ML21089A217

From kanterella
Revision as of 16:28, 21 July 2021 by StriderTol (talk | contribs) (StriderTol Bot insert)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search
IMC 0620 Inspection Documents and Records
ML21089A217
Person / Time
Issue date: 07/09/2021
From: Marc Ferdas, Ann Marie Stone
NRC Region 1, NRC/RGN-III
To:
Hipschman TR
Shared Package
ML21089A213, ML21158A122 List:
References
CN 21-023, DC 21-008
Download: ML21089A217 (27)


Text

NRC INSPECTION MANUAL IRIB INSPECTION MANUAL CHAPTER 0620 INSPECTION DOCUMENTS AND RECORDS Effective Date: 07/09/2021

TABLE OF CONTENTS 0620-01 PURPOSE .............................................................................................................. 2 0620-02 DEFINITIONS ......................................................................................................... 2 02.01 Agencywide Documents Access and Management System (ADAMS)...................... 2 02.02 Classified Information ............................................................................................... 2 02.03 Sensitive, Unclassified Information ........................................................................... 2 02.04 Document Types ...................................................................................................... 3 02.05 Docket File ............................................................................................................... 3 02.06 Freedom of Information Act (FOIA)........................................................................... 3 02.07 Handwritten Note...................................................................................................... 4 02.08 Inspection ................................................................................................................. 4 02.09 Finding ..................................................................................................................... 4 02.10 Working Files ........................................................................................................... 4 02.11 Personal Files .......................................................................................................... 5 02.12 Proprietary Information ............................................................................................. 5 02.13 Records .................................................................................................................... 5 02.14 Regulatory Requirement........................................................................................... 6 02.15 Unfettered Inspector Access..................................................................................... 6 0620-03 RESPONSIBILITIES ............................................................................................... 6 03.01 Executive Director for Operations (EDO) .................................................................. 6 03.02 Office Directors and Regional Administrators ........................................................... 6 03.03 Inspector Supervisors ............................................................................................... 6 03.04 Inspectors................................................................................................................. 7 0620-04 BASIC REQUIREMENTS ....................................................................................... 7 04.01 Requesting, Obtaining, Reviewing and Disposal of Inspection Related Information .. 7 04.02 Documents and Records During Inspection Activities ..............................................11 04.03 FOIA Requirements .................................................................................................15 04.04 Record Retention and Disposition ...........................................................................16 0620.05 REFERENCES ....................................................................................................18 Exhibit 1 - Use of Photographs or Videos During Inspections or Informal Training ........... Exh1-1 Exhibit 2 - Paperwork Reduction Act Statement ............................................................... Exh2-1 - Revision History for IMC 0620 .................................................................... Att1-1 Issue Date: 07/09/21 i 0620

0620-01 PURPOSE 01.01 To provide general guidance for requesting, creating, controlling, and dispositioning documents and records during all phases and types of the U.S. Nuclear Regulatory Commission (NRC) inspection program This is not intended to replace guidance in relevant agency manual chapters identified in the reference section which serve as the final authority.

0620-02 DEFINITIONS 02.01 Agencywide Documents Access and Management System (ADAMS). A document management and recordkeeping system that maintains the official records of the agency and manages their disposition.

02.02 Classified Information. Information that has been determined, pursuant to an Executive Order (E.O.) or by statute, to require protection against unauthorized disclosure and is classified pursuant to such authority. Classified information includes designated National Security Information, Restricted Data, and Formerly Restricted Data. Such classifications may include, but are not limited to, Top Secret, Secret, and Confidential and are consistent with NRC Management Directive (MD) 12.2, "NRC Classified Information Security Program.

a. Classified National Security Information. Information that has been determined pursuant to E.O. 13526, Classified National Security Information, as amended, or any predecessor order or successor order, to require protection against unauthorized disclosure and that is so designated.
b. Restricted Data. All data concerning the design, manufacture or utilization of atomic weapons, the production of special nuclear material, or the use of special nuclear material in the production of energy, but not data declassified or removed from the category pursuant to 42 U.S.C. 2011 et seq., Atomic Energy Act of 1954, as amended (AEA), Section 142, Classification and Declassification of Restricted Data.

02.03 Sensitive, Unclassified Information. Safeguards Information (SGI), Safeguards Information-Modified Handling (SGI-M), and Sensitive Unclassified Non-Safeguards Information (SUNSI). Refer to http://drupal.nrc.gov/sunsi for more information on SUNSI, including Personally Identifiable Information and pre-decisional enforcement information. Continue to use SUNSI guidance until Controlled Unclassified Information (CUI) is fully implemented at the NRC.

Note: The NRC is currently in the process of transitioning from the agencys SUNSI program to the government-wide CUI program established by E.O. 13556 and implementing regulations from the National Archives and Records Administration in 32 Code of Federal Regulations (CFR) Part 2002. Refer to https://drupal.nrc.gov/cui for more information on the NRCs transition to CUI. Continue to use existing SUNSI guidance until the NRC fully implements the CUI Program.

a. Safeguards Information (SGI). Refer to 10 CFR 73, Physical Protection of Plants and Materials, Section 2, Definitions, and Management Directive (MD) 12.0, Glossary of Security Terms. An individuals access to SGI requires both a valid need to know for the information and an authorization based on an appropriate background check.

Issue Date: 07/09/21 2 0620

b. Safeguards InformationModified Handling (SGI-M). Refer to MD 12.0. The SGI-M designation allows certain licensees, vendors, or applicants to have access to certain Safeguards Information without completing a full background investigation. Within the NRC, SGI-M is handled and stored the same as SGI.
c. Sensitive Unclassified Non-Safeguards Information (SUNSI). Refer to https://drupal.nrc.gov/sunsi. SUNSI is defined as any information of which the loss, misuse, modification, or unauthorized access can reasonably be foreseen to harm the public interest, the commercial or financial interests of the entity or individual to whom the information pertains, the conduct of NRC and Federal programs, or the personal privacy of individuals. This includes, among other things, proprietary information obtained from a licensee, security-related information that does not qualify as SGI or classified information, NRC pre-decisional information, and PII.

02.04 Document Types

a. Licensee, Vendor, or Applicant-Controlled Document. Any document, correspondence, email, or information that is in the licensee's, vendors, or applicants document control or file system such as original, inventoried records, or database files (e.g., surveillance tests, operator logs, quality assurance records, cause evaluations, operability evaluations, issue reports, work orders, action requests, procedures, or calculations).

These documents are generally required to be retained by the licensee, vendor, or applicant to meet regulatory requirements.

