This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost.


19 September 2006

-----------------------------------------------------------------------



[Federal Register: September 19, 2006 (Volume 71, Number 181)]

[Notices]               

[Page 54845-54849]

From the Federal Register Online via GPO Access [wais.access.gpo.gov]

[DOCID:fr19se06-70]                         



-----------------------------------------------------------------------



NUCLEAR REGULATORY COMMISSION



[EA-06-193]



 

In the Matter of Louisiana Energy Services L.P. (National 

Enrichment Facility) and All Other Persons Who Seek or Obtain Access to 

Safeguards Information Described Herein; Order Imposing Requirements 

for the Protection of Safeguards Information and Access to New 

Safeguards Information (Effective Immediately)



I



    Louisiana Energy Services, L.P., (LES or the Licensee) holds a 

license, issued in accordance with the Atomic Energy Act (AEA) of 1954, 

by the U.S. Nuclear Regulatory Commission (NRC or Commission) 

authorizing it to construct and operate a uranium enrichment facility 

in Lea County, New Mexico. On March 19, 2004, in accordance with 

Commission direction in Staff Requirements Memorandum SECY-03-0083, NRC 

provided LES, for its information, copies of Orders issued to Category 

III facilities on interim measures to enhance physical security at 

those facilities. Those Orders contained Safeguards Information \1\. In 

addition, in the future, the Commission may issue the Licensee 

additional Orders that require compliance with specific Additional 

Security Measures to enhance the security. These Orders are also 

expected to contain Safeguards Information, which cannot be released to 

the public and must be protected from unauthorized disclosure. 

Therefore, the Commission is imposing the requirements, as set forth in 

Attachments A and B of this Order, so that the Licensee can receive 

these documents. This Order also imposes requirements for the 

protection of Safeguards Information in the hands of any person,\2\ 

whether or not a licensee of the Commission, who produces, receives, or 

acquires Safeguards Information.

---------------------------------------------------------------------------



    \1\ Safeguards Information is a form of sensitive, unclassified, 

security-related information that the Commission has the authority 

to designate and protect under section 147 of the AEA.

    \2\ Person means: (1) any individual, corporation, partnership, 

firm, association, trust, estate, public or private institution, 

group, government agency other than the Commission or the Department 

of Energy, except that the Department of Energy shall be considered 

a person with respect to those facilities of the Department 

specified in section 202 of the Energy Reorganization Act of 1974 

(88 Stat. 1244), any State or any political subdivision of, or any 

political entity within a State, any foreign government or nation or 

any political subdivision of any such government or nation, or other 

entity; and (2) any legal successor, representative, agent, or 

agency of the foregoing.

---------------------------------------------------------------------------



    On August 8, 2005, the Energy Policy Act of 2005 (EPAct) was 

enacted. Section 652 of the EPAct amended Section 149 of the AEA to 

require fingerprinting and a Federal Bureau of Investigation (FBI) 

identification and criminal history records check of any person who is 

to be permitted to have access to Safeguards Information. The NRC's 

implementation of this requirement cannot await the completion of the 

Safeguards Information rulemaking, which is under way, because the 

EPAct fingerprinting and criminal history check requirements for access 

to Safeguards Information were immediately effective upon enactment of 

the EPAct. Although the EPAct permits the Commission by rule to except 

certain categories of individuals from the fingerprinting requirement, 

which the Commission has done (see 10 CFR 73.59, 71 FR 33989 (June 13, 

2006)), it is unlikely that many Licensee employees are excepted from 

the fingerprinting requirement by the ``fingerprinting relief'' rule. 

Individuals relieved from the fingerprinting and criminal history 

checks under the relief rule include Federal, State, and local 

officials and law enforcement personnel; Agreement State inspectors, 

who conduct security inspections on behalf of the NRC; members of 

Congress and certain employees of members of Congress or Congressional 

Committees; representatives of the International Atomic Energy Agency 

or certain foreign government organizations. In addition, individuals 

who have active Federal security clearances and have satisfied the 

EPAct fingerprinting requirement need not be fingerprinted again. 

Therefore, in accordance with Section 149 of the AEA, as amended by the 

EPAct, the Commission is imposing additional requirements, as set forth 

by this Order, for access to new Safeguards Information \3\ by any 

person, from any person, whether or not a Licensee, Applicant, or 

Certificate Holder of the Commission or Agreement States.

