ML20138H198
| ML20138H198 | |
| Person / Time | |
|---|---|
| Issue date: | 02/19/1997 |
| From: | Brady R NRC OFFICE OF ADMINISTRATION (ADM) |
| To: | Gillespie F, Morris B, Ten Eyck E NRC (Affiliation Not Assigned), NRC OFFICE OF NUCLEAR MATERIAL SAFETY & SAFEGUARDS (NMSS), NRC OFFICE OF NUCLEAR REGULATORY RESEARCH (RES) |
| Shared Package | |
| ML20138H014 | List: |
| References | |
| FRN-62FR17683, RULE-PR-25, RULE-PR-50, RULE-PR-54, RULE-PR-95 AF37-2-004, AF37-2-4, NUDOCS 9705070109 | |
| Download: ML20138H198 (86) | |
Text
l february 19, 1997 g
g i
MEMORANDUM TO:
Distribution List i
FROM:
Raymond J.
Brady, Director Division of Security Office of Administration
SUBJECT:
AMENDMENT TO 10 CFR PART 25, " ACCESS AUTHORIZATION FOR LICENSEE PERSONNEL," PART 50,
" DOMESTIC LICENSING OF PRODUCTION AND UTILIZATION FACILITIES," PART 54, " REQUIREMENTS FOR RENEWAL OF OPERATING LICENSES FOR NUCLEAR POWER PLANTS," AND PART 95, " SECURITY FACILITY APPROVAL AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA" Enclosed is a final rule package, " Access To and Protection of Classified Information," amending 10 CFR Parts 25, 50, 54 and 95 to conform NRC regulations to new national security policies (the National Industrial Security Program Operating Manual [NISPOM) and Executive Orders 13958, " Classified National Security Information," and 12968 " Access to Classified Information.").
This final rule is in a redline / strikeout format which reflects changes from the proposed rule which your Office concurred in during the spring of 1996 and which was published in the Federal Register on August 5, 1996. Comments were received from Georgia Power and the Department of Energy.
The Georgia Power comments requested four clarifying amendments, all of which were adopted.
Most of the DOE comments were either adopted or were editorial in nature.
However, DOE's comments concerning the level of background investigation required for access to Secret Restricted Data were significant and posed a dilemma for NRC.
Given DOE's statutory responsibilities for the protection of Restricted Data we did not want to dismiss their recommendations without further evaluation nor could we simply adopt the comments since they would subject licensees and/or certificete holders to additional j
expenses and appear to exceed requirements of the current national policy (the NISPOM) for the protection of such j
information.
It appears necessary to give all affected parties an opportunity to comment on and justify their positions on this issue before a final decision is reached.
Therefore, the attached final rule removes sections 21.15 and 95.35 of the proposed rule, leaving the current requirements in place (which meet DOE's recommendations) but states that we will republish those paragraphs for additional public comment which will permit all affected parties to specifically address the issues of cost and requirements as well as provide supporting rationale for their recommendations.
We do not believe any of the revisions to the rule, other than the removal of the two paragraphs, which are discussed in more detail in the " Comments on the proposed Rule" portion of the final rule package, represent substantive changes that should affect the concurrence process.
Since the rulemaking defers
~
9705070109 970429 PDR PR 25 62FR17683 P,DR
Memorandum to Addressee List dated February 19, 1997
Subject:
AMENDMENT TO 10 CFR PART 25, " ACCESS AUTHORIZATION FOR LICENSEE PERSONNEL," PART 50, " DOMESTIC LICENSING OF PRODUCTION AND UTILIZATION FACILITIES," PART 54, " REQUIREMENTS FOR RENEWAL OF OPERATING LICENSES FOR NUCLEAR POWER PLANTS," AND PART 95,
" SECURITY FACILITY APPROVAL AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA" Distribution:
Elizabeth Q. Ten-Eyck, NMSS/FCSS Frank P. Gillespie, NRR/ DISP I
Bill M. Morris, RES/DRA Stuart A. Treby, OGC Catherine M. Holzle, OGC David L. Meyer, RRDB/ADM Brenda J.
Shelton, IRM/IRMB i
na anc ye UNITED STATES g
,g NUCLEAR REGULATORY COMMISSION f
g WASHINGTON, D.C. 20555 0001 b,,g #
February 19,1M7 MEMORANDUM TO:
tributi 7 gist hul '(
3ra[cy FROM:
R ond '.
Director D v sion Seci ty Office of Admin' tration
SUBJECT:
AMENDMENT TO 10 CFR PART 25, " ACCESS AUTHORIZATION FOR LICENSEE PERSONNEL," PART 50,
" DOMESTIC LICENSING OF PRODUCTION AND UTIL12ATION kACILITIES," PART 54, " REQUIREMENTS FOR RENEWAL OF OPERATING LICENSES FOR NUCLEAR POWER PLANTS," AND PART 95, " SECURITY FACILITY APPROVAL AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA" Enclosed is a final rule package, ' Access To and Protection of Classified Information," amending 10 CFR Parts 25, 50, 54 and 95 to conform NRC regulations to new national security policies (the National Industrial Security Program Operating Manual [NISPOM]
and Executive Orders 12958, " Classified National Security Information," and 12968 " Access to Classified Information.").
This final rule is in a redline / strikeout format which reflects changes from the proposed rule which your Office concurred in during the spring of 1996 and which was published in the Federal Register on August 5, 1996. Comments were received from Georgia Power and the Department of Energy.
The Georgia Power comments requested four clarifying amendments, all of which were adopted.
Most of the DOE comments were either adopted or were editorial in nature.
However, DOE's comments concerning the level of background investigation required for access to Secret Restricted Data were significant and posed a dilemma for NRC.
Given DOE's statutory responsibilities for the protection of Restricted Data we did not want to dismiss their recommendations without further evaluation nor could we simply adopt the comments since they would subject licensees and/or certificate holders to additional expenses and appear to exceed requirements of the current national policy (the NISPOM) for the protection of such information.
It appears necessary to give all affected parties an opportunity to comment on and justify their positions on this issue beforo a final decision is reached.
Therefore, the attached final rule removes sections 21.15 and 95.35 of the proposed rule, leaving the current requirements in place (which meet DOE's recommendations) but states that we will republish those paragraphs for additional public comment which will permit
i all affected parties to specifically address the issues of cost and requirements as well as provide supporting rationale for their recommendations.
t i
We do not believe any of the revisions to the rule, other than the removal of the two paragraphs, which are discussed in more j
detail in the " Comments on the Proposed Rule" portion of the final rule package, represent substantive changes that should affect the concurrence process.
Since the rulemaking defers decision on the controversial issue until further information can be submitted, that issue should not impact the approval process at this time.
We are circulating this package to all Offices concurrently to reduce the time required to complete the concurrence process.
Please provide comments or concurrence by March 4, 1997.
If you or your staff have any questions please contact Duane G.
Kidd, of my staff on 415-7403 or by email at DGK.
Enclosure:
As stated cc: Maryann L.
Grodin, OIG I
Raj K. Anand, NRR/DRPM i
Scott F. Newberry, NRR/DRPM Rocio Castaneira, NMSS/FCSS i
)
k i
i
ENCLOSURE MEMORANDUM TO:
L. Joseph Callan Executive Director for Operations FROM:
Edward L Halman, Director Office of Administration
SUBJECT:
AMENDMENT TO 10 CFR PARTS 25,50,54 AND 95 Attached for your signature is a final rule to be published in the Federal Register that amends 10 CFR Parts 25, " Access Authorization for Licensee Personnel," 50, " Domestic Licensing of Production and Utilization Facilities," Part 54, " Requirements for Renewal of Operating Licenses for Nuclear Power Plants," and 95, " Security Facility Approval and Safeguarding of National Security Information and Restricted Data" (Attachmer,t 1).
p_ackground: On October 31,1994, the Deputy Secretary of Defense, acting as the Executive Agent for the National Industrial Security Program (NISP), approved the NISP Operating Manual (NISPOM) establishing government-wide requirements for the protection of classified National Security Information and Restricted Data at industrial facilities, including NRC contractors, and to the extent feasible within regulatory requirements, NRC licensees and certificate holders. On April 17, N95 and August 2,1995, the President signed Executive Orders 12958, " Classified National Security Information," and 12968, " Access to ClasMed Information," respectively, which revised requirements for handling, protecting and accessing classified information. The requirements of these national security policy documents are applicable to licensees as well as NRC. The effect of the new Executive Orders and the NISPOM is that 10 CFR Parts 25, 50,54 and 95, are no longer consistent with current national security policics and directives. Some examples include revised accountability requirements for Secret information, revised requirements regarding Foreign Ownership, Control or Influence and new locking mechanism requirements.
]
The rule was published as a proposed rulemaking on August 5,1996 (61 FR 40555) and the comment period expired on October 4,1996. Comments were received from Georgia Power and the Department of Energy. The Georgia Power comments requested four clarifying amendments, all of which were adopted. Most of the DOE comments were either adopted or were editorial in nature. However, DOE's comments concerning the level of background investigation required for access to Secret Restricted Data were significant and posed a dilemma for NRC. Given DOE's statutory responsibilities for the protection of Restricted Data we did not want to dismiss their recommendations without further evaluation nor could we simply adopt the comments since they would subject licensees and/or certificate holders to additional expenses and appear to exceed requirements of the current national policy (the NISPOM) for the protection of such information.
i It appears necessary to give all affected parties an opportunity to comment on and justify their positions on this issue before a final decision is reached. Therefore, the attached final rule removes sections 21.15 and 95.35 of the proposed rule, leaving the current requirements in place (which meet DOE's recommendations) but states that we will republish those paragraphs for additional public comment. This will permit all affected parties to specifically address the issues of cost and requirements as well as provide supporting rationale for their recommendations.
m Notices: Attached is a copy of the Regulatory Analysis (Attachment 2). Also attached is a notice to the Commission that the EDO has signed this rule is attached for inclusion in the Weekly Report to the Commission (Attachment 3).
Attachments: As stated 1
Distribution:
MC:
SCF: LRD 3.00.09 LRD 3.00.17 M. L. Grodin, OIG D/SEC R/F Document Name:
(CIRCLE the "C" to receive a copy of this docunent without enclosures; CIRCLE the "E" to receive a copy with enetosures)
OFFICE SEC lC E D/SEC lC E D/ADM lC E FCSS/NMSSl C E NRR/ DISP lC E NAME DGKidd RJBrady ELHalman EQTen-Eyck FPGillespie OFFICE RES/DRA CE OGC CE OGC CE RPB/ADM CE IRM/IRMB CE NAME BMMorris CMHolzle SATreby DLMeyer BJShelton DATE 3/
/97 3/
/97 3/
/97 3/
/97 3/
/97 OFFICIAL RECORD COPY
[7590-01-P)
Rsd11nd/Strikecut text indicates changes from the text of the proposed rule.
4 NUCLEAR REGULATORY COMMISSION i
i 10 C!' PARTS 252,' 50',i54 AND 95 RIN 3150-AF37 Access to And Protection of Classified Information AGENCY:
Nuclear Regulatory Commission.
ACTION:
Proposed Einal; rule.
SUMMARY
The Nuclear Regulatory Commission (NRC) is amending its regulations to conform the requirements for the protection of and access to classified information to new national security policy documents.
Thisfihaliproposed rule is necessary to ensure that classified information in the possession of NRC licensees and others under the NRC's regulatory requirements is protected in accordance with current national policies.
EFFECTIVEEDATE: 1(30ldaF5l'f r6mida e j of publ i.c a t ion JW thE fed le ral! Rigiife f1 i
The ccament pericd expires (C0 dsys f rcm dete of publicst4en in the redersi Register).
Ocmments received sfter this dets will be considered if it is prscticsi to do sc, but the Ccamission is sbie tc essure ccasiderstica only for ccmments rece'ved cn cr before this date.
Comments msy be submitted either electronicsily cr in written form.
Icr written ccaments submit tc.
The Secretsry Of the Commissica, U.S. Nuclesr Reguistory Commiettoni Weshington, OC 20555-0001, Attention.
Occketing sad Service Orench.
Ccpies of comments received msy be exsmined st the NRC Public Occument Room, 2120 L Street NW. (Lower Level), Wsshington, DC.
Electicnic ccamcats asy be submitted, in either ASCII text cr Wordperfect formet (,u sica 5.1 cr leter), by ceiling the NRC [lectrcnic Ouiletin Ocerd
e InnP\\ __
4 U bl I IUe i IIU UuI i U L I II UVQ m.U1 G J...VU ubbCJOUu u a 1 ely W r_J
_1 J TL_
L.1i A f __
L_
L_
_____.J
.._f__
__N
\\VWJ/
Vli pc
(__
__J__
__J VI blIU b viant vig ; J uyUI ig gU b vuint u r n i b g b I V s g a JVI b yv u I U
_r u_
_______3..
...13 3_
____.._i_
A 2___
__rA..___
bCI g U
Ill V W U ni,
U llu VIIU J1___
1..
.I_
YA
__A B__f.__.._J J_..___A aL_
1_ Ng h
hUJp __ ui4 Ub IJ v su VI
& B i bT _i I l g b e U g b n y i Vully V V 6 uiu c t i 4 J VII bilU iuIU n
_..21.
__A 2_m1 r__
J___i
__J!___
__J
.1_.f__
A L __
L..
8
._ UVUi IU OJ JV
__ _7QbbIbus aVI u V 7T I I I V U U I l l y Q IIW v I U N I Ily Vil b43U WW gJ bDefd-i i
T1
_ _ _ _ _ N u_1
____..A
__J
__J__
A L_
kt 1
- t. f
__.L_.._A N
y_
u yGI J i
b vni g/ u L U I._
u siu Ul v u q ill,
64IU M
i Ul L ld l v\\ I l l y J u u G J J b C 313 VII
& 3 l
_1 J L_
_______J Jf___A 1..
L..
Jl i 2_
A. L _
A _11 r___
_..L 3 iu b Q UU U ubbCJJUU uI I UbbIJ UJ uTDI i lly LisU 4 %/ ' s iIUU
- i u ill u c i__ Ignni SnS T
\\VVV/
WVu' GPMn P--_.._t-A k__
__rA.. _ _U
_L_.1J L-
.._A
_ _ r _1 1 _...
___2A
_. 8N _su n_ A _ _ _
g/
bci J JiIVusu vU JUb uJ 4V3 IvWJe gIQ 1 I bJ..
A -
JVI6e b Vinni ul4 i b u b I Le i 4 JVi bWD1 LV Wh _
LfA _
A. _ n
-__J
_A __ L2& -
A.
1
- ht n
1 4 it_2__
AUPT ifT
't J
. _ _ _ _iIUiIU g W
WI bJ bV bd g Qiiu J b kJ g/ Ui4J bV 4
\\M,Vg4/e VJ I I3y n II J &
VI W I '4 l
A -
_f__i
__.1 D _E g uge
_.1-__L2__
_.L_.._A
__ bUli A L_
I b EIU Il o w b I W 3 UlIIQ n i II S J u U JJ J b Ulti 1 L. _ N w U GbbUJi 4_
bGI ill i IIQ i L ill u 3 U bile 1_A 2-_
A1_
se n.. i _ _
u__..W
__a1__
r___.
A1 e
ge u _ f _. u H
.24i rI_J bIIL nu4CJ 1 a E 61 u V [# b I V i I I I Vul bIi nb Juisi E ID_I I W e I f Y_i J
.rv I I I I II3y iDI L b b I ii y VJ et
_i J n 1I__
Ii___9-P -. f J _ et 1
_1..
L 1_ r. 1 W
e
_.L_-_
_8 IQI IJ I L U l [1 I u I 1 Iu VII I I IIU VJCI J uuIUUJ y
e li b JuWJJJ
_A L-
_1 __
L.... _ _
5011_1 1 T _
____A 2_._
r__A
._M
__A 2__
A b, _ A 2_
A f4--_J 8
94u MuJUJ uIJV IIu V U u
i i U I g/ I 4 II VI UI G b I k/ II bUi3bU3 V g/ b I U i I b ITU b I J bQ 3 3 k# I CW 3_N
_..L_._}
A _
A L_
___A L L/
bitU yuI b 1W I
JWUJJab Tt_
unc
_..t_.._i I U u T1 k/ I IW bull O I JV UU ubbUJJUU UJ Q W I i Ubb uIQ I r _ J i r _ _1 )
4afU ll a b J b4 W J J J b E lil VII
_1__
L_
____.___J t..
Jr___A Js.1
_L_
L_
r__
A L_
__2_
r. J 19_ _4 J p's n P r
t7%91 99i 999n
__ uy.._ f T_i
_A
.2 L.
_..S U U I IVs biEU UI U 3 II I U bl T1 U s 3y gi s l V 14 U Ilu uu, gsud/ sb4 vus/,
VI WJ i sig i U 1 IIC b Y I vA _____i. r _ J.. _._, J tr
.._r__
r,nni nos enan i_ ___
bb I C u F1 k/ I iu,
_A r _ m i _ _3 J
.h
&8IbU3 iiU b e i U W UT kJ I 3 u o y bl Y e 44 u J I IIy \\IVJ/
Jb4'WvJJ bV 6 %# 1 I L..A __. sis L_
_______J r___
A L 2
J _ _ _. WJ JDIUb bIIly 4H U 51 u 1__A s__
A L_
t.
NU JJ J k UHB
.W i I I UU UbbCJJUW i 4 VI3 bilD N d
.U u
blic Mt110l 5 t G ry, CG'v' G i n TiGftt-AdffN1dtttet-i G B 6Du "s t a t t-67ttem 3, " thEG 5G16-t509
- n__.1-A _ _..
T_r____A 2__
u_11 m
AA AL_A
._f_A
__... 21i L_
J 2 _ _1 -..
J ALA ITUybIEbVlJ
&BBB %# 5 III Q b i %#43 1 iU 1 3 e nb b3 iu b g/ V I I I b, u nUIIu W I i i yU W I J g3 4 U J U W bIIQ b L__
V g# 6 I L/ 3 i V e.7 e ll u b 3 U G I B U y u I U b t/ I_.
r___s
+ __.
AL_A
.vi s i i kung yvu....
A _ igt
__i.
wii e u.._s___
n__.s_A _ J bu"3G'v
ub bV b
.fss A _f._
IIG J UiI une n_sm__
. _ _ s_
___..su C a s u.
1 17
.sb Vii s ite-efe u.
uiGV buis vG ubbcGJUW uiiUbbij T.
pr n_32 t_
_______J Ja___As.,
nnb Vli i s iiU m U i in A.._s.__
er__
_A e_x,__,J J
ns_.
sr... _ ____ une r___
bJ g/ I Iij I y b#
III b Ub W
I U W FT k# I 3u b VITirlI8_g u 5 g iIg a
& B y g/ u u(bUJJ 1i ab I g g/ li g 3
r _ J i s _ __ s J s._
__1._
_ _ _.. luc I l u e J 4' W __..
__A.
.. _ _ i_ r _ J i u _3 J L..
__,__A s__
AL_
wn_A.. _ _
A..
