12 FAM 530


(CT:DS-303;   09-17-2018)
(Office of Origin:  DS/SI/IS)


(CT:DS-282;   12-19-2017)
(Uniform State, OPIC, TDP)

a. Store classified material only in a manner that conforms to the provisions of this section.

b. Whenever classified material is not under the personal control and observation of an authorized person, store it in an approved locked container under the conditions cited in this section.  Domestically, for the Department, contact the Office of Information Security (DS/SI/IS) regarding open storage.

c.  You must use, hold, process, or store classified material in data and word processing systems, to include magnetic storage media, only under conditions that will prevent unauthorized persons from gaining access.  The Directorate of Cyber and Technology Security (DS/CTS) establishes requirements for the protection of classified information resident on automated information systems (AIS).

d. Responsibility for the secure storage of classified material in message distribution lockers (MDLs) rests with appropriate personnel from the assigned office with the lockers.  Employees must treat the combinations to MDLs the same as the combinations to other security containers that store classified material.  Employees must classify combinations to MDLs no lower than the highest level of classified material authorized for storage in the MDL.  If employees find an MDL that is unsecured, they must consider the combination to be compromised, whether the MDL is empty or not.

e. The Department has developed and approved revised security standards for the storage of classified material at facilities abroad.  These standards were coordinated with the Overseas Security Policy Board (OSPB) and apply to all personnel and facilities under chief of mission (COM) authority.  (See 12 FAM 531.1 and 12 FAM 531.2.)

f.  At Foreign Service posts, separate guidelines protect material relating to intelligence sources and methods.

g. Do not store classified material at a facility outside the chancery, consulate, etc., merely for convenience.  To store classified material, a post must demonstrate to the regional security officer (RSO) a legitimate need to have material at a given location and provide a justification for the level of classified material to be stored.

h. Separately located Voice of America (VOA) stations must not store classified information.  Make arrangements for staff to store and read the information at embassies and consulates.  You may take the material from the storage site to the VOA facility during working hours, but you must either return the material at close of business or destroy it with an approved device (see 12 FAM 539.5).  You may continue to store Sensitive But Unclassified (SBU) material at VOA facilities.

i.  12 FAM 570 covers storage requirements for authorized consultants and contractors working with classified information.

12 FAM 531.1  Top Secret Storage

12 FAM 531.1-1  Domestic

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

You must store Top Secret documents in either of the following:

(1)  General Services Administration (GSA)-approved container with a GSA-approved, built-in, three-position, dial-type combination lock; locate this container either in a DS-approved alarmed area or in a building controlled by cleared U.S. citizen personnel on a 24-hour basis; or

(2)  Domestic strongroom (see 12 FAM 090 definition) approved for Top Secret storage by the program applications division chief (DS/IS/APD) or a GSA-approved vault.

12 FAM 531.1-2  At Foreign Service Posts

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

OSPB standards do not allow open storage of classified material in a vault, except material in sealed diplomatic pouches, unless specifically authorized in writing by the Countermeasures Directorate (DS/C) (see 12 FAH-6 H-311.11; 12 FAH-6 H-312.11; 12 FAH-6 H-313.11; and 12 FAH-6 H-314.11), OSPB Security Standards and Policy Handbook, or for additional storage standards abroad for LOW, MEDIUM, HIGH, and CRITICAL threat levels.

12 FAM 531.2  Secret and Confidential Storage

12 FAM 531.2-1  Domestic

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

You must store Secret and Confidential material only as follows:

(1)  In the same manner authorized for Top Secret information (see 12 FAM 531.1);

(2)  In a barlock cabinet equipped with a GSA-approved three-position, dial-type, changeable, combination padlock located either in a DS-approved alarmed area, or in a building controlled by cleared U.S. citizen personnel on a 24-hour basis; or

(3)  In a domestic strongroom or vault approved for Secret storage by the DS/IS/APD division chief.

12 FAM 531.2-2  Foreign Service Posts

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

The Department does not allow open storage of classified material in a vault, except material in sealed diplomatic pouches, unless specifically authorized in writing by DS/C, (see 12 FAH-6 H-311.11; 12 FAH-6 H-312.11; 12 FAH-6 H-313.11; and 12 FAH-6 H-314.11), OSPB Security Standards and Policy Handbook, or for additional storage standards abroad for LOW, MEDIUM, HIGH, and CRITICAL  threat levels.

12 FAM 532  LOCKS

12 FAM 532.1  Electronically and Manually Activated Locks

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

You must use only DS-approved locks to satisfy protection requirements for classified national security information.  You must not substitute other electronically activated locks (for example, cipher and magnetic strip-card locks) or mechanical locks that may not afford the required degree of protection prescribed in 12 FAM 531.1 and 12 FAM 531.2.  The Technology Development Branch (DS/ST/TDB) identifies DS-approved locks through coordination with the Overseas Security Policy Board, the General Services Administration (GSA), and other government groups responsible for certifying locking devices for certain applications.  Refer to the DS/ST/TDB website for information regarding the level of protection afforded by specific DS-approved locks.

12 FAM 532.2  Changing Combinations

12 FAM 532.2-1  Individuals Authorized To Change Combinations

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Only individuals having an appropriate security clearance may change combinations to security containers and vaults protecting classified information:

(1)  Domestically, individuals approved by the appropriate foreign affairs agency security office (see 12 FAM 511.1) may perform the combination change; and

(2)  Abroad, RSOs, security engineering officers (SEO), security technical specialists (STS), naval security unit Seabees, and information management officers (IMO) (for combinations within the post communications center [PCC]) may perform combination changes.

12 FAM 532.2-2  When To Change Combinations

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Change combinations under each of the following circumstances:

(1)  When the lock is initially put into use;

(2)  Whenever a person knowing the combination no longer requires access to it, unless other sufficient controls exist to prevent access to the lock;

(3)  Upon knowledge or suspicion that an unauthorized person knows the combination;

(4)  Whenever a security violation results from an unsecured security container;

(5)  At least once every six months when the lock is used to control access to a computer room or an area for secure communication (all locations, both domestic and abroad), and at least once every 12 months when the lock is used for domestic strong room doors, for domestic open storage area doors, or at locations abroad for daytime or nighttime access control to containers or spaces where classified information is stored, processed, or discussed; or

(6)  When moving GSA-approved containers with combination locks from active to inactive status, reset domestic containers to the factory combination (50-25-50).  Abroad, reset containers to the post security combination provided by the post security officer (PSO).  Set all S&G 8077 combination padlocks removed from service to a combination of 10-20-30 and retain them in a secure space.  See 12 FAM 539.1 paragraph(g) for additional information on clearing containers removed from active use.

