EXECUTIVE ORDER 12958
CLASSIFIED NATIONAL SECURITY INFORMATION

April 17, 1995

Part 2 of 2

 

Sec. 3.4.  Automatic Declassification.  (a) Subject to paragraph (b), below, within 5 years from the date of this order, all classified information contained in records that (1) are more than 25 years old, and (2) have been determined to have permanent historical value under title 44, United States Code, shall be automatically declassified whether or not the records have been reviewed.  Subsequently, all classified information in such records shall be automatically declassified no longer than 25 years from the date of its original classification, except as provided in paragraph (b), below.

 

(b)

An agency head may exempt from automatic declassification under paragraph (a), above, specific information, the release of which should be expected to:

 

 

(1)

reveal the identity of a confidential human source, or reveal information about the application of an intelligence source or method, or reveal the identity of a human intelligence source when the unauthorized disclosure of that source would clearly and demonstrably damage the national security interests of the United States;

 

 

(2)

reveal information that would assist in the development or use of weapons of mass destruction;

 

 

(3)

reveal information that would impair U.S. cryptologic systems or activities;

 

 

(4)

reveal information that would impair the application of state of the art technology within a U.S. weapon system;

 

 

(5)

reveal actual U.S. military war plans that remain in effect;

 

 

(6)

reveal information that would seriously and demonstrably impair relations between the United States and a foreign government, or seriously and demonstrably undermine ongoing diplomatic activities of the United States;

 

 

(7)

reveal information that would clearly and demonstrably impair the current ability of United States Government officials to protect the President, Vice President, and other officials for whom protection services, in the interest of national security, are authorized;

 

 

(8)

reveal information that would seriously and demonstrably impair current national security emergency preparedness plans; or

 

 

(9)

violate a statute, treaty, or international agreement.

 

 

(c)

No later than the effective date of this order, an agency head shall notify the President through the Assistant to the President for National Security Affairs of any specific file series of records for which a review or assessment has determined that the information within those file series almost invariably falls within one or more of the exemption categories listed in paragraph (b), above, and which the agency proposes to exempt from automatic declassification.  The notification shall include:

 

 

(1)

a description of the file series;

 

 

(2)

an explanation of why the information within the file series is almost invariably exempt from automatic declassification and why the information must remain classified for a longer period of time; and

 

 

(3)

except for the identity of a confidential human source or a human intelligence source, as provided in paragraph (b), above, a specific date or event for declassification of the information.

 

The President may direct the agency head not to exempt the file series or to declassify the information within that series at an earlier date than recommended.

 

(d)

At least 180 days before information is automatically declassified under this section, an agency head or senior agency official shall notify the Director of the Information Security Oversight Office, serving as Executive Secretary of the Interagency Security Classification Appeals Panel, of any specific information beyond that included in a notification to the President under paragraph (c), above, that the agency proposes to exempt from automatic declassification.  The notification shall include:

 

 

(1)

a description of the information;

 

 

(2)

an explanation of why the information is exempt from automatic declassification and must remain classified for a longer period of time; and

 

 

(3)

except for the identity of a confidential human source or a human intelligence source, as provided in paragraph (b), above, a specific date or event for declassification of the information.  The Panel may direct the agency not to exempt the information or to declassify it at an earlier date than recommended.  The agency head may appeal such a decision to the President through the Assistant to the President for National Security Affairs.  The information will remain classified while such an appeal is pending.

 

 

(e)

No later than the effective date of this order, the agency head or senior agency official shall provide the Director of the Information Security Oversight Office with a plan for compliance with the requirements of this section, including the establishment of interim target dates.  Each such plan shall include the requirement that the agency declassify at least 15 percent of the records affected by this section no later than 1 year from the effective date of this order, and similar commitments for subsequent years until the effective date for automatic declassification.

 

 

(f)

Information exempted from automatic declassification under this section shall remain subject to the mandatory and systematic declassification review provisions of this order.

 

 

(g)

The Secretary of State shall determine when the United States should commence negotiations with the appropriate officials of a foreign government or international organization of governments to modify any treaty or international agreement that requires the classification of information contained in records affected by this section for a period longer than 25 years from the date of its creation, unless the treaty or international agreement pertains to information that may otherwise remain classified beyond 25 years under this section.

