United Stales
Environmental Protection
Agency
Offci oi Pollution
PievtriTion ono "(oxics
Wa;;hinoton DC 20460
(TS 793)
700
wuary 1993 Edition

749R92001
 TSCA Confidential
 Business information
 Security Manual

-------
                                749R92001
  TSCA CBI Security Manual                                 7700
                                                       1/93

                     TABLE OF CONTENTS

 LIST OF APPENDICES	  i

 CONTACTS  	  iii

 GLOSSARY OF ACRONYMS	  iv

 BACKGROUND ON TERMINOLOGY AND EPA OFFICES	vi

 CHAPTER 1
  INTRODUCTION	   1

     A.   GUIDING PRINCIPLES FOR SITUATIONS OUTSIDE OF
          THE MANUAL  	   1
     B.   MANUAL UPDATES AND REVISIONS TO PROCEDURES  .  2

 CHAPTER 2
   HOW TO AUTHORIZE FEDERAL EMPLOYEES, CONTRACT
   EMPLOYEES AND CONGRESS FOR ACCESS TO TSCA CBI	  3

     A.   STEPS TO TSCA CBI ACCESS FOR EPA EMPLOYEES ...  3

          1.   AUTHORIZING ACCESS 	  3

f yi 5'S         a.   Completing and submitting the forms	  3
Q •<
   2.           b.   Forms required to obtain computer access to
                   TSCA CBI data ......................  4
               c.   Individual access files  ..................  4
               d.   Security briefing ......................  4
               e.   Approval for TSCA CBI access or waiver for
                   immediate access  .....................  4
               f.   TSCA CBI authorized access list ............  5

          2.    REQUIREMENTS FOR MAINTAINING ACCESS ....  5

               a.   General information ....................  5
               b.   Document audit procedure ................  5
               c.   Scheduling an annual security briefing  ........  6
               d.   Failure to attend an annual security briefing .....  6

-------
TSCA CBI Security Manual                                   7700
                                                         1/93

              e.    Reapplying for TSCA CBI access	 6
              f.    Employee transfers within EPA  	 6

    B.   STEPS TO TERMINATING TSCA CBI ACCESS FOR
         EPA EMPLOYEES  	 6

         1.    GENERAL INFORMATION	 6
         2.    REQUIREMENTS FOR TERMINATING ACCESS .... 7

              a.    Form 7740-16	 7
              b.    Document audit procedure	 7
              c.    DCO responsibilities after document audit is
                   completed	 7
              d.    Missing documents	  8
              e.    Employee responsibilities  	  8

    C.   STEPS TO TSCA CBI ACCESS FOR CONTRACTORS
         AND SUBCONTRACTORS	  9

              AUTHORIZING ACCESS  	  9

              1.    Determining whether access to TSCA CBI is
                   necessary	  9
              2.    Secure environment for handling and storing
                   TSCA CBI	  9
              3.    Site inspection	  10
              4.    Required contract language 	  10
              5.    Notice to affected businesses  	  10
              6.    Facility DCO at the contractor's site  	  11
              7.    How to assign a DCO 	  11
              8.    Identifying contractor employees for clearance  . .  12

    D.   HOW TO OBTAIN TSCA CBI AUTHORIZATION FOR
         EMPLOYEES OF CONTRACTORS AND
         SUBCONTRACTORS	  12

         1.   AUTHORIZING ACCESS	  12

              a.    Completing and submitting the forms	  12
              b.    Minimum Background Investigation (MBI)	  13

-------
TSCA CBI Security Manual                                 7700
                                                      1/93

             c.   Individual Access Files	   13
             d.   Security briefing	   13
             e.   Approval for TSCA CBI access or waiver for
                  immediate access 	   14
             f.    TSCA CBI authorized access list	   14

         2.   REQUIREMENTS FOR MAINTAINING ACCESS ...   14

             a.   General information	   14
             b.   Document audit procedure	   14
             c.   Scheduling an annual security briefing  	   15
             d.   Failure to attend an annual security briefing  ....   15
             e.   Reapplying for TSCA CBI access	   15

    E.    PROCEDURES FOR TERMINATING ACCESS TO TSCA
         CBI FOR CONTRACTOR EMPLOYEES	   16

         1.   GENERAL INFORMATION	   16
         2.   REQUIREMENTS FOR TERMINATING ACCESS ...   16

             a.   Form 7740-18	   16
             b.   Document audit procedure	   16
             c.   Missing documents	   17
             d.   DCO responsibilities after document audit is
                  completed	   17
             e.   Contractor employee responsibilities	   17

    F.    PROCEDURES FOR TERMINATING ACCESS TO TSCA
         CBI FOR CONTRACTORS	   18

             TERMINATING ACCESS TO TSCA CBI WHEN
             A CONTRACT ENDS  	   18

    G.    AUTHORIZING OTHER FEDERAL AGENCIES FOR
         ACCESS TO TSCA CBI	   18

         1.   GENERAL PROCEDURES FOR EPA OFFICES TO
             DISCLOSE TSCA CBI TO ANOTHER FEDERAL
             AGENCY PERFORMING WORK FOR EPA  	   18

-------
TSCA CBI Security Manual                                7700
                                                     1/93

             a.   Agreement not to disclose TSCA CBI	   19
             b.   Exceptions to agreement	   19
             c.   TSCA CBI access at EPA facilities  	   19
             d.   TSCA CBI access at other Federal agencies  ....   20
             e.   How to assign a DCO  	   20

         2.   PROCEDURES FOR ANOTHER FEDERAL AGENCY
             TO REQUEST ACCESS TO TSCA CBI  	   20

             a.   Submit a written request	   20
             b.   Agreement not to disclose TSCA CBI	   20
             c.   Exceptions to agreement	   21
             d.   Notice to affected businesses	   21

         3.   EPA'S PROCESS FOR APPROVING TSCA CBI
             ACCESS FOR OTHER FEDERAL AGENCIES	   22

             a.   TSCA CBI access at EPA facilities  	   22
             b.   TSCA CBI access at other Federal agencies  ....   22

         4.   REQUESTS FOR ACCESS TO TSCA CBI FROM
             CONGRESS OR THE GENERAL ACCOUNTING
             OFFICE 	   23

             Notice to affected businesses	   23

CHAPTERS
 RESPONSIBILITIES	   25

     A.  EMPLOYEE RESPONSIBILITIES	   25

         1.   EPA HOLDS EMPLOYEES PERSONALLY
             ACCOUNTABLE FOR PROTECTING TSCA CBI ...   25
         2.   DOCUMENT AUDIT PROCEDURES	   26
         3.   CHECKING OUT TSCA CBI DOCUMENTS	   26
             Overdue materials   	   26
         4.   DETERMINING WHETHER A DOCUMENT
             CONTAINS TSCA CBI	   26
         5.   RECEIPT OF MAIL CONTAINING TSCA CBI
             MATERIAL	   27

-------
TSCA CBI Security Manual                                7700
                                                    1/93

        6.    CHALLENGING TSCA CBI CLAIMS DURING
             AND AFTER INSPECTIONS	  27

             a.   Informal inquiries	  27
             b.   Formal challenges	  27
             c.   When considering a challenge  	  28

    B.   MANAGER RESPONSIBILITIES 	  28

             IN GENERAL  	  28

    C.   DOCUMENT CONTROL OFFICER (DCO)
        RESPONSIBILITIES  	  29

        1.    IN GENERAL  	  29
        2.    MAINTAINING A DOCUMENT TRACKING
             SYSTEM	  29

             a.   Automated document tracking systems  	  30
             b.   Manual tracking systems	  31

        3.    MAINTAINING THE INVENTORY LOG	  31
        4.    DELIVERING AND RECEIVING TSCA CBI
             MATERIALS	  32

             a.   Reviewing documents for completeness	  32
             b.   Maintaining a receipt log  	  32

        5.    STORAGE OF TSCA CBI MATERIALS	  33
        6.    MAINTAINING RECORDS OF LOCK
             COMBINATIONS  	  33
        7.    CONDITIONS FOR CHANGING LOCK
             COMBINATIONS  	  34
        8.    UPDATING THE TSCA CBI AUTHORIZED
             ACCESS LIST  	  34
        9.    MONITORING AND CONTROLLING WHO
             OBTAINS TSCA CBI MATERIALS	  34
        10.   MONITORING OVERDUE TSCA CBI
             MATERIALS	  35

-------
TSCA CBI Security Manual                               7700
                                                   1/93

        11.   ASSISTING EMPLOYEES IN DETERMINING
             WHETHER DOCUMENTS CONTAIN TSCA CBI
             AND IN SANITIZING DOCUMENTS FOR
             PUBLIC DISCLOSURE	   35
        12.   SUPERVISING THE REPRODUCTION AND
             DESTRUCTION OF TSCA CBI MATERIALS  	   35
        13.   CONTROLLING THE TRANSFER OF TSCA
             CBI MATERIALS BETWEEN FACILITIES	   36
             Packaging and Arranging Transfer of TSCA CBI
             Material  	   36
        14.   ASSISTING EMPLOYEES WITH OBTAINING
             AND MAINTAINING TSCA CBI ACCESS
             AUTHORITY	   36
        15.   PERFORMING EMPLOYEE DOCUMENT AUDITS .   36
        16.   PERFORMING AN INVENTORY OF HARD-COPY
             TSCA CBI DOCUMENTS	   37
        17.   WHEN DCOS TERMINATE THEIR EMPLOYMENT
             OR RELINQUISH THEIR DCO RESPONSIBILITIES .   37

CHAPTER 4
 PROCEDURES FOR USING AND PROTECTING TSCA CBI
 MATERIALS	   39

    A.  MARKING MATERIALS AS TSCA CBI	   39

        1.   TSCA CBI COVER SHEETS 	   39
        2.   TSCA CBI STAMP  	   39

    B.  PROCEDURES FOR USING TSCA CBI DOCUMENTS
        INSIDE OR OUTSIDE OF SECURE STORAGE AREAS  ...   39

        1.   EMPLOYEE RESPONSIBILITIES, IN GENERAL  ...   39
        2.   PROCEDURES FOR USING TSCA CBI DOCUMENTS
             OUTSIDE OF SECURE STORAGE AREAS	   40

             a.   Two types of containers are approved	   40
             b.   Open/close signs	   40
             c.   More than one person can use a storage
                 container  	   40

-------
TSCA CBI Security Manual                                  7700
                                                      1/93

         3.   PROCEDURES FOR USING TSCA CBI
             DOCUMENTS INSIDE SECURE STORAGE
             AREAS	   40

             Unauthorized persons inside secure storage areas	   41

    C.    HOW TO OBTAIN APPROVAL FOR ESTABLISHING
         A SECURE STORAGE AREA  	   41
    D.    SECURING AN AREA	   42

             SECURE STORAGE AREA REQUIREMENTS	   42

             1.   Maintaining security of lock combinations	   42
             2.   Electronic card keys  	   42

    E.  PROCEDURES FOR OBTAINING TSCA CBI	   43

         1.   HOW TO OBTAIN TSCA CBI FROM THE CBIC OR
             OTHER CENTRALIZED STORAGE FACILITY ....   43

             a.   Safeguarding TSCA CBI documents	   43
             b.   Obtaining a receipt for returned documents ....   43
             c.   Transferring TSCA CBI materials between a
                 DCO and people under his or her
                 supervision in  a centralized secure
                 storage area  	   43

         2.   HOW TO OBTAIN TSCA CBI FROM ANOTHER
             EMPLOYEE WITHIN THE SAME FACILITY	   44

             Keeping records on transfers	   44

    F.    PROCEDURES FOR TRANSFERRING TSCA CBI TO
         AN EMPLOYEE AT ANOTHER FACILITY	   45

         1.   IN GENERAL  	   45
         2.   PROCEDURES FOR TRANSFERRING TSCA CBI
             MATERIALS	   45

-------
TSCA CBI Security Manual                               7700
                                                   1/93

            a.   Procedures for sending or receiving TSCA CBI
                 materials through the U.S. Postal Service  	  45
            b.   Procedures for hand delivery of TSCA CBI
                 materials 	  46
            c.   Procedures for transmitting TSCA CBI
                 materials by courier or U.S. Postal
                 Service Express Mail	  46

    G.  PROCEDURES FOR RECEIVING AND SENDING
        FACSIMILES (FAXES) THAT CONTAIN TSCA CBI  ....  47

        1.   PROCEDURES FOR SENDING OR RECEIVING
            FAXES BETWEEN EMPLOYEES AUTHORIZED
            FOR ACCESS TO TSCA CBI	  47
        2.   WHEN INDUSTRY OFFICIALS OR INDUSTRY
            SUBMITTERS REQUEST THAT TSCA CBI BE
            FAXED TO THEM 	  48
        3.   WHEN AN INDUSTRY OFFICIAL OR INDUSTRY
            SUBMITTER ASKS TO FAX TSCA CBI TO EPA  ...  48

    H.  DISCUSSING TSCA CBI ON THE TELEPHONE	  49

        1.   TELEPHONE CALLS WITH EMPLOYEES
            AUTHORIZED FOR TSCA CBI ACCESS	  49
        2.   TELEPHONE CALLS WITH SUBMITTERS  	  49

            Telephone Logs   	  50

    I.   ELECTRONIC MAIL CANNOT BE USED TO
        TRANSMIT TSCA CBI	  50

    J.   USE OF TSCA CBI AT TELE-VIDEO CONFERENCES  ...  50

    K.  PROCEDURES FOR HANDLING DOCUMENTS AND
        OTHER MATERIALS PRODUCED BY EMPLOYEES
        USING TSCA CBI DOCUMENTS	  51

        1.    NEW TSCA CBI DOCUMENTS	  51
        2.    NEW NON-CONFIDENTIAL DOCUMENTS	  51
        3.    PERSONAL WORKING PAPERS  	  51

-------
TSCA CBI Security Manual                                    7700
                                                          1/93

              a.    Transferring personal working papers to another
                   employee	   52
              b.    Keeping records on transfers	   52
              c.    Transferring personal working papers to a typist .   52
              d.    Procedures for storing personal working papers . .   53
              e.    Procedures for destroying personal working
                   papers	   53

    L.   CREATING NON-CONFIDENTIAL MATERIALS FROM
         TSCA CBI DOCUMENTS	   53

         1.    IN GENERAL  	   53
         2.    NON-CONFIDENTIAL DOCUMENTS	   53

              a.    When TSCA CBI data are replaced with non-
                   confidential data or descriptive terms	   54
              b.    When a submitting company drops its claim
                   of confidentiality  	   54

    M.   PROCESS FOR DECLASSIFYING TSCA CBI
         MATERIALS	   54

              HOW TO DECLASSIFY TSCA CBI MATERIALS ...   54

    N.   REPRODUCTION OF TSCA CBI MATERIALS	   55

         1.    IN GENERAL  	   55
         2.    EMPLOYEE'S ROLE	   55
         3.    DCO RESPONSIBILITIES	   55

              a.    Control of copies  	   56
              b.    Distributing copies to other employees 	   56
              c.    Authorizing use of other photocopying machines
                   when machines in secure locations break
                   down  	   56

    O.   PROCEDURES FOR DESTROYING TSCA CBI
         MATERIALS	   57

         1.    IN GENERAL  	   57

-------
TSCA CBI Security Manual                                  7700
                                                       1/93

         2.   WHO IS PERMITTED TO DESTROY TSCA CBI
             MATERIALS	   57

             a.   EPA and Federal employees  	   57
             b.   Contractor employees	   57

         3.   DESTRUCTION METHODS  	   57
         4.   DOCUMENTING DESTRUCTION  	   57

    P.    USE OR DISCUSSION OF TSCA CBI DURING
         MEETINGS	   58

         1.   WHAT IS CONSIDERED A MEETING?	   58
         2.   PROCEDURES FOR CIRCULATING DOCUMENT
             COPIES AT A MEETING	   58

             a.   Personal working papers	   58
             b.   Documents that have been logged out to an
                  employee	   59

         3.   PROCEDURES FOR DISCUSSING TSCA CBI
             DURING MEETINGS	   59

             a.   Meeting chairperson's duties  	   59
             b.   Records of meeting must be treated as
                  TSCA CBI	   60

    Q.   TRAVELING WITH TSCA CBI MATERIALS  	   60

         1.   IN GENERAL  	   60
         2.   MAINTAINING SECURITY FOR TSCA CBI
             MATERIALS WHILE TRAVELING	   60

             a.   Storing TSCA CBI materials while traveling ....   60
             b.   Transferring possession of TSCA CBI materials
                  while traveling	   61

    R.   WORKING WITH TSCA CBI AT A PERSONAL
         RESIDENCE	   61

-------
TSCA CBI Security Manual                                    7700
                                                          1/93

    S.   WORKING WITH TSCA CBI MATERIALS ON
         COMPUTERS   	   62

         1.    IN GENERAL  	   62
         2.    AUTHORIZATION TO OBTAIN ACCESS TO
              TSCA CBI DATA STORED ON THE
              MAINFRAME COMPUTER	   62

                   Obtaining authorization to access the TSCA CBI
                   mainframe from a remote site	   62

         3.    SETTING UP A LOCAL-ARE A NETWORK (LAN) . .   62
         4.    USE OF WIDE-AREA NETWORKS (WANS) IS
              NOT PERMITTED	   62
         5.    USING PERSONAL COMPUTERS (PCS) TO
              WORK WITH TSCA CBI DATA	   63

              a.    Procedures for using TSCA CBI data on a PC
                   outside of  a secure storage area  	   63
              b.    Processing and storing TSCA CBI data on
                   floppy and hard disks	   63
              c.    Maintaining security for floppy and  detachable
                   hard diskettes containing TSCA CBI data 	   64
              d.    Terminating a TSCA CBI PC session for PCs
                   located outside secure storage areas	   64
              e.    Security procedures for PC printouts of
                   TSCA CBI data	   64

         6.    USING THE TSCA CBI MAINFRAME COMPUTER .   65

              a.    Obtaining printouts of TSCA CBI data from the
                   mainframe computer  	   65
              b.    Security procedures for printouts from the
                   TSCA CBI mainframe computer	   65

         7.    MINI COMPUTERS	   66

                   Security controls for TSCA CBI data on mini
                   computers	   66

-------
TSCA CBI Security Manual                              7700
                                                 1/93

        8.   SECURITY FOR TSCA CBI DATA STORED
            ON CONTRACTOR'S COMPUTERS	  66

    T.   DEVELOPMENT OF PHOTOGRAPHIC MATERIALS ....  66

        1.   PHOTOGRAPHS CAN BE CLAIMED AS
            TSCA CBI	  66
        2.   VIDEO TAPES CAN BE CLAIMED AS
            TSCA CBI	  67

CHAPTERS
 REPORTING AND INVESTIGATION OF VIOLATIONS OF
 PROCEDURES, LOST DOCUMENTS, AND UNAUTHORIZED
 DISCLOSURES	   69

    A.   EMPLOYEE REPORTING PROCEDURES 	   69

        1.   ORAL REPORT MUST BE MADE WITHIN
            ONE WORKING DAY	   69
        2.   WRITTEN REPORT MUST BE MADE WITHIN
            TWO WORKING DAYS	   69

                 Employee's division director or project officer's
                 duties  	   70

    B.   REVIEW AND INVESTIGATION OF EMPLOYEE'S
        REPORT	   70

        1.   WHEN POSSIBLE VIOLATION OF THIS
            MANUAL'S SECURITY PROCEDURES
            HAS OCCURRED	   70
        2.   WHEN TSCA CBI MATERIALS CANNOT BE
            ACCOUNTED FOR	   71

                 Notification to the submitting company	   71

        3.   WHEN UNAUTHORIZED DISCLOSURE OF
            TSCA CBI MATERIALS MAY HAVE
            OCCURRED  	   71

-------
TSCA CBI Security Manual                                7700
                                                    1/93

             a.   Notification to the submitting company	  71
             b.   EPA Office of General Counsel  	  71

    C.   PENALTY GUIDELINES FOR VIOLATION OF THIS
        MANUAL'S PROCEDURES 	  71

        1.    DETERMINING THAT A VIOLATION HAS
             OCCURRED  	  72
        2.    DETERMINING AN APPROPRIATE REMEDY ....  72
        3.    ADMINISTRATIVE PENALTIES  	  73
        4.    CRIMINAL PENALTIES	  73
        5.    CORRECTIVE ACTIONS  	  74
        6.    IMD DIRECTOR CAN ALSO RECOMMEND
             THAT NO ACTION BE TAKEN	  74

-------
 TSCA CBI Security Manual                                       7700
                                                                1/93

                         LIST OF APPENDICES
Appendix                  Title

  1                   TSCA CBI Access Request, Agreement, and Approval

  2                   TSCA CBI ADP User Registration

  3                   Standard Form 86:  Questionnaire for Sensitive
                     Positions

  4                   Fingerprint Chart

  5                   Request for Building Pass

  6                   Request for Approval of Contractor Access to TSCA
                     Confidential Business Information

  7                   Contractor Information Sheet

  8                   EPAAR Contract Clauses

  9                   Confidentiality Agreement for United States Employees
                     Upon Relinquishing TSCA CBI Access Authority

  10                  Confidentiality Agreement for Contractor Employees
                     Upon Relinquishing TSCA CBI Access Authority

  11                  EPA Form 3110-1:  Employee Separation or Transfer
                     Checklist

  12                  TSCA CBI Stamp

  13                  TSCA CBI Cover Sheet

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 14                  TSCA CBI Visitors Log

 15                  Receipt Log

 16                  Inventory Log

 17                  Temporary Loan Receipt for TSCA Confidential
                     Business Information

 18                  Permanent Transfer  Receipt for TSCA CBI.

 19                  Memorandum of TSCA CBI Telephone Conversation

 20                  Federal Agency, Congress, and Federal Court Sign-out
                     Log

 21                  Revision Transmittal Sheet

 22                  Document Reconciliation/Annual Certification
                                  11

-------
 TSCA CBI Security Manual                                         7700
                                                                  1/93

                              CONTACTS

Questions about the procedures in this manual should be directed to

•    Chief, TSCA Information Management Branch
     Information Management Division
     Office of Pollution Prevention and Toxics (TS-793)
     Environmental Protection Agency
     401 M Street, S.W.
     Washington, D.C.  20460
     Phone: (202)  260-0425

Other sources for information are

•    Document Control Officer
     Office of Pollution Prevention and Toxics (TS-790)
     Environmental Protection Agency
     401 M Street, S.W.
     Washington, D.C.  20460
     Phone: (202)  260-1532

•    TSCA Security Staff
     Office of Pollution Prevention and Toxics (TS-792-A)
     Environmental Protection Agency
     401 M Street, S.W.
     Washington, D.C.  20460
     Phone: (202)  260-6475

•    Director
     Information Management Division
     Office of Pollution Prevention and Toxics (TS-793)
     Environmental Protection Agency
     401 M Street, S.W.
     Washington, D.C.  20460
     Phone: (202)  260-3938
                                   111

-------
TSCA CBI Security Manual
                    GLOSSARY OF ACRONYMS
7700
1/93
     ADTS      Automated Document Tracking System
     CBI        Confidential Business Information
     CBIC       Confidential Business Information Center

     CBITS      Confidential Business Information Tracking System

     CFR       Code of Federal Regulations

     DAPSS     Document and Personnel Security System
     DCO       Document Control Officer
     DCA       Document Control Assistant

     OPPT DCO Office of Pollution Prevention and Toxics Document
                Control Officer
     EPA        United States Environmental Protection Agency
     FAX       Facsimile Transmission
     FMSD      Facilities Management and Services Division

     TIME      TSCA Information Management Branch

     IMD       Information Management Division
     LAN       Local-Area Network
     MBI        Minimum Background Investigation

     OAM      Office of Acquisition Management
                                 IV

-------
TSCA CBI Security Manual
     OGC       Office of General Counsel
     OPPT      Office of Pollution Prevention and Toxics
     PMN       Premanufacture Notification
     PC         Personal Computer
     TSCA      Toxic Substances Control Act
     WAN      Wide-Area Network
7700
1/93

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93
       BACKGROUND ON TERMINOLOGY AND EPA OFFICES
       Office of Pollution Prevention and Toxics (OPPT) director:  The
 OPPT director has overall authority for managing TSCA activities, including
 TSCA security programs.

