                 so vital to the United States that
                                                  regulations, internal rules, or guidelines.        release of classified information in                  incapacitating or destroying such
                                             2004.12 ISOO reviews of agency NISP                     criminal proceedings.                                 systems and assets would have a
                                                  implementation.                                       (c) Nothing in this part supersedes the            debilitating impact on security, national
                                             Subpart B—Administration
                                                                                                     authority of the Secretary of Energy or               economic security, national public
                                                                                                     the Nuclear Regulatory Commission                     health or safety, or any combination
                                             2004.20 National Industrial Security                    under the Atomic Energy Act of 1954,
                                                 Program Executive Agent (EA) and
                                                                                                                                                           thereof. These entities include banks
                                                 Operating Manual (NISPOM).
                                                                                                     as amended (42 U.S.C. 2011, et seq.)                  and power plants, among others. The
                                             2004.22 Agency responsibilities.                        (collectively referred to as ‘‘the Atomic             sectors of critical infrastructure are
                                             2004.24 Insider threat program.                         Energy Act’’); the authority of the                   listed in Presidential Policy Directive
                                             2004.26 Reviews of entity NISP                          Director of National Intelligence (or any             21, Critical Infrastructure Security and
                                                 implementation.                                     intelligence community element) under                 Resilience (February 12, 2013).
                                             2004.28 Cost reports.                                   the Intelligence Reform and Terrorism                    (d) Classified Critical Infrastructure
                                             Subpart C—Operations                                    Prevention Act of 2004 (Pub. L. 108–                  Protection Program (CCIPP) security
                                                                                                     458), the National Security Act of 1947               point of contact (security POC) is an
                                             2004.30 Security classification
                                                 requirements and guidance.                          as amended (50 U.S.C. 401, et seq.), and              official whom a CCIPP entity designates
                                             2004.32 Determining entity eligibility for              E.O. 12333 (December 4, 1981), as                     to maintain eligibility information about
                                                 access to classified information.                   amended by E.O. 13355, Strengthened                   the entity and its cleared employees,
                                             2004.34 Foreign ownership, control, or                  Management of the Intelligence                        and to report that information to DHS.
                                                 influence (FOCI).                                   Community (August 27, 2004) and E.O.                  The CCIPP security POC must be
                                             2004.36 Determining entity employee                     13470, Further Amendments to                          eligible for access to classified
                                                 eligibility for access to classified                Executive Order 12333 (July 30, 2008)                 information.
                                                 information.                                        (collectively referred to as ‘‘E.O.                      (e) Classified information is
                                             2004.38 Safeguarding and marking.                                                                             information the Government designates
                                             2004.40 Information system security.
                                                                                                     12333’’); or the authority of the
                                             2004.42 [Reserved]                                      Secretary of Homeland Security, as the                as requiring protection against
                                             Appendix A to Part 2004—Acronym Table                   Executive Agent for the Classified                    unauthorized disclosure in the interest
                                                                                                     National Security Information Program                 of national security, pursuant to E.O.
                                                Authority: Section 102(b)(1) of E.O. 12829                                                                 13526, Classified National Security
                                             (January 6, 1993), as amended by E.O. 12885             established under E.O. 13549, Classified
                                             (December 14, 1993), E.O. 13691 (February               National Security Information Program                 Information, or any predecessor order,
                                             12, 2015), and section 4 of E.O. 13708                  for State, Local, Tribal, and Private                 and the Atomic Energy Act of 1954, as
                                             (September 30, 2015).                                   Sector Entities (August 18, 2010), or as              amended. Classified information
                                                                                                     established by E.O. 13284, Amendment                  includes national security information
                                             Subpart A—Implementation and                            of Executive Orders, and Other Actions,               (NSI), restricted data (RD), and formerly
                                             Oversight                                               in Connection with the Establishment of               restricted data (FRD), regardless of its
                                                                                                     the Department of Homeland Security                   physical form or characteristics
                                             § 2004.1   Purpose and scope.                                                                                 (including tangible items other than
                                                                                                     (January 23, 2003). In exercising these
                                                (a) This part sets out the National                                                                        documents).
                                                                                                     authorities, CSAs make every effort to
                                             Industrial Security Program (‘‘NISP’’ or                                                                         (f) Cognizance is the area over which
                                                                                                     facilitate reciprocity, avoid duplication
                                             ‘‘the Program’’) governing the protection                                                                     a CSA has operational oversight.
                                                                                                     of regulatory requirements, and
                                             of agency classified information                                                                              Normally, a statute or executive order
                                                                                                     facilitate uniform standards.
                                             released to Federal contractors,                                                                              establishes a CSA’s cognizance over
                                             licensees, grantees, and certificate                    § 2004.4   Definitions that apply to this part.       certain types of information, programs,
                                             holders. It establishes uniform standards                 (a) Access is the ability or opportunity            or non-CSA agencies, although CSAs
                                             throughout the Program, and helps                       to gain knowledge of classified                       may also have cognizance through an
                                             agencies implement requirements in                      information.                                          agreement with another CSA or non-
                                             E.O. 12829, National Industrial Security                  (b) Agency(ies) are any ‘‘Executive                 CSA agency or an entity. A CSA may
                                             Program, as amended by E.O. 12558 and                   agency’’ as defined in 5 U.S.C. 105; any              have cognizance over a particular
                                             E.O.13691 (collectively referred to as                  ‘‘Military department’’ as defined in 5               type(s) of classified information based
                                             ‘‘E.O. 12829’’), E.O. 13691, Promoting                  U.S.C. 102; and any other entity within               on specific authorities (such as those
                                             Private Sector Cybersecurity                            the executive branch that releases                    listed in § 2004.1(c)), and a CSA may
                                             Information Sharing, and E.O. 13587,                    classified information to private sector              have cognizance over certain agencies or
                                             Structural Reforms to Improve the                       entities. This includes component                     cross-agency programs (such as DoD’s
                                             Security of Classified Networks and the                 agencies under another agency or under                cognizance over non-CSA agencies as
                                             Responsible Sharing and Safeguarding                                                                          the EA for NISP, or ODNI’s oversight (if
daltland on DSKBBV9HB2PROD with RULES




                                                                                                     a cross-agency oversight office (such as
                                             of Classified Information. It applies to                ODNI with CIA), which are also                        applicable) of all intelligence
                                             any executive branch agency that                        agencies for purposes of this regulation.             community elements within the
                                             releases classified information to                        (c) Classified Critical Infrastructure              executive branch). Entities fall under a
                                             current, prospective, or former Federal                 Protection Program (CCIPP) is the DHS                 CSA’s cognizance when they enter or
                                             contractors, licensees, grantees, or                    program that executes the classified                  compete to enter contracts or
                                             certificate holders. However, this part                 infrastructure protection program                     agreements to access classified


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00048   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19953

                                             information under the CSA’s                             subordinate or connected entity                          (q) Insider threat is the likelihood,
                                             cognizance, including when they enter                   (referred to as ‘‘sub-entities’’ when                 risk, or potential that an insider will use
                                             or compete to enter such contracts or                   necessary to distinguish such entities                his or her authorized access, wittingly
                                             agreements with a non-CSA agency or                     from prime or parent entities), a specific            or unwittingly, to do harm to the
                                             another entity under the CSA’s                          location or facility, or the headquarters/            national security of the United States.
                                             cognizance.                                             official business location of the                     Insider threats may include harm to
                                                (g) Cognizant security agencies (CSAs)               organization, depending upon the                      entity or program information to the
                                             are the agencies E.O. 12829, sec. 202,                  organization’s business structure, the                extent that the information impacts the
                                             designates as having NISP                               access needs involved, and the                        entity’s or agency’s obligations to
                                             implementation and security                             responsible CSA’s procedures. The term                protect classified information.
                                             responsibilities for their own agencies                 ‘‘entity’’ as used in this part refers to the            (r) Insider threat response action(s)
                                             (including component agencies) and any                  particular entity to which an agency                  are actions (such as investigations) an
                                             entities and non-CSA agencies under                     might release, or is releasing, classified            agency takes to ascertain whether an
                                             their cognizance. The CSAs are:                         information, whether that entity is a                 insider threat exists, and actions the
                                             Department of Defense (DoD);                            parent or subordinate organization.                   agency takes to mitigate the threat.
                                             Department of Energy (DOE); Nuclear                        (l) Entity eligibility determination is            Agencies may conduct insider threat
                                             Regulatory Commission (NRC); Office of                  an assessment by the CSA as to whether                response actions through their
                                             the Director of National Intelligence                   an entity is eligible for access to                   counterintelligence (CI), security, law
                                             (ODNI); and Department of Homeland                      classified information of a certain level             enforcement, or inspector general
                                             Security (DHS).                                         (and all lower levels). Eligibility                   organizations, depending on the
                                                (h) Cognizant security office (CSO) is               determinations may be broad or limited                statutory authority and internal policies
                                             an organizational unit to which the head                to specific contracts, sponsoring                     that govern the agency.
                                             of a CSA delegates authority to                         agencies, or circumstances. A favorable                  (s) Insider threat program senior
                                             administer industrial security services                 determination results in eligibility to               official (SO) is the official an agency
                                             on behalf of the CSA.                                   access classified information under the               head or entity designates with
                                                (i) Contracts or agreements are any                  cognizance of the responsible CSA to                  responsibility to manage, account for,
                                             type of arrangement between an agency                   the level approved. When the entity                   and oversee the agency’s or entity’s
                                             and an entity or an agency and another                  would be accessing categories of                      insider threat program, pursuant to the
                                             agency. They include, but are not                       information such as RD or SCI for which               National Insider Threat Policy and
                                             limited to, contracts, sub-contracts,                   the CSA for that information has set                  Minimum Standards. An agency may
                                             licenses, certificates, memoranda of                    additional requirements, CSAs must                    have more than one insider threat
                                             understanding, inter-agency service                     also assess whether the entity is eligible            program SO.
                                             agreements, other types of documents or                 for access to that category. Some CSAs                   (t) Key managers and officials (KMO)
                                             arrangements setting out                                refer to their favorable determinations as            are the senior management official (or
                                             responsibilities, requirements, or terms                facility security clearances (FCL). A                 authorized executive official under
                                             agreed upon by the parties, programs,                   favorable entity eligibility determination            CCIPP), the entity’s security officer (or
                                             projects, and other legitimate U.S. or                  does not convey authority to store                    security POC under CCIPP), the insider
                                             foreign government requirements. FOCI                   classified information.                               threat program senior official, and other
                                             mitigation or negation measures, such as                   (m) Foreign interest is any foreign                entity employees whom the responsible
                                             Voting Trust Agreements, that have the                  government, element of a foreign                      CSA identifies as having authority,
                                             word ‘‘agreement’’ in their title are not               government, or representative of a                    direct or indirect, to influence or decide
                                             included in the term ‘‘agreements’’                     foreign government; any form of                       matters affecting the entity’s
                                             within this part.                                       business enterprise or legal entity                   management or operations, its contracts
                                                (j) Controlling agency is an agency                  organized, chartered, or incorporated                 requiring access to classified
                                             that owns or controls the following                     under the laws of any country other                   information, or national security
                                             categories of proscribed information and                than the United States or its territories;            interests. They may include individuals
                                             thus has authority over access to or                    and any person who is not a United                    who hold majority ownership interest in
                                             release of the information: NSA for                     States citizen or national.                           the entity (in the form of stock or other
                                             communications security information                        (n) Government contracting activity                ownership interests).
                                             (COMSEC); DOE for restricted data (RD);                 (GCA) is an agency component or                          (u) Proscribed information is
                                             and ODNI for sensitive compartmented                    subcomponent to which the agency                      information that is classified as top
                                             information (SCI).                                      head delegates broad authority                        secret (TS) information;
                                                (k) Entity is a generic and                          regarding acquisition functions. A                    communications security (COMSEC)
                                             comprehensive term which may include                    foreign government may also be a GCA.                 information (excluding controlled
                                             sole proprietorships, partnerships,                        (o) Industrial security services are               cryptographic items when un-keyed or
                                             corporations, limited liability                         those activities performed by a CSA to                utilized with unclassified keys);
                                             companies, societies, associations,                     verify that an entity is protecting                   restricted data (RD); special access
                                             institutions, contractors, licensees,                   classified information. They include,                 program information (SAP); or sensitive
                                             grantees, certificate holders, and other                but are not limited to, conducting                    compartmented information (SCI).
                                             organizations usually established and                   oversight reviews, making eligibility                    (v) Security officer is a U.S. citizen
                                             operating to carry out a commercial,                    determinations, and providing agency                  employee the entity designates to
                                             industrial, educational, or other                       and entity guidance and training.                     supervise and direct security measures
                                             legitimate business, enterprise, or                        (p) Insider(s) are entity employees                implementing NISPOM (or equivalent;
daltland on DSKBBV9HB2PROD with RULES