---------------------------------------------------------------------------



    \3\ ``New Safeguards Information'' means Safeguards Information 

generated subsequent to August 8, 2005, the date of enactment of the 

EPAct. ``New Safeguards Information'' also means any Safeguards 

Information, regardless of when it was generated, that is being 

accessed by an individual who has never been previously granted 

access to Safeguards Information.

---------------------------------------------------------------------------



II



    The Commission has broad statutory authority to protect Safeguards 

Information and prohibit its unauthorized disclosure. Section 147 of 

the AEA, as amended, grants the Commission explicit authority to ``* * 

* issue such orders, as necessary



[[Page 54846]]



to prohibit the unauthorized disclosure of safeguards information * * 

*'' Furthermore, Section 652 of the EPAct amended Section 149 of the 

AEA to require fingerprinting and an FBI identification and a criminal 

history records check of each individual who seeks access to Safeguards 

Information. Licensees and all persons who produce, receive, or acquire 

Safeguards Information must ensure proper handling and protection of 

Safeguards Information, to avoid unauthorized disclosure, in accordance 

with the specific requirements for the protection of Safeguards 

Information contained in Attachments A and B. The Commission hereby 

provides notice that it intends to treat violations of the requirements 

contained in Attachments A and B, applicable to the handling and 

unauthorized disclosure of Safeguards Information, as serious breaches 

of adequate protection of the public health and safety and the common 

defense and security of the United States. Access to Safeguards 

Information is limited to those persons who have established a need-to-

know the information, and are considered to be trustworthy and 

reliable, and who satisfy the fingerprinting and criminal history 

records check required by the EPAct and this Order. A ``need-to-know'' 

means a determination by a person having responsibility for protecting 

Safeguards Information that a proposed recipient's access to Safeguards 

Information is necessary in the performance of official, contractual, 

or licensee duties of employment. The Licensee and all other persons 

who obtain Safeguards Information must ensure that they develop, 

maintain, and implement strict policies and procedures for the proper 

handling of Safeguards Information, to prevent unauthorized disclosure, 

in accordance with the requirements in Attachments A and B. The 

Licensee must ensure that all contractors whose employees may have 

access to Safeguards Information either adhere to the Licensee's 

policies and procedures on Safeguards Information or develop, maintain, 

and implement their own acceptable policies and procedures. The 

Licensee remains responsible for the conduct of its contractors. The 

policies and procedures necessary to ensure compliance with applicable 

requirements contained in Attachments A and B must address, at a 

minimum, the following: (1) The general performance requirement that 

each person who produces, receives, or acquires Safeguards Information 

shall ensure that Safeguards Information is protected against 

unauthorized disclosure; (2) protection of Safeguards Information at 

fixed sites, in use and in storage, and while in transit; (3) 

correspondence containing Safeguards Information; (4) access to 

Safeguards Information; (5) preparation, marking, reproduction, and 

destruction of documents; (6) external transmission of documents; (7) 

use of automatic data processing systems; and (8) removal of the 

Safeguards Information category.

    To provide assurance that the Licensee is implementing appropriate 

measures to achieve a consistent level of protection to prohibit the 

unauthorized disclosure of new Safeguards Information, the Licensee 

shall implement the fingerprinting and criminal history check 

requirements for access to new Safeguards Information in this Order, as 

well as the requirements in Attachments A and B of this Order. In 

addition, pursuant to 10 CFR 2.202, I find that in light of the common 

defense and security matters identified above, which warrant the 

issuance of this Order, the public health, safety, and interest require 

that this Order be effective immediately.



III



    Accordingly, pursuant to Sections 53, 62, 63, 81, 147, 149, 161b, 

161i, 161o, 182, and 186 of the Atomic Energy Act of 1954, as amended, 

and the Commission's regulations in 10 CFR 2.202, 10 CFR part 30, 10 

CFR part 40, and 10 CFR part 70, it is hereby ordered, effective 

immediately, that licensee and all other persons who produce, receive, 

or acquire the additional security measures identified above (whether 

draft or final), or who seek or obtain access to new safeguards 

information, shall comply with the requirements set forth in this 

Order, including the requirements in Attachments A and B.

    A. No person may have access to new Safeguards Information unless 

that person has a need-to-know the new Safeguards Information, has been 

fingerprinted and undergone an FBI identification and criminal history 

records check, which has been favorably decided, and satisfies all 

other applicable requirements for access to Safeguards Information. 

Fingerprinting and the FBI identification and criminal history records 

check are not required, however, for any person who is relieved from 

that requirement by 10 CFR 73.59 (71 FR 33989 (June 13, 2006)) or who 

has an active Federal security clearance.