Note: When an inspector creates a copy (e.g., prints, photocopies, or transcribes into written notes) of a licensee, vendor, or applicant-controlled document, that document copy would be considered NRC property under NRC possession and control and would therefore be subject to the Freedom of Information Act (FOIA).

b. NRC Controlled Document. Any document, correspondence, email, or information that requires special handling to restrict access or disclosure. These include documents that contain classified information, SGI, SGI-M, and SUNSI.
c. Licensee, Vendor, or Applicant Draft Document. A preliminary written document, preliminary sketch, or drawing. A document is considered to be a draft while it is being developed and reviewed. It ceases to be a draft only when it has been approved by responsible management and issued as a final document for implementation (Refer to Inspection Manual Chapter (IMC) 0330, Guidance for NRC Review of Licensee Draft Documents for additional guidance).
d. Inspection Document. Any material that is obtained or developed in preparation for, during, or resulting from the inspection of a licensee, vendor, or applicant such as inspector written (or electronic) notes.

02.05 Docket File. Records (typically stored in ADAMS) or other information related to a specific NRC docket number that provide a complete record of the transactions between the licensee, vendor, or applicant and the NRC, regardless of whether the information has been made publicly available.

02.06 Freedom of Information Act (FOIA). Federal law that establishes the right of any person to obtain access to agency records, as defined by the Act, unless the records or portions Issue Date: 07/09/21 3 0620

thereof are protected from public disclosure by one of nine exemptions (Refer to MD 3.1, Freedom of Information Act; 10 CFR Part 9, Public Records). Documents are considered agency records for purposes of FOIA if they are created or obtained by the NRC and under the control of the NRC at the time a FOIA request is made.

When evaluating whether the NRC controls a record, the following are taken into consideration:

whether the licensee has intended to relinquish control of the document to the NRC; the ability of the NRC to use and dispose of the document as it sees fit; the extent to which the NRC has relied upon the document; and the degree to which the document has been integrated into the NRCs records or files in the course of official agency business. As stated in Section I.B.1 of the Handbook to MD 3.1, Freedom of Information Act, [t]o be under the control of the agency, the record must have come into the agencys possession through the legitimate conduct of its official duties.

Documents, including copies of licensee, vendor, or applicant documents are considered to be in the possession and control of the NRC when they are removed from licensee, vendor, or applicant-controlled space or property, and taken into NRC custody, such as when copies or digital media containing licensee documents are taken into the resident inspectors office or off site by an inspector. However, such documents reviewed electronically on a licensee, vendor, or applicant-controlled network or web site, if not downloaded to an NRC controlled network or printed, are not considered to be in the possession and control of the inspector.

02.07 Handwritten Note. An informal method of communicating information to individual members of the licensee, vendor, or applicant staff during the performance of an inspection (while on-site). Examples include leaving a note on a licensee, vendor, or applicant staff member's desk indicating the inspector had stopped by, or writing down a procedure (e.g.,

drawing, record) number for a licensee, vendor, or applicant document control clerk to retrieve.

02.08 Inspection. The examination, review, or assessment of any program or activity of a licensee, vendor, or applicant to determine the effectiveness of the program or activity, to ensure that the health and safety of the public and plant or facility personnel are adequately protected, to ensure that the facility is operated safely, and to determine compliance with any established standards, applicable rule, order, regulation, or license condition.

02.09 Finding. Refer to IMC 0610, Nuclear Material Safety and Safeguards Inspection Reports, IMC 0611, Power Reactor Inspection Reports, IMC 0613, Power Reactor Construction Inspection Reports, IMC 0614, Documenting 10 CFR 52 Construction Audit Activities, IMC 0615, Research and Test Reactor Inspection Reports, IMC 0616, Fuel Cycle Safety and Safeguards Inspection Reports, and IMC 0617, Vendor and Quality Assurance Implementation Inspection Reports for the appropriate definition and context.

02.10 Working Files. (Refer to 36 CFR 1222, Creation and Maintenance of Federal Records). Working files, such as preliminary drafts and rough notes, and other similar materials, are generally temporary records that are maintained to ensure adequate and proper documentation until used to create a longer-term record, or superseded by development of another record, or no longer needed, such as to preserve a complete understanding or explanation of an agency action or decision. Examples of working files created by an inspector include but not limited to: (1) written (or electronic) notes; and (2) written (or electronic) notes taken on copies of licensee, vendor, or applicant documents, calculations. These notes or files are often created and used during the course of an inspection and aid in the implementation of an inspection and the creation of an inspection report. NOTE: Most inspection-related working Issue Date: 07/09/21 4 0620

file records are short lived and do not ultimately go into ADAMS (Refer to Section 04.04a for additional guidance).

02.11 Personal Files. Personal files (also called personal papers) are documentary materials belonging to an individual that are not used to conduct agency business and are not needed to properly document agency actions or decisions. Examples include documents such as personal correspondence related to private business or written (or electronic) notes about agency business that someone makes solely for that persons own use, such as memory refreshers.

Personal files are excluded from the definition of Federal records and are not covered by agency records retention schedules.

Personal files should be maintained separately from agency records. Information about private matters and agency business should not be mixed with official business. If information about private matters and agency business appears in a single document, the personal information may be deleted or redacted, and the redacted version treated as a federal record. The use of a label such as personal does not control the status of documentary materials in a federal agency.

Although personal files are typically not considered agency records subject to a FOIA request, if an employee has responsive records that he or she believes to be personal records, these records are reviewed by the employee using NRC Form 510, Personal Record Checklist, to determine if the records are personal or agency records. If the employee determines that the records are personal, the completed Form 510 and the personal records are provided to the FOIA Privacy Act staff. Alternatively, the completed Form 510 and personal records may be retained by the offices FOIA coordinator. The FOIA staff will inform the requester in writing of this determination. The personal records must be maintained for 6 years from the date of the NRCs final response to the requester either by the employee, the office FOIA coordinator, or the FOIA staff. For detailed information on FOIA procedures and definitions see MD 3.1.

02.12 Proprietary Information. Information obtained from a person outside the federal government that consists of (1) trade secrets, or (2) commercial or financial information, and which the person treats as privileged or confidential. Proprietary information that is submitted to the NRC must comply with the document marking and affidavit requirements set forth in 10 CFR 2.390(b) in order for the NRC to treat the information as proprietary and withhold from public disclosure. Refer to http://drupal.nrc.gov/sunsi for more information.

02.13 Records:

Disposition. Those actions taken regarding records no longer needed for the conduct of the regular current business of the agency. (36 CFR 1220.18, What Definitions Apply to the Regulations in Subchapter B?)

a. Official Records. All books, papers, maps, photographs, and machine-readable documentary materials regardless of form or physical characteristics created or received by any agency of the United States Government under Federal law or in connection with the transaction of public business and that are preserved or appropriate for preservation by that agency or its legitimate successor as evidence of the organization, functions, policies, decisions, procedures, operations, or other activities of the Government or because of the informational value of the data contained in these materials (see 44 U.S.C. 3301, Definition of Records also 36 CFR 1220.18).