 

Sec. 3.5.  Systematic Declassification Review.  (a) Each agency that has originated classified information under this order or its predecessors shall establish and conduct a program for systematic declassification review.  This program shall apply to historically valuable records exempted from automatic declassification under section 3.4 of this order.  Agencies shall prioritize the systematic review of records based upon:

 

(1)

recommendations of the Information Security Policy Advisory Council, established in section 5.5 of this order, on specific subject areas for systematic review concentration; or

 

 

(2)

the degree of researcher interest and the likelihood of declassification upon review.

 

 

(b)

The Archivist of the shall conduct a systematic declassification review program for classified information:

 

 

(1)

accessioned into the National Archives as of the effective date of this order;

 

 

(2)

information transferred to the Archivist pursuant to section 2203 of title 44, United States Code; and

 

 

(3)

information for which the National Archives and Records Administration serves as the custodian of the records of an agency or organization that has gone out of existence. This program shall apply to pertinent records no later than 25 years from the date of their creation.  The Archivist shall establish priorities for the systematic review of these records based upon the recommendations of the Information Security Policy Advisory Council; or the degree of researcher interest and the likelihood of declassification upon review.  These records shall be reviewed in accordance with the standards of this order, its implementing directives, and declassification guides provided to the Archivist by each agency that originated the records.  The Director of the Information Security Oversight Office shall assure that agencies provide the Archivist with adequate and current declassification guides.

 

 

(c)

After consultation with affected agencies, the Secretary of Defense may establish special procedures for systematic review for declassification of classified cryptologic information, and the Director of Central Intelligence may establish special procedures for systematic review for declassification of classified information pertaining to intelligence activities (including special activities), or intelligence sources or methods.

 

Sec. 3.6.  Mandatory Declassification Review.  (a) Except as provided in paragraph (b), below, all information classified under this order or predecessor orders shall be subject to a review for declassification by the originating agency if:

 

(1)

the request for a review describes the document or material containing the information with sufficient specificity to enable the agency to locate it with a reasonable amount of effort;

 

 

(2)

the information is not exempted from search and review under the Central Intelligence Agency Information Act; and

 

 

(3)

the information has not been reviewed for declassification within the past 2 years.  If the agency has reviewed the information within the past 2 years, or the information is the subject of pending litigation, the agency shall inform the requester of this fact and of the requester's appeal rights.

 

 

(b)

Information originated by:

 

 

(1)

the incumbent President;

 

 

(2)

the incumbent President's White House Staff;

 

 

(3)

committees, commissions, or boards appointed by the incumbent President; or

 

 

(4)

other entities within the Executive Office of the President that solely advise and assist the incumbent President is exempted from the provisions of paragraph (a), above.  However, the Archivist shall have the authority to review, downgrade, and declassify information of former Presidents under the control of the Archivist pursuant to sections 2107, 2111, 2111 note, or 2203 of title 44, United States Code.  Review procedures developed by the Archivist shall provide for consultation with agencies having primary subject matter interest and shall be consistent with the provisions of applicable laws or lawful agreements that pertain to the respective Presidential papers or records.  Agencies with primary subject matter interest shall be notified promptly of the Archivist's decision.  Any final decision by the Archivist may be appealed by the requester or an agency to the Interagency Security Classification Appeals Panel.  The information shall remain classified pending a prompt decision on the appeal.

 

 

(c)

Agencies conducting a mandatory review for declassification shall declassify information that no longer meets the standards for classification under this order.  They shall release this information unless withholding is otherwise authorized and warranted under applicable law.

 

 

(d)

In accordance with directives issued pursuant to this order, agency heads shall develop procedures to process requests for the mandatory review of classified information.  These procedures shall apply to information classified under this or predecessor orders.  They also shall provide a means for administratively appealing a denial of a mandatory review request, and for notifying the requester of the right to appeal a final agency decision to the Interagency Security Classification Appeals Panel.

 

 

(e)

After consultation with affected agencies, the Secretary of Defense shall develop special procedures for the review of cryptologic information, the Director of Central Intelligence shall develop special procedures for the review of information pertaining to intelligence activities (including special activities), or intelligence sources or methods, and the Archivist shall develop special procedures for the review of information accessioned into the National Archives.

