This order prescribes a uniform system for classifying, safeguarding, and declassifying national security information, including information relating to defense against transnational terrorism. Our democratic principles require that the American people be informed of the activities of their Government. Also, our Nation's progress depends on the free flow of information both within the Government and to the American people. Nevertheless, throughout our history, the national defense has required that certain information be maintained in confidence in order to protect our citizens, our democratic institutions, our homeland security, and our interactions with foreign nations. Protecting information critical to our Nation's security and demonstrating our commitment to open Government through accurate and accountable application of classification standards and routine, secure, and effective declassification are equally important priorities.
Information shall not be considered for classification unless its unauthorized disclosure could reasonably be expected to cause identifiable or describable damage to the national security in accordance with section 1.2 of this order, and it pertains to one or more of the following:
| (a) |
|
At the time of original classification, the following shall be indicated in a manner that is immediately apparent: |
|
|
| (1) |
|
one of the three classification levels defined in section 1.2 of this order; |
| (2) |
|
the identity, by name and position, or by personal identifier, of the original classification authority; |
| (3) |
|
the agency and office of origin, if not otherwise evident; |
| (4) |
|
declassification instructions, which shall indicate one of the following: |
|
|
| (A) |
|
the date or event for declassification, as prescribed in section 1.5(a); |
| (B) |
|
the date that is 10 years from the date of original classification, as prescribed in section 1.5(b); |
| (C) |
|
the date that is up to 25 years from the date of original classification, as prescribed in section 1.5(b); or |
| (D) |
|
in the case of information that should clearly and demonstrably be expected to reveal the identity of a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, the marking prescribed in implementing directives issued pursuant to this order; and |
|
| (5) |
|
a concise reason for classification that, at a minimum, cites the applicable classification categories in section 1.4 of this order. |
|
| (b) |
|
Specific information required in paragraph (a) of this section may be excluded if it would reveal additional classified information. |
| (c) |
|
With respect to each classified document, the agency originating the document shall, by marking or other means, indicate which portions are classified, with the applicable classification level, and which portions are unclassified. In accordance with standards prescribed in directives issued under this order, the Director of the Information Security Oversight Office may grant and revoke temporary waivers of this requirement. The Director shall revoke any waiver upon a finding of abuse. |
| (d) |
|
Markings or other indicia implementing the provisions of this order, including abbreviations and requirements to safeguard classified working papers, shall conform to the standards prescribed in implementing directives issued pursuant to this order. |
| (e) |
|
Foreign government information shall retain its original classification markings or shall be assigned a U.S. classification that provides a degree of protection at least equivalent to that required by the entity that furnished the information. Foreign government information retaining its original classification markings need not be assigned a U.S. classification marking provided that the responsible agency determines that the foreign government markings are adequate to meet the purposes served by U.S. classification markings. |
| (f) |
|
Information assigned a level of classification under this or predecessor orders shall be considered as classified at that level of classification despite the omission of other required markings. Whenever such information is used in the derivative classification process or is reviewed for possible declassification, holders of such information shall coordinate with an appropriate classification authority for the application of omitted markings. |
| (g) |
|
The classification authority shall, whenever practicable, use a classified addendum whenever classified information constitutes a small portion of an otherwise unclassified document or prepare a product to allow for dissemination at the lowest level of classification possible or in unclassified form. |
| (h) |
|
Prior to public release, all declassified records shall be appropriately marked to reflect their declassification. |
| (a) |
|
Information shall be declassified as soon as it no longer meets the standards for classification under this order. |
| (b) |
|
Information shall be declassified or downgraded by: |
|
|
| (1) |
|
the official who authorized the original classification, if that official is still serving in the same position and has original classification authority; |
| (2) |
|
the originator's current successor in function, if that individual has original classification authority; |
| (3) |
|
a supervisory official of either the originator or his or her successor in function, if the supervisory official has original classification authority; or |