                                             undertaking, or parts of these                          who are eligible to access classified                 such as DOE Orders) requirements.
                                             organizations. It may reference an entire               information and may be authorized                     Some CSAs refer to this position as a
                                             organization, a prime contractor, parent                access to any U.S. Government or entity               facility security officer (FSO). The
                                             organization, a branch or division,                     resource (such as personnel, facilities,              security officer must complete security
                                             another type of sub-element, a sub-                     information, equipment, networks, or                  training specified by the responsible
                                             contractor, subsidiary, or other                        systems).                                             CSA, and must have and maintain an


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00049   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19954                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                             employee eligibility determination level                cannot reach a consensus on NISPOM                    releasing classified information to an
                                             that is at least the same level as the                  security standards (see § 2004.20(d)).                entity;
                                             entity’s eligibility determination level.                                                                        (2) Provides services for other CSAs
                                                (w) Senior agency official for NISP                  § 2004.11 CSA and agency implementing                 by agreement; and
                                                                                                     regulations, internal rules, or guidelines.              (3) Issues and maintains the National
                                             (SAO for NISP) is the official an agency
                                             head designates to direct and administer                  (a) Each CSA implements NISP                        Industrial Security Program Operating
                                             the agency’s National Industrial                        practices in part through policies and                Manual (NISPOM) in consultation with
                                             Security Program.                                       guidelines that are consistent with this              all affected agencies and with the
                                                (x) Senior management official (SMO)                 regulation, so that agencies for which it             concurrence of the other CSAs.
                                             is the person in charge of an entity.                   serves as the CSA are aware of                           (b) The NISPOM sets out the
                                             Under the CCIPP, this is the authorized                 appropriate security standards, engage                procedures and standards that entities
                                             executive official with authority to sign               in consistent practices with entities, and            must follow during all phases of the
                                             the security agreement with DHS.                        so that practices effectively protect                 contracting process to safeguard any
                                                (y) Sub-entity is an entity’s branch or              classified information those entities                 classified information an agency
                                             division, another type of sub-element, a                receive (including foreign government                 releases to an entity. The NISPOM
                                             sub-contractor, subsidiary, or other                    information that the U.S. Government                  requirements may apply to the entity
                                             subordinate or connected entity. Sub-                   must protect in the interest of national              directly (i.e., through FAR clauses or
                                             entities fall under the definition of                   security).                                            other contract clauses referring entities
                                             ‘‘entity,’’ but this part refers to them as               (b) Each CSA must also routinely                    to the NISPOM) or through equivalent
                                             sub-entities when necessary to                          review and update its NISP policies and               contract clauses or requirements
                                             distinguish such entities from prime                    guidelines and promptly issue revisions               documents that are consistent with
                                             contractor or parent entities. See                      when needed (including when a change                  NISPOM requirements.
                                             definition of ‘‘entity’’ in paragraph (k) of            in national policy necessitates a change                 (c) The EA, in consultation with all
                                             this section for more context.                          in agency NISP policies and guidelines).              affected agencies and with the
                                                                                                       (c) Non-CSA agencies may choose to                  concurrence of the other CSAs, develops
                                             § 2004.10 Responsibilities of the Director,             augment CSA NISP policies or                          the requirements, restrictions, and
                                             Information Security Oversight Office                   guidelines as long as the agency policies             safeguards contained in the NISPOM.
                                             (ISOO).                                                 or guidelines are consistent with the                 The EA uses security standards
                                                The Director, ISOO:                                  CSA’s policies or guidelines and this                 applicable to agencies as the basis for
                                                (a) Implements E.O. 12829, including                 regulation.                                           developing NISPOM entity standards to
                                             ensuring that:                                                                                                the extent practicable and reasonable.
                                                (1) The NISP operates as a single,                   § 2004.12 ISOO review of agency NISP
                                                                                                     implementation.                                          (d) The EA also facilitates the
                                             integrated program across the executive                                                                       NISPOM coordination process, which
                                             branch of the Federal Government (i.e.,                    (a) ISOO fulfills its oversight role
                                                                                                     based, in part, on information received               addresses issues raised by entities,
                                             such that agencies that release classified                                                                    agencies, ISOO, or the NISPPAC,
                                             information to entities adhere to NISP                  from NISP Policy Advisory Committee
                                                                                                     (NISPPAC) members, from on-site                       including requests to create or change
                                             principles);                                                                                                  NISPOM security standards.
                                                (2) A responsible CSA oversees each                  reviews that ISOO conducts under the
                                             entity’s NISP implementation in                         authority of E.O. 12829, and from any                 § 2004.22   Agency responsibilities.
                                             accordance with § 2004.22;                              submitted complaints and suggestions.                    (a) Agency categories and general
                                                (3) All agencies that contract for                   ISOO reports findings to the responsible              areas of responsibility. Federal agencies
                                             classified work include the Security                    CSA or agency.                                        fall into three categories for the purpose
                                             Requirements clause, 48 CFR 52.204–2,                      (b) ISOO reviews agency policies and               of NISP responsibilities:
                                             from the Federal Acquisition Regulation                 guidelines to ensure consistency with                    (1) CSAs. CSAs are responsible for
                                             (FAR), or an equivalent clause, in                      NISP policies and procedures. ISOO                    carrying out NISP implementation
                                             contracts that require access to                        may conduct reviews during routine                    within their agency, for providing NISP
                                             classified information;                                 oversight visits, when a problem or                   industrial security services on behalf of
                                                (4) Those agencies for which the                     potential problem comes to ISOO’s                     non-CSA agencies by agreement when
                                             Department of Defense (DoD) serves as                   attention, or after a change in national              authorized, and for overseeing NISP
                                             the CSA or provides industrial security                 policy that impacts agency policies and               compliance by entities that access
                                             services have agreements with DoD                       guidelines. ISOO provides the                         classified information under the CSA’s
                                             defining the Secretary of Defense’s                     responsible agency with findings from                 cognizance. When the CSA has
                                             responsibilities on behalf of their                     these reviews.                                        oversight responsibilities for a particular
                                             agency;                                                 Subpart B—Administration                              non-CSA agency or for an entity, the
                                                (5) Each CSA issues directions to                                                                          CSA also functions as the responsible
                                             entities under their cognizance that are                § 2004.20 National Industrial Security                CSA;
                                             consistent with the NISPOM insider                      Program Executive Agent and Operating                    (2) Non-CSA agencies. Non-CSA
                                             threat guidance;                                        Manual.                                               agencies are responsible for entering
                                                (6) CSAs share with each other, as                      (a) The executive agent (EA) for NISP              agreements with a designated CSA for
                                             lawful and appropriate, relevant                        is the Secretary of Defense. The EA:                  industrial security services, and are
                                             information about entity employees that                    (1) Provides industrial security                   responsible for carrying out NISP
                                             indicates an insider threat; and                        services for agencies that are not CSAs               implementation within their agency
                                                                                                     but that release classified information to
daltland on DSKBBV9HB2PROD with RULES




                                                (7) CSAs conduct ongoing analysis                                                                          consistently with the agreement, the
                                             and adjudication of adverse or relevant                 entities. The EA provides industrial                  CSA’s guidelines and procedures, and
                                             information about entity employees that                 security services only through an                     this regulation; or
                                             indicates an insider threat.                            agreement with the agency. Non-CSA                       (3) Agencies that are components of
                                                (b) Raises an issue to the National                  agencies must enter an agreement with                 another agency. Component agencies do
                                             Security Council (NSC) for resolution if                the EA and comply with EA industrial                  not have itemized responsibilities under
                                             the EA’s NISPOM coordination process                    security service processes before                     this regulation and do not


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00050   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19955