       Information Management Division (IMD) director: The IMD director
 is  responsible for  day-to-day implementation of TSCA CBI  and control
 programs, including developing policies for the use and handling of TSCA CBI
 and operating the EPA headquarters Confidential Business Information Center
 (CBIC).

       TSCA  security staff:  The TSCA security staff is responsible for
 security-related activities, including reviewing security procedures, performing
 facility site inspections, and investigating violations of the procedures  con-
 tained in this manual.

       OPPT  document control officer (OPPT DCO):   The OPPT DCO
 provides day-to-day support to other Federal and contractor DCOs nationwide.
 This includes issuing the TSCA CBI authorized access  list and processing
 forms and records pertaining to requests for TSCA CBI access authority for
 organizations and individuals.  The OPPT DCO is assigned to the Information
 Management Division.  He or  she manages the headquarters CBIC, oversees
 other DCOs at headquarters, and provides training materials and guidance to
 all DCOs on appropriate TSCA CBI handling  procedures.

       Facility document control officer (DCO):   The  facility  DCO is
 responsible for managing the  collection of records and  document tracking
 system for the site where he or she is employed.  The number of employees
 at a facility determines how many facility DCOs there are. For  instance,
 about 30 facility DCOs are assigned to EPA headquarters. The facility DCO
 also has oversight authority for the receipt, storage, transfer, use, reproduction
 and destruction of TSCA CBI  in his or her organization or facility.

       Employee document control officer (DCO): At facilities where there
 are multiple facility DCOs, each DCO will be assigned responsibility for a
                                  VI

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 number of individual employees.  In this role, the facility DCO assists each
 employee in requesting and renewing TSCA CBI access authorization.

      Document control assistants (DCAs):   The OPPT DCO and facility
 DCOs  can nominate DCAs to assist them in performing document control
 functions.  If a procedure in this manual requires that a document be taken to
 the DCO,  the document may be taken to either the facility DCO or DC A.

      Requesting official:  This is (1) the employee's immediate supervisor
 or higher authority who nominates a Federal employee for TSCA CBI access
 or (2) the EPA project officer who nominates a contractor employee for TSCA
 CBI access. Requesting officials' responsibilities include ensuring that their
 employees renew their TSCA CBI access authority yearly, determining when
 their employees no longer require access authority, authorizing their employees
 to transfer TSCA CBI using a courier or express mail,  and initiating or
 reviewing their employees' reports of violations of this manual's procedures.

      EPA Confidential Business Information Center (CBIC): The primary
 area for storing and using TSCA CBI is the EPA CBIC, at EPA headquarters,
 in Washington, D.C.  If appropriate, EPA may authorize TSCA CBI access
 at other facilities,  including EPA regional offices, other Federal agency offic-
 es, and contractor facilities.

      Facility: Any location where EPA, a government contractor, or another
 Federal agency stores and uses TSCA CBI.  Different security procedures are
 required  at  facilities outside of EPA headquarters  and at  contractor sites;
 however, the same general procedures are in force at all facilities.

      Secure storage area (SSA): An area that is secured from persons not
 authorized for access to TSCA CBI.  Secure storage areas house the bulk of
 an organization or facility's TSCA CBI records or serve as an organization or
 facility's primary  TSCA CBI work area, or both.

       Contractors and subcontractors: Individuals  who perform work under
 a contract with the United States government.

      Authorized access list: A list of people who are authorized for access
 to TSCA CBI.
                                   Vll

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

      EPA project officer:  An EPA employee who monitors the technical
 aspects of a contract that authorizes TSCA CBI access.

      TSCA CBI:  Information claimed business confidential under EPA's
 confidentiality regulations  at  40 CFR Part 2.  TSCA CBI materials are
 documents or any other information-bearing media that contain TSCA CBI.
 Most  TSCA CBI  materials  and/or  documents consist  only  partially of
 confidential business information.
                                 Vlll

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

                           CHAPTER 1
                       INTRODUCTION

          This manual sets  forth procedures for Environmental Protection
 Agency  (EPA) employees,  other  Federal  employees,  contractors,  and
 contractor employees to follow in handling information claimed as confidential
 business information (CBI) under Section 14 of the Toxic Substances Control
 Act (TSCA) (15 U.S.C.  §2613).  That section of TSCA requires EPA to
 protect from public  disclosure CBI obtained under TSCA,  and it imposes
 criminal  penalties for  the  knowing and  willful unauthorized  release or
 disclosure of such information.  EPA has issued regulations (40 CFR Part 2)
 that implement TSCA's confidentiality  provisions.  The procedures in this
 manual supplement those set forth in TSCA and in 40 CFR Part 2.

          Section 14(a)(l) of TSCA  permits  EPA to  authorize Federal
 employees,  contractors  and  contractor employees for access to TSCA CBI
 when  such  access is necessary to  perform  work in  connection with the
 agency's duties under a health  or environmental protection statute or for
 specific law enforcement purposes.

          Most TSCA CBI access occurs at  EPA Headquarters, where the
 primary storage and  use of TSCA CBI  is in  the EPA Confidential Business
 Information Center (CBIC).   If required, EPA may authorize CBI access at
 other facilities, including EPA Regional Offices, other Federal agency offices,
 and contractor facilities.  Procedures for handling, using, and storing TSCA
 CBI are generally uniform at all facilities.  However, some differences in
 security procedures are required at facilities  outside of EPA Headquarters, and
 at contractor sites.

                     A. GUIDING PRINCIPLES
            FOR SITUATIONS OUTSIDE OF THE MANUAL

          EPA recognizes that situations not covered by this manual may arise.
 In such cases, each Federal  and contractor employee who is granted TSCA
 CBI access will act under  the following  guiding principles:

          •    Each user of TSCA CBI will ensure through personal conduct
              and accountability that  he or  she  follows  all guidelines

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

              established by EPA, contractors, or other Federal agencies to
              protect  to the best  of his  or her  ability all TSCA CBI
              documents.

          •   Each  user will support management and other employees in
              carrying out their responsibilities for the protection, control,
              and security of TSCA CBI.

     B.  MANUAL UPDATES AND REVISIONS TO PROCEDURES

          Whenever procedures change for the control, storage, security, and
 handling of TSCA CBI, EPA will update the relevant pages in this manual.
 A change transmittal sheet will be issued with each set of revised pages.  It is
 suggested that the change transmittal sheets be filed in the back of the manual
 in sequential order. This manual includes a security manual update transmittal
 sheet (Appendix 21), which should be used to record revisions.

-------
TSCA CBI Security Manual                                    7700
                                                           1/93

                         CHAPTER 2
   HOW TO AUTHORIZE FEDERAL EMPLOYEES,
   CONTRACT EMPLOYEES, AND CONGRESS FOR
                  ACCESS TO TSCA CBI

         To obtain clearance for TSCA CBI access, employees of EPA, other
 Federal agencies, and contractors must fill out EPA Form 7740-6, "TSCA CBI
 Access Request, Agreement, and Approval" (Appendix  1).   In addition, a
 separate form is sometimes required for obtaining computer access to TSCA
 CBI.

         •   Federal employees can obtain the forms from the EPA Form
             Distribution Centers.  If the distribution  centers are out of
             stock, the forms can be obtained from the  OPPT DCO.

         •   Contractors  can obtain the  forms from  their EPA project
             officer.   If necessary, contractors can also obtain the forms
             from the OPPT DCO.

      A.  STEPS TO  TSCA CBI ACCESS FOR EPA EMPLOYEES

 1.   AUTHORIZING ACCESS.

      a.  COMPLETING AND SUBMITTING THE FORMS. The first step for EPA
 employees to obtain TSCA CBI access is the completion of Form 7740-6. The
 employee must submit the form to the facility DCO on site.

         The DCO reviews the form for completeness and accuracy before
 forwarding it to the employee's immediate supervisor, to whom this manual
 will hereafter refer as the employee's requesting official.  The supervisor will
 review the completed form. If the supervisor approves the form, he or she
 signs line 20 and returns it to the facility DCO.  By signing the form, the
 supervisor verifies that the individual has attended a Security Briefing. The
 facility DCO will forward the form to the OPPT DCO for review and final
 approval.

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

      b.  A SEPARATE FORM IS REQUIRED TO OBTAIN COMPUTER ACCESS TO
 TSCA CBI DATA.  Employees who require online access to TSCA CBI data
 stored on the mainframe computer, mini computers, or computers linked by
 local area network must  submit  Form 7740-25,  "TSCA CBI ADP User
 Registration Form" (Appendix 2) to the DCO on site,  who will forward the
 form to the OPPT DCO for processing.

      c.  INDIVIDUAL  ACCESS FILES.  A DCO is responsible for establishing
 an access file for each employee  in his or her organization who  is granted
 authority to access TSCA CBI.  The file must contain a copy of all forms or
 other  documentation  related to the employee's TSCA CBI clearance.   If
 required  by personnel regulations, the  "SF 86 Questionnaire  For Sensitive
 Positions" (Appendix  3) can be kept in the employee's official personnel file.
 The  files must be maintained  in alphabetical order by  employee name.
 Contractors' access files are kept  by the DCOs at their facilities;  the OPPT
 DCO maintains all EPA headquarters employees' access files.

       d.  SECURITY  BRIEFING  is  REQUIRED.   It  is  the  responsibility  of
 requesting officials to  ensure that their employees (1) read this manual and (2)
 attend a security briefing on procedures for handling TSCA CBI documents.
 Employees must attend a briefing on CBI security procedures before they are
 allowed access to TSCA CBI. The briefing, on video, is presented weekly by
 the OPPT DCO.  It can also be presented by a facility DCO.

       e.  APPROVAL  FOR  TSCA  CBI ACCESS  OR WAIVER FOR IMMEDIATE
 ACCESS. The OPPT  DCO will add the employee's name to the TSCA CBI
 authorized access list  when the employee is approved for TSCA CBI access.
 The OPPT  DCO  will  notify the employee's DCO of approval by sending him
 or her the TSCA CBI authorized access list.

          Facility DCOs must notify the  OPPT DCO by the  15th of each
 month of additions or  deletions that must be made to the TSCA CBI authorized
 access list.

          A requesting official may allow an employee access to TSCA CBI
 before receiving  final approval from  the OPPT DCO under the following
 conditions: The requesting  official has determined that immediate access is
 necessary, the required forms have been completed and submitted to the OPPT

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

 DCO,  and  the  employee has attended the  security briefing.   Access is
 permitted for 10 days.

      f.  TSCA CBI AUTHORIZED ACCESS LIST.  After EPA employees are
 approved for TSCA CBI access, they are listed on the TSCA CBI authorized
 access  list.   EPA's CBIC uses the list, with the automated Confidential
 Business Information Tracking System (CBITS), to control access to TSCA
 CBI materials. The list includes the names of employees cleared for TSCA
 CBI computer access and the expiration date for their access.  The OPPT DCO
 provides copies of the access list monthly to DCOs and can answer inquiries
 about whether an employee is authorized for access to TSCA CBI.

 2.   REQUIREMENTS FOR MAINTAINING ACCESS.

      a.  GENERAL INFORMATION.   Each  year, EPA employees who are
 authorized for access to TSCA CBI must follow certain procedures to maintain
 their access.

      b.  DOCUMENT AUDIT PROCEDURE. The DCO will furnish the employee
 with a report listing all documents that the DCO's  manual  or  automated
 inventory log shows as charged out to  that employee.  The employee  must
 reconcile the report by (1) verifying that he or she has the listed documents in
 his or her possession and signing the Document Reconciliation Certification
 (Appendix  22),  (2)  notifying  the  DCO that he or she  doesn't have the
 documents  in his or her possession  and  so indicating  on the  Document
 Reconciliation Certification, or (3) indicating on the Document Reconciliation
 Certification that no documents are charged out.  If the DCO fails to locate the
 documents,  he or she  must follow  the procedures  discussed  in Chapter 5.
 Once a report is submitted, as required by Chapter 5, the DCO after receiving
 written  approval from  the employee's  requesting  official may  renew the
 employee's  access.

          After the DCO reviews the Document Reconciliation Certification,
 he or she will file a copy of the certification form in the employee's Individual
 Access File.

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

      c.  SCHEDULING AN ANNUAL SECURITY BRIEFING.  After the Document
 Reconciliation Certification process  is completed,  the next step is for  the
 employee to attend a security briefing.  The facility DCO is responsible  for
 scheduling annual security briefings  for employees.  If employees attend a
 briefing presented by a facility DCO, it is the facility DCO's responsibility to
 provide their names to the OPPT DCO.

      d.  FAILURE TO ATTEND AN ANNUAL SECURITY BRIEFING.  The OPPT
 DCO will suspend the access authority of any employee who fails to attend a
 security briefing within a year of his or her last briefing.  The OPPT DCO
 will notify  the  employee's  requesting official of the  suspension.  If  the
 employee does not attend an annual security briefing within 30 days from the
 date his or her access expired, the OPPT DCO  will on the 30th day  terminate
 the employee's TSCA CBI  authorization and deactivate  the  employee's
 electronic card key for accessing TSCA CBI secure storage areas, along with
 all computer access authorization, including user identifications and passwords.
       e.  REAPPLYING  FOR TSCA  CBI ACCESS.  If an employee has been
 removed from the TSCA CBI authorized access list, he or she must reapply
 for TSCA CBI access.  Employees who must reapply for  TSCA CBI access
 must follow the procedures in section A. 1 of this chapter.  Contact the OPPT
 DCO for specific instructions before submitting renewal forms.

       f.  EMPLOYEE TRANSFERS WITHIN EPA.  The OPPT DCO must be
 notified when an employee transfers to another branch, division, or office if
 the new position requires TSCA CBI access.  It is the  responsibility of the
 employee's former requesting official to notify the OPPT DCO of the transfer
 so  the employee's current access  authorization can be  cancelled.  If the
 employee's new position requires TSCA CBI access, his or  her new requesting
 official is responsible for submitting a completed Form 7740-6 "TSCA CBI
 Access Request, Agreement, and Approval."

           B. STEPS TO TERMINATING TSCA CBI ACCESS
                        FOR EPA EMPLOYEES

 1.    GENERAL  INFORMATION. Authorization for access to TSCA CBI
 must be terminated when

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

         •    The employee stops working at EPA.
         •    The employee transfers to a new position in EPA that does not
              require access to CBI.
         •    The employee fails to attend the annual security briefing.
         •    The employee receives an administrative penalty suspending his
              or her authority to access TSCA CBI.

 2.    REQUIREMENTS FOR TERMINATING ACCESS.

       a. FORM 7740-16.  When an employee's TSCA CBI clearance is
 relinquished  or revoked, he  or  she  must complete EPA Form 7740-16,
 "Confidentiality Agreement for United States Employees Upon Relinquishing
 TSCA CBI Access Authority" (Appendix 9).   The employee's requesting
 official and  facility DCO are responsible for ensuring that the  employee
 completes the form within five days after the employee's TSCA CBI access
 authority is canceled.

         The  employee  must submit the completed  form to his or  her
 requesting official, who sends it to the OPPT DCO.  The requesting official
 must also send a copy of the completed form to the facility DCO for placement
 in the employee's TSCA CBI Access File.

       b. DOCUMENT AUDIT PROCEDURE. After receiving Form 7740-16, the
 facility DCO will furnish the employee with a report listing all the documents
 that the CBITS system, DAPSS system, and the facility DCO's manual or
 automated inventory log show as being in the employee's possession. The
 employee is  responsible for returning these documents.  All of the returned
 documents must be re-entered  into the collection  of  records before  any
 individual TSCA CBI document charged out to a terminating employee can be
 reissued to another TSCA CBI-cleared employee.

       C. DCO RESPONSIBILITIES AFTER DOCUMENT AUDIT  IS COMPLETED.
 After the document reconciliation is complete, the facility DCO will

         •    Request that the OPPT DCO remove the  employee's name
              from the TSCA CBI authorized access list.

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

          •   Inform the employee DCO that the employee is no longer
              authorized for CBI access.

          •   Request that the OPPT DCO instruct the Facilities Management
              and Services  Division (FMSD), Office of Administration, to
              invalidate the employee's electronic entry card  for  EPA
              headquarters TSCA CBI secure storage areas.

          •   Change the combinations to locks for any TSCA CBI secure
              storage containers to which the employee had access. At EPA
              headquarters, the facility DCO can request that a security
              representative of FMSD's Security Management Section change
              the lock combinations for any TSCA CBI storage containers or
              secure storage areas.

          The OPPT DCO will  direct IMD's TSCA  Systems Section to
 invalidate the employee's TSCA CBI  computer user identification code and
 passwords for all mainframe, mini, or micro computer  systems to which the
 employee had access.   When the  TSCA  Systems Section completes the
 invalidation, the section will provide written confirmation to the OPPT DCO.
       d.  MISSING DOCUMENTS. The facility DCO must assume that a TSCA
 CBI document is missing when it is not received within 30 days of issuing the
 employee the list of items charged out to him or her.  The procedures for
 reporting these documents as missing are in Chapter 5 of this manual.

       e.  EMPLOYEE RESPONSIBILITIES.   Employees who are relinquishing
 their TSCA CBI access authority are responsible for returning all TSCA CBI
 documents  and magnetic media in their possession to  the facility's DCO.
 Employees who  are terminating their employment must return to FMSD all
 electronic entry cards for EPA headquarters facilities. Regional or laboratory
 employees  who  have  electronic entry cards for secure storage areas must
 relinquish those  cards to the issuing office prior to signing Form  7740-16,
 "Confidentiality Agreement for United States Employees Upon Relinquishing
 TSCA CBI Access Authority."   EPA headquarters employees  who  are
 terminating their employment must obtain signatures from the OPPT DCO and
                                   8

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

 FMSD on the "Employee Separation or Transfer Checklist", EPA  Form
 3110-1 (Appendix 11) when relinquishing their TSCA CBI clearance.

                  C.  STEPS TO TSCA CBI ACCESS
            FOR CONTRACTORS AND SUBCONTRACTORS

 AUTHORIZING ACCESS.

       1.  DETERMINING WHETHER ACCESS TO TSCA CBI is NECESSARY.  It
 is EPA's responsibility to decide whether access to TSCA CBI is necessary for
 a contractor to successfully perform the conditions of a contract with the U.S.
 government.  Depending on the contract, the EPA project  officer, the EPA
 delivery order project officer, or the EPA work assignment manager (in the
 case of GSA zone contracts) will evaluate the need for TSCA CBI access.

          If it is determined that access is necessary, the EPA project officer,
 EPA delivery order project officer, or the EPA work assignment manager must
 complete EPA Form 7740-17, "Request for Approval of Contractor Access to
 TSCA Confidential Business Information" (Appendix 6).   Form 7740-17
 should be submitted as early in the  contracting process as possible.

          •   For new contracts, Form 7740-17 should  be submitted  to  the
              IMD director with the initial procurement  package.

          •   For existing  contracts, a  delivery order will  probably be
              necessary to modify the contract.  Form  7740-17 should be
              submitted to the IMD director prior to the modification request.

          The EPA project officer must forward the form to his or her division
 director or a supervisor of equivalent authority, who will  sign the form  as the
 requesting official and forward it  to the IMD director  for final approval.
 When the IMD director signs the form, TSCA CBI access, under the contract,
 is effective.  However, before access is permitted at a contractor's site,  the
 contractor must set up a secure environment for handling and storing TSCA
 CBI.

       2.  EPA CONTRACTORS WHO RECEIVE TSCA CBI  MUST  SET  UP A
 SECURE  ENVIRONMENT FOR HANDLING AND STORING TSCA CBI.  In

-------
TSCA CBI Security Manual                                         7700
                                                                   1/93

 establishing a secure environment, contractors are bound by (1) the conditions
 and terms of their contracts with EPA and (2) the requirements of this manual.
 Each contractor must maintain TSCA CBI in a secure environment that meets
 or exceeds the requirements contained herein.  In addition to the physical
 security procedures set forth in Chapter 4, a two-barrier system must be used
 to protect TSCA CBI at any contractor's storage site that is not located within
 an EPA or  other Federal Agency  facility.   Barrier 1  would consist at a
 minimum of perimeter walls that are constructed from "slab to slab" and do
 not have false ceilings that would permit entry into the contractor's work space
 by simply climbing over a corridor wall. Doors that provide ingress or egress
 must have pin  tumbler  deadbolt locks  installed  (unless the door is  for
 emergency egress, in which case  it  would have a  crash bar with an audible
 alarm).  All doors providing ingress  or egress that have hinge pins exposed to
 public corridors must be pinned or constructed in such a way so as to prevent
 removal of the hinge pin.  Barrier 2 consists of any of the storage containers
 listed in Chapter 4. Contractors should contact the TSCA security staff if they
 have any questions about establishing or maintaining the security of TSCA
 CBI.

       3. SITE INSPECTION.  After  the contractor has established a secure
 environment for TSCA CBI, the  TSCA security staff must inspect the site.
 TSCA CBI access will not be  authorized at the contractor's site without the
 approval of the TSCA Security Staff.

       4. REQUIRED CONTRACT LANGUAGE.  All contracts that are approved
 by the IMD director for TSCA CBI access must contain one or more of the
 following appropriate  contract  clauses:   EPAAR  1552.235-70,  EPAAR
 1552.235-71, and EP 52.235-120, November, 1992 (Appendix 8).  The EPA
 project  officer is responsible for  (1) notifying EPA's Office of Acquisition
 Management (OAM) contracting officer that the required TSCA CBI language
 is necessary  and (2) forwarding Form 7740-17  to  OAM,  after the  IMD
 director has signed it.

       5. NOTICE  TO AFFECTED  BUSINESSES.  Pursuant to  40 CFR  Part
 2.306(j), EPA must  notify affected  businesses prior to allowing TSCA CBI
 access to a contractor or  subcontractor.  IMD will prepare the notice and, at
 its discretion  will (1) publish it  in the Federal Register or  (2)  send it to
 individual businesses by letter via certified mail, return receipt requested. The
                                   10

-------
TSCA CBI Security Manual                                         7700
                                                                   1/93

 notice must be given at least 10 calendar days before access takes place by
 Federal Register notice, telegram, or certified mail (return receipt requested).

          The EPA project officer must initiate the notice process at least 60
 days before the date that TSCA CBI access is to begin.  The first step is to
 complete a Contractor Information Sheet (Appendix 7), which the OPPT DCO
 uses to prepare the notice.  The IMD director signs the notice, which signifies
 that the contractor(s) identified in the notice is authorized for access to TSCA
 CBI.

          The notice must  contain the following:

          •   The identity of the contractor or subcontractor to which TSCA
              CBI is to be disclosed.

          •   The contract number.

          •   An explanation of why access to TSCA CBI is necessary for
              satisfactory  performance of the contract.

          •   Whether access is authorized only on EPA premises or also at
              the contractor's or subcontractor's facilities.

          •   The type of information to be disclosed.

          •   The period of time for  which  access  to TSCA CBI is
              authorized.

       6.  FACILITY DCO AT THE CONTRACTOR'S SITE. The contractor DCO
 (1) serves as the liaison between EPA and the contractor on issues relating to
 TSCA CBI, (2) assists the EPA facility DCO in requesting and maintaining
 TSCA CBI access authorization for individual  contractor employees (see
 Chapter 3), and (3)  assists  in TSCA CBI handling.   The contractor DCO
 serves this function even when contractor employee access to TSCA CBI will
 occur at EPA facilities.

       7.  HOW  TO ASSIGN A DCO. The EPA project officer is responsible
 for identifying two qualified contractor employees  to act  as the contractor
 DCO and the alternate DCO.  The EPA project officer must nominate the

                                   11

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 employees to the OPPT DCO.  The nomination, submitted in writing, must
 include the employees' names, telephone numbers, electronic mail numbers,
 fax numbers, mailing addresses, and qualifications. The contractor DCO must
 be in place before the contractor is allowed  access to TSCA CBI.  (See
 Chapter 3 for information about the nomination process.)