| (4) |
|
officials delegated declassification authority in writing by the agency head or the senior agency official of the originating agency. |
|
| (c) |
|
The Director of National Intelligence (or, if delegated by the Director of National Intelligence, the Principal Deputy Director of National Intelligence) may, with respect to the Intelligence Community, after consultation with the head of the originating Intelligence Community element or department, declassify, downgrade, or direct the declassification or downgrading of information or intelligence relating to intelligence sources, methods, or activities. |
| (d) |
|
It is presumed that information that continues to meet the classification requirements under this order requires continued protection. In some exceptional cases, however, the need to protect such information may be outweighed by the public interest in disclosure of the information, and in these cases the information should be declassified. When such questions arise, they shall be referred to the agency head or the senior agency official. That official will determine, as an exercise of discretion, whether the public interest in disclosure outweighs the damage to the national security that might reasonably be expected from disclosure. This provision does not: |
|
|
| (1) |
|
amplify or modify the substantive criteria or procedures for classification; or |
| (2) |
|
create any substantive or procedural rights subject to judicial review. |
|
| (e) |
|
If the Director of the Information Security Oversight Office determines that information is classified in violation of this order, the Director may require the information to be declassified by the agency that originated the classification. Any such decision by the Director may be appealed to the President through the National Security Advisor. The information shall remain classified pending a prompt decision on the appeal. |
| (f) |
|
The provisions of this section shall also apply to agencies that, under the terms of this order, do not have original classification authority, but had such authority under predecessor orders. |
| (g) |
|
No information may be excluded from declassification under section 3.3 of this order based solely on the type of document or record in which it is found. Rather, the classified information must be considered on the basis of its content. |
| (h) |
|
Classified nonrecord materials, including artifacts, shall be declassified as soon as they no longer meet the standards for classification under this order. |
| (i) |
|
When making decisions under sections 3.3, 3.4, and 3.5 of this order, agencies shall consider the final decisions of the Panel. |
| (a) |
|
Subject to paragraphs (b)–(d) and (g)–(j) of this section, all classified records that (1) are more than 25 years old and (2) have been determined to have permanent historical value under title 44, United States Code, shall be automatically declassified whether or not the records have been reviewed. All classified records shall be automatically declassified on December 31 of the year that is 25 years from the date of origin, except as provided in paragraphs (b)–(d) and (g)–(i) of this section. If the date of origin of an individual record cannot be readily determined, the date of original classification shall be used instead. |
| (b) |
|
An agency head may exempt from automatic declassification under paragraph (a) of this section specific information, the release of which should clearly and demonstrably be expected to: |
|
|
| (1) |
|
reveal the identity of a confidential human source, a human intelligence source, a relationship with an intelligence or security service of a foreign government or international organization, or a nonhuman intelligence source; or impair the effectiveness of an intelligence method currently in use, available for use, or under development; |
| (2) |
|
reveal information that would assist in the development, production, or use of weapons of mass destruction; |
| (3) |
|
reveal information that would impair U.S. cryptologic systems or activities; |
| (4) |
|
reveal information that would impair the application of state-of-the-art technology within a U.S. weapon system; |
| (5) |
|
reveal formally named or numbered U.S. military war plans that remain in effect, or reveal operational or tactical elements of prior plans that are contained in such active plans; |
| (6) |
|
reveal information, including foreign government information, that would cause serious harm to relations between the United States and a foreign government, or to ongoing diplomatic activities of the United States; |
| (7) |
|
reveal information that would impair the current ability of United States Government officials to protect the President, Vice President, and other protectees for whom protection services, in the interest of the national security, are authorized; |
| (8) |
|
reveal information that would seriously impair current national security emergency preparedness plans or reveal current vulnerabilities of systems, installations, or infrastructures relating to the national security; or |
| (9) |
|
violate a statute, treaty, or international agreement that does not permit the automatic or unilateral declassification of information at 25 years. |
|
| (c) |
|
|
|
|
| (1) |
|