Issue Date: 07/09/21 5 0620

Records created (e.g., copying or printing licensee documents) by the NRC inspector, or reproduced by any means (e.g., inspector written notes), could be considered federal records if preserved or determined appropriate for preservation by the NRC.

b. Privacy Act Records. Any item, collection, or grouping of information about an individual that is maintained by the NRC in a Privacy Act system of records, including but not limited to the individuals education, financial transactions, medical history, employment history, or criminal history, that contains the individuals name, or the identifying number, symbol, or other identifying particular assigned to the individual, such as a fingerprint, a voice print, or a photograph and is retrieved by the individuals identifier. (See MD 3.2, Privacy Act)
c. Retention Period. The length of time that records must be kept.

(Refer to 36 CFR 1220.18 and, NUREG 0910 Comprehensive Records Disposition Schedule) 02.14 Regulatory Requirement. A legally binding obligation such as a statute, regulation, license condition, technical specification, or order.

02.15 Unfettered Inspector Access. Access equivalent to access provided regular plant or facility employees, following proper identification and compliance with applicable access control measures for security, radiological protection and personal safety (See 10 CFR 50.70, 10 CFR 70.55, and 10 CFR 30.52, all titled Inspections). Typically, regular plant or facility employees can copy, print, download, or email licensee, vendor, or applicant documents with few restrictions and review such documents. Unfettered access applies only to regulated activities. Refer to Section 04.01b.

0620-03 RESPONSIBILITIES 03.01 Executive Director for Operations (EDO). Approves the release of all inspection documents that have not been officially issued unless specifically authorized under Office Instructions or Management Directives, or any information contained therein, except in cases where release authority for significant safety or safeguards issues has been granted to the office directors or regional administrators.

03.02 Office Directors and Regional Administrators

a. Establish internal controls and implement existing policies, guidance, and regulatory requirements for the collection, acquisition, control, and disposition of documentation used in preparing for inspections, gained during the conduct of inspections, and resulting from inspections.
b. Ensure appropriate corrective actions are taken and notifications made when inspection documents are released contrary to NRC policies, procedures, regulations, and legal requirements.

03.03 Inspector Supervisors

a. Ensure that their staff is cognizant of, adheres to, and implements existing policies, guidance, and regulatory requirements for the collection, acquisition, control, and Issue Date: 07/09/21 6 0620

disposition of documentation used in preparing for inspections, gained during the conduct of inspections, and resulting from inspections.

b. Takes appropriate corrective actions and make required notifications to the Cybersecurity Incident Response Team (CSIRT) when inspection documents are released contrary to NRC policies, procedures, regulations, and legal requirements.

Additional information concerning information spills can be found in MD 3.4 and 12.5.

c. Review and approve docketed notification of inspection and request for information correspondence letters and ensure that information requests are compliant with the Paperwork Reduction Act (PRA). Questions concerning PRA requirements for a request for information, the Information Collections Team in Office of Chief Information Officer (OCIO) should be contacted.

03.04 Inspectors Follow regulatory requirements, policies, and guidance for the acquisition, control, and disposition of inspection documentation.

0620-04 BASIC REQUIREMENTS The NRC generates and receives many categories of documents and emails containing SUNSI.

Inspectors are responsible for properly handling, marking (including portion marking when applicable), and protecting from unauthorized disclosure of SUNSI. See NRCs internal webpage for additional guidance (https://drupal.nrc.gov/sunsi).

04.01 Requesting, Obtaining, Reviewing, and Disposing of Inspection-Related Information

a. Requesting Documents as Part of Inspection Preparation.
1. Requests for documents or information needed either to prepare for an inspection or during an inspection are to be reasonable and should not unnecessarily burden the licensee, vendor, or applicant.
2. Inspectors should not normally request documents that already exist as NRC official records in ADAMS.
3. For team inspections, the lead inspector or team leader should prepare a list of documents that are needed for the inspection or that the inspector would like to have available upon arrival at the site. One accepted practice would be for the lead inspector or team leader to email the notification of inspection and request for information to the licensee, vendor, or applicant far enough in advance to allow for adequate preparations. However, if desired, a letter on the docket can be drafted. The purpose of this is to provide advance notification and avoid placing unnecessary burden on the licensee, vendor, or applicant. Inspectors should communicate lengthy requests for documents to the licensee, vendor, or applicant at least 30 days before the documents are needed when inspection lead time permits. Documents received through this process may become part of the working file or inspection record which would be subject to the FOIA. These type of written or electronic requests are official records and should be placed in ADAMS.

Issue Date: 07/09/21 7 0620

Resident and senior resident inspectors should periodically communicate to appropriate licensee staff the types of documents they will be routinely inspecting, and which may routinely be under NRC possession and control and subject to the FOIA.

4. Corresponding with the licensee, vendor, or applicant via email or phone are appropriate methods to request additional documents.
5. Documents that contain classified information (i.e. National Security Information and Restricted Data) may not be transmitted via email. SGI may not be emailed over an unprotected network unless the files are encrypted on an SGI system using a Federal Information Processing (FIPS) Standard Publication 140-02, Security Requirements for Cryptographic Modules, compliant version of Pretty Good Protection software, then transferred via diskette (in encrypted form) to the local area network for email transmission. (Refer to MD 12.2, MD 12.4, NRC Telecommunications Systems Security Program, and MD 12.7 NRC Safeguards Information Security Program for the current policy). SGI and Confidential may be mailed, if properly packaged (mailing of classified information isnt limited to SGI and Confidential). The approved NRC classified mailing address shall be used for classified information. SGI and Confidential data can also be transferred using a secure fax machine with appropriate controls established in agency guidance. SUNSI encompasses a wide variety of categories (e.g., personal privacy, allegations, pre-decisional, proprietary etc.)

handled according to the requirements found on the SUNSI web site at http://drupal.nrc.gov/sunsi

6. Email may be used for transactional purposes with licensees to exchange general information on administrative activities (such as schedules, meeting preparations, and travel plans), or to request additional documents for review during inspection activities. These emails must be sent from NRC accounts, or be carbon copied (ccd) or forwarded to an NRC account within 20 days. So long as these emails do not contain agency positions, draft conclusions, or otherwise provide evidence of agency decision-making, they typically do not need to be placed in ADAMS. If technical communications and/or questions are communicated during inspection preparation, see Section 04.02.c.2 for guidance on controlling the information.
7. Letters or emails requesting inspection information at the beginning of the inspection from the licensee, vendor, or applicant should include a PRA statement which includes a valid Office of Management and Budget (OMB) control number. Refer to Exhibit 2 for a sample PRA statement. To ensure compliance with the PRA, the author should verify the accuracy of their PRA statement by contacting the Information Collection Team in OCIO.
b. Obtaining and Sharing Documents During Inspection Activities.