I U M TT V I 3u J
IH U i II
'" u y i Ubuisi b se i U bs tv V i su wy JU r Ub b s ity b ii U isc b u s si bV r_Jin__sJa
__A r___
AL_
in n e n 1 2._ _ um 2_
u__..
is 2r.... UbbUJJ MHV Uw I U W TT V I 3u V g/ b I V I I I I V UI bilU M I\\b VaiI 4 IIU TT Q l i t i lL IIW e II TUI,
I I JVu
_____ une _ g.
r_Jin__s) t..
.._1__
une._
i _i s
. sis L_._
- r. 3 3 A _
_3, oumwe_. yUu oN j
i U W yv v i su uy u J i iiy Mnb a 6Vi
-r___
_.._t W i i i iiu v G iusi-8bbEGJ bV uni i
M 4
iiUU
_.._A L..A
.._... 241
__i L_.._
A _
A L_
__2_
r _ J i i _ _1.2
..._A J J J b EIII J,
Wub JVu W I I I IIV b IIU V U ubbUJJ bV b lic IH u 5 3 4 I U bi T1 V i 8W J J a b E Hi s 2
i i
1 l
.x._
12.. _.. b VIi b R 6 b i U U WV i i u u J I IIy I U i Ii G b, JVW Wi I i JUU b IIC
.1 n b gi___Uu u
___L
__A f* _ A Lt _ 1 J
.._f_
v _1_
s 4i JVu
.. _.... 211
__. Q,. unr.
f
- 1.. J f m
.!11 L
_L1_
J, I iib I uu I fly-A L_
n1-_
W..
A7&L_.._L
.ni I I Q_.._1-_J
$8M u.. _
bD uVWIiiVWW b IIU nusGJ iiUiiu.
nI bi3VWyii JVu UDUviU 2
i _ u niu i U t.. _vu inUJJowCJ, yvu
.wi i i siv b vc uv,C bv
__J u m Renba
.131
__i L_
. t3 _ i_
. _f.tU wi
_ b Vinnic ii b a Vi__ upg
______i _
m __
f____
vr._. bU1I4ubb I
rv V Iu u J p iiy a sI, ua i i iUJ b u ii UC TU U J
\\ b VIusisNa _ \\
___t
__A e
i s _ _1 2
.._f_
rvn rf1 __ ___
L_
bJ/.
4 I Jvu
___J
__J J _.._1 _ _ 2 _ J L..a
.._.1-_J_
__s 11__.mJ.
_11
..__... ! 17 f.
UbbCGJUU U liu U VM il I VuUUU uub up: Vuud uI_ _..E liv b Us l VWUu, u
JVu "' ' '
___d
'a u
1f_L
_f ff1-_
..!L L-..A J
__f_L f___
f-_
_es l v_ y_ L _ _
ff1.
1 1__f.\\
A._
I IJb VI I I iUJ M i 6,iV W b u Nb i i p 4 i VI4 J
\\ IIV I iil u
iiU i I v v rs i.
nii s ii ^ i i in 1
__ oI I I 3 IUJ
.W I bil I II u
J UUu I I UbbVI_..J, p 1 bis UUJLI I p b i vil a,
I J uyui i upIU.
1i ff1..
.2A L!_
_..LJ?___A
.2A L J-___f_A f-__
f-
..._f1 L1_
I lig 2L___
f_
1r
_f_..a._
iz__
sf_f.
r__
rvn ______
T iIU i U i a u 4 s lis i iiu b U b i sii n i i in i b i vi I I gbbUJJ.
A1AL-.._L F _ 21.] _ miJ
_1 __ ___
L
.______A A L_._L A L-t t
__1 J tf*
M.. L 1 2 nI b l 8 V u y 31 I U U YY U I iu uiJV b Q II UU ubbUJJUU blil V u y ll bilU Fv V I Iu r1 FT U n>,
I i,
i 1
n A L_A
_J_
__7..
-__.3J__
f__
J_.
._1_2*.__
ff1
___J J
.__A Jf_
I' b lIU b I;I V u G Vil I J VI VY IWUJ ubbUJJ l Vi U U M II i V Q u I liy i I ICJ u lly uvUJ IIV b uI J
[
the-NRc n.1 _ _
u, U, i u.
i. _..
L nu1UJ 1
1 t
f_,____.
f__
__ unc L..,,
_. f_
L___J_
u_
A _u.._
n TD _I
____U 8 1. I V I IU U L I Vil Vii li n b uuI I U b I II UUG,uJ bGs I ils.
DI bliul UdV IJe is1 V I c.._A ___ r$
_ L f _ _g Vil g
__u
__J n_..
1_____.
n____L unc
.i_
1 JJ J b Uli3 J I UL I VII Q Ilu VUV I V p it4 U li b Wi Qilbli,
- nnb, n u JII t 113 __
ne nneer I
Ub
- LVdJJ, l
A 1
__L___
dSni\\
A1E E7nn_
_ _ _f1 A V f4 3 G _ _ _ _. _. _
I b U 3 U pilVIIC
\\WV4/
74v'sfUV, U Ili a i I D A U d ti l l i 6.yvv.
l 1
l P f._ _1 -
___k'UJ
_f A Lf_
_______J
..i.
- 1. ! _ _ __..
L_
_LA _f J
L..
.._fA A
_.m bVf __
Vi bil 1 J VI UpVJUU l
J I Ily I U i u3 G ill G r= 1313 8H U J UU V U b o I B IG U WJ "'
'b4U
1 I
Nb._
& _1
- f...
\\\\dV4/
74J'LLUV/
I B Vme W
b IVIi
=J U 1 Y IbUJ, I 3 3 I3 b 3 IIy u
]
A f fSni\\
A1f 9Sfn\\
f__
n I-_
P_-.2-__
n!A f__
V3 bUIUi uA
- viuubu, ibU v,
- biVo, v.s.
a ttb, U m i___ n _ _.
- 1. u_ A _ _..
I Meti-Se_..fbUJ vi f__
nuiaiutstre.f__
n____L nrr
_r AJ_f_.
n e u _,
nU3u bviJ i
C Ulil335 I J J i VII, M I _J i l I ily 4 VIB Ub LVJJJ.
bCI 4Q I II u v b u lilU ll b J I
___I__f__
M Lf__a__
nO O O E I f*
O__1
_f_
J___.-__A.
- ___i 4
J A _
A. Lf_
C186Uu hv bis 3 J l
I 1___Lf__
1 _ _1.. J f _ _
____.__a_
__.__...._J
_ay-hc_
n.L1 I_
_.__f_
J
_a A L_
hn e l
ctr i U m o r. l u v,
l ob i uu l ow b vime c o w. ULU..Cu, m
Unum,oUm ob boC ruv i s.
BebuoUnb s u u c chi s
\\bv L U,. _1 n os o.._ _ i _ _
n___
6166 c u _ _ _. i f i _. Ci
.. U
- n3bvo, ub.
uGJC i
4 is Lf ne vt___
__, ome
- uvvm, m LV 6
l bi v b usle L il b J _ _.. _,__
L_
m_
_J
_J J_
J_J
. __,,...' 'u b iiU LiUb4: vii i 6 J__..___
.L_
r,__
___f_
Ill u J u4 JV UU V iUnUu Q Ilu W Unis i V u u CW UIUbbi vil ibui IJ n.11
_t 3_
n___a
__i _L1 f_L_;
L..
une r__
iL2_
_..i___i.!__
f_Jf__A _a
_L_.._
WWI iUb4si WVuau UJbguI I JusUu wy li ng i Vi bil I J t u i U lle u r, i l i g gG I liu I b u b cu uuvvG.
I l
l FOR FURTHER INFORMATION CONTACT:
Duane G. Kidd, Division of Security, Office V; n o lu i t.,. u n i V i.,
v.s.
l.ub. m.._ g.s a,
-... i...-., %... i i v. s.,
l 0001, telephone (301) 415-7403 Email DGK0NRC.G0V.
1 I
3 l
il i
i
o o
SUPPLEMENTARY INFORMATION:
i j
I. Background 3
OREXUssstIS$1996f(61NRi40555T.fth61NRCTpublishedRipropos'e'dfruls?;in;Lths i
f E difilI Rig istEMt'6fEsnd fl 0 fC FR ipa r_t% 251a ndi9.5 ? p s f t'a i n i;n git o L'th sip r:a tTs c fi 6n 6flRis tif6fidil0a f ais 5dIClJssi f.f ed { N 5 t i on s GS s c U r.i tim 6fbdA tT6th iEl i s sn s e e}
~
EsffifidaEsl: holdifissd3theRfacilities.3 Absipio66iAdYiseiidmintsIsefe J
a e,
vi i
This6dedl%536hfofENRCErig01sfions;1tAin6w 5he national requirements for the f
a protection of and access to Classified National Security Information heve been f
this Ner$2 revised by the issuance of the National Industrial Security Program i
j Operating Manual (NISP0M), Executive Order (E.0.) 12958, " Classified National 1
Security Information," dated April 17, 1995, and E.0. 12968, " Access to g.
1 l
Classified Information," dated August 2, 1995 In order tc confccm to these a
j new noticr.el security policy deetreents, the NilC must revise its reguiet+ene j
for the protectica of classified informatten.
The requirements of 10 CFR 1
Parts 25 and 95, addTthelsecif6nsiofiPartR50iand 1541thalicantAihTf540Wsrasnii i
f6 6a d esi!ltE RisYrictedIDit:a? ere wereisubstantially based on E.0. 12356, dated April 6, 1982, which was superseded by E.O. 12958 'andisUppl? ems 6 fed [by l
thil'NISP0M.
I The prcpssed finallrule wouM amends the provisions of 10 CFR Parts 257 50M 54) and 95 that deal with requirements for access to and protection of 1
j classified information that have been changed or added by the NISP0M or the Executive Orders?${E65theihxcepti6n{6ffth'6selfsquireniistWr'slited[fdTpifsbEnk1:;
[khk h hkfkhhk[f((g~[q[hgI(h $hkphkRe3ffidt'Ud[Dit}.
t TifeIFf6p6 Tid NUli3dL1:dWaVEpiFst ithdRi hTH257157ahdE95l35?ficie s 6ta iisitBEEfiCERiitB st'idi DstsW6thiFZtheiiithsCdsfinidissitEtt isal f SeEFet histB HidIDitiEinMKiiWI $PDFa nd{I tsW0hpissihf?NMfitis9McisiFinds3isEd 4
4 On;1 a ( N'ati onali Agency"C6eiki; wi thT I ng'ui.r i es ; a nd C redi t Check ' ( N ACIC ). Jhe
~
Departmeht:?6f ?Enerifyi(00E)lJobjected Lt"of thisichange'in theiriforma.1' comments ~on
~
the3rspasc~dirUle..00E:Lb'sliblss? thatli pendihg:. compietion' of EtheJJoint.. DOE /DoD Nuclear [ Weapons?#deiss'lAuthorization Review l Group l: determinationiof. what constitiuses%theInfosti sensitive L RestrictsdTData f th'e ::'s06sequeht ' review !off all
~
clasiifibstion3uldance.;;;toTde';ermineEif?.the 60idance cohtainslthis type of friformationnandithedupg'radingtof f tht'sii nformati on1: t 6)ToplSecretF,; all pe Fsl3nns1 Ni t h Tid 6 e ss ':; t'o2 Sec Fsts Re s t r i cted :LDataLmustihiyeEs[?QMslearance Ea s edi oii; a~ $ 1 n slEScope? B ad kg r'ou nFI nv eit i sa t i orff( S S B'I T. [Gi v' sol D0 E ' sis pe~c i h l
'statutoEyhabth6hi ti.'es;Lin' dabl Ishi ngi'c'ont rol s ' for Rest rLictedl Dafaithei r
~
vieksidescrielspecialicensidbratien! 'However,;becauseLthis" requirement 1may
~
siicebd?theTrequirementsiofiapplicable. National Policyf(i.'e..T the NISP0H), land result $1nfadditi6nal;? costs to licenses :nd - ce rti fi ca tEL holders, { the' NRC0 ha s decided!:toj withdraw [the changss tolSS25;15 and:95.35; in' thisL' inallrulemaking f
a nd 5to/ republ i sh ? thein 7sepa ra tslyTfo r. addi t i onal ? publ i ciconiment JThi s : Mil l providelihisFes'tedipartiesianlequa1Lopp6rt' unity toliddressi:the11ssuesiahd proiidb?sspportin'girationalel or their::; recommendationsf andLcommentsk f
OthiEaspectsioff thef proposed rule Twere generally asceptW1'elto all coniideritbrsnThoss Specificsily, these changes included revised and added definitions such as Cognizant Security Agency, Classified National Security i
information, Classified Information, Facility Security Clearance, Foreign 1
Ownership, Control, or Influence as well as numerous amendments to reflect the fact that the NRC may permit another Cognizant Security Agency (DOE, DoD, or CIA) to assume some or all of the security oversight functions at an NRC facility under the requirements of 10 CFR Parts 25 and/or 95 when that agency also has a significant security interest at the facility (SS25;13,;;25717; 25719H25i2225!237'f25?25P 25f 27 f 25!29 M 25733f9571@f9571W 95h9E95t257 5
l l
J
95!27),$95;291!95131,495i33,i95.37,95739h95143,J95.47L95L49.,95I51,;95.53; 95iSTisnd ; 95.'59).
The proposed final rule addresses the intent of E.0.12829, 3
" National Industrial Security Program," to reduce wasteful and inefficient duplicative oversight of private facilities which have classified interests from more than one government agency.
The proposed final _ rule wetthf also adopts new requirements in areas where the Executive Orders or the NISP0M, mandate specific requirements not included in the previous versions of the rules. These new requirements include:
Requiring that key management personnel have perscanel security cleerences access a0thbHzalionsTas well as those empl.oyees with access to j
cl a ssi fied informationT(S$95',177an~d L 95718):
Permitting reinstatement of a personnel security clearance up to 24 months after termination instead of the previous 6 months ($25.291; Permitting facility security officers to issue visit authorization letters directly rather than p'rocessingfauthWizatioAlrequestflthrough the NRC Division of Security ($25235);
Requiring a finding that a facility is not under foreign ownership, control or influence (SS95;15 Land 95717);
Requiring facility security officers to have specific training related to their position '(G95133);
Permitting the use of reinforced steel filing cabinets with lockbars and key locks for classified information (provided appropriate supplemental protection is in place during non-working hours) (695!25):
Changing'k.hesecurityclassificationmarkingstoconformtoE.0.12958 (S95237):
Reducing the accountability requirements for Secret documents 199574D:
6 1
l l
s i
i 1
Defining procedures for challenging classification decisions that one l
t believes to be in error 1$95.37):
l Allowing for additional methods of transmitting classified information j
1695d9);
i
~
ChihdingS10'. CFRIPirisl50fanf 545t32feferi.toicuffent?prdesddresiffUiOlCFR i
Pif tl251f 6fIs Essisitiisl a s s i f i eUn f o Fma t 16ni( S $ 5013 Mshd % 17)Ma n d i
i imposing fewer limitations on a facility's authority to reproduce classified information when operationally necessary.($95!431.
I g
a 4
1112Comnedtsion:Jt'helPf~oposidiRul;s i
i ThAECosmi s s i on fr e cii ' idi tso'[l eit e r si c~ommen ti n glo nithsfp' pop o s sd ir0TiKode j
~
i v
'fnii Gs6rit alp 6Wer!Coihpsny Tandlorielf romlthe100E. : iCopi esfof[ths:1 etteFsidre j
i a y sil itiliffdr 7pstil i c3hipicti onla nd ic opy i n gTf'o riaj f es? a tT t hslCommi s s i ohis l
l.
pub 1icl00Enment3Ro6mh16Estid2ati2120 M St'festi: NQL([iMedhvel Dash (FgtbH
[
DC E I Bbthicomment sMiipp6Et Eth ei rul em a kt hg @0El pFoE1'de Uesommindsfl ossifo 6 l
i.-
..... i fi cs ti.,._
.~d g.,i,mpro v.~.
clar
. onsian ements M h l. Georgia!P wet;Com..pany %e,,
.,, we e.
o..
j
,.- r y. m n u c.,c...c.u.wg.....:..,,,.,s.y y.g.
Tw G;a mii. t recommends d.yhitl;'the.giNRCn:
-- s q 4
j
( I E P f o vidh;f al p r6Esdiireif a rit hi?ds s i yh s t i o n?.6fJ t hs lCosnizaht3SsEuEity i
h
- a v. <<,vu f ;.y - -
i A g e n,.,w,cy L( C S A )i fo,. _.... yria facilits?4
z--
i I
- (2)IAdd fss GthiTC6mmi ssi onM rol sii riis nss bi nsid6mpli ssilwi thith(20 Tis i
6fI3E668fCSA'R.c I
(3M ftsc66c 11 e ? Rsst ri ctsd T Dit a WeiiO1 Fsm sn t sli i6101 C F Ri Pa pt s750 Tin d [54 ? o f 3
t hi?C6muis siER.';if f eg alia fi 6n slwit hit hE p f o po s&d Lc ha ng e sit 3510fC F RI Pa Eis1252 ahd 95IsisdM i
tc ea rance nf r..
.~.v
..,t mmi si.f -..,.,-.~ fFsd n o
m
. h, Di.fi neM,,.,,. is11lity..,l. _..
n omithes.