12 FAM 532.2-3  Recording Combination Changes

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Record all combinations to classified containers and repositories on form SF-700, Security Container Information.).  Classify records of combinations (containers, built-in combination locks, vault doors, padlocks, MDLs, etc.) at the highest level of classified material stored in the security container.

b. At Foreign Service posts:

(1)  Complete such cards in their entirety and file them in central repositories normally in the custody of PSOs or RSOs; or

(2)  In the case of PCC combinations, to the PCC according to distribution instructions printed on the card.

c.  Domestically, the activity's assigned unit security officer (USO) will store form SF-700.

12 FAM 532.2-4  Storage of Combinations

(CT:DS-243;  12-04-2015)
(Uniform State, OPIC, TDP)

a. Store combinations only in repositories authorized for the storage of material at the highest combined classification level to which combinations permit access.  You may not record combinations in hardcopy except on form SF-700 or on combination lists that are posted inside repositories for shared containers in the immediate area.  You must commit combinations to memory.

b. Do not store combinations electronically on network drives as this media does not afford sufficient need-to-know access restrictions.  Alternatively, you may store combinations to a U.S. Government-owned encrypted thumb drive or compact disk.  You must mark the media indicating the highest classification of information and protect it in an approved security container.

c.  Combinations to repositories containing official funds are subject to the requirements of 4 FAM and the instructions from the responsible RSO abroad.  Do not store money or other high-value items in a security container with classified information.

d. Use form SF-700 to post the names of personnel having knowledge of the combination on the inside of the control drawer for a GSA-approved safe file cabinet, on the protected side of a vault door, or on the inside of the top drawer for a barlock cabinet.


12 FAM 533.1  Overnight Custody

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

You must not remove classified material from official premises except when necessary in conducting official meetings, conferences, or consultations, and you must return this material to safe storage facilities immediately upon the conclusion of the meeting, conference, or consultation.  Residences are not considered official premises.  You must not remove classified material for reasons of personal convenience or keep it overnight in personal custody.

12 FAM 533.2  Certification Upon Permanent Departure from Post

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

When departing a post upon transfer, resignation, or retirement, each employee, irrespective of rank, must certify as part of the post clearance procedure that:

(1)  They are not taking classified material from the post through any other than authorized means;

(2)  Such material is not in their household or personal effects; and

(3)  Such material will not be mailed or otherwise transmitted in violation of 12 FAM 536.10.


12 FAM 534.1  General Procedures

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Employees using classified material are responsible for its custody and must take every precaution to prevent deliberate or casual access to it by unauthorized persons.

b. Employees must not leave classified material in unoccupied rooms or inadequately protected in an occupied office, or in an office occupied by individuals without security clearances and the need to know, such as an un-cleared char force.

c.  Photography, video, and all other unclassified visual recordings, video calls, and video teleconferences are not permitted in restricted areas or in rooms containing classified material without prior approval from the assigned Diplomatic Security (DS) bureau security officer (BSO) or the RSO.  Bureaus not assigned a BSO must contact the division chief of the Program Applications Division (DS/IS/APD) for approval.

d. Employees must handle foreign government information (FGI) in the following manner:

(1)  Safeguard North Atlantic Treaty Organization (NATO) classified information in compliance with U.S. Security Authority for NATO (USSAN) Instruction 1-07;

(2)  Protect foreign government information, other than NATO, classified by the originating government in the same manner as U.S. information of a comparable classification;

(3)  Classify foreign government information, other than NATO information, that is “restricted,” “designated,” or “unclassified provided in confidence” as U.S. Confidential to protect it from unauthorized disclosure.  Documents may retain their original foreign classification markings provided that they are adequate to meet the purposes served by U.S. classification markings.  The Department has determined that markings indicating that information has been provided by a foreign government or international organization of governments in confidence are adequate to meet the purposes served by U.S. classification markings.  If there are no adequate foreign markings, mark this information with U.S. classification markings.  When adequate to achieve a degree of protection at least equivalent to that required by the providing government, this type of FGI may be handled under standards that are less restrictive than the safeguarding standards that ordinarily apply to U.S. Confidential information (See 5 FAM 482.6).  The notation, ‘‘Modified Handling Authorized,’’ may be added to either the foreign or U.S. markings.  Individuals being given access to the information must be notified of applicable modified handling instructions via briefing, written instructions, or a cover sheet.  In accordance with 5 FAM 731, information approved for modified handling must be transmitted in a method approved for classified information, unless this method is waived by the originating government.  When using the internet to transmit modified handling material to other U.S. Government agencies or other entities, you should encrypt the transmission when practical and available.  If the information is marked with a U.S. classification marking and “Modified Handling Authorized,” senders should confirm that the receiving agency has agreed to receive the material on its unclassified network.  Direct questions related to the protection of information authorized for modified handling to the DS_IS_Policy@state.gov mailbox on OpenNet; and

(4)  Information received from a foreign government that has neither adequate foreign markings nor a U.S. classification, and which has been requested under the FOIA, Privacy Act or mandatory review provisions of E.O. 13526, may only be classified subsequent to the request with the personal participation or under the direction of the Secretary, a Deputy Secretary, or the Under Secretary for Management (M).  M has delegated the authority and responsibility for such classification to the Deputy Assistant Secretary for Global Information Services (GIS) and the director of A/GIS/IPS.  When feasible, therefore, FGI should be appropriately marked at the time of receipt or soon after.

12 FAM 534.2  Closing Hours Security Check

12 FAM 534.2-1  Form SF-701, Activity Security Checklist

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Supervisors must institute a system of security checks prior to those conducted by security guards at the close of each working day, or as soon thereafter as administrative operations permit.  Such a system ascertains that:

(1)  All classified material, to include that processed on any automated information system, has been properly stored and that containers are locked;

(2)  Windows and doors, where appropriate, are locked; and

(3)  The area is otherwise secure and not susceptible to overt penetration.

b. In order to fulfill this fundamental mandatory requirement in all areas and at all echelons, supervisory officials must designate employees on a weekly basis to conduct a closing hours security inspection of offices within a specifically defined area of responsibility.  Such designees will use form SF-701, Activity Security Checklist, to record the results of the closing hours security check.  This form will be forwarded to the bureau/unit/post security officer (BSO/USO/PSO) at the end of the month.  The BSO/USO/PSO will maintain the record for 30 days and then destroy it unless an incident has occurred which would warrant longer retention.

12 FAM 534.2-2  Reporting Infractions

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

An infraction of the regulations discovered by an employee designated to conduct the closing security check is not to be construed as a security violation in itself.  It should not be reported on form OF-117, Notice of a Security Incident, unless higher administrative authority determines otherwise or the closing hours security check is, in fact, the final inspection where U.S. citizen guards or Marine security guards are not on duty.