The licensee, vendor, or applicant is obligated to provide unfettered access to all licensee documents related to regulated activities and the NRC has the authority to inspect and create inspection records to effectuate the purposes of the AEA, as amended. (Refer to 10 CFR 73.55, Requirements for Physical Protection of Licensed Issue Date: 07/09/21 8 0620

Activities in Nuclear Power Reactors against Radiological Sabotage, sections (e)(2),

and (q), and 10 CFR 73.70, Records, for further information.)

Inspectors should become familiar with and observe the established licensee, vendor, or applicant document control practices applied to regular plant employees. Inspectors should also openly communicate with the licensee about ongoing inspection activities and should be sensitive to protecting sensitive licensee information such as, personal privacy information or proprietary information from improper disclosure. If not done when the documents were obtained, inspectors should inform the licensee when copies of licensee, vendor, or applicant documents will be removed from the site unless it is believed that informing the licensee, vendor, or applicant would compromise the identity of an alleger, or other type of investigation, in which case regional management should be consulted prior to removal. Generally, the licensee, vendor, or applicant should be afforded the opportunity to identify any material it considers sensitive under 10 CFR 2.390, such as, personal privacy information, or proprietary information, to request withholding from public disclosure prior to site removal.

Licensee, vendor, or applicant objections over the NRCs handling of documents should be promptly shared with management. Inspectors should also inform management when they have indications that a licensee, vendor, or applicant could be impeding or interfering with inspections or could be fettering inspector access to determine if a violation of 10 CFR 30.52, 10 CFR 50.70, and/or 10 CFR 70.55 exists or if actions should be taken under Section 235 of the AEA.

Acceptable practices for obtaining licensee, vendor, or applicant documents include but are not limited to the following:

1. Requesting the licensee, vendor, or applicant to send the documents to the regional office addressed to the individual inspector assuming the request does not place unnecessary burden on the licensee, vendor, or applicant.
2. Requesting that the documents be sent electronically to the team leader or lead inspector. This includes the use of file sharing services. (See 04.01.b.8 for additional information).
3. Sending a designated inspector to the site to obtain the needed documents from the licensee, vendor, or applicant.
4. Requesting the resident inspectors office staff retrieve the needed documents from the licensee, vendor, or applicant.
5. Using the licensees, vendors, or applicants computer in accordance with the approved NRC memorandum of understanding between both parties.
6. Using the licensees, vendors, or applicants copy machine to make copies of materials relevant to the inspection.
7. Using the licensees, vendors, or applicants intranet or equivalent to view or download files that the licensee, vendor, or applicant has uploaded. The inspector should inform the licensee that files downloaded by NRC staff will be in Issue Date: 07/09/21 9 0620

the agencys possession and control and as such may be subject to disclosure if subject to a FOIA request.

8. The use of BOX Enterprise File Synchronization Sharing (EFSS). Staff have the responsibility to protect sensitive NRC information, as directed in non-public Yellow Announcement (YA)20-044, Use of External File Share Services, and MD 12.5, NRC Cybersecurity Program. The use of BOX-EFSS has been approved as the agencys file sharing solution for SUNSI. No other solution shall be used for NRC-initiated file sharing of business information.

In cases where an external entity such as a licensee or another agency initiates an invitation, file sharing services other than BOX-EFSS may be used to collaborate on non-NRC information. When receiving an invitation from an external entity, register an account using your NRC email address. No NRC SUNSI information should be exchanged using these file share solutions.

While the scope of MD 12.5 does not include the handling of personal Personally Identifiable Information, staff should review and consider the privacy capabilities of file sharing solutions to ensure adequate protection of their information. When handling personal data using an NRC device, staff should refer to and follow guidance in MD 2.7, Personal Use of Information Technology.

NRC Work-Related Activity Solution Audience Email Account Information Type Licensees, Sharing NRC data BOX-EFSS Contractors, or NRC SUNSI NRC staff Licensees, Invited to share by Licensed solution Contractors, or NRC Non-SUNSI external entity by external entity NRC staff Non-NRC Work-Related Refer to MD 2.7, Sharing personal Personal Use of Self or someone Personal Personal data data Information else Technology Note: NRC inspectors should inform licensees that documents obtained during the course of an inspection may be agency records subject to release under the FOIA. If a licensee, vendor, or applicant asserts that any of the documents or document excerpts to be retained by an inspector as an NRC official record contain proprietary, the NRC should advise the licensee, vendor, or applicant to submit an application for withholding pursuant to 10 CFR 2.390 Section (b)(1) with the required affidavit before any of the documents are placed in ADAMS in accordance with Section 04.04a. The licensee, vendor, or applicant must provide the affidavit to the lead inspector or team leader at the exit meeting or within 10 working days after the exit meeting.

Issuance of a suspension order may be appropriate when a licensee is not reasonably cooperating with legitimate NRC requests for documents. It would not typically be expected that Issue Date: 07/09/21 10 0620

the NRC would need to resort to a subpoena for licensee documents that are required to support regulatory oversight.

04.02 Documents and Records During Inspection Activities

a. Draft Documents & Other Information
1. Inspectors should not normally request draft documents or analyses that do not exist in final, approved form in the licensees, vendors, or applicants document control system. However, on occasion inspectors will need to request and review draft information to verify the adequacy of taken or planned corrective actions as they relate to immediate safety concerns or issues, such as compensatory measures taken to address equipment operability. The licensee may choose to provide draft information to Senior Risk Analyst (SRA) to support timely and accurate risk assessments. Inspectors should not act as a consultant when reviewing draft documents.
2. Inspectors should not request that a licensee, vendor, or applicant generate documents such as analyses, position papers, or calculations, that are not needed to meet a regulatory requirement or demonstrate compliance. Requests to generate non-existent analyses, position papers, or calculations related to regulatory requirements or compliance issues can be addressed using 10 CFR 50.54, Conditions of Licenses, Section (f) as appropriate.
3. Inspectors can request from the licensee, vendor, or applicant specific records in the licensees, vendors, or applicants document control system such as lists of modifications or corrective action program documents sorted by date, subject, status, or another attribute.
b. Use of Cameras and Recording (Including Video) Devices
1. Inspectors should ensure that the licensee, vendor, or applicant is made aware that inspectors may be taking photographs or video recordings during the course of their normal inspection activities. Photographs or video recordings should be taken from NRC issued devices. In instances when this does not occur, they should be forwarded to an NRC account within 20 days.
2. Inspectors should verify that the licensee, vendor, or applicant is not recording any virtual meetings as part of interactions during inspection activities. If recording is made, the inspector should consult with regional counsel.
3. Inspectors are expected to openly communicate and observe all established licensee, vendor, or applicant procedures for photography or recording. The licensee, vendor, or applicant may not impede or interfere with inspections by limiting the use of NRC cameras or recording devices (See Section 235 of the AEA). Sensitive photographs or recordings requiring protection under 10 CFR 2.390 should be appropriately marked. Photographs or recordings containing sensitive information should be properly designated by inspectors prior to transmitting off site.