... ontis2requ (4
enia f j
i j
ThsE00ENe~ciaisihd sEthitCthi[W RCi2 i
$1N M$E[tiUSEEN icdE5 E50thdhiZ$iiUn NihfdughdiAt$tb5[fufe76i % d15hId
}
7 i
k i,
thiaOpersohne1Es'ecupityiclearance"fis a synonym for:" access auth~orizatio'n:"
(2)iElimi$atelthe10seLof the term' "Critica1L Secret ' Restricted Data"'and req 0ifslall3Sscr'et/Rsst'rictsd 'Dats:to be protected 'at the levelj requirediby the/ Feb'ruahy;c1995lNISP0M Supplement';j
~
(3)fClarifyltheidefihition; of " access authorization":in' S25.5 -
(4)s CliH fyithe i rsqst Eements ' for revi ew?of;Lths?:SF-86 Tin.~$25.17(e)L (6)lCl aFi fs5 ths7 scche e:ofii n fohma ti on ; to be protected - i n 1995'.3 :;
(60 Change;thelterm;" survey"ito? review-Lin S95.17(a)(2);
17 M C1 sr'i fy i thell evel 'o fia ccess a ut hofi zati onif eq ui eedl foris eni o r mariagementNI.nl695 18i-(8')iRaiselthe level ofiprotection fori Sscret -Restricted Data ?inTS95.25 tof thel redui rementi; of L.the ; NISPOM ; Suppl ement :
~
1 (9) Eliminate the. requireme'nts in' $95.25(c)(2)(v) tot change. security l
l container; combinations ~once every 12, months:which exceeds the~NISP0M requirements-(10)lRshdi're 'th'at documentsiindicating "multipleL sources"Iasithsibs' sis 9
forici"assification:LhaVelthose sour'ces identified; o'n!the recopducopy;;ioff the
~
I docessntilandh (11);Rsquirelthsti" person" not be' referred;t'oTaslabl.e Toiposse'ss'a l
~
faciTity?clesiance?in $95.57,'
CbmmehtilFFom:LGeordia Power:
Coinmenti,iThsis6mmester. stated thati"...the. proposed.; rule does not sxpl s'iU6 fchlbfi th'e'sefagenci esii sf ths:?a pp roppi a te CSAli n la ; gi ven ;"s'i tUsti dnJE
^
f o tla 31VinTfic il i tiEo r3ho!mikeilth s t Td e t e rm i n a t;i b n h i: C ohEs iVsbli hMr ei th a n 6nel;;ofit'hEagshc1esTcould! tie 3hs CSAO';.Ge6rgiaL PowerdecommsndedXthatstn5 fissEfd1Fijiiclude?aTmors3reciss!de'finitioniofiCSAT6cl;aJr6cedureTfor desishitiWg?aICSFih M givenTsituatibn;:
8 p
Responsei ::The' definition oflafCSA in 10'CFR[Paets 25 and 95 has been ch'a ngedi t'o! r'efl ect;l the tithe lCS A Ei s. ;the 'a gency whi ch'. exe rc i se s. p r_ima ry sdthority: for;;iths prdtections ofsthe: classified in'formstibnlat Tthe.facilityia'nd
~
issthe7ageneylwith'which'thcl facility _interactslinithssel. patters. LThe NRC agreemintisitR theEDepbrtmentIdf Defense and?DepaEtment offEnergy: implementing the? Nat;iona.li:Jndustrial; $scurity;; Prog'ramLclea rly.in'dicatssithat! one; agendy l thsfohe'witMthe:gfestsr security interest;as.'st'ermthed tfeiseenLthe? agencies; d
kould.3ervefasith'ei;CSATsndifwould' be.. theiageht of; the.;:other iforimatte'rs r51stingitoMhe:L protset t onTo f f cl a s si f i edi ih f brma ti on. Thsifa6111t9:would
~
normally!dealldirectly;:with'LtheiCSA on:all issuesfrelated t0;'the: protection Of 1
clasSifled informationfal:Lthat facility.land-the~CSA wouldiinform the'other
'agencifofilssues relatedstofits1 security.' interest; Commsnti - ithir spect tolthe is'suelof the Commission's; role off ensuring W
c6mpliancs; with the irules of other CSAs. thelcommenterf.s l concern wast.".c.how the:Commissionisill;;bejnotifiedJregafding accessiauthorizations requestsdiffom aLnothiEagency..-lDoesianlNRCllicenseeLhdeEan? obligation;toinctify ths CommissidhLif:Cidapplici7to-snotherLCSA fof anLaccess 'suthorization?"
Hes'ponse::sSecti6ni25117;has1been revised;toTrequire allfaeility Jwithia C SATothe Et hin;N RC J;tala d v i s s i the1N RC T she n i t s u bm i t sifa nl: i rid i v i d u all f o rl a n access::authorizationi for Taccess: t6' NRC:classifiedlinformation The1NRC!does notTneeditolbelnoti fi edi;when itheL facil'i tyi submi ts : acces st authosiltation
~
req ussti?;f 6 Ea cce s s$ is1.; cl a ss i f i ed [i n f o rmst i onL o fi t helo the r ; a g ency. fInikeeping
~
si t hTt heldomme n t(t he tktKsip ro c e s si s h o ul d i tis) s i mpl e, ;t hs ; c h a n g eime r el kireq u i r e s
~
5( l etisEdfdscidestif 6rda ccessito / NRC M1 a ss i fl ed si nf ormat fon. lThe ;N RC? mu stT tje i nv ol isdIshedl a cce ss36"N RCT'cl e s s i fl ed 'i h fo'rm a t i on ii s 9eque s t ed is i ncel thei N RC hiU s((ms ki%helnes'dif6?khofdste rmi na i t on! J Ths;;'N RC 7si l l2:l6a nd) Ea ny inede s s a ry 9
i
'coordinat!1bn' betweenli ts'si f-and"the CSA',
'Coniment: : The1commenter ;noted an appa'reh6 conflict between SS50.37 snd 54!17(g).Tand L other Commission regulations.
ResponseiiTheLNRCihas7 revised those!piragraphsitoi;resolveltheiconflictS Ths'NRC< ha sisl a ri fisdtthAt.fcompl iance :witih:110'CFREPartl251 satisfies the
~
requirementi;fof~SS50'l37Jand'54;17(g hssitheyfrelate tosthe. protection 1of blani;fiedlinformation;
~
Commenti !The' commenter ~indicatedithit $95.15;Was unclear'on whetherEa fasilitilslearancefwss'.' required undai certainLeircumstanceslfoi licensee act Wit;ie's:at other: facilities.
Specifically, the:commenteristated,i"As
~
revi.sediby the pro' osed rule iit is' unclear'.wheth'e'r"10!CFR195.15; Fequi resian p
NRC. licensee.tolobtainia;1 facility clearancs from the Commissionfiri' ordehfoh empi oyes sfof :: tha t ";l i cens e ';t'o J ' U s eT. o r; ' h'a ndl e L; cl a s s i f l edii nfd rm a t f o n3 hi s h i sil oc a thd i a t;::-Ta Tc omplitsl y:fd i f fe re ntific i.11 ty. -ii nci dd i n g 3a c i l i t i e R s ubj e ct? t 6
~
l ths! oversi ght oflanotherJ agency. - 1 Fotexampl e,( d6es.L10'CFR 95;15;l;requi rs ;fa fadilityydlearance3;fr'om Lth'e;' Commission? iniord:r. for employeesiof4?an. NRC 1 f censed 7f acil i ty;Ltd7use for... ha ndl e s al a s si fied" i nformati 6nTwhichl i s 1 ma i ntai ned atia:IDOElfacility?fConversely.. does 101CFRi95~.151 require?the NRC tfo clsari:Tthe 3
E ninVNRCD icensedifability?i fAlthough 1t;;1does notiappeirdtoS be?the? Commissiors;s ihtsntit6Meq'ui rea.1 f acil i ty Tcl ea ra nceli n? eithe r : si t!uation;.:: a n a f fi rmati ve 1
s fs t sssn E161.th i ~s ;}ega rd50ul d i.a s s i s tTi n ' t he Li mpi smen t a ti dn;?ofiths dul si "
l
)
i 1
Respbnseh !Ssht164;L 95.15'ha sitieshf modi fi ed Lt6?cl a ri ff thetilin'; NRC Mill i!?fel s sFhc eli ssonliT rsq u i Fedif o rit h'if u s s W S s s e ss i on L6ffN RC 1
1 10 1
+
El s ifs { f feQh fo Fma Ei 5nf a C the[fa c i;11 tib IAll i c en sasso rJAihe r E f a c i l i til shi ch hasZitilpehshhhel[sisifedibiiinotheEagenciffo:ra6cessifo$thetiagescjM
.~nf~ormationlat,lanoth.
facilityJ does : nott requireJaJ facility; clear..ancerunder F
i
.. ~.
~c erJ
$95?1LThorNodlWNRCf616sEthe ;otherifscilifyl iHossVeMitishould[b'elcleap
~
thsNCT21Teenihe?6Ebsbs r:if ec i l i ty !ba s! a !f a 61.1,i ty fel ea ra hcej f66N RC bl ais t f Li edii 6 f olEm s ti biBindfit heiN i s hisnot h sE f a c i l i til(bfg M on e f o fd t h e i f Bo stFa bio f sTElo fisileraEissii4;th el:' N RCl el a sii f i sD n f6rmifl 6 hi a t Ohs i Ed t h s 665t'fisthE16 )Zfini.13 t'fMt hit *.Eo 6 t rs dts;EN6bi dZrsq u i ri?ih LN RC[f a si l i if
.... o cl e._ __arancen 00ETC6minshts:J
{
C6mment : d DO EWa d i tsofcomme nt ssel a t i ng it'6:l ' e acisiLi6t h6 hi z s t i on ' t
+
(I Mc ihile;" -accesslanthorization% wa s;.the.commonjy usediterm. a"The J
lintridUdtibn'iteithespropissd9uls referbncesWpeF'sonnel?seduritilcle~arsdcR
~
,...,v..,..
- nguage, a.
.....us-:.
a nd s som_...o ::fithe. l a....... :..~.-+i:n.^ the; text:; conta i ns3a ri a ti ons,.asuch:.ias: Jersdrinel.
e(o f.
ahdsisijdthbFJiitionM:lA?0binnion!t'erm 5h601L bsi.~used{t6foh' houtiloftheiyaet g
thst2hipiFionneG sEchri tyiel ea ra nceli sC a s sinonymWorTa c6es s74uth3R zasi bn I
eitsb1:1shid;"7 (2iRThefdifinitfioniforf!hece'ssihuthoEf zatibn:nfssco6fusihgHitsii ng ihs tQ iline a nsiinfind iij d u allt s f el is t bi s2f 6r2 sseu ri tpEs1 ssFa nceTf o F5a cEsist t0 Efasiffiel]isf6rmitidn2 Rish6nssiliTheitirmO pe rs6nhe11s'ecU r iis cl ei ra nce d n 3h el$U ppl emenfifi isEtishiiCt hilft haGul eEsh I chlt siinisipl;ina t6pisisct i ch f rsthEEtha nss i
i j
E6Etlisf6f 36eIFU)e";*?hi D ien RhingidEth?"sccessYaUth3Eizisishi"/LT6sI656eE 1
l EhT6disihsRs6Disii?idopiidis.i ndelthi sii s?i&sc6mine nda tibrCif 6h?iniid ft3Elil 4
,ha nge_;and. i n_ lea c h_ica se Dvh._.._thiltermsla res used i.shec ae.-.,i,g,i. i s:
Lcl, earn n.
y The c
nt erei an n j
i j
11 l
b r
definitionfof2 access a0thorizat' ion" has 'been used within the NRClindustrial ssedrity program sincelth's early.1980's,.L. including at sites withljoint.lD0E 1
~
- secUr;i'tyiintsres'ts,land $ithinithe? NRCJ; internal program since1 the'incsptionjof
~
thel; sgency, Vithout: confusion..: The.only change to; th'e definition' ~1n this frble
~
is'.itolinclude?certificitsLhbiders withiniitsiscope..
Cosment":100El'ndte'd that theLpropossdf r0leLcontains? the' term " Critical
~
t Rs s t r i ct ed.~ 0a t's " S wh i d h;;; t h~eys stateihas;notlbeenisdoptedl'6yfany-agency and.;that thellesel:Lof protect;ionX;fsr!SecretLRsstrictsd Data' wasj ri66adequat's.L SpecificallyLthe Jcommenter statedJ"The draftE regulatio'niusesj.the3erm
- CritihslTSecrst:JR6stristed Data."' ~ Thisitsrm has.ndt. be (sic) 'impleme'nted!by
~
~
ani;a'genbi. '_Afreview group 1was. formed.tolreview'thisLissu'e and'has decided not'toLus'eithis; term.=.Instead. information will be appropriately'. upgraded to ToplShcreti 'Itj:isTstrongly recomniended that NRC. notiuse the' termi" Critical SecretlRestric'ted ' Data"L inithisf regul'ation'.:.Instead;we suggestithat.all SecretlRestricte'dlDatiscontinuelto be : protected "atltheTNISPOMisdsplementlisvel m
untill;the;diticall:inf6rmationL has; been upgraded to Top?Secre'ti"?The :commenter fu'rtfieristates"l"Th'eistoragelrsqui f ementsl for ' Secret conta ined ;in.:'thi sTsic) section'sla"r'einoticonsistentiwith'theistorage requirementsTfor Secret
~
RestFictid Datall'n LtheLNISP0M supplement".."
Responses B'causes;of! DOE's statutory 1responsibilitiesLfor;the. protection e
oftRhstE16 fed: Datal theLpotentis1E; economics imp ~act;:.on. licensees ands cef tificate h ol d e f sli'ndNo s si bl eidi s'c re piric i s s w i t h l; t h e! r eq u i re se n t sl o fj t h e; N T S P0Hl.; N RCl. i s sithdFaWin[thsicharigefitsi$$21110and(95135 Twhichides1:1wIth7thsl.1evellof c1lsa ph nssltips?6C lia c kgFo b rid ii nv e s ti g a t i o n;;~ red U t rad ?;f o rl a dce s s itol $e c es t Rsst'rfctidTDsti?aWw11&ep0blisRthoselchanges separstelyffor?pul>1tc 12
S commentOAdditionallyZaltho0gh*the' term "CriticaliSecretlRestrictede Dats"-;is J
definsd;iinfiridithel;seidrityf requirementsj forJit :5re;specified in: Chapter.9, "RestEJctisd:L Datal"Vofi.;;inei:! NISPOM; Suppl ementi; datsd Feb'rua ryj l995,2 ths Supplbmanfilsdfindicates that 'aloint; DOE /ObD? Nuclear Weapons Access
^uthdrizstibn?Gr6up?is!.;rev;ieWing this issue. andithatithsre are ongdingi.sffo'rts T
bylths900ETind ;l000lto: revi si the 'requi rementsJ refl ected ?i n. the':LSuppl ement.
~
Beca useitha t?g t;oUp";ha si:Ldecided not to. use i;the ? te rmi "Cri t'i callRe siri btid C at s "
0 j tf1ha sibheWir eso v ed if f o6595131 ( b E a nd ial;; d e s sr i p t i o n. o f;;; t h ef t ;n f o bm a t i o n? i tT wa s g-gg.
.g-
.g g
physi dafpd6tection fiqu' rsd f or[fieret? Restri cted Da tsiirilthe. proposed i rbl'e is essintialllyfthsasame;/as-ithe requirementsTof;the. currents.H ongistandingiPart 95L?and$thbse frequi rementsi appea rito7 meet 7 the; requi remerst s) ofithelNISP0Milit isLdifficUlt $for2 he-NRC::toTjustify ikci easing its7 physical?secur;ity t
~
pequirementsj forTaillSecret1 Restricted Dats, fat increased TfinsncialLand administFative.burdenTto. licensees.and certificate:Lhol ders Tat [thi'sitfiSe.
Howeie p, ;;i ffneel pol;16 t eil f orl Rbst r;i cted ; Ds ta j a re f a pp; roved. s nd O s suediths LNRC',1 atl;?thhilfimek;W11FconsiderfredistngTits reg 61ations toTre'flectTiheines
~
7 p01.;idi;es2 Com' men ti iT h sic omm e n t e EJ q u e s t i o n ed."W het h b r! S 25 kl 7 ( e K req'u l t e s ia
. licenses /contraciorito1 review Part,2);of! the;SF-862 Riip6nseh i l t Ei sTn 6ti;ihsi i n tbntTo fith i sis e s t i on S thit::! pe ns o nn elis t;U a I
11sessis HEsstif1Eati?b61ds G;;6r";6thsr!facil'ity NeViswlPart 226fsthsiSF3861 hor %isliEbisiifNRC?prasit ccithaf thi s:Toccub dhi;.NRCMiniffuctiansi;for i
E3stil sE f hEthitS FJ 861sipl.1 Ei tly~ st a te it ha t1 Pif tTo fD he SFE86l?isi;tEbslblahed i hisissilidIEMis1Hpe %ift heli nd i v i ddilidompl it i n g i:t he ?f eFm? ahd ithstM he 13
i envelope';I1f to; tie; fdrwafddd t'o the NRC' dnopened. ' Section 25;17(d)(1)(1)' has beenL'clsrlfisd:toFerisdEsithat these regiiirements.lareL; clear. -
Commenti i.Ths'dommhnterli s. concerned:: that LS95.3 Ldoe'sj notT..i nclude Eohme'rly?Restricisd;i atal 0
1
)
ResponisF 9Nhil dT FormerlylREstEfstid:.Datil( FRD) Mis;formstioni rel ated bhi msfil M65 thelm11.i fa ryidsdiof':. s toni t.d seapon s Rii.i ra ret 1 nTt h sifN RC[p; Fog ra m ;
l i
ins [NRCagrleeslthitIlt'sWigulations7:56601 d [cl e a pildadFe s sI:.'s l 1 If 6 rm h 6 f c1 h s s;i f,i edli n f o rm a t i o n :l's nd llba v e);:Fssishi$9513Laceordinglf!
i Commenti ':LThs;;commenterK1s' concerned) thstithe T srm "securitylsuivey"is t
used inLIO:CFR Part 95"instead'of the NISPOM term?" security review."
t l
~
c,
... d Responss:.Thelt'erm"" survey" in SS95;17(a)(2)L.andL95.59 hasibeen?'dhange<..
tb2"rsviewl" C6mmsrit h hThe? doinmenter.Li s :: conce rnid?f ha t ? $95 18 L i s i noti suf fi ci entl y i
~
.... ~..
cl a,r.;lab - hc,out:::t e Ll evel;iof.;;.. access' authoriiations Lrequi Fed ? f o r.? senior: management,3 e
Spectf1;aallyEthe";bossinteristatesiMSeniorJmanagemshtlcannstibsicisafsd:t6 1
thsi")eis1E'of;;[thi;?facillitif bjTNRC, ?asiNRCL can!lonly grant?"QCahd1;"L"Yacdssi l
l 50thorif 2stlofisEsndlfic11itieslLareisla5si.flsdiasJSscretMToplSehretUstel.:.
1 PsenapsisedisFTinahagsmentscoul'd;be cisareditola /levellebmme6sorateiw.ithEtn56 6fithEZf6E11.ity?cissrinde!"
l RispohseidSestib6.!;l95!181ha si bsen; Fev i sed?to Trefl ects tha t? sen i or
~
inasaisiisstist11*bs31'Ea'reditoLA leVelfc5mensurateLWith tha'ti;of thi3idility 1
14 I
i I
cisararidst Commenti:,:xThs':commenterjis:-. concerned L h' t' the reqdirsment to; chang'e
~
ta seedF i tyicontit he ridoebi nit'i ons. on'ce eve'Fy :112 L monthsiexceed s.t. the :freqU i remeht s C
ofsth61NISP00 Responsn iSebbien195,25(c)(2)(v)lhas tieen7dslitsdL.Lsliidihating this T
~
reg'OirsmentS C6mmsnti 5 TheTcomnfsster 'is: concerned'thatdocumentsTclassif f ed.lfrsni inul ti pl eisou rce s iil llndt3.ha ve a n ?adequa t e. record 'of Ghat 2those;sou'rcss3erei Spsci fi call yZthe commente r' st'a te s, "Sugge st a' ~' sentence L bei a dded ?t ofi nd icst e tnat bn Tdocument':marksdfmultiple. so0rces' thatithe multihle::soilFcessmust(tje 2
identifiedJinL their'ecords copy Tof the':: document."
Rssp6ns6iEThsissggestsd$revisionJ1 sial ready.;lcontAihe'd hin
$95i3'fci(1)(ivR 7
' ommehk 1Thsic6mmentar Lisrconcernedisbodf3neluseT6fithe; termdperson" C
i ni ss s ociitibnWi t h ?a? fa cil i tp~ 61 s a ra nss i e nd T:t hs t S t heild e fin i t i on f off fs si l i ti cl ea r(a nce i s ho 01 d. be : mo reld stsil ed.