 

Sec. 3.7.  Processing Requests and Reviews.  In response to a request for information under the Freedom of Information Act, the Privacy Act of 1974, or the mandatory review provisions of this order, or pursuant to the automatic declassification or systematic review provisions of this order:

 

(a)

An agency may refuse to confirm or deny the existence or nonexistence of requested information whenever the fact of its existence or nonexistence is itself classified under this order.

 

 

(b)

When an agency receives any request for documents in its custody that contain information that was originally classified by another agency, or comes across such documents in the process of the automatic declassification or systematic review provisions of this order, it shall refer copies of any request and the pertinent documents to the originating agency for processing, and may, after consultation with the originating agency, inform any requester of the referral unless such association is itself classified under this order.  In cases in which the originating agency determines in writing that a response under paragraph (a), above, is required, the referring agency shall respond to the requester in accordance with that paragraph.

 

Sec. 3.8.  Declassification Database.  (a) The Archivist in conjunction with the Director of the Information Security Oversight Office and those agencies that originate classified information, shall establish a Government-wide database of information that has been declassified.  The Archivist shall also explore other possible uses of technology to facilitate the declassification process.

 

(b)

Agency heads shall fully cooperate with the Archivist in these efforts.

 

 

(c)

Except as otherwise authorized and warranted by law, all declassified information contained within the database established under paragraph (a), above, shall be available to the public.

 

PART 4  SAFEGUARDING

Sec. 4.1.  Definitions.  For purposes of this order:  (a) "Safeguarding" means measures and controls that are prescribed to protect classified information.

 

(b)

"Access" means the ability or opportunity to gain knowledge of classified information.

 

 

(c)

"Need-to-know" means a determination made by an authorized holder of classified information that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function.

 

 

(d)

"Automated information system" means an assembly of computer hardware, software, or firmware configured to collect, create, communicate, compute, disseminate, process, store, or control data or information. 

 

 

(e)

"Integrity" means the state that exists when information is unchanged from its source and has not been accidentally or intentionally modified, altered, or destroyed.

 

 

(f)

"Network" means a system of two or more computers that can exchange data or information.

 

 

(g)

"Telecommunications" means the preparation, transmission, or communication of information by electronic means.

 

 

(h)

"Special access program" means a program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.

 

Sec. 4.2.  General Restrictions on Access.  (a) A person may have access to classified information provided that:

 

(1)

a favorable determination of eligibility for access has been made by an agency head or the agency head's designee;

 

 

(2)

the person has signed an approved nondisclosure agreement; and

 

 

(3)

the person has a need-to-know the information.

 

 

(b)

Classified information shall remain under the control of the originating agency or its successor in function.  An agency shall not disclose information originally classified by another agency without its authorization.  An official or employee leaving agency service may not remove classified information from the agency's control.

 

 

(c)

Classified information may not be removed from official premises without proper authorization.

 

 

(d)

Persons authorized to disseminate classified information outside the executive branch shall assure the protection of the information in a manner equivalent to that provided within the executive branch.

 

 

(e)

Consistent with law, directives, and regulation, an agency head or senior agency official shall establish uniform procedures to ensure that automated information systems, including networks and telecommunications systems, that collect, create, communicate, compute, disseminate, process, or store classified information have controls that: 

 

 

(1)

prevent access by unauthorized persons; and

 

 

(2)

ensure the integrity of the information.

 

 

(f)

Consistent with law, directives, and regulation, each agency head or senior agency official shall establish controls to ensure that classified information is used, processed, stored, reproduced, transmitted, and destroyed under conditions that provide adequate protection and prevent access by unauthorized persons.

 

 

(g)

Consistent with directives issued pursuant to this order, an agency shall safeguard foreign government information under standards that provide a degree of protection at least equivalent to that required by the government or international organization of governments that furnished the information.  When adequate to achieve equivalency, these standards may be less restrictive than the safeguarding standards that ordinarily apply to United States "Confidential" information, including allowing access to individuals with a need-to-know who have not otherwise been cleared for access to classified information or executed an approved nondisclosure agreement.

 

 

(h)

Except as provided by statute or directives issued pursuant to this order, classified information originating in one agency may not be disseminated outside any other agency to which it has been made available without the consent of the originating agency.  An agency head or senior agency official may waive this requirement for specific information originated within that agency.  For purposes of this section, the Department of Defense shall be considered one agency.