12 FAM 534.2-3  Responsibilities

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Employees designated to conduct closing hours security checks will, at a minimum:

(1)  Ensure that all repositories containing classified material are secured;

(2)  Ensure that all classified computer hard drives are removed and secured;

(3)  Check the tops of all desks, including “in” and “out” boxes, and repositories to ensure that all classified and controlled material has been put away; and

(4)  Make a visual check of the remainder of the office.

b. This section imposes a direct and important security responsibility on employees conducting closing hours checks.  Although custodians of classified material are responsible for its safekeeping in the Department, the checker, under certain circumstances, may be jointly charged with the violation.

12 FAM 534.2-4  Exceptions to Requirements

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Exceptions to the foregoing requirements, based upon physical or personnel considerations such as the unusual number of repositories located in a specific area, communications areas, alarmed rooms, and areas with few assigned employees, must be requested in writing to DS/SI or the RSO and will be decided on a case-by-case basis.

12 FAM 534.3  Conferences

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. In conducting conferences where classified information or material may be involved, the operations element calling or conducting the conference must observe every precaution to ensure that:

(1)  In the interests of technical security, classified conferences are held only on official premises;

(2)  Proper physical security measures are implemented to provide protection for such information or material equal to the measures required during normal operations; and

(3)  Participants are entitled to access to such information.

b. The operations element calling or conducting the conference should give advance notice to (and coordinate with) the appropriate post or RSO or DS/SI whenever:

(1)  Classified material is to be removed from its normal place of storage and transmitted or carried to the conference site; or

(2)  Participants are not personally known to have an appropriate security clearance by the officer calling or conducting the classified meetings.


12 FAM 535.1  Control Procedures

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Top Secret information may not be placed on any OpenNet or ClassNet.  It may be processed on an automated information system (AIS) approved for the processing and storage of Top Secret information or on TEMPEST-approved equipment.

b. Special access (SAP) material and communications security (COMSEC) material must be accounted for and controlled by the procedures governing those programs.  (See 12 FAM 660 regarding COMSEC.)


12 FAM 536.1  General Access Requirements

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

A person must only be given access to classified information when that person has been determined to be trustworthy and such access is necessary in connection with the performance of official duties.  Grant access to classified information in accordance with the criteria given in this section, and the person executes the form SF-312, Classified Information Nondisclosure Agreement.

12 FAM 536.1-1  Determination of Trustworthiness

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. A person must only be given access to classified information when a favorable determination has been made as to the person’s trustworthiness.  The determination of trustworthiness, referred to as a security clearance, is based on such investigations as may be required in accordance with the applicable standards and criteria.

b. DS/SI/PSS keeps a record of all security clearances for Department of State employees and contractors.  Special and specifically authorized clearances are required for access to information identified as restricted data, NATO, COSMIC, cryptographic, intelligence, and other information given special protection by law or regulation.

12 FAM 536.1-2  Determination of Need-to-Know

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

A person is not entitled to receive classified information solely by virtue of official position or by virtue of having been granted a security clearance.  A person must also have a need for access to the particular classified information sought in connection with the performance of official U.S. Government duties or contractual obligations, or as otherwise specifically authorized by these regulations.  The officers having responsibility for the classified information must make the determination of that need.

12 FAM 536.1-3  Determination of Storage Capability

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

A person is not entitled to receive classified material solely by virtue of having a security clearance and a need to know.  He or she must also have approved classified material storage facilities.  Not all foreign affairs agencies, or contractor facilities, domestically or abroad, have storage capability for classified material.  Employees must contact the appropriate foreign affairs agency security office to verify storage capability.

12 FAM 536.1-4  Determination of Security Briefing

(CT:DS-282;   12-19-2017)
(Uniform State, OPIC, TDP)

A person is not entitled to receive classified information until after he or she has received a security briefing covering the provisions of these regulations and has executed a non-disclosure agreement (form SF-312).

12 FAM 536.2  Access by Historical Researchers and Former Presidential Appointees

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

As agency records for a particular period are declassified, they are transferred to the National Archives.  Historical researchers, therefore, will normally be referred to the National Archives for research in such declassified records.

12 FAM 536.2-1  Department of State Records

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

For the Department, former Presidential appointees may apply to the Office of Information Programs and Services, (A/GIS/IPS) for access to those documents which they originated, reviewed, signed, or received while serving as Presidential appointees, provided that all of the following conditions are satisfied:

(1)  DS/SI/PSS makes the determination that granting access to the intended recipient is consistent with the interests of national security and that the intended recipient is trustworthy.  Access will be limited to categories of information over which the agency has classification jurisdiction;

(2)  The intended recipient agrees in writing to safeguard the information from unauthorized disclosure in a manner consistent with applicable statutes and regulations;

(3)  The intended recipient agrees in writing to authorize the review of notes and manuscripts for the purpose of determining that no classified information is contained therein;

(4)  The intended recipient agrees in writing that the information involved will not be further disseminated without the express permission of the agency;

(5)  The information requested is reasonably accessible and can be located and compiled with a reasonable amount of effort.  Otherwise, A/GIS/IPS will charge fees to assemble the information, in accordance with the schedule in 22 CFR 171.6;

(6)  Any individual or research assistant requiring access on behalf of the intended recipient must also meet all of the above conditions.  Such personal assistants must be authorized to be working for the former appointee exclusively and not gathering information for publication on their own;

(7)  Information compiled by research assistants is similarly subject to all conditions enumerated above; and

(8)  Upon request, such information as the recipient may identify will be reviewed for declassification in accordance with the provisions of these regulations.

12 FAM 536.2-2  Other Agencies’ Records

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. For TDP, former Presidential appointees and historical researchers may apply to the Office of Public Affairs.

b. For OPIC, former Presidential appointees and historical researchers may apply to the director of Legislative Affairs.

12 FAM 536.3  Access by Other Persons In The Legislative and Judicial Branches

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Provision of classified information by the Department to individuals or entities of the federal Legislative or Judicial Branches will be determined on a case-by-case basis by the Bureau of Legislative Affairs (for provisions to Congress), the Office of Information Security (DS/SI/IS), the Office of Information Programs and Services (A/GIS/IPS), and the Office of the Legal Adviser (L), as appropriate and in coordination with other concerned bureaus; and in OPIC by the director of Public Affairs.

b. Subject to the above paragraph and 12 FAM 536.2 and 12 FAM 536.3, classified material will not normally be provided to persons outside the Executive Branch of the U.S. Government.  However, exceptions may be made provided that all the conditions in 12 FAM 536.2 are satisfied.

12 FAM 536.4  Access by Contractors or Consultants

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. By agreement, the Secretary of Defense is authorized to act on behalf of the Department of State in rendering industrial security services.  DS/IS/IND will verify those contractor firms and personnel having current clearances to participate in classified contracts or purchase orders.  For additional information refer to 12 FAM 230 and 12 FAM 570.

b. Department employees are personally responsible for ensuring that DS/IS/IND has authorized consultants and/or contractors to have access to classified information prior to release of any such information.

