ML20036A125
| ML20036A125 | |
| Person / Time | |
|---|---|
| Issue date: | 05/10/1993 |
| From: | NRC OFFICE OF ADMINISTRATION (ADM) |
| To: | |
| References | |
| NUREG-BR-0027, NUREG-BR-0027-R03, NUREG-BR-27, NUREG-BR-27-R3, NUDOCS 9305100076 | |
| Download: ML20036A125 (7) | |
Text
1 n g' (w,g ib hyd+.
R ti f
gn%j f yl.sW, c
{G ei g
.snt
%:M
,a
%j Og rQ,,M
~b p; d ) gg a*gd df p%
- a Rin$. pJ Mn f
i V d Mgjf.i M*
d Q, A, p%
g p $4 E9,h {c!
N
_s:
p
,o up
~u<,;u%ey h
_t$, "r,$wg;; 'ef y:,w:q '2.;,.g..
^
m Nj!r c
Q mN y
WMx G
a uQipi;g;y::.gh a:;q
+, !h, h,p.ef;,1 O&hy fs ;j w,,
_ +!&m, e,.;q:;my,f,e$x;gi,j-gt g r; s
,. m ~~f;u.,.
.%re;?+n l g..,
,,, v e*pf?
,i, k.' g%gM)$ y%g&gg lY,:" b
?
n.,, ~, L t
.L.
.s ug S
q i
y
~
g:s p h /
- . aw.np c
v m
i
,.u%
jf r
pyy. m;:p ft.
gyp'%w -
n m
p:
4hlIf~>;'"pp_M:, Nh? 'h,T u!%" ;..Q,Y
^
m 4w,
> O:, n. ; a i,
r, s x i:q::
JM7
~g; Y,
_c g
ng u
?,.?, ~
ko ~ '
g u
a.,.
< g
'i:'s 1 z"e
> P 't L.
. :4' j
P. ~.:
f_. h' yw:>a.a s '~.NP ' l a,i n(
23p y~lp. 4,y4
$- [fri..
p{, js%,j_s?c j p' zls;f w
y u
,l if~(k
'20
- y..,;j y
L' m~ ;x.
9 A*
s a3y
/ v; ;n i.
g
- ^ R 2; y
- 9;f. p?Q;;hy %,
x s
^
a q, 4 e::a,.gu p [ s.. gf
.^Y P.
,y.
j; b*}' };l,QpY%.g,
Q
. yv %.,:,_p;+
g..'..Q5
, u;%,ym.1 z.+.. +
1"-
a b
Qf. N?d r
l v
n
.,x?
g t[::,,%&:,J l'%; f.,
.. \\
c.w.nr]({* <f:'"n ;,'., s,,;n i x,
e
- t ?!? - m5
+
1 d
4
/
f
,[h,,3h['
o
,y.; ~
- gu, 5
js y*
kN, $([f f 4
^4 w
e Meg' r,
e.
QwplbQ,[
g b
^
, T n*i)dm}%.,
m
- n, ~ m&pllt s' -
((-
^,M af u.
1, s 'i :
v
)< L.
q,lw p.~
9(Q o. :g.
4
, ; gig:
i
- ,Q
%la:V ;jpm.:
L g.y ;-
\\
s.6 p
W y&y
- p!l?7m:i) 'yh!
s..
- i.
m
.a y
-x* ; 'g ;%y'_f<sf; v
v 4
f*~'-
[
an; j;, ' s
,symy^
r+
p;'
s i
'.(, l
?Qn;' - c, ' " r
?
x.
g;[b;:#.1
(
l,, mn~,7 d.
- ,e ym L.g
= Q fa.:!u,/ y7 fj y
[r?;;=.
_n c/g}Q'[l,.,.'d, fD,9 gg[g Y ll Y
},
v; x?
4-y2 fVlg.
s peg ORYS mT e g a-p f? k, 9 cr b~Gu ss Oa 7k..k,O h
au J
.f f;
%,y 1
~
f 5f
{O,?
.(h ;',
b W.)..
- 4P.Q -
Y[:[.'
5"o:b*Etnos,,
y Q.. p**
5 [*.} % ~gw, p
?w i
J
A THIS PUBLfCATION CONTAINS NO CLASSf fled OR SENSITIVE UNCL.ASSIFIED INFORM ATION, j
i rse(h J N fkN e D $$@e($ '
0 5l Rk
. s wa l$ n.
4 1
j 4
- ogy 3
"c i
g
(@
.)