 

Sec. 4.3.  Distribution Controls.  (a) Each agency shall establish controls over the distribution of classified information to assure that it is distributed only to organizations or individuals eligible for access who also have a need-to-know the information.

 

(b)

Each agency shall update, at least annually, the automatic, routine, or recurring distribution of classified information that they distribute.  Recipients shall cooperate fully with distributors who are updating distribution lists and shall notify distributors whenever a relevant change in status occurs.

 

Sec. 4.4.  Special Access Programs.  (a) Establishment of special access programs.  Unless otherwise authorized by the President, only the Secretaries of State, Defense and Energy, and the Director of Central Intelligence, or the principal deputy of each, may create a special access program.  For special access programs pertaining to intelligence activities (including special activities, but not including military operational, strategic and tactical programs), or intelligence sources or methods, this function will be exercised by the Director of Central Intelligence.  These officials shall keep the number of these programs at an absolute minimum, and shall establish them only upon a specific finding that:

 

(1)

the vulnerability of, or threat to, specific information is exceptional; and

 

 

(2)

the normal criteria for determining eligibility for access applicable to information classified at the same level are not deemed sufficient to protect the information from unauthorized disclosure; or

 

 

(3)

  the program is required by statute.

 

 

(b)

Requirements and Limitations.  (1) Special access programs shall be limited to programs in which the number of persons who will have access ordinarily will be reasonably small and commensurate with the objective of providing enhanced protection for the information involved.

 

 

(2)

Each agency head shall establish and maintain a system of accounting for special access programs consistent with directives issued pursuant to this order.

 

 

(3)

Special access programs shall be subject to the oversight program established under section 5.6(c) of this order.  In addition, the Director of the Information Security Oversight Office shall be afforded access to these programs, in accordance with the security requirements of each program, in order to perform the functions assigned to the Information Security Oversight Office under this order.  An agency head may limit access to a special access program to the Director and no more than one other employee of the Information Security Oversight Office; or, for special access programs that are extraordinarily sensitive and vulnerable, to the Director only.

 

 

(4)

The agency head or principal deputy shall review annually each special access program to determine whether it continues to meet the requirements of this order.

 

 

(5)

Upon request, an agency shall brief the Assistant to the President for National Security Affairs, or his or her designee, on any or all of the agency's special access programs.

 

 

(c)

Within 180 days after the effective date of this order, each agency head or principal deputy shall review all existing special access programs under the agency's jurisdiction.  These officials shall terminate any special access programs that do not clearly meet the provisions of this order.  Each existing special access program that an agency head or principal deputy validates shall be treated as if it were established on the effective date of this order.

 

 

(d)

Nothing in this order shall supersede any requirement made by or under 10 U.S.C. 119.

 

Sec. 4.5.  Access by Historical Researchers and Former Presidential Appointees.  (a) The requirement in section 4.2(a)(3) of this order that access to classified information may be granted only to individuals who have a need- to-know the information may be waived for persons who:

 

(1)

are engaged in historical research projects; or

 

 

(2)

previously have occupied policy-making positions to which they were appointed by the President.

 

 

(b)

Waivers under this section may be granted only if the agency head or senior agency official of the originating agency:

 

 

(1)

determines in writing that access is consistent with the interest of national security;

 

 

(2)

takes appropriate steps to protect classified information from unauthorized disclosure or compromise, and ensures that the information is safeguarded in a manner consistent with this order; and

 

 

(3)

limits the access granted to former Presidential appointees to items that the person originated, reviewed, signed, or received while serving as a Presidential appointee.

 

PART 5  IMPLEMENTATION AND REVIEW

     Sec. 5.1.  Definitions.  For purposes of this order:  (a) "Self- inspection" means the internal review and evaluation of individual agency activities and the agency as a whole with respect to the implementation of the program established under this order and its implementing directives.

  (b)  "Violation" means:

 

(1)

any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information;

 

 

(2)

any knowing, willful, or negligent action to classify or continue the classification of information contrary to the requirements of this order or its implementing directives; or

 

 

(3)

any knowing, willful, or negligent action to create or continue a special access program contrary to the requirements of this order.