Resisonsei11tfii s ' el eaEff rom L thes de fi nitionstand s thsj contsNt :thaE!any jibissis66?dffs7f a c11 1 ty?ci sa r a nceTi si o bl i g a t sd it6!.i mmeE9 el yI re pbit3 s h t's i n typisUsCiifo rka tionMThbTd s fi ni t'i o n M fic 10 t93 se 6 u fi ty Ral e a ra ncd" [i s:9 sis rb s t iiiTsfFa ettf f ons t he;;N 1 S P0Ca nd ? t heid sfi n i t i onl o ff! "jisi s6n "Tss sd 3li nllPir t'
~
950 sNiil l sF.lfds f iin edit hro u g h6u tl10 L C F Ria hd ? h Asiltie'e nlu s sd Ef 66;.'m a nKy ea rs 15
LithdUticonfusionjasito71ts ' meaning.
IIIC The: F Inal ? Rule i
Wilh 5theisx6sption;; ofJ.the'fotslitemsTadd ressed"undsrl " Comment s Toniths PropbsidiRaleMind.?iTsifghtshangeito:theydefinit16nT6ff" Visit Autho'rizstion letssE*Eid[S25!52theLffihalj rule is'"ths~samelssTthsTproposed r01e. Si hs T
speci f fhCEha nge s!'f romi the j p ropo sed fr'ul eia re--
Thi:pF6p6 sed::rssisi6nsCt6::SS25115 ahdi95:35$hivelissensithdFsuni 4
Ths~;;dsfiniti.6M6f?CSWith!10 CFRfParts 25Tsnd 95]has bsen revissd;ta j
ref1schlithitstheiC W 1s 2thefagencyLshicWexersisesprimirylasthoriff[f6riths protecti oW:afithelcl alsi fi d..i nformat 16nia tTthef f acilLi.tyiand : i s Jthe lsdsn6y kith whidhitheffacilitE91ntiractsLin!these matters; Thefdsfiniti6n;of/ V1s'it-.Authorizationiletter" in $25;5; haw bseni evised r
to? cia ri fyT thatl such:Ja?l stter Li sl only requ frsd L fori.idfoFmati on Tspec ifi cally felatedXt67 thellicenssHcertificateL orfolher[NRCfprogfsf at!:theifsd111tsh
~
SistTbn?25l17jhas%een:::~amendedito f requi re falfacil i tfNifhf a ?CSAlf othir t hinlN.RCHtMid s i ssithsiN RC) w hen [i tTs ubmi ts j a n li nd i vid da lifo r 'a h #a cce s s
)
i s0thofiistioEfor3aEcessitoiNRC clasiifisdiinf6rmstiodd6utTndi Iwhenilfne fic i.1 1ltiJbbm i t hTa c0e ssTa d t het i z a t i o nL: r#q u e s t s1f o Ma EEe s s 5 t 6 t h e l el s s's.!fi sd i n fo rina t i oni sfdth e f 6t heEs pe n cy :f i
02C15(b S Se6t16n195131(bFanM 35 (al:! M U ( A Rhasibeenf revisedit6 d si sfilihsife rm ?" C Ei tih51 [Se6 ret ( Rs st r i ctid? Ds ts " 'Andli re p l a de li t!Lwi thli hihirisidisdfipti6nI6CthiitypeTof:1datalitiwasli.ht'endeditojrdtset;
$iction?25117(dl(1RiRhasibsenTm6difief tEslir1fylthatifadnity
~
isIUMty?pifi6ndellifeIh6Ctsirsyiss!PaFt 2?off thi[.SUB6;f 9
Sect foss ?50'i3 Mis 054717 ( g E hivsibs e n3: a me nd sd liif clifi ffith a ticbmpl i a nEs 16
- i si;f h[ 10TC F R)ILP'a Et7253Aa fi s fie s/ t h eirlsd di fsMe n tsi d f M OIC F R ( p a rt's ISO Ya nd L
- 54 f; a
i Ss~ct l an395 /3.T haRbeen7 mod i f i edi t oli ncl ud s
- Fofme rlyf Re stri ct Ed [Ds t a 1
QiththHtsiscopeh i
l SssfiBd 95 f15? hisHideHTinod iLf i ed iIt dfel s r i fy);t ha tia rC N RCif a ci litj i
i 61earinseils56dl)2reqbfredEfbEthelluiselori passessibhMfiNRC[c1 Assifi$d J
[
- i n f 6Emst i dhIA t3t hif f sci l.;l tfi q c
s
$ bit 16nE95!171a )l 2Xa ndi95!59 [ h sv e %iinire fi s sd it o} $6a 6 ge3 " s u?v s9Mt'd V
b
"?EWeV(2 l
4 nn.
vne
.reflecfi. h~at;seniortmanagementRJ..illibe.-
... ~,,,
v.
Section:495 ?l82 hLa s2 b,eeni revi selii. to) m..w.
.. t 1
J f
cl, As A.%:.+d. y t'r-..y.wvA-:,)
'4 v *.,.'are i ola; eve 1ve-3'0mme n s' efu ra t"e. J.,n..w l t'h i.; t hef f a b 11,i tylcl e...ea ra nceira th.-JerethA.a nn' t' o v
e-.
rr,//-a.,
-.a t.e.syg>..s.v..
r
.v,
- .y t-A-
+
- e i
i f
thif fe V eli[6f " lt h eif aEi l iitylfi e a ra" dadd7 i
Sect 16ni951251;hislbeen:: rf adtt'o elikinst~elthe (EsgsiremshtLfdr:Fchinging' f
secu'rif9?contsinericombinations;6ncefeverfitkslye'monthM 1
i
^
15fnal l f B u s i ne s s l Reg ul a to ry T En fo rlcemen t if a i rne s s?^~ct 1
4 I v,... w:
ntaccord a~n.
,.,i thithef 5 ink 11180.,.
..v....
.. _,_..sinessiRegul atory:;Ehforcementifai,rne.....ss ceiw
~,,......
j l
Asti6f21996Mthi[NRC[hiiidstssminsdithat(thislactif631sinbtEaiiiiajbrfruls?hhd
?
l 6a s3 sri;fi siisthiil d esirmi h a ti oh. wi thst hi.iO f f ib e J o M Inf 6rm df 16 n7A nd[Ridill a t o F)
AffiEsf6ff0MB7 i
Environmental Impact:
Categorical Exclusion The NRC has determined that this propcsed f.inal rule is the type of i
j action described in categorical exclusion 10 CFR 51.22(c)(2).
Therefore, neither an environmental impact statement nor an environmental assessment has i
i been prepared for this proposed finkll rule.
i i
17 1
4 4
}
z,.,
~..
m m
t k
l 8
i Paperwork Reduction Act Statement j
This proposed fihil rule amends information collection requirements that
)
e are subject to the Paperwork Reduction Act of 1995 (44 U.S.C. 3501, et seq.).
i
\\
These_irequireme..._ -
-...nts?.were;approvedibyTthe;0ffi - f. Management,2and b~
i
, 2 Budge i
ce;o ;
a i
AppfosiRFuleferR3150200460315030047WiRU3150iOO50. This rule has been i
4, I
)
subettted ts!the Office of tiensgement end Oudget fcr review and epprovsl of i
the informetica ccliection requirements.
I I
The public reporting burden for this collection of information is i
j-1 j'
estimated to average.5 hours5.787037e-5 days <br />0.00139 hours <br />8.267196e-6 weeks <br />1.9025e-6 months <br /> per response, including the time for reviewing
)
1 1
instructions, searching existing data sources, gathering and maintaining the-
)
I data needed, and completing and reviewing the collection of information. The i
l
'U.S. ~Nucicer Reguletcry Ccamissicn is seeking public ccament en the pctential l
i
!j
+mpact of the ccilectica cf infccmetica centsined in the prcpesed rule end cn 1
.m_
som
.v.,v.iny
.aousa.
l 1.
Is the picpcsed cclieetica cf informstica necessary fcr the i
J picper perfccmence cf the funct4cas cf the NRC, including j
- t. s_ _
,_e,v___.,__..,,,<_.._____i,__,..,,1...,
.u_
.m.m
., sum
.o imos.vu mo.m y.oso.mo, me..
.,7 1
i 2.
Is the estiaste of burden eccurste?
l Is there e wey to enhsace E quality, utility, and clarity of the inforesticn to be ccilected?
1
)
4.
llcw can the burden cf the informstica ccilectica be e
minimized, including the use of autometed cc11ection d
A
__L_f_..__S b m b 8 3 3 41 g WU J.
Send comments on any aspect of this prepesed collection of information, including suggestions for reducing the burden, to the Information and Records Management Branch (T-6 F33), U.S. Nuclear Regulatory Commission, Washington, 18
DC 20555-0001, or by Internet electronic mail at BJS10NRC. GOV: and to the Desk Officer, Office of Information and Regulatory Aff airs, NE0B-10202, (3150-0046,
-0047 and -0050), Office of Management and Budget, Washington, DC 20503.
Ccaments to 0"3 cn the collections of informatica er en the cbove issues shculd be subettted by (insert-dete 30 days efter publicstion in the rederal Ree+ ster).
Ccaments received efter this dete-will be ccasidered if it is proctical to dc sc, but essur6nce of ccasideration cannct be given to comments received efter this dete-Public Protection Notification i
The NRC may not conduct or sponsor, and a person is not required to 1
respond to, a collection of information unless it displays a currently valid l
OMB control number.
l Regulatory Analysis The Commission has prepared a r egulatory analysis for this proposed l
l final regulation.
The analysis examines the costs and benefits of the f
alternatives considered by the Commission.
I n te re s t ed ; p'e rs on s l mayl ex a m i ne.ja
~
i copy {bfithelregulatoryifhe analysis is sveileble for ;nspection in at[the NRC Public Document Room, 2120 L Street, NW. (Lower Level), Washington. DC.
Single copies of the analysis may be obtained from Duane G. Kidd, Division of Security, Office of Administration, U. S. Nuclear Regulatory Commission, Washington, DC 20555-0001, telephone (301) 415-7403.
l 1
[
Regulatory Flexibility Certification i
As required by the Regulatory Flexibility Act of 1980 (5 U.S.C. 605(b)),
the Commission certifies that this rule, if sdcpted, willl30esMnot have a significant economic impa'ct upon a substantial number of small entities. The NRC carefully considered the effect on small entities in developing this 19 4
proposedifihil rule on the protection of classified information and has determined that none of the facilities affected by this rule would qualify as a small entity under the NRC's size standards (10 CFR 2.810).
Backfit Analysis The hdC has determined that the backfit rule, 10 CFR 50.109, applies to this rulemaking initiative because it falls within the criteria of 10 CFR Part 50.109(a)(1), but that a backfit analysis is not required because this-rulemaking qualifies for exemption under 10 CFR 50.109(a)(4)(iii) that reads "That the regulatory action involves... redefining what level of pro + ?ction to the... common defense and security should be regarded as adequate."
List of Subjects 10 CFR Part 25 Classified information, Criminal penalties, Investigations, Reporting and recordkeeping requirements, Security measures.
102CFRTPaEtI50 A6t i t ristM Cl issifi ed ? i n fo res t [6nL Cr i m l bs Wiensi t i sTWRil'p'F6tedt i 6H?
~
i 16tiFs oilipneshiil !Fel iti6n sR s d61 h a riboue ri p)la ntWa hd if e a cto r MRid'iiYi 6 n pi;6t;s;b ti ssil Reist'o Fissi E f; n gis hi t e eliM Rips ft liiMind Ma d o rdkesp;l n g3 r sh u f Fem en ts 10fCFRIPs'ft154 ndi151TffiUViipFidfi ssishdip FociduFiF Age (F51 atsdidig radiE1667 BIEkut ti'EsECTais l HidM 6f6Eis t isn'R CHIs15aliveHal tissH EsV;i?66mehtsl FfitEsf6iniWS"6Tiif?F6sinsplistifind?Fli2f6EsiMsso Efiig?iEdif sciFdkiipTng' 20
i i
'rehuffem5nts 10 CFR Part 95 Classified information, Criminal penalties, Reporting and recordkeeping requirements Security measures.
For the reasons set out in the preamble and under the authority of the Atomic Energy Act of 1954, as amended, the Energy Reorganization Act of 1974, as amended, and 5 U.S.C. 552 andiS53, the NRC-proposes to i'sladopting the following amendments to
'.0 CFR Darts 25F 50h 54 and 95.
PART 25 -- ACCESS AUTHORIZATION FOR LICENSEE PERSONNEL 1.
The authority citation for Part 25 is revised to read as follows:
AUTHORITY: Secs. 145, 161, 68 Stat. 942, 948, as amended (42 U.S.C.
2165, 2201); sec. 201, 88 Stat. 1242, as amended (42 U.S.C. 5841): E.0.
10865, as amended, 3 CFR 1959 - 1963 COMP., p. 398 (50 U.S.C. 401, note):
E.0. 12829, 3 CFR, 1993 Comp., p. 570: E.0. 12958, 3 CFR, 1995 Comp., p.333:
E.0. 12968, 3 CFR, 1995 Comp., p.396.
Appendix A also issued under 96 Stat. 1051 (31 U.S.C. 9701).
- 2. Section 25.1 is revised to read as follows:
6 25.1 Puroose.
The regulations in this part establish procedures for granting, reinstating, extending, transferring, and terminating access authorizations of licensee personnel, licensee contractors or agents, and other persons (e.g., individuals involved in adjudicatory procedures as set forth in 10 21
CFR Part 2, subpart I) who may require access to classified information.
- 3. Section 25.3 is revised to read as follows:
S 25.3 Scoce.
The regulations in this part apply to licensees and others who may require access to classified information related to a license or an application for a license.
l
- 4. Section 25.5 is amended by revising the definitions Acces.1 authorization and Need-to-know and by adding the definitions of Certificate i
holder, Classified information, Classified National Security Information, Coanizant Security Aaenev, and Visit authorization letters in alphabetical j
order to read as follows:
S 25.5 Definitions.
l Access authorization means an administrative determination that an individual (including a consultant) who is employed by or an applicant for employment with the NRC, NRC cortractors, agents, licensees and certificate holders, or other person designated by the Executive Director for Operations, is eligible for a security clearance for access to classified information.
Cgrtificate holder means a facility operating under the provisions of l
i Parts 71 or 76 of this chapter.
Classified information means either Classified National Security Information, Restricted Data, or Formerly Restricted Data or any one of them.
It is the generic term for information requiring protection in the 22
interest of National Security whether classified under an Executive Order or the Atomic Energy Act.
Classified National Security Informatian means information that has been determined pursuant to E.O. 12958 or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form.
Coonizant Security Acency (CSA) means agencies of the Executive Branch that have been authorized by E.0. 12829 to establish an industrial security program for the purpose of safeguarding classified information under the jurisdiction of those agencies when disclosed or released to U.S. industry.
These agencies are the Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission.
A facilis9[haisf a" single lCSA which exercis'es prim'aryf authority foRihi
~
7 prote6ti6niof Lclassified'information atithe9scility.1Th' lCSAlfo~rf the 3
e facili_typrosides?:securithr-epresentationforlother;igovernmentiagen6tessith securitylinterestsjtitheffacility'. The Secretary of Defense (SECDEF) has been designated as Executive Agent for the National Industrial Security Program (NISP).
w Eged-to-know means a determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information to perform or assist in a lawful and authorized governmental function under the cognizance of the Commission.
6 Visit authorization letters (VAL) means a letter, generated by a licensee, certificate holder or other organization under the requirements of i
10 CFR Parts 25 and/or 95, verifying the need-to-know and access 23 1
authorization of an individual from that organization who needs to visit another authorized facility for the purpose of exchanging cc acquiring classified information related to-Lthellicensel i
- 5. In S 25.8, paragraphs (a) and (b) are revised to read as follows:
S 25.8 Information collection reauirements: OMB aooroval.
(a) The Nuclear Regulatory Commission has submitted the information collection requirements contained in this part to the Office of Management j
and Budget (0MB) for approval as required by the Paperwork Reduction Act (44 U.S.C. 3501 et seq.).
The NRC may not conduct or sponsor and a person is not required to respond to a collection of information unless it displays a currently valid OMB control number.
OMB has approved the information collection requirements contained in this part under control number 3150 -
0046.
i l
(b) The approved information collection requirements contained in this pa rt appea r in SS.25.11, 25.17, 25.21, 25.23, 25.25, 25.27, 25.29, 25.31, 25.33, and 25.35.
- 6. In S25.13, paiagraph (a) is revised to read as follows:
S 25.13 Maintenance of records.
(a) Each licensee or organization employing individuals approved for personnel security access authorization under this part. shall maintain records as prescribed within the part. These records are subject to review and inspection by CSA representatives during security reviews.
- 7. Sectica 25.15 is revised to resd as fclicws.
I 25.15 Accsss carmitted under
'O
L*' cr eau 1 valent CSA occess 24
.+_an.
.,.m..
..a n.e s.
an~..
-n..
.*.--.--.~-..+-a..ww--..z,a-------a,a..w.=-a.n
.a
= n n o, Au.
nsaw-
_n.
n
..ww,
.s_D..~.-.
i 1
8 l ~
...sL__s__r2_
U M L IIvI ! LRL I UII
\\U/ n Ll vi_. _ /* P A
_-.2..i-_A U
I I L Q 6 4 viI
/_\\
A
- n9 9
_2
_A f__
N yCi___N bJn LyuI VW3 %Ii b UbbUJJ
+ 2 1.. s ;.. _, _ _ _ _ _ _ _ vil W I I U c u b v - K i i v es UUJ B J by b' 1 ib3LWi JULI U6 nG J b i IYbcu UI flu 1 Y luuui uYYUJJ __ _ ___;
L__..
L__s-i_
c_
i2__s c____t n__i_2_i_;
n
_xmem.=,m
.m
,c,
m, ; 3.y_.
..a 2, m,,,e.
LE 1 W 4Ew. kv 5,I u b i W U s.. w s u y v i n a y,u n a n y li,,.m u s i u 1 g4&uq.3 i ay ussu,,v uiliv.? u v i.a 4 by J
g
,-u_._, m,_.....,__;..._...m
. i,
.,.......s.........-.
. -... u_..<,. --U..,,
.n_.-..__;
.,. +.. -
... 1 m.#
v.
I.r
_ 6 V 4 N U k. I V I I,., e I s u, bgi_
i b t b u I e a. i, J,,, a 5 g I a 1 hD; E, p u v 9,&, n u b 188_i, y 3, v y W I'OM l
c _<
.,1.c-m _., 7..
j.
.m..
- 7. g,
~,
cg gg. 3.
g.
. 3,.
I.. V M '. U TTT,m1 x e a v i m w p A w,y s... g 5. y.,.. a La s y,, m u q i w I U b & u 4,. I i i y, & U b s s a e v i v y J,/ g e a wviy.ua u Ilu c____.