Issue Date: 07/09/21 11 0620

4. Refer to Exhibit 1 for further guidance on the use of photographs or videos during the inspection process.
c. Written Notes and Electronic Correspondence
1. Handwritten notes to licensee, vendor, or applicant should to the extent possible, only communicate general information on administrative activities or to request specific documents associated with the inspection when on-site.
2. Email may be used to provide questions to licensee, vendor, or applicant as part of inspection activities. These emails must be sent from NRC accounts, or be carbon copied (ccd) or forwarded to an NRC account within 20 days and should not contain draft agency position or inspection conclusions. Emails seeking to clarify information regarding ongoing technical aspects identified by an inspector in the course of an inspection do not typically need to be placed in ADAMS.

However, such emails, as well as any response received via email, should be reviewed on a case-by-case basis pursuant to MD 3.53, NRC Records Management Program, to determine whether they are appropriate for preservation in ADAMS as a federal record (44 U.S.C. 3301). Staff should assess whether such emails would serve as evidence of NRC decisions not otherwise contained in the inspection report. If determined not to be federal records, they should be controlled as part of the working file and can be destroyed upon verification of successful creation of the final document or file, or when no longer needed for business use, whichever is later. Inspectors should be aware that working files and licensee, vendor, or applicant responses may be subject to the FOIA while they are in the agencys possession and control.

3. Written or electronic notes created by the inspector can be considered as working files as defined in Section 02.10 and are generally discarded after the inspection report is finalized, since the information deemed relevant to any inspection issue has been captured in the final inspection report. Inspectors written/electronic notes shall not be shared with the licensee.
d. Team Meetings, Licensee, Vendor, or Applicant Debrief, and Exit Meetings.
1. The team leader normally makes an integrated list of the significant inspection observations identified at team meetings; the observations are considered inspector's written notes. As a courtesy, the team leader or lead inspector discusses them daily with licensee, vendor, or applicant management to ensure effective and efficient communications at the exit meeting.
2. It is acceptable to use a dry erase white board, as well as a Power Point presentation, during the licensee, vendor, or applicant debrief as a discussion aid. Power Point presentations, used in an exit debrief to provide a proper understanding of agency decisions and actions, should be placed into ADAMS as a non-public official agency record (Refer to MD 3.53).
3. A written or electronic list of preliminary inspection findings should not be given to licensee, vendor, or applicant management. However, if it is necessary to give to the licensee, vendor, or applicant, see Section 04.04.b.6.

Issue Date: 07/09/21 12 0620

e. Storage and Disposal of Inspector Written Notes and Materials
1. Before using licensee, vendor, or applicant facilities for the disposal of an inspectors documents or written notes, the inspector should determine whether the information, if made available to the licensee, vendor, or applicant, would interfere with the NRC's ability to effectively regulate. If so, the disposal of these materials should be done at an NRC facility. (An example would be notes from the inspection that contain information which may lead to a specific inspection decision being shared with a licensee prior to inspection results that are published in an inspection report.)
2. Inspectors shall continually assess the need to maintain copies of licensee, vendor, or applicant documents and working file documents. Inspectors should limit documents to only those which provide information of significance for the NRCs oversight or will be retained as NRC official records. This policy reduces the administrative burdens associated with retaining unnecessary records.
3. Inspection teams should arrange with the licensee, vendor, or applicant to store inspection-related copies of licensee, vendor, or applicant documents not actively being reviewed outside the resident inspectors office, especially when the team is off site. Inspectors should not lock licensee, vendor, or applicant documents in an NRC controlled locker outside of the residence inspectors office.
f. Licensee, Vendor, or Applicant-Controlled Information and Space
1. When the licensee, vendor, or applicant uses a form to request controlled documents from its storage facility or document control clerks, the inspector may fill out this form following the licensee's, vendors, or applicants procedures.
2. Inspectors may review licensee, vendor, or applicant-controlled documents and records at any time during the inspection on licensee, vendor, or applicant owned property. This also includes any licensee-controlled documents maintained by the licensee in the resident inspectors office. Inspectors should not remove controlled documents from the licensee's, vendors, or applicants property or resident inspectors office, or dispose of it without informing the licensee.

Confidential commercial information (e.g., third party accreditation reports) should be reviewed on licensee-owned property outside of the Resident Inspectors Office to the extent possible and generally should not be reproduced by NRC inspectors unless required to support regulatory oversight.

3. Office space provided on-site and outside of the residence inspectors office for inspections or record reviews is not considered NRC office space, even if the licensee provides a key to the NRC. In this space, licensee, vendor, or applicant documents reviewed by inspectors are considered to be in the possession of licensee unless added to the NRC working file by the inspector. Inspectors should be aware that if they take written notes on licensee, vendor, or applicant documents, the documents become part of the working file record which shall ultimately be disposed of or retained in accordance with Section 04.04a.

Licensee, vendor, or applicant documents reproduced by the NRC or given to the NRC by licensee staff may be added to the NRC working file by the inspector.

Issue Date: 07/09/21 13 0620

While in the NRCs possession, these documents are subject to FOIA. NRC staff should take appropriate precautions to protect information in this type of space.