12 FAM 536.5  Access by Foreign National Employees

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Classified information must not be made available to, or left in the custody of, foreign national employees.  Do not permit such employees to attend meetings where classified information is discussed.

b. Classified information must not be dictated to or typed by foreign national employees.  This restriction must not be circumvented by the assignment of classification after such an employee has prepared a particular document.  National Security information must not be entered into an automated information system (AIS) to which foreign nationals have access.  The limitation against retroactively classifying data also applies to any document prepared on an automated information system used by foreign nationals.

12 FAM 536.6  Controlling Dissemination

12 FAM 536.6-1  Other Federal Agencies

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Except as provided in the third sentence of this paragraph, classified information that originated in another Federal agency may be communicated by the receiving agency to a third agency without the consent of the originating agency.  For these purposes, State, OPIC, and TDP are to be considered separate agencies.  A recipient agency must not disseminate classified information to a third agency when the originating agency has determined that prior authorization is required for such dissemination and has marked or indicated such requirement on the medium containing the classified information (e.g., originator controlled (ORCON) markings under 12 FAM 536.7-2).  With respect to internal Department distribution caveats such as exclusive distribution (EXDIS), recipient agencies would also be expected to limit further dissemination (see 5 FAH-4 H-213.1).  Drafters should therefore apply appropriate markings, e.g., ORCON, to information which they determine requires continued control before dissemination to another agency.

b. Classified information may be sent to other federal agencies only through established liaison or distribution channels.

12 FAM 536.6-2  Intelligence Information

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Disclosures or releases of classified national intelligence including Sensitive Compartmented Information (SCI) must be approved by the Bureau of Intelligence and Research (INR).  If there is any confusion as to whether a piece of information constitutes national intelligence information, the employee should consult with the originator and/or INR.  At overseas posts when timely consultation with INR is not feasible, disclosure may be approved by an authorized official of the agency originating the information.

12 FAM 536.6-3  Classified Military Information

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. The National Disclosure Policy Committee (NDPC) establishes the procedures governing the release of classified military information to foreign governments and international organizations.

b. Direct all requests for the release of such information to:

National Military Information Disclosure Policy Committee (NDPC)
Director, Office of Regional Security and Arms Transfers
Bureau of Political-Military Affairs
U.S. Department of State
Washington, D.C. 20520

12 FAM 536.6-4  Crypto Marking

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

A designation or marking of “CRYPTO” applied to cryptographic material indicates that it requires special consideration with respect to access, storage, handling, and accounting.  Contact the appropriate foreign affairs agency security office regarding these procedures.  For the Department of State, contact the Cryptographic Systems Branch (IRM/FO/ITI/SI/CSB).

12 FAM 536.6-5  Dissemination Ordered or Requested by a Court of Law or Other Official Body

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Any subpoena, demand, or request for classified information or records from a court of law or other official body must be handled in accordance with agency regulations (22 CFR Part 172; State, 5 FAM).

b. Testimony involving classified information is subject to the procedures for responding to subpoenas and must not be given before a court or other official body without the approval required by those procedures.  An employee called upon to give such testimony without prior authorization must state that to disclose the information desired is not authorized and that a written request for the specific information should be transmitted to the head of the agency concerned.  Such testimony, when so approved, must be given only under such conditions as the authorizing officer may prescribe.

c.  All reports, records, and files relative to the loyalty of employees or prospective employees (including reports of investigative agencies) must be maintained in confidence and must not be transmitted or disclosed, except as required in the efficient conduct of business, and then only in accordance with applicable regulations.

12 FAM 536.7  Use of the Handling Caveats –ORCON, Not for Release to Foreign Nationals (NOFORN), and Releasable to (REL TO)

12 FAM 536.7-1  General

(CT:DS-303;   09-17-2018)

a. Under E.O. 13526, unless the originating agency indicates on the material that prior approval is required, a receiving agency may further disseminate the information to another agency or U.S. entity, including cleared state, local, tribal, and certain private sector entities.  Similarly, under certain circumstances, receiving agencies may disclose or release classified information to foreign governments and international organizations of governments.

b. For detailed instructions governing the disclosure or release of classified information to a foreign government or an international organization of governments.

c.  Employees have a responsibility to affirmatively control the distribution of particularly sensitive information.  Standardized classification and control markings are the primary means by which the Department protects its information.  The proper application and use of these markings enables information sharing while allowing the information to be properly safeguarded from inadvertent or unauthorized disclosure.  Dissemination control markings identify the expansion of or limitation on the distribution of Department information.  These markings are in addition to and separate from the levels of classification.  Examples of the types of information that drafters and classifiers should consider marking with dissemination controls include:

(1)  Reports of negotiations on sensitive issues;

(2)  Information identifying confidential sources;

(3)  Reports containing sensitive security or threat information;

(4)  Reports of conversations with senior foreign government officials;

(5)  Political reporting on the character and personality of foreign officials; and

(6)  Other information whose sensitivity might not be apparent to a recipient unfamiliar with the subject matter.

d. The Office of Information Security (DS/SI/IS) is the primary Department authority for safeguarding national security information and should be consulted with respect to handling and dissemination questions.  The Department’s primary authority for classification and declassification matters is the Office of Information Programs and Services (A/GIS/IPS) and should be consulted concerning original or derivative classification decisions.

e. ORCON - The ORCON marking is placed on classified national security information to indicate that it may not be disseminated outside of the recipient Department without prior approval.  Information bearing the ORCON marking may be disseminated within the recipient agency and its subordinate elements, including to contractors located within government facilities.  However, dissemination beyond the recipient agency or to agencies other than the original recipients requires advance permission from the originator.  The ORCON marking may be applied by all personnel, including contract personnel, who have classification authority and have completed PK 323 - Classified and Sensitive But Unclassified Information: Identifying and Marking, regardless of whether the classification decision is original (e.g., by an original classification authority [OCA]) or derivative in nature.  ORCON is to be applied sparingly as its use impedes efficient information sharing.  The decision to apply the ORCON marking shall be made on a case-by-case basis using a risk management approach; it may not be applied in a general or arbitrary manner.

f.  ORCON-USGOV - The ORCON-USGOV marking is placed on classified national security information to indicate that it may be disseminated to other Federal agencies, but may not be disseminated outside of the executive branch without the prior approval of the originating agency.  The ORCON-USGOV marking may be applied by all personnel, including contract personnel, who have original or derivative classification authority and have completed PK 323 - Classified and Sensitive But Unclassified Information: Identifying and Marking.