    B. No person may provide new Safeguards Information to any other 

person except in accordance with condition III.A above. Prior to 

sharing new Safeguards Information with any other person, a copy of 

this Order shall be provided to that person.



IV



    The Director, Office of Nuclear Material Safety and Safeguards, 

may, in writing, relax or rescind any of the above conditions, on 

demonstration of good cause by the Licensee. In accordance with 10 CFR 

2.202, the Licensee must, and any other person adversely affected by 

this Order may, submit an answer to this Order, and may request a 

hearing on this Order, within twenty (20) days of the date of this 

Order. Where good cause is shown, consideration will be given to 

extending the time to request a hearing. A request for extension of 

time in which to submit an answer or request a hearing must be made in 

writing to the Director, Office of Nuclear Material Safety and 

Safeguards, U.S. Nuclear Regulatory Commission, Washington, DC 20555, 

and include a statement of good cause for the extension. The answer may 

consent to this Order. Unless the answer consents to this Order, the 

answer shall, in writing and under oath or affirmation, specifically 

set forth the matters of fact and law on which the Licensee or other 

person adversely affected relies, and the reasons as to why the Order 

should not have been issued. Any answer or request for a hearing shall 

be submitted to the Secretary, Office of the Secretary, U.S. Nuclear 

Regulatory Commission, ATTN: Rulemakings and Adjudications Staff, 

Washington, DC 20555. Copies also shall be sent to the Director, Office 

of Nuclear Material Safety and Safeguards, U.S. Nuclear Regulatory 

Commission, Washington, DC 20555; to the Assistant General Counsel for 

Materials Litigation and Enforcement, at the same address; and to the 

Licensee, if the answer or hearing request is by a person other than 

the Licensee. Because of possible delays in delivery of mail to United 

States Government offices, it is requested that answers and requests 

for hearing be transmitted to the Secretary of the Commission, either 

by means of facsimile transmission, to 301-415-1101, or by e-mail, to 

hearingdocket@nrc.gov; and also to the Office of the General Counsel, 



either by means of facsimile transmission, to 301-415-3725, or by e-

mail, to OGCMailCenter@nrc.gov. If a person other than the Licensee 

requests a hearing, that person shall set forth with particularity the 

manner in which their interest is adversely affected by this Order and 

shall address the criteria set forth in 10 CFR 2.309.

    If a hearing is requested by the Licensee or a person whose 

interest is



[[Page 54847]]



adversely affected, the Commission will issue an Order designating the 

time and place of any hearing. If a hearing is held, the issue to be 

considered at such hearing shall be whether this Order should be 

sustained.

    Pursuant to 10 CFR 2.202(c)(2)(i), the Licensee may, in addition to 

demanding a hearing, at the time the answer is filed or sooner, move 

the presiding officer to set aside the immediate effectiveness of the 

Order on the grounds that the Order, including the need for immediate 

effectiveness, is not based on adequate evidence, but on mere 

suspicion, unfounded allegations, or error. In the absence of any 

request for hearing, or written approval of an extension of time in 

which to request a hearing, the provisions specified in Section III 

above shall be final twenty (20) days from the date of this Order, 

without further order or proceedings. If an extension of time for 

requesting a hearing has been approved, the provisions specified in 

Section III shall be final when the extension expires, if a hearing 

request has not been received.

    An answer or a request for hearing shall not stay the immediate 

effectiveness of this Order.



    Dated at Rockville, Maryland this 28th day of August 2006.



    For the Nuclear Regulatory Commission.

Jack R. Strosnider,

Director, Office of Nuclear Material Safety and Safeguards.



Attachment A--Modified Handling Requirements for the Protection of 

Certain Safeguards Information (SGI-M)



General Requirement



    Information and material that the U.S. Nuclear Regulatory 

Commission (NRC) determines are safeguards information must be 

protected from unauthorized disclosure. In order to distinguish 

information needing modified protection requirements from the 

safeguards information for reactors and fuel cycle facilities that 

require a higher level of protection, the term ``Safeguards 

Information-Modified Handling'' (SGI-M) is being used as the 

distinguishing marking for certain materials licensees. Each person who 

produces, receives, or acquires SGI-M shall ensure that it is protected 

against unauthorized disclosure. To meet this requirement, licensees 

and persons shall establish and maintain an information protection 

system that includes the measures specified below. Information 

protection procedures employed by state and local police forces are 

deemed to meet these requirements.