%[A 4
N#"sR y"-=y gag g
${
,. !!Ermd5
-i EU@at&li diff
{ w, r
.n 4,...
gp@co@e s
e ed$
}9e p
x p%p,e9 ff: g# L 4 g,e p,o 7
x?
ku)s
%es*s,6 u
4#
g Ks&g+&k 4*Rp*fu+. #+,#ge $s sp a
s 0
\\ 1' 49
% AW D
s g
9 49 g %#
e s u " e $ k e a s$ % e n-l'
't 9* @ f i g g ; f s % ; g g g, +f M h $ p p
,ppe>.d.e%,.e..,+,,st 8.s<,;.d ! M m
e e
en
~
p ' g4s @ @,
(s go e
- q;,Jsci$5Y$$o *# 9 m*e 9
INE an f,,cp,#e e1 36 x(
JC
,et s.
ge
,ppe%e e
\\'
6 p#
q so, 1
Y c U ARE THE KEY TO NRC SECUR TY mation regarding the protection of their access to SGl. These require-NRC SECURITY special nuclear material and informa-ments are set forth in NRC Manage-PROGRAM tion received in confieence from a for-ment oirective and Handoook 12.3, eign source has been deemed to re-
"NRC Personnel Security Progrcm,"
quire the same protection afforded Part I (E). Before sharing this informa-Sensitive Unclassified proprietary information.
tion witn anyone eise, even a co-Information worker, be certain that the individual 11 is important to realize that for Prj_
requires the information to perform of-vacy Act (OUO) and Proprietary infor.
ficial, contractual or licensee duties.
(
Most NRC offices handle more sens.i-mation, you can be held personally That is, an official need-to-know must live unclassified information than liable for damages associated with exist for access. Need-to-know must class,ified information. The typcs of an unauthorized disclosure-be assured, not assumed.
sensitive unclass,fied information i
are: Official Use Only (OUO); Limited Since a security clearance is not re-Official Use (LOU); Propnetary; and Safeguards information or SGI may auss m sensiWe udam Safeguards Information (SGI).
include an applicant's oc licensee s 4.fi*d information, employees who S'
detailed physical secur!!y plan for the protection of spec;di nuclear material beg.in work prior to the completion of their security clearance processing (a or informaiion concerning certain Procedure permitted by Section 145b plant equipment essential to the safe of the Atomic Energy Act of 1954, as El production of special nuclear mate.-
amended) may have access to sensi-I" ria!. Civil and criminai penalties stated tive unclass,ified information if they 8
in ine Atomic Energy Act of 1954, as 1
have an official need-to-know.
M amended, can be levied for the un-
^
7 Q
authorized disclosure of Safeguards Information.
Classified information
.<E,
N. y..
Even though you may not routinely F
. handle classified information or mate-A dd g\\
rial in your work, you still should be -
p ' ' _~
w.m. 1z' familiar with the categories and levels RI.:k(p[-
c.
Q p ""
of classified information and the Wn.
Proper handiing procedures.
9%}.W
$$ M@#~
y t.
'j4 Official Use Only or OUO information S&
p p
l is handled bymost NRC offices.OUO vacy data such as perconnelandpay-f
^ COM M E
information includes personal and pri-J j
roll records and performance apprais-t als. Other OUO information may SECRET include staff policy positions or deci-sions being formulated prior to their p,,, **
public release.
TOP SECRET Limited Official Use intormation, often referred to as LOU, designates cer-Access to Sensitive ZC-l mem t ininf nnati n re eivedfr mthe ce~
Unclassified information partment of State.
t=rmg_
J Access to sensitive unclassified infor-Proprietary information is someone mation does notrequire an NRC secu-else's " property" that has been en-rity clearance (access authorization).
trusted to NRC. Traditionally it has in-However, certain investigative and TDP SECRET cluded trade secrets and commercial eligibility requirements do apply to or financial data. Additionally, infor-NRC contractor personnel prior to 2
i
._..~___ _._..-.,,_.___,_.._,-._..,_,__,_,., _.
NRC handles two basic categories of As indicated therein and on NRC classified information: National Secu-Form 176, " Security Acknowledg-rity Information (NSI), and Restricted l
ment," which you signed when com-
~
Data (RD). NSI is defined and pro-pleting the initial personnel security tected according to the provisions of forms packet, you must advise SEC, the President's Executive Order and within 10 working days, of all arrests, g
the information Security Oversight Of-R charges (including charges that are DgC
~
dismissed) or detentions by Federal, fice Directives. RD is defined and pro-4 tected according to the provisions of j.