g. NOFORN - The NOFORN marking is placed on classified national security information to indicate that it may not be disclosed or released in any form to foreign nationals, foreign governments, or international organizations of governments without prior approval.  See 5 FAH-1 H-232.10.NOFORN is applied to classified information by Department personnel, including contract personnel, who have original or derivative classification authority, and have completed PK 323 - Classified and Sensitive But Unclassified Information: Identifying and Marking.

h. In limited circumstances, the NOFORN handling caveat is applied to sensitive but unclassified (SBU) information.

i.  REL TO - The REL TO marking is placed on classified national security information to indicate that the determination has already been made to permit the release of the information to the foreign government or international organization of governments listed.  The REL TO marking may only be applied when approved by an OCA, or by subordinate officials designated by the OCA to make release decisions for a specific program or ongoing information exchange [see 12 FAM Exhibit 536.7-1].  If the originator of the information is not an OCA or designated to make release decisions for the information, and is classifying the information derivatively in accordance with 5 FAM 482.3, he or she must seek the approval of an OCA or designated official in order to include the REL TO caveat.  The REL TO marking has the effect of NOFORN for countries not named in the marking.  Releasing the information to an additional government requires an additional release decision.  The first country in a REL TO marking is always the USA.  REL TO markings, when used, should be applied in accordance with the following format:

(1)  REL TO USA, followed by the approved trigraph of each country, and tetragraphs of international organizations of governments, if appropriate, each in alphabetical order, separated by commas.  Example: SECRET//REL TO USA, GBR, JPN, ISAF, NATO; and

(2)  See also 5 FAH-1 H-232.11.

12 FAM 536.7-2  Removing ORCON or NOFORN Caveats

(CT:DS-303;   09-17-2018)

a. This guidance does not apply to, or authorize the disclosure or release of, classified information or classified intelligence information originated by another Federal department or agency.  Disclosures or releases of classified information with handling caveats originated by other Federal agencies must be preceded by consultations with, and the approval of, the originating agency.  All intended disclosures or releases of intelligence information must first be coordinated with, and approved by, the Bureau of Intelligence and Research (INR).  At overseas posts when timely consultation with INR is not feasible, disclosure of intelligence information may be approved by an authorized official of the IC element originating the information.

b. The Department may find it necessary in some cases to disclose or release classified information marked NOFORN or ORCON.  Steps guiding the removal authorization include the following:

(1)  Information marked ORCON may only be authorized for disclosure or release to an entity outside the Department by an official who has OCA;

(2)  Information marked NOFORN may only be disclosed or released to a foreign government or international organization of governments when specifically authorized by an official who has OCA;

(3)  This official with OCA may be:

(a)  The official who initially authorized the classification of the material, if that official is still serving in the same position;

(b)  The successor to the official who originally authorized the handling caveat; or

(c)  The supervisory official of either.

(4)  The official with OCA may designate a subordinate official to make release decisions, including the removal of ORCON or NOFORN for a particular program or ongoing information exchange [see 12 FAM Exhibit 536.7-1];

(5)  Disclosure or release of Top Secret (TS) NOFORN information can only be authorized by persons who have been delegated OCAs for TS information; and

(6)  When classified information is released to a foreign government or international organization of governments, the disclosing official should make a record of the disclosure and keep it with a copy of the disclosed material.  This practice both protects the releaser by documenting compliance with Department policy and facilitates future cooperation by providing important insight into how, when, and why national security related information was provided to a foreign partner.  Additionally, when the information is released (a physical copy provided to the foreign partner), a signed receipt of the release is required. [See Classified Material Receipt, form DS-112, and Receipt Manifest, form DS-794, for examples of possible receipt forms.]  This receipt should be kept with the record of the disclosure.

c.  Information authorized for disclosure or release must have all NOFORN or ORCON markings, including portion markings, deleted or crossed through with a straight line.  If appropriate, RELEASABLE TO (REL TO) markings may be inserted.

12 FAM 536.8  Personal Use and Conversations

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Classified information must not be used for personal interests of any employee and must not be entered in personal diaries or other non-official records.

b. Employees must not hold discussions of classified information in the presence or hearing of persons who are not authorized to have knowledge thereof.

c.  Employees must not discuss classified information in conversations on non-secure telephones or office intercoms.

12 FAM 536.9  Transmitting Classified Information

12 FAM 536.9-1  General Restrictions

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Under no circumstances will classified material be transmitted physically across international boundaries except by diplomatic courier or specially authorized nonprofessional diplomatic couriers.  Nonprofessional diplomatic couriers are given such material for international transporting only in emergencies, when the professional service will not cover the area into which the pouch must be carried or the post to which the pouch is addressed within the time that official business must be conducted.  In such isolated cases, the nonprofessional diplomatic courier must be in possession of a diplomatic passport and a courier letter, and the material must be enclosed in sealed diplomatic pouches until delivered to its official destination.  (See 12 FAM 100.)

12 FAM 536.9-2  Top Secret

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Top Secret information must be transmitted by either:

(1)  Top Secret-cleared messenger;

(2)  Authorized courier:

(a)  Department of State Courier Service;

(b)  Department of Defense Courier Service;

(c)  Department of State nonprofessional courier; or

(3)  Electrical means authorized for TS or TS/SCI processing:

(a)  Top Secret Messaging Service, where available; and


12 FAM 536.9-3  Secret and Confidential

(CT:DS-303;   09-17-2018)
(Uniform State, OPIC, TDP)

When appropriately double-wrapped Secret and Confidential information may be transmitted via:

(1)  One of the means approved for Top Secret;

(2)  U.S. Postal Service registered mail within and between the 50 States and the District of Columbia, the Commonwealth of Puerto Rico, or a U.S. possession;

(3)  U.S. Postal Service Express Mail.  U.S. Postal Service Express Mail can be used only when it is the most effective means to accomplish a mission within security, time, cost, and accountability constraints.  To ensure direct delivery to the addressee, the “Waiver of Signature” block on the United States Mail label may not be executed under any circumstances.  All classified express mail shipments must be processed through mail distribution centers or delivered directly to a U.S. Postal Service facility or representative.  The use of external (side street) express mail collection boxes is prohibited; and

(4)  U.S. Postal Service facilities on US military installations.  Mail containing classified information, i.e., official mail, must not be sent to posts through military postal service (MPS) or diplomatic postal service (DPS) facilities.  (See 14 FAM 715 and 14 FAM 760 for this prohibition.)