,. _ _ r., u, eny o,
b,oaa.rs.cu y,v__o.,
2_biuviuv n,_
.~
c_.._,
,_r____.,__
j smbi sm omu
- s. v i.
s i
n u i scbui i v, iuiv, mom,vo o
[
2_a_,ns_____
2 _ z _ _ _ _ s s._
rnunvn i2 bi yyvvysaynib suivimuwivn/
vi__
v u n ef'
__.._t
__.___ui_
s._r____s1
\\
_sL i ii u c i i y u iib u i n i v i m u 6 i vii,
bnir av se.c.,
l
_,___ars_a
____.._s__se___
___.._ss..
r e nu e r r~ 1 s_r____s2__
bI UJJsi IUu bvmmu3I i 4 U b i vii G JUVWi ibJ gbvi6Jbb/
isI4vsmg6 Ivii, I
\\W/
AI6 6
v3__
reA _ _.. _, __. ____ _
.L__,__
,__ ____,. _ UN
,L\\
A_
I.,
bJn CyuI V 9 i UII b Ub4GJJ 434vi I L U b i vil VGI Ill I b J
\\
4Du1 JE2J.,1 vil u I I C C M b u Is a i v vy WuGl J bv JUbi Ub u ilu V IuugI ubbCGJ
_J L _
1._..
L.._
2.
6 -
f___A J
t' v_ i l l B ue -
_[22 h
1 uiooo,rs_; g g gsu__
_1. __ m
_AL__
A L__
AL_
, _ _ f, ;_ _ _ _ _ 2 r f _ _ 1, 1,,..
!, _ _1, u.. J _ j
.N
> Imu n vuoc, vuon som Yo 3vi a arcbi l l s. o ob uuu i
l
________L r_\\
_r mL2_
___A I__
T_
o v uM*
u_
___A
_f_
_Ja 3__
e _ _ r s. u; c_ _ t. Ee+
I poiv3.oro so, vi
- uni, oubeivo.
o
- ivu, o s. m a a uv mi so,o buul o
enuere 2_r____i2 2_
____fui_J Q u blivl sLGu UJ g
nu L__2__;
t..
Mg1 e___.._2__1 4
I J VGi Ill I bLCU UP u_
L UF' J b b I II I v 4 la u 6 I D_I I
b u mill u s t i b y 6 i vit a i
f*___2A a.__
_f..__
e _... 2 A,..
u o ted e _ L _.. _,..
1,,A
- 9. A A f*
J_
smbu, l e bummisscc
.-oiVmi s cuiuo.
sus.
I r\\ r
_L
___1_.._
_ r' A L_
P___2__.2__
t _
________J r__
_r L L, a.._
\\b/
bu bil UmyIvJUG vi L BIG b u mIII I a p I vis sa yivbcaggu avi viig Vi b lic v vv y l
j
,_.._i,_
.t 2. v_ _m.
v L__
______.vm.
_r
_..iL__
i r_____
. __; _i 2, 3,,
- r... _ _ 1, _ L
__ b b.mlieme.
.mu mm, yms ImVmi vi
. s. m e e
.umv.
TU i
u,m
,m e,g o_ _ _ r. r. s. c_ u r, _ r, v_ _ _ o_ t z v_ o_
u im ev _
r= _ _ _ s. o_ _ t _ _ __ bon J
6 _ o ecA
___1_
__ v, r, e, s.. i.
_r
_f_
L..
I____
m m e, v,. _ _
- s. u m m osun vi cm va
- uvaloco, s
L A L _.
___1.
L_
AL_
_______2 A _ i _.
_1 r.. ___ u u viivi : cu u a via uiiu
_..A L_._f_
A f __
__a UU
WJ bc uypi vpi avc i cvci Or abbcaa NI I U l i bilU G Ili p 8 v,.. _ _
_.__1.__
j
___; i_
L_ _..
e___
2_;s.12..3_
____266 _; i.
L__2_
une u m p i vy m c MI-occu wv nuww.
sumu inuiY suvuia usc pcimivwcu vv vuy i si nnb
&L_..&
_..AL-_f
-A f-tI_.._.--
U n /*
_4__.__
1-
..W4 4 4 l v u t, uit ubbcaJ g u bilv 3 ILWbiull, IIvw C V U I &
33V MRb V3__
bdA C 333 F 3 VJ U U iJ
____si
_; ______ i_
_1
_ _ _ 2 r s _ J a _I I r___.s2__
.._iss AL_
_______z_i_
3_._3
[
y%i III I kbEu u4bUJJ 6v U iiJ__.
bI uaJB i 5UM iI vimUbIv3I uII b i I 4siG u yyi vyI IQbq scVC5 i
l l
f ______
_..AL_
L___
_._._A
_J A _
A L_A
___i_
L Unf AL_
PPA o u o nvchefo_
L _ _
m r, v,.. _ _
u,..
ei
- obmo, o
uo, umu 3.onocu mv i. o o s mc m o s.
vi som bon.
l I
- 7. Section 25.17 is revised to read as follows:
1 S 25.17 Acoroval for orocessina aoolicants for access authorization.
(a) Access authorizations must be requested for licensee employees or i
25 4
1 1
t d
other persons (e.g., 10 CFR Part 2, subpart I) who need access to classified information in connection with activities under 10 CFR parts 50, 70, 72, or i
76.
(b) The request must be submitted to the facility CSA.
If the NRC is the CSA, the procedures in $25.17(c) and (d) will be followed.
If the NRC is not the CSA, the request will be submitted to the CSA in accordance with procedures established by the CSA. ThsLNRC$illf6e7nefifieMf; the?reqdest bnallettidthst?l incl 0delsithef nams, Social;fseWritylhuinber?snd.:.' level #;olf aceiisiastherizationi.
(c) The request must include a completed personnel security packet (see S 25.17(d)) and request form (NRC Form 237) signed by a licensee, licensee contractor official, or other authorized person.
(d)(1) Each personnel security packet submitted must include the following completed forms:
(1) Questionnaire for National Security Positions (SF - 86, Parts 1 a nd 2 ) ( Pa Ft? 211 s i t o.[belcompl eted by L thefsppl.i ca ntia nd ipl s'Eed ii nfa7s e a l ed e'niilb;fdiwh'i b hHsit'03sEf o rwa r'd ed $.t'o[;! N RCiu~n o p e nsd k [ N oll i dd n s e e21 1 dhns es contFset'bfl:officiaE fo 66ther0 person 3tiaLfadil'itylis @eFnittdd W r6 Vies paw 2Mnforins'tibn) s (ii) Two standard fingerprint cards (FD - 258);
(iii) Security Acknowledgment (NRC Form 176); and (iv) Other related forms where specified in accompanying instructions (NRC Form 254).
(2) Only a Security Acknowledgment (NRC Form 176) need be completeo by any person possessing an active access authorization, or who is being processed for an access authorization, by another Federal agency.
The active or pending access authorization must be at an equivalent level to 26
that required by the NRC and be based on an adequate investigation not more than five years old.
l (e) To avoid delays in processing requests for access authorizations, each security packet should be reviewed for completeness and correctness (including legibility of response on the forms) before submittal.
(f) Applications for access authorization or access authorization renewal processing that are submitted to the NRC for processing must be accompanied by a check or money order, payaole to the United States Nuclear Regulatory Commission, representing the current cost for the processing of each
0
and
L access authorization, or renewal request. Access authorization and access authorization renewal fees will be published each time the Office of Personnel Management notifies the NRC of a change in the rates it charges the NRC for the conduct of investigations.
Any changed access authorization or access authorization renewal fees will be applicable to each access authorization or access authorization renewal request received upon or af ter the date of publication.
Applications. f rom individuals having current Federal access authorizations may be processed more expeditiously and at less cost, since the Ccmmission may accept the i
certification of access authorization and investigative data from other Federal Government agencies that grant personnel access authorizations.
)
- 8. Section 25.19 is revised to read as follows:
6 25.19 Processina aoolications.
Each application for access authorization or access authorization renewal must be submitted to the CSA.
If the NRC is the CSA, the application and its accompanying fee must be submitted to the NRC Division of Security.
If necessary, the NRC Division of Security may obtain approval 27
l 4
from the' appropriate Commission office exercising licensing or regulatory authority before processing the access authorization or access authorization renewal request.
If the applicant is disapproved for processing, the NRC Division of Security shall notify the submitter in writing and return the
)
original application (security packet) and its accompanying fee.
i
- 9. Section 25.21 is revised to read as follows:
i I
6 25.21 Determination of initial and continued eliaibility for access authorization.
)
(a) Following receipt by the CSA of the reports of the personnel security investigations, the record will be reviewed to determine that granting an access authorization or renewal of access authorization will not j
endanger the common defense and security and is clearly consistent with the national interest, if this determination is made, access authorization will be granted or renewed.
If the NRC is the CSA, questions as to initial or continued eligibility will be determined in accordance with Part 10 of Chapter 1.
If another agency is the CSA, that agency will, under the requirements of the NISPOM, have established procedures at the facility to resolve questions as to initial or continued eligibility for access authorization.
These questions will be determined in accordance with established CSA procedures already in effect for the f acility.
(b) The CSA must be promptly notified of developments that bear on i
continued eligibility for access authorization throughout the period for i
which the authorization is active (e.g., persons who marry subsequent to the 1
completion of a personnel security packet must report this change by submitting a completed NRC Form 354, Data Report on Spouse or equivalent CSA form).
I f
28
t I
(c)(1)
Except as provided in paragraph (c)(2) of this section, NRC "0"
and "L" access authorizations must be renewed every five years from the date of issuance.
An application for renewal must be submitted at least 120 days before the expiration of the five year period, and must include:
(i) A statement by the licensee or other person that the individual continues to require access to Classified National Security Information or Restricted Data; and (ii) A personnel security packet as described in S25.17(d).
(2)
Renewal applications and the required paperwork are not required for individuals who have a current and active access authorization from another Federal agency and who are subject to a reinvestigation program by that agency that is determined by the NRC to meet the NRC's requirements.
(The DOE Reinvestigation Prog.am has t?er determined to meet the NRC's requirements),
For these individuals, the submission of the SF-86 by the licensee or other pirson to the other government agency pursuant to their reinvestigation requiremerits will satisfy the NRC renewal submission and paperwork requirements, even if less than five years has passed since the
]
date of issuance or renewal of the NRC "0" or "L" access authorization. Any NRC access authorization continued in response to the provisions of this j
l paragraph will, thereafter, not be due for renewal until the date set by the other government agency for the next reinvestigation of the individual pursuant to the other agency's reinvestication program.
However, the period of time for the initial and each subsequent NRC "0" or NRC "L" renewal application to the NRC may not exceed seven years.
Any individual who is subject to the reinvestigation program requirements of another Federal agency but, for administrative or other reasons, does not submit reinvestigation forms to that agency within seven years of the previous 29
submission, shall submit a renewal application to The NRC using the forms prescribed in S 25.17(d) before the expiration of the seven-year period.
(3)
If The NRC is not the CSA, reinvestigation program procedures and requirements will be set by the CSA.
- 10. Section 25.23 is revised to read as follows:
S 25.23 Notification of arant of access authorization.
The determination to grant or renew access authorization will be furnished in writing to the licensee or organization that initiated the request.
Upon receipt of the notification of original grant of access 6
authorization, the licensee or organization shall obtain, as a condition for grant of access authorization and access to classified information, an executed " Classified Information Nondisclosure Agreement" (SF-312) from the affected individual.
The SF-312 is an agreement between the United States and an individual who is cleared for access to classified information. An employee issued an initial access authorization shall execute a SF-312 before being oranted access to classified information. The licensee or other organization shall forward the executed SF-312 to the CSA for retention. If the employee refuses to execute the SF-312, the licensee or other organization shall deny the employee access to classified information and submit a report to the CSA. The SF-312 must be signed and dated by the employee and witnessed. The employee's and witness' signatures must bear the same date.
The individual shall also be given a security orientation briefing in accordance with $95.33 of this chapter.
Records of access j
authorization grant and renewal notification must be maintained by the licensee or other organization for three years after the access authorization has been terminated by the CSA.
This information may also be 30
1 furnished to other representatives of the Commission, to licensees, j
2 contractors, or other Federal agencies.
Notifications of access authorization will act be given in writing to the affected individual except:
i (a) In those cases in which the determination was made as a result of a Personnel Security Hearing or by Personnel Security Review Examiners; or (b) When the individual also is the official designated by the licensee or other organization to whom written NRC notifications are forwarded.
- 11. Section 25.25 is revised to read as follows:
S 25.25 Cancellation of reauests for access authorization.
When a request for an individual's access authorization or renewal of access authorization is withdrawn or canceled, the requestor shall notify the CSA immediately by telephone so that the full field investigation, National Agency Check with Credit Investigation, or other personnel security action may be discontinued.
The requestor shall identify the full name and date of birth of the individual, the date of request, and the type of access authorization or access authorization renewal requested.
The requestor shall confirm each telephone notification promptly in writing.
- 12. Section 25.27 is revised to read as follows:
S 25.27 Reocenina of cases in which reauests for attess authorizations are canceled.
(a) In conjunction with a new request for access authorization (NRC Form 237 or CSA equivalent) for individuals whose cases were previously canceled, new fingerprint cards (FD - 257) in duplicate and a new Security 31
l l
Acknowledgment (NRC Form 176), or CSA equivalents, must be furnished to the CSA along with the request.
(b) Additionally, if 90 deys or more have elapsed since the date of the-last Questionnaire for Sensitive Positions (SF - 86), or CSA equivalent, the individual must complete a personnel security packet (see S25.17(d)).
The CSA, based on investigative or other needs, may require a complete personnel security packet in other cases as well.
A fee, equal to the j
amount paid for an initial request, will be charged only if a new or updating investigation by the NRC is required.
- 13. Section 25.29 is revised to read as follows:
S 25.29 Reinstatement of access authorization.
l l
(a) An access authorization can be reinstated provided that:
(1) No more than 24 months has lapsed since the date of termination of the clearance; (2) There has been no break in emplo'yment since the date of termination of the clearance; i
(3) There is no known adverse information; (4) The most recent investigation must not exceed 5 years (Top Secret.
- 0) or 10 years (Secret, L); and (5) The most recent investigation must meet or exceed the scope of the investigation required for the level of access authorization that is to be reinstated or granted.
(b) An access authorization can be reinstated at the same, or lower, level by submission of a CSA-designated form to the CSA. The employee may not have access to classified information until receipt of written confirmation of reinstatement and an up-to-date personnel security packet 32
will be furnished with the request for reinstatement of ar. access authorization.
A new Security Acknowledgment will be obtained in all cases.
Where personnel security packets are not required, a request for reinstatement must state the level of access authorization to be reinstated and the full name and date of birth of the individual to establish positive identification.
A fee, equal to the amount paid for an initial request, will be charged only if a new or updating investigation by the NRC is required.
- 14. In S25.31, paragraphs (a) and (c) are revised to read as follows:
S 25.31 Extensions and transfers of access authorizations.
(a) The NRC Division of Security may, on request, extend the authorization of an individual who possesses an access authorization in connection with a particular employer or activity, to permit access to
]
classified information in connection with an assignment with another employer or activity.
(c) Requests for extension or transfer of access authorization must state the full name of the person, his date of birth and level of access authorization.
The Director, Division of Security, may require a new personnel security packet (see S 25.17(c)) to be completed by the applicant.
A fee, equal to the amount paid for an initial request, will be charged only if a new or updating investigation by the NRC is required.
- 15. Section 25.33 is revised to read as follows:
S 25.33 Termination of access autharizations.
(a) Access authorizations will be terminated when:
33
).
(1) Access authorization is no longer required; (2) An individual is separated from the employment or the activity for which he obtained an access authorization for a period of 90 days or more; i
or (3) An individual, pursuant to 10 CFR part 10 or other CSA approved i
adjudicatory standards, is no longer eligible for access authorization.
1 (b) A representative of the licensee or other organization that employs the individual whose access authorization will be terminated shall immediately notify the CSA when the circumstances noted in paragraph (a)(1) or (a)(2) of this section exist; inform the individual that his access authorization is being terminated, and the reason; and that he will be considered for reinstatement of access authorization if he resumes work requiring it.
(c) When an access authorization is to be terminated, a representative i
of the licensee or other organization shall conduct a security termination briefing of the individual involved, explain the Security Termination Statement (NRC Form 136 or CSA approved form) and have the individual complete the form.
The representati.2 shall promptly forward the original copy of the completed Security Termination ctatement to CSA.
- 16. Section 25.35 is revised to read as follows:
4 S 25.35 Classified visits.
(a) The number of classified visits must be held to a minimum. The licensee, certificate holder, or other facility shall determine that the visit is necessary and that the purpose of the visit cannot be achieved without access to, or disclosure of, classified information. All classified visits require advance notification to, and approval of, the organization to 34
1 be visited.
In urgent cases, visit information may be furnished by telephone and confirmed in writing, r
(b) ' Representatives of the Federal Government, when acting in their official capacities as inspectors, investigators, or auditors, may visit a licensee, certificate holder or other's facility without furnishing advanced i
notification, provided these representatives present appropriate government 1
credential s upon arrival.
Normally, however, Federal representatives will i
provide advance notification in the form of an NRC Form 277, " Request for Visit or Access Approval," with the "need-to-know" certified by the i
appropriate NRC office exercising licensing or regulatory authority and verification of NRC access authorization by the Division of Security.
(c) The licensee, certificate holder, or others shall include the following information in all Visit Authorization Letters (VAL) which they prepare.
(1) Visitor's name, address, and telephone number and certification of the level of the f acility security clearance; (2) Name, date and place of birth, and citizenship of the individual intending to visit; (3) Certification of the proposed visitor's personnel clearance and any special access authorizations required for the visit; (4) Name of person (s) to be visited; (5) Purpose and sufficient justification for the visit to allow for a determination of the necessity of the visit; and (6) Date or period during which the VAL is to be valid.
(d) Classified visits may ber'arrarged for a 12 month period. The requesting facility shall notify all places honoring these visit arrangements of any change in the individual's status that will cause the 35
visit request to be canceled before its normal termination date.
(e) The responsibility for determining need-to-know in connection with a classified visit rests with the individual who will disclose classified information during the visit.
The licensee, certificate holder or other facility shall establish procedures to ensure positive identification of visitors before the disclosure of any classified information.
PARG 50h-LDOMESTICRICENSING10F; PR00UCT10NTAN0; UTILI ZATION' FACILITIES?
17 k.;Th'e';ssUth'oFitkfcitation forJPart.'501iCrevised7 69ead a5.;;folMpd t
AUTHORITY i 1See s.::i102,-!103, ; 104,1; 105, - 161" :!182 k183, f 186,1189':; "68 L Stat.