g. Licensee, Vendor, or Applicant Forms and Written Documentation
1. Some licensees, vendors, or applicants may supply forms for inspectors to use during inspections, for written questions or to request information and documents that are needed to continue the inspection. Inspectors shall only use licensee, vendor, or applicant-generated forms to request records and documents. The inspector should not use these forms to provide questions. Some licensees, vendors, or applicants may document and track an inspectors questions and then generate written interim and final answers to these questions. These written responses can be reviewed by the inspector during the on-site inspection.
2. Electronic responses by licensee to questions emailed by the inspector during the course of an inspection can be considered working files as defined in Section 02.10 and are generally discarded after the inspection report is finalized, since the information deemed relevant to any inspection issue has been captured in the final inspection report. However, such email responses should be reviewed on a case-by-case basis pursuant to MD 3.53, NRC Records Management Program, to determine whether they are appropriate for preservation in ADAMS as federal records (44 U.S.C. 3301). Staff should assess whether such emails would serve as evidence of NRC decisions not otherwise contained in the inspection report.
h. Release of Information Before Inspection Report Issuance
1. Discussions with licensees, vendors, or applicants related to information contained in the inspection report should be limited to the observations made by the inspector during the inspection and the inspectors preliminary assessment of the observation. It is helpful to verbally share information such as influential assumptions, exposure time information, common cause modeling assumptions, etc., but it is essential to maintain our independence as well.
2. Consistent with NRC policies, procedures and regulatory requirements, no portion of any inspection report or draft inspection documents shall be shown to or given to licensees, vendors, or applicants, or to any other group or person external to the NRC before formal issuance of the inspection report, without the explicit permission of the EDO (Refer to MD 3.4, Release of Information to the Public). This includes, documentation containing cut-sets in support of detailed risk evaluations performed in accordance with IMC 0609, Significance Determination Process.
3. If inspection documentation is inadvertently or improperly released, the inspector should promptly report the unauthorized disclosure to their supervisor. Refer to MD 3.4, 3.5, and 12.5 for further actions and additional information.
4. If inspection documents or inspection-generated information are inadvertently left unattended for a period of time in a non-NRC controlled area or public space, it should be determined whether the subject matter was reviewed in detail by third parties or if a substantive release of information occurred. If release of Issue Date: 07/09/21 14 0620

information is evident, the division director should be notified for further discussion and any security-related aspects of the release should be address in accordance with the applicable MD.

5. If email is being used to convey pre-decisional inspection information, inspectors shall be mindful of the type of information they put in emails, as well as the names listed in the To, cc, and bcc fields. Emails have the potential to be misconstrued or taken out of context, if inadvertently released to the public or released through a FOIA request. Use of email groups, which only contain NRC staff members, is encouraged to reduce the risk of MS Outlook sending email to unintended recipients by using the auto-complete function.
6. Existing technologies, such as shared internal drives, SharePoint, or Teams, are alternate ways to communicate sensitive information versus email. These methods can ensure that only those within the NRC have access to the information if used properly. A concerted effort should be made by staff and management to learn how to utilize the existing tools available and find ways to integrate use of these tools into current practices. Staff using these types of technologies shall be discouraged from extracting files from such sites and attaching them to emails, a practice that negates the security controls provided by these technologies. Rather, staff wishing to reference a document using one of these options should provide a link to the site in their NRC staff group email address.
7. Significant safety or security-related information shall be promptly and clearly communicated to responsible licensee, vendor, or applicant management to obtain prompt evaluation and corrective action. There are few circumstances where this information cannot be relayed orally. Therefore, no draft inspection documents shall be given to the licensee, vendor, or applicant unless the issue is so time-critical that oral communication will not suffice to prevent or mitigate an emergency or significant safety or safeguards event (e.g., accidental criticality, core damage). Under these circumstances prior EDO approval would not be required.

04.03 FOIA Requirements

a. Records that are in the possession and control of the NRC are subject to the FOIA.

Examples of such records include but are not limited to, the following:

1. Memoranda, facsimile transmissions (faxes), voicemails, and electronic files, such as Word files, email, and databases.
2. Licensee, vendor, or applicant documents, including but not limited to photographs, diagrams, and video recordings, which may be controlled, uncontrolled, or in draft form which are in the possession and under the control of an NRC inspector such as those files or records maintained in the working file.
3. NRC-originated photographs, videos, or sound recordings that are in the possession of the NRC staff.
4. Documented or transcribed conversations.

Issue Date: 07/09/21 15 0620

5. Inspector written notes that have been shared with others or commingled with NRC official records.
6. Background material in the possession and control of the NRC staff.
7. Preliminary inspection findings.
b. Documents may be withheld in part or in their entirety for information that falls within one or more of the FOIA exemptions defined in 10 CFR Part 9, Public Records, (See MD 3.1 for more detailed explanations of FOIA exemptions). Common exemptions that may apply to agency records in the context of inspections are Exemption 1 (classified information); Exemption 3 (SGI); Exemption 4 (proprietary information obtained from the licensee); Exemption 5 (agency pre-decisional and deliberative information); Exemption 6 or 7(C) (personal privacy information); or Exemption 7(F) (information that, if released, could reasonably be expected to endanger the life or physical safety of any individual).
c. In the event of a FOIA request that includes agency records obtained or created during the course of an inspection that, if disclosed, would reveal a licensees trade secrets or confidential commercial or financial information, the NRC is obligated to provide the submitter of that information with an opportunity to object prior to any such disclosure.

See 10 CFR 9.28. This can include any information obtained from the licensee, as well as NRC-generated records that incorporate such information, including photographs or videos taken by NRC inspectors.

Note: A copy of all records that are within the scope of the FOIA request must be provided. Any record to be withheld in part or in its entirety must be bracketed with the appropriate FOIA exemption noted.

04.04 Record Retention and Disposition

a. All federal agencies must make and preserve records containing adequate and proper documentation of the organization, functions, policies, decisions, procedures, and essential transactions of the agency. Inspectors and SRAs are to retain the essential information necessary to document the formulation of inspection and licensing conclusions and inspection-related agency decisions and actions (ex., documents, records, and correspondences including email that provide the basis for an inspection finding, significance determination, or licensing action). If the information would be needed to explain or support the actions of decisions of the NRC, the documents should be preserved in the official file. Working file records can be destroyed after they are incorporated into a final product such as an issued inspection report provided that they are not needed to fully document the agencys actions or decisions. Supplemental inspection documentation related to inspection findings or violations would not normally be maintained after the issuance of the final inspection report or beyond the time period afforded for any licensee appeals.

Supplemental inspection documentation should normally only be referenced in the inspection report when it can be readily retrieved from the licensee document control system or files.

Issue Date: 07/09/21 16 0620

b. The documents listed below are required to be declared as records and placed in ADAMS. Documents including, SGI (typically stored in the SGI local area network electronic safe (SLES)), pre-decisional enforcement documents, and allegations files, are not placed in ADAMS.
1. Written correspondence, including emails and faxes, from the licensee, vendor, or applicant that formally respond to a regulatory decision (i.e., findings, significance determination, or licensing action).
2. Team inspection notification and document request letters generated per Section 04.01a.5.
3. NRC Inspection reports.
4. Photographs, videos, or recordings that do not contain personal privacy, classified, proprietary, or safeguards information, that were required to substantiate regulatory conclusions (i.e., findings, significance determination, or licensing action).
5. Unique documents or excerpts of documents that cannot be recreated by licensee, vendor, or applicant that were used to substantiate a regulatory decision (i.e., findings, significance determination, or licensing action).
6. Where approved by the EDO, written lists of significant inspection issues requiring prompt corrective action that have been provided to the licensee, vendor, or applicant. This list should be attached to the inspection report or meeting summary when issued.
7. Any documentary information related to inspection activities that an NRC inspector distributes or presents (e.g., PowerPoint presentation) at a management meeting with the licensee, vendor, or applicant. Such written material must be placed in ADAMS and attached to or referenced in the inspection report or meeting summary.