12 FAM 536.9-4  Policy for Hand-Carrying Classified Documents - General

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Due to the security risk inherent in hand-carrying classified material, supervisors will authorize hand-carrying only when:

(1)  The classified material is required at the destination;

(2)  The classified material is not available at the destination; and

(3)  Because of time or other constraints, the classified material cannot be transmitted by another authorized means.

b. The classified material must be double-wrapped in accordance with 14 FAH-4 H-321 and 14 FAH-4 H-322, and in the physical possession of the custodian at all times unless properly stored at a U.S. Government facility or activity, or appropriately cleared contractor facility (i.e., continental United States only).

c.  Classified material will not be brought home or to a hotel for storage prior to a trip.

d. Hand-carrying classified material on trips that involve overnight stopover is not permitted without advance arrangements for proper overnight storage at an approved Government facility or activity (i.e., at a diplomatic, military, or approved contractor facility).

e. Classified material may not be read, studied, displayed, or used in any manner on a public conveyance or in a public place.

f.  Classified material is not to be stored in any detachable storage compartment such as an automobile luggage rack or detachable aircraft travel pod.

g. Whenever possible, return the classified material to the parent organization by one of the other approved methods of transmission.

h. For trips outside the continental United States, follow the requirements of 12 FAM 100 for designation as a nonprofessional courier.

12 FAM 536.9-5  Domestic

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Upon meeting the requirements of 12 FAM 536.9-5, domestic employees and contractors may transport collaterally classified information, i.e. non-sensitive compartmented information, up to and including Top Secret information between diplomatic facilities within the Washington metropolitan area without the need for any courier authorization letter.

b. In some cases, however, outside agencies may require Department employees and contractors to obtain a courier letter prior to removing classified information from their facility.  Should the agency you are visiting require you to have a courier authorization letter please contact DS/IS/APD at HelpdeskDSec@state.gov.

12 FAM 536.9-6  Abroad

(CT:DS-303;   09-17-2018)
(Uniform State, OPIC, TDP)

a. In countries with posts with a critical intelligence threat rating, the approval to transport classified material outside the diplomatic facility will require the approval of both the RSO and the deputy chief of mission.

b. Removal and hand-carrying of classified information from a diplomatic facility abroad, within the same country, must be authorized in writing by the RSO.  The authorization, at a minimum, must include an inventory of the contents of the double-wrapped package and nonprofessional courier orders.  The RSO will retain a copy of the authorization.

c.  When classified information is hand-carried between diplomatic facilities within the same country, the RSO must decide whether a two-person escort is prudent and necessary.  The RSO may also implement additional security measures as deemed appropriate given local threat conditions.  These additional measures may include, but are not limited to, use of embassy motor pool vehicle with an embassy driver, regular delivery update(s) to RSO, and an RSO security briefing.

12 FAM 536.10  Classified Operations Support to High-Level Delegations Abroad

12 FAM 536.10-1  Secretary of State Travel

(CT:DS-269;   03-17-2017)

(Uniform State, OPIC, TDP)

a. The Secretary's Technical and Information Security Travel Policy governs classified operations in support the Secretary's travel party.  This policy supersedes any post specific advisories as well as the associated provisions of 12 FAH-6, Overseas Security Policy Board.

b. RSOs ensure the travel policy's mandates are adhered to.

12 FAM 536.10-2  Other High-Level Delegations

(CT:DS-303;   09-17-2018)

(Uniform State, OPIC, TDP)

a. All U.S. Government executive branch employees and contractors, except for those under combatant command or on the staff of an international organization (i.e., those not assigned to the post or present in country with a country clearance), including those members of high-level delegations, are prohibited from discussing, storing, reading, or processing classified information overseas outside of controlled access areas in diplomatic facilities.  These employees and contractors must follow the OSPB standards regarding classified information in 12 FAH-6.

b. Requests for an exception to these 12 FAH-6 standards will be addressed on a case-by-case basis by the OSPB chair or designee.  Requests should be directed to the Countermeasures Directorate (DS/C) and the regional security officer at the visiting post(s).

c.  Members of the Secretary of Defense’s travel party or a combatant commander’s travel party are not subject to 12 FAH-6, but instead must consult Department of Defense regulations on the safeguarding and processing of classified information.

12 FAM 536.11  Reproducing Classified Documents

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. The number of copies of documents containing classified information must be kept to the minimum required by operational necessity to decrease the risk of compromise and reduce storage costs.  All classified material must be reproduced sparingly and any general or specific prohibition against reproduction must be strictly adhered to.  No classified document is to be reproduced if such reproduction is prohibited by the originator and the document is so annotated.  However, these provisions must not restrict the reproduction of documents for the purpose of facilitating review for declassification, but such reproduced documents that remain classified after review must be destroyed.

b. Unless a notation on the document or its cover restricts reproduction, permission is authorized without the approval of the originating department or agency for the reproduction of classified documents.  Reproduction of the documents must be limited to that which is essential for efficient operations.

c.  All agencies that reproduce paper copies of classified documents must maintain records to show the number and distribution of reproduced copies:

(1)  Of all documents covered by special access programs distributed outside the originating agency;

(2)  Those distributed within the agency if required by the special access program; and

(3)  Of all Secret and all Confidential documents which are marked with special dissemination and reproduction limitations.

d. Also, when reproduction beyond the initial production is required, the copy from which reproduction is made must show the authority for reproduction, the officer requesting reproduction, and the number of copies made.

e. Classified material should only be reproduced on those reproduction machines under the continuous control of cleared U.S. personnel.


(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Classified material must be carefully and completely destroyed only through authorized means by cleared U.S. citizen employees.  (See 12 FAH-1, Emergency Planning Handbook, regarding emergency destruction of materials.)


12 FAM 538.1  Policy

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Special access programs may be created or continued only under specific circumstances showing that:

(1)  The vulnerability of, or threat to, specific information is exceptional; and

(2)  The normal criteria for determining eligibility for access applicable to information classified at the same level are not deemed sufficient to protect the information from unauthorized disclosure.

12 FAM 538.2  Control and Administration

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Each office must appoint an official to act as a single point of contact for information concerning the establishment and security administration of all SAPs established by or existing in the office.

12 FAM 538.3  Codewords and Nicknames

(CT:DS-303;   09-17-2018)
(Uniform State, OPIC, TDP)

Excluding those programs specified in 12 FAM 539.6-1, paragraphs a and b, each SAP will be assigned a codeword, a nickname, or both.  Only the Assistant Secretary for Diplomatic Security through the official appointed under 12 FAM 539.6-2 must allocate codewords and nicknames for SAPs.  All codewords and nicknames are unclassified.

12 FAM 538.4  Reporting Requirements

(CT:DS-303;   09-17-2018)
(Uniform State, OPIC, TDP)

a. Excluding those programs specified in 12 FAM 539.6-1, paragraphs a and b, offices administering SAPs provide annual reports (Report number F-92-1) to the Assistant Secretary for Diplomatic Security, submitting them not later than January 31 of each year, showing the changes in information provided under 12 FAM 539.6-1, as well as the date of last review.  Annual reports must reflect actual rather than estimated numbers of carve-out contracts and persons granted access and must summarize the results of the inspections and audits required by 12 FAM 539.6-2, paragraph a.  The information in the annual report must be as of December 31.

b. Administering offices must immediately notify DS/IS/APD upon termination of a SAP.  