       8.  IDENTIFYING CONTRACTOR  EMPLOYEES FOR CLEARANCE.  After
 completion of the above requirements, the EPA project officer, EPA delivery
 order project officer, or the EPA work assignment manager is responsible for
 conferring with contractor officials to determine which contractor employees
 require TSCA CBI access authorization.  The EPA project officer will request
 access authorization for these individuals in the manner described in section
 D of this  chapter.

          D. HOW TO OBTAIN TSCA CBI AUTHORIZATION
   FOR EMPLOYEES OF CONTRACTORS AND SUBCONTRACTORS

          After  a  contractor is authorized for  access to  TSCA CBI, the
 contractor's employees must individually request TSCA CBI access authority.

          All necessary forms are available from the EPA project officer.  If
 necessary, the forms can also be obtained from the OPPT  DCO.

 1.    AUTHORIZING ACCESS.

       a.  COMPLETING  AND SUBMITTING  THE  FORMS.   Each  contractor
 employee who is applying for TSCA CBI access must complete the following
 forms:

          1) Form 7740-6,  "TSCA CBI Access Request, Agreement, and
            Approval" (Appendix 1).

          2) SF-86, "Questionnaire for  Sensitive Positions" (Appendix 3).

          3) FD-258, fingerprint chart (two originals) (Appendix 4).
                                 12

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

          4) Form 7740-25,  "TSCA CBI ADP User Registration Form," if
             online access to a TSCA CBI system or data base is required.

          The completed  forms  must be submitted  to the contractor DCO.
 After reviewing the forms for accuracy and completeness, the contractor will
 forward the forms to the  EPA project officer.  The  EPA project officer will
 review the  forms and forward  them to his or her  division director or
 supervisor of equivalent authority.

          The division director will either sign line  20 of the general access
 request form to  signify approval of TSCA CBI access or will disapprove
 access.  The division director will submit the approved forms  to the OPPT
 DCO for review  and approval. After completing the review, the OPPT DCO
 will  sign the forms and may submit them to the TSCA security staff and the
 IMD director for final approval.

      b.  MINIMUM BACKGROUND  INVESTIGATION  (MBI).  All contractor
 employees  who  are granted access to TSCA CBI will be  required  to
 successfully complete an MBI  to  maintain  TSCA CBI  clearance.   MBI
 investigations are conducted by the U.S. Office of Personnel Management at
 the request of the EPA Inspector General. The EPA project officer or work
 assignment manager must ensure the MBI investigation requirement is placed
 in the official statement of work.

      c.  INDIVIDUAL  ACCESS  FILES.  The  contractor's facility DCO is
 responsible for establishing an access file for each employee  in his or  her
 organization who is granted authority to access TSCA CBI.   The file will
 contain a copy of all  forms or other documentation related to the employee's
 TSCA  CBI clearance.  If  required by personnel  regulations, the  SF  86,
 "Questionnaire For Sensitive Positions" can be kept in the employee's official
 personnel file.  The access  files will be maintained in alphabetical order by
 employee name and stored with the TSCA CBI collection of records.  The
 OPPT DCO will maintain the Individual Access Files for contract employees
 who are located at EPA headquarters.

      d.  SECURITY BRIEFING is REQUIRED.   It is the  responsibility of the
 requesting official to ensure that employees (1) read this manual and (2) attend
 a security briefing on procedures for handling  TSCA CBI documents.
                                   13

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 Employees must attend a briefing on TSCA CBI security procedures before
 they are allowed access to TSCA CBI.  The briefing, on video, is presented
 weekly by the OPPT DCO.  It can also be presented by a facility DCO.  If
 employees attend a briefing  presented  by a facility DCO,  it is the facility
 DCO's responsibility to provide their names to the OPPT DCO.

      e.  APPROVAL FOR TSCA CBI ACCESS OR WAIVER FOR IMMEDIATE
 ACCESS.  The OPPT DCO will add the contractor employee's name to the
 TSCA  CBI authorized  access list  when the employee is approved  for CBI
 access.  The OPPT DCO will notify the employee's DCO of approval  by
 sending him or her the TSCA CBI authorized  access list.

          A requesting official may allow a contractor employee access to
 TSCA  CBI before receiving final approval from the OPPT DCO when all of
 the following conditions are met:   the requesting official has determined that
 immediate access is necessary, the required form(s) has been completed and
 submitted to the OPPT DCO, the employee has attended the security briefing,
 and the facility at which the employee is working has been inspected and
 approved by the TSCA security staff.  Access is permitted for 10 days.

      f.  TSCA CBI AUTHORIZED  ACCESS LIST. After contractor employees
 are approved for TSCA CBI access, they are listed on the  TSCA CBI
 authorized access list. The list provides the names of people cleared for TSCA
 CBI access, including TSCA CBI computer access, and the date on which their
 access  expires. Questions about whether  a particular person has TSCA CBI
 access  that can not be answered by consulting the Authorized  Access List
 should be directed to the OPPT DCO. The OPPT DCO provides copies of the
 access  list monthly to DCOs.

 2.    REQUIREMENTS FOR MAINTAINING ACCESS.

       a.  GENERAL INFORMATION.  Each year, contractor employees who are
 authorized to access TSCA CBI must follow  certain procedures to  maintain
 their access. The procedures are listed below in the order in which they must
 occur.

       b.  DOCUMENT AUDIT PROCEDURE.  The contractor DCO will furnish the
 contractor employee with a report listing all documents that the DCO's manual
                                  14

-------
TSCA CBI Security Manual                                          7700
                                                                   1/93

 or automated inventory  log shows as charged out to that employee.  The
 employee  must reconcile the report by (1) verifying that he or she has the
 listed documents  in  his  or  her  possession  and  signing the Document
 Reconciliation Certification (Appendix 22), (2) notifying the DCO that he or
 she doesn't have the documents and indicating on the Document Reconciliation
 Certification that the  documents are not in his or her possession, or (3)
 indicating on the Document Reconciliation Certification that no documents are
 charged out. If the DCO fails to locate any documents, he or she must follow
 the procedures discussed in Chapter 5.

          After the DCO reviews the  Document Reconciliation Certification,
 he or she will file a copy of the certification form in the employee's Individual
 Access File.

       c.  SCHEDULING AN ANNUAL SECURITY BRIEFING.  After the document
 audit procedure is  completed, the next step is  for the employee to  attend a
 security briefing.  The contractor's facility DCO is responsible for scheduling
 annual security briefings for employees.

       d.  FAILURE  TO  ATTEND AN ANNUAL  SECURITY  BRIEFING.  Contractor
 employees will lose their authorization for access to TSCA CBI if they fail to
 attend a security briefing within a year of their last briefing.  The OPPT DCO
 will notify an employee's requesting  official of the  suspension.   If the
 employee does not attend an annual security  briefing within 30 days from the
 date the suspension notice was issued, the OPPT DCO will on the 30th day
 terminate  the  employee's  TSCA CBI authorization  and deactivate  the
 employee's electronic card key for accessing TSCA CBI secure storage areas,
 along with all computer access authorization,  including user identifications and
 passwords. It is the responsibility of the requesting official to ensure that the
 employee completes the paperwork connected with TSCA CBI termination (see
 section E of this chapter).

       e.  REAPPLYING FOR TSCA  CBI ACCESS.  If an employee has been
 removed from the TSCA CBI authorized access list, he or she must reapply
 for TSCA CBI access. To reapply, the employee must follow the procedures
 in  section  D.I  of this  chapter.  Contact the  OPPT DCO for  specific
 instructions before submitting renewal forms.
                                   15

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         E.  PROCEDURES FOR TERMINATING ACCESS TO
            TSCA CBI FOR CONTRACTOR EMPLOYEES

 1.   GENERAL INFORMATION. Authorization to access TSCA CBI must
 be terminated when

         •    The contract is completed.
         •    Employment of the contractor employee is terminated.
         •    Contractor employee's duties that require access to TSCA CBI
              are terminated.
         •    The contractor employee  fails to  attend the annual security
              briefing.
         •    The  contractor   employee  breaches   the  terms  of  the
              Confidentiality Agreement of EPA Form 7740-6, "TSCA CBI
              Access Request, Agreement, and Approval."
         •    The MBI provides information about the contractor employee
              based on which the IMD director  determines that access will
              not be granted.

 2.   REQUIREMENTS FOR TERMINATING ACCESS.

      a. FORM 7740-18.   When  a contractor  employee's TSCA CBI
 clearance is suspended, relinquished, or revoked, he or she must complete
 EPA Form 7740-18, "Confidentiality Agreement for  Contractor Employees
 Upon Relinquishing  TSCA CBI Access  Authority"  (Appendix  10).  The
 employee's requesting official and DCO are responsible for ensuring that the
 employee completes the form within five days after the  employee's TSCA CBI
 access authority is canceled.

         The  employee must  submit the completed form to his or her
 requesting official, who sends it to the OPPT DCO.  The requesting official
 must also send a copy of the completed form to the facility DCO for placement
 in the employee's TSCA CBI Access  File.

      b.  DOCUMENT AUDIT PROCEDURE.  After receiving Form 7740-18, the
 facility DCO will furnish the contractor employee with a report listing all the
 documents that the CBITS system, DAPSS system, and the facility DCO's
 inventory log show as  being in  the contractor employee's possession. The
                                 16

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

 contractor employee is responsible for returning these documents.  All of the
 returned documents must be re-entered into the collection of records before
 any individual TSCA CBI document charged out to the terminating employee
 can be reissued to another TSCA CBI-cleared employee.

       c.  MISSING DOCUMENTS.  The facility DCO must assume a TSCA CBI
 document is missing when it is not received within 30 days of issuing the
 contractor employee  the  list of items  charged out  to him or her.  The
 procedures for reporting these documents as missing are in Chapter 5.

       d.  DCO RESPONSIBILITIES AFTER DOCUMENT  AUDIT IS COMPLETED.
 After the document reconciliation is complete, the facility DCO will

          •   Request that the OPPT DCO  remove  the employee's name
              from the TSCA CBI authorized access list.

          •   Inform the employee's DCO that the employee is no longer
              authorized for TSCA CBI access.

          •   Request the OPPT DCO to invalidate the employee's electronic
              entry card  for EPA headquarters TSCA CBI secure  storage
              areas.

          •   Change the combinations to locks for any TSCA CBI secure
              storage containers to which the employee had access.

          The OPPT  DCO will direct  IMD's TSCA Systems Section to
 invalidate the employee's  TSCA CBI computer user identification  code  and
 passwords for all mainframe, mini, or micro computer systems to which the
 employee had access.  When the TSCA Systems  Section completes  the
 invalidation, the section must provide written confirmation to the OPPT DCO.

       e.  CONTRACTOR EMPLOYEE RESPONSIBILITIES.   Employees who are
 relinquishing their TSCA CBI access authority are responsible for returning all
 TSCA CBI documents and magnetic media in their possession to the facility
 DCO.  Employees who  are terminating  their employment must return to the
 OPPT DCO all electronic entry cards for EPA headquarters facilities. EPA
                                  17

-------
TSCA CBI Security Manual                                       7700
                                                              1/93

 project officers are responsible for ensuring that all electronic entry cards
 issued to contractor employees are returned to the OPPT DCO.

           F.  PROCEDURES FOR TERMINATING ACCESS
                 TO TSCA CBI FOR CONTRACTORS

 TERMINATING ACCESS  TO TSCA CBI WHEN A CONTRACT ENDS.

         On the day a contract is completed or access to TSCA CBI ends
 under the contract's terms, the contractor DCO must inventory the TSCA CBI
 materials that the CBITS system,  DAPSS system, and the DCO's manual or
 automated  inventory log show as being at the contractor's facility.  The
 contractor DCO must provide the  written inventory to the EPA project officer
 within 30 calendar days.  The EPA project officer must provide a copy of the
 results to the OPPT DCO and the TSCA security staff. The contractor DCO
 must collect all TSCA CBI materials and document control materials, including
 logs and cover sheets, that are in the company's possession.  The contractor
 must transfer the materials to the  OPPT  DCO within 30 calendar days. The
 OPPT DCO will provide them to the EPA project officer.

         The EPA project officer will review the materials and reconcile the
 returned materials with the  inventory provided by the contractor DCO. The
 EPA project officer then transfers the  materials to the OPPT  DCO with
 instructions for appropriate  disposition.

          G. AUTHORIZING OTHER FEDERAL AGENCIES
                    FOR ACCESS TO TSCA CBI

         EPA regulations (40 CFR part 2) allow disclosure of TSCA CBI to
 another Federal agency when the information is necessary for the other agency
 (1) to perform work for EPA, (2) to perform its duties under any law for the
 protection of health or the environment, or (3)  for specific law enforcement
 purposes.

 1.    GENERAL PROCEDURES FOR EPA OFFICES TO DISCLOSE TSCA
 CBI TO ANOTHER FEDERAL AGENCY PERFORMING WORK FOR EPA.
 When an EPA office is having another Federal  agency perform work that
 requires access to TSCA CBI, EPA generally takes the initiative in
                                 18

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 arranging to disclose the information to the other agency.  The first step to
 arrange disclosure is for the EPA office that is involved to contact the IMD
 director.

          The  IMD  director will  notify the other  agency  that (1)  the
 information that will be disclosed is CBI and was acquired under the authority
 of TSCA and  that (2)  any  unauthorized disclosure of the information may
 subject the other agency's employees to the criminal penalties in Section 14(d)
 of TSCA (see  Chapter 5 of this manual).

          When EPA discloses TSCA CBI to another agency to perform work
 on behalf of EPA, no  notice to affected businesses is required.  Notice is
 required in all  other circumstances.  The IMD director will notify the agency
 performing the work whether access is approved.

       a.  AGREEMENT NOT  TO DISCLOSE TSCA CBI.   The agency that will
 receive TSCA  CBI must provide a written agreement that it will not disclose
 TSCA CBI.

       b.  EXCEPTIONS TO  AGREEMENT NOT TO  DISCLOSE TSCA CBI.  A
 Federal agency does  not have to provide a written agreement that it will  not
 disclose TSCA CBI under any one of the following circumstances:

          •    The agency has statutory authority both to compel production
               of the information and to make the proposed disclosure, and it
               has furnished affected businesses with at least the same notice
               that EPA would provide under EPA's regulations.

          •    The agency has obtained the consent of each affected business
               prior to the proposed disclosure.

          •    The agency has obtained  a written statement from the EPA
               general counsel or an EPA regional counsel that disclosure of
               the information would be proper under EPA regulations.

       c.  TSCA CBI ACCESS AT EPA  FACILITIES.  Once approval for access
 has been granted, designated employees of the other Federal agency can obtain
 access to specified TSCA CBI on EPA premises.  The procedures for
                                   19

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 individual employees to obtain clearance for TSCA CBI access are explained
 in sections A and B of this chapter.

      d. TSCA CBI ACCESS AT OTHER FEDERAL AGENCIES. When a Federal
 agency is allowed access to TSCA CBI  on its premises, the Federal agency
 must appoint a facility DCO and must provide a secure environment before
 documents will be transferred.

      e. HOW TO ASSIGN  A DCO.  The requesting official  or  the facility
 manager in charge of the facility to which TSCA CBI will be transferred must
 nominate a facility DCO and an alternate DCO.  The nomination, submitted
 in writing  to the OPPT DCO, must include the name, telephone number,
 electronic mail number,  fax number, and mailing address of both nominees.
 The  OPPT DCO will decide whether to approve the  nomination.   The
 requesting  official or the facility DCO can also nominate document control
 assistants (DCAs) to assist the DCO in his or her day-to-day duties.

 2.   PROCEDURES FOR ANOTHER FEDERAL AGENCY TO  REQUEST
 ACCESS  TO TSCA CBI.  These procedures must be followed  by Federal
 agencies that are  requesting access to TSCA CBI (1) to perform duties under
 any law for the protection of health or the environment or (2)  for a specific
 law enforcement  purpose.

      a.  SUBMIT A WRITTEN REQUEST.  To obtain access to TSCA CBI, a
 Federal agency must submit a written request to the IMD director  at least one
 month before access is needed.  The request must state the specific information
 to which access  is requested,  why access is necessary (this is  the official
 purpose and will be one of the two reasons stated in the preceding paragraph),
 and provide supporting  details.  The request must be signed by an agency
 official whose authority  is at  least  equivalent  to that of an EPA division
 director.

      b.  AGREEMENT NOT TO DISCLOSE TSCA CBI.  The agency that will
 receive TSCA CBI must provide a written agreement that it will not disclose
 TSCA  CBI.
                                  20

-------
TSCA CBI Security Manual                                         7700
                                                                   1/93

       c.  EXCEPTIONS TO AGREEMENT NOT TO DISCLOSE  TSCA CBI.  A
 Federal agency does not have to provide a written agreement that it will not
 disclose TSCA CBI under any one of the following circumstances:

          •    The agency has statutory authority both to compel production
               of the information and to make the proposed disclosure, and it
               has furnished affected businesses with at least the same notice
               that EPA would provide under EPA's regulations.

          •    The agency has obtained the consent of each affected business
               prior to the proposed disclosure.

          •    The agency has obtained a written statement from the EPA
               general counsel or an EPA regional counsel that disclosure of
               the information would be proper under EPA regulations.

       d.  NOTICE TO AFFECTED BUSINESSES.   Before EPA  allows another
 Federal agency access  to  TSCA CBI, EPA must provide  written notice to
 affected businesses except as stated in section G.I above.  The notice must be
 given at least 10 calendar days before access takes place by Federal Register
 notice, telegram, or certified mail (return receipt  requested).   IMD will
 prepare the notice, which must include

          •    The identity of the agency to which TSCA CBI access is being
               allowed.

          •    The official purpose for the access.

          •    Whether access is authorized only on EPA premises or also at
               the other agency's facilities (see section 3 of this chapter).

          •    The type of information that will be disclosed.

          •    The period of time for which access to TSCA CBI is being
               authorized.
                                   21

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

 3.   ERA'S  PROCESS  FOR  APPROVING TSCA CBI ACCESS  FOR
 OTHER FEDERAL AGENCIES. The IMD director will review requests for
 TSCA CBI access from other Federal agencies and will notify the agencies'
 requesting officials whether TSCA  CBI access  is approved.  If access is
 approved, the IMD  director  will  notify  the  other  agency that  (1) the
 information that will be disclosed is CBI and was acquired under the authority
 of TSCA, and that (2) any unauthorized disclosure of the information may
 subject the other agency's employees to criminal penalties  allowed  under
 Section 14(d)  of TSCA.

      a.  TSCA CBI ACCESS AT EPA FACILITIES.  EPA prefers that TSCA
 CBI materials remain on EPA premises. When this is not practical. EPA will
 consider allowing access at another agency's facility.

          Once approval for access has been granted, designated employees of
 the other Federal agency can obtain access to specified TSCA CBI  on EPA
 premises.  The procedures for individual employees to obtain clearance for
 TSCA  CBI access  are explained in sections A  and B of this  chapter.
 Employees of other Federal agencies are not allowed  to remove  from EPA
 premises any documents, notes, or correspondence containing TSCA  CBI and
 must not discuss TSCA CBI with individuals not authorized for TSCA CBI
 access.

      b.  TSCA CBI ACCESS AT OTHER FEDERAL AGENCIES. Before EPA will
 grant access at another agency's facility, a facility DCO must be in place. The
 requesting official or the facility manager in charge of the facility to which
 TSCA CBI will be transferred must nominate a facility DCO and an  alternate
 DCO.  The nomination, submitted in writing to the OPPT DCO, must include
 the name, telephone number, electronic mail number, fax number, and mailing
 address of both nominees.  The OPPT DCO will decide whether  to approve
 the nomination.  The requesting official or the facility DCO can also nominate
 document control assistants (DCAs) to assist the DCO in his or her day-to-day
 duties.  Other provisions that must be in effect are the following:

          •   The  Federal agency must  have security procedures  and
              standards in place that equal or surpass those set forth  in this
              manual.
                                  22

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

          •    EPA's TSCA security staff must inspect and approve the TSCA
              CBI storage facilities at the Federal agency.  The inspection is
              to be arranged by the official requesting TSCA CBI clearance
              for his or her agency.

          •    The  Federal  agency must  appoint  a  facility DCO before
              documents will be transferred.

          •    The official requesting TSCA CBI access authority for his or
              her agency must provide a written statement of the agency's
              security procedures for handling TSCA CBI.  The statement
              should state whether (1) the security procedures in this manual
              have been adopted by the agency without change or (2) how the
              security procedures being used at the agency differ from those
              set forth in this manual.   The  written statement must be
              provided to the TSCA security staff.

 4.    REQUESTS FOR ACCESS TO TSCA CBI FROM CONGRESS OR
 THE GENERAL ACCOUNTING OFFICE.  EPA, Federal and contractor
 employees must  notify  the IMD director immediately when they  receive a
 request from Congress or the General Accounting Office for information that
 requires access to TSCA CBI.  Pursuant to 40 CFR 2.209, TSCA CBI access
 is allowed only when the  request is made by the Speaker of the House, the
 President of the Senate, a chairman of a committee or subcommittee, or the
 Comptroller General.  All document access will be provided by the OPPT
 DCO, who  will record all transactions on a Federal Agency, Congress, and
 Federal Court Sign Out Log (Appendix 20).

       NOTICE TO AFFECTED BUSINESSES.  Before EPA allows access to TSCA
 CBI by Congress or the General Accounting Office, EPA must provide written
 notice to affected businesses. The notice  must be given at least 10 calendar
 days before access  takes place by Federal Register notice,  telegram, or
 certified mail (return receipt requested). IMD will prepare the notice, which
 must include

          •    Whether access is authorized only on EPA premises or also at
              the other agency's facilities.
                                  23

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

          •    The type of information that will be disclosed.

          •    The period of time for which access to TSCA CBI is being
              authorized.
                                  24

-------
TSCA CBI Security Manual                                      7700
                                                              1/93

                          CHAPTER 3
                     RESPONSIBILITIES

                 A.  EMPLOYEE RESPONSIBILITIES

 1.   EPA HOLDS EMPLOYEES PERSONALLY ACCOUNTABLE FOR
 PROTECTING TSCA CBI. Proper protective controls must be followed by
 employees of EPA, other Federal agencies, and Federal contractors who have
 access to TSCA CBI whenever they handle, store, or transfer any TSCA CBI.
 EPA holds  every employee who has  custody of TSCA  CBI personally
 responsible for following proper handling and security procedures.

          •    Each employee who has access to TSCA CBI is required to (a)
              immediately inform management if he or she discovers that any
              procedure contained in this manual does not provide the proper
              level of protection for TSCA CBI and (b) suggest changes that
              will strengthen those weaknesses.

          •    Each employee who has  access to TSCA CBI is required to
              immediately report in writing any violations of this  manual's
              procedures to his  or her immediate  supervisor, the  TSCA
              security staff, the  contractor project  officer, and  the IMD
              director.

 Employees who have access to TSCA CBI are

          •    Accountable for all TSCA CBI documents that they receive
              through a DCO or any other employee  cleared for TSCA CBI.

          •    Required  to support  the programs  established  by  their
              management and DCO for protecting and handling TSCA CBI.

          •    Required to attend an annual security briefing prior to  renewing
              their TSCA CBI clearance and to stay informed of TSCA CBI
              handling controls and security programs.

          •    Required  to  complete an  annual  audit  of  all TSCA CBI
              documents charged out  to them through a DCO  prior to

                                25

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

              completing  the  annual  security  briefing and  to  sign  the
              Document Reconciliation Certification (Appendix 22)  after
              reconciling the documents listed on the report.

          •    Required to maintain TSCA CBI in a responsible manner that
              will not permit access to the data by anyone who has not been
              properly authorized to view TSCA CBI.

 2.   DOCUMENT AUDIT  PROCEDURES.  Each year, every employee is
 required to  account for the hard copy TSCA CBI documents in his or her
 possession.  This procedure is always the first step of the annual process to
 recertify employees for TSCA CBI clearance.

          The facility DCO will furnish the employee with a list of documents
 that the DCO's manual or automated inventory log shows the employee has in
 his or her possession. The employee must certify that the documents are in his
 or her possession by  signing  the  certification  statement inscribed  on the
 document list.  The employee must contact the facility DCO immediately if he
 or she does not have any of the documents on the list.