An agency head shall notify the Panel of any specific file series of records for which a review or assessment has determined that the information within that file series almost invariably falls within one or more of the exemption categories listed in paragraph (b) of this section and that the agency proposes to exempt from automatic declassification at 25 years. |
| (2) |
|
The notification shall include: |
|
|
| (A) |
|
a description of the file series; |
| (B) |
|
an explanation of why the information within the file series is almost invariably exempt from automatic declassification and why the information must remain classified for a longer period of time; and |
| (C) |
|
except when the information within the file series almost invariably identifies a confidential human source or a human intelligence source or key design concepts of weapons of mass destruction, a specific date or event for declassification of the information, not to exceed December 31 of the year that is 50 years from the date of origin of the records. |
|
| (3) |
|
The Panel may direct the agency not to exempt a designated file series or to declassify the information within that series at an earlier date than recommended. The agency head may appeal such a decision to the President through the National Security Advisor. |
| (4) |
|
File series exemptions approved by the President prior to December 31, 2008, shall remain valid without any additional agency action pending Panel review by the later of December 31, 2010, or December 31 of the year that is 10 years from the date of previous approval. |
|
| (d) |
|
The following provisions shall apply to the onset of automatic declassification: |
|
|
| (1) |
|
Classified records within an integral file block, as defined in this order, that are otherwise subject to automatic declassification under this section shall not be automatically declassified until December 31 of the year that is 25 years from the date of the most recent record within the file block. |
| (2) |
|
After consultation with the Director of the National Declassification Center (the Center) established by section 3.7 of this order and before the records are subject to automatic declassification, an agency head or senior agency official may delay automatic declassification for up to five additional years for classified information contained in media that make a review for possible declassification exemptions more difficult or costly. |
| (3) |
|
Other than for records that are properly exempted from automatic declassification, records containing classified information that originated with other agencies or the disclosure of which would affect the interests or activities of other agencies with respect to the classified information and could reasonably be expected to fall under one or more of the exemptions in paragraph (b) of this section shall be identified prior to the onset of automatic declassification for later referral to those agencies. |
|
|
| (A) |
|
The information of concern shall be referred by the Center established by section 3.7 of this order, or by the centralized facilities referred to in section 3.7(e) of this order, in a prioritized and scheduled manner determined by the Center. |
| (B) |
|
If an agency fails to provide a final determination on a referral made by the Center within 1 year of referral, or by the centralized facilities referred to in section 3.7(e) of this order within 3 years of referral, its equities in the referred records shall be automatically declassified. |
| (C) |
|
If any disagreement arises between affected agencies and the Center regarding the referral review period, the Director of the Information Security Oversight Office shall determine the appropriate period of review of referred records. |
| (D) |
|
Referrals identified prior to the establishment of the Center by section 3.7 of this order shall be subject to automatic declassification only in accordance with subparagraphs (d)(3)(A)–(C) of this section. |
|
| (4) |
|
After consultation with the Director of the Information Security Oversight Office, an agency head may delay automatic declassification for up to 3 years from the date of discovery of classified records that were inadvertently not reviewed prior to the effective date of automatic declassification. |
|
| (e) |
|
Information exempted from automatic declassification under this section shall remain subject to the mandatory and systematic declassification review provisions of this order. |
| (f) |
|
The Secretary of State shall determine when the United States should commence negotiations with the appropriate officials of a foreign government or international organization of governments to modify any treaty or international agreement that requires the classification of information contained in records affected by this section for a period longer than 25 years from the date of its creation, unless the treaty or international agreement pertains to information that may otherwise remain classified beyond 25 years under this section. |
| (g) |
|
The Secretary of Energy shall determine when information concerning foreign nuclear programs that was removed from the Restricted Data category in order to carry out provisions of the National Security Act of 1947, as amended, may be declassified. Unless otherwise determined, such information shall be declassified when comparable information concerning the United States nuclear program is declassified. |
| (h) |
|