                                             independently need to enter agreements                  policy or by written delegation. The                  classified information (except DHS) (see
                                             with a CSA, but they follow, and may                    CSA must inform entities under its                    § 2004.40);
                                             have responsibilities under,                            cognizance if it delegates                               (D) Security training for security
                                             implementing guidelines and                             responsibilities. For purposes of this                officers (or CCIPP POCs) and other
                                             procedures established by their CSA or                  rule, the term CSA also refers to the                 employees whose official duties include
                                             non-CSA agency, or both.                                CSO.                                                  performing NISP-related functions;
                                                (b) Responsible CSA role. (1) The                       (c) CSA responsibilities. (1) The CSA                 (E) Insider threat programs in
                                             responsible CSA is the CSA (or its                      may perform GCA responsibilities as its               accordance with the National Insider
                                             delegated CSO) that provides NISP                       own GCA.                                              Threat Policy and Minimum Standards
                                             industrial security services on behalf of                  (2) As CSA, the CSA performs or                    for Executive Branch Insider Threat
                                             an agency, determines an entity’s                       delegates the following responsibilities:             Programs; and
                                             eligibility for access, and monitors and                   (i) Designates a CSA senior agency                    (F) Other guidance and training as
                                             inspects an entity’s NISP                               official (SAO) for NISP;                              appropriate;
                                             implementation.                                            (ii) Identifies the insider threat
                                                                                                                                                              (vi) Establishes a mechanism for
                                                (2) In general, the goal is to have one              program senior official (SO) to the
                                                                                                                                                           entities to submit requests for waivers to
                                             responsible CSA for each agency and for                 Director, ISOO;
                                                                                                        (iii) Shares insider threat information            NISPOM (or equivalent) provisions;
                                             each entity, to minimize the burdens                                                                             (vii) Reviews, continuously analyzes,
                                             that can result from complying with                     with other CSAs, as lawful and
                                                                                                     appropriate, including information that               and adjudicates, as appropriate, reports
                                             differing CSA procedures and                                                                                  from entities regarding events that:
                                             requirements.                                           indicates an insider threat about entity
                                                                                                     employees eligible to access classified                  (A) Impact the status of the entity’s
                                                (i) With regard to agencies, NISP                                                                          eligibility for access to classisfied
                                             accomplishes this goal by a combination                 information;
                                                                                                        (iv) Acts upon and shares—with                     information;
                                             of designated CSAs and agreements                                                                                (B) Impact an employee’s eligibility
                                             between agencies and CSAs.                              security management, GCAs, insider
                                                                                                     threat program employees, and                         for access;
                                                (ii) With regard to entities, CSAs                                                                            (C) May indicate an employee poses
                                             strive to reduce the number of                          Government program and CI officials—
                                                                                                     any relevant entity-reported information              an insider threat;
                                             responsible CSAs for a given entity as                                                                           (D) Affect proper safeguarding of
                                             much as possible. To this end, when                     about security or CI concerns, as
                                                                                                     appropriate;                                          classified information; or
                                             more than one CSA releases classified                                                                            (E) Indicate that classified information
                                                                                                        (v) Submits reports to ISOO as
                                             information to a given entity, those                                                                          has been lost or compromised;
                                                                                                     required by this part; and
                                             CSAs agree on which is the responsible                     (vi) Develops, coordinates, and                       (viii) Verifies that reports offered in
                                             CSA. However, due to certain unique                     provides concurrence on changes to the                confidence and so marked by an entity
                                             agency authorities, there may be                        NISPOM when requested by the EA.                      may be withheld from public disclosure
                                             circumstances in which a given entity is                   (3) As a responsible CSA, the CSA                  under applicable exemptions of the
                                             under the oversight of more than one                    also performs or delegates the following              Freedom of Information Act (5 U.S.C.
                                             responsible CSA.                                        responsibilities:                                     552);
                                                (3) Responsible CSA for agencies:                       (i) Determines whether an entity is
                                                (i) In general, each CSA serves as the                                                                        (ix) Requests any additional
                                                                                                     eligible for access to classified                     information needed from an entity about
                                             responsible CSA for classified                          information (see § 2004.32);
                                             information that it (or any of its                                                                            involved employees to determine
                                                                                                        (ii) Allocates funds, ensures                      continued eligibility for access to
                                             component agencies) releases to entities,               appropriate investigations are
                                             unless it enters an agreement otherwise                                                                       classified information when the entity
                                                                                                     conducted, and determines entity                      reports loss, possible compromise, or
                                             with another CSA.                                       employee eligibility for access to
                                                (ii) DoD serves as the responsible CSA                                                                     unauthorized disclosure of classified
                                                                                                     classified information (see § 2004.36);               information; and
                                             for DHS with the exception of the                          (iii) Reviews and approves entity
                                             CCIPP, based on an agreement between                                                                             (x) Posts hotline information on its
                                                                                                     safeguarding measures, including                      website for entity access, or otherwise
                                             the two CSAs.                                           making safeguarding capability
                                                (iii) DoD serves as the responsible                                                                        disseminates contact numbers to the
                                                                                                     determinations (see § 2004.38);
                                             CSA on behalf of all non-CSA agencies,                                                                        entities for which the CSA is
                                                                                                        (iv) Conducts periodic security
                                             except CSA components, based on E.O.                    reviews of entity operations (see                     responsible.
                                             12829 and its role as NISP EA.                          § 2004.26) to determine that entities:                   (d) Non-CSA agency head
                                                (iv) ODNI serves as the responsible                  effectively protect classified information            responsibilities. The head of a non-CSA
                                             CSA for CIA.                                            provided to them; and follow NISPOM                   agency that is not a CSA component and
                                                (4) Responsible CSA for entities:                    (or equivalent) requirements;                         that releases classified information to
                                             When determining the responsible CSA                       (v) Provides and regularly updates                 entities, performs the following
                                             for a given entity, the involved CSAs                   guidance, training, training materials,               responsibilities:
                                             consider, at a minimum: retained                        and briefings to entities on:                            (1) Designates an SAO for the NISP;
                                             authorities, the information’s                             (A) Entity implementation of NISPOM                   (2) Identifies the insider threat
                                             classification level, number of contracts               (or equivalent) requirements, including:              program SO to ISOO to facilitate
                                             requiring access to classified                          responsibility for protecting classified              information sharing;
                                             information, location, number of                        information, requesting NISPOM                           (3) Enters into an agreement with the
                                             Government customers, volume of                         interpretations, establishing training                EA (except agencies that are
                                                                                                                                                           components of another agency or a
daltland on DSKBBV9HB2PROD with RULES




                                             classified activity, safeguarding                       programs, and submitting required
                                             requirements, responsibility for entity                 reports;                                              cross-agency oversight office) to act as
                                             employee eligibility determinations, and                   (B) Initial security briefings and other           the responsible CSA on the agency’s
                                             any special requirements.                               briefings required for special categories             behalf (see paragraph (a)(1)(ii) of this
                                                (5) Responsible CSAs may delegate                    of information;                                       section);
                                             oversight responsibility to a cognizant                    (C) Authorization measures for                        (4) Performs, or delegates in writing to
                                             security office (CSO) through CSA                       information systems processing                        a GCA, the following responsibilities:


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00051   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19956                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                               (i) Provides appropriate education                       (c) A CSA may, on entity premises,                 security classification specification (or
                                             and training to agency personnel who                    physically examine the interior spaces                equivalent guidance) must identify the
                                             implement the NISP;                                     of containers not authorized to store                 specific elements of classified
                                               (ii) Includes FAR security                            classified information in the presence of             information involved in each phase of
                                             requirements clause 52.204–2, or                        the entity’s representative.                          the contract or agreement life-cycle,
                                             equivalent (such as the DEAR clause                        (d) As part of a security review, the              such as:
                                             952.204–2), and a contract security                     CSA:                                                     (i) Level of classification;
                                             classification specification (or                           (1) Verifies that the entity limits entity            (ii) Where the entity will access or
                                             equivalent guidance) into contracts and                 employees with access to classified                   store the classified information, and any
                                             solicitations that require access to                    information to the minimum number                     requirements or limitations on
                                             classified information (see § 2004.30);                 necessary to perform on contracts                     transmitting classified information
                                             and                                                     requiring access to classified                        outside the entity;
                                               (iii) Reports to the appropriate CSA                  information.                                             (iii) Any special accesses;
                                             adverse information and insider threat                     (2) Validates that the entity has not                 (iv) Any classification guides or other
                                             activity pertaining to entity employees                 provided its employees unauthorized                   guidance the entity needs to perform
                                             having access to classified information.                access to classified information;                     during that phase of the contract or
                                                                                                        (3) Reviews the entity’s self-                     agreement;
                                             § 2004.24   Insider threat program.
                                                                                                     inspection program and evaluates and                     (v) Any authorization to disclose
                                                (a) Responsible CSAs oversee and                                                                           information about the contract or
                                             analyze entity activity to ensure entities              records the entity’s remedial actions;
                                                                                                     and                                                   agreement requiring access to classified
                                             implement an insider threat program in                                                                        information; and
                                             accordance with the National Insider                       (4) Verifies that the GCA approved
                                                                                                     any public release of information                        (vi) GCA personnel responsible for
                                             Threat Policy and Minimum Standards                                                                           interpreting and applying the contract
                                             for Executive Branch Insider Threat                     pertaining to a contract requiring access
                                                                                                     to classified information.                            security specifications (or equivalent
                                             Programs (via requirements in the                                                                             guidance).
                                             NISPOM or its equivalent) and guidance                     (e) As a result of findings during the
                                                                                                     security review, the CSA may, as                         (3) The GCA revises the contract
                                             from the CSA. CSA oversight                                                                                   security classification specification (or
                                             responsibilities include, but are not                   appropriate, notify:
                                                                                                        (1) GCAs if there are unfavorable                  equivalent guidance) throughout the
                                             limited to:                                                                                                   contract or agreement life-cycle as
                                                (1) Verifying that entities appoint                  results from the review; and
                                                                                                        (2) A prime entity if the CSA                      security requirements change.
                                             insider threat program SOs;
                                                                                                     discovers unsatisfactory security                        (b) Guidance. Classification guidance
                                                (2) Requiring entities to monitor,
                                                                                                     conditions pertaining to a sub-entity.                is the exclusive responsibility of the
                                             report, and review insider threat
                                             program activities and response actions                    (f) The CSA maintains a record of                  GCA. The GCA prepares classification
                                             in accordance with the provisions set                   reviews it conducts and the results.                  guidance in accordance with 32 CFR
                                             forth in the NISPOM (or equivalent);                    Based on review results, the responsible              2001.15, and provides appropriate
                                                (3) Providing entities with access to                CSA determines whether an entity’s                    security classification and
                                             data relevant to insider threat program                 eligibility for access to classified                  declassification guidance to entities.
                                             activities and applicable reporting                     information may continue. See                            (c) Requests for clarification and
                                             requirements and procedures;                            § 2004.32(g).                                         classification challenges. (1) The GCA
                                                (4) Providing entities with a                                                                              responds to entity requests for
                                             designated means to report insider                      § 2004.28    Cost reports.                            clarification and classification
                                             threat-related activity; and                              (a) Agencies must annually report to                challenges.
                                                (5) Advising entities on appropriate                 the Director, ISOO, on their NISP                        (2) The responsible CSA assists
                                             insider threat training for entity                      implementation costs for the previous                 entities to obtain appropriate
                                             employees eligible for access to                        year.                                                 classification guidance from the GCA,
                                             classified information.                                   (b) CSAs must annually collect                      and to obtain a classification challenge
                                                (b) CSAs share with other CSAs any                   information on NISP implementation                    response from the GCA.
                                             insider threat information reported to                  costs incurred by entities under their                   (d) Instructions upon contract or
                                             them by entities, as lawful and                         cognizance and submit a report to the                 agreement completion or termination.
                                             appropriate.                                            Director, ISOO.                                       (1) The GCA provides instructions to the
                                                                                                                                                           entity for returning or disposing of
                                             § 2004.26 Reviews of entity NISP                        Subpart C—Operations                                  classified information upon contract or
                                             implementation.                                                                                               agreement completion or termination, or
                                               (a) The responsible CSA conducts                      § 2004.30 Security classification
                                                                                                     requirements and guidance.
                                                                                                                                                           when an entity no longer has a
                                             recurring oversight reviews of entities’                                                                      legitimate need to retain or possess
                                             NISP security programs to verify that                     (a) Contract or agreement and                       classified information.
                                             the entity is protecting classified                     solicition requirements. (1) The GCA                     (2) The GCA also determines whether
                                             information and is implementing the                     must incorporate FAR clause 52.204–2,                 the entity may retain classified
                                             provisions of the NISPOM (or                            Security Requirements (or equivalent set              information for particular purposes after
                                             equivalent). The CSA determines the                     of security requirements), into contracts             the contract or agreement terminates,
                                             scope and frequency of reviews. The                     or agreements and solicitations                       and if so, provides written authorization
                                             CSA generally notifies entities when a                  requiring access to classified                        to the entity along with any instructions
                                                                                                     information.
daltland on DSKBBV9HB2PROD with RULES