 3.   CHECKING  OUT  TSCA CBI DOCUMENTS.   Employees are
 permitted to check out TSCA CBI documents from their facility DCO and to
 keep the documents for up to  a  year.  However, employees should return
 TSCA CBI  to the facility DCO as soon as the material is no longer needed.

      OVERDUE MATERIALS.  TSCA CBI materials cannot be kept for more
 than one year. Any material kept longer than a year is  considered overdue,
 and the facility DCO will notify the responsible employee. Materials that are
 not returned to the DCO within 30 days of notification are presumed lost. The
 DCO must notify his or her division director of lost materials, pursuant to the
 procedures  in Chapter 5.

 4.   DETERMINING WHETHER A DOCUMENT CONTAINS TSCA CBI.
 When an employee produces a document, it is that employee's responsibility
 to decide whether the document contains TSCA CBI.  An employee who is
 unable to determine whether  something is confidential should consult with his
 or her  supervisor or DCO.  If the issue remains unresolved, the employee
 should consult the chief of the IMD TSCA Information Management Branch.
                                 26

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 5.  RECEIPT OF MAIL  CONTAINING TSCA CBI MATERIAL.   If
 employees receive materials in the mail that are believed to be TSCA CBI,
 even if they are unlabeled, those materials must be taken immediately to the
 facility's DCO for proper entry into the document tracking system.

 6.  CHALLENGING  TSCA CBI  CLAIMS DURING  AND  AFTER
 INSPECTIONS.   An employee  who  encounters a TSCA CBI  claim that
 appears to be invalid should bring the issue to the attention of the proper office
 in EPA.

          •   EPA headquarters  employees and Federal employees should
              contact IMD's TSCA Information Management Branch, which
              routinely conducts program challenges pursuant to CFR 2.204.

          •   EPA regional employees should contact the Chief, Compliance
              Branch, Office of Compliance Monitoring, who will coordinate
              the challenge with an attorney  from the TSCA Information
              Management Branch or the Office of General Counsel.

          •   Contractor employees should contact IMD's TSCA Information
              Management Branch with any  questions about TSCA CBI
              claims.

       a.  INFORMAL  INQUIRIES.   EPA employees are permitted to conduct
 informal inquiries concerning TSCA CBI  claims consistent  with 40 CFR
 2.204. When an EPA employee believes it to be appropriate, he or  she can
 request substantiation of a TSCA CBI claim from a submitter. The  request
 should be made by letter.

          EPA employees, especially compliance inspectors, are encouraged
 to obtain guidance from the TSCA Information Management Branch.  In
 addition, employees are encouraged to become familiar  with the substantive
 criteria used to determine confidentiality, which are found at 40 CFR  2.208.

       b.  FORMAL CHALLENGES. The Office of General Counsel is responsible
 for making final determinations concerning challenges to TSCA CBI  claims,
 pursuant to 40 CFR 2.205, with two exceptions. Before acting under these
 exceptions, contact attorneys in IMD or the Office of General Counsel for
 advice.
                                 27

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

          •   The first exception allows an EPA office to take certain actions
              if the office determines that the TSCA CBI claim is not entitled
              to confidential treatment. The exception is defined in 40 CFR
              2.204(d)(2); what is meant by "EPA office" is defined in 40
              CFR 2.201(m); and the possible actions are defined in 40 CFR
              2.205(f).

          •   The second exception allows the Office of General Counsel to
              delegate its authority to make final determinations concerning
              TSCA CBI challenges to any EPA attorney or regional counsel.

       c.  WHEN CONSIDERING A CHALLENGE. It is incumbent upon those who
 challenge TSCA CBI claims to act consistently with all TSCA regulations-
 particularly 40 CFR 2.201 through 40 CFR 2.205, 40 CFR 2.208, and 40
 CFR 2.306-and relevant Federal Register notices.  The validity of a TSCA
 CBI claim must be carefully  considered before  an EPA employee asks a
 submitting company to substantiate the claim.  IMD and Office of General
 Counsel attorneys should be consulted if any questions or problems arise on
 TSCA CBI issues or challenges.

                  B. MANAGER RESPONSIBILITIES

 IN  GENERAL.   All managers  who are responsible for programs involving
 access to TSCA CBI must ensure that their staff members follow this manual's
 procedures and  any other directive that deals with protection of TSCA CBI.
 Managers must  also ensure that

          •   Adequate  personnel are available to carry out  the  DCO
              responsibilities under the manager's supervision.

          •   Proper  physical  control measures are implemented in  areas
              where TSCA CBI is maintained.

          •   Their project officer, work assignment manager,  and delivery
              order  project officer  follow  proper TSCA CBI security
              procedures while administering contracts.
                                  28

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

          •    They meet quarterly with contractor project officers to ensure
              that  contractor staff  are  following  TSCA  CBI  security
              procedures.

   C.  DOCUMENT CONTROL OFFICER (DCO) RESPONSIBILITIES

 1.    IN  GENERAL.   DCOs manage their facilities' document tracking
 systems and oversee the receipt, storage, transfer, and use of TSCA CBI by
 employees in their facilities.  All  facilities that are authorized for access to
 TSCA CBI are required to have a facility DCO and an alternate DCO, who
 will assume the facility DCO's responsibilities during his or her absence.

          Facility DCOs must be approved and trained before TSCA CBI can
 be transferred to any facility.  The OPPT DCO is responsible for providing
 training materials and guidance on appropriate document handling procedures
 to all  DCOs.

 2.    THE DCO MAINTAINS A DOCUMENT TRACKING SYSTEM.  The
 receipt, usage, and transfer of TSCA CBI is  tracked through a  document
 tracking system.   All  TSCA CBI materials submitted to  EPA, and those
 produced by Federal and contractor employees (except as described in Chapter
 4, section K), are monitored through this system.

          The DCO is responsible for his or her facility's document tracking
 system. The DCO must ensure that

          •    All manual or automated logs are properly maintained, updated
              and securely stored.

          •    Document control numbers or unique numerical identifiers are
              assigned to the documents requiring them.

          •    Proper procedures are  followed  when using  TSCA  CBI
              materials.

          The IMD  director has  approved several manual and automated
 tracking systems for use by Federal or contractor DCOs. Use of one of these
                                  29

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 systems, which are described below, is mandatory. Contact the OPPT DCO
 for additional information about these tracking systems.

      a. AUTOMATED  DOCUMENT TRACKING  SYSTEMS.  EPA recommends
 that DCOs who oversee a high volume of documents and transactions use
 automated systems to track documents. These systems allow the DCO to track
 a document's movement  from the time it  is  assigned a document control
 number or received at  EPA  until the time  it  is destroyed or transferred to
 another TSCA CBI-cleared facility.

         At EPA headquarters, the OPPT DCO uses two automated systems
 to track TSCA CBI documents:  The Confidential  Business Information
 Tracking System (CBITS) and the Document and Personnel Security System
 (DAPSS).  The DCO uses a third automated tracking system, the Automated
 Document Tracking System (ADTS), to track documents at field installations.

         1)  Machine-readable bar codes.   CBITS  and DAPSS tracking
             systems both use a machine-readable bar code  to track TSCA
             CBI documents.  The bar code is affixed to each TSCA CBI
             document controlled through the headquarters CBIC.  Bar codes
             are also affixed to the electronic entry identification cards of
             employees with TSCA CBI access authorization.  The OPPT
             DCO uses these bar codes to verify  through CBITS or DAPSS
             that employees  are  authorized   for  access  to  TSCA  CBI
             documents.  The OPPT DCO also uses these bar  codes to
             produce  annual audit  certification  reports  for  employees'
             completion.

         2)  Backup for automated document tracking systems.  When
             an automated TSCA CBI document tracking system is used, the
             facility DCO must make a backup disk whenever additions,
             deletions,  or corrections  are made to the  system.  The backup
             media is TSCA  CBI data and should be protected as such.  Any
             manual logs that are converted into an automated system must be
             retained until an audit by the  TSCA security staff verifies the
             accuracy of the  conversion.
                                 30

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

            EPA also suggests securing a duplicate set of media (document
            tracking system) off site to allow for recovery of accountability of
            documents charged out, if a disaster such as a flood, fire, or other
            natural disaster strikes.  Contact the OPPT DCO and the TSCA
            security staff for assistance in establishing a program.

          3) ADTS extends monitoring  capability.  ADTS runs on an
            IBM-compatible   PC   and   provides   automated  tracking,
            accountability, and records-management capabilities for TSCA
            CBI documents stored outside the purview of the OPPT DCO.
            ADTS is available from the OPPT DCO.

      b.  MANUAL  TRACKING SYSTEMS.   Manual  tracking systems  are
 appropriate for DCOs who are responsible for a low volume of documents and
 transactions.  Certain EPA forms must be used  in implementing a manual
 tracking system.  These forms establish the minimum tracking and control
 requirements for TSCA CBI assigned to facility DCOs.  The forms are EPA
 Form 7740-10, "Receipt Log for TSCA Confidential Business Information,"
 EPA Form  7740-11,  "Inventory  Log  for  TSCA Confidential Business
 Information,"  and EPA Form 7740-24,  "Federal  Agency, Congress, and
 Federal Court Sign Out Log" (see Appendices 15, 16, and 20, respectively).

 3.   THE DCO MAINTAINS THE INVENTORY LOG.  Each DCO must
 maintain an inventory log  for TSCA CBI transactions at his or her facility.
 The inventory log must contain the following information:

          •    The document control number.

          •    The date on which a document is checked out from the DCO
              and the date on which it is returned.

          •    The identity of the individual checking out the document.

          •    If the document will be destroyed,  the entry in the disposition
              block of the log must include the date of destruction  and  the
              identity of the person who will destroy it.
                                 31

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

          •    If the requesting employee plans  to transfer the document
              outside the DCO's jurisdiction, the disposition block of the log
              must include the date and destination of the transfer.

 4.    DELIVERING AND RECEIVING TSCA CBI MATERIALS. All TSCA
 CBI materials sent through the mail or by courier must be addressed to and
 received by a DCO.  TSCA CBI materials that are hand carried  to a facility
 or generated by employees at the facility must be taken immediately to the
 DCO  (see Chapter 4).

       a.  THE DCO MUST REVIEW  DOCUMENTS FOR COMPLETENESS.  The
 DCO  must  review all materials received to determine whether they appear
 complete.

          •    If the documents do not appear to be complete, the DCO must
              immediately contact the submitter to determine whether there
              is an omission.

          •    If the materials appear to be complete,  the DCO  must stamp
              the  document as TSCA CBI (Appendix 12).  The stamp is
              applied to  at least the first page (or the cover, if the document
              has one) and the back of the last page (or back cover, if the
              document has one). The DCO then assigns a document control
              number to the document, if one has not already been assigned,
              and attaches a TSCA CBI cover sheet  (Appendix 13) to the
              front of the document.  The DCO must  write the document
              control number on the first page of the document.

       b.  THE DCO MUST MAINTAIN A RECEIPT LOG. Each document received
 by a DCO must be recorded in an automated or manual receipt log (Appendix
 15). The DCO must record the following items in the receipt log:

          •   The document's document  control number (if a document
              control number has not been assigned,  the copy number
              assigned by the DCO should be recorded).

          •   The date on which the document was received by  the DCO.


                                 32

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

          •    The submitter's name if the document was received directly
              from the submitter, the  author's name if the document was
              generated by a Federal or contractor employee, or the facility
              DCO's  name  if the document was received from another
              facility authorized for TSCA CBI access.

          •    The number of pages contained in the document.

          •    A brief description of the document  (e.g.,  "an engineering
              report on PMN-Y" or "letter from company X on PMN-W").

 5.  STORAGE OF TSCA CBI MATERIALS.   DCOs are responsible for
 ensuring that employees at their facilities are storing documents properly. This
 manual establishes storage procedures in Chapter 4, section B.

          The DCO supervises the storage of TSCA CBI materials in secure
 storage containers or in a centralized secure storage area (e.g., the CBIC at
 EPA headquarters).  The sole exception to this is when  completion of an
 employee's duties requires that he or she be assigned responsibility for specific
 secure storage containers.

 6.  MAINTAINING RECORDS OF LOCK COMBINATIONS.  The facility
 DCO must maintain a record of the lock combinations on rooms and containers
 in which TSCA CBI materials are stored.  The DCO must also store each
 combination  individually in  a sealed envelope. These envelopes should be
 opened only  in emergencies.

          At EPA headquarters, there are a number of facility DCOs.  Their
 recordkeeping responsibilities break down as follows:

          •    Each division  in OPPT  has a DCO who is  responsible for
              keeping a list of combinations for TSCA CBI storage containers
              and rooms controlled by  the division.

          •    The  OPPT DCO maintains a list of combinations  (1) for
              containers  and rooms assigned  to IMD  and  (2)  for  all
              containers and rooms in OPPT that don't fall under any specific
              division's control.

                                  33

-------
TSCA CBI Security Manual                                      7700
                                                             1/93

         •   At  EPA  headquarters, DCOs in offices  other than OPPT
             maintain  a list of combinations  for  TSCA CBI storage
             containers and rooms controlled by their offices.

         •   FMSD keeps a master list of combinations for all TSCA CBI
             locks at EPA headquarters.

 7.   CONDITIONS FOR CHANGING LOCK COMBINATIONS. The DCO
 is required to change lock combinations (1) every 12 months, (2) each time a
 person who  knows a combination relinquishes his or her TSCA CBI access
 authority, (3) when a container is put into or taken out of operation, and (4)
 if there  is  a known or possible  compromise  of TSCA CBI  data in  the
 container.  At EPA headquarters, DCOs notify FMSD,  which changes  the
 combinations.

 8.   UPDATING  THE TSCA CBI AUTHORIZED ACCESS LIST.  Each
 DCO  bears  responsibility for keeping the TSCA CBI  authorized access list
 current.  By the 15th of each month, facility DCOs must notify the OPPT
 DCO  of any employees  within their jurisdictions who should be added or
 deleted from the list.

 9.   THE DCO MONITORS AND CONTROLS WHO OBTAINS TSCA CBI
 MATERIALS.  The steps for obtaining TSCA  CBI materials are described
 here.

          •   The employee requests a specific TSCA CBI document from
             his or her DCO.

          •   The DCO locates the document in the TSCA CBI storage files
             or  obtains it from a another DCO,  employee, contractor, or
             submitter.

          •   The DCO notifies the employee that the document is available.

          •   When the employee arrives to pick up the document, the DCO
             verifies that the requesting employee is authorized for access to
             the document.
                                34

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         •    The DCO logs the document out to the employee using an
              automated or manual inventory log.

 10. THE DCO MONITORS OVERDUE TSCA CBI MATERIALS.  TSCA
 CBI materials may not be checked out from a centralized TSCA CBI storage
 facility for more than one year. DCOs must monitor the inventory log for
 TSCA CBI materials that have not been returned within the one-year period.
 The DCO  is responsible  for notifying  employees and their supervisors of
 overdue materials.  This is done by distributing to the employee and his or her
 supervisor  a  list of all TSCA CBI documents charged out to the employee
 before the annual security briefing and TSCA CBI access recertiflcation are
 accomplished.

         If the employee does not return the overdue materials to the DCO
 within 30 days after notification, the DCO must assume the materials cannot
 be located. The DCO must notify his or her division director that the materials
 are lost, pursuant to the procedures in Chapter 5.

 11. THE DCO  ASSISTS EMPLOYEES IN DETERMINING WHETHER
 DOCUMENTS CONTAIN TSCA CBI AND IN SANITIZING DOCUMENTS
 FOR PUBLIC DISCLOSURE.   The  responsibility for determining whether
 documents contain TSCA CBI rests with the document's author (see Chapter
 4, section L). The DCO's role is to provide guidance to the author in making
 the determination. Employees who are unable to determine whether something
 is confidential should consult with their supervisor or  DCO.  If the issue
 remains unresolved, the employee should consult the chief of the IMD TSCA
 Information Management Branch. The DCO also instructs document authors
 in how to  sanitize a TSCA CBI document if the document is going to be
 released to the public.

 12. THE    DCO   SUPERVISES    THE    REPRODUCTION   AND
 DESTRUCTION OF TSCA CBI MATERIALS.  The DCO is responsible for
 controlling and documenting the reproduction and destruction of TSCA CBI
 materials.  TSCA CBI materials can be reproduced or destroyed only by the
 DCO or by a DC A assigned to the task by the DCO.  In the latter case, the
 DCO must supervise the activity. Specific procedures for reproduction and
 destruction are set forth in Chapter 4, sections N and O.
                                 35

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 13. THE DCO CONTROLS THE TRANSFER OF TSCA CBI MATERIALS
 BETWEEN  FACILITIES. Two procedures exist for transferring TSCA CBI
 materials between facilities.  The first applies to materials that are already
 recorded in the document  tracking  system.   If  the document  is in an
 employee's  possession, the employee must first return the document to his or
 her facility DCO. The DCO records the date the document is being sent and
 the name of the DCO who will receive it in the Inventory Log. The DCO also
 inserts a transfer receipt in the second envelope. The transfer receipt identifies
 the package's contents.  The recipient DCO will sign the transfer receipt and
 return it to the sender.

         The second procedure applies to new materials that are not recorded
 in the document tracking system. In these cases, the document's author  must
 stamp the document as TSCA CBI and attach a TSCA CBI cover sheet  to it.
 The author  then takes the document to his or her DCO who (1) logs the
 document into the receipt log, (2) assigns it a document control number, and
 (3) records the date the document is being sent and the name of the DCO who
 will receive it.

       PACKAGING  AND ARRANGING TRANSFER OF  TSCA CBI MATERIALS.
 Specific information on packaging and arranging transfer of TSCA  CBI
 materials is provided in Chapter 4, section F.

 14. THE   DCO  ASSISTS  EMPLOYEES  WITH  OBTAINING  AND
 MAINTAINING TSCA CBI ACCESS AUTHORITY. DCOs are responsible
 for assisting employees with their TSCA CBI access authority. Procedures for
 this are set  forth in Chapter 2.

 15. THE   DCO  IS RESPONSIBLE  FOR PERFORMING  EMPLOYEE
 DOCUMENT  AUDITS.  When an employee is undergoing  TSCA  CBI
 recertification or is terminating his or her access to TSCA CBI, the DCO must
 give the employee a report listing all the documents that the CBITS system,
 DAPSS system, and the automated or manual inventory log show as being in
 the employee's possession.  All of the returned documents must be re-entered
 into the collection of records.
                                 36

-------
TSCA CBI Security Manual                                      7700
                                                              1/93

 16.  EACH YEAR, THE CONTRACTOR DCO MUST PERFORM AN
 INVENTORY OF HARD-COPY TSCA CBI DOCUMENTS.  Before July 31
 of each year, each contractor DCO must inventory all hard-copy TSCA CBI
 materials in the DCO's document tracking system.

         •   The DCO  must compare the TSCA  CBI documents  in the
             receipt log with the transactions listed in the  inventory log.
             This is accomplished  by  comparing  the  document control
             numbers.

         •   The  DCO must  inventory  the  documents in his or her
             possession. These documents are listed in the receipt log, but
             not in the inventory log.

         •   The DCO must review the status (e.g., destroyed or transferred
             outside the DCO's facility) and location (e.g.,  checked out to
             an employee) of materials listed in the inventory log.

         •   The DCO must locate any documents that have been checked
             out for more than one year.

         •   The DCO must review the status of documents indicated in the
             inventory log as having been destroyed.

         •   Prior to October  1  of each year, the DCO  must  submit a
             written  inventory  to his supervisor.    By October  1, the
             supervisor must submit the report to the TSCA security staff.
 NOTE:  The procedures in Chapter 5 must be followed if there are any TSCA
 CBI materials that cannot be located.

 17. WHEN DCOS TERMINATE THEIR EMPLOYMENT OR RELINQUISH
 THEIR DCO RESPONSIBILITIES.  The procedure that must be followed
 when DCOs terminate their employment or relinquish DCO responsibilities is
 the same for DCOs  at EPA headquarters, regional offices, other Federal
 agencies and contractor facilities.
                                37

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

      TSCA CBI MATERIALS MUST BE INVENTORIED. The outgoing DCO and
 the incoming DCO must jointly perform an inventory of TSCA CBI materials
 in the outgoing DCO's collection of records.  Both parties must certify the
 inventory before the outgoing DCO departs.  The incoming DCO should retain
 a copy of the inventory for audit purposes and forward a copy to  the OPPT
 DCO.  If any TSCA CBI materials cannot be located during the  audit, the
 incoming DCO must follow  the procedures  in Chapter 5.
                                 38

-------
TSCA CBI Security Manual                                     7700
                                                           1/93

                         CHAPTER 4
             PROCEDURES FOR USING AND
         PROTECTING TSCA CBI MATERIALS
         All procedures discussed in this chapter apply to employees of EPA,
 other Federal agencies, and contractors, unless otherwise specified.

             A.  MARKING MATERIALS AS TSCA CBI

 1.    TSCA CBI COVER SHEETS MUST BE PLACED ON MATERIALS.
 A TSCA CBI cover sheet, EPA Form 7740-9 (Appendix 13), must be affixed
 to all TSCA CBI materials.  Magnetic media are the sole exception to this
 rule.

 2.   TSCA CBI INDICIA MUST BE STAMPED ON MATERIALS. TSCA
 CBI materials must be marked with a  stamp that  identifies the materials as
 TSCA CBI (Appendix 12).  The author  of the materials is responsible for
 stamping the document.  The stamp must be placed on the front of the first
 page (or on the cover, if the document has one) and on the back of the last
 page (or back cover, if the document has one).  The author may choose to
 stamp additional pages of the document.  If the  document is a copy or is
 received from outside  EPA, the DCO  is  responsible  for  stamping the
 document.

       B. PROCEDURES FOR USING TSCA CBI DOCUMENTS
        INSIDE OR OUTSIDE OF SECURE  STORAGE AREAS

 1.    EMPLOYEE RESPONSIBILITIES, IN GENERAL.  Employees using
 TSCA CBI are responsible for ensuring that no unauthorized disclosure of that
 information occurs. One way of ensuring this is for employees to use TSCA
 CBI only in secure storage areas  (described below). If employees take TSCA
 CBI outside of the secure storage areas, they must (1) maintain constant
 control over the TSCA CBI documents  in their possession, (2)  return the
 TSCA CBI documents to the DCO, or (3) store the documents in a TSCA
 CBI-approved storage container.
                               39

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 2.   PROCEDURES FOR USING TSCA CBI DOCUMENTS OUTSIDE OF
 SECURE STORAGE  AREAS.   Employees who are using TSCA CBI
 documents outside of secure storage areas must never leave the documents
 where people not authorized for TSCA CBI access might gain access to them.
 When a TSCA CBI document that is in an employee's possession is not in use,
 the employee must place the document in an approved storage container.

      a.  TWO TYPES  OF  CONTAINERS ARE APPROVED.   Two types of
 containers are approved for TSCA CBI storage:

          •    Metal file cabinets with locking bars and three-way changeable
              combination locks.

          •    GSA-approved Class 6 security containers.

      b.  OPEN/CLOSE SIGNS. The employee must affix a magnetic open/close
 sign to each container so the status of the  security container is visible at all
 times.  The employee must place the "open" sign on a container when it is
 opened and the "close" sign on a container when it is closed.

          If the  container has multiple drawers with separate  combinations,
 each drawer must have an open/close sign affixed to it, to show the individual
 condition of each drawer.  The facility DCO is responsible for reviewing all
 containers under his or her purview to ensure that the proper sign is affixed
 to them.

       C.  MORE THAN  ONE PERSON  CAN  USE A STORAGE  CONTAINER.   A
 storage container may be used by more than one person to store TSCA CBI
 materials.   In these cases, each person using the storage container  must be
 authorized for access to all types of TSCA  CBI stored in the container. Each
 person should be assigned a separate storage space within the storage container
 and is responsible for any TSCA CBI that  he or she stores there.