Persons Subject to These Requirements



    Any person, whether or not a licensee of the NRC, who produces, 

receives, or acquires SGI-M is subject to the requirements (and 

sanctions) of this document. Firms and their employees that supply 

services or equipment to materials licensees fall under this 

requirement if they possess SGI-M. A licensee must inform contractors 

and suppliers of the existence of these requirements and the need for 

proper protection. (See more under Conditions for Access)

    State or local police units who have access to SGI-M are also 

subject to these requirements. However, these organizations are deemed 

to have adequate information protection systems. The conditions for 

transfer of information to a third party, i.e., need-to-know, would 

still apply to the police organization as would sanctions for unlawful 

disclosure. Again, it would be prudent for licensees who have 

arrangements with local police to advise them of the existence of SGI-M 

requirements.



Criminal and Civil Sanctions



    The Atomic Energy Act of 1954, as amended, explicitly provides that 

any person, ``whether or not a licensee of the Commission, who violates 

any regulations adopted under this section shall be subject to the 

civil monetary penalties of section 234 of this Act.'' Furthermore, 

willful violation of any regulation or order governing safeguards 

information is a felony subject to criminal penalties in the form of 

fines or imprisonment, or both. See sections 147b. and 223 of the Act.



Conditions for Access



    Access to SGI-M beyond the initial recipients of the order will be 

governed by the background check requirements imposed by the order. 

Access to SGI-M by licensee employees, agents, or contractors must 

include both an appropriate need-to-know determination by the licensee, 

as well as a determination concerning the trustworthiness of 

individuals having access to the information. Employees of an 

organization affiliated with the licensee's company, e.g., a parent 

company, may be considered as employees of the licensee for access 

purposes.



Need-to-Know



    Need-to-know is defined as a determination by a person having 

responsibility for protecting SGI-M that a proposed recipient's access 

to SGI-M is necessary in the performance of official, contractual, or 

licensee duties of employment. The recipient must be made aware that 

the information is SGI-M and those having access to it are subject to 

these requirements as well as criminal and civil sanctions for 

mishandling the information.



Occupational Groups



    Dissemination of SGI-M is limited to individuals who have an 

established need-to-know and who are members of certain occupational 

groups. These occupational groups are:

    1. An employee, agent, or contractor of an applicant, a licensee, 

the Commission, or the United States Government;

    2. A member of a duly authorized committee of the Congress;

    3. The Governor of a State or his designated representative;

    4. A representative of the International Atomic Energy Agency 

(IAEA) engaged in activities associated with the U.S./IAEA Safeguards 

Agreement who has been certified by the NRC;

    5. A member of a state or local law enforcement authority that is 

responsible for responding to requests for assistance during safeguards 

emergencies;

    6. A person to whom disclosure is ordered pursuant to Section 

2.744(e) of Part 2 of part 10 of the Code of Federal Regulations; or

    7. State Radiation Control Program Directors (and State Homeland 

Security Directors) or their designees.

    In a generic sense, the individuals described above in (A) through 

(G) are considered to be trustworthy by virtue of their employment 

status. For non-governmental individuals in group (A) above, a 

determination of reliability and trustworthiness is required. 

Discretion must be exercised in granting access to the individuals in 

group (A). If there is any indication that the recipient would be 

unwilling or unable to provide proper protection for the SGI-M, they 

are not authorized to receive SGI-M.



Information Considered for Safeguards Information Designation



    Information deemed SGI-M is information the disclosure of which 

could reasonably be expected to have a significant adverse effect on 

the health and safety of the public or the common defense and security 

by significantly increasing the likelihood of theft, diversion, or 

sabotage of materials or facilities subject to NRC jurisdiction.

    SGI-M identifies safeguards information which is subject to these 

requirements. These requirements are necessary in order to protect 

quantities of nuclear material significant to the



[[Page 54848]]



health and safety of the public or common defense and security.

    The overall measure for consideration of SGI-M is the usefulness of 

the information (security or otherwise) to an adversary in planning or 

attempting a malevolent act. The specificity of the information 

increases the likelihood that it will be useful to an adversary.



Protection While in Use



    While in use, SGI-M shall be under the control of an authorized 

individual. This requirement is satisfied if the SGI-M is attended by 

an authorized individual even though the information is in fact not 

constantly being used. SGI-M, therefore, within alarm stations, 

continuously manned guard posts or ready rooms need not be locked in 

file drawers or storage containers.

    Under certain conditions the general control exercised over 

security zones or areas would be considered to meet this requirement. 