936M 937 D938,L9482953,l:954, 955l 956','asfamended.fses. 23.43L;;83LStht.F1244;
'a siamendedi(42"U.,S C.. 2132,f 2133, ' 2134', ' 2135, -2201,.: 2232, ;2233, l: 2236L 2239, 2282)M iecs%201.fisi.amsnded,L202, 206,188'Stati 1242,;-asiamended 21244,
.1246342iU!S!CL 5841,::: 58'42;; 5846), ~ E.0.': 12829,:; 3l CFR 2 -: 1993LComp.,4p; 570i E i 0 h:jl 29581 f s sla me nd sd ; I 3:. C F R,.11995~ Comp..? p. 333 s lE00 %l129681,1 3"CFRi11995 Com%..:p0391h Ssht16 nib 0 M al'ss:-issued ~underLPub. LLC 954601,lsec;E10,1922;
~
~
Stati:2951 R4210'JSiC.t;;5851). SestionI50.10?al's611ssuedlundentsecs E 101 21855
~
~
68TStatH955l:J.'asf a'mendeds(.42' U.S'.C.; 2131 F 2235),1sec%102 U; Puts C 912190 L 83 Sta t2853R4210 iS? C E4332 ) : i S d e t i on si 50.'13h 50'.' 54 ( dd f, la nd t 50 ? 103;:.. al's o issuediUndeE sech 108,J681statl2939h;as7amsndedi(42l0.S.Ci:;2138X TSectisns i
50!2325013517502551land'50'. 56Ysis 611 s su ed l bnd e ri s ec1185h 68f Ststi:; 955 :::( 42 0;STCM2235MSoctishsiS0!33a",f 50 55af and) Appeddf E0 ?alsofissUed ;undernecl 1021iP6612 C 919190 E83TStsti 853f(42?UiSiC#4332)!:? Sections:;50!34fsnd?50?54 sli6MsssedNhd e r2 se6M 204, f 88 ?Sta tOj l 245 R42 / 0! S : CU 5844 ) O Se ct i on's! 50. 58, 5039 Cisd! 50192[il solli s sisedlUnd e r J Putn L 039'71415F;96 : Sta ti :; 2073i( 42lUTSECO l
36 j
_.. ~. _ _. _ _. _ _....
1 2239 M5 sit'i sn?50278 Eil io.'li s s U ed ifu nd e rl s's e d122 ; 168 ISt a tM939 ( 42T U ; SICi i
2152RSest16hil50:80 M50 ; 811si so Li's s ued;:: uhde ss edi 1184 368'.LS t a t ;i954, f a s aieha sd R42? 0?S!C.V 2234 R;f)p p e nd iU6al s o O s s ued.;Lhhde rfs e c f; 187 W68 LStatt 955M W UiSlCf22375 4
4 181; CSsiit i'o nJ50 ; 37sti re v i s ed {t el fia d ia s ?f ol;1 oW s i' i
i j
C 50137? Aiisekmen F l f s i t i ha i a ce sh t oV Cl i s si fied I n f o rmit i 6h ASIIsFO3flifsi's ppl idst'i on f a nd dhi ahyisy sntibdf oFslt h sir eisi ktidf
~
Na t i nns115ecu ri tWi nf 6' sa t I oW(;'66 t hD s s sirice j
{
RsstFj dt'edF0stal:6dslissif Gid r
dflalicen5E4riconstFustionTpsrsitEtheJapplicant5.shs11 agreeCinishiting 7
thatVt&G111? net 9ermit"ahyif ndividual.fio%ivel access fojb6l;a'nyMacility'lt6 4
posses 51Restfieted Dat'sforLclassifiei Nitional Security:;Infbrmationiuntil t h'sJnd i sil d usilahd /o r:lf a c i l i ty T ha sL b e enl'a pp rov ed ifo ri:s uchf ahdis sYbnd sblt h s provisionsI6f310;LCFOPaEtsl25 and/oE95) ' Thelagreem' nC6fithe;.Lsp511h'antiih 7
e 1
t h'i sTr e girdi s hi.1.1? tis id eem e d i'p a r to ff t h e'S11 cs n s el:6E chri s t Fu c t i o n': p e Fm i tV shit he E:: s435 tit ed i.the r ei nTo rin oti PA RT15'41FF[R EQUI R EM E N T S {FO RT R E N EW A L90 F10 P E RAT j N G LO C E N S E'SMO R ? NO~C LEA RiPOW E R 4
Pl^NTS i
d 19MThefa utb661 tVIe i ta ti bn f fprf Ps rt 54 M sSt svi ssdEtd[Fiad fisif alloWij T
l Ahnio f i tid $ sciM 02 U 103 U 104 d1'61M181M182H163 R186189 E681Sta ti l
936Z93 M9.38 N9467i953 W 954 H 955 Ma sis niindsd Ms e e M23f,iB3Est'a tW124Efis EnshdidR42 M SiCli2132D 21330 2134 Z2135 J22011.[2232 2 2233 H 2236% 2239$
2282TKisds1201M202M 2065881 Sta tG1242 M 244 W a ilains nd ed R 4210TSICE 58.41}
}
'5842 WICCiB1282923ICF R751993 f CdipidbH 570R Ei 0ld12958 H3IC E Ri3995 fCospli 37 J
s 4
4
lit 333 i ?C0is1296853?C F RG I9951Cem p i,$E391.
~
20$ID hlS 5M7 HTifrsiiriphl g Gin?e Hssd?tsire s di: s sIfo1LibW s i O B4T17FF11ir EGf?a"o611bifieri N
i O
fiWiTsiERifli tsi~sEp1 i ca t 16ntindM K?ijifisistititis f 6FsitWsRss^di EMof Resif16fidiDifiT6EN1Islined ?N5ii 6na ldSicuriiE[lifffiiist fasl66Dii3sidi6cs 6fliRsHsusdj]j h'sE5Gth^ sis h pi lldiiit$s hAl EsifssHiGWB;t'lWgit hi ts).tifs 111Ed56 j
EEfisiDhiliWdIEid6515f05hiVeTabc$ s SNOT 6ds 5FEf aEM I fyEEdii6s siis Ris thi stid [0s t sid fsi ass 1 fisd ( Nh t i bhs MS sed di fy?I n f 6 rmit i chTU n t i Mths lWdliid dillend /6 r3 Acj litil haF b e e nllajipfoisdif dr7 s 0 c hla ss e s s?IU dd e ffths p F0V.ils iansI6fs10 h C F R epa ess95?h nd/s r! 95'l Ths7sgh e emshRefEt hiFsppTibiribl1s EWiiEEesa FdEs h'a 11Y6s?d semed i p a f t?arnthell i cen sefo r?do n sEFacti ondirni! t1 W h'stheF3sdi s t s t Ed Et h6 Est ni o fi h oti l
PART 95--SECURITY FACILITY APPROVAL AND SAFEGUARDING OF NATIONAL SECURITY INFORMATION AND RESTRICTED DATA 21.
The authority citation for Part 95 is revised to read as follows:
t 4
AUTHORITY: Secs. 145, 161, 193, 68 Stat. 942, 948, as amended (42 U.S.C.
2165, 2201); sec. 201, 88 Stat. 1242, as amended (42 U.S.C. 5841): E.O. 10865, as amended, 3 CFR 1959-1963 COMP., p. 398 (50 U.S.C. 401, note): E.O. 12829, 3 CFR, 1993 Comp., p. 570: E.0. 12958, as amended 3 CFR, 1995 Comp., p. 333:
E.0. 12968, 3 CFR, 1995 Comp., p.391.
22 Section 95.1 is revised to read as follows:
6 95.1 Puroose.
38 l
1 i
The regulations in this part establish procedures for obtaining security i
facility approval and for safeguarding Secret and Confidential National Security Information and Restricted Data received or developed in conjunction with activities licensed, certified or regulated by the Commission. This part does not apply to Top Secret information because Top Secret information may i
not be forwarded to licensees, certificate holders, or others within the scope of an NRC license or certificate.
- 23. Section 95.3 is revised to read as follows:
6 95.3 Scoce.
The regulations in this part apply to licensees, certificate holders and others regulated by the Commission who may require access to Classified National Security Information and/or Restricted Data a'nd/oh Formefly Restridted10ata-(FRD) that is used, processed, stored, reproduced, transmitted, transported, or handled in connection with a license or certificate or an application for a license or certificate.
- 24. In S95.5, the definitions for Authorized classifier, National Security Information, NRC access authorization, Security facility acoroval, and Security survey are removed and the definitions Classified mail address, Infraction. and Need-to-know are revised and the definitions Access authorization, Classified National Security Information, flassified shiocina address, Closed area, Coanizant Security Acency, Facility (Security) clearance, Foreian ownershio control or influence, Restricted area, Security reviews, Sucolemental Protection and Violation are added in alphabetical order 39
I to read as follows:
.$ 95.5 Definiti m Angess authorization means an administrative determination that an individual (including a consultant) who is employed by or an arolicant for employment with the NRC, NRC contractors, agents, licensees and certificate holders of the NRC, or other person designated by the Executive Director for Operations, is eligible for a security clearance for access to Restricted Data or Classified National Security Information.
Classified mail address means a mail address established for each facility approved by the NRC, to which all classified information for the facility is to be sent.
Classified National Security Information means information that has been determined pursuant to E.0. 12958 or any predecessor order to require protection against unauthorized disclosure and that is so designated.
Classified shiocina address means an address established for a facility, approved by the NRC to which classified material that cannot be transmitted as normal mail is to be sent.
Closed area means an area that meets the requirements of the CSA, for the purpose of safeguarding classified material that, because of its size, nature, or operational necessity, cannot be adequately protected by the normal safeguards or stored during nonworking hours in approved containers.
Coanizant Security Aaency (CSA) means agencies of the Executive Branch that have been authorized by E.0. 12829 to establish an industrial security 40
program for the purpose of safeguarding classif,ied information under the jurisdiction of those agencies when disclosed or released to U.S. industry.
These agencies are the Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission.
A f a'cil i ty : fha sia.: si ngl elCSA%hi ckexe rci se s; pFima ryla ut'ho ri ty if o r i hs p'rotecti ori t
o fic'l a s s i f i ed Li n f o rma t i 6n f a t?: t h'e?. f a c i l i t y. (TheECSAlfdr/thelfscil.itylproYides secuNisyZrepresbntationiforf otherigovernment? 'ageniies sith3scurity.inteFe'sts
~
afTtheilfasility! The Secretary of Defense has been designated as Executive Agent for the National Industrial Security Program.
Facility (Security) Clearance (FCL) means an administrative determination that, from a security viewpoint, a f acility is eligible for access to classified information of a certain category (and all lower categories).
Forelan ownershio. control. or influence (FOCI) means a foreign interest has the power, direct or indirect, whether or not exercised, and whether or not exercisable through the ownership of a U.S. company's securities, by contractual arrangements or other means, to direct or decide matters affecting the management or operations of that comoany in a manner which may result in unauthorized access to classified information or may affect adversely the performance of classified contracts.
Infraction means any knowing, willful, or negligent action contrary to the requirements of E.0. 12958, or its implementing directives, that does not comprise a " violation," as defined in this section.
Need-to-know means a determination made by an authorized holder of classified information that a prospective recipient requires access to 41
J 4
specific classified information in order to perform or assist in a lawful and authorized governmental function under the cognizance of the Commission.
Restricted area means a controlled access area established to safeguard classified material, that because of its size or nature, cannot be adequately protected during working hours by the usual safeguards, but that is capable of being stored dur oq non-working hours in an approved repository or secured by other methods approved by the CSA.
Security reviews means random security reviews of cleared facilities conducted to ensure that safeguards employed by licensees and others are t
~
adequate for the protection of classified information.
Sucolemental Protection means additional security procedures such as intrusion detection systems, security guards, and access control systems.
Violation means any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosu of classified information or any knowing, willful, or negligent action to classify or continue the classification of infor-ition contrary to the requirements of l
E.0. 12958 or its implementing directives.
I l
- 25. Section 95.8 is revised to read as follows:
l 6 95.8 Information collec. tion reauirements: OMB accroval.
1 (a) The Nuclear Regulatory Commission has submitted the information i
collection requirements contained in this part to the Office of Management and i
S Budget (OMB) for approval as required by the Paperwork Reduction Act (44 42 i
J U.S.C. 3501 et seq.). The NRC may not conduct or sponsor and a person is not required to respond to a collection of information unless it displays a L
currently valid OMB control number.
OMB has approved the information collection requirements contained in this part under control number 3150-0047.
1 (b) The approved information collection requirements contained in this part appear in SS95.11, 95.15, 95.18, 95.19, 95.21, 95.25, 95.29, 95.33, 95.36, 95.37, 95.39, 95.41, 95.43, 95.45, 95.47, 95.53, 95.57.
- 26. In S95.13, paragraph (a) is revised to read as follows:
1 l
6 95.13 Maintenance of records.
~
i (a) Each licensee, certificate holder or other person granted f acility clearance under this part shall maintain records prescribed within the part.
]
These records are subject to review and inspection by CSA representatives during security reviews.
s s
s s
s 27 In 695.15, paragraphs (a) and (b) are revised to read as follows:
3 S 95.15 Acoroval for orocessina licensees and others for facility clearance.
(a) A licensee, certificate holder or other person who has a need to use, process, store, reproduce, transmit, transport, or handle NRC? classified informatior, at any location in connection with Commission related activities 43
l.
i j
1 i
shall promptly request an NRC facility clearance. ThisTspsdifidllyiindiddes i
j
's i tua tions Whisellii;1Li,0ihieeMe elrt i f i estsih ol de s.Lo ff:'6th'ed pe rsorilnsed s b4 c6Ht FEEtid o rIcsss u1TiinEt 6fh a v s ?a cc e s sit b 7N RC ?cl a s s i f l id sliif a rm a t i o nL i
H6WsfEhDCf R60Cnesessilyffor aflice6sseEdert'i ficatelhb1 decor Jother@ersori l
l'0[Fei0iif5 sn? NRCifidil ii)I cl ei ra nce if 6rf a sce5 si o l a noths s:sge nch M1 a s s i fi ed t
j h f6'rmit'16n2ifilhittig e ncy ' sIf a c i l i li e sidUt'Of s tWr elth a tiaie~n dyR01sist f1ed 4
l
'i Efd riiid oslif 31hil'rlf A611 i $9', j p r'o El d Ed?do ? N RC cl'a's S i f lie'd Ei'n f 5 rm a t i b rC1 i
~
d l
167619sdis h'dit he9?msstJt h e!isc U ri fMed ufr eme nt sj 6 fit h e fo t hsFfa din dy21 flN RC hliis{f t's3315foriistlhiiMMinv' lwd [thelsq61femisisiif!59f175spp172" j
(b) The request 'must include the name of the facility, the location of the facility and an identification of any facility clearance issued by another government agency.
If there is no existing facility clearance, the request 1
must include a security Standard Practice and Procedures Plan that outlines i
the facility's proposed security procedures and controls for the protection of 1
I classified information, a floor plan of the area in which the matter is to be a
1 used, processed, stored, reproduced, transmitted, transported or handled; and i
Foreign Ownership, Control or Influence information as required by S95.17(a).
i b
1 I
l 28.
Section 95.17 is revised to read as follows:
i a
i S 95.17 Processina facility clearance.
j 2
i j
(a) Following the receipt of an acceptable request for f acility clearance, i
i the NRC will either accept an existing facility clearance granted by a current I
CSA and authorize possession of license or certificate related classified i
i information or process the facility for a facility clearance.
Processing will 44 a
w
- - ~,, -,
.-,.s
.a
~w.
t i ncl ud e- -
(1) A determination based on review and approval of a Standard Practice and Procedure Plan that gednting of the Facility Security Clearance would not be inconsistent with the national interest, including a finding that the facility is not under foreign ownership, control, or influence to such a degree that a determination could not be made:
(2) An acceptable security survey review' conducted by the NRC; J
(3) Submitting key management personnel for personnel clearances (PCLs); and (4) Appointing a U.S. citizen employee as the facility security l
officer.
(b) An interim Facility Security Clearance may be granted by the CSA on a temporary basis pending completion of the full investigative requirements.
- 29. Sections 95;18Tarid 95.19 -sre redestgriated LasiSS95,19' andJ 95.20,'
30L JA new $95.18 is added to read as follows:
6 95.18 Kev nersonnel.
The senior management official and the Facility Security Officer must always be cleared to the ahlevel c6mmensbrat'elwithief the Facility Security Clearance.
Other key management officials, as determined by the CSA, must be 45
l 1
i granted e-perscnnel security clearsace 'an access-'a0thorization or be excluded from classified access. When formal exclusion action is required, the organization's board of directors or similar executive body shall affirm the following, as appropriate.
(a) Officers, directors, partners, regents, or trustees (designated by ar.me) that are excluded may not require, may not have, and can be effectively excluded from access to all classified information disclosed to the organization. Tnese individuals also may not occupy positions that would i
enable them to adversely affect the organization's policies or practices in the performance of activities involving classified information. This action will be made a matter of record by the organization's executive body. A copy i
of the resolution must be furnished to the CSA.
l (b) Officers, directors, partners, regents, or trustees (designated by name) that are excluded may not require, may not have, and can be effectively l
denied access to higher-level classified information (specify which higher l
level (s)).
These individuals may not occupy positions that would enable them I
to adversely affect the organization's policies or practices in the protection l
of classified information. This action will be made a matter of record by the l
organization's executive body. A copy of the resolution must be furnished to l
I the CSA.
- 31. Inithe^rieWly redesignated Section Z.10 ; s redesignated-et S95.19, end I
the introductory text of paragraphs (a) and (b) are revised to read as j
follows:
6 95.19 Chances to security oractices and ornredures.
46
(a) Except as specified in paragraph (b) of this section, each licensee, certificate holder or other person shall obtain prior CSA approval for any
)
proposed change to the name, location, security procedures and controls, or floor plan of the approved facility. A written description of the proposed change must be furnished to the CSA with copies to the Director, Division of Security, Office of Administration, NRC, Washington, DC 20555-0001, and the NRC Regional Administrator of the cognizant Regional Office listed in appendix A of part 73. The CSA shall promptly respond in writing to all such proposals.
l Some examples of substantive changes requiring prior CSA approval include--
(b) A licensee or other person may effect a minor, non-substantive change to an approved Standard Practice and Procedures Plan for the safeguarding of classified information without receiving prior CSA approval, provided prompt notification of such minor change is furnished to the addressees noted in paragraph (a) of this section, and the change does not decrease the effectiveness of the Standard Practice and Procedures Plan.
Some examples of minor, non-substantive changes to the Standard Practice and Procedures Plan i ncl ude--
- 32. Thesnekly 3eeth n 05.10 is redesignated et S95.20 and isirevised to read as follows:
6 95.20 Grant. denial or termination cf facility cl ea ra nce The Division of Security shall provide notification in writing (or orally with written confirmation) to the licensee or other organization of the Commission's grant, acceptance of another agency's Facility Security 47
i Clearance, denial, or termination of facility clearance. This information must also be furnished to representatives of the NRC, NRC licensees, NRC Certificate Holders, NRC contractors, or other Federal agencies having a need to transmit classified information to the licensee or other person.
- 33. Section 95.21 is revised to read as follows:
i S 95.21 Withdrawal of reauests for facility cl ea ra nce.
i I
When a request for facility clearance is to be withdrawn or canceled, the requester shall notify the NRC Division of Security immediately by telephone J
so that processing for this approval may be terminated. The notification must identify the full name of the individual requesting discontinuance, his position with the facility, and the full identification of the facility. The j
j requestor shall confirm the telephone notification promptly in writing.
- 34. Section 95.23 is revised to read as follows:
6 95.23 Termination of facility clearance.
(a)
Facility clearance will be terminated when--
(1) There is no longer a need to use, process, store, reproduce, transmit, i
i transport or handle classified matter at the facility; or (2) The Commission makes a determinat' ion that continued facility clearance is not in the interest of national security.
(b) When facility clearance is terminated, the licensee or other person will be notified in writing of the determination and the procedures outlined 48
. ~. _ -
f J
e i
l in $95.53 apply.