 

 

(c)

"Infraction" means any knowing, willful, or negligent action contrary to the requirements of this order or its implementing directives that does not comprise a "violation," as defined above.

 

Sec. 5.2.  Program Direction.  (a) The Director of the Office of Management and Budget, in consultation with the Assistant to the President for National Security Affairs and the co-chairs of the Security Policy Board, shall issue such directives as are necessary to implement this order.  These directives shall be binding upon the agencies.  Directives issued by the Director of the Office of Management and Budget shall establish standards for:

 

(1)

classification and marking principles;

 

 

(2)

agency security education and training programs;

 

 

(3)

agency self-inspection programs; and

 

 

(4)

classification and declassification guides.

 

 

(b)

The Director of the Office of Management and Budget shall delegate the implementation and monitorship functions of this program to the Director of the Information Security Oversight Office.

 

 

(c)

The Security Policy Board, established by a Presidential Decision Directive, shall make a recommendation to the President through the Assistant to the President for National Security Affairs with respect to the issuance of a Presidential directive on safeguarding classified information.  The Presidential directive shall pertain to the handling, storage, distribution, transmittal, and destruction of and accounting for classified information.

 

Sec. 5.3.  Information Security Oversight Office.  (a) There is established within the Office of Management and Budget an Information Security Oversight Office.  The Director of the Office of Management and Budget shall appoint the Director of the Information Security Oversight Office, subject to the approval of the President.

 

(b)

Under the direction of the Director of the Office of Management and Budget acting in consultation with the Assistant to the President for National Security Affairs, the Director of the Information Security Oversight Office shall:

 

 

(1)

develop directives for the implementation of this order; 

 

 

(2)

oversee agency actions to ensure compliance with this order and its implementing directives;

 

 

(3)

review and approve agency implementing regulations and agency guides for systematic declassification review prior to their issuance by the agency;

 

 

(4)

have the authority to conduct on-site reviews of each agency's program established under this order, and to require of each agency those reports, information, and other cooperation that may be necessary to fulfill its responsibilities.  If granting access to specific categories of classified information would pose an exceptional national security risk, the affected agency head or the senior agency official shall submit a written justification recommending the denial of access to the Director of the Office of Management and Budget within 60 days of the request for access.  Access shall be denied pending a prompt decision by the Director of the Office of Management and Budget, who shall consult on this decision with the Assistant to the President for National Security Affairs;

 

 

(5)

review requests for original classification authority from agencies or officials not granted original classification authority and, if deemed appropriate, recommend Presidential approval through the Director of the Office of Management and Budget;

 

 

(6)

consider and take action on complaints and suggestions from persons within or outside the Government with respect to the administration of the program established under this order;

 

 

(7)

have the authority to prescribe, after consultation with affected agencies, standardization of forms or procedures that will promote the implementation of the program established under this order;

 

 

(8)

report at least annually to the President on the implementation of this order; and

 

 

(9)

convene and chair interagency meetings to discuss matters pertaining to the program established by this order.

 

Sec. 5.4.  Interagency Security Classification Appeals Panel.  (a) Establishment and Administration.

 

(1)

There is established an Interagency Security Classification Appeals Panel ("Panel").  The Secretaries of State and Defense, the Attorney General, the Director of Central Intelligence, the Archivist of the United States, and the Assistant to the President for National Security Affairs shall each appoint a senior level representative to serve as a member of the Panel.  The President shall select the Chair of the Panel from among the Panel members.

 

 

(2)

A vacancy on the Panel shall be filled as quickly as possible as provided in paragraph (1), above.

 

 

(3)

The Director of the Information Security Oversight Office shall serve as the Executive Secretary.  The staff of the Information Security Oversight Office shall provide program and administrative support for the Panel.

 

 

(4)

The members and staff of the Panel shall be required to meet eligibility for access standards in order to fulfill the Panel's functions.

 

 

(5)

The Panel shall meet at the call of the Chair.  The Chair shall schedule meetings as may be necessary for the Panel to fulfill its functions in a timely manner.

 

 

(6)

The Information Security Oversight Office shall include in its reports to the President a summary of the Panel's activities. 