Not later than 3 years from the effective date of this order, all records exempted from automatic declassification under paragraphs (b) and (c) of this section shall be automatically declassified on December 31 of a year that is no more than 50 years from the date of origin, subject to the following: |
|
|
| (1) |
|
Records that contain information the release of which should clearly and demonstrably be expected to reveal the following are exempt from automatic declassification at 50 years: |
|
|
| (A) |
|
the identity of a confidential human source or a human intelligence source; or |
| (B) |
|
key design concepts of weapons of mass destruction. |
|
| (2) |
|
In extraordinary cases, agency heads may, within 5 years of the onset of automatic declassification, propose to exempt additional specific information from declassification at 50 years. |
| (3) |
|
Records exempted from automatic declassification under this paragraph shall be automatically declassified on December 31 of a year that is no more than 75 years from the date of origin unless an agency head, within 5 years of that date, proposes to exempt specific information from declassification at 75 years and the proposal is formally approved by the Panel. |
|
| (i) |
|
Specific records exempted from automatic declassification prior to the establishment of the Center described in section 3.7 of this order shall be subject to the provisions of paragraph (h) of this section in a scheduled and prioritized manner determined by the Center. |
| (j) |
|
At least 1 year before information is subject to automatic declassification under this section, an agency head or senior agency official shall notify the Director of the Information Security Oversight Office, serving as Executive Secretary of the Panel, of any specific information that the agency proposes to exempt from automatic declassification under paragraphs (b) and (h) of this section. |
|
|
| (1) |
|
The notification shall include: |
|
|
| (A) |
|
a detailed description of the information, either by reference to information in specific records or in the form of a declassification guide; |
| (B) |
|
an explanation of why the information should be exempt from automatic declassification and must remain classified for a longer period of time; and |
| (C) |
|
a specific date or a specific and independently verifiable event for automatic declassification of specific records that contain the information proposed for exemption. |
|
| (2) |
|
The Panel may direct the agency not to exempt the information or to declassify it at an earlier date than recommended. An agency head may appeal such a decision to the President through the National Security Advisor. The information will remain classified while such an appeal is pending. |
|
| (k) |
|
For information in a file series of records determined not to have permanent historical value, the duration of classification beyond 25 years shall be the same as the disposition (destruction) date of those records in each Agency Records Control Schedule or General Records Schedule, although the duration of classification shall be extended if the record has been retained for business reasons beyond the scheduled disposition date. |
| (a) |
|
There is established within the National Archives a National Declassification Center to streamline declassification processes, facilitate quality-assurance measures, and implement standardized training regarding the declassification of records determined to have permanent historical value. There shall be a Director of the Center who shall be appointed or removed by the Archivist in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, and the Director of National Intelligence. |
| (b) |
|
Under the administration of the Director, the Center shall coordinate: |
|
|
| (1) |
|
timely and appropriate processing of referrals in accordance with section 3.3(d)(3) of this order for accessioned Federal records and transferred presidential records. |
| (2) |
|
general interagency declassification activities necessary to fulfill the requirements of sections 3.3 and 3.4 of this order; |
| (3) |
|
the exchange among agencies of detailed declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order; |
| (4) |
|
the development of effective, transparent, and standard declassification work processes, training, and quality assurance measures; |
| (5) |
|
the development of solutions to declassification challenges posed by electronic records, special media, and emerging technologies; |
| (6) |
|
the linkage and effective utilization of existing agency databases and the use of new technologies to document and make public declassification review decisions and support declassification activities under the purview of the Center; and |
| (7) |
|
storage and related services, on a reimbursable basis, for Federal records containing classified national security information. |
|
| (c) |
|
Agency heads shall fully cooperate with the Archivist in the activities of the Center and shall: |
|
|
| (1) |
|
provide the Director with adequate and current declassification guidance to enable the referral of records in accordance with section 3.3(d)(3) of this order; and |
| (2) |
|
upon request of the Archivist, assign agency personnel to the Center who shall be delegated authority by the agency head to review and exempt or declassify information originated by their agency contained in records accessioned into the National Archives, after consultation with subject-matter experts as necessary. |