12 FAM 538.5  Limitations on Access

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Access to data reported under this section must be limited to the minimum number of properly indoctrinated staff necessary to perform the functions assigned to DS/IS/APD for the Department of State.  Access may not be granted to any other person for any purpose without the approval of the office sponsoring the SAPs concerned.

12 FAM 538.6  “Carve-Out” Contracts

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. The official charged with the program and the Assistant Secretary for Diplomatic Security, or their designees, must ensure that, in those SAPs involving contractors, special access controls are made applicable by legally binding instruments.  (See 12 FAM 570).

b. Excluding those programs which are specified in 12 FAM 539.6-1, paragraphs a and b, the use of “carve-out” contracts that relieve the from inspection responsibility under the Industrial Security Program is prohibited unless:

(1)  Such contract supports a SAP approved and administered under 12 FAM 539.6-1;

(2)  Mere knowledge of the existence of a contract or of its affiliation with the SAP is classified information; and

(3)  DS/SI/APD approves “carve-out” status for each Department of State contract.

c.  Approval to establish a “carve-out” contract must be requested from DS/SI/APD.  Offices managing approved “carve-out” contracts must ensure the support necessary for the requisite protection of the classified information involved.

d. An annual inventory of “carve-out” contracts must be conducted by each office which participates in SAPs.

e. This section relates back to the date of execution for each contract to which “carve-out” contracting techniques are applied.  The “carve-out” status of any contract expires upon termination of the SAP which it supports.


12 FAM 539.1  Precautions

(CT:DS-303;   09-17-2018)
(Uniform State, OPIC, TDP)

a. Holders must use open/closed signs on every repository containing classified material to indicate that the container is either open or locked.  The cognizant foreign affairs agency security officer can provide information regarding procurement of these signs.

b. All personnel handling classified and administratively controlled material are responsible for placing a cover sheet on the material to prevent unauthorized access and to alert personnel of the requirement for proper storage.  Form SF-703, Top Secret Cover Sheet, form SF-704, Secret Cover Sheet, and form SF-705, Confidential Cover Sheet, are the only authorized cover sheets for classified information.

c.  Holders must affix a form SF-702, Security Container Check Sheet to every repository containing classified material and employees opening or closing the container must complete the appropriate column.  (Any person opening a container is responsible for securing it, or obtaining explicit concurrence from another employee that they will secure it.)

d. Holders must affix a form SF-701, Activity Security Checklist adjacent to at least the main exit door of every office where classified material is stored.  This form is to be initialed at the end of the day by either the assigned security checker of the day or the last person to leave the office.

e. Personnel must ensure that classified repositories are locked and should check and initial those repositories that had not been opened since the previous check prior to leaving the room unattended.  When securing a combination lock, turn the dial at least four complete turns in the same direction after closing.  At the end of the day, the security checker is to check the lock and initial the form SF-702, certifying that the lock has been secured by attempting to open the lock, drawers, or door.  Anyone remaining after normal working hours is responsible for securing and checking their own safe.

f.  Employees must immediately report defects or malfunctioning of storage equipment or locking devices to the unit security officer or the post security officer.  Uncleared personnel are not permitted to service any equipment to be used for the storage of classified material.

g. Procedures for decommissioning security containers are found in the Technology Development Branch (DS/FSE/TDB) Technical Bulletin “Decommissioning and Disposing of GSA-Approved Safe-File Containers.”  Before taking security containers out of use, custodians must thoroughly inspect them to ensure all classified material has been removed and a standard combination has been set; for safes that contain drawers, custodians must remove the drawers and completely inspect the inside of the safe:

(1)  Domestically, the unit security officer and the accountable property officer will inspect the property, and both will sign form DS-586, Turn-In Property Inspection Certification;

(2)  Abroad, an SEO, STS, or Seabee must decommission all containers following the procedures found in the Technical Bulletin “Decommissioning and Disposing of GSA-Approved Safe-File Containers.”  The ESC, ESO, or TSO representative will complete and sign form DS-586.  Contact your ESC, ESO, or TSO for information and assistance; and

(3)  After decommissioning, custodians may dispose excess security containers through the normal property disposal process using form DS-132 “Property Disposal Authorization and Survey Report.”

h. Classified material must not be stored in desks or anywhere other than in approved storage containers.

i.  Classified material, including disposable material such as rough drafts, shorthand notes, disk drives, removable media from TEMPEST- approved systems and voice recording materials must be safeguarded and locked in appropriate security repositories whenever unattended.  Unclassified voice recording materials should be safeguarded and locked in appropriate security repositories at the close of business.  This is a sound security practice and is advantageous to efficient administrative operations.  For these same reasons, a ”clean desk” policy of securing all classified and unclassified documents is strongly encouraged.

j.  All keys to doors kept locked after working hours must be turned in to a U.S. citizen guard force and released only to authorized personnel.  Where no U.S. citizen guard force is assigned, DS/SI/IS or the RSO may authorize personal custody of keys.  Keep such instances to an absolute minimum.  Domestically, doors will be secured by means of a DS-approved lock.  DS/SI/IS or the cognizant RSO must approve beforehand all new door lock installations.  Desks, bookcases, and credenzas are not permitted to be locked either domestically or at post.

12 FAM 539.2  Top Secret Cover Sheets

 (CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Top Secret documents must be covered by a Top Secret Cover Sheet

12 FAM 539.3  Authorized Special Distribution Captions

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. NO DISTRIBUTION (NODIS) means no distribution to other than addressee without the approval of the Executive Secretary.  This caption is used only on messages of the highest sensitivity between the President, the Secretary of State, and chiefs of mission.  Documents bearing this special distribution caption must be treated as NOFORN.  In addition to the caption handling requirements, these documents must be given the physical protection prescribed by their classification.  (See 5 FAH-4 for additional guidance.)

b. EXCLUSIVE DISTRIBUTION (EXDIS) means distribution exclusively to officers with essential need-to-know.  This caption is used only for highly sensitive traffic between the White House, the Secretary, the Under Secretaries, and chiefs of mission.  Documents bearing this special distribution caption must be treated at a minimum as NOFORN.  In addition to the caption handling requirements, these documents must be given the physical protection prescribed by their classification.  (See 5 FAH-4 for additional guidance.)

c.  STATE DISTRIBUTION only (STADIS) precludes initial distribution to other federal agencies and is used when disclosure of certain communications to other agencies would be prejudicial to the best interests of the Department of State.  This caption may be used in conjunction with the caption “EXDIS.”  Material captioned “STADIS” is to be controlled, handled, and stored in accordance with the classification level of the information involved.

d. For details regarding caption messages, (see 5 FAH-4 H-314.7).