                                             review will take place, but may also                                                                          or limitations (such as which
                                             conduct unannounced reviews at its                        (2) The GCA must also include a                     information, for how long, etc).
                                             discretion.                                             contract security classification
                                               (b) CSAs make every effort to avoid                   specification (or equivalent guidance)                § 2004.32 Determining entity eligibility for
                                             unnecessarily intruding into entity                     with each contract or agreement and                   access to classified information.
                                             employee personal effects during the                    solicitation that requires access to                    (a) Eligibility determinations. (1) The
                                             reviews.                                                classified information. The contract                  responsible CSA determines whether an


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00052   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19957

                                             entity is eligible for access to classified             the responsible CSA for an eligibility                prime or parent entity must have a
                                             information. An entity may not have                     determination. The GCA or eligible                    favorable eligibility determination at the
                                             access to classified information until the              entity may sponsor an entity at any                   same classification level or higher than
                                             responsible CSA determines that it                      point during the contracting or                       its sub-entity(ies), unless the CSA
                                             meets all the requirements in this                      agreement life-cycle at which the entity              determined that the parent entity could
                                             section. In general, the entity must be                 must have access to classified                        be effectively excluded from access (see
                                             eligible to access classified information               information to participate (including the             paragraph (a)(1) of this section).
                                             at the appropriate level before the CSA                 solicitation or competition phase). An                   (3) If a parent and sub-entity need to
                                             may consider any of the entity’s                        entity with limited eligibility granted               share classified information with each
                                             subsidiaries, sub-contractors, or other                 under paragraph (f) of this section may               other, the CSA must validate that both
                                             sub-entities for eligibility. However,                  sponsor a sub-entity for a limited                    the parent and the sub-entity have
                                             when the subsidiary will perform all                    eligibility determination for the same                favorable eligibility determinations at
                                             classified work, the CSA may instead                    contract, agreement, or circumstance so               the level required for the classified
                                             exclude the parent entity from access to                long as the sponsoring entity is not                  information prior to sharing the
                                             classified information rather than                      under FOCI (see § 2004.34(i)).                        information.
                                             determining its eligibility. In either case,               (4) The GCA must include enough                       (d) DHS Classified Critical
                                             the CSA must consider all information                   lead time in each phase of the                        Infrastructure Protection Program
                                             relevant to assessing whether the                       acquisition or agreement cycle to                     (CCIPP). DHS shares classified
                                             entity’s access poses an unacceptable                   accomplish all required security actions.             cybersecurity information with certain
                                             risk to national security interests.                    Required security actions include any                 employees of entities under the
                                                (2) A favorable access eligibility                   eligibility determination necessary for               Classified Critical Infrastructure
                                             determination is not the same as a                      an entity to participate in that phase of             Protection Program (CCIPP). The CCIPP
                                             safeguarding capability determination.                  the cycle. The GCA may award a                        applies only to entities that do not need
                                             Entities may access classified                          contract or agreement before the CSA                  to store classified information, have no
                                             information with a favorable eligibility                completes the entity eligibility                      other contracts or agreements already
                                             determination, but may possess                          determination. However, in such cases,                requiring access to classified
                                             classified information only if the CSA                  the entity may not begin performance on               information, and are not already
                                             determines both access eligibility and                  portions of the contract or agreement                 determined eligible for access to
                                             safeguarding capability, based on the                   that require access to classified                     classified information. DHS establishes
                                             GCA’s requirement in the contract                       information until the CSA makes a                     and implements procedures consistent
                                             security classification specification (or               favorable entity eligibility                          with the NISP to determine CCIPP entity
                                             equivalent).                                            determination.                                        eligibility for access to classified
                                                (3) If an entity has an existing                        (5) When a CSA is unable to make an
                                                                                                                                                           information.
                                             eligibility determination, a CSA will not               eligibility determination in sufficient
                                                                                                     time to qualify an entity to participate                 (e) Eligibility criteria. An entity must
                                             duplicate eligibility determination
                                                                                                     in the particular procurement action or               meet the following requirements to be
                                             processes performed by another CSA. If
                                                                                                     phase that gave rise to the GCA request               eligible to access classified information:
                                             a CSA cannot acknowledge an entity
                                             eligibility determination to another                    (this includes both solicitation and                     (1) It must need to access classified
                                             CSA, that entity may be subject to                      performance phases), the GCA may                      information as part of a legitimate U.S.
                                             duplicate processing.                                   request that the CSA continue the                     Government or foreign government
                                                (4) Each CSA maintains a record of its               determination process to qualify the                  requirement, and access must be
                                             entities’ eligibility determinations (or                entity for future classified work for any             consistent with U.S. national security
                                             critical infrastructure entity eligibility              GCA, provided that the processing delay               interests as determined by the CSA;
                                             status under the CCIPP, for DHS) and                    was not due to the entity’s lack of                      (2) It must be organized and existing
                                             responds to inquiries from GCAs or                      cooperation. Once the CSA determines                  under the laws of any of the 50 States,
                                             entities, as appropriate and to the extent              that an entity is eligible for access to              the District of Columbia, or an organized
                                             authorized by law, regarding the                        classified information, but a GCA does                U.S. territory (Guam, Commonwealth of
                                             eligibility status of entities under their              not award a contract or agreement                     the Northern Marianas Islands,
                                             cognizance.                                             requiring access to classified                        Commonwealth of Puerto Rico, and the
                                                (b) Process. (1) The responsible CSA                 information to the entity, or the entity’s            U.S. Virgin Islands); or an American
                                             provides guidance to entities on the                    eligibility status changes, the CSA                   Indian or Alaska native tribe formally
                                             eligibility determination process and on                terminates the entity eligibility                     acknowledged by the Assistant
                                             how to maintain eligibility throughout                  determination in accordance with                      Secretary—Indian Affairs, of the U.S.
                                             the period of the agreement or as long                  paragraph (g) of this section.                        Department of the Interior;
                                             as an entity continues to need access to                   (c) Coverage. (1) A favorable eligibility             (3) It must be located in the United
                                             classified information in connection                    determination allows an entity to access              States or its territorial areas;
                                             with a legitimate U.S. or foreign                       classified information at the determined                 (4) It must have a record of
                                             government requirement.                                 eligibility level, or lower.                          compliance with pertinent laws,
                                                (2) The CSA coordinates with                            (2) The CSA must ensure that all                   regulations, and contracts (or other
                                             appropriate authorities to determine                    entities needing access to classified                 relevant agreements);
                                             whether an entity meets the eligibility                 information as part of a legitimate U.S.                 (5) Its KMOs must each have and
                                             criteria in paragraph (e) of this section.              or foreign government requirement have                maintain eligibility for access to
                                                                                                     or receive a favorable eligibility                    classified information that is at least the
daltland on DSKBBV9HB2PROD with RULES




                                             This includes coordinating with
                                             appropriate U.S. Government regulatory                  determination before accessing                        same level as the entity eligibility level;
                                             authorities to determine entity                         classified information. This includes                    (6) It and all of its KMOs must not be
                                             compliance with laws and regulations.                   both prime or parent entities and sub-                excluded by a Federal agency, contract
                                                (3) An entity cannot apply for its own               entities, even in cases in which an                   review board, or other authorized
                                             eligibility determination. A GCA or an                  entity intends to have the classified                 official from participating in Federal
                                             eligible entity must sponsor the entity to              work performed only by sub-entities. A                contracts or agreements;