|
| (d) |
|
The Archivist, in consultation with representatives of the participants in the Center and after input from the general public, shall develop priorities for declassification activities under the purview of the Center that take into account the degree of researcher interest and the likelihood of declassification. |
| (e) |
|
Agency heads may establish such centralized facilities and internal operations to conduct internal declassification reviews as appropriate to achieve optimized records management and declassification business processes. Once established, all referral processing of accessioned records shall take place at the Center, and such agency facilities and operations shall be coordinated with the Center to ensure the maximum degree of consistency in policies and procedures that relate to records determined to have permanent historical value. |
| (f) |
|
Agency heads may exempt from automatic declassification or continue the classification of their own originally classified information under section 3.3(a) of this order except that in the case of the Director of National Intelligence, the Director shall also retain such authority with respect to the Intelligence Community. |
| (g) |
|
The Archivist shall, in consultation with the Secretaries of State, Defense, Energy, and Homeland Security, the Attorney General, the Director of National Intelligence, the Director of the Central Intelligence Agency, and the Director of the Information Security Oversight Office, provide the National Security Advisor with a detailed concept of operations for the Center and a proposed implementing directive under section 5.1 of this order that reflects the coordinated views of the aforementioned agencies. |
| (a) |
|
A person may have access to classified information provided that: |
|
|
| (1) |
|
a favorable determination of eligibility for access has been made by an agency head or the agency head's designee; |
| (2) |
|
the person has signed an approved nondisclosure agreement; and |
| (3) |
|
the person has a need-to-know the information. |
|
| (b) |
|
Every person who has met the standards for access to classified information in paragraph (a) of this section shall receive contemporaneous training on the proper safeguarding of classified information and on the criminal, civil, and administrative sanctions that may be imposed on an individual who fails to protect classified information from unauthorized disclosure. |
| (c) |
|
An official or employee leaving agency service may not remove classified information from the agency's control or direct that information be declassified in order to remove it from agency control. |
| (d) |
|
Classified information may not be removed from official premises without proper authorization. |
| (e) |
|
Persons authorized to disseminate classified information outside the executive branch shall ensure the protection of the information in a manner equivalent to that provided within the executive branch. |
| (f) |
|
Consistent with law, executive orders, directives, and regulations, an agency head or senior agency official or, with respect to the Intelligence Community, the Director of National Intelligence, shall establish uniform procedures to ensure that automated information systems, including networks and telecommunications systems, that collect, create, communicate, compute, disseminate, process, or store classified information: |
|
|
| (1) |
|
prevent access by unauthorized persons; |
| (2) |
|
ensure the integrity of the information; and |
| (3) |
|
to the maximum extent practicable, use: |
|
|
| (A) |
|
common information technology standards, protocols, and interfaces that maximize the availability of, and access to, the information in a form and manner that facilitates its authorized use; and |
| (B) |
|
standardized electronic formats to maximize the accessibility of information to persons who meet the criteria set forth in section 4.1(a) of this order. |
|
|
| (g) |
|
Consistent with law, executive orders, directives, and regulations, each agency head or senior agency official, or with respect to the Intelligence Community, the Director of National Intelligence, shall establish controls to ensure that classified information is used, processed, stored, reproduced, transmitted, and destroyed under conditions that provide adequate protection and prevent access by unauthorized persons. |
| (h) |
|
Consistent with directives issued pursuant to this order, an agency shall safeguard foreign government information under standards that provide a degree of protection at least equivalent to that required by the government or international organization of governments that furnished the information. When adequate to achieve equivalency, these standards may be less restrictive than the safeguarding standards that ordinarily apply to U.S. “Confidential” information, including modified handling and transmission and allowing access to individuals with a need-to-know who have not otherwise been cleared for access to classified information or executed an approved nondisclosure agreement. |
| (i) |
|
|
|
|
| (1) |
|
Classified information originating in one agency may be disseminated to another agency or U.S. entity by any agency to which it has been made available without the consent of the originating agency, as long as the criteria for access under section 4.1(a) of this order are met, unless the originating agency has determined that prior authorization is required for such dissemination and has marked or indicated such requirement on the medium containing the classified information in accordance with implementing directives issued pursuant to this order. |