 

  (b)  Functions.  The Panel shall:

 

(1)

decide on appeals by persons who have filed classification challenges under section 1.9 of this order;

 

 

(2)

approve, deny, or amend agency exemptions from automatic declassification as provided in section 3.4 of this order; and

 

 

(3)

decide on appeals by persons or entities who have filed requests for mandatory declassification review under section 3.6 of this order.

 

 

(c)

Rules and Procedures.  The Panel shall issue bylaws, which shall be published in the Federal Register no later than 120 days from the effective date of this order.  The bylaws shall establish the rules and procedures that the Panel will follow in accepting, considering, and issuing decisions on appeals.  The rules and procedures of the Panel shall provide that the Panel will consider appeals only on actions in which:  (1) the appellant has exhausted his or her administrative remedies within the responsible agency; (2) there is no current action pending on the issue within the federal courts; and (3) the information has not been the subject of review by the federal courts or the Panel within the past 2 years.

 

 

(d)

Agency heads will cooperate fully with the Panel so that it can fulfill its functions in a timely and fully informed manner.  An agency head may appeal a decision of the Panel to the President through the Assistant to the President for National Security Affairs. The Panel will report to the President through the Assistant to the President for National Security Affairs any instance in which it believes that an agency head is not cooperating fully with the Panel.

 

 

(e)

The Appeals Panel is established for the sole purpose of advising and assisting the President in the discharge of his constitutional and discretionary authority to protect the national security of the United States.  Panel decisions are committed to the discretion of the Panel, unless reversed by the President.

 

Sec. 5.5.  Information Security Policy Advisory Council. (a) Establishment.  There is established an Information Security Policy Advisory Council ("Council").  The Council shall be composed of seven members appointed by the President for staggered terms not to exceed 4 years, from among persons who have demonstrated interest and expertise in an area related to the subject matter of this order and are not otherwise employees of the Federal Government. The President shall appoint the Council Chair from among the members.  The Council shall comply with the Federal Advisory Committee Act, as amended, 5 U.S.C. App. 2.

  (b)  Functions.  The Council shall:

 

(1)

advise the President, the Assistant to the President for National Security Affairs, the Director of the Office of Management and Budget, or such other executive branch officials as it deems appropriate, on policies established under this order or its implementing directives, including recommended changes to those policies;

 

 

(2)

provide recommendations to agency heads for specific subject areas for systematic declassification review; and

 

 

(3)

serve as a forum to discuss policy issues in dispute.

 

 

(c)

Meetings.  The Council shall meet at least twice each calendar year, and as determined by the Assistant to the President for National Security Affairs or the Director of the Office of Management and Budget.

 

 

(d)

Administration.

 

 

(1)

Each Council member may be compensated at a rate of pay not to exceed the daily equivalent of the annual rate of basic pay in effect for grade GS-18 of the general schedule under section 5376 of title 5, United States Code, for each day during which that member is engaged in the actual performance of the duties of the Council.

 

 

(2)

While away from their homes or regular place of business in the actual performance of the duties of the Council, members may be allowed travel expenses, including per diem in lieu of subsistence, as authorized by law for persons serving intermittently in the Government service (5 U.S.C. 5703(b)).

 

 

(3)

To the extent permitted by law and subject to the availability of funds, the Information Security Oversight Office shall provide the Council with administrative services, facilities, staff, and other support services necessary for the performance of its functions. 

 

 

(4)

Notwithstanding any other Executive order, the functions of the President under the Federal Advisory Committee Act, as amended, that are applicable to the Council, except that of reporting to the Congress, shall be performed by the Director of the Information Security Oversight Office in accordance with the guidelines and procedures established by the General Services Administration.

 

Sec. 5.6.  General Responsibilities.  Heads of agencies that originate or handle classified information shall:  (a) demonstrate personal commitment and commit senior management to the successful implementation of the program established under this order;

 

(b)

commit necessary resources to the effective implementation of the program established under this order; and

 

 

(c)

designate a senior agency official to direct and administer the program, whose responsibilities shall include:

 

 

(1)

overseeing the agency's program established under this order, provided, an agency head may designate a separate official to oversee special access programs authorized under this order.  This official shall provide a full accounting of the agency's special access programs at least annually;

 

 

(2)

promulgating implementing regulations, which shall be published in the Federal Register to the extent that they affect members of the public;

 

 