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00053   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19958                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                                (7) It must meet all requirements the                multiple limited entity eligibility                      (1) Considers information the entity or
                                             CSA or the authorizing law, regulation,                 determinations for a single entity, the               its parent provides on the SF 328/CF
                                             or Government-wide policy establishes                   CSA verifies each one separately only to              328 (OMB Control No. 0704–0194), and
                                             for access to the type of classified                    its requestor; and                                    any other relevant information; and
                                             information or program involved; and                       (6) CSAs administratively terminate                   (2) Considers in the aggregate the
                                                (8) If the CSA determines the entity is              the limited entity eligibility when there             following factors about the entity:
                                             under foreign ownership, control, or                    is no longer a need for access to the                    (i) Record of espionage against U.S.
                                             influence (FOCI), the responsible CSA                   classified information for which the                  targets, either economic or Government;
                                             must:                                                   CSA approved the limited entity                          (ii) Record of enforcement actions
                                                (i) Agree that sufficient security                   eligibility.                                          against the entity for transferring
                                             measures are in place to mitigate or                       (g) Terminating or revoking eligibility.           technology without authorization;
                                             negate risk to national security interests              (1) The responsible CSA terminates the                   (iii) Record of compliance with
                                             due to the FOCI (see § 2004.34);                        entity’s eligible status when the entity              pertinent U.S. laws, regulations, and
                                                (ii) Determine that it is appropriate to             no longer has a need for access to                    contracts or agreements;
                                             grant eligibility for a single, narrowly                classified information.                                  (iv) Type and sensitivity of the
                                             defined purpose (see § 2004.34(i)); or                     (2) The responsible CSA revokes the                information the entity would access;
                                                (iii) Determine that the entity is not               entity’s eligible status if the entity is                (v) Source, nature, and extent of FOCI,
                                             eligible to access classified information.              unable or unwilling to protect classified             including whether foreign interests hold
                                                (9) DoD and DOE cannot award a                       information.                                          a majority or minority position in the
                                             contract involving access to proscribed                    (3) The CSA coordinates with the                   entity, taking into consideration the
                                             information to an entity effectively                    GCA(s) to take interim measures, as                   immediate, intermediate, and ultimate
                                             owned or controlled by a foreign                        necessary, toward either termination or               parent entities;
                                             government unless the Secretary of the                  revocation.                                              (vi) Nature of any relevant bilateral
                                             agency first issues a waiver (see 10                                                                          and multilateral security and
                                             U.S.C. 2536). A waiver is not required                  § 2004.34 Foreign ownership, control, or              information exchange agreements;
                                             if the CSA determines the entity is                     influence (FOCI).                                        (vii) Ownership or control, in whole
                                             eligible and it agrees to establish a                      (a) FOCI determination. A U.S. entity              or in part, by a foreign government; and
                                             voting trust agreement (VTA) or proxy                   is under foreign ownership, control, or                  (viii) Any other factor that indicates
                                             agreement (PA) (see § 2004.34(f))                       influence (FOCI) when:                                or demonstrates foreign interest
                                             because both VTAs and PAs effectively                      (1) A foreign interest has the power to            capability to control or influence the
                                             negate foreign government control.                      direct or decide matters affecting the                entity’s operations or management.
                                                (f) Limited entity eligibility                       entity’s management or operations in a                   (d) Entity access while under FOCI. (1)
                                             determination. CSAs may choose to                       manner that could:                                    If the CSA is determining whether an
                                             allow GCAs to request limited entity                       (i) Result in unauthorized access to               entity is eligible to access classified
                                             eligibility determinations (this is not the             classified information; or                            information and finds that the entity is
                                             same as limited entity eligibility in                      (ii) Adversely affect performance of a             under FOCI, the CSA must consider the
                                             situations involving FOCI when the                      contract or agreement requiring access                entity ineligible for access to classified
                                             FOCI is not mitigated or negated; for                   to classified information; and                        information. The CSA and the entity
                                             more information on limited entity                         (2) The foreign interest exercises that            may then attempt to negotiate FOCI
                                             eligibility in such FOCI cases, see                     power:                                                mitigation or negation measures
                                             § 2004.34(i)). If a CSA permits GCAs to                    (i) Directly or indirectly;                        sufficient to permit a favorable
                                             request a limited entity eligibility                       (ii) Through ownership of the U.S.                 eligibility determination.
                                             determination, it must set out                          entity’s securities, by contractual                      (2) The CSA may not determine that
                                             parameters within its implementing                      arrangements, or other similar means;                 the entity is eligible to access classified
                                             policies that are consistent with the                      (iii) By the ability to control or                 information until the entity has put into
                                             following requirements:                                 influence the election or appointment of              place appropriate security measures to
                                                (1) The GCA, or an entity with limited               one or more members to the entity’s                   negate or mitigate FOCI or is otherwise
                                             eligibility, must first request a limited               governing board (e.g., board of directors,            no longer under FOCI. If the degree of
                                             entity eligibility determination from the               board of managers, board of trustees) or              FOCI is such that no mitigation or
                                             CSA for the relevant entity and provide                 its equivalent; or                                    negation efforts will be sufficient, or
                                             justification for limiting eligibility in                  (iv) Prospectively (i.e., is not currently         access to classified information would
                                             that case;                                              exercising the power, but could).                     be inconsistent with national security
                                                (2) Limited entity eligibility is specific              (b) CSA guidance. The CSA                          interests, then the CSA will determine
                                             to the requesting GCA’s classified                      establishes guidance for entities on                  the entity ineligible for access to
                                             information, and to a single, narrowly                  filling out and submitting a Standard                 classified information.
                                             defined contract, agreement, or                         Form (SF) 328, Certificate Pertaining to                 (3) If an entity comes under FOCI, the
                                             circumstance;                                           Foreign Interests (OMB Control No.                    CSA may allow the existing eligibility
                                                (3) The entity must otherwise meet                   0704–0194), and on reporting changes                  status to continue while the CSA and
                                             the requirements for entity eligibility set             in circumstances that might result in a               the entity negotiate acceptable FOCI
                                             out in this part;                                       determination that the entity is under                mitigation or negation measures, as long
                                                (4) The CSA documents the                            FOCI or is no longer under FOCI. The                  as there is no indication that classified
                                             requirements of each limited entity                     CSA also advises entities on the                      information is at risk. If the entity does
                                                                                                                                                           not actively negotiate mitigation or
daltland on DSKBBV9HB2PROD with RULES




                                             eligibility determination it makes,                     Government appeal channels for
                                             including the scope of, and any                         disputing CSA FOCI determinations.                    negation measures in good faith, or
                                             limitations on, access to classified                       (c) FOCI factors. To determine                     there are no appropriate measures that
                                             information;                                            whether an entity is under FOCI, the                  will remove the possibility of
                                                (5) The CSA verifies limited entity                  CSA analyzes available information to                 unauthorized access to classified
                                             eligibility determinations only to the                  determine the existence, nature, and                  information or adverse effect on the
                                             requesting GCA or entity. In the case of                source of FOCI. The CSA:                              entity’s performance of contracts or


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00054   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19959

                                             agreements involving classified                           (ii) Formulating special executive-                 direct voice in the entity’s business
                                             information, the CSA will take steps, in                level security committees to consider                 management, while denying the foreign
                                             coordination with the GCA, to terminate                 and oversee matters that affect entity                owner majority representation and
                                             eligibility.                                            performance on contracts or agreements                unauthorized access to classified
                                                (e) FOCI and entities under the CCIPP.               requiring access to classified                        information. When a GCA requires an
                                             DHS may sponsor, as part of the CCIPP,                  information;                                          entity to have access to proscribed
                                             a U.S. entity that is under FOCI, under                   (iii) Modifying or terminating loan                 information, and the CSA proposes an
                                             the following circumstances:                            agreements, contracts, agreements, and                SSA as the mitigation measure, the CSA
                                                (1) The Secretary of DHS proposes                    other understandings with foreign                     makes a national interest determination
                                             appropriate FOCI risk mitigation or                     interests;                                            (NID) as part of determining an entity’s
                                             negation measures (see paragraph (f) of                   (iv) Diversifying or reducing foreign-              eligibility for access. See paragraph (h)
                                             this section) to the other CSAs and                     source income;                                        of this section for more information on
                                             ensures the anticipated release of                        (v) Demonstrating financial viability               NIDs.
                                             classified information:                                 independent of foreign interests;                        (iv) Voting trust agreements (VTAs) or
                                                (i) Is authorized for release to the                   (vi) Eliminating or resolving problem               proxy agreements (PAs). The CSA and
                                             country involved;                                       debt;                                                 the entity may agree to use one of these
                                                (ii) Does not include information                      (vii) Separating, physically or                     measures when a foreign interest
                                             classified under the Atomic Energy Act;                 organizationally, the entity component                effectively owns or controls an entity.
                                             and                                                     performing on contracts or agreements                 The VTA and PA are arrangements that
                                                (iii) Does not impede or interfere with              requiring access to classified                        vest the voting rights of the foreign-
                                             the entity’s ability to manage and                      information;                                          owned stock in cleared U.S. citizens
                                             comply with regulatory requirements                       (viii) Adopting special board                       approved by the CSA. Under the VTA,
                                             imposed by other Federal agencies, such                 resolutions;                                          the foreign owner transfers legal title in
                                             as the State Department’s International                   (ix) A combination of these methods,                the entity to the trustees approved by
                                             Traffic in Arms Regulation.                             as determined by the CSA; or                          the CSA. Under the PA, the foreign
                                                (2) If the CSAs agree the mitigation or                (x) Other actions that effectively                  owner conveys their voting rights to
                                             negation measures are sufficient, DHS                   negate or mitigate foreign control or                 proxy holders approved by the CSA.
                                             may proceed to enter a CCIPP                            influence.                                            The entity must be organized,
                                             information sharing agreement with the                    (6) Methods to mitigate or negate                   structured, and financed to be capable
                                             entity. If one or more CSAs disagree, the               foreign ownership include:                            of operating as a viable business entity
                                             Secretary of DHS may seek a decision                      (i) Board resolutions. The CSA and                  independently from the foreign owner.
                                             from the Assistant to the President for                 the entity may agree to a board                       Both VTAs and PAs can effectively
                                             National Security Affairs before entering               resolution when a foreign interest does               negate foreign ownership and control;
                                             a CCIPP information sharing agreement                   not own voting interests sufficient to                therefore, neither imposes any
                                             with the entity.                                        elect, or is otherwise not entitled to                restrictions on the entity’s eligibility to
                                                (f) Mitigation or negation measures to               representation on, the entity’s governing             have access to classified information or
                                             address FOCI. (1) The CSA-approved                      board. The resolution must identify the               to compete for contracts or agreements
                                             mitigation or negation measures must                    foreign shareholders and their                        requiring access to classified
                                             assure that the entity can offset FOCI by               representatives (if any), note the extent             information, including those involving
                                             effectively denying unauthorized people                 of foreign ownership, certify that the                proscribed information. Both VTAs and
                                             or entities access to classified                        foreign shareholders and their                        PAs can also effectively negate foreign
                                             information and preventing the foreign                  representatives will not require, will not            government control.
                                             interest from adversely impacting the                   have, and can be effectively excluded                    (v) Combinations of the measures in
                                             entity’s performance on contracts or                    from, access to all classified                        paragraphs (f)(6)(i) through (iv) of this
                                             agreements requiring access to classified               information, and certify that the entity              section or other similar measures that
                                             information.                                            will not permit the foreign shareholders              effectively mitigate or negate the risks
                                                (2) Any mitigation or negation                       and their representatives to occupy                   involved with foreign ownership. CSAs
                                             measures the CSA approves for an entity                 positions that might enable them to                   must identify combination agreements
                                             must not impede or interfere with the                   influence the entity’s policies and                   in a way that distinguishes them from
                                             entity’s ability to manage and comply                   practices, affecting its performance on               other agreements (e.g., a combination
                                             with regulatory requirements imposed                    contracts or agreements requiring access              SSA-proxy agreement cannot be
                                             by other Federal agencies (such as                      to classified information.                            identified as either an SSA or a proxy
                                             Department of State’s International                       (ii) Security control agreements                    agreement beause those names would
                                             Traffic in Arms Regulation).                            (SCAs). The CSA and the entity may                    not distinguish the combination
                                                (3) If the CSA approves a FOCI                       agree to use an SCA when a foreign                    agreement from either of the other
                                             mitigation or negation measure for an                   interest does not effectively own or                  types). CSAs must also coordinate terms
                                             entity, it may agree that the measure, or               control an entity (i.e., the entity is under          in combination agreements with the
                                             particular portions of it, may apply to                 U.S. control), but the foreign interest is            controlling agency prior to releasing
                                             all of the present and future sub-entities              entitled to representation on the entity’s            proscribed information.
                                             within the entity’s organization.                       governing board. At least one cleared                    (g) Standards for FOCI mitigation or
                                                (4) Mitigation or negation measures                  U.S. citizen must serve as an outside                 negation measures. The CSA must
                                             are different for ownership versus                      director on the entity’s governing board.             include the following requirements as
                                                                                                       (iii) Special security agreements
daltland on DSKBBV9HB2PROD with RULES