| (2) |
|
Classified information originating in one agency may be disseminated by any other agency to which it has been made available to a foreign government in accordance with statute, this order, directives implementing this order, direction of the President, or with the consent of the originating agency. For the purposes of this section, “foreign government” includes any element of a foreign government, or an international organization of governments, or any element thereof. |
| (3) |
|
Documents created prior to the effective date of this order shall not be disseminated outside any other agency to which they have been made available without the consent of the originating agency. An agency head or senior agency official may waive this requirement for specific information that originated within that agency. |
| (4) |
|
For purposes of this section, the Department of Defense shall be considered one agency, except that any dissemination of information regarding intelligence sources, methods, or activities shall be consistent with directives issued pursuant to section 6.2(b) of this order. |
| (5) |
|
Prior consent of the originating agency is not required when referring records for declassification review that contain information originating in more than one agency. |
|
Heads of agencies that originate or handle classified information shall:
For purposes of this order:
| (a) |
|
“Access” means the ability or opportunity to gain knowledge of classified information. |
| (b) |
|
“Agency” means any “Executive agency,” as defined in 5 U.S.C. 105; any “Military department” as defined in 5 U.S.C. 102; and any other entity within the executive branch that comes into the possession of classified information. |
| (c) |
|
“Authorized holder” of classified information means anyone who satisfies the conditions for access stated in section 4.1(a) of this order. |
| (d) |
|
“Automated information system” means an assembly of computer hardware, software, or firmware configured to collect, create, communicate, compute, disseminate, process, store, or control data or information. |
| (e) |
|
“Automatic declassification” means the declassification of information based solely upon: |
|
|
| (1) |
|
the occurrence of a specific date or event as determined by the original classification authority; or |
| (2) |
|
the expiration of a maximum time frame for duration of classification established under this order. |
|
| (f) |
|
“Classification” means the act or process by which information is determined to be classified information. |
| (g) |
|
“Classification guidance” means any instruction or source that prescribes the classification of specific information. |
| (h) |
|
“Classification guide” means a documentary form of classification guidance issued by an original classification authority that identifies the elements of information regarding a specific subject that must be classified and establishes the level and duration of classification for each such element. |
| (i) |
|
“Classified national security information” or “classified information” means information that has been determined pursuant to this order or any predecessor order to require protection against unauthorized disclosure and is marked to indicate its classified status when in documentary form. |
| (j) |
|
“Compilation” means an aggregation of preexisting unclassified items of information. |
| (k) |
|
“Confidential source” means any individual or organization that has provided, or that may reasonably be expected to provide, information to the United States on matters pertaining to the national security with the expectation that the information or relationship, or both, are to be held in confidence. |
| (l) |
|
“Damage to the national security” means harm to the national defense or foreign relations of the United States from the unauthorized disclosure of information, taking into consideration such aspects of the information as the sensitivity, value, utility, and provenance of that information. |
| (m) |
|
“Declassification” means the authorized change in the status of information from classified information to unclassified information. |
| (n) |
|
“Declassification guide” means written instructions issued by a declassification authority that describes the elements of information regarding a specific subject that may be declassified and the elements that must remain classified. |
| (o) |
|
“Derivative classification” means the incorporating, paraphrasing, restating, or generating in new form information that is already classified, and marking the newly developed material consistent with the classification markings that apply to the source information. Derivative classification includes the classification of information based on classification guidance. The duplication or reproduction of existing classified information is not derivative classification. |
| (p) |
|
“Document” means any recorded information, regardless of the nature of the medium or the method or circumstances of recording. |
| (q) |
|
“Downgrading” means a determination by a declassification authority that information classified and safeguarded at a specified level shall be classified and safeguarded at a lower level. |