Note: Documents or portions of documents that meet the requirements of 10 CFR 2.390 Section (b), the exceptions to the definition of agency record found at and 10 CFR 9.13, Definitions, and 10 CFR 9.17, Agency Records Exempt from Public Disclosure, generally would not be made publicly available, subject to applicable FOIA law and policy.

c. Documents and records which are not retained and contain sensitive unclassified information must be destroyed in a manner which prevents reconstruction of the information (e.g., shredded). Sensitive unclassified information may also be placed in receptacles designated for classified waste or approved for sensitive unclassified. For further information on document destruction, see the SUNSI Handling Requirements (http://drupal.nrc.gov/sunsi). For information on handling classified information or SGI, See MD 12.2 or MD 12.7.

Issue Date: 07/09/21 17 0620

0620.05 REFERENCES 10 CFR 2.390, Public Inspection Exemptions, Requests for Withholding 10 CFR 9, Public Records (FOIAs, Privacy Act Information)

E.O. 13526, Classified National Security Information MD 3.1, Freedom of Information Act MD 3.4, Release of Information to the Public MD 3.53, NRC Records and Document Management Program MD 3.54, NRC Collections of Information and Reports Management MD 12.1, NRC Facility Security Program MD 12.2, NRC Classified Information Security Program MD 12.7, NRC Safeguards Information Security Program IMC 0330, Guidance for NRC Review of Licensee Draft Documents IMC 0609, Significance Determination Process IMC 0610, Nuclear Material Safety and Safeguards Inspection Reports IMC IMC 0611, Power Reactor Inspection Reports IMC 0613, Power Reactor Construction Inspection Reports IMC 0614, Documenting 10 CFR 52 Construction Audit Activities IMC IMC 0615, Research and Test Reactor Inspection Reports IMC 0616, Fuel Cycle Safety and Safeguards Inspection Reports IMC 0617, Vendor and Quality Assurance Implementation Inspection Reports Guidance for Determining the Public Availability of NRC Records (non-public)

NRR OI COM-203, Informal Interfacing and Exchange of Information with Licensees and Applicants (non-public)

NUREG-0910, Comprehensive Records Disposition Schedule Issue Date: 07/09/21 18 0620

Exhibit 1 - Use of Photographs or Videos During Inspection or for Informal Training USE OF PHOTOGRAPHS OR VIDEOS DURING THE INSPECTION PROCESS QUESTION ANSWER Should I inform the licensee, The licensee, vendor, or applicant should be made aware that the NRC vendor, or applicant prior to taking may be taking photographs or videos during all inspection activities.

photographs or videos?

Requests by the licensee, vendor, or applicant to review photographs or videos for personal privacy, classified, proprietary, or safeguards information should normally be honored.

Use common sense in taking photographs or video as part of your routine inspection activities. Avoid taking photographs or videos of personnel or plant or facility features related to security when irrelevant to the inspection or photographs or videos that unnecessarily contain sensitive information.

Follow the licensees policy on the use of photographic and video equipment.

What if the licensee, vendor, or All licensee objections should be considered seriously. If photographs or applicant objects to taking videos contain sensitive information, such as SGI or SUNSI, they photographs or videos? should be appropriately marked and controlled in accordance with law and NRC policy. Inspectors will often need to use photography or video to effectively document inspection-related agency decisions and actions. Objections to photography or videos based on actual safety or security concerns should be evaluated, but the licensee, vendor, or applicant should not impede or interfere with NRC inspections by limiting the use of NRC cameras or video devices. Inspectors should share any licensees, vendors, or applicants concerns with their regional management when objections are raised.

Can I forward photographs or Yes, after the photograph is appropriately designated and controlled it can videos to my management be electronically forwarded to management (Refer to Question 5 for electronically without the additional guidance). The inspector should consider obtaining the licensee, licensees, vendors, or applicants vendor, or applicant review to ensure an accurate designation when review? deemed appropriate. Inspection-related photographs or videos should be controlled to prevent improper or unauthorized public disclosure.

Issue Date: 07/09/21 E1-1 0620

USE OF PHOTOGRAPHS OR VIDEOS DURING THE INSPECTION PROCESS QUESTION ANSWER Do I need something in writing No. However, requests by the licensee, vendor, or applicant to review from the licensee, vendor, or photographs or videos for classified, safeguards, or SUNSI (personal applicant that says it has reviewed privacy or proprietary information) information should normally be honored the pictures or videos for so as to ensure proper designation. Photographs or videos that include classified, safeguards, and SUNSI sensitive information must be controlled in accordance with law and agency information? policy.

Is there agency guidance on how Yes. Photographs or videos that contain proprietary information or other to forward photographs or videos kinds of SUNSI can be forwarded electronically (via email or other internal that contain classified or sensitive file sharing application). Photographs or videos that contain unencrypted unclassified information? classified or SGI cannot be forwarded via email over an unapproved network (Refer to Section 04.01a7 for additional guidance).

Also, all photographs or videos believed to contain classified information, SGI, or SUNSI must be marked in accordance with applicable requirements. Camera film, digital memory, and the recording media used to take the classified photographs must be appropriately protected and secured when unattended.

Issue Date: 07/09/21 E1-2 0620

USE OF PHOTOGRAPHS OR VIDEOS DURING THE INSPECTION PROCESS QUESTION ANSWER How do I know when photographs If the photographs or videos are used to substantiate an inspection finding or videos must be retained? and they do not contain classified or safeguards information, they should be retained and placed into ADAMS. Photographs or videos that reveal SUNSI, such as proprietary information or personal privacy information, should be placed in non-public ADAMS.

Examples of photographs used to substantiate an inspection finding include photographs or videos that are relied on to support regulatory decision-making. In some cases, the photograph may form part of the basis for the inspection finding.

When are photographs or videos required to be destroyed? If the photographs or videos are not used to substantiate an inspection finding they may be destroyed in accordance with NRC guidance for working files.

Examples of photographs not used to support an inspection finding include:

(1) those photographs or videos that are used as memory joggers to assist the inspector in finalizing the inspection report and (2) photographs or videos forwarded electronically to regional management to clarify or to discuss findings. Photographs or videos of this nature generally are not relied on for regulatory decision-making.

What if the licensee, vendor, or When the licensee, vendor, or applicant seeks to withhold from public applicant requests that a disclosure a photograph containing SUNSI (proprietary or privacy photograph be withheld from information), the NRC should advise the licensee, vendor, or applicant to public disclosure because it submit an application for withholding pursuant to 10 CFR 2.390(b)(1). If the contains personal privacy or information is proprietary the request must be accompanied by an affidavit.

proprietary information?