                                             control or influence.                                                                                         part of any FOCI mitigation or negation
                                                (5) Methods to mitigate foreign                      (SSAs). The CSA and the entity may                    measures, to ensure that entities
                                             control or influence (unrelated to                      agree to use an SSA when a foreign                    implement necessary security and
                                             ownership) may include:                                 interest effectively owns or controls an              governing controls:
                                                (i) Assigning specific oversight duties              entity. The SSA preserves the foreign                    (1) Annual certification and annual
                                             and responsibilities to independent                     owner’s right to be represented on the                compliance reports by the entity’s
                                             board members;                                          entity’s board or governing body with a               governing board and the KMOs;


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00055   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19960                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                                (2) The U.S. Government remedies in                  it is affiliated, or the foreign owner and            by another agency (ODNI for SCI, DOE
                                             case the entity is not adequately                       its affiliates. Individuals who are                   for RD, NSA for COMSEC), the CSA asks
                                             protecting classified information or not                serving as trustees, proxy holders, or                that controlling agency to concur on the
                                             adhering to the provisions of the                       outside directors as part of a mitigation             NID for that category of information.
                                             mitigation or negation measure;                         measure for the entity are not                           (iii) The CSA informs the GCA and
                                                (3) Supplements to FOCI mitigation or                considered to have prior involvement                  the entity when the NID is complete. In
                                             negation measures as the CSA deems                      solely by performing that role; and                   cases involving SCI, RD, or COMSEC,
                                             necessary. In addition to the standard                     (C) Be involved in no other                        the CSA also informs the GCA and the
                                             FOCI mitigation or negation measure’s                   circumstances that may affect an                      entity when a controlling agency
                                             requirements, the CSA may require                       individual’s ability to serve effectively,            concurs or non-concurs on that agency’s
                                             more procedures via a supplement,                       such as the number of boards on which                 category of proscribed information. The
                                             based upon the circumstances of an                      the individual serves or the length of                entity may begin accessing a category of
                                             entity’s operations. The CSA may place                  time serving on any other boards;                     proscribed information once the CSA
                                             these requirements in supplements to                       (iii) Annual meeting. The CSA meets                informs the GCA and the entity that the
                                             the FOCI mitigation or negation measure                 at least annually with the oversight                  controlling agency concurs, even if
                                             to allow flexibility as circumstances                   body to review the purpose and                        other categories of proscribed
                                             change without having to renegotiate                    effectiveness of the FOCI mitigation or               information are pending concurrence.
                                             the entire measure. When making use of                  negation agreement; establish a common                   (iv) An entity’s access to SCI, RD, or
                                             supplements, the CSA does not consider                  understanding of the operating                        COMSEC remains in effect so long as
                                             the FOCI mitigation measure final until                 requirements and their implementation;                the entity remains eligible for access to
                                             it approves the required supplements                    and provide guidance on matters related               classified information and the contract
                                             (e.g., technology control plan, electronic              to FOCI mitigation and industrial                     or agreement (or program or project)
                                             communication plan); and                                security. These meetings include a CSA                which imposes the requirement for
                                                (4) For agreements to mitigate or                    review of:                                            access to those categories of proscribed
                                             negate ownership (PAs, VTAs, SSAs,                         (A) Compliance with the approved                   information remains in effect, except
                                             and SCAs), the following additional                     FOCI mitigation or negation measure;                  under the following circumstances:
                                             requirements apply:                                        (B) Problems regarding practical                      (A) The CSA, GCA, or controlling
                                                (i) FOCI oversight. The CSA verifies                 implementation of the mitigation or                   agency becomes aware of adverse
                                             that the entity establishes an oversight                negation measure; and                                 information that impacts the entity
                                             body consisting of trustees, proxy                         (C) Security controls, practices, or               eligibility determination;
                                             holders or outside directors, as                        procedures and whether they warrant                      (B) The CSA’s threat assessment
                                             applicable, and those officers or                       adjustment; and                                       pertaining to the entity indicates a risk
                                             directors whom the CSA determines are                      (iv) Annual certification. The CSA                 to one of the categories of proscribed
                                             eligible for access to classified                       reviews the entity’s annual report;                   information;
                                             information (see § 2004.36). The entity’s               addresses, and resolves issues identified                (C) The CSA becomes aware of any
                                             security officer is the principal advisor               in the report; and documents the results              material change regarding the source,
                                             to the oversight body and attends their                 of this review and any follow-up                      nature, and extent of FOCI; or
                                             meetings. The oversight body:                           actions.                                                 (D) The entity’s record of NISP
                                                (A) Maintains policies and procedures                   (h) National interest determination                compliance, based on CSA reviews in
                                             to safeguard classified information in                  (NID)—(1) Requirement for a NID. (i)                  accordance with § 2004.26, becomes less
                                             the entity’s possession with no adverse                 The CSA must determine whether                        than satisfactory.
                                             impact on performance of contracts or                   allowing an entity access to proscribed                  (v) Under any of these circumstances,
                                             agreements requiring access to classified               information under an SSA is consistent                the CSA determines whether an entity
                                             information; and                                        with national security interests of the               may continue being eligible for access to
                                                (B) Verifies the entity is complying                 United States as part of making an entity             classified information, it must change
                                             with the FOCI mitigation or negation                    eligibility determination in cases in                 the FOCI mitigation measure in order to
                                             measure and related documents,                          which:                                                remain eligible, or the CSA must
                                             contract security requirements or                          (A) The GCA requires an entity to                  terminate or revoke access.
                                             equivalent, and the NISP;                               have access to proscribed information;                   (3) Process for concurring or non-
                                                (ii) Qualifications of trustees, proxy                  (B) The entity is under FOCI; and                  concurring on a NID. (i) Each
                                             holders, and outside directors. The CSA                    (C) The CSA proposes an SSA to                     controlling agency tells the CSAs what
                                             determines eligibility for access to                    mitigate the FOCI.                                    information the controlling agency
                                             classified information for trustees, proxy                 (ii) This determination is called a                requires to consider a NID. ODNI
                                             holders, and outside directors at the                   national interest determination (NID). A              identifies the information it requires to
                                             classification level of the entity’s                    favorable NID confirms that an entity’s               assess a NID for access to SCI, DOE
                                             eligibility determination. Trustees,                    access to the proscribed information                  identifies the information it requires to
                                             proxy holders, and outside directors                    under an SSA is consistent with                       assess a NID for access to RD, and NSA
                                             must meet the following criteria:                       national security interests. If the CSA is            identifies the information it requires to
                                                (A) Be a U.S. citizen residing in the                unable to render a favorable NID, it                  assess a NID for access to COMSEC.
                                             United States who can exercise                          must consider other FOCI mitigation                      (ii) The CSA requests from the GCA
                                             management prerogatives relating to                     measures instead of an SSA or reassess                justification for access, a description of
                                             their position in a way that ensures that               the entity’s eligibility for access to                the proscribed information involved,
daltland on DSKBBV9HB2PROD with RULES




                                             the foreign owner can be effectively                    classified information.                               and other information the controlling
                                             insulated from the entity or effectively                   (2) NID process. (i) The CSA makes                 agency requires to concur or non-concur
                                             separated from the entity’s classified                  the NID for any categories of proscribed              on the NID.
                                             work;                                                   information for which the entity                         (iii) The CSA requests concurrence on
                                                (B) Be completely disinterested                      requires access.                                      the NID from the controlling agency for
                                             individuals with no prior involvement                      (ii) In cases in which any category of             the relevant category of proscribed
                                             with the entity, the entities with which                the proscribed information is controlled              information (ODNI for SCI, DOE for RD,


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00056   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                            19961