 3.  PROCEDURES FOR  USING   TSCA CBI  DOCUMENTS  INSIDE
 SECURE STORAGE AREAS.  Facilities  in which a large volume of TSCA
 CBI is used contain a secure storage area.  For example, at EPA headquarters,
 the CBIC is a secure storage area. Secure storage areas are used as TSCA
 CBI work areas, storage areas for TSCA CBI, or both.  Only employees who
                                 40

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 are authorized for access to TSCA CBI are allowed to enter secure storage
 areas.   When  an employee  is  working in a  secure  storage area,  it  is
 recommended that TSCA CBI be stored in an approved container while not in
 use, but it is not required.  The TSCA security staff is required to maintain a
 record of the locations of all TSCA CBI secure storage areas.

          TSCA CBI-CLEARED EMPLOYEES MUST ACCOMPANY UNAUTHORIZED
 PERSONS INSIDE SECURE STORAGE AREAS. If persons not authorized for access
 to TSCA CBI must enter a secure storage area for any reason, they must sign
 a visitor's log and be accompanied by a TSCA CBI-cleared employee.

                   C. HOW TO OBTAIN APPROVAL
           FOR ESTABLISHING A SECURE STORAGE AREA

       The IMD director  can designate secure storage areas in EPA facilities,
 other Federal facilities, or contractor facilities when the volume and frequency
 of TSCA CBI use justifies it.  The steps to obtaining  approval for a secure
 storage area are:

 1.   The facility DCO establishes a secure storage area that meets the security
      requirements established in this manual.

 2.   The facility DCO writes a memorandum to the IMD director asking that
      the TSCA security  staff inspect the secure  storage area  and that it be
      approved for use. The memorandum is submitted to the DCO's division
      director, who sends it to the IMD director.

 3.   The TSCA security staff inspects the secure  storage area.  The  staff will
      require security improvements if needed.

 4.   After  the TSCA security staff approves the  secure storage area, the
      facility DCO must designate an employee to assume responsibility for the
      secured  area.  This employee  is usually the DCO or a DCA.  This
      employee's responsibilities include monitoring the area to ensure that only
      employees authorized  for TSCA CBI access have access to it and
      ensuring that the devices that secure the area are operating properly.

 5.   If the secured area functions as a centralized storage area, the facility
      DCO will maintain the document tracking system for the materials stored
      in the area.

                                   41

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

                      D.  SECURING AN AREA

 SECURE STORAGE AREA REQUIREMENTS. Secure storage areas must
 be secured  by (1) a pin tumbler  lock, (2)  an  intrusion alarm,  and (3) an
 electronic card entry system or a changeable push-button door lock.

       1.  MAINTAINING SECURITY  OF LOCK COMBINATIONS.   DCOs  are
 responsible  for controlling access to lock combinations (see Chapter 3, section
 C.6).   DCOs are allowed to disclose combinations only to employees with
 TSCA CBI  access authorization and a need to review the TSCA CBI materials
 stored in the containers or rooms.

       2.  ELECTRONIC CARD KEYS CAN BE USED TO ACCESS SECURE STORAGE
 AREAS.  Card keys are often used to ingress  secure  storage areas. The DCO
 can issue card keys to employees with TSCA CBI access authorization and a
 need to review the TSCA CBI materials in the secure storage area.

          •    Employees must use their card keys each time they enter the
              secure area, even if they enter the room at the same time as
              others.  They are prohibited  from loaning  their card keys to
              other employees.

          •    If an employee needs to enter  the secure storage area and does
              not have a card key or does not  have  it  with him or  her, the
              DCO or  DCA must  determine whether  the individual is
              authorized for  access to TSCA CBI.  To  do  this, the DCO
              consults the TSCA CBI authorized access list.  If the employee
              is authorized for access, the DCO must require the employee
              to sign a visitors' log (Appendix  14) before entry.  The DCO
              must retain all visitors' logs for future reference.

          •   A person who is not authorized for access to TSCA CBI may
              gain entry to a  secure storage area  after he or she signs the
              visitors' log.

          Unauthorized persons must be escorted at  all times by someone who
          has TSCA CBI access authorization while in the secure storage area.
                                  42

-------
TSCA CBI Security Manual                                      7700
                                                              1/93

            E.  PROCEDURES FOR OBTAINING TSCA CBI

 An employee who is authorized for access to TSCA CBI can obtain a TSCA
 CBI document

         •    From  the  CBIC or other centralized storage  facility  by
              contacting the DCO.

         •    From another employee within the same facility.

         •    From another facility through the DCO.

 1.  HOW  TO OBTAIN TSCA CBI  FROM  THE CBIC  OR OTHER
 CENTRALIZED STORAGE FACILITY.   An employee who wants to obtain
 TSCA CBI materials  from the CBIC or other centralized TSCA CBI storage
 facilities must do so through his or her DCO. The DCO will verify that the
 employee is authorized for access to TSCA CBI, and will then retrieve the re-
 quested documents from the storage facility and log them out to the requestor
 through the facility's  document tracking system.  TSCA CBI documents can
 be kept for up to one year.  However, employees are encouraged to return
 documents as soon as they are no  longer needed.

      a. SAFEGUARDING TSCA CBI DOCUMENTS. Employees must safeguard
 all TSCA CBI documents  in their possession. To meet this mandate, they are
 required to (1) return the TSCA  CBI documents  to the centralized storage
 facility at the end of each day, (2) store the TSCA CBI documents in an
 approved storage container, or (3) work and maintain the documents in a
 secure storage area.

      b. OBTAINING  A RECEIPT FOR RETURNED DOCUMENTS. When returning
 TSCA CBI documents, an employee can prepare a receipt for the DCO to sign
 and return to the employee or to the employee's designee.  These receipts can
 smooth the reconciliation of document  records that is required during  the
 annual audit prior to TSCA CBI recertification.

      c. TRANSFERRING  TSCA  CBI MATERIALS  BETWEEN A DCO AND
 PEOPLE UNDER HIS OR HER SUPERVISION IN A CENTRALIZED SECURE STORAGE
 AREA.  Transfers inside a secure storage area between a DCO and anyone
                                 43

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

 whom he or she supervises are exempt from document transfer logging and
 loan receipt requirements.

 2.  HOW  TO OBTAIN TSCA CBI  FROM ANOTHER  EMPLOYEE
 WITHIN THE SAME FACILITY.  Employees who want to obtain a TSCA
 CBI document from its author or owner located in the same facility can request
 the documents directly.   The author or owner must verify that the intended
 recipient is authorized for access to TSCA CBI. To verify TSCA CBI access,
 the author or owner should consult the TSCA CBI authorized access list,
 which is available from the facility DCO.  The author or owner can transfer
 the materials by hand delivery or through his or her facility DCO. Materials
 that are delivered by hand must be given directly to the recipient. Inter-office
 mail must never be used for such transfers.  TSCA CBI materials must
 never be left unattended in an in-box or on the recipient's desk.

 NOTE:   Contractor employees are restricted to transferring TSCA CBI
 documents through their facility  DCOs.

 KEEPING RECORDS  ON TRANSFERS.   If the transfer was made through  the
 facility  DCO, the DCO  will record  the transfer in  the document  tracking
 system.  If the transfer was made by hand delivery, the owner or author of the
 transferred document can choose to obtain a signed loan receipt indicating that
 the transfer was completed (Appendix 17).  These loan receipts should be
 retained until  the documents are returned. If a document is transferred and no
 loan receipt is obtained,  the owner or author of the document will be held
 responsible and accountable for the document.

          Transfers between DCOs for different organizations within the same
 facility,  e.g.,  transfers from the OPPT DCO to an OPPT division DCO, must
 be recorded in the document tracking system.
                                  44

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         F.  PROCEDURES FOR TRANSFERRING TSCA CBI
            TO AN EMPLOYEE AT ANOTHER FACILITY

 1.  IN GENERAL. TSCA CBI materials can be transferred to an employee
 at another facility as long as that employee is authorized for access to TSCA
 CBI.  Transfers of TSCA CBI materials must be conducted through facility
 DCOs, in accordance with the procedures set forth below.  This ensures that
 the materials are properly logged out by the DCO.  Before any TSCA CBI
 materials may be transferred to another facility, the facility DCO must notify
 the receiving DCO that the materials will be sent.

 2.  PROCEDURES FOR TRANSFERRING TSCA  CBI  MATERIALS.
 TSCA CBI materials can be transferred to an employee at another facility in
 one of four ways:

         •   The DCO can send the  materials certified mail through the
             U.S. Postal Service, return receipt requested.

         •   The DCO can appoint a TSCA CBI-cleared employee to deliver
             the materials directly to the facility DCO.

         •   The DCO can arrange delivery by a  courier or by the  U.S.
             Postal Service Express Mail when approved by the immediate
             supervisor.

         •   The DCO can transfer the materials via facsimile (see section
             G of this chapter).

      a. PROCEDURES  FOR SENDING OR RECEIVING  TSCA CBI MATERIALS
 THROUGH THE U.S. POSTAL SERVICE. An employee who wants to mail TSCA
 CBI material to an EPA or Federal employee must provide the material to his
 or her DCO. The exception to this is that OPPT employees who are mailing
 TSCA CBI material to  a contractor employee must work through the OPPT
 DCO.  The DCO will send the TSCA CBI material  certified mail, return
 receipt requested.  Regular first class mail must never be used to  transfer
 TSCA CBI.
                                 45

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

          1) TSCA CBI materials must be double-wrapped. The DCO
            must double-wrap TSCA CBI that will be delivered by the U.S.
            Postal Service. The DCO must label the inner wrapping with the
            recipient DCO's name and the statement, "TSCA Confidential
            Business Information ~ To Be Opened by Addressee Only." The
            DCO must label the outer wrapper with the name and address of
            the recipient  DCO and a return address.  The outer wrapper
            should be free of any indications that the package contains TSCA
            CBI.

          2) Receipt of contents. Inside the inner envelope, the DCO must
            include a receipt identifying the contents of the package.  The
            recipient DCO will sign the receipt of contents and return it to
            the sender.

       b.  PROCEDURES  FOR HAND  DELIVERY OF  TSCA CBI MATERIALS.
 TSCA CBI material must be provided to the DCO for proper logging before
 a TSCA CBI-cleared person is permitted to hand carry the material to its
 destination. The person carrying the materials must protect it at all times in
 accordance with the security procedures for transferring  TSCA CBI  as set
 forth in this chapter.

       c.  PROCEDURES FOR TRANSMITTING TSCA CBI MATERIALS BY COURIER
 OR U.S.  POSTAL  SERVICE  EXPRESS  MAIL.   With the  approval  of an
 employee's requesting official, the DCO can use a courier service or the U.S.
 Postal Service Express Mail to transfer TSCA CBI materials.  The general
 guideline for use of these services is that time must  be of the essence.  Unlike
 certified mail, neither of these services requires each person handling the
 package to sign for it as it changes hands.

          •    TSCA CBI materials must be double-wrapped.  The DCO
               must double-wrap  TSCA CBI that will  be delivered by a
               courier service or by the U.S. Postal Service. The DCO must
               label the inner wrapping with the recipient DCO's name  and
               the statement, "TSCA Confidential Business Information — To
               Be Opened by  Addressee Only."  The DCO must label the
               outer wrapper with the name and address of the recipient DCO
                                  46

-------
TSCA CBI Security Manual                                      7700
                                                              1/93

              and a return address. The outer wrapper should be free of any
              indications that the package contains TSCA CBI.

         •    Receipts are necessary. Inside the inner envelope, the DCO
              must include a receipt identifying the contents of the package.
              The recipient DCO will sign the receipt and send it back to the
              sender to verify receipt and contents.  The DCO must  also
              obtain a receipt from the courier service employee who picks
              up the package.  All receipts should be retained by the sending
              DCO for auditing.

   G.  PROCEDURES FOR RECEIVING AND SENDING FACSIMILES
                 (FAXES) THAT CONTAIN TSCA CBI

 1.  PROCEDURES FOR SENDING OR RECEIVING FAXES  BETWEEN
 EMPLOYEES AUTHORIZED FOR ACCESS TO TSCA CBI. The following
 security transmission provisions  must be followed when transmitting  any
 TSCA CBI by facsimile equipment:

         •    Only  a DCO  or DCA is permitted to send a fax containing
              TSCA CBI, and only a DCO or DCA is permitted to receive
              the transmission.

         •    Before a DCO or DCA sends a fax containing TSCA CBI to
              another DCO or DCA, the sender must verify the employee's
              access authority by consulting the TSCA CBI authorized access
              list.

         •    During  transmission,  the  DCOs  sending and receiving the
              document must completely control the fax machine. They must
              ensure that no one who is not cleared for TSCA CBI views the
              document.

         •    Fax machines that contain internal memory are not authorized
              for transmission of TSCA CBI  between EPA, its contractors,
              and other Federal agencies.
                                47

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

          •    Transmission  of  TSCA  CBI is restricted  to  individually-
              controlled fax machines.  Fax machines located inside secure
              storage areas are preferred.  Central fax receiving centers are
              not authorized to receive TSCA CBI.

          •    The DCO sending the fax is responsible for ensuring that the
              number dialed is correct by verifying the number on the fax
              transmission confirmation receipt.  He or she must attach the
              receipt to the document that was faxed and place the document
              in the official document file.

 2.  WHEN INDUSTRY OFFICIALS OR INDUSTRY SUBMITTERS
 REQUEST  THAT TSCA CBI BE FAXED TO THEM.  Employees of EPA
 and of EPA contractors who are cleared for  TSCA CBI can transmit TSCA
 CBI documents to industry officials or submitters.  Prior to transmission, the
 employee must verify that the recipient is authorized to receive a company's
 TSCA CBI. This can be done by checking the premanufacture notice (PMN)
 technical contact block or other written documentation.

          The employee must notify the recipient prior to transmission that the
 confidentiality of the fax transmission cannot be guaranteed, that EPA's trans-
 mission lines are not secure, and that the message will not be scrambled by
 encryption equipment.

          The employee  sending the fax must  completely control the fax
 machine and ensure that the transmission is not viewed by anyone not cleared
 for TSCA CBI.  The sender must  confirm that the fax transmission was
 completed successfully by obtaining the fax transmission confirmation receipt
 and  attaching  it to EPA Form 7740-12,   "Memorandum of TSCA CBI
 Telephone Conversation" (Appendix 19). The employee must send all of these
 documents to the facility DCO for the official document file.

 3.   WHEN AN INDUSTRY OFFICIAL  OR  INDUSTRY  SUBMITTER
 ASKS TO FAX TSCA CBI TO EPA. When someone external to EPA wants
 to send TSCA CBI via fax transmission, he or she must be notified that EPA
 can not guarantee the confidentiality of the transmission.  At or prior to
 transmission, the employee who will receive  the transmission must notify the
 sender that  EPA's transmission lines are not  secure and that no encryption
                                  48

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 equipment will be used to scramble the message. Immediately upon receiving
 the fax, the employee must provide it to the facility DCO for entry into the
 receipt log.

          H. DISCUSSING TSCA CBI ON THE TELEPHONE

 1.  TELEPHONE CALLS WITH EMPLOYEES AUTHORIZED FOR TSCA
 CBI ACCESS. Federal employees and contractor employees with TSCA CBI
 access authority are allowed to discuss TSCA CBI on the telephone with other
 Federal employees or contractor employees with TSCA CBI access authority.
 Both parties to a telephone call are responsible for verifying that the other is
 authorized for TSCA CBI access.  To do so, the employees should consult the
 TSCA CBI authorized access list.  The individual who initiates a discussion
 that includes TSCA CBI must indicate that the conversation involves TSCA
 CBI.

 2.  TELEPHONE CALLS WITH SUBMITTERS.   Federal and contractor
 employees with TSCA CBI access authority are allowed to discuss TSCA CBI
 on the telephone  with  a  submitter employee when all of  the following
 conditions are met:

          •    The Federal or contractor employee must verify that the
              submitter employee is  authorized by  his or her company to
              discuss TSCA CBI.  This can be done by checking the PMN
              technical contact block or other written documentation.

          •    The Federal or contractor employee must verify the identity of
              the submitter employee to whom he or she is speaking.

          •    The Federal or contractor employee must inform the submitter
              employee that the telephone lines are not secured.

          •    The Federal or contractor employee must verify that all Federal
              and contractor employees on the line are cleared for TSCA CBI
              access and relay that information to the submitter employee.
                                 49

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

          •    The Federal or contractor employee must state to the submitter
              employee that discussion of TSCA CBI  with a TSCA CBI-
              cleared Federal or contractor employee on the telephone does
              not constitute a waiver of any claim of confidentiality.

          •    The Federal or contractor employee must inform the submitter
              employee that any further information provided in the telephone
              conversation can be claimed as confidential.

      TELEPHONE LOGS.  Federal  and contractor employees  must keep a
 telephone log of all phone calls with submitters.  The phone log must be kept
 on EPA Form 7740-12, "Memorandum of TSCA CBI Telephone Conversation
 (Appendix  19).  After every  conversation  with a submitter, Federal and
 contractor employees must provide their telephone logs to the DCO, who will
 log them into the document tracking system.  All headquarters telephone logs
 for individual TSCA CBI materials must be inserted into the CBIC's official
 file for PMN chemicals and existing chemicals.

      I.  ELECTRONIC MAIL CANNOT BE USED  TO TRANSMIT
                              TSCA CBI

          Use of the EPA electronic mail system or any other electronic mail
 system to transmit TSCA CBI information is not  authorized.

       J. USE OF TSCA CBI AT TELE-VIDEO CONFERENCES

          TSCA  CBI  can be  displayed  and discussed  during  tele-video
 conferences conducted between EPA headquarters and EPA regional offices.
 The employee  who  arranges  or  schedules the tele-video conference is
 responsible for ensuring that all TSCA CBI security procedures are followed
 during the conference. These procedures include the  following:

          •    The employee must  verify that everyone who attends the tele-
               video conference is cleared for TSCA CBI.

          •    The  employee must ensure that both  conference rooms  are
               secured to prevent  unauthorized  persons from  entering  the
               conference rooms during the tele-video conference.
                                  50

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         •    The employee must  arrange for  use of compressed video
              encryption during  transmission,  if  it is available.   For
              information about tele-video encryption, contact the Security
              Officer of the  EPA National Data Processing  Division;
              telephone (919) 541-4013.

       K.  PROCEDURES FOR HANDLING DOCUMENTS AND
      OTHER MATERIALS PRODUCED BY EMPLOYEES USING
                      TSCA CBI DOCUMENTS

 1.   NEW TSCA CBI DOCUMENTS. Documents and other materials produ-
 ced by  Federal  and contractor employees using TSCA  CBI documents
 frequently  contain TSCA CBI  themselves.  If a newly created  document
 contains TSCA CBI data, the document's author must stamp it as TSCA CBI,
 cover it with a TSCA CBI cover sheet (EPA Form 7740-9), and take it to the
 facility DCO to be logged into the document tracking system at the employee's
 facility.  Personal working papers  are sometimes exempt from the logging
 requirement (see subsection 3 of this section).  The DCO will assign the new
 TSCA CBI document a document control number, which must be written on
 front of the TSCA CBI cover sheet (EPA Form 7740-9) and on the front of the
 first page of the document.  The DCO will then enter the document into the
 receipt log and log the document out or retain it for storage.

 2.   NEW NON-CONFIDENTIAL DOCUMENTS.  An employee who plans
 to  produce  a  non-confidential  document  by  aggregating TSCA CBI must
 arrange  for the chief of IMD's TSCA Information  Management Branch to
 review the document.  The employee should  contact the chief at least 10
 working days prior to release of the document. It is the responsibility of the
 TSCA Information Management Branch chief to ensure that the application of
 the aggregating techniques maintains the confidentiality of the TSCA CBI data
 sources. (For more information, see section L of this chapter.)

 3.   PERSONAL WORKING PAPERS. The notes, outlines, and initial drafts
 belonging to an employee who is working with TSCA CBI are considered his
 or her personal working papers.   As long as these papers remain in the
 employee's possession, they are  exempt from logging requirements.  When an
                                 51

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 employee transfers his or her personal working papers to another employee,
 however, certain security procedures must be followed.

       a.  TRANSFERRING PERSONAL WORKING PAPERS TO ANOTHER EMPLOYEE.
 Before allowing another employee  within the same facility to review  a
 document that is a personal working paper, the author must take the document
 to his or her facility DCO.  The DCO will assign a document control number
 to the document and log it into the document  tracking system.  Once the
 document has been logged into the system, the author can transfer it by hand
 delivery or through the DCO.  A document that is delivered by hand must be
 given directly to the recipient. Inter-office mail must never be used for such
 transfers.  TSCA CBI materials must not be left unattended in an in-box or
 on the recipient's desk.

 NOTE:  Contractor employees are restricted  to transferring TSCA CBI
 documents through their facility DCOs.

       b.  KEEPING RECORDS ON TRANSFERS. If the transfer was made through
 the facility DCO, the DCO will record the transfer in the document tracking
 system. If the transfer was made by hand delivery, the owner or author of the
 transferred document can choose to obtain a signed loan receipt (Appendix 17)
 indicating that  the transfer was completed.  These loan receipts should be
 retained until the documents are returned. If a document is transferred and no
 loan receipt is  obtained, the owner or author of the  document will be held
 responsible and accountable for the  document.

       c.  TRANSFERRING PERSONAL WORKING  PAPERS  TO  A  TYPIST.  A
 document can be provided to a typist without being logged into the document
 tracking system if the typist is in the author's division or equivalent office and
 is authorized for access to TSCA CBI.  When the typist completes the job, he
 or she must return the typed and the original document to the author.

          If the author sends the document to a typist outside of his or her
 division, the transfer must be logged into the document tracking system by the
 facility DCO.  If the typist sends  the document to  anyone other than the
 author, the transfer must be logged  into the document tracking system by the
 facility DCO.
                                   52

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         •    The author must keep a record of transfers to typists until all
              personal working papers and TSCA CBI materials transferred
              are returned.

         •    All the materials used in typing documents containing TSCA
              CBI, including word processing disks, ribbons,  carbons, and
              waste paper, must be treated as TSCA CBI.   TSCA CBI
              procedures must be used to store these materials and to destroy
              them.

      d. PROCEDURES FOR STORING PERSONAL WORKING PAPERS. Personal
 working papers must be  stamped as TSCA CBI, covered with  a TSCA CBI
 cover sheet (EPA Form 7740-9), and otherwise used, stored, and handled like
 any other TSCA CBI document. The exception to this is that personal
 working papers are exempt from logging requirements as long as they remain
 in the possession of their author.

      e. PROCEDURES FOR DESTROYING PERSONAL WORKING PAPERS.  The
 author of a personal working paper is authorized to destroy such TSCA CBI
 documents that have never been assigned a document control number.  The
 procedures for destroying TSCA CBI are  discussed in section O of this
 chapter.

         L.  CREATING NON-CONFIDENTIAL MATERIALS
                   FROM TSCA CBI DOCUMENTS

 1.  IN  GENERAL.  The responsibility for  determining whether documents
 contain TSCA CBI rests with the document's author. Until the determination
 is made, the author must  treat materials produced from TSCA CBI documents
 as TSCA CBI.

 2.  NON-CONFIDENTIAL DOCUMENTS. Documents that meet any of the
 following conditions may be non-confidential:

         •    TSCA CBI data.are not included in a new document or are
              deleted from an existing document.
                                 53

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

         •    TSCA CBI data are replaced with non-confidential data or
              descriptive terms (masked or aggregated data).

         •    The data or terms used are derived from TSCA CBI data but
              are not themselves confidential.

         •    The submitting company has dropped its claim of confidenti-
              ality for  the information  in  the  document or  EPA has
              determined that the claim is not valid.

       a. WHEN TSCA CBI DATA ARE REPLACED WITH NON-CONFIDENTIAL
 DATA OR DESCRIPTIVE TERMS. An employee who plans to produce a non-
 confidential document by aggregating TSCA CBI must arrange  for the chief
 of IMD's TSCA Information Management Branch to review the document.
 The employee should contact the chief 10 working days prior to release of the
 document.   It  is the responsibility of the TSCA Information  Management
 Branch  chief  to  ensure  that the  aggregating techniques  maintain  the
 confidentiality of the TSCA CBI data sources.

       b. WHEN   A  SUBMITTING   COMPANY   DROPS   ITS  CLAIM  OF
 CONFIDENTIALITY. When a company drops its claim that information submitted
 to EPA is TSCA CBI, documents containing that information can be made
 available to the public.  Before making a document publicly available,  the
 document's author or his or her facility DCO must obtain a written statement
 from the company that the claim has been dropped and the document must be
 declassified (see section M of this chapter).