The primary consideration is limiting access to those who have a need-

to-know. Some examples would be:

    Alarm stations, guard posts and guard ready rooms; Engineering or 

drafting areas if visitors are escorted and information is not clearly 

visible; Plant maintenance areas if access is restricted and 

information is not clearly visible; Administrative offices (e.g., 

central records or purchasing) if visitors are escorted and information 

is not clearly visible.



Protection While in Storage



    While unattended, SGI-M shall be stored in a locked file drawer or 

container. Knowledge of lock combinations or access to keys protecting 

SGI-M shall be limited to a minimum number of personnel for operating 

purposes who have a ``need-to-know'' and are otherwise authorized 

access to SGI-M in accordance with these requirements. Access to lock 

combinations or keys shall be strictly controlled so as to prevent 

disclosure to an unauthorized individual.



Transportation of Documents and Other Matter



    Documents containing SGI-M when transmitted outside an authorized 

place of use or storage shall be enclosed in two sealed envelopes or 

wrappers. The inner envelope or wrapper shall contain the name and 

address of the intended recipient, and be marked both sides, top and 

bottom with the words ``Safeguards Information--Modified Handling.'' 

The outer envelope or wrapper must be addressed to the intended 

recipient, must contain the address of the sender, and must not bear 

any markings or indication that the document contains SGI-M.

    SGI-M may be transported by any commercial delivery company that 

provides nationwide overnight service with computer tracking features, 

U.S. first class, registered, express, or certified mail, or by any 

individual authorized access pursuant to these requirements.

    Within a facility, SGI-M may be transmitted using a single opague 

envelope. It may also be transmitted within a facility without single 

or double wrapping, provided adequate measures are taken to protect the 

material against unauthorized disclosure. Individuals transporting SGI-

M should retain the documents in their personal possession at all times 

or ensure that the information is appropriately wrapped and also 

secured to preclude compromise by an unauthorized individual.



Preparation and Marking of Documents



    While the NRC is the sole authority for determining what specific 

information may be designated as ``SGI-M,'' originators of documents 

are responsible for determining whether those documents contain such 

information. Each document or other matter that contains SGI-M shall be 

marked ``Safeguards Information-Modified Handling'' in a conspicuous 

manner on the top and bottom of the first page to indicate the presence 

of protected information. The first page of the document must also 

contain (i) the name, title, and organization of the individual 

authorized to make a SGI-M determination, and who has determined that 

the document contains SGI-M, (ii) the date the document was originated 

or the determination made, (iii) an indication that the document 

contains SGI-M, and (iv) an indication that unauthorized disclosure 

would be subject to civil and criminal sanctions. Each additional page 

shall be marked in a conspicuous fashion at the top and bottom with 

letters denoting ``Safeguards Information-Modified Handling.''

    In addition to the ``Safeguards Information-Modified Handling'' 

markings at the top and bottom of page, transmittal letters or 

memoranda which do not in themselves contain SGI-M shall be marked to 

indicate that attachments or enclosures contain SGI-M but that the 

transmittal does not (e.g., ``When separated from SGI-M enclosure(s), 

this document is decontrolled'').

    In addition to the information required on the face of the 

document, each item of correspondence that contains SGI-M shall, by 

marking or other means, clearly indicate which portions (e.g., 

paragraphs, pages, or appendices) contain SGI-M and which do not. 

Portion marking is not required for physical security and safeguards 

contingency plans.

    All documents or other matter containing SGI-M in use or storage 

shall be marked in accordance with these requirements. A specific 

exception is provided for documents in the possession of contractors 

and agents of licensees that were produced more than one year prior to 

the effective date of the order. Such documents need not be marked 

unless they are removed from file drawers or containers. The same 

exception applies to old documents stored away from the facility in 

central files or corporation headquarters.

    Since information protection procedures employed by state and local 

police forces are deemed to meet NRC requirements, documents in the 

possession of these agencies need not be marked as set forth in this 

document.



Removal From SGI-M Category



    Documents containing SGI-M shall be removed from the SGI-M category 

(decontrolled) only after the NRC determines that the information no 

longer meets the criteria of SGI-M. Licensees have the authority to 

make determinations that specific documents which they created no 

longer contain SGI-M information and may be decontrolled. Consideration 

must be exercised to ensure that any document decontrolled shall not 

disclose SGI-M in some other form or be combined with other unprotected 

information to disclose SGI-M.