                                             NSA for COMSEC), and provides the                       CSA has made a NID, if the entity needs               or circumstance of that GCA or foreign
                                             information that controlling agency                     access to SCI, RD, or COMSEC.                         government.
                                             identified.                                                (ii) The controlling agency provides a                (6) The access limitations of a
                                                (iv) The relevant controlling agency                 final, written concurrence or non-                    favorable limited eligibility
                                             (ODNI for SCI, DOE for RD, NSA for                      concurrence to the CSA within 30 days                 determination apply to all of the entity’s
                                             COMSEC) responds in writing to the                      after receiving the request for                       employees, regardless of citizenship.
                                             CSA’s request for concurrence.                          concurrence from the CSA.                                (7) A limited eligibility determination
                                                (A) The controlling agency may                          (iii) In cases when a controlling                  is not an option for entities that require
                                             concur with the NID for access under a                  agency requires clarification or                      access to proscribed information when a
                                             particular contract or agreement, access                additional information from the CSA,                  foreign government has ownership or
                                             under a program or project, or for all                  the controlling agency responds to the                control over the entity. See
                                             future access to the same category of                   CSA within 30 days to request                         § 2004.32(e)(9).
                                             proscribed information.                                 clarification or additional information                  (8) The CSA administratively
                                                (B) If the relevant controlling agency               as needed, and to coordinate a plan and               terminates the entity’s limited eligibility
                                             does not concur with the NID, the                       timeline for concurring or non-                       when there is no longer a need for
                                             controlling agency informs the CSA in                   concurring. The controlling agency must               access to the classified information for
                                             writing, citing the reasons why it does                 provide written updates to the CSA                    which the CSA made the favorable
                                                                                                     every 30 days until it concurs or non-                limited eligibility determination.
                                             not concur. The CSA notifies the
                                                                                                                                                           Terminating one limited eligibility
                                             applicable GCA and, in coordination                     concurs. In turn, the CSA provides the
                                                                                                                                                           status does not impact other ones the
                                             with the GCA, then notifies the entity.                 GCA and the entity with updates every
                                                                                                                                                           entity may have.
                                             The entity cannot have access to the                    30 days.
                                             category of proscribed information                         (i) Limited eligibility determinations             § 2004.36 Determining entity employee
                                             under the control of that agency (i.e., if              (for entities under FOCI without                      eligibility for access to classified
                                             ODNI does not concur, the entity may                    mitigation or negation). (1) In                       information.
                                             not have access to SCI; if DOE does not                 exceptional circumstances when an                        (a) Making employee eligibility
                                             concur, the entity may not have access                  entity is under FOCI, the CSA may                     determinations. (1) The responsible
                                             to RD; and if NSA does not concur, the                  decide that limited eligibility for access            CSA:
                                             entity may not have access to COMSEC).                  to classified information is appropriate                 (i) Determines whether entity
                                             The CSA, in consultation with the                       when the entity is unable or unwilling                employees meet the criteria established
                                             applicable GCA, must decide whether                     to implement FOCI mitigation or                       in the Security Executive Agent
                                             the reason the controlling agency did                   negation measures (this is not the same               Directive (SEAD) 4, National Security
                                             not concur otherwise affects the entity’s               as limited eligibility in other                       Adjudicative Guidelines (December 10,
                                             eligibility for access to classified                    circumstances; for more information on                2016). Entity employees must have a
                                             information (see § 2004.32(g)), or                      limited eligibility in other cases, see               legitimate requirement (i.e., need to
                                             requires changing the FOCI mitigation                   § 2004.32(f)).                                        know) for access to classified
                                             measure (see paragraph (f) of this                         (2) The GCA first decides whether to               information in the performance of
                                             section).                                               request a limited eligibility                         assigned duties and eligibility must be
                                                (v) When an entity is eligible for                   determination for the entity and must                 clearly consistent with the interest of
                                             access to classified information that                   articulate a compelling need for it to the            the national security.
                                             includes a favorable NID for SCI, RD, or                CSA that is in accordance with U.S.                      (ii) Notifies entities of its
                                             COMSEC, the CSA does not have to                        national security interests. The GCA                  determinations of employee eligibility
                                             request a new NID concurrence for the                   must verify to the CSA that access to                 for access to classified information.
                                             same entity if the access requirements                  classified information is essential to                   (iii) Terminates eligibility status when
                                             for the relevant category of proscribed                 contract or agreement performance, and                there is no longer a need for access to
                                             information and terms remain                            accept the risk inherent in not                       classified information by entity
                                             unchanged for:                                          mitigating or negating the FOCI. See                  employees.
                                                                                                                                                              (2) The responsible CSA maintains:
                                                (A) Renewing the contract or                         § 2004.32(b)(3).                                         (i) SF 312s, Classified Information
                                             agreement;                                                 (3) The CSA may grant a limited                    Nondisclosure Agreements, or other
                                                (B) New task orders issued under the                 eligibility determination if the GCA                  approved nondisclosure agreements,
                                             contract or agreement;                                  requests and the entity meets all other               executed by entity employees, as
                                                (C) A new contract or agreement that                 eligibility criteria in § 2004.32(e).                 prescribed by ODNI in accordance with
                                             contains the same provisions as the                        (4) A foreign government may sponsor               32 CFR 2001.80 and E.O. 13526; and
                                             previous one (this usually applies when                 a U.S. sub-entity of a foreign entity for                (ii) Records of its entity employee
                                             the contract or agreement is for a                      limited eligibility when the foreign                  eligibility determinations, suspensions,
                                             program or project); or                                 government desires to award a contract                and revocations.
                                                (D) Renewing the SSA.                                or agreement to the U.S. sub-entity that                 (3) CSAs ensure that entities limit the
                                                (vi) When making the decision                        involves access to classified information             number of employees with access to
                                             whether or not to concur with a NID for                 for which the foreign government is the               classified information to the minimum
                                             proscribed information under its                        original classification authority (i.e.,              number necessary to work on contracts
                                             control, the controlling agency will not                foreign government information), and                  or agreements requiring access to
                                             duplicate work already performed by                     there is no other need for the U.S. sub-              classified information.
                                             the GCA during the contract award                       entity to have access to classified
daltland on DSKBBV9HB2PROD with RULES




                                                                                                                                                              (4) The CSA determines the need for
                                             process or by the CSA when                              information.                                          event-driven reinvestigations for entity
                                             determining entity eligibility for access                  (5) Limited eligibility determinations             employees.
                                             to classified information.                              are specific to the classified information               (5) CSAs use the Federal Investigative
                                                (4) Timing for concurrence process. (i)              of the requesting GCA or foreign                      Standards (FIS) issued jointly by the
                                             The CSA requests NID concurrence from                   government, and specific to a single,                 Suitability and Security Executive
                                             the controlling agency as soon as the                   narrowly defined contract, agreement,                 Agents.


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00057   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                             19962                Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations

                                                (6) The CSA provides guidance to                        (v) Intelligence information, to                   trustworthy information to make a
                                             entities on:                                            include SCI;                                          timely, credible, and risk-based decision
                                                (i) Requesting employee eligibility                     (vi) NATO information, except as                   whether to authorize an entity’s system.
                                             determinations, to include guidance for                 follows: Foreign nationals of a NATO                    (b) The responsible CSA issues to
                                             submitting fingerprints; and                            member nation may be authorized                       entities guidance that establishes
                                                (ii) Granting employee access to                     access to NATO information subject to                 protection measures for entity
                                             classified information when the                         the terms of the contract, if the                     information systems that process
                                             employee has had a break in access or                   responsible CSA obtains a NATO                        classified information. The responsible
                                             a break in employment.                                  security clearance certificate from the               CSA must base the guidance on
                                                (7) If the CSA receives adverse                      individual’s country of citizenship.                  standards applicable to Federal systems,
                                             information about an eligible entity                    NATO access is limited to performance                 which must include the Federal
                                             employee, the CSA should consider and                   on a specific NATO contract;                          Information Security Modernization Act
                                             possibly investigate, as authorized, to                    (vii) Information for which the U.S.               of 2014 (FISMA), Public Law 113–283,
                                             determine whether the employee’s                        Government has prohibited foreign                     and may include National Institute of
                                             eligibility to access classified                        disclosure in whole or in part; or                    Standards and Technology (NIST)
                                             information remains clearly consistent                     (viii) Information provided to the U.S.
                                                                                                                                                           publications, Committee on National
                                             with the interests of national security. If             Government by another government that
                                                                                                                                                           Security Systems (CNSS) publications,
                                             the CSA determines that an entity                       is classified or provided in confidence.
                                                                                                                                                           and Federal information processing
                                             employee’s continued eligibility is not                    (4) The responsible CSA provides
                                                                                                                                                           standards (FIPS).
                                             in the interest of national security, the               specific procedures to entities for
                                             CSA implements procedures leading to                    requesting LAAs. The GCA must concur                  § 2004.42   [Reserved]
                                             suspension and ultimate revocation of                   on an entity’s LAA request before the
                                             the employee’s eligible status, and                     CSA may grant it.                                     Appendix A to Part 2004—Acronym
                                             notifies the entity.                                                                                          Table
                                                (b) Consultants. A consultant is an                  § 2004.38    Safeguarding and marking.
                                                                                                                                                             For details on many of these terms, see the
                                             individual under contract or agreement                     (a) Safeguarding approval. (1) The                 definitions at § 2004.4.
                                             to provide professional or technical                    CSA determines whether an entity’s
                                                                                                                                                           CCIPP—Classified Critical Infrastructure
                                             assistance to an entity in a capacity                   safeguarding capability meets                           Protection Program
                                             requiring access to classified                          requirements established in 32 CFR part               CCIPP POC—Entity point of contact under
                                             information. A consultant is considered                 2001, and other applicable national                     the CCIPP program
                                             an entity employee for security                         level policy (e.g., Atomic Energy Act for             CIA—Central Intelligence Agency
                                             purposes. The CSA makes eligibility                     RD). If the CSA makes a favorable                     CSA—Cognizant security agency
                                             determinations for entity consultants in                determination, the entity may store                   CNSS—Committee on National Security
                                             the same way it does for entity                         classified information at that level or                 Systems
                                             employees.                                              below. If the determination is not                    COMSEC—Communications security
                                                (c) Reciprocity. The responsible CSA                 favorable, the CSA must ensure that the               CSO—Cognizant security office
                                             determines if an entity employee was                    entity does not possess classified                    DHS—Department of Homeland Security
                                             previously investigated or determined                   information or does not possess                       DoD—Department of Defense
                                             eligible by another CSA. CSAs                           information at the classification level               DOE—Department of Energy
                                                                                                     denied or a higher level.                             EA—Executive agent (the NISP executive
                                             reciprocally accept existing employee
                                                                                                        (2) The CSA maintains records of its                 agent is DoD)
                                             eligibility determinations in accordance                                                                      E.O.—Executive Order
                                             with applicable and current national                    safeguarding capability determinations
                                                                                                                                                           FAR—Federal Aquisition Regulation
                                             level personnel security policy, and                    and, upon request from GCAs or
                                                                                                                                                           FOCI—Foreign ownership, control, or
                                             must not duplicate employee eligibility                 entities, and as appropriate and to the                 influence
                                             investigations conducted by another                     extent authorized by law, verifies that it            GCA—Government contracting activity
                                             CSA.                                                    has made a favorable safeguarding                     Insider threat program SO—insider threat
                                                (d) Limited access authorization                     determination for a given entity and at                 senior official (for an agency or for an
                                             (LAA). (1) CSAs may make LAA                            what level.                                             entity)
                                             determinations for non-U.S. citizen                        (b) Marking. The GCA provides                      ISOO—Information Security Oversight Office
                                             entity employees in rare circumstances,                 guidance to entities that meets                         of the National Archives and Records
                                             when:                                                   requirements in 32 CFR 2001.22,                         Administration (NARA)
                                                (i) A non-U.S. citizen employee                      2001.23, 2001.24, and 2001.25,                        KMO—Key managers and officials (of an
                                             possesses unique or unusual skill or                    Derivative classification, Classification               entity)
                                             expertise that the agency urgently needs                marking in the electronic environment,                LAA—Limited access authorization
                                             to support a specific U.S. Government                   Additional requirements, and                          NID—National interest determination
                                             contract or agreement; and                              Declassification markings; ISOO’s                     NISPOM—National Industrial Security
                                                                                                     marking guide, Marking Classified                       Program Operating Manual
                                                (ii) A U.S. citizen with those skills is
                                                                                                                                                           NRC—Nuclear Regulatory Commission
                                             not available.                                          National Security Information; and
                                                                                                                                                           NSA—National Security Agency
                                                (2) A CSA may grant LAAs up to the                   other applicable national level policy
                                                                                                                                                           ODNI—Office of the Director of National
                                             secret classified level.                                (e.g., Atomic Energy Act for RD) for                    Intelligence
                                                (3) CSAs may not use LAAs for access                 marking classified information and                    PA—Proxy agreement
                                             to:                                                     material.                                             RD—Restricted data
daltland on DSKBBV9HB2PROD with RULES