'g State or other law enforcement the Atomic Energy Act of 1954, as 7M amended. Within each of these cate-l 4" '
a g/ g authorities, excluding traffic violations d,
a with a fine of $100 or less. You must gories of classified information, NSI k
""~
h 4 d@
also report marriage and any name fT and RD, there are three levels of clas-changes (due to marriage, divorce or sification according to the sensitivity personal volition) occurring since the of the information. In declining order of sensitivity, they are TOP SECRET, You should be aware that foreign na-date you last completed an SF-86, SECRET, and CONFIDENTIAL. Un~
tionals, including those who may visit
" Questionnaire for Sensitive Posi-authorized disclosure at each level or work for the NRC, are not permitted tions (For National Security)" or its access to classified information or predecessor Personnel Security could cause a corresponding level of material and must be restricted to Questionnaire.
damage to the national security The physical areas approved in their se-unauthorized disclosure of TOP Although some employees maynever SECRET information could be ex-curity plan. Those foreign _ nationals handle classified information, all NRC pected to cause exceptionally grave without an approved security plan employees, after having been
~
ust be escorted while at work.
damage to the national security. Dis-granted their security clearance, com-closure of SECRET information could plete the SF 312, " Classified Informa-cause serious damage, while disclo.
Personnel Security tion Nondisclosure Agreement."
l sure of CONFIDENTIAL information ClearanCOS Through this agreement, the em-could damage the national security.
ployee agrees not to disclose classi-For NRC employees SEC grants two fied information to any person who Only an autnorized classifier may types of security clearances. After an does not have both an appropriate make classification, downgrading.
appropriate background investigation security clearance-and a demon-and declassification determinations.
is conducted and any eligibility con-strated official need-to-know.
Draft and final documents that may cems are resolved, an *L" or a "O" contain classified information should clearance is 9 ranted-Protect on of Inforrnat on be reviewed by an authorized classi.
i i
r The type of security clearance you re-NRC Management Directive Volume er a a ab e ou ee document is improperly classified, ceive is determined by the sensitivity 12, " Security " provides guidance on contact SEC-of the position you occupy, and the the storage and nandling of sensitive level of access to classified informa-unclassified and classified informa-Access to Classified ti n required in the performance of tion. This guidance includes: use of InfOrinal,lOn your official duties. A "O" security appropriate cover sheets; accurate clearance allows access up to Top security and classification markings; The same principle of need-to-know Secret National Security information proper transmission; adequate stor-1 applies for access to classified infor.
and Restricted Data, whereas the "L" age when information is unattended; mation, but there is the added require-security ciearance atiows access to reproduction oniy as necessary; ment of having the appropriate level Confidential Restricted Data and proper destruction; and use of discre-of security clearance. New employ-Secret and Confidential National Se-tion in choosing when and where to ees whobegin work without a security curity information.
discuss such information. Remember l
clearance are to have NO ACCESS to that no matter what form the sensitive any level of classified information un-There are certain reporting require-unclassified or classified information til their security clearance has been ments associated with your NRC se-is in, whether a final document, on a granted. These individuals should curity clearance and employment.
diskette, a draft or on a typewriter /
weartheir NO ACCESS badgein clear These requirements can be found in printer ribbon used for the document, 3
view to alert others that their security NRC Management Directive 12.3, the information needs to be protected clearance is still pending.
"NRC Personnel Secunty Program."
according to its level of sensitivity.
3 i
j
i t
i Y aU ARE THE KEY TO l
NRC SECURITY i
3 e
i More specifically, classified informa-access and security control proce-specialists throughout the world, tion must be stored when unattended dures are strictly followed. In general classified and sensitive unclassified l
l in an approved security container or these procedures include: the use of information must only be telecom-vault-like room. Remember also, that system security features (e.g., pass-municated in a protected manner.
an open container or vault-like room words, user I.D.); the proper marking, Specifically, classified information must be communicated over NRC's q
requires observation by an individual protection or destruction of printer rib-with the appropriate security clear-bons, output and diskettes specifi.
Secure Telephone Units or by secure i
ance for the level of classified infor-cally established for sensitive unclas.
facsimile equipment, in addition to the above methods for communicat-f mation in the container or vault-like sified inf ormation; and never leaving a room; that prior to transmitting classi-system unattended when processing g cla ed tion, sensitive fied information, assure that the re-sensitive unclassified information.
I Mecmdated b an egtd cipient Ms such storage available; modo between NRC Headquarters f
and that lock combinations must be Another communications medium and Regional Offices on the Agency I
memorized and changed at least an-you should use with discret,on is the Upgrade of Technology for Office l
i nually. Failure to comply with proper telephone. Telephone systems used Systems. Secure voice and facsimile handling and protection requirements for computer hookups, for transmittal facilities are available within NRC.