     M.  PROCESS FOR DECLASSIFYING TSCA CBI MATERIALS

 HOW TO  DECLASSIFY TSCA CBI  MATERIALS.   The process  for
 declassifying TSCA CBI materials consists of five steps:

       1.  The employee determines that materials are no longer confidential.

       2.  The employee brings the materials to his or her DCO and presents
 the DCO with evidence that they contain no TSCA CBI.  If the employee has
 determined from studying a document that it contains no TSCA CBI, he or she
                                 54

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 must provide a written explanation to the DCO.  If the submitting company
 has dropped its TSCA CBI claim, the employee should present the DCO with
 the submitter's written relinquishment of the claim.  Disputes about whether
 a document contains TSCA CBI should be brought  to the chief of  IMD's
 TSCA Information Management Branch for resolution.

      3. After being presented with evidence that a document contains no
 TSCA CBI, the DCO must cross out all TSCA CBI markings on the document
 and remove the document cover sheet.

      4. The DCO must inscribe the document with the statement "Contains
 no TSCA CBI," sign the document, and date it.

      5. The DCO  must log the  document out of  the document tracking
 system.  In the disposition box on the inventory log, the DCO must enter that
 the document contains no TSCA CBI.

          N.  REPRODUCTION OF TSCA CBI MATERIALS

 1.   IN GENERAL. Only a DCO or an employee acting under the supervision
 of a DCO are allowed to photocopy TSCA CBI materials.  Photocopying of
 TSCA CBI materials should  be limited  to the  maximum extent possible.
 TSCA CBI materials can be reproduced only at copying machines located in
 secure storage areas or in non-secure locations that the TSCA security staff has
 approved for TSCA CBI duplication.

 2.   EMPLOYEE'S  ROLE.   Employees are  permitted  to photocopy their
 personal working papers and documents for use at meetings (see section P of
 this chapter).  In all other cases, employees must present the materials they
 want photocopied to the DCO or DCA. The DCO or DCA will photocopy the
 materials for the employee.

 3.   DCO  RESPONSIBILITIES. The DCO is responsible for photocopying
 materials for  employees or appointing the  DCA to do so.   The DCO is
 responsible  for obtaining  the  TSCA security  staffs  approval for any
 non-secure TSCA CBI photocopy locations at the DCO's facilities. The DCO
 is responsible  for destroying excess or unusable copies (see section O of this
 chapter).
                                 55

-------
TSCA CBI Security Manual                                        7700
                                                                 1/93

      a.  CONTROL OF COPIES. The DCO is responsible for the control of all
 copies of a TSCA CBI document.  The cover sheet on the original must  not
 be copied for use with the copy.  The copies must be stamped by the DCO as
 TSCA CBI and covered with a TSCA CBI cover sheet (EPA Form 7740-9).

          The DCO must log the copies into the document tracking system  and
 assign document control numbers or copy numbers to the copies.  The copies
 should be marked with the same document control number as the original  and
 with a copy number,  e.g., 1 of 3, 2 of 3, 3 of 3, etc.  The exception to  this
 are personal working  papers that are being photocopied for use in a meeting.
 (Personal working papers are discussed in section K of this chapter.)

      b.  DISTRIBUTING COPIES TO OTHER EMPLOYEES.  Two options exist for
 distributing copies of TSCA  CBI documents to  other employees.  The first
 option  is  that  the DCO  will log  each  copy out to the individual who is
 receiving it. The second option is that the DCO  will log all of the copies out
 to the originator; the  originator then loans the copies to other employees  and
 obtains signed loan receipts (Appendix 17) indicating that the transfers were
 completed.  These loan receipts should  be retained until the documents  are
 returned.  If a document is transferred  and no loan receipt is obtained,  the
 owner or author of the document will be  held responsible and accountable for
 the document.

      c.  AUTHORIZING  USE  OF  OTHER PHOTOCOPYING  MACHINES  WHEN
 MACHINES IN SECURE LOCATIONS BREAK  DOWN.   The DCO can authorize the
 photocopying of TSCA CBI materials at  machines outside of secure locations
 if all machines in locations approved for  duplicating TSCA CBI materials are
 inoperable.  During the photocopying of TSCA CBI materials, the non-secured
 machine must be dedicated to the task, and the  DCO or DCA must directly
 supervise  the machine.   Only employees with  TSCA CBI access may be
 present while TSCA  CBI materials are being photocopied.  After copying is
 finished, the operator must pass three blank copies through the machine to
 ensure that any impressions on the image surfaces of the machine have been
 erased.

           If a machine in a non-secure location malfunctions while TSCA  CBI
 materials are being copied, the facility DCO must ensure that the  machine is
 directly supervised by an  employee with  TSCA CBI access until it is repaired
                                  56

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 or that an employee with TSCA CBI access inspects the machine's paper path
 and image surfaces to retrieve any materials containing TSCA CBI that are
 caught in the machine.

    O. PROCEDURES FOR DESTROYING TSCA CBI MATERIALS.

 1.  IN GENERAL.  The procedures for destruction of TSCA CBI materials
 apply to all materials containing TSCA CBI, e.g., draft documents, telephone
 records, typewriter ribbons, computer printouts, diskettes, tapes, microfiche,
 and any other TSCA CBI materials logged into a document tracking system.
 The procedures do not apply to personal  working papers that are in the
 possession of their author.

 2.  WHO IS PERMITTED  TO DESTROY TSCA CBI MATERIALS.

      a.  EPA AND FEDERAL EMPLOYEES.  Only the facility DCO or OPPT
 DCO is permitted to destroy TSCA CBI materials. Federal employees wishing
 to have TSCA CBI materials destroyed must take them to their facility's DCO.

      b.  CONTRACTOR EMPLOYEES.  Contractor DCOs are allowed to destroy
 TSCA CBI materials after obtaining written permission from their EPA project
 officer.

 3.  DESTRUCTION  METHODS.  TSCA CBI materials such as papers,
 documents, or printouts must be shredded.  All other materials,  including
 microfiche,  typewriter ribbons, and  magnetic  media  must be  burned,
 degaussed, or chemically destroyed.  If EPA regional  and field office DCOs
 are unable to meet these requirements for destruction of microfiche, magnetic
 media, and  typewriter ribbons, they  must send their materials  to EPA
 headquarters for  destruction.  The procedures for delivery  of TSCA CBI
 materials by certified mail, by Express Mail or by courier should be followed
 (see section F of this chapter).  The materials should be addressed to OPPT
 DCO; attention TSCA  Security Staff.

 4.  DOCUMENTING DESTRUCTION. The destruction of a TSCA CBI
 document that  has been entered into the document tracking system must be
 documented.  The DCO must enter information about the destruction of the
 document into the receipt log and the inventory log (Appendices 15 and 16).
                                 57

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 (At one time, the DCO was required to keep a destruction log, but that
 requirement has  been dropped.)

         The TSCA CBI cover sheets in use prior to the effective date of this
 manual must be inscribed by the DCO with (1) the destruction date, (2) the
 location at which  the document is destroyed, and (3) the DCO's name.  The
 TSCA CBI cover sheets must then be placed in the appropriate file for storage
 (e.g., at EPA headquarters a cover sheet should be placed in the CBIC file for
 that document). The process does not apply to the new TSCA CBI cover
 sheets that have become effective with publication of this manual.

     P.  USE OR DISCUSSION OF TSCA CBI DURING MEETINGS

 1.  WHAT IS CONSIDERED A MEETING? The procedures discussed here
 apply to scheduled gatherings of five or more people at which TSCA CBI is
 discussed.  The procedures  do not apply to informal discussions between a
 supervisor and an  employee or between fewer than five employees working on
 a matter concerning TSCA CBI.

 2.  PROCEDURES FOR CIRCULATING DOCUMENT COPIES AT A
 MEETING.

      a.  PERSONAL WORKING PAPERS. The author of a TSCA CBI document
 may circulate photocopies of the document at a meeting without logging the
 document into the document tracking system if all of the following conditions
 are met:

          •   The author attends the meeting and is present when the docu-
              ment is discussed.

          •   The author collects all copies of the document at the end of the
              meeting.

          •   The author submits all copies of the document for  destruction
              after the meeting.
                                 58

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

          •   The author numbers the copies (i.e.,  1 of 6,  2 of 6,  etc.)
              before distributing them and checks to make sure that all copies
              are returned at the end of the meeting.

      b.  DOCUMENTS THAT HAVE BEEN LOGGED OUT TO AN EMPLOYEE.  An
 employee  who has possession of  a TSCA CBI document is permitted to
 photocopy the document and circulate the photocopies at a meeting (see section
 N of this chapter) if all of the  following conditions are met:

          •   The employee attends the meeting and is present when the
              document is discussed.

          •   The employee collects all copies of the  document at the end of
              the meeting.

          •   The  employee   submits  all  copies  of  the  document  for
              destruction after the meeting.

          •   The employee numbers the copies (i.e., 1 of 6, 2 of 6,  etc.)
              before distributing them and checks to make sure that all copies
              are returned at the end of the meeting.

          •   TSCA CBI  materials can be reproduced  only  at  copying
              machines located in secure  storage areas or in non-secure
              locations that the TSCA  security staff has approved for TSCA
              CBI duplication.

 3.   PROCEDURES FOR DISCUSSING TSCA CBI DURING MEETINGS.

       a.  MEETING CHAIRPERSON'S  DUTIES.   The meeting  chairperson is
 usually  the person who has  scheduled and organized the meeting.   If a
 chairperson has not been identified, one must be selected at the beginning of
 the meeting.  The chairperson is responsible for ensuring that only people
 cleared  for TSCA CBI access are in the room during discussion involving
 TSCA CBI.  If necessary, the chairperson should consult the  TSCA CBI
 authorized access list to verify TSCA CBI clearance.
                                  59

-------
TSCA CBI Security Manual                                       7700
                                                                1/93

          The chairperson must also secure the room at the end of the meeting.
 This includes cleaning  all chalkboards, taking any  unneeded TSCA CBI
 materials to the DCO for destruction (except personal working papers), and
 clearing the room of any information that could lead  to disclosure of TSCA
 CBI.

      b.  RECORDS OF  MEETING MUST BE TREATED  AS TSCA CBI.  The
 chairperson must remind those who attend the meeting that they must treat as
 confidential any notes taken at the meeting.  Notes taken at the meeting are
 considered personal working papers. They do not have to be logged into the
 document tracking  system as  long as  they  remain in  their originator's
 possession.  However, if the originator wants to  transfer possession of the
 notes to someone else,  the notes must be submitted  to the  DCO, who will
 assign them a document control number and log them into a document tracking
 system.

          A meeting attendee must obtain permission from the chairperson to
 tape record a meeting.  Such recordings may contain TSCA CBI and must be
 treated like any other TSCA CBI materials.

            Q. TRAVELING WITH TSCA  CBI MATERIALS

 1.  IN GENERAL.  It is sometimes necessary for a Federal or contractor
 employee authorized for TSCA CBI access to carry TSCA CBI materials while
 traveling. If it is impractical to return to work to pick up the materials before
 departure or to drop them off after return, the employee can obtain permission
 from his or her immediate supervisor to take the materials home.

 2.  MAINTAINING  SECURITY  FOR  TSCA CBI  MATERIALS WHILE
 TRAVELING.   Any  employee who travels with TSCA CBI materials is
 responsible for maintaining proper security for the materials.  The  facility
 DCO must log the materials out to  the employee before the  employee leaves
 the facility.

       a.  STORING TSCA CBI MATERIALS WHILE TRAVELING. While traveling
 by plane or other public conveyance, the employee must keep the TSCA CBI
 materials in  his  or her possession.  TSCA CBI materials cannot be checked
 with luggage.
                                  60

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

          If the employee is traveling by car, he or she should store TSCA
 CBI materials in the locked trunk en route. However, TSCA CBI materials
 must never be left in the car overnight.

          The most secure place to store TSCA CBI materials while traveling
 is with the facility DCO at the location that the employee is visiting.  When
 this is not possible, the employee is permitted to store TSCA CBI materials
 overnight in a hotel safe, if the employee obtains  a receipt from the hotel
 management.  TSCA CBI materials placed in a hotel safe must be in a sealed
 envelope with no indications on the outside that the  envelope contains TSCA
 CBI.  If no receipt is available, the employee must keep the TSCA CBI in his
 or her possession.

       b.  TRANSFERRING  POSSESSION OF  TSCA  CBI  MATERIALS  WHILE
 TRAVELING.  Sometimes, an employee will be assigned to carry TSCA CBI
 materials for transfer to another location.  After logging out the materials, the
 DCO  at the employee's facility must double-wrap the materials for transfer
 (see section F.2.a.  of this chapter).    Immediately upon arrival  at the
 destination, the employee must take the wrapped TSCA CBI materials to the
 facility DCO.   The DCO will  unwrap the materials and log them into the
 document tracking system.

    R.  WORKING WITH TSCA CBI AT A PERSONAL RESIDENCE

          Normally, employees are not permitted to take TSCA CBI materials
 to their homes.  Under special circumstances, such as recuperation from a
 long-term illness, a division director or a supervisor of equivalent authority
 may grant permission  for an EPA employee to use TSCA  CBI materials at
 home.  The supervisor must provide a complete justification supporting the
 action to the IMD director. A plan  for protecting  the TSCA CBI materials
 while at the employee's residence must also be provided to the IMD director.
 All normal security precautions in  this manual must be followed, and the
 TSCA security staff will inspect and approve the residence before any TSCA
 CBI materials are sent there.
                                  61

-------
TSCA CBI Security Manual                                      7700
                                                              1/93

    S. WORKING WITH TSCA CBI MATERIALS ON COMPUTERS

 1.   IN GENERAL.  EPA takes every precaution to safeguard TSCA CBI
 materials that are entered into or manipulated by computers. In addition to
 meeting  the security requirements of this  manual, EPA  follows agency
 information security protection guidelines in protecting TSCA CBI materials.
 Any computer security plan developed for TSCA CBI information must at a
 minimum meet the requirements found in this manual.

 2.   EMPLOYEES  MUST OBTAIN  AUTHORIZATION  TO OBTAIN
 ACCESS  TO TSCA  CBI  DATA  STORED ON  THE  MAINFRAME
 COMPUTER.  Separate authorization  is required for  employees to obtain
 online access to the TSCA CBI mainframe database (see Chapter 2). Online
 access allows employees to read, change, manipulate, or obtain data from the
 mainframe computer  depending on the access rights granted the employee.
 Employees do not need  authorization to use TSCA CBI on their PCs.

      OBTAINING AUTHORIZATION TO ACCESS THE TSCA CBI MAINFRAME
 FROM A REMOTE SITE.   If an EPA employee, a Federal  employee, or a
 contractor  employee outside of EPA headquarters requires access to TSCA
 CBI data stored on the headquarters mainframe,  the employee must submit a
 complete justification to the IMD director. Prior to permitting telecommuni-
 cations access, the TSCA security  staff must inspect the requester's site to
 ensure proper security protocols are in effect.

 3.   SETTING UP A LOCAL-AREA NETWORK (LAN).  A LAN, linking
 the personal computers  of a small workgroup, can be used in the processing
 and storage of TSCA CBI data.  A LAN security plan  that adheres to all
 requirements of this manual must be developed.  The TSCA security staff and
 EPA's Office  of Information Resource Management must approve  the plan
 before any TSCA CBI  data can be placed on a LAN.  Proper software or
 hardware encryption  devices must  be utilized before dial-in access will be
 approved.

 4.    USE  OF WIDE-AREA NETWORKS (WANS) IS NOT PERMITTED.
 The use of WANs is  not authorized to store, process, or transfer TSCA CBI
 data. Contact the TSCA security staff regarding any questions about WANs.
                                 62

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 5.   USING PERSONAL COMPUTERS (PCS)  TO WORK WITH TSCA
 CBI DATA.  TSCA CBI-cleared EPA employees, Federal employees, and
 contractor employees can use TSCA  CBI data on a  PC, subject to the
 restrictions in this manual.

      a.  PROCEDURES FOR USING TSCA CBI DATA ON  A PC OUTSIDE OF A
 SECURE STORAGE AREA. The employee must retain exclusive control over the
 operation of a PC and printer while working on a PC  outside of a secure
 storage area.  The employee must ensure that the PC screen is not viewed by
 anyone who is not authorized for access to TSCA CBI.  If the employee leaves
 the PC for any reason, he or she must terminate  the computer session as
 described in (d) below.

      b.  PROCESSING AND STORING TSCA CBI DATA ON FLOPPY AND HARD
 DISKS.  Floppy and detachable hard disks are preferred for storage of TSCA
 CBI data.  Employees can obtain green floppy disks for TSCA CBI storage
 from IMD's TSCA Information Management Branch.  If green floppy  disks
 are not available,  the employee  can use any diskette to  store TSCA CBI
 information after stamping it as containing TSCA CBI data.

          Hard disks can be used  to process and store TSCA CBI data under
 limited conditions:

          •   TSCA CBI data can be processed on a PC's fixed hard disk
              when the PC is located in a secure storage area.

          •   If an employee is working with TSCA CBI data on a PC with
              a fixed hard disk  in an unsecured area, the employee must
              erase the hard disk at the end of each session and verify the
              erasure.  To erase the hard  disk,  the employee must use an
              approved utility program at the end of each session.  Contact
              the TSCA security  staff for a  list of approved utility programs.

          •   Detachable hard disks can be used to store TSCA CBI data,
              and their use is encouraged.  The hard disks must be removed
              from the  PC after  each session, unless the PC is located in a
              secure storage area.
                                 63

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

      c.  MAINTAINING  SECURITY  FOR FLOPPY AND DETACHABLE  HARD
 DISKETTES CONTAINING TSCA CBI DATA.  The procedures for storing TSCA
 CBI hard-copy materials apply to  storage of floppy  and detachable hard
 diskettes (see section B of this chapter).  When disks are no longer needed or
 are damaged, they should be given to the DCO for destruction (see section O
 of this chapter).

      d.  TERMINATING A TSCA CBI PC SESSION FOR PCs LOCATED OUTSIDE
 SECURE STORAGE AREAS. Proper termination of a PC session involving TSCA
 CBI data consists of the following steps:

      1)  The employee should transfer the TSCA CBI data to the floppy or
          detachable hard disk.

      2)  The employee should verify that the transfer was completed.

      3)  The employee should ensure that a backup file does not exist for the
          TSCA CBI that was processed during the session.

      4)  The employee should remove the floppy or detachable hard disk
          from the PC.

      5)  The employee should erase the  data from the  hard disk using an
          approved program.

      6)  The employee should verify that the erasure has taken place.

      7)  The employee should turn off the PC.

      e.  SECURITY PROCEDURES FOR PC PRINTOUTS OF TSCA CBI DATA.
 The security procedures for storing TSCA CBI hard-copy materials apply to
 storage of TSCA CBI data that is printed on a PC printer and to storage of the
 printer's ribbon (see section B of this chapter). An employee using a printer
 with internal memory, such as a laser printer, must turn off the printer
 after each TSCA CBI printing session and verify that no TSCA CBI data
 remain in the printer's memory cache or buffer.
                                  64

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 6.  USING THE TSCA CBI MAINFRAME COMPUTER.  EPA stores and
 processes TSCA CBI on  a dedicated mainframe computer,  which is not
 networked with any other computers.  TSCA CBI data cannot be stored on any
 other  mainframe computer without  approval from the IMD director and
 certification by the TSCA security staff.  For information about the necessary
 security for such systems, contact the TSCA security staff.

       a.  PROCEDURES FOR EMPLOYEES TO OBTAIN PRINTOUTS OF TSCA CBI
 DATA FROM THE MAINFRAME COMPUTER.  All Federal employees who are
 authorized for access to TSCA CBI are permitted to use printouts from the
 TSCA CBI mainframe computer and  to view a computer screen that contains
 TSCA CBI.   Employees who want to obtain a printout should  submit a
 computer search request form to the OPPT DCO  (unless they are networked
 via encryption), no matter what facility they work in.

       b.  SECURITY PROCEDURES  FOR PRINTOUTS  FROM  THE TSCA CBI
 MAINFRAME COMPUTER.  Not all data on the TSCA CBI mainframe computer
 are confidential.  However, all printouts from the mainframe computer must
 be assumed to be TSCA CBI until the employee who  has obtained the printout
 determines whether it contains TSCA  CBI. The employee is required to make
 this determination in consultation with the OPPT or facility DCO. The same
 procedure applies to information displayed on a computer screen and copied
 by an employee.  The security procedures are summarized here.

          •    The DCO must log the printout into the document tracking sys-
              tem, stamp  it as TSCA  CBI,  assign  a document  control
              number, cover the document with  a TSCA CBI cover sheet,
              and treat it like any other TSCA CBI document.

          •    If a printout contains no TSCA CBI, the employee must certify
              that fact by signing  and dating the front page of the printout.

          •    If the employee initially determines  that a printout contains
              TSCA CBI and later reverses  that decision, he or she must sign
              and date the front page of the printout, initial the TSCA CBI
              cover sheet, remove the TSCA CBI cover sheet, and notify the
              DCO of the new decision so the document tracking system can
              be updated.
                                 65

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 7.  MINI COMPUTERS.  Mini computers can be used to process TSCA CBI
 data if they are approved by the TSCA security staff.  To obtain approval, the
 facility DCO must prepare a security plan describing (a) how TSCA CBI data
 would be protected during processing and (b) how access to the mini computer
 would be restricted. The plan should be submitted to the TSCA security staff.

      SECURITY CONTROLS FOR TSCA CBI DATA ON MINI COMPUTERS. At
 a minimum, the mini computer must be located inside a TSCA CBI  secure
 storage area.  Additional hardware and software controls should supplement
 the physical security controls.  No dial-in access to this type of computer will
 be approved unless proper software or hardware encryption devices  are in
 place. The security plan must adhere to all requirements of this manual. For
 further details, contact the TSCA security staff.

 8.  SECURITY FOR TSCA CBI DATA STORED  ON CONTRACTOR'S
 COMPUTERS.   EPA contractors cannot place TSCA CBI on a mainframe
 computer system,  mini computer system, or shared-logic computer system
 without  authorization from EPA.   A contractor's computer system and site
 must be inspected and approved by the TSCA security staff before the data can
 be transferred.

      Authorized EPA contractors who  use  TSCA CBI  must follow  all
 computer security requirements established for EPA.  Contractors are allowed
 to use standalone PCs for processing TSCA CBI by adhering to the procedures
 contained in this manual.

        T. DEVELOPMENT OF PHOTOGRAPHIC MATERIALS

 1.  PHOTOGRAPHS CAN BE  CLAIMED AS TSCA CBI.   When a
 company claims that photographs taken during EPA inspections and plant visits
 are TSCA CBI,  the film must be shipped to the OPPT DCO for processing
 and development.  Processing or development by a private or commercial
 laboratory is prohibited.

          The film should be labeled as  TSCA CBI, double-wrapped, and
 prepared for shipment following the same procedures used for shipment of any
 other TSCA CBI media (see  section F of this chapter).  It should be  sent to
 OPPT DCO,  Information Management Division, (TS-790) EPA, 401 M  St.
                                 66

-------
TSCA CBI Security Manual                                       7700
                                                               1/93

 S.W., Washington,  D.C.   20460.   The  OPPT DCO will  arrange for
 development and return photographs and negatives to employees within 30
 days.  If faster turnaround is required, the OPPT DCO should be contacted to
 arrange special handling.