                                                (i) Top secret (TS) information;                                                                           SF—Standard Form
                                                (ii) RD or FRD information;                          § 2004.40    Information system security.
                                                                                                                                                           SAO—Senior agency official for NISP
                                                (iii) Information that a Government-                   (a) The responsible CSA must                        SAP—Special access program
                                             designated disclosure authority has not                 authorize an entity information system                SCA—Security control agreement
                                             determined releasable to the country of                 before the entity can use it to process               SCI—Sensitive compartmented information
                                             which the individual is a citizen;                      classified information. The CSA must                  SSA—Special security agreement
                                                (iv) COMSEC information;                             use the most complete, accurate, and                  TS—Top secret (classification level)



                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00058   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1


                                                                  Federal Register / Vol. 83, No. 88 / Monday, May 7, 2018 / Rules and Regulations                                          19963

                                             VT—Voting trust                                         NPRM Notice of proposed rulemaking                    2018, and continuing 24 hours daily
                                                                                                     § Section                                             through 11:59 p.m. on May 7, 2018. This
                                             David S. Ferriero,                                      U.S.C. United States Code                             rule is needed to protect personnel,
                                             Archivist of the United States.
                                                                                                     II. Background Information and                        vessels, and the marine environment in
                                             [FR Doc. 2018–09465 Filed 5–4–18; 8:45 am]
                                                                                                     Regulatory History                                    the navigable waters within the safety
                                             BILLING CODE 7515–01–P                                                                                        zone while the sunken barges are being
                                                                                                        The Coast Guard is issuing this
                                                                                                                                                           recovered.
                                                                                                     temporary rule without prior notice and
                                             DEPARTMENT OF HOMELAND                                  opportunity to comment pursuant to                    IV. Discussion of the Rule
                                             SECURITY                                                authority under section 4(a) of the
                                                                                                     Administrative Procedure Act (APA)                       The Coast Guard is establishing a
                                                                                                     (5 U.S.C. 553(b)). This provision                     temporary emergency safety zone for all
                                             Coast Guard                                                                                                   navigable waters of the Ohio River from
                                                                                                     authorizes an agency to issue a rule
                                                                                                     without prior notice and opportunity to               MM 939.8 and MM 943.0, extending the
                                             33 CFR Part 165                                                                                               entire width of the river. Entry is
                                                                                                     comment when the agency for good
                                             [Docket Number USCG–2018–0077]
                                                                                                     cause finds that those procedures are                 prohibited for all traffic beginning on
                                             RIN 1625–AA00                                           ‘‘impracticable, unnecessary, or contrary             May 1, 2018 and will continue to be
                                                                                                     to the public interest.’’ Under 5 U.S.C.              prohibited through midnight on May 7,
                                             Safety Zone; Ohio River, Metropolis, IL                 553(b)(3)(B), the Coast Guard finds that              2018 or until the hazard has been
                                                                                                     good cause exists for not publishing a                mitigated. The COTP will terminate the
                                             AGENCY:    Coast Guard, DHS.                                                                                  enforcement of this safety zone before
                                                                                                     notice of proposed rulemaking (NPRM)
                                             ACTION:   Temporary final rule.                         with respect to this rule because                     May 7, 2018, if the sunken barges have
                                                                                                     publishing an NPRM would be                           been recovered. Entry into this safety
                                             SUMMARY:   The Coast Guard is                                                                                 zone is prohibited unless authorized by
                                             establishing an emergency temporary                     impracticable and contrary to the public
                                                                                                     interest. On May 1, 2018, a towing                    the COTP or his designated
                                             safety zone for all navigable waters of                                                                       representative. A designated
                                             the Ohio River extending from mile                      vessel struck the I–24 Bridge near mile
                                                                                                     marker (MM) 940.8, causing 12 barges to               representative is a commissioned,
                                             marker (MM) 939.8 to MM 943.0 near                                                                            warrant, or petty officer of the U.S.
                                             Metropolis, IL. This emergency safety                   break away. One barge sank near MM
                                                                                                     940.8, and another sank near MM 942.5                 Coast Guard assigned to units under the
                                             zone is needed to protect life, vessels,                                                                      operational control of USCG Sector
                                             and the marine environment due to the                   on the left-descending bank. This safety
                                                                                                     zone must be established immediately                  Ohio Valley.
                                             sinking of one barge in the navigable                                                                            Requests for entry will be considered
                                             channel of the Ohio River near MM                       to protect people and vessels associated
                                                                                                     with and resulting from the hazard to                 and reviewed on a case-by-case basis.
                                             940.8 and one barge near the left                                                                             The COTP may be contacted by
                                             descending bank at MM 942.5. Entry of                   navigation created by the sunken barges
                                                                                                     and we lack sufficient time to provide                telephone at 502–779–5422 or can be
                                             vessels or persons into this zone is                                                                          reached by VHF–FM channel 16.
                                             prohibited unless specifically                          a reasonable comment period and then
                                                                                                     consider those comments before issuing                Persons and vessels permitted to enter
                                             authorized by the Captain of the Port                                                                         this safety zone must transit at their
                                             Sector Ohio Valley (COTP) or a                          this rule. This safety zone includes
                                                                                                     closures and navigation restrictions and              slowest safe speed and comply with all
                                             designated representative.                                                                                    lawful directions issued by the COTP or
                                                                                                     requirements that are vital to
                                             DATES: This rule is effective without                                                                         the designated representative.
                                                                                                     maintaining safe navigation on the Ohio
                                             actual notice from 12:01 a.m. until 11:59
                                                                                                     River during the recovery of the sunken               V. Regulatory Analyses
                                             p.m. on May 7, 2018. For the purposes
                                                                                                     barges. Therefore, delaying the effective
                                             of enforcement, actual notice will be                                                                           We developed this rule after
                                                                                                     date for this emergency safety zone to
                                             used from May 1, 2018 until May 7,                                                                            considering numerous statutes and
                                                                                                     complete the NPRM process would also
                                             2018.                                                                                                         Executive orders related to rulemaking.
                                                                                                     be contrary to the public interest as it
                                             ADDRESSES:   To view documents                          would delay the safety measures vital to              Below we summarize our analyses
                                             mentioned in this preamble as being                     safe navigation.                                      based on a number of these statutes and
                                             available in the docket, go to http://                     Under 5 U.S.C. 553(d)(3), the Coast                Executive orders, and we discuss First
                                             www.regulations.gov, type USCG–2018–                    Guard finds that good cause exists for                Amendment rights of protestors.
                                             0077 in the ‘‘SEARCH’’ box and click                    making this rule effective less than 30               A. Regulatory Planning and Review
                                             ‘‘SEARCH.’’ Click on Open Docket                        days after publication in the Federal
                                             Folder on the line associated with this                 Register. Delaying the effective date of                 Executive Orders 12866 and 13563
                                             rule.                                                   this rule would be contrary to public                 direct agencies to assess the costs and
                                             FOR FURTHER INFORMATION CONTACT: If                     interest because immediate action is                  benefits of available regulatory
                                             you have questions on this rule, call or                needed to protect personnel, vessels,                 alternatives and, if regulation is
                                             email Petty Officer Joshua Herriott,                    and the marine environment from                       necessary, to select regulatory
                                             Sector Ohio Valley, U.S. Coast Guard;                   potential hazards created by the sunken               approaches that maximize net benefits.
                                             telephone 502–779–5343, email                           barges.                                               Executive Order 13771 directs agencies
                                             SECOHV-WWM@uscg.mil.                                                                                          to control regulatory costs through a
                                                                                                     III. Legal Authority and Need for Rule                budgeting process. This rule has not
                                             SUPPLEMENTARY INFORMATION:
                                                                                                        The Coast Guard is issuing this rule               been designated a ‘‘significant
                                                                                                     under authority in 33 U.S.C. 1231. The                regulatory action,’’ under Executive
daltland on DSKBBV9HB2PROD with RULES




                                             I. Table of Abbreviations
                                                                                                     Captain of the Port Sector Ohio Valley                Order 12866. Accordingly, this rule has
                                             CFR Code of Federal Regulations
                                             COTP Captain of the Port Sector Ohio
                                                                                                     (COTP) has determined that potential                  not been reviewed by the Office of
                                               Valley                                                hazards associated with the sunken                    Management and Budget (OMB), and
                                             DHS Department of Homeland Security                     barges will be a safety concern for                   pursuant to OMB guidance it is exempt
                                             FR Federal Register                                     anyone within MM 939.8 to MM 943.0                    from the requirements of Executive
                                             MM Mile marker                                          of the Ohio River, starting on May 1,                 Order 13771.


                                        VerDate Sep<11>2014   16:29 May 04, 2018   Jkt 244001   PO 00000   Frm 00059   Fmt 4700   Sfmt 4700   E:\FR\FM\07MYR1.SGM   07MYR1



Document Created: 2018-05-05 02:47:55
Document Modified: 2018-05-05 02:47:55
CategoryRegulatory Information
CollectionFederal Register
sudoc ClassAE 2.7:
GS 4.107:
AE 2.106:
PublisherOffice of the Federal Register, National Archives and Records Administration
SectionRules and Regulations
ActionFinal rule.
DatesThis rule is effective on May 7, 2018.
ContactFor information about this regulation and the regulatory process, contact Kimberly Keravuori, External Policy Program Manager, by email at [email protected], or by telephone at 301.837.3151. For information about the NISP and the requirements in this regulation, contact Mark A. Bradley, Director, ISOO, by telephone at 202-357-5205.
FR Citation83 FR 19950 
RIN Number3095-AB79
CFR AssociatedClassified Information and National Industrial Security Program

2025 Federal Register | Disclaimer | Privacy Policy
USC | CFR | eCFR