4
- 35. In S95.25, paragraphs (a), (b), (c), (d), (g), (h), and (i) are revised and paragraph (j) is added to read as follows:
S 95.25 Protection of classified information in storace.
i i
(a)
Secret documents, while unattended or not in actual use, must be stored in--
(1) A safe, steel file cabinet, or safe-type steel file container that has an automatic unit locking mechanism. All such receptacles will be
' accorded supplemental protection during non-working hours: or (2) Any steel file cabinet that has four sides and a top and bottom (all permanently attached by welding, rivets or peened bolts so the contents J
cannot be removed without leaving visible evidence of entry) and is secured by j
a rigid metal lock bar and an approved key operated or combination padlock.
The keepers of the rigid metal lock bar must be secured to the cabinet by welding, rivets, or bolts, so they cannot be removed and replaced without leaving evidence of the entry. The drawers of the container must be held securely, so their contents cannot be removed without forcing open the drawer.
This type cabinet will be accorded supplemental protection during non-working hours.
(b). Confidential matter while unattended or not in use must be stored in the same manner as SECRET matter except that no supplemental protection is required.
49
- =
(c)
Classified lock combinations.
(1) A minimum aumber of authorized persons may know the combinations to authorized storage containers. Security containers, vaults, cabinets, and other authorized storage containers must be kept locked when not under the direct supervision of an authorized person entrusted with the contents.
(2) Combinations must be changed by a person authorized access to t.he contents of the container, or by the Facility Security Officer or his or her designee. Combinations must be changed upon--
(1) The initial use of an approved container or lock for the protection of classified material; (ii) The termination of employment of any person havir.g ' knowledge of the combination, or when the clearance granted to any such person has been w i t h d r a w.1, suspended, or revoked; (iii) The compromise or suspected compromise of a container or itu l
combination, or discovery of a container lef t unlocked ano unattended; or (iv) At other times when considered necessary by the Facility Security l
Officer or CSA.
l l
(v) I n s ny e ve nt e t l e s s t on c e ev ny-42-moftt+ts.
(d)
Records of combinations. If a record is made of a combination, the record must be marked with the highest classification of material authorized for storage in the container. Superseded combinations must be destroyed.
(g)
Posted information.
Containers may not bear external markings indicating the level of classified material authorized for storage.
A record of the names of persons having knowledge of the combination must be posted 50
1 i
u l
inside the container.
(h) End of day security checks.
(1)
Facilities that store classified material shall establirh 6 system of i
security checks at the close of each working day to ensure that all classified material and security repositories have
- en appropriately secured.
S (2) Facilities operating with multiple work shifts shall perform the j
security checks at the end of the last working shift in which classified 1
material had been removed from storage for use. The checks are not required during continuous 24-hour operations.
i l
(i) Unattended security container found opened.
If an unattendea security container housing classified matter is found unlocked, the custodian or an alternate must be notified immediately. The container must be secured by protective personnel and the contents inventoried as soon as possible but not later than the next workday. A report reflecting all actions taken must be submitted to the responsible Regional Office (see appendix A,10 CFR part 73 for addresses) with an information copy to the NRC Division of Security. The licensee shall retain records pertaining to these matters for three years af ter completion of final corrective action.
(j) Supervision of keys and padlocks.
Use of key-operated padlocks are subject to the following requirements:
(1) A key and lock custodian shall be appointed to ensure proper custody and handling of keys and locks used for protection of classified material; (2) A key,nd lock cor. trol register must be maintained to identify keys for each lock and their current location and custody; (3)
Keys and locks must be audited each month; (4)
Keys must be inventoried with each change of custody; (5)
Keys must not be removed from the premises; 51
= -
1 (6)
Keys and spare locks must be protected equivalent to the level of I
classified material involved:
I (7)
Locks must be changed or rotated at least annually, and must be
]
replaced af ter loss or compromise of their operable keys; and t
(8) Master keys may not be made, a
- 36. Sectior. 95.27 is revised to read as follows:
1 6 95.27 Protection while in use.
While in use, matter containing classified information must be under the direct control of an authorized individual to preclude physical, audio, and visual access by persons who do not have the prescribed access authorization or other written CSA disclosure authorization (see S95.36 for additional information concerning disclosure authorizations).
- 37. Section 95.29 is revised to read as follows:
S_95.29 Establishment of Restricted or Closed areas.
(a) If, because of its nature, sensitivity or importance, matter containing classified information cannot otherwise be effectively controlled in accordance with the provisions of SS 95.25 and 95.27, a Restricted or Closed area must be established to protect such matter.
(b) The following measures apply to Restricted Areas:
(1) Restricted areas must be separated from adjacent areas by a physical barrier designed to prevent unauthorized access (physical, audio, and visual) 52
I into these areas.
(2) Controls must be established to prevent unauthorized access to and i
removal of classified matter.
(3) Access to classified matter must be limited to persons who possess appropriate access authorization or other written CSA disclosure authorization and who require access in the performance of their official duties or regulatory obligations.
(4) Persons without appropriate access authorization for the area visited must be escorted by an appropriate CSA access authorized person at all times while within Restricted "" Closed areas.
(5)
Each individual authorized to enter a Restricted or Closed area must be issued a distinctive form of identification (e.g., badge) when the number of employees assigned to the area exc&eds thirty per shif t.
(6) During nonworking hours, admittance must be controlled by protective personnel. Protective personnel shall conduct patrols during nonworking hours at least every 8 hours9.259259e-5 days <br />0.00222 hours <br />1.322751e-5 weeks <br />3.044e-6 months <br /> and more frequently if necessary to maintain a l
commensurate level of protection. Entrances must be continuously monitored by protective personnel or by an approved alarm system.
l (c) Due to the site and nature of the classified material, or operational j
necessity, it may be necessary to construct Closed Areas for storage because GSA-approved containers or vaults are unsuitable or impractical. Closed Areas
]
must be approved by the CSA. The following measures apply to Closed Areas:
(1) Access to Closed Areas must be controlled to preclude unauthorized access. This may be accomplished through the use of a cleared employee or by a CSA approved access control device or system.
(2) Access must be limited to authorized persons who have an appropriate security clearance and a need-to-know for the classified material /information 1
53
=.
L within the area. Persons without the appropriate level of clearance and/or need-to-know must be escorted at all times by an authorized person where inadvertent or unauthorized exposure to classified information cannot otherwise be effectively prevented.
(3) The Closed Area must be accorded supplemental protection during non working hours. During these hours, admittance to the area must be controlled by locked entrances and exits secured by either an approved built-in combination lock or an approved combination or key-operated padlock.
However, doors secured from the inside with a panic bolt (for example, actuated by a panic bar), a dead bolt, a rigid wood or metal bar, or other means approved by the CSA, do not require additional locking devices.
(4) Open shelf or bin storage of classified documents in Closed Areas requires CSA approval. Only areas protected by an approved intrusion detection system will qualify for approval.
- 38. Section 95.31 is revised to read as follows:
j l
S 95.31 Protective oersonnel.
Whenever protective personnel are used to protect classified information they shall:
(a) Possess an
L
access authorization (or CSA equivalent) if the licensee or other person possesses information classified Confidential National Security Information, Confidential Restricted Data or Secret National Security Information.
(b) Possess a
0
access authorization (or CSA equivalent) if the licensee or other person possesses Criticel Secret Restricted Data rel'afed$ts 1
54 b
nUclearlwe'aponsidesignk manufacturing:and v'Olnerability?information::and herthinLpartiiblsrlyfsensitiveLNaval N0 clear Propulsion. Program.information (e.g..lf0ellmanufacturing Ltechnology) and the protective personnel require access as part of their regular duties.
- 39. Section 95.33 is revised to read as follows:
i 6 95.33 Security education.
All cleared employees must be provided with security training and briefings commensurate with their involvement with classified information.
The facility may obtain defensive security, threat awareness, and other education and training information and material from their CSA or other sources.
(a)
Facility Security Officer Training.
Licensees and others are responsible for ensuring that the Facility Security Officer, and others performing security duties, complete security training deemed appropriate by the CSA. Training requirements must be based on the facility's involvement with classified information and may include a Facility Security Officer orientation course and, for Facility Security Officers at facilities with safeguarding capability, a Facility Security Officer Program Management Course.
Training, if required, should be completed within 1 year of appointment to the position of facility Security Officer.
(b) Government-Provided Briefings. The CSA is responsible for providing initial security briefings to the Facility Security Officer, and for ensuring that other briefings required for special categories of information are provided.
55
(c) Temporary Help Suppliers.
A temporary help supplier, or other contractor who employs cleared individuals solely for dispatch elsewhere, is responsible for ensuring that required briefings are provided to their cleared personnel. The temporary help supplier or the using licensee or other f acility may conduct these briefings.
(d) Classified Information Nondisclosure Agreement (SF 312).
The SF-312 is an agreement between the United States and an individual who is cleared for access to classified information. An employee issued an initial personnel security clearance must, in accordance with the requirements of S25.23 of this chapter, execute an SF-312 before being granted access to classified information. The Facility Security Officer shall forward the executed SF-312 to the CSA for retention. If the employee refuses to execute the SF-312, the licensee or other facility shall deny the emplo/ee access to classified information and submit a report to the CSA. The SF-312 must be signed and dated by the employee and witnessed. The employee's and witness' signatures must bear the same date.
(e)
Initial Security Briefings.
Before being granted access to classified information, an employee shall receive an initial security briefing that includes the following topics:
(1) A Threat Awareness Briefing.
(2) A Defensive Security Briefing.
(3) An overview of the security classification system.
(4)
Employee reporting obligations and requirements.
(5)
Security procedures and duties applicable to the employee's job.
(f)
Refresher Briefings.
The licensee or other facility shall conduct periodic refresher briefings for all cleared employees. As a minimum, the refresher briefing must reinforce the informttion provided during the initial l
l 56
briefing and inform employees of appropriate changes in security regulations.
l This requirement may be satisfied by use of audio / video materials and by f
issuing written materials on a regular basis.
i i
l l
(g)
Debriefings. Licensee and other facilities shall debrief cleared l
l employees at the time of termination of employment (discharge, resignation, or l
l retirement); when an employee's personnel security clearance is terminated, suspended, or revoked; and upon termination of the Facility Security l
Clearance.
t (h) Records reflectin an individual's initial and refresher security s
orientations and security termination must be maintained for three years after termination of the individual's access authorization.
- 41. Sectica 05.35 is revised to reed st f ol l ow s.
i l
i 05.25 Access to classified Informotion
)
l l
(e) Unles5 cuthcriZed by the Ccamissien, a persca subje:t tc the j
l l
reguletichs in this psrt msy act receive cr permit eny indiv+ duel to hsve i
l 6cce33 to Secret cr Ccafidentiel N5ticasi Security Infcimatica cr Restricted Osta unless the incividusi hss.
l l
(1) One of the fclicWing 5CC235 50thori2&bitMtv (i) A U.S. OcVernment gr5nted 5ccesa duthcriz5tica b55ed cn a Single $ccpe I
W l A ll Y Mb b
II E
dd J
b I I
I bO l
I 3 I
eccess ts--
(A)
C r i t i c 61 Se c r e t id'.U t$d dhINUNG[Ud& kcl I3 d 3i h n, [$G d uI15d b b bh[e i$d
..:.n r1reaeec. m ircr n e n u-m irn m r n i1..vra,1.~_ r s&,.:r..r..1s<
w a irt v u ? ssw e, w w ! 9.I wJ.g..I'17.us mv & vvsig.wssw..w s3 wpin.yst w a v u t u s. s y. e v i s a i b s.e s, q w i e s yvwvinus
+
Ioh hhk [IN k N.
I, b I I h
I {
bb hb, h.
57 4
i i
i I
I I
i I
't i
r__rs;__
1_s n__& _n_i; n_i_.
b VII I I u UIf b 4 9 3 I\\U J b i ibbUU
- UUbG, u Ilu l
ins c____i
__; e _ _ r s ; _ _ i z..,
u_us___s e__.._1..
r_i_.___iz__
..u2_t 2 _ _,.. ; D8 gW/ JUb3 Ub uifu V Vii i iuUIlbiU l n Q b I VIIW i gUbui I bJ 4 :i I Vi an g b i VsI w iI i 6 i r i iib i uu I
i i
hteRHenee i nf o rmat i on, C"JMO 'i.e., c ryptog raphi c i nf orme+ ',n ) c r ot4rer
_,._ _,r>_;
b U ruirri u i i I D8, _ _ _
,cnucee,
>_r-__a b I VII J GUbui I 4J \\ bUL EJ 6b /
I Ii i VI Ill G b e
bIUJ@ I i 4Uw i r i.,s uV,.______. 3,ontUm ______
a n e n_.
u_t 2_
nob vn8+
1 sI m
U.s.
U, mimW o b
_a
.... t _ _1 _ o_ t,i V o t
oubov, I
__ uoaqu vo o obbUed l
l A_____.
f* L _ _ l. _
U_A 2___i A _ _ _ _.
- L__L
.=NL i n q u 'i i T
._f__
__J f...J L..
A L.. FeA o
1UJ unu i JJucu vy bnG bsn n3Enby buVbn vi nubivooi n3Unby boUbn
_L
,_;,..,2.._,
c____t n__._,_
n_i_
N i
bil f U I III IbJ Uli 4 Ilu I Y IWHUi ubbC@@
bV JUbi U6 W ilu b Via I I U U 31 b I u 4 n U G 61 IbGUU WG40 8._ ;
c____i c__rma__i: _3
- u_is___,
e__.._st
_ut__
it it_t 3 3u JUblUb U ilu b V il I l u g li b I Q i hub I V4lu I WUbul I bJ..
,_r____
V41853 b 118_1 bilG b 4 il i V I III Q Vil I
l l
A J
f
__L
- _ \\ /1
\\
_r A Lf-
__A f-.-
5Q/\\.%/1 f
NDbGu I II FUi WyI U fil
/\\4 /
Ul bil 3 J J U b b I Vl4 l
i
., nnuren
>_1
____s.._;
i c__rs;__t>iui ntbLaJ 6V bUi buiu l
bvus sucu bVosbb ini vi m a bivii i a yUsmibbUu oJ sa i e/.
i I
i N
V3 iLUM UJ U
ne b i viio i k v M.. _ ! _,. i 3 _ __ _
_ _ J _ __ ;
L..
. u A
1__
1 r* _
c_____2A..
r=___st i__...... _ _ uobcd
- _A _
uii i b o 4 i vii J subus iby b viiiiii i 4 4 U U vi u i U s r
.L _.. _.
s,e
.nn,a i
i gu, uo y sV.
ins a_
t, s_L_;
..___; i _
t.__
r__
it_
r_r____im__
re_.
\\L/
nil UJ WI I ALIUM IIC U u " b V hlIV M iVI blIU iisiVI la u b i VII.
\\WUU n _ r s, _,., _ _ _
cne e,
uUi il i b ivoo, us.s,.
1n1 t' e A
_L
_ _ _ _..GyU i UbI 3 3 biUJ I I biUG@ l I IUw V V b ulilGII b J VI_
SQ b E l IO 3 r._!12L 2__
1r
_1
.__2r2..;
- __..-L
_A
__2_1 5W/
bJn Qf iVVUU JbVI 1
L
___U bV UU bI U n i J ill I b b U u kV b lIU l IIU iV luuW i.
Qi L_
1_____1
,_;,.22.._,
- L\\
P1 ___frf_J f_r____A f__
_.._A
__a.
L_
__1____;
L..
1 f___..
L__
gW/
bIQ@J I I IUU 4 Ii I V I II4 W b i V 8 I II3 u G,
iiV b MU 1 UiGGJUW UJ U
8 I b U ii G U U Vt-_
VbIiUl 1
_..A L__f-_;
f*___f__f__
fUi-____G UII kV G l IJ_..
-_____.___1 A L__
A L__
______1..
._____ u u blIV s IGUu Y U 11till 1 JJ i vil A _
yW4 J Vis a iU I V bilg t b liu li ps yCI IJ ubbC@J I I b G il J U U U rar y B VJ U U J VI V 3 u sI Q i J L..
AL_
r_
_1__2__
is______
_ _ _,... _ _ _ __ VblIUI I Ilu 3
..22.._,
. u W L IIIII I&Uw abbCGJ UJ b ilU b V ellill i JJ lVil.
_it__
1._ ;
.....t__m.._s I_s a_____
- a. _ es
__1rm_;
u 3
c___..2A v_r____t 2__
_ Ag n r-3s______;
5b/ nbbWDJ bV b4 QDGI I IUw n8 te i s U b u i i by a s s i Vi siiu b i vii ob
,,nb-s i b L ii J U v,
i
_ _ _.., _a_;
r
_s1mi2__
t..
a i
_t
______enbubivCJ vf l
srs.Uu __ _Au__..s_t u titMeu
___A vbnLi wia i U3uiubcu i obi i4iUa vy i Up,Ud ii vi bUi b M EA-h g_UimibLUM
.. s i t,
___ sis _; _ _____;____
ene ne
,o obbVI WoobU. i 4, us.sv.
i l
- 40. Section 95.36 is revised to read as follows:
L i
4 d
S 95.36 Access by reoresentatives of the International Atomic Enerav Aaency 4
or by carticioants in other international aareements.
1 s
i d
58 1
e i
i 1
I.
4 P
I
.a.
a.
s.
.a.s a...,
o a.
...a.
.aa x.,
a
>s._.s
..a l
l
?
(a) Based upon written disclosure authorization from the NRC Division of Security that an individual is an authorized representative of the 1
International Atomic Energy Agency (IAEA) or other international organization f
and that the individual is authorized to make visits or inspections in l
accordance with an established agreement with the United States Government, a licensee, certificate holder or other person subject to this part shall permit i
1 i
the individual (upon presentation of the credentials specified in S75.7 of this chapter and any other credentials identified in the disclosure 1
authorization) to have access to matter which is Classified National Security Information that is relevant to the conduct of a visit or inspection. A 3
l disclosure authorization under this section does not authorize a licensee, certificate holder, or other person subject to this part to provide access to 1
Restricted Data.
(b) For purposes of this section, Classified National Security Information is relevant to the conduct of a visit or inspection if--
(1)
In the case of a visit, this information is needed to verify information according to S75.13 of this chapter; or (2)
In the case of an inspection, the information is informetion tc which an inspector is entitled to have access toltheTinformalidri under $75.42 of this chapter.
(c) In accordance with the specific disclosure authorization provided by the Division of Security, licensees or other persons subject to this part are i
i authorized to release (i.e., transfer possession of) copies of documents which contain Classified National Security Information directly to IAEA inspectors and other representatives officially designated to request and receive i
Classified National Security Information documents. These documents must be q
marked specifically for release to I AEA or other international organizations j
59
. ~ _.
in accordance with instructions contained in the NRC's disclosure authorization letter. Licensees and other persons subject to this part may also forward these documents through the NRC to the international organization's headquarters in accordance with the NRC disclosure authorization.
Licensees and other persons may not reproduce documents containing Classified National Security Information except as provided in S95.43.
(d) Records regarding these visits and inspections must be maintained for five years beyond the date of the visit or inspection. These records must specifically identify each document which has been released to an authorizmi representative and indicate the date of the release. These records must also l
identify (in such detail as the Division of Security, by letter, may require) i l
the categories of documents that the authorized representative has had access l
and the date of this access. A licensee or other person subject to this part shall also retain Division of Security disclosure authorizations for five 1
years beyond the date of any visit or inspection when access to classified information was permitted.