I may result in the disclosure of classi-of information via facsimile, and for fled information for which there are normal business use are vulnerable to i
serious sanctions or, at a minimum, interception. The more you use the Kgp 3
issuance of a security infraction to the telephone, especially for long dis-3ps -
3 individual responsible.
tance calls, the more susceptible you 4
are to undetected eavesdropping by anyone wishing to exploit your sensi-f-
tive unclassified conversations or l
data transmissions.
g[
2N kM
^
.m-l Y
8y
(
pgE Travel / Meetings j
~.( pa ~
g Travel and meeting arrangements mw should often involve SEC in order to
- " y% h; n/-
The increasing use of computers k h da^/
makes us more productive and our assure the protection of classified or a'
work easier. However, the proper pro-sensitive-unclassified intormation.
tection of information processed by When the visit involves classified in-computer systemsis essential. ONLY With the increased use of terrestrial f rmation, certification of clearance i
under special circumstances, and microwave relays-and satellites for and need-to-know must be provided q
with the written authonzation of the transmission of communications sig-for outgoing and incoming visits with Office of Information Resources Man-nals and the availability of sophisti, employees of other Government agement, may classified information cated monitoring equipment, signals agencies, national laboratories, con-J be processed or telecommunicated can be intercepted with no physical tractors and licensees. This is accom-on automated systems.
connection to the telephone or com-plished by the completion and proc-
'munications line. Detecting such in-essing of an NRC Form 277,
- Request Sensitive unclassified information tercepts is nearly impossible. Be-forVisit or Access Approval." Another may be processed on personal com-cause the methods for remotely important reason for coordinating puters, Local Area Networks (LAN's),
intercepting regular telephone com-travel arrangements with SEC is for interactive computer systems and munications are well known to intelli-your personal protection. If you travel
(
certain ADP systems if administrative gence, security and communications abroad, particularly to designated j
4
?
c.--
1
)
countries, SEC would like to advise Physical Security
SUMMARY
you of valuable precautions that should be taken when traveling.
Photo-identification badges / key caros, keys, guards and other forms This booklet has provided you gen-Clandestine intelligence activities do of access control are used for access eral guidance on: the types of infor-exist, as accounts in various publica.
to NRC-controlled areas. Do not ad-mation NRC needs to protect; the se-tions and news articles have por-mit anyone you do not know, are not curity clearances granted to NRC trayed. There is a conscious, deter-expecting or know is not otherwise employees; the reporting responsi-mined effort by foreign govemments authorized. When you admit individu-bilities associated with your security and others to obtain classified, pro-als not known to you, the effective-clearance and employment; the prietary, economic, technical, politi-ness of the physical security meas-proper handling and protection of cal and other sensitive information.
ures is reduced. Also, promptly notify sensitive unclassified and classified You should use prudent judgment at SEC of any suspected theft or suspi-information; security-related policies a!I times in deciding when, where, clous incidents. Physical security and procedures associated with auto-and with whomyou discuss classified measures are used to protect you-mated systems and the telecommuni-or sensitive unclassified information.
personal possessions, Government cation of sensitive unclassified and Additionally, you should report any at.
property and f acilities where sensitive classified information; and the need tempt to use you to obtain illegal or unclassified and classified informa-to coordinate certain meeting and unauthorized access to classified or tion is located. However, each indi-travel arrangements with SEC.
otherwise sensitive information or if vidual employee is a key to ensuring you are concemed that you may be maximum security, the target of an attempted exploitation Contact your Security Advisor for gen-by a foreign entity.
'W ~- -~ '79 eral security advice and assistance; ky;Q}
9 your Authorized Classifier for classifi-k g
cation guidance; or your Systems Se-y.
M automated systems. You may also O
curity Officer for questions regarding m
r.
M eh want to refer to NRC Management Di-h rective Volume 12 or call the Division of Security directly.
e y
(
F 1$
4 L
W Because the threats and liabilities are
%ff,
- MM, Q quite real to you personally, and to the 5?" t**
pj national security in general, compli-4 %},
p%l1% 2 y
,i
{1 ]
ance with NRC security policies and v
' y' Vgp p
t v
w' procedures is very important. One J&
k, person can make a difference r
is d i d slLT7427 Carn a and..YOU ARE THE KEY!
QV I
k N
n/; x
+
o 7
3 5
- i a,
(& f l;;
f t
e*
. c,._k g
,\\
4 E
2$
M O
5 l
L
NUREG/BR-0027, Rev. 3 i
120555139531 1 lac US NRC-0ADM DIV.FOIA & PUBLICATIONS SVCS TPS-PDR-NUREG P-211 WASHINGTON DC 20555 l
\\
l l
L 1