 2.   VIDEO TAPES  CAN BE CLAIMED AS TSCA CBI.  If an EPA
 employee utilizes video equipment during an inspection or plant visit, and the
 company wishes to claim the tape as TSCA CBI, the tape should be handled
 and controlled as any other TSCA CBI material.
                                 67

-------
TSCA CBI Security Manual                                     7700
                                                           1/93

                         CHAPTER 5
         REPORTING AND INVESTIGATION OF
         VIOLATIONS OF PROCEDURES, LOST
          DOCUMENTS AND UNAUTHORIZED
                       DISCLOSURES

         All employees who are authorized for TSCA CBI access are required
 to  follow  this  manual's  procedures, which  secure TSCA  CBI  from
 unauthorized public disclosure. They are responsible for reporting (1) possible
 violations of security procedures, (2) the loss or misplacing of TSCA CBI
 materials, and (3) any unauthorized disclosure of TSCA CBI materials.

         The security procedures in this  manual  are  enforceable by
 administrative penalties, set forth in this chapter. The IMD director will
 decide when to apply these penalties.

            A.  EMPLOYEE REPORTING PROCEDURES

 1.   ORAL REPORT MUST BE MADE WITHIN ONE WORKING DAY.
 Any TSCA CBI-cleared employee of EPA  or another Federal agency must
 provide oral notice to his or her division director within one working day if
 he or she thinks it is possible that

      •  TSCA CBI security procedures have been violated.

      •  TSCA CBI materials have been lost or misplaced.

      •  An unauthorized person has obtained access to TSCA CBI  data.

 Contractor employees must provide oral notice to their project officer.

 2.   WRITTEN REPORT MUST BE MADE WITHIN TWO  WORKING
 DAYS.  Within two working days, the employee must follow up the oral
 report with a written report.  EPA or Federal employees  must provide the
 written report to their division director. Contractor employees must  provide
 the written report to their project officer.
                               69

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

          The  written report must describe (1) the possible violation  of
 procedures, (2) the unauthorized disclosure of TSCA CBI, or (3) the materials
 believed lost or misplaced.  It must also include a description of any relevant
 circumstances known by the employee.

          The employee or his or her supervisor may examine files and discuss
 the matter with other individuals to try to determine what occurred.  However,
 only the TSCA security staff is authorized to conduct interviews, review logs,
 and carry out a detailed investigation.

 EMPLOYEE'S  DIVISION  DIRECTOR OR  PROJECT OFFICER'S  DUTIES.   The
 employee's division director or project officer  must review the employee's
 report and provide any additional comments or information that are relevant.
 The  division director or project officer must forward the report to the IMD
 director within two working  days of receiving  it.   If the  division director
 reviews the employee's report and determines that no violation of procedures,
 loss  of  TSCA CBI,  or  unauthorized disclosure has occurred, the division
 director is not required to forward the report to the IMD director.

    B. REVIEW AND INVESTIGATION OF EMPLOYEE'S REPORT

           The IMD director will review the employee's written report and may
 request an investigation by the TSCA security staff.

 1.   WHEN POSSIBLE VIOLATION  OF THIS MANUAL'S SECURITY
 PROCEDURES HAS OCCURRED.  The IMD director must notify the TSCA
 security staff of any alleged violation of this manual's procedures.  In such a
 case, the IMD director will (1) direct the TSCA security staff to investigate the
 reported violation, (2) determine what administrative penalties, if any,  are
 appropriate, and (3) recommend sanctions  to the supervisors of the  affected
 employees.  Supervisors are responsible for imposing sanctions.

           The IMD director will also confer  with the  affected employees'
 supervisors to identify procedures for handling, using, or storing TSCA CBI
 materials  that will prevent recurrence of violations.
                                   70

-------
TSCA CBI Security Manual                                        7700
                                                                1/93

 2.   WHEN TSCA CBI MATERIALS CANNOT BE ACCOUNTED FOR.
 The IMD director will immediately review the employee's report of lost or
 misplaced TSCA CBI documents and decide whether evidence indicates that
 the TSCA security staff should begin an investigation.

 NOTIFICATION TO THE SUBMITTING COMPANY. The IMD director must notify
 the affected company that its TSCA CBI data is missing.  The IMD director
 must provide  a written notice to the company within four working days of
 receiving the employee's report.  The written notice must identify the lost or
 misplaced document and state the date on which it was discovered to be lost
 or misplaced.

 3.   WHEN UNAUTHORIZED DISCLOSURE OF TSCA CBI MATERIALS
 MAY HAVE  OCCURRED.   The IMD director will immediately review the
 employee's  report that TSCA CBI may have been disclosed to someone who
 is not authorized for access to it.  He or she will determine whether evidence
 indicates that the TSCA security staff should begin an investigation.

       a. NOTIFICATION TO THE SUBMITTING COMPANY. If the TSCA security
 staffs investigation determines that unauthorized disclosure  did occur, the
 IMD director must notify the affected company. The IMD director must
 provide a written notice to the company within four working days of receiving
 the employee's report.  The  written notice must contain a description of the
 TSCA CBI  that was disclosed and the date of the disclosure.
                                     •

       b. EPA OFFICE OF INSPECTOR GENERAL.   If the TSCA security staffs
 investigation reveals any evidence of  a  knowing and willful unauthorized
 disclosure of TSCA CBI, the matter must be immediately transferred to the
 EPA Office of Inspector General.

            C.  PENALTY  GUIDELINES FOR VIOLATION
                 OF THIS  MANUAL'S PROCEDURES

         The IMD director is responsible for enforcing the procedures in this
 manual.  It  is up to him or  her to assess the possible breach of TSCA CBI
 security  or procedures and determine an appropriate action, which can include
 administrative penalties or criminal charges.  Responsibility for implementing
 the IMD's recommended action rests with the division director of an EPA or
                                 71

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 Federal employee or, for contractor employees, with the division director who
 requested TSCA CBI access for the contractor.

          The purpose of the penalties described in this chapter is to prevent
 or discourage the recurrence of violations. Penalties imposed or actions taken
 must be fair, consistent, and well-reasoned. The security procedures in this
 manual are enforceable by administrative penalties.

 1.   DETERMINING THAT A VIOLATION HAS OCCURRED.  The IMD
 director reviews the employee's written report and the TSCA security staffs
 report  on its investigation to determine whether an employee has violated this
 manual's procedures.

 2.   DETERMINING  AN  APPROPRIATE REMEDY.   If a  violation has
 occurred, the IMD director must recommend to the individual's  supervisor  an
 appropriate  remedy.  Remedies can include  one or a  combination of the
 following:    (1) administrative penalties,  (2) criminal penalties,  and  (3)
 corrective actions.

       To determine an appropriate remedy the IMD Director must weigh

          •    The  seriousness  of  the  violation and  the   potential  for
               unauthorized disclosure of TSCA CBI because of the violation.

          •    The degree of the employee's negligence.

          •    Whether the individual  has previously committed a similar
               violation.

          •    Whether the individual  has previously committed  any other
               violation of this manual's procedures.

          •    The frequency with which the individual uses or handles TSCA
               CBI in the course of fulfilling his or her duties.
                                   72

-------
TSCA CBI Security Manual
                                           7700
                                           1/93
 3.   ADMINISTRATIVE PENALTIES. The IMD director should recommend
 an administrative penalty  if an  individual  was grossly  negligent or if the
 individual had previously incurred a  similar violation, even if the violations
 were not serious. Administrative penalties are listed here.
 Nature of Offense
 1st Offense
 2nd Offense
3rd Offense
CBI is not compro-
mised and breach
is unintentional

counseling
by supervisor
to oral
reprimand
oral reprimand
to written
suspension

1-day
suspension
to removal

 CBI is compromised
 but breach is
 unintentional

 Deliberate
 procedural
 violation *
oral or written    1-day to
reprimand to     5-day
5-day suspension  suspension
                 7-day
                 suspension
                 to removal
30-day
suspension
to removal
removal
 *    This category covers only deliberate procedural violations that
 do not result in the unauthorized disclosure of TSCA CBI.  If
 IMD's investigation reveals any evidence of the knowing and
 willful unauthorized disclosure of TSCA CBI, the matter will be
 immediately referred to the EPA Office of Inspector General.

 4.   CRIMINAL  PENALTIES.   The IMD  director should recommend a
 criminal penalty if an individual willfully disclosed TSCA CBI to any person
 not authorized to receive it. The individual who disclosed TSCA CBI may be
 liable under Section 14(d) of TSCA (15  U.S.C. 2613(d)) for a fine of up to
 $5,000 and/or imprisonment for up to one year.  In addition, disclosure  of
 TSCA CBI or violation  of the procedures cited  above may subject  an
 individual to disciplinary action with penalties  ranging up to and including
 dismissal.
                                   73

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 5.   CORRECTIVE  ACTIONS.   The  IMD director should  recommend
 corrective actions when (1)  an administrative penalty would be too severe a
 remedy and (2) the corrective action is likely to prevent or discourage future
 violations either by the individual or by other individuals.  Corrective actions
 recommended by the IMD Director should fit the individual characteristics of
 each violation.

          The purpose of taking a corrective action is to prevent or discourage
 future  violations.   Corrective actions  may be procedural, instructional, or
 disciplinary in nature.   Such actions include training,  revision  of  work
 procedures, removal of the individual's name from the TSCA CBI authorized
 access list, and other options.

 6.   IMD DIRECTOR CAN ALSO RECOMMEND THAT NO ACTION BE
 TAKEN.  The IMD director has the option of recommending that no action be
 taken if fault cannot be ascribed to any individual or a modification of TSCA
 CBI handling procedures would yield no greater level of protection to TSCA
 CBI.
                                   74

-------
TSCA CBI Security Manual                                          7700
                                                                   1/93

                                INDEX
 administrative penalties  7,68,69,70-73

 aggregation of TSCA CBI 35,53-54

 annual briefing 6,7,15,16,25

 audit of documents  1,5,7,8,14-18,25-26,30,36,38,43

 Authorized Access List  5,6,7,14,15,17,34,42,44,47,49,59,73

 automated document tracking systems  5,7,15,18,29-31

 backup for automated document tracking systems 30-31

 bar codes 30

 broken reproduction machines  56

 CBIC  vi,vii,l,5,30,33,40,43,50,58

 CBITS 5,7,16,18,30,36

 certified  mail  45-47

 challenging TSCA CBI claims  27-28,54-55

 computer access authority 3-6,8,14,15,17,57,62-66

 Congressional access 3,23-24

 Congressional Access Log 23, Appendix 20

 Contractors and Contractor employees i,vi,vii,l,9-

 18,23,25,28,29,33,34,39,44-45,48,52,57,60,62,66,69,71


                                   75

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 copies  55-57,58-59

 copy numbers 56,59

 corrective actions 71,72,73

 couriers  vii,32,45-47,57

 creating new TSCA CBI documents  26,35,51-54

 creating TSCA non-CBI documents  35,53-54

 criminal penalties  1,19,22,71-72

 DAPSS 7,16,18,30,36

 DCO relinquishes responsibilities  37-38

 declassifying TSCA CBI materials 54-55

 destruction of TSCA CBI materials  vi,31,35,57-59,64

 Destruction Log  58

 Director, Office  of Pollution Prevention and Toxics vi

 Division Director 9,13,20,26,35,41,61,68,69,71

 Document Control Assistants  vii,47,55

 Document Control Officers (DCOs)  iv,vi,vii,3-8,11-18,20,22,23,25-52,54-

 61,64-67

 document control numbers  29-32,36,51,56,60,65
                                   76

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 document tracking system  iv,vi,27,29-31,36,37,42-44,50-52,55-

 58,60,61,65

 double-wrapping TSCA CBI materials  46

 electronic entry cards  8,18,42

 electronic mail transmissions  50

 facsimiles containing TSCA CBI, sending and

   receiving 45,47-49

 final confidentiality determination  26,27-28,35,55

 floppy disks  63-64

 forms

      TSCA CBI Access Request,  Agreement and Approval,
       7740-6:  3,6,12,16,  Appendix 1
      TSCA CBI ADP User Registration, 7740-25:  4,13, Appendix 2
      Standard Form 86:  Questionnaire for Sensitive Positions:  4,12,13,
      Appendix 3
      Fingerprint chart, FD-258:  12, Appendix 4
      Request for Approval of  Contractor Access to TSCA CBI,
       7740-17:  9, Appendix  6
      Contractor Information Sheet:  11, Appendix 7
      Confidentiality Agreement for US Employees Upon
        Relinquishing TSCA CBI  Access Authority,
        7740-16:  7,8,  Appendix 9
      Confidentiality Agreement for Contractor Employees Upon
        Relinquishing TSCA CBI  Access Authority,
        7740-18:  16, Appendix 10
      Employee Separation or Transfer Checklist,
       3110-1:  9, Appendix 11
                                   77

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

      Receipt Log for TSCA CBI, 7710-10: 31,32,36,37,51,57, Appendix
      15
      Inventory Log for TSCA CBI, 7710-11:  5,7,15,16,18,26,31,35-37,55,
      57, Appendix 16
      Federal Agency, Congress, and Federal Court Sign-out
       Log, 7710-13:  23, Appendix 20

 guiding principle 1-2

 hand delivery  44,46,52

 hard disks  63-64

 hardcopy TSCA CBI  26,37,64,65

 hotel safe, storage of TSCA CBI in  61

 IMD Director vi,9-ll,13,16,19-23,25,29,41,61,62,65,68-73

 individual access files  4,5,13,15

 initial security briefing 4,5,13-14

 inventory  5,7,14,15,18,25,26,30,35-37,55,57

 Inventory Log  5,7,15,16,18,26,31,35-37,55,57

 language,  required contract 10, Appendix 8

 loan receipts  ii,44,52-56

 local area networks  62

 lock combinations  33-34,42

 lost  documents  5,8,15-17,35,37-38,68-70

 luggage, storage of TSCA CBI in 60-61
                                   78

-------
TSCA CBI Security Manual                                          7700
                                                                   1/93

 mailing TSCA CBI  vii, 10,11,20-23,27,32,44-46,50,52,57

 mainframe computers  62,65

 maintaining access authorization vii,5-6,14-15,25-26,36

 managers' responsibilities 28-29

 manual tracking systems 31

 manual updates 2, Appendix 21

 meetings  58-60

 meeting chairperson 59-60

 mini computers 66

 Minimum Background Investigation  13,16

 monthly access listing  4,34

 new documents 26,35,51-54

 notice to affected businesses 10-11,19,21,22,70

 OPPTDCO iv,vi,vii,3-8,ll-18,20,22,23,29-31,33,34,38,44,45,57,65-67

 other agencies, authorizing for TSCA CBI  vii,l,2,3,18-24

 overdue documents  26,35,37

 PCs 4,63-64

 personal working papers 51-53,56,57,58-59
                                   79

-------
TSCA CBI Security Manual                                          7700
                                                                    1/93

 photographic materials 66-67

 printouts  57,64-65

 project officer  vii,viii,3,9-13,18,25,28,57,68,69

 Receipt Log  30,31,32,36,37,51,56,57

 relinquishing TSCA CBI access authority  7-9,16-18,37-38

 reporting violations 25,68-70

 reproduction of TSCA CBI materials  vi,35,55-57

 requesting officials  vii,3,4,6,7,13-16,20,22,46

 residences, use of TSCA CBI in  61

 return of TSCA CBI to a DCO 7-8,16-18,43

 return receipts  43,46-47

 ribbons and microfiche 53,57

 sanitizing documents  35,53-54

 secure storage areas  8,17,33,39-43,63,64

 security briefing  4-7,13-16,25-26,35

 storage containers 39,40,41

 storage of TSCA CBI materials  1,2,6,8,10,15,17,23,29,33-35,39-

 44,48,51,55,58,60-64,66

 subcontractors  10,11
                                    80

-------
TSCA CBI Security Manual                                         7700
                                                                  1/93

 submitter drops claim  54

 telephone discussion of TSCA CBI  ii,49-50

 telephone logs 50, Appendix 19

 tele-video  conferences  50-51

 termination of access 6-9,16-18,37-3 8

 terminology vi-viii

 transfer of TSCA CBI between employees  43,44,52-53,58-59,61

 traveling with TSCA CBI materials 60-61

 TSCA CBI Stamp  1,32,36,39,51,53,65

 TSCA CBI Cover Sheets  1,32,36,39,51,53,55,58,65

 TSCA Security Staff vi,10-23,41,55,57,61-63,65,66,69,70

 typing TSCA CBI materials 52-53

 unaccounted for TSCA CBI materials  5,8,15-17,35,37-38,68-70

 unauthorized disclosure of TSCA CBI materials  19,22,39,68-72

 videotapes  67

 violations of this manual's procedures vii,25,68-73

 Visitors Log  i,42

 waiver for immediate access 4-5,14

 wide area networks 62-63
                                  81

-------
TSCA CBI Security Manual                      Appendix 1
 Please read Privacy ActStatementandlnstmctignson^                          	Fonr^approved. OMB No. 2070-0075. Approval expires 01-31-95
                                   United States Environmental Protection Agency
                                              Washington, DC 20460
  —^ ^•^•••^^•k ^K                                 »» oai in iy IVM if u\* «.wuw
 V>EPA   TSCA  CBI  Access  Request, Agreement  and  Approval
                                             Section I.-Access Request
1. Name (Last, First, Ml)
4. Requestor (Agency/Office/Division/Branch)
2. Social Security Number
5. Document Control Officer (DCO)
3. Telephone Number
6. DCO Telephone Number
7. TSCA Sections for which access is
  required. Check all that apply. Use blank
  space to request other sections  not listed.
ALL
            -OR-
                                                    12
                                                          13
                                                                  21
8. Justification for TSCA CBI access.
  Select appropriate code from instructions on
  reverse side. (Check one or all that apply.)
                                                             Other
                                                             List Justification on
                                                             reverse side
                            Section II. - Contract Information - Contractor Employees Only
9. Employer's Name
1 1 . Contract Number
10a. Employer's Address
lOb. City
1 2. EPA Project Officer
10c. ST
10d. Zipcode
1 3. EPA Project Officer Telephone
         Section III. - OPPT Secure Storage Area Access - HQ Federal and HQ Contractor Employees Only
14 Check if EPA ID Badge (RUSCO-TMl. Badge is required.
        Yes (New)       |    |  Need Replacement
              No (List Present EPA ID Badge Number
                 (List Present OPPT Barcode
                                                                                                    OR
Need
Barcode
1E
. List OPPT Restricted areas hy Di
Home Division (24 hour access)
visio
n to which physical access is requirar
Other Divisions (6A.M.- 6P.M. only)


Access to CBIC only


IMD (DCO and IMD Computer Rms.
16. List OPPT areas by Division and Room Number for which Alarm Activation/Deactivation Authority is requested.
                                     Section IV. - Confidentiality Agreement
I understand that I will have access to certain Confidential Business  Information submitted under the Toxic Substances Control  Act (TSCA, 15 USC
2601 et seq.).  This access has been granted in accordance with my official duties relating to the Environmental Protection  Agency programs.

I understand that TSCA CBI may be used only in connection with my official duties and may not be disclosed except as authorized by TSCA and
Agency regulations.  I have read and understand the procedures set forth in the TSCA Confidential Business Information Security Manual. I agree that I
will treat  any TSCA CBI furnished to me as confidential  and that I will follow these procedures.

I understand that under section 14(d) of TSCAM5 USC  2513(d)), I am liable for a possible fine of up to $5,000 and/or imprisonment  for up to one year
if I willfully disclose TSCA CBI to any person not authorized to receive it. In addition, I understand that I may be subject to  disciplinary  action for
violation of this agreement with penalties ranging up to and including dismissal.

I certify that the statements I have made on this form and all attachments  thereto  are true, accurate, and  complete. I acknowledge that any knowlingty
false or misleading statement may be punishable by fine or imprisonment or both under applicable law.
17.
Signature
of En
nployee
18. Date
                                 Section  V.- Requesting  Official  Approval
1 9. TSCA CBI Security Briefing Date
20. Name and Signature of Requesting Official. (Immediate Supervisor - EPA Project Officer for Contractors)
As the immediate supervisor of (or the EPA Project Officer for) the above mentioned employee, I certify he/she has
successfully completed a TSCA CBI Security Briefing on the date shown.
Name Signature
21. Date
                                   Section VI.- OPPT  Security  Approval
22. Date Received
DCO Cade
24. Approved (TSCA Security Official Signature)
Barcode
Status Code
Alarm Zones
25 Approval Date
Data Entry Date and Initials
1. 2.
EPA Form 7740-6 (Rev. 9-92).  Replaces previous version of 7740-6 and 7740-6A.

-------
TSCA CBI Security Manual
7700
1/93
Paperwork Reduction Act Notice
The public reporting burden for this collection of information is estimated to average .84 hours per response. This estimate includes time for reviewing instuctions,
gathering and maintaining the needed data, and completing and reviewing the collection of information. Send comments regarding the burden estimate or any other aspect
of this collection of information to the Chief, Information Policy Branch (PM-223), US Environmental Protection Agency, 401 M Street, SW, Washington! DC 20460, and
to the Office of Information and Regulatory Affairs, Office of Management and Budget, Washington, DC 20503, marked ATTENTION: Desk Officer for EPA.
Privacy Act Statement
Collection of the information on this form is authorized by section 14 of the Toxic Substances Control Act (TSCA) 15 USC 2613. EPA uses this information
to maintain a record of those persons cleared for access to TSCA Confidential Business Information (CBI) and to maintain the security of TSCA CBI.
Disclosure of this information may be made to Office of Pollution Prevention (OPPT) contractors in order to carry out functions for EPA compatible with purpose
for which this information is collected; to other Federal agencies when they possess TSCA CBI and need to verify clearance to EPA and EPA contractor employees for access;
to the Department of Justice when related to litigation or anticipated litigation involving the records or the subject matter of the records; to the appropriate Federal, State or
local agency charged with enforcing a statue or regulation, violation of which is indicated by a record in this system; where necessary, to a State, Federal,/* local agency
maintaining information pertinent to hiring, retention, or clearance of an employee, letting of a contract, or issuance of a grant or other magistrate or administrative tnbunal;
to opposing counsel in the course of settlement negotiations; and to a member of Congress acting on behalf of an indivdual to whom records in this system pertain.
Furnishing the information on this form, including your Social Security Number, is voluntary, but failure to do so will prevent you from being given access to
TSCA CBI and will therefore make impossible the performance of any task which requires access to TSCA CBI.
Instructions for Form Completion
Section I - To be completed by all
1. List Full Name
2. List Social Security Number
3. List Telephone number of person in item 1
4. List Full Acronym of Requesting Office (ie. EPA Office in
which the indivdual works or for contractor employees, the EPA
Office with whom the contract is with)
5. List the immediate Document Control Officer for the office in
which the individual works
6. List the telephone number of the Document Control Officer
7. Check the TSCA Sections for which access is requested or
check ALL if applicable
8. Cirlce the appropriate Access Justification Code
A. Employee is an EPA employee or EPA contractor employee
whose work assignments involve the New and/or Existing
Chemical Programs of TSCA. Hence access to the TSCA sections
listed in item 7 of this form is required in performance of his/her
duties.
B. Employee is an EPA employee or EPA contractor employee
whose work entails the administration of computer systems
housing TSCA CBI. Hence access to the TSCA sections listed in
item 7 of this form is required.
C. Employee is an EPA employee or EPA contractor employee
whose work entails physical security or maintenance for TSCA
CBI secure storage areas. Although employee will not actually
work with any TSCA CBI materials, access to the TSCA sections
listed in item 7 of this form is required.
D. List Justification here