(3)

establishing and maintaining security education and training programs;

 

 

(4)

establishing and maintaining an ongoing self-inspection program, which shall include the periodic review and assessment of the agency's classified product;

 

 

(5)

establishing procedures to prevent unnecessary access to classified information, including procedures that: (i) require that a need for access to classified information is established before initiating administrative clearance procedures; and (ii) ensure that the number of persons granted access to classified information is limited to the minimum consistent with operational and security requirements and needs;

 

 

(6)

developing special contingency plans for the safeguarding of classified information used in or near hostile or potentially hostile areas;

 

 

(7)

assuring that the performance contract or other system used to rate civilian or military personnel performance includes the management of classified information as a critical element or item to be evaluated in the rating of:  (i) original classification authorities; (ii) security managers or security specialists; and (iii) all other personnel whose duties significantly involve the creation or handling of classified information;

 

 

(8)

accounting for the costs associated with the implementation of this order, which shall be reported to the Director of the Information Security Oversight Office for publication; and

 

 

(9)

assigning in a prompt manner agency personnel to respond to any request, appeal, challenge, complaint, or suggestion arising out of this order that pertains to classified information that originated in a component of the agency that no longer exists and for which there is no clear successor in function.

 

Sec. 5.7.  Sanctions.  (a) If the Director of the Information Security Oversight Office finds that a violation of this order or its implementing directives may have occurred, the Director shall make a report to the head of the agency or to the senior agency official so that corrective steps, if appropriate, may be taken.

 

(b)

Officers and employees of the United States Government, and its contractors, licensees, certificate holders, and grantees shall be subject to appropriate sanctions if they knowingly, willfully, or negligently:

 

 

(1)

disclose to unauthorized persons information properly classified under this order or predecessor orders;

 

 

(2)

classify or continue the classification of information in violation of this order or any implementing directive;

 

 

(3)

create or continue a special access program contrary to the requirements of this order; or

 

 

(4)

contravene any other provision of this order or its implementing directives.

 

 

(c)

Sanctions may include reprimand, suspension without pay, removal, termination of classification authority, loss or denial of access to classified information, or other sanctions in accordance with applicable law and agency regulation.

 

 

(d)

The agency head, senior agency official, or other supervisory official shall, at a minimum, promptly remove the classification authority of any individual who demonstrates reckless disregard or a pattern of error in applying the classification standards of this order.

 

 

(e)

The agency head or senior agency official shall:

 

 

(1)

take appropriate and prompt corrective action when a violation or infraction under paragraph (b), above, occurs; and

 

 

(2)

notify the Director of the Information Security Oversight Office when a violation under paragraph (b)(1), (2) or (3), above, occurs.

 

PART 6  GENERAL PROVISIONS

Sec. 6.1.  General Provisions.  (a) Nothing in this order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended, or the National Security Act of 1947, as amended. "Restricted Data" and "Formerly Restricted Data" shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the Atomic Energy Act of 1954, as amended, and regulations issued under that Act.

 

(b)

The Attorney General, upon request by the head of an agency or the Director of the Information Security Oversight Office, shall render an interpretation of this order with respect to any question arising in the course of its administration.

 

 

(c)

Nothing in this order limits the protection afforded any information by other provisions of law, including the exemptions to the Freedom of Information Act, the Privacy Act, and the National Security Act of 1947, as amended.  This order is not intended, and should not be construed, to create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its agencies, its officers, or its employees.  The foregoing is in addition to the specific provisos set forth in sections 1.2(b), 3.2(b) and 5.4(e) of this order.

 

 

(d)

Executive Order No. 12356 of April 6, 1982, is revoked as of the effective date of this order.

 

Sec. 6.2.  Effective Date.  This order shall become effective 180 days from the date of this order.

                       WILLIAM J. CLINTON

THE WHITE HOUSE,
    April 17, 1995.

 ===============================================================
 ===============================================================

 

  Back to Top of this Page Back to Part 1   To CUFON Main Page
  C  U  F  O  NSM
The Computer UFO Network
http://www.cufon.org/

SYSOP - Jim Klotz
Webmaster - Chris Lambright
Information Director - Dale Goudie

UFO Reporting and Information Service
Director - Dale Goudie
Mail service currently unavailableVoice Line - unavailable