| (r) |
|
“File series” means file units or documents arranged according to a filing system or kept together because they relate to a particular subject or function, result from the same activity, document a specific kind of transaction, take a particular physical form, or have some other relationship arising out of their creation, receipt, or use, such as restrictions on access or use. |
| (s) |
|
“Foreign government information” means: |
|
|
| (1) |
|
information provided to the United States Government by a foreign government or governments, an international organization of governments, or any element thereof, with the expectation that the information, the source of the information, or both, are to be held in confidence; |
| (2) |
|
information produced by the United States Government pursuant to or as a result of a joint arrangement with a foreign government or governments, or an international organization of governments, or any element thereof, requiring that the information, the arrangement, or both, are to be held in confidence; or |
| (3) |
|
information received and treated as “foreign government information” under the terms of a predecessor order. |
|
| (t) |
|
“Information” means any knowledge that can be communicated or documentary material, regardless of its physical form or characteristics, that is owned by, is produced by or for, or is under the control of the United States Government. |
| (u) |
|
“Infraction” means any knowing, willful, or negligent action contrary to the requirements of this order or its implementing directives that does not constitute a “violation,” as defined below. |
| (v) |
|
“Integral file block” means a distinct component of a file series, as defined in this section, that should be maintained as a separate unit in order to ensure the integrity of the records. An integral file block may consist of a set of records covering either a specific topic or a range of time, such as a Presidential administration or a 5-year retirement schedule within a specific file series that is retired from active use as a group. For purposes of automatic declassification, integral file blocks shall contain only records dated within 10 years of the oldest record in the file block. |
| (w) |
|
“Integrity” means the state that exists when information is unchanged from its source and has not been accidentally or intentionally modified, altered, or destroyed. |
| (x) |
|
“Intelligence” includes foreign intelligence and counterintelligence as defined by Executive Order 12333 of December 4, 1981, as amended, or by a successor order. |
| (y) |
|
“Intelligence activities” means all activities that elements of the Intelligence Community are authorized to conduct pursuant to law or Executive Order 12333, as amended, or a successor order. |
| (z) |
|
“Intelligence Community” means an element or agency of the U.S. Government identified in or designated pursuant to section 3 (4) of the National Security Act of 1947, as amended, or section 3.5(h) of Executive Order 12333, as amended. |
| (aa) |
|
“Mandatory declassification review” means the review for declassification of classified information in response to a request for declassification that meets the requirements under section 3.5 of this order. |
| (bb) |
|
“Multiple sources” means two or more source documents, classification guides, or a combination of both. |
| (cc) |
|
“National security” means the national defense or foreign relations of the United States. |
| (dd) |
|
“Need-to-know” means a determination within the executive branch in accordance with directives issued pursuant to this order that a prospective recipient requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function. |
| (ee) |
|
“Network” means a system of two or more computers that can exchange data or information. |
| (ff) |
|
“Original classification” means an initial determination that information requires, in the interest of the national security, protection against unauthorized disclosure. |
| (gg) |
|
“Original classification authority” means an individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President, to classify information in the first instance. |
| (hh) |
|
“Records” means the records of an agency and Presidential papers or Presidential records, as those terms are defined in title 44, United States Code, including those created or maintained by a government contractor, licensee, certificate holder, or grantee that are subject to the sponsoring agency's control under the terms of the contract, license, certificate, or grant. |
| (ii) |
|
“Records having permanent historical value” means Presidential papers or Presidential records and the records of an agency that the Archivist has determined should be maintained permanently in accordance with title 44, United States Code. |
| (jj) |
|
“Records management” means the planning, controlling, directing, organizing, training, promoting, and other managerial activities involved with respect to records creation, records maintenance and use, and records disposition in order to achieve adequate and proper documentation of the policies and transactions of the Federal Government and effective and economical management of agency operations. |
| (kk) |
|
“Safeguarding” means measures and controls that are prescribed to protect classified information. |
| (ll) |
|