    The authority to determine that a document may be decontrolled may 

be exercised only by, or with the permission of, the individual (or 

office) who made the original determination. The document shall 

indicate the name and organization of the individual removing the 

document from the SGI-M category and the date of the removal. Other 

persons who have the document in their possession should be notified of 

the decontrolling of the document.



Reproduction of Matter Containing SGI-M



    SGI-M may be reproduced to the minimum extent necessary consistent 

with need without permission of the originator. Newer digital copiers 

which scan and retain images of documents represent a potential 

security concern. If the copier is retaining any information in memory, 

the copier cannot be connected to a network. It should also be placed 

in a location that is cleared



[[Page 54849]]



and controlled for the authorized processing of SGI-M information. 

Different copiers have different capabilities, including some which 

come with features that allow the memory to be erased. Each copier 

would have to be examined from a physical security perspective.



Use of Automatic Data Processing (ADP) Systems



    SGI-M may be processed or produced on an ADP system provided that 

the system is assigned to the licensee's or contractor's facility and 

requires the use of an entry code/password for access to stored 

information. Licensees must process this information in a computing 

environment that has adequate computer security controls in place to 

prevent unauthorized access to the information. An ADP system is 

defined here as a data processing system having the capability of long 

term storage of information. Word processors such as typewriters are 

not subject to the requirements as long as they do not transmit 

information off-site. (Note: If SGI-M is produced on a typewriter, the 

ribbon must be removed and stored in the same manner as other SGI-M 

information or media.) The basic objective of these restrictions is to 

prevent access and retrieval of stored SGI-M by unauthorized 

individuals, particularly from remote terminals. Specific files 

containing SGI-M will be password protected to preclude access by an 

unauthorized individual. SGI-M files may be transmitted over a network 

if the file is encrypted. In such cases, the licensee will select a 

commercially available encryption system that NIST has validated as 

conforming to Federal Information Processing Standards (FIPS). SGI-M 

files shall be properly labeled as ``Safeguards Information--Modified 

Handling'' and saved to removable media and stored in a locked file 

drawer or cabinet. The National Institute of Standards and Technology 

(NIST) maintains a listing of all validated encryption systems at 

http://csrc.nist.gov/cryptval/140-1/1401val.htm.





Telecommunications



    SGI-M may not be transmitted by unprotected telecommunications 

circuits except under emergency or extraordinary conditions. For the 

purpose of this requirement, emergency or extraordinary conditions are 

defined as any circumstances that require immediate communications in 

order to report, summon assistance for, or respond to a security event 

(or an event that has potential security significance).

    This restriction applies to telephone, telegraph, teletype, 

facsimile circuits, and to radio. Routine telephone or radio 

transmission between site security personnel, or between the site and 

local police, should be limited to message formats or codes that do not 

disclose facility security features or response procedures. Similarly, 

call-ins during transport should not disclose information useful to a 

potential adversary. Infrequent or non-repetitive telephone 

conversations regarding a physical security plan or program are 

permitted provided that the discussion is general in nature.

    Individuals should use care when discussing SGI-M at meetings or in 

the presence of others to ensure that the conversation is not overheard 

by persons not authorized access. Transcripts, tapes or minutes of 

meetings or hearings that contain SGI-M shall be marked and protected 

in accordance with these requirements.



Destruction



    Documents containing SGI-M must be destroyed when no longer needed. 

They may be destroyed by tearing into small pieces, burning, shredding 

or any other method that precludes reconstruction by means available to 

the public at large. Piece sizes one-half inch or smaller composed of 

several pages or documents and thoroughly mixed are considered 

completely destroyed.



Attachment B--Trustworthiness and Reliability Requirements for 

Individuals Handling Safeguards Information



    Licensees shall document the basis for concluding that there is 

reasonable assurance that individuals granted access to safeguards 

information or who are placed in positions where they could facilitate 

access to the regulated material are trustworthy and reliable, and do 

not constitute an unreasonable risk for malevolent use of the regulated 

material.

    The trustworthiness, reliability, and verification of an 

individual's true identity shall be determined based on a background 

investigation. The background investigation shall address at least the 

past three (3) years, and, as a minimum, include a local criminal 

history check (unless local or State laws prohibit local criminal 

history checks of current employees), verification of employment 

history, education, employment eligibility, and personal references. If 

an individual's employment has been less than the required three (3) 

year period, educational references may be used in lieu of employment 

history.

    The licensee's background investigation requirements may be 

satisfied for an individual that has an active Federal security 

clearance.

[FR Doc. 06-7742 Filed 9-18-06; 8:45 am]



BILLING CODE 7590-01-P