(e) Licensees or other persons subject to this part shall take such measures as may be necessary to preclude access to classified matter by participants of other international agreements unless specifically provided for under the terms of a specific agreement.
l
- 41. Section 95.37 is revised to read as follows:
6 95.37 Classification and orecaration of documents.
(a) Classification. Classified information generated or possessed by a licensee or other person must be appropriately marked.
Classified material l
60
l l
which is not conducive to markings (e.g., equipment) may be exempt from this requirement. These exemptions are subject to the approval of the CSA on a I
case-by-case basis. If a person or facility generates or possesses information l
I l
that is believed to be classified based on guidance provided by the NRC or by l
derivation from classified documents, but which no authorized classifier has 1
determired to be classified, the information must be protected and marked with the appropriate classification markings pending review and signature of an NRC l
authorized classifier.
This information shall be protected as classified I
information pending final determination.
(b) Classification consistent with content. Each document containing classified information shall be classified Secret or Confidential according to its content.
NRC licensees subject tc the requirements of 10 CFR Part 95 may not make original classification decisions.
(c) Markings required on face of documents (1) for derivative classification of Classified National Security Information:
(i) Derivative classifications of Classified National Security Information must contain the identity of the source document or the l
classification guide, including the agency and office or origin, on the
" Derived From" line and its classification date.
If more than one source is cited, the " Derived From" line should indic'at'e "Hultiple Sources."
(ii) Declassification instructions.
When marking derivatively classified l
documents, the " DECLASSIFY ON" line must carr.y forward the declassification instructions as reflected in the original document.
If multiple sources are used, the instructions will carry forward the longest duration.
(iii)
If the source document used for derivative cl.assification contains 61 l
l l
i l
the declassification instruction, " Originating Agency's Determination Required" (OADR), the new document should reflect the date of the original classification of the information as contained in the source document or classification guide. An example of the stamp might be as follows:
Derived From (source)
Reason l
Declassify On: Source Marked "OADR" Date of Source:
Classifier:
(Name/ Title / Number)
(iv) The derivative classifier shall maintain the identification of each source with the file or record copy of the derivatively classified document.
(2) For Restricted Data documents:
(i)
Identity of the classifier. The identity of the classifier must be shown by completion of the Derivative Classifier line. The Derivative Classifier line must show the name of the person classifying the document and the basis for the classification. Dates for downgrading or declassification do not apply.
(ii) Classification designation (e.g., Secret, Confidential) and Restricted Data.
NOTE: No "Declassificatior." instructions will be placed on documents containing Restricted Data.
(d)
Placement of markings. The highest classification marking assigned to l
a document must be placed in a conspicuous f ashion in letters at the top and bottom of the outside of the front covers and title pages, if any, and first and last pages on which text appears, on both bound and unbound documents, and 62
-.. _ - _ _ ~
l on the outside of back covers of bound documents. The balance of the pages must be marked at the top and bottom with:
(1) The overall classification marking assigned to the document; (2) The highest classification marking required by content of the page; or (3) The marking UNCLASSIFIED if they have no classified, content, i
(e) Additional markings.
(1) If the document contains any form of Restricted Data, it must bear j
the appropriate marking on the first page of text, on the front cover and title page, if any. For example:
"This document contains Restricted Data as defined in the Atomic Energy Act of 1954.
Unauthorized disclosure subject to Administrative and Criminal Sanctions."
l (2) Limitation on reproduction or dissemination. If the originator or classifier determines that reproduction or further dissemination of a document should be restricted, the following additional wording may be placed on the face of the document:
Reproduction or Further Dissemination Requires Approval of i
1 If any portion of this e'ditional marking does not apply, it should be crossed out.
~
(f) Portion markings. In addition to the information required on the face of the document each classified document is required, by marking or other means, to indi; e clearly which portions are classified (e.g., paragraphs or pages) and which portions are not classified. The symbols (S) for Secret, (C) for Confidential (U) for Unclassified, or (RD) for Restricted Data may be used immediately preceding or following the text to which it applies, except 63 l
L l
l l
E j
that the designation must follow titles or subjects. (Portion marking of paragraphs is not required for documents containing Restricted Data.) If this type of portion marking is not practicable, the document must contain a l
description sufficient to identify the classified information and the l
unclassified information.
Example l
Pages 1-3 Secret Pages 4-19 Unclassified Pages 20-26 Secret Pages 27-32 Confidential l
(g) Transmittal document. If a document transmitting classified information contains no classified information or the classification level of i
l the transmittal document is not as high as the highest classification level of its enclosures, then the document must be marked at the top and bottom with a classification at least as high as its highest classified enclosure. The classification may be higher if the enclosures, when combined, warrant a higher classification than any individual enclosure. When the contents of the transmittal document warrants a lower classification than the highest classified enclosure (s) or combination of enclosures or requires no l
classification, a stamp or marking such as the following must also be used on the transmittal document:
l UPON REMOVAL 0F ATTACHMENTS THIS DOCUMENT IS:
(Classification level of transmittal document standing alone or the word 64 l
l l.
i 1
t l
UNCLASSIFIED if the transmittal document contains no c'assified information.)
l (h) Classification challenges.
Persons in authorized possession of Classified National Security Information who in good f aith believe that the information's classification status (i.e. that the document), is classified at either too high a level for its content (overclassification) or too low for its content (underclassification) are expected to challenge its classification i
status. Persons who wish to challenge a classification status shall-.
(i) Refer the docunent or information to the originator or to an authorized NRC classifier for review.
The authorized classifier shall review the document and render a written classification decision to the holder of the information.
(ii)
In the event of a question regarding classification review, the holder of the information or the authorized classifier shall consult the NRC-l Division of Security, Information Security Branch, for assistance.
\\
(iii) Persons who challenge classification decisions have the right to appeal the classification decision to the Interagency Security Classification i
Appeals Panel.
(iv) Persons seeking tc challenge the classification of information will not be the subject of retribution.
(i) Files, folders or group of documents. Files, folders, binders, or i
groups of physically connected documents must be marked at least as high as j
the highest classified document which they contain.
j l
(j) Drafts and working papers. Drafts of documents and working papers which contain, or which are believed to contain classified information must be marked as classified information.
65
(k) Classification guidance.
Licensees, certificate holders, or other persons subject to this part shall classify and mark classified matter as National Security Information or Restricted Data, as appropriate, in accordance with classification guidance,provided by the NRC as part of the facility security clearance process.
1
- 42. Section 95.39 is revised to read as follows:
1 l
l 5 95.39 External transmission of documents and material.
?
(a) Restrictions. Documents and material containing classified information received or originated in connection with an NRC license or certificate must l
be transmitted only to CSA approved security facilities.
1 (b) Preparation of documents. Documents containing classified information l
must be prepared in accordance with the following when transmitted outside an individual installation.
(1) The documents must be enclosed in two sealed opaque envelopes or wrappers.
(2) The inner envelope or wrapper must contain the addressee's classified mail address and the name of the intended recipient. The appropriate classification must be placed on both sides of the envelope (top and bottom) and the additional markings, as appropriate, referred to in S95.37(e) must be l
placed on the side bearing the address.
l (3) The outer envelope or wrapper must contain the addressee's classified l
1 mail address. The outer envelope.or wrapper may not contain any i
classification, additional marking or other notation that indicates that the enclosed document contains classified information, 66 i
4 d
(4) A receipt that contains an unclassified description of the document,,
the document number, if any, date of the document, classification, the date of transfer, the recipient and the person transferring the document must be enclosed within the inner envelope containing the document and be signed by the recipient and returned to the sender whenever the custody of a Secret document is transferred.
This receipt process is at the option of the sender for Confidential information.
(c) Methods of transportation.
(1) Secret matter may be transported only by one of the following methods I
within and directly between the U.S., Puerto Rico, or a U.S. possession or trust territory:
(i)
U.S. Postal Service Express Mail and U.S. Postal Service Registered Mail. NOTE: The " Waiver of Signature and Indemnity" block on the U.S. Postal Service Express Mail Label 11-B may not be executed and the use of external l
(street side) express mail collection boxes is prohibited.
f (ii) A cleared " Commercial Carrier."
(iii) A cleared commercial messenger service engaged in the intracity / local area delivery (same day delivery only) of classified material.
(iv)
A commercial delivery company, approved by the CSA, that provides I
nationwide, overnight service with computer tracing and reporting features.
These companies need not be security cleared.
(v) Other methods as directed, in writing, by the CSA.
(2) Confidential matter may be transported by one of the methods set forth in paragraph (c)(1) of this section, by U.S. first class, express or certified mail. First class, express, or certified mail may be used in transmission of Confidential documents to Puerto Rico or any United States territory or 67
possession.
(d) Telecommunication of classified information.
Classified information may not be telecommunicated unless the telecommunication system has been approved by the CSA.
Licensees, certificate holders or other persons who may require a secure telecommunication system shall submit a telecommunication plan as part of their request for f acility clearance, as outlined in S95.15, or as an amendment to their existing Standard Practice and Procedures Plan for the protection of classified information.
(e)
Security of classified information in transit.
Classified matter that, because of its nature, cannot be transported in accordance with S95.39(c), may only be transported in accordance with procedures approved by the CSA.
Procedures for transporting classified matter are based on a satisfactory transportation plan submitted as part of the licensee's, certificate holder, or other person's request for facility clearance or submitted as an amendment to its existing Standard Practice and Procedures Plan.
- 43. Section 95.41 is revised to read as follows:
S 95.41 External receiot and disoatch records.
Each licensee, certificate holder or other person possessing classified information shall maintain a record that reflects-i l
I (a) The date of the material; (b) The date of receipt or dispatch; 68
(c) The classification; (d) An unclassified description of the material; and (e) The identity of the sender from which the material was received or recipient to which the material was dispatched. Receipt and dispatch records must be retained for 2 years.
- 44. Section 95.43 is revised to read as follows:
S 95.43 Authority to reoroduce.
(a) Each licensee or other person possessing classified information shall establish a reproduction control system to ensure that reproduction of classified material is held to the mirimum consistent with operational requirements. Classified reproduction must be accomplished by authorized employees knowledgeable of the procedures for classified reproduction. The use of. technology that prevents, discourages, or detects the unauthorized reproduction of classified documents is encouraged.
(b) Unless restricted by the CSA, Secret and Confidential documents may be reproduced.
Reproduced copies of classified documents are subject to the same protection as the original documents.
(c) All reproductions of classified material must be conspicuously marked with the same classification markings as th'e'matu tai being reproduced. Copies of classified material must be reviewed after the reproduction process to ensure that these markings are visible.
- 45. Section 95.45 is revised to read as follows:
69
~. _.. _ _
S 95.45 Chances in classification.
(a) Documents containing Classified National Security Information must be downgraded or declassified as authorized by the NRC classification guides or as determined by the NRC. Requests for downgrading or declassifying any NRC i
classified information should be forwarded to the NRC Division of Security, Office of Administration Washington, DC 20555-0001.
Requests for downgrading or declassifying of Restricted Data will be forwarded to the NRC Division of Security for coordination with the Department of Energy.
(b) If a change of classification or declassification is approved, the previous classification marking must be canceled and the following statement, properly completed, must be placed on the first page of the document:
Classification canceled (or changed to) l (Insert appropriate classification) by authority of (Person authorizing change in classification) by-(Signature of person making change and date thereof) i I
(c) New markings reflecting the current classification status of the document will be applied in accordance with the require.nents of $95.37.
j 1
l (d) Any persons making a change in classification or receiving notice of 4
70 i
such a change shall forward notice of the change in classification to holders of all copies as shown on their records.
- 46. Section 95.47 is revised to read as follows:
S 95.47 Destruction of raatter containino classified information.
Documents containing classified information may be destroyed by burning, pulping, or another method that ensures complete destruction of the l
information that they contain. The method of destruction must preclude recognition or reconstruction of the classified information. Any doubts on methods should be referred to the CSA. If the document contains Secret information, a record of the subject or title, document number, if any, originator, its date of origination and the date of destruction must be signed by the person destroying the document and must be maintained in the office of the custodian at the time of destruction. These destruction records must be r
retained for two years after destruction.
- 47. Section 95.49 is revised to read as follows:
S 95.49 Security of automatic data orocessina (ADP) systems.
Classified data or information may not be processed or produced or an ADP system unless the system and procedures to protect the classified data or information have been approved by the CSA.
Approval of the ADP system and procedures is based on a satisfactory ADP security proposal submitted as part of the licensee's or other person's request for f acility clearance outlined in j
71 l
995.15 or submitted as an amendment to its existing Standard Practice and Procedures Plan for the protection of classified information.
- 48. Section 95.51 is revised to read as follows:
S 95.51 Retrieval of classified matter followina susoension or revocation of Arcess authorization.
In any case where the access authorization of an individual is suspended or revoked in accordance with the procedures set forth in Part 25 of this chapter, or other relevant CSA procedures, the licensee, certificate holder or 3
other organization shall, upon due notice from the Commission of such suspension or revocation, retrieve all classified information possessed by the individual and take the action necessary to preclude that individual having further access to the information.
- 49. Section 95.53 is revised to read as follows:
i I
6 95.53 Termination of facility cl ea ra nce.
j i
(a) If the need to use, process, store, reproduce, transmit, transport, or handle classified matter no longer exists, the facility clearance will be terminated. The facility may deliver all documents and materials containing classified information to the Commission or to a person authorized to receive them or destroy all such documents and materials. In either case, the facility shall submit a certification of nonpossession of classified information to the NRC Division of Security.
i 72
~
(b) In any instance where facility clearance has been terminated based on a determination of the CSA that further possession of classified matter by the facility would not be in the interest of the national security, the facility shall, upon notice from the CSA, immediately deliver all classified documents and materials to the Commission along with a certificate of nonpossession of 1
classified information.
- 50. Section 95.55 is revised to read as follows:
5 I
6 95.55 Continued aoolicability of the reaulations in this cart.
l The suspension, revocation or other termination of access authorization or the termination of facility clearance does not relieve any person from compliance with the regulations in this part.
- 51. Section 95.57 is revised to read as follows:
S 95.57 Reoorts.
i l
Each licensee cc other person having a facility clearance shall immediately report to the CSA and the Regional Administrator of the appropriate NRC Regional Office listed in appendix A, 10 CFR part 73:
(a) Any alleged or suspected violation of the Atomic Energy Act, Espionage Act, or other Federal statutes related to classified information.
(b) Any infractions, losses, compromises or possible compromise of classified information or classified documents not falling within paragraph (a) of this section.
73
~_
J 1
J (c) In addition, an autherized classifier of a licensee, certificate holder or other organization subject to this Part shall complete an NRC Form 790, " Classification Record," whenever matter containing classified information is generated, its classification changed or it is declassified.
Notification of declassification is not required for any document or material which has an automatic declassification date. Completed NRC Forms 790 must be i
submitted to the NRC Division of Security, Washington, DC 20555-0001, on a monthly basis.
i
]
I
- 52. Section 95.59 is revised to read as follows:
i S 95.59 Insoections.
The Commission shall make inspections and survey reyiews of the premises,
]
activities, records and procedures of any person subject to the regulations in this part as tLe Commission and CSA deem necessary to effect the purposes of i
the Act. E.0. 12958 and/or NRC rules.
i Dated at Rockville, Maryland, this day of 1997 For the Nuclear Regulatory Commission.
L. Joseph Callan, Executive Director for Operations.
74
i i
I O
REGULATORY ANALYSIS j
i r
t 1.
Statement of Problem i '
On October 31, 1994, the Deputy Secretary of Defense, acting as the Executive Agent for' the National Industrial Security Program.(NISP),
approved the,NISP Operating Manual (NISP0M) establishing government-wide 4
requirements for the protection of Classified National Security Information and Restricted Data at industrial facilities, including NRC 3
contractors, and, to the> extent feasible within regulatory requirements, j
NRC licensees and certificate holders.
On April 17, 1995 and August 2, i
1995, the' President signed Executive Orders 12958, " Classified National Security Information," and 12968, " Access'to Classified Information,"
j respectively which revised requirements for handling, protecting and accessing classified information.
The requirements of these new national 4
security policy documents are applicable to licensees, certificate l
holders, and others regulated by the NRC.
The effect of the new Executive Orders and the NISP0M is that 10 CFR Part 25, " Access Authorization for Licensee Personnel," 10 CFR Part 50, " Domestic Licensing of Production and Utilization Facilities," 10 CFR Part 54, " Requirements for Renewal of Operating Licenses for Nuclear Power Plants," and 10 CFR Part 95, 1
" Security _ Facility Approval and Safeguarding of National Security j
Information and Restricted Data," are no longer consistent with national i
security policies and directives.
2.
Obiective The objective of this regulatory initiative is to conform the NRC's regulations for the protection of classified information at licensee, certificate holder and other NRC regulated facilities possessing or having employees with access to classified information, with national policies for the protection of such information.
3.
Alternatives There is no reasonable alternative to the revision of these regulations that would achieve the desired result.
4.
Consecuences There are approximately 10 affected entities licensed or otherwise regulated by the NRC.
Each licensee, certificate holder or other entity who requires access to National Security Information or Restricted Data to conduct official business related to an NRC regulated activity must have a facility clearance under the provisions of Part 95 and individuals, other than USEC personnel who are cleared by 00E, who have access to classified information must have a personnel security clearance granted to them under Part 25 or, under $50.37 or $54.17(g),
...The Commission shall have determined that permitting such person to have access to Restricted Data will not endanger the common defense and security."
These entities will be required to comply with the requirements of 10 CFR Parts 25, 50, 54 and 95, which will involve costs to these entities.
The
i 1
costs, however, should be no higher than under the current regulations and are likely to be lower since a number of requirements have been reduced (e.g., lesser requirements for accountability of secret information, reduction of requirements for GSA approved security containers and reduction of administrative requirements for classified visits).
These changes will not-have an impact on other NRC programs or requirements at these facilities.
S.
Decision Rationale l
The only available method of imposing these requirements on selected I
licensees and others is to revise 10 CFR Parts 25, 50, 54 and 95.
Other avenues would lack the requisite formality and legality necessary to require all affected NRC licensees to adhere to the changes in requirements for the protection of classified information.
6.
Imolementation
\\
\\
l The Division of Security intends to publish the final rule amendino 10 CFR Parts 25, 50, 54 and 95 by March 31, 1997.
l l
l l
l l
4
i 1
3 DAILY STAFF NOTES 4
4 i
OFFICE OF ADMINISTRATION Final Rule sioned by EDO e'
On 1997, The Executive Director for Operations approved a final rule j
that revises 10 CFR Parts 25,50,54 and 95 to conform NRC regulations to current national security policies for the protection of classified information at industrial facilities, e.g., licensees and certificate holders.
i This notice informs the Commission that in accordance with the rulemaking authority delegated to the EDO, the EDO has signed this final rule and proposes to forward it on to the Office of the Federal Register for publication, unless otherwise directed by the Commission.
t i
i g.
ij f.
.i i
i i
i j
i I-i
,-