If the photograph is the basis for a finding, it may be edited by the licensee, vendor, or applicant to delete the sensitive information unless that information is necessary to support the finding.

Issue Date: 07/09/21 E1-3 0620

USE OF PHOTOGRAPHS OR VIDEOS FOR INFORMAL TRAINING QUESTION ANSWER If photographs or videos are not If the photographs or videos do not contain classified, safeguards used to support inspection findings information, or SUNSII (personal privacy or proprietary), they may be can they be retained for training retained for informal training purposes.

purposes?

If the photographs contain classified, safeguards information, or SUNSII (personal privacy or proprietary), then they should be destroyed unless such information is absolutely necessary to support formal training objectives.

Do I need the licensees, vendors, You do not need the licensees, vendors, or applicants permission to or applicants permission to keep retain these photographs for training purposes if you believe these these photographs or videos for photographs would be helpful in carrying out NRCs regulatory training purposes? responsibilities. However, it is a good practice to seek permission from licensee, vendor, or applicant.

Requests by the licensee, vendor, or applicant to review photographs for classified, safeguards, or SUNSII (personal privacy or proprietary information) information should normally be honored to ensure proper designated.

Are training photographs or videos Yes. Photographs and videos in the possession of the NRC even if used for subject to FOIA? training purposes are subject to FOIA.

How should the photographs or Photographs or videos that contain proprietary information must be labeled videos be identified when used for as such in accordance with the NRCs SUNSI policy ((see training purposes? https://drupal.nrc.gov/sunsi/34642),and should include the date and name of the facility or facility owner. Photographs should be documented and designated as they are produced.

Issue Date: 07/09/21 E1-4 0620

USING PHOTOGRAPHS OR VIDEOS FOR INFORMAL TRAINING QUESTION ANSWER If the photographs or videos Yes, Staff reviewing such photographs must possess the appropriate contain classified and safeguards clearance levels and have a need to know. If this is the case, such information can they still be used photographs and videos and digital devices that contain classified and for training purposes? safeguards information must be secured and agency guidance followed.

Are photographs or videos used No, if the photographs or videos are used for informal training (on the job for training purposes required to training (OJT) and learning opportunities). Yes, if the photographs or video go in ADAMS? are used for formal training (e.g., Technical Training Center).

Note: SGI photographs or videos would be stored on the SLES or on another approved storage location for training.

How long should photographs or Photographs or videos should be destroyed when they are no longer videos used for informal training needed.

(OJT and learning opportunities) be retained?

How long should photographs or Currently, the only formal training is through the Human videos used for formal training be Resources/Technical Training Division, and retention schedules exist for retained? them. Regional offices typically provide only informal training.

Issue Date: 07/09/21 E1-5 0620

Exhibit 2 - Example of a Paperwork Reduction Act Statement PAPERWORK REDUCTION ACT STATEMENT This letter contains voluntary (mandatory) information collections that are subject to the Paperwork Reduction Act of 1995 (44 U.S.C.

3501 et seq.). The Office of Management and Budget (OMB) approved these information collections (approval number 3150-XXXX). The burden to the public for these information collections is estimated to average X hour(s) per response. Send comments regarding this information collection to the FOIA, Library and Information Collection Branch, Office of the Chief Information Officer, Mail Stop: T6-A10M, U.S. Nuclear Regulatory Commission, Washington, DC 20555-0001, or by email to Infocollects.Resource@nrc.gov, and to the Desk Officer, Office of Information and Regulatory Affairs, NEOB-10202, (3150-XXXX)

OMB, Washington, DC 20503.

Public Protection Notification The NRC may not conduct nor sponsor, and a person is not required to respond to, a request for information or an information collection requirement unless the requesting document displays a currently valid OMB control number.

Note: Refer to the appropriate section of the CFR to find the applicable OMB control number for your activity (e.g., 10 CFR 30.8, 10 CFR 50.8, 10 CFR 70.8)

Note: The example PRA statement above is not appropriate in all cases and cannot be used without the permission of the Agency Clearance Officer.

It is good practice to always check with a member of the OCIO Information Collections Team when referring to specific sections of the CFR to find the applicable OMB control number.

Issue Date: 07/09/21 E2-1 0620

Attachment 1 - Revision History for IMC 0620 Commitment Accession Description of Change Description of Comment Resolution Tracking Number Training and Closed Feedback Number Issue Date Required and Form Accession Number Change Notice Completion (Pre-Decisional, Non-Date Public Information)

N/A 07/08/96 Revised to ensure compliance with the National N/A CN 96-015 Archive and Records Administration (NARA) regulations relating to the creation and retention of federal agency records.

N/A ML053330558 Completed 4-year review for commitments. N/A 01/27/06 Eliminated the requirement to list all documents CN 06-002 reviewed as an attachment to the inspection report and the requirement to place all documents reviewed in ADAMS. Updated and added security documents that contain classified information. Added guidance on the use of email during the inspection process.

N/A ML083540780 Added amplifying information on written N/A ML083540770 05/15/09 requests for information, updated definitions and CN 09-013 references.

N/A ML093270149 Improve guidance on unfettered access, N/A ML100332132 09/12/11 possession, and control. Added policy to inform CN 11-015 licensee prior to removing copies of licensee-controlled documents from the site and for inspectors to purge unnecessary licensee documents when no longer reasonably needed (FF 0620-1484). Revised the record retention guidance to conform to 36 CFR. Added guidance on information requests including the required Paperwork Reduction Act Statement.

Issue Date: 07/09/21 Att1-1 0620

Commitment Accession Description of Change Description of Comment Resolution Tracking Number Training and Closed Feedback Number Issue Date Required and Form Accession Number Change Notice Completion (Pre-Decisional, Non-Date Public Information)

ML18254A020 Clarified guidance for marking, handling and N/A ML18254A021 01/28/19 transmitting inspection documents/written notes 0620-2252 CN 19-003 internally and externally to ensure all types of ML18255A152 documents are appropriately controlled and N/A handled by inspectors. Updated information regarding FOIA, PRA and Privacy.

Revised to address feedback form 0620-2252 N/A ML20196L754 Revised to add guidance on electronic file N/A N/A 07/23/20 sharing, as noted in Yellow Announcement (YA)

CN 20-034 20-0044, and MD 12.5, NRC Cybersecurity Program N/A ML21089A217 Updated to reflect current practices on use of N/A ML21098A076 07/09/21 email by inspectors during the course of an CN 21-023 inspection. Other minor editorial changes to streamline, remove redundancy, and better clarify content.

Issue Date: 07/09/21 Att1-2 0620