“Self-inspection” means the internal review and evaluation of individual agency activities and the agency as a whole with respect to the implementation of the program established under this order and its implementing directives. |
| (mm) |
|
“Senior agency official” means the official designated by the agency head under section 5.4(d) of this order to direct and administer the agency's program under which information is classified, safeguarded, and declassified. |
| (nn) |
|
“Source document” means an existing document that contains classified information that is incorporated, paraphrased, restated, or generated in new form into a new document. |
| (oo) |
|
“Special access program” means a program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level. |
| (pp) |
|
“Systematic declassification review” means the review for declassification of classified information contained in records that have been determined by the Archivist to have permanent historical value in accordance with title 44, United States Code. |
| (qq) |
|
“Telecommunications” means the preparation, transmission, or communication of information by electronic means. |
| (rr) |
|
“Unauthorized disclosure” means a communication or physical transfer of classified information to an unauthorized recipient. |
| (ss) |
|
“U.S. entity” includes: |
|
|
| (1) |
|
State, local, or tribal governments; |
| (2) |
|
State, local, and tribal law enforcement and firefighting entities; |
| (3) |
|
public health and medical entities; |
| (4) |
|
regional, state, local, and tribal emergency management entities, including State Adjutants General and other appropriate public safety entities; or |
| (5) |
|
private sector entities serving as part of the nation's Critical Infrastructure/Key Resources. |
|
| (tt) |
|
“Violation” means: |
|
|
| (1) |
|
any knowing, willful, or negligent action that could reasonably be expected to result in an unauthorized disclosure of classified information; |
| (2) |
|
any knowing, willful, or negligent action to classify or continue the classification of information contrary to the requirements of this order or its implementing directives; or |
| (3) |
|
any knowing, willful, or negligent action to create or continue a special access program contrary to the requirements of this order. |
|
| (uu) |
|
“Weapons of mass destruction” means any weapon of mass destruction as defined in 50 U.S.C. 1801(p). |
| (a) |
|
Nothing in this order shall supersede any requirement made by or under the Atomic Energy Act of 1954, as amended, or the National Security Act of 1947, as amended. “Restricted Data” and “Formerly Restricted Data” shall be handled, protected, classified, downgraded, and declassified in conformity with the provisions of the Atomic Energy Act of 1954, as amended, and regulations issued under that Act. |
| (b) |
|
The Director of National Intelligence may, with respect to the Intelligence Community and after consultation with the heads of affected departments and agencies, issue such policy directives and guidelines as the Director of National Intelligence deems necessary to implement this order with respect to the classification and declassification of all intelligence and intelligence-related information, and for access to and dissemination of all intelligence and intelligence-related information, both in its final form and in the form when initially gathered. Procedures or other guidance issued by Intelligence Community element heads shall be in accordance with such policy directives or guidelines issued by the Director of National Intelligence. Any such policy directives or guidelines issued by the Director of National Intelligence shall be in accordance with directives issued by the Director of the Information Security Oversight Office under section 5.1(a) of this order. |
| (c) |
|
The Attorney General, upon request by the head of an agency or the Director of the Information Security Oversight Office, shall render an interpretation of this order with respect to any question arising in the course of its administration. |
| (d) |
|
Nothing in this order limits the protection afforded any information by other provisions of law, including the Constitution, Freedom of Information Act exemptions, the Privacy Act of 1974, and the National Security Act of 1947, as amended. This order is not intended to and does not create any right or benefit, substantive or procedural, enforceable at law by a party against the United States, its departments, agencies, or entities, its officers, employees, or agents, or any other person. The foregoing is in addition to the specific provisos set forth in sections 1.1(b), 3.1(c) and 5.3(e) of this order. |
| (e) |
|
Nothing in this order shall be construed to obligate action or otherwise affect functions by the Director of the Office of Management and Budget relating to budgetary, administrative, or legislative proposals. |
| (f) |
|
This order shall be implemented subject to the availability of appropriations. |
| (g) |
|
Executive Order 12958 of April 17, 1995, and amendments thereto, including Executive Order 13292 of March 25, 2003, are hereby revoked as of the effective date of this order. |
This order is effective 180 days from the date of this order, except for sections 1.7, 3.3, and 3.7, which are effective immediately.
The Archivist of the United States shall publish this Executive Order in the Federal Register.
[FR Doc. E9–31418 Filed 1–4–10; 11:15 am]
Billing Code 7515–01–P