12 FAM 539.4  Procedures for Access and Dissemination

12 FAM 539.4-1  Covers and Envelopes

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Classified information must only be disseminated to individuals, organizations, and facilities with the capability to receive and safeguard it.

b. For Department of State contractor facilities, verify through DS/IS/IND the safeguarding capability.  (See 12 FAM 536.1-3.)

c.  Comprehensive instructions for the preparation and transmission of classified information via Diplomatic Pouch and Mail, US Postal Service and domestic couriers are in 14 FAH-4 H-320.

12 FAM 539.4-2  Receipts and Registration

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Employees must use a Receipt Manifest, form DS-794, or other receipt approved by foreign affairs agency security offices for Top Secret and Secret material transmitted outside the organizational control of the sender.  These receipts may be used for the transmission control of any other material at the discretion of the sender.

b. Employees must use form DS-794, Receipt Manifest, or other approved receipt, to cover the transmission of more than one classified document between the sender and a single addressee.  Such receipts are forwarded in duplicate, so that the addressee may acknowledge receipt of the material by signing and returning a copy to the transmitter, retaining the original for addressee’s records.  The unit maintaining records of receipt must retain such receipts for two years.

c.  Except as provided for the control of Top Secret material, originating and receiving elements or employees are not required to maintain additional logs of transmission and receipt of classified material other than to note internal distribution, which may be recorded on the original of form DS-794, or other approved means.  Two years after the date of transmission or receipt of classified material, receipts covering the transaction may be destroyed.

d. Each piece (envelope, package, or other outer cover) of classified material going through the internal mail and messaging service or Diplomatic Pouch must be registered by the use of a form OF-120, Diplomatic Pouch Mail Registration.

12 FAM 539.5  Procedures for Destruction

12 FAM 539.5-1  Destruction of Secret and Confidential Material

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Records of destruction need not be made for Top Secret, Secret, or Confidential material unless recording is required by special regulation.  When destruction receipts are required, employees must record destruction on form JF-58, Register-Destruction of Classified Material, or other form or log approved by the cognizant foreign affairs agency security office or the RSO.  Information subject to special regulations such as NATO, Restricted Data, etc., must be destroyed and destruction recorded in accordance with requirements of the applicable regulation.

12 FAM 539.5-2  Using Burn Bags

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

All classified material, to include working papers, handwritten notes, and other equipment to be destroyed must be placed in containers designated as burn bags, which are clearly and distinctly recognizable as burn bags.  Burn bags awaiting destruction must be protected by safeguards commensurate with the classification designation of the material involved.

12 FAM 539.5-3  Laser Toner Cartridges

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Laser toner cartridges removed from equipment such as laser printers, facsimile machines, and copiers may be treated, handled, stored, and disposed of as UNCLASSIFIED without additional countermeasures after completing a print cycle.  When a cartridge is removed prior to completing a print cycle, handle as UNCLASSIFIED after manually rotating the drum one full turn.

12 FAM 539.5-4  Destruction Methods

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

Classified material is normally destroyed by burning, shredding, or, with the exception of microforms, by disintegration.  DS/C/ST maintains a list of approved destruction equipment.  Any other method must have the approval of the cognizant foreign affairs agency security office.  Destruction of classified microforms can only be accomplished by burning or by chemical means, i.e., immersion in an approved chemical solution for a specified period of time, in accordance with Department instructions.  COMSEC material must be destroyed in accordance with 5 FAH-6.

12 FAM 539.5-5  Destruction of Classified Removable Magnetic Storage Media

(CT:DS-282;   12-19-2017)
(Uniform State, OPIC, TDP)

All removable magnetic data and program storage media which have been used for processing classified data must be destroyed in accordance with established guidelines for the destruction of this media.  For the Department of State, employees must contact DS/CTS regarding these guidelines.  For other foreign affairs agencies, their employees must contact the cognizant security office for further information.

12 FAM 539.6  Procedures for Special Access Programs

12 FAM 539.6-1  Establishing a Special Access Program

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. Procedures for the establishment of SAPs involving NATO classified information are based on international treaty requirements.

b. SAPs for foreign intelligence information under the cognizance of the director of Central Intelligence Agency (DCIA), or those of the National Telecommunications and Information Systems Security Committee, originate outside the foreign affairs agencies and are subject to the directives and regulations of the DCIA.

c.  Excluding those programs specified in paragraphs a and b of this section, SAPs may be established within the foreign affairs agencies by submitting to the agency head a complete justification which is to include:

(1)  The rationale for establishing the SAP, including the reason why normal management and safeguarding procedures for classified information are inadequate;

(2)  The estimated number of persons to be granted special access in the responsible component, other components, other U.S. Government agencies, contractors, and the total of such personnel;

(3)  A summary statement pertaining to the program security requirements, with particular emphasis upon those personnel security requirements governing access to program information;

(4)  The relationship, if any, to other SAPs in the Department or other U.S. Government agencies;

(5)  The estimated number and approximate dollar value, if known, of “carve-out” contracts (see 12 FAM 538.6) that will be or are required to support the program;

(6)  The component official who is the point of contact (last name, first name, middle initial, their position or title, mailing address, and telephone number);

(7)  The proposed codeword and/or nickname (see 12 FAM 538.3) of the program; and

(8)  The proposed date of program establishment.

12 FAM 539.6-2  Reviews of Special Access Programs

(CT:DS-269;   03-17-2017)
(Uniform State, OPIC, TDP)

a. DS/IS/APD must be provided and will maintain a listing of all SAPs within the Department.  DS/SI/APD will compile and maintain the list for all DCIA SAPs in State and USAID.  Within USAID (except DCIA SAPs), the Executive Secretary (ES) will maintain this list.

b. DS/IS/APD must conduct oversight reviews, as required, to determine compliance with this procedure and the general safeguarding of classified information.  For DCIA SAPs in State, DS/SSO will be the primary security office for oversight reviews.  As necessary, DS/SSO and DS/IS/APD will coordinate for assistance/support.

c.  Excluding those programs specified in 12 FAM 539.6-1, paragraphs a and b, the office administering each SAP must review the program annually.  To accommodate such reviews, the responsible office must institute procedures to ensure the conduct of annual security inspections and regularly scheduled audits.

d. SAPs, excluding those specified in 12 FAM 539.6-1, paragraphs a and b, or those required by treaty or international agreement, must terminate automatically every 5 years unless reestablished in accordance with the procedures contained in 12 FAM 539.6-1, paragraph c.


12 FAM Exhibit 536.7-1  
Sample Designation Memo

(CT:DS-269;   03-17-2017)

Title: Sample Designation Memo - Description: Sample Designation Memo

12 FAM Exhibit 539.4-2  
Form OF-120, Diplomatic Pouch Mail Registration

(CT:DS-243;  12-04-2015)

Title: Form OF-120 - Description: Blank form telling users where to find the form