Section II - To be completed by Contractor Employees only
9. List Employer's name
lOa-d. List Employer's address
11. List Contract number
12. List EPA Project Officer's name
13. List EPA Project Officer's telephone number
Section HI - To be completed by HQ Federal and HQ
Contractor employees only
NOTE: These procedures apply only to employees requiring
access to OPPT Secure Storage areas. All others follow
standard Agency procedures.
14. Check either box a, b, c or (c&d) for EPA ID badge or
Contractor Building Pass. If box c is checked, write in badge
number.
a. Yes - Check if new employee getting first EPA ID Badge.
(New programmed badge and barcode)
b. Need Replacement - Check if replacement ID Badge is
needed (replacement badge and barcode)
c. No - Existing badge needs programming. List ID Badge no.
d. Need Barcode - Check if existing badge does not have an
OPPT barcode on it. (OPPT barcodes are for logging documents
out of the OPPT Confidential Business Information Center only)
15. Check and list OPPT secured areas for which access (via
"RUSCO" electronic door control system) is required. List
Division acronyms for the requested areas.
Home Division - List Division in which employee works
Other Divisions - List other OPPT Divisions for which
unrestricted daytime access is requested
CBIC Only - To be checked for those who only need to access
the Confidential Business Information Center.
IMD Areas - Employees who need to regularily access the IMD
Document Control Office Suite should circle DCO in the fourth
block. Only IMD staff and contractors who work in IMD
computer rooms should circle IMD Computer Rooms.
16. List OPPT areas by Division and Room numbers for which
Alarm Activation/Deactivation authority is requested. Generally,
this is employees home Division only.
Section IV - To be completed by all
17. Employee Signature (must be original)
18. Signature Date
Section V - To be completed by all
19. Enter date employee attended TSCA CBI Security Brieifing
20. Immediate Supervisor/EPA Project Officers name and sign.
21. Date of signature
Section VI - To be completed by OPPT Security


-------
TSCA CBI Security Manual                          Appendix 2
PLEASE READ THE INSTRUCTIONS ON THE REVERSE SIDE BEFORE COMPLETING THIS
                          (Please Print or Type - Do not mark in shaded areas)
                                                                                                              7701
                                                                                                              1/93
                                           Untrtd StUM Emnronrmntal Prelwlion A«*ncy
                                                 Wohinguxi. D.C. 20460
                                CBI  ADP  USER  REGISTRATION
                                 Section I - Action - Cheek aB appropriate boxes
   ) Assign new userid and password
   ] Add User to Systems
   ) Update User Information
   ] Delete User from Specific Accounts
   j Delete Users from All Systems
                                      (Complete all items in Section II, except 2 and 15. Complete Section IV.)
                                      (Complete all items in Section II. except 15.  Complete Sections III and IV.)
                                      (Complete all applicable information in Section II, including Hem 2. Complete Section IV.)
                                      (Complete items 1, 2, and 3 in Section II only. Complete Sections III and IV.)
                                      (Complete items 1. 2, and 15 in Section II. Complete Section IV.)
                    Section It •Users Assigned to System  {see Instructions on reverse side}
 1.  User Name (Last First, Ml)
                                                                  2. Userid
                     3. Company or Employer
 4.  Office/Division/Branch/Section (For EPA employees only)
                                                                  5. Address (Street or P.O. Box)
 6.  Telephone Number (include area code)
                                                                  7. City
 8.  EPA Region
                           0. EPA Mail Code
10. State
11. Zip Code
 12. User Status - Check one:  [ ] EPA    [ ] EPA Contractor
                                                         Federal Non-EPA
 13. TSCA CBI Security Briefing Date
                                             Circle TSCA clearance: Sections [ALL]-or-(3] [4] [5] [6] [8] [13] [20] [21]
 14. Check the type of      [ ] Database Administrator        [ ] Data Entry Staff  [ ] Technical Consultant  [ ] Developer
   work to be performed:    [ j RTF Operations/Systems Staff   ( ] Retrieval Staff    [ ] Query (Read Data)
 15. Enter the access termination date of the user identified above:   (Month:
                                                                          Date:
                       Year: 19
              Section III - TSCA Systems (see Instructions on back-Do not mark In shaded areas)
                                                                                                             ft.
 16. Mainframe Hardware Code:
 16a. Mainframe System to Access (list one):
                                                                  Group:
                                                                  Natural (Date: ..JLJLJ bjr
 17. Mainframe HarcKvare Code:
 17a. Mainframe System to Access (list one):
                                                                  Accotttttr  -' , -   "   TSO {Y|   |NJ

                                                                  Natural (D^'iJLJLJ »V
 18. LAN Hardware Code:
                                                                  10. LAN Hardware Code:
                          Section IV • Signature Authority (Required before Processing)
 20. Requesting Official Name
 (Type or Print):,	
 21. Signature of Requesting Official (Required)
                                                                  22. Request Date:
                                                                 23. Phone Number:
 24. Document Control Officer Name (Type or Print):.
                                                                  26. Date Signed:
                                                                 27. Phone Number:
 25 Signature of Document Control Officer (Required)
 RETURN ALLftEQUESTStO; UJS. ENVlflONMENTAl. PROTECTION AQENCY, OFFICE Of pOU.UnON WEVENTjOfJ AND TOXICS,
                     I MAIMFRAME/tAN COORDINATOR, (TS-TSSJ, «01 M «TRECT» S.W., WASWNOfON, 0,CX 8Me»
                        Section y-Signature (For Matnframe and LAN Coordinator's Use)
 28. Mainframe or LAN Coordinatof* Sljjnattire:
                                                                  29. Date Receded:
                                                                30.
                                                                31, Date Com^etsd: "",
FA horm //4u-ijt)

-------
TSCA  CBI Security Manual
                                                                        7700
                                                                         1/93
                                                       Section VI - Instructions
               INSTRUCTIONS;    This rejgistratlbn iprm is used to request user access to data or removal of pdvSeges
                                       previoysiygrsBitedio users on Ine Mainframe and Ihe IAN.   Alf forms must to signed in
                                       Sectten }V,: iflo rectiiest v«81» proeessedl *i*rliout ^» poper statures.      	
  Section I:  Action • Check ill appropriate boxes.
  This section gives the user an explanation ol each action.

  [ ]  Assign New Id and Initial Password

  Check this item if the applicant does not have Mainframe or LAN access.
  Complete all Hems in Section II, except  2 and 15.  For Mainframe access,
  the user must also request access to at least one system; therefore 'Add
  User to Accounts* must also be checked.  The desired system(s) which the
  user needs access should be identified  in Section III.

  []  Add User to Accounts

  Check this Hem If the  user already has access to the Mainframe.
  Complete all Hems in  Section II, except  14. The desired system(s) which.
  the user needs access should be identified in Section III.

  [ ]  Update User Information

  Check this item if the  user needs to update employment information.
  Complete all applicable information in Section II, including Kern 2.  Items
  13,14, and 15, in Section II need not be completed.

  [ ]  Delete User from Accounts

  Check this item if the user no longer needs access to specific system(s).
  The user wil not be deleted from the hardware, but will be deleted from
  the systems identified in Section III.  Therefore, complete Section III and
  items 1, 2, and 3 in Section II.

  [ ]  Delete User from al Systems

  Check this item if the user no longer needs access to the Mainframe and
  LAN hardware. This  should be checked when a person terminates
   employment or no longer needs
  access to any TSCA system.

Section N: Users Assigned to
This section refers to the applicant's actual employment duty station, (i.e. If the applicant
is a contractor and works at an EPA facility, the address information is the EPA site.)

Item 1: Enter the name of the users to be added to, or
       deleted from the system.  Use the last name,
       first name, and middle initial format.
Item 2: For mainframe users, enter the three character
       userid assigned to the user identified in Hem 1
       above. If the user needs a userid, leave this Hem
       blank. Userids are not required for LAN users.
Item 3: Enter the user's employer or company name.
Item 4: Enter the office, division, branch, and section of
       the user.  This applies to EPA employees only.
Item 5: Enter the user's maling address.
Item 6: Enter the user's telephone number.
Item 7: Enter the user's actual mailing city.
Item 8: Enter the user's Region.
Item 9: Enter the user's mail code.
Item 10:  Enter the user's 2-digit mailing state
       abbreviation.
Item 11:  Enter the user's 5 or 9-digit mailing zp code
Item 12:  Sett-explanatory
Item 13:  Enter last  briefing date.  Circle all sections of TSCA
           which the user is authorized to access.
Item 14:  Check the block which describes the task the user will perform
Item 15:  Enter the date on which the user will no longer
       need access.
  Section HI:  TSCA  - This section contains a collection of hardware and systems to access.  Each registration form allows users to request access to two Mainframe
  and two LAN .  Each hardware type is identified by a code which should be entered in this section. Use the list below to assist you in selecting the desired TSCA
  hardware and systems to access.

  Items 16 & 17:       Enter the Mainframe hardware code to which access is requested.  Only one code should be entered per Hem.  To obtain access to the IBM 4381
                     Confidential (CBI) Production, enter code A.  To obtain access to the IBM ES9000 Non-Confidential (NCBI) Production and Development , enter
                     codeB

  Items 16a & 17a:    Enter the Mainframe system to which access is requested. Only one system should be entered per Hem.  The systems on the IBM 4381 CBI
                     Mainframe are: CICIS/CCID Facility (CCF). CAIR, CCID, CHEMD, CICIS, CUS, DAPSS, DMIS, PENTA, SATS, TUPS, Level 8(a), and Batch
                     Retrieval (BR)

                     The systems on the ES9000 NCBI Production are: CECATS, CICIS, Batch Retrieval (BR) and MITS.

                     The systems on the ES9000 NCBI Development are:  CICIS/CCID Facility (CCF). CAIR, CCID, CHEMD, CICIS, CUS, DAPSS, DMIS, PENTA,
                     SATS, TUPS, Level 8(a), MITS. CECATS, and Batch Retrieval (BR).

  Items 18 & 19:       Enter the LAN hardware code to which access is requested Only one code should be entered. To obtain access to the CBITS LAN, enter code C
                     To obtain access to the Administrative LAN, enter code D.  To obtain access to the Image Processing LAN, enter code E  To obtain access to the
                     New Chemical LAN, enter code F.

  For NCC  and Operations Staff: To obtain mainframe access, select the appropriate hardware code and enter the four character account number in the  "Mainframe
  System to Access (list one)" field

  Section IV • Signature Authority (Required before Processing):  No request will be propcessed without the proper signatures.

   Items 20 through and 23 should to be completed by the Requesting Official who is authorized to approve request.  This person should be the supervisor of the applicant
   listed in t em 1  of Section II.

   Items 24 through 27 should to be completed by the Document Control Officer of the applicant listed in item  1 of Section  II.
   Section V. Signature (For Mainframe and LAN Coordinator's Use): This section should be completed by the Mainframe and LAN Coordinator only.

-------
TSCA CBI Security Manual
Standard Form 86
Revised December 1990
U.S.Otfice of Personnel Management
FPM Chapter 732
Appendix 3
Form approved:
O.M.B. No. 3206-0007
NSN 7540-00-634-4036
86-110
  Questionnaire  for Sensitive Positions
  Read this information carefully.  Follow the instructions fully or we cannot process your form.
  Why do we need the information you will give us and how
  will we use it?

  The U.S. Government has conducted background investigations
  for over 50 years. It does this to establish that applicants for or
  incumbents in sensitive positions, either employed by the Gov-
  ernment or working for the Government under contract,  are
  eligible for a  required security clearance  or for performing
  sensitive duties.   We  use the information  from  this form
  primarily as the basis for an investigation that will be used to
  determine your eligibility for a national security position.

  The information you give us is for Official  Use  Only; we will
  protect it from unauthorized disclosure. Authorized disclosures
  include the Privacy Act Routine Uses shown on this form. The
  information you provide in response to question  25a on use of
  illegal  drugs will not be provided for use in any criminal pro-
  ceedings against you.

  Giving us the information we ask for is voluntary. However, we
  may not be able to complete your investigation, or complete it in
  a timely manner, if you don't give us each item of information we
  request This may affect your placement or clearance prospects.

  What authority do we have to ask you for the information
  requested on this form?

  The U.S. Government is authorized to ask for  this information
  under Executive Order 10450; section 2165 of title 42, U.S. Code;
  parts 5,732. and 736 of Title 5, Code of Federal Regulations, and
  other statutes authorizing background investigations. We ask for
  your Social Security number to keep our records accurate,
  because other people may have the same name and birth date.
  Executive Order 9397 also  asks Federal agencies to use this
  number to help identify individuals in agency records.

  What is the investigative  process?

  Background investigations for national security are conducted to
  develop information to show whether or not a person is reliable,
  trustworthy, of good conduct and character, and loyal to  the
  United States. - The information  you provide on this  form,
  including any specific agency instructions of  Question 14c., and
  any other special instructions, is confirmed by  investigation.
  Your current employer must be contacted, even if you indicated
  on your SF 171, or other form, that you do not want the present
  employer contacted.  In addition to the questions on this form,
  inquiry also is made about a person's adherence to security
  requirements, mental or health  disorders, dishonest conduct,
  sexual  misconduct,  vulnerability  to  blackmail  or coercion,
  falsification, misrepresentation and any other behavior, activities,
  or associations that tend to show the person is not reliable,
  trustworthy, or loyal.

  An interview with  you is a normal part of the investigative
  process. This Personal Subject Interview is  generally the first
  step in the investigation, and is conducted under oath, affir-
  mation, or unsworn declaration. It provides you the opportunity
  to update, clarify, and explain more completely information on
  your form, which often helps to complete your investigation fast-
  er.
      If your investigation requires a Personal Subject Interview, you
      will be contacted in advance by telephone or mail to arrange a
      time and location for the interview.  It is important that the
      interview be conducted as soon  as possible after you are con-
      tacted. Postponements will delay the processing of your inves-
      tigation. Declining an interview may result in your investigation
      being delayed or canceled.

      You will be asked to bring identification with your picture on it,
      such as a valid State driver's license, to the interview. There are
      other  documents you may be asked to bring to verify your
      identity as well. These include: documentation of any legal name
      change; Social Security card; and/or birth certificate.

      Documents that verify any  significant claims or activities may
      also be requested, for example: alien registration; naturalization
      certificate; originals or certified copies of college transcripts or
      degrees;  high   school   diploma;  professional  licenses)  or
      certificates); military discharge certificate^) (DD Form 214);
      marriage certificate(s); passport; and/or business license(s). You
      also  may  be  asked to bring documents that pertain  to
      information provided in your answers to questions on  the form
      or  other matters requiring specific attention.  These matters
      include: termination or discharge from employment; delinquent
      loans or taxes, bankruptcy, judgments, liens, or other  financial
      obligations; and arrests, convictions, probation and/or parole.

      Who makes a final  determination?

      Final determination  on your eligibility for a national security
      position and your being granted a clearance is the responsibility
      of  the OPM or the Federal  agency  that requested your
      investigation. You may be provided the opportunity to personally
      explain, refute, or clarify any information before a final decision
      is made.

      How is this form organized?

      This form  has two parts.  Part  1  asks for  background
      information, including where you have lived, gone to school, and
      worked.  Part 2 asks  about your activities and such matters as
      firings from a job, criminal history record, use of illegal drugs and
      alcohol consumption.  In answering Part 2, you should keep in
      mind that your answers to questions are considered togethei
      with the information obtained in the investigation to reach an
      appropriate adjudication for a sensitive position.

      What are the penalties for inaccurate or false statements^

      The U.S. Criminal Code provides that knowingly falsifying 01
      concealing a material fact is a felony which may result in fines
      of up to $10,000, or 5 years imprisonment, or both.  In addition
      Federal  agencies generally fire, do not grant clearance, 01
      disqualify individuals who have materially and deliberately falsi
      fied these  forms, and this  remains  a part of our permanerv
      record for future placements. Because the position for which yoi
      are being considered  is a sensitive one, your trustworthiness i!
      a very important consideration in deciding your eligibility foi
      security clearance. Your prospects of placement or clearance an
      better if you answer all questions truthfully and completely. Ii
      the course of an interview with a Federal official you will have

-------
TSCA CBI Security Manual

adequate opportunity to explain any information you give us on
the form and make your comments part of the record.

How is the SF 171  used with this form?

For competitive civil service positions, a copy of the Application
for Federal Employment (SF 171), or a form provided to you, will
be attached to the SF 86.  For certain other and contractor
positions, the SF 171 is not required. You will be advised by the
office assisting you.

How is this form filled out?

1. Follow the instructions of the person who gave you the form
and  any other supplementary information furnished by that
person to assist you in completion of the form.  Find out how
many copies of the form you are to turn in. You must sign and
date, in ink, the original and each copy you submit

2. You will need a continuation sheetfs), SF 86A, if in the last 15
years you have lived in more than 6 residences, attended more
than 3 schools, or had more than 7 employments/self-employ-
ments/unemployments.

If additional space is needed, use a blank piece of paper.  Each
blank piece of paper you use must contain your name and Social
Security number at the top of the page.
3. Type or legibly print your answers.
form if it is not legible.
                 7700
                 1/93
We cannot accept your
4. You must use the State codes (abbreviations) listed in the box
below when you fill out your form.

5. The 5-digit postal ZIP codes are needed to speed the processing
of your investigation. The office that provided you with the form
will assist you in completing the ZIP codes.

6. Whenever "City (Country)" is shown in an address block, also
provide in that block the name of the country when the address
is outside the United States.

7. When providing dates, you may use numbers 1-12 to indicate
months if you don't believe you have enough space to write the
month; and for the same reason, for year you may show the last
two numbers  in the year. For example, June 8,1967, could be
shown as 6/8/67, or January 1984 could be shown as 1/84.

If you have any questions, call the office that gave you the form.
Be sure to  sign and date the certification statement on page 9
and complete the release on page 10.  Any forms that are not
completed according to these instructions will be returned.  This
will delay the processing of your case.
Alabama
Alaska
Arizona
Arkansas
California
Colorado
Connecticut
Delaware
Florida
Georgia
American Samoa
Trust Territory
AL
AK
AZ
AR
CA
CO
CT
DE
FL
GA
AS
TT
Hawaii
Idaho
Illinois
Indiana
Iowa
Kansas
Kentucky
Louisiana
Maine
Maryland
Ost. of Columbia
Virgin Islands
HI
ID
IL
IN
IA
KS
KY
LA
ME
MD
DC
VI
Massachusetts
Michigan
Minnesota
Mississippi
Missouri
Montana
Nebraska
Nevada
New Hampshire
New Jersey
Guam

MA
Ml
MN
MS
MO
MT
NE
NV
NH
NJ
GU

New Mexico
New York
North Carolina
North Dakota
Ohio
Oklahoma
Oregon
Pennsylvania
Rhode Island
South Carolina
Northern Marianas

NM
NY
NC
ND
OH
OK
OR
PA
Rl
SC
CM

South Dakota
Tennessee
Texas
Utah
Vermont
Virginia
Washington
Wisconsin
West Virginia
Wyoming
Puerto Rico

SD
TN
TX
UT
VT
VA
WA
Wl
WV
WY
PR

PRIVACY ACT ROUTINE USES
This record and ntormaDon in iris record may be used in disclosing intormaaon:
• To designated officers and employees of agencies, offices, and other establishments
in the executive, legislative, and judkaal branches of (he Federal Government having a
need to evaluate qualifications, auitabiity, and loyalty to the United States Government
and/or a security clearance or access determination;
- To designated officers and employees of agencies, offices, and other estabishments
in the executive, legislative, and judicial branches of the Federal Government, and the
Ostnct of Columbia Government, when such agency, office, or establishment conducts
an investigation of the individual for purposes of granting a security clearance, or for the
purpose of making a determination of qualifications, suitability, or loyalty to the Unfed
States Government, or access to classified information or restricted areas;
- To designated officers and employees of agencies, offices, and other establishments
in the executive, judicial, or legislative branches of the Federal Government, having the
responsibility ID grant clearances, to make a determination regarding access to classified
information or restricted areas, or to evaluate qualifications, suitability, or loyalty to the
United Stales Government, in connection with performance of a service to the Federal
Government under a contract or other agreement;
• To mtaligenoe agencies for use in intelligence activities-,
- To any source from which information is requested m the course of an investigation,
to the extent necessary to identify the individual, inform the source of the nature and
purpose of the investigation, and t> identify the type of information requested;
• To the Federal, State, or local agency responsible for investigating, prosecuting,
enforcing, or mptementmg a statute, rule, regulation, or order where
there is an indication of a viotanon or potential violation of civil or criminal law or
regulation;
- To an agency, office, or other establishment in the executive, legislative, or
judicial branches of the Federal Government or the District of Columbia Government
in response to its request m comecDon with the hmng or retention of an employee,
the issuance of a security clearance, the conducting of a security or suitatxity
investigation of an individual, the classifying of jobs, the letting of a contract or the
issuance of a license, grant or other benefit by the requesting agency;
- To Federal agencies as a data source for management information through the
production of summary descriptive statistics and analytical studies in support of the
functions for which the records are maintained or for related studies,
• To a congressional office in response to an inquiry made at the request of that
individual;
- In Iragatxxi before a court or m an administrative proceeding being conducted by
a Federal agency;
• To the National Archives and Records Administration for records management
inspections;
- To the Office of Management and Budget in connection with private relief
legislation;
- To respond to a request for discovery or for appearance of a witness; and
- To the Merit Systems Protection Board, the Office of Special Counsel, the Equal
Employment Opportunity Commission, or the Federal Labor Relations Authority, n
connection with functions vested in those agencies

Public Burden Information
Public burden reporting tor this cotectfon of information is estimated to vary from 30 minutes t> 180 mnuBBS per response, including time for reviewing instructions, searching
existing data sources, gathenng and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding the burden estimate or
any other aspect of this collection of information, deluding suggestions for reducing this burden to Reports and Forms Management Officer, U.S. Office of Personnel Management
1900 E Street, N.W., Room 6410, Washnolon, D.C. 20415; and to the Office of Management and Budget, Paperwork Reduction Propel (3206-0007), Washington. D.C. 20508.
Do not send your compteled form k> the addresses in this box.

-------
TSCA
CBI Security Manual
Standard Form 86
Revised December 1 990
U.S.Office of Personnel Management
FPM Chapter 732


Part
••BBBBBBI npu
EL^B USE
• •^•V ONLY




QUESTIONNAIRE FOR
SENSITIVE POSITIONS
(For National Security)




CodM Caw Numtor
I I
7700
1/93
Form approved:
O.M.B. No. 3206-0007
NSN 7540-00-634-4036
86-110


Agency Use Only (Complete items A through P using instructions in FPM Supplement 296-33)
A Type of .
Investigation |
G Geographic
Location
J

SON
L

SOI
I I
B Extra
Coverage

I I I I I
i i i


i


i i

I I

I I I
I

I I
H Position
Code
K Location of Offi- |
cial Personnel
Folder

M Location
of Security
Folder
N OPAC-ALC ,
Number
| i
I I

(
I I




~~
None
NPRC
At SON
None
At SOI
NPI
J Accounting

i




C Sensitiv ty . D Access IE Nature of , F D
Level I | | Action Code | I I A
ate of Month Day Year
ctoon | | |
I Position
Title
Other Address






Other Address






ZIP Code

I I I
ZIP Code

I I I
Data and/or.
Agency Case Number I
P Requesting   Name and Title
  Official
                                               Signature
                                        Telephone Number  FTS (   ) pate
              Persons completing this form should begin with the questions below.  Please type or print your answers.
1  FULL
   NAME
> If you have only initials in your name, use them and State (IO).
1 If you have no middle name, enter "NMN."
       • If you are a "Jr.," "Sr.," "II," etc , enter this in the box after
        your middle name.
2     DATE OF
       BIRTH
Last Name
3 PLACE OF BIRTH
City
First Name
• Use the two letter code for the State.
County
rie Name Jr.. II. etc. Month Day Year
1 1 1 1 i

State Country (if not in tine United States!
i 1 1
4 SOCIAL SECURITY NUMBER
If -| | |.| 1 1 1
5  OTHER NAMES USED
   Give other names you used and the period of time you used them (for example: your maiden name, namefs] by a former marriage, former namefs], aliasfes], or nicknamefs]). If
   the other name is your maiden ram*, put "DM" in front of it.
Name
Name
6 OTHER
IDENTIFYING
INFORMATION
7 TELEPHONE
NUMBERS
8 CITIZENSHIP
Month/Year Month/Year
To
Month/Year Month/Year
To
Height (feet and inches) Weight (pounds) H<
Work (include Area Code and extension)
( )Day
( ) Night ( )
3 Mark the box at the right that |
instructions next to the box you
marked. '
Name
Name
)ir Color
Home (indue
( (Night
am a U.S. citizen by birth in the U.S.
am a U.S. citizen, but 1 was NOT born in the U.S.
am not a U.S. citizen.

Eye Color
le Area Code)
( )
Answer Items b and d b >
Answer Items b, c, and d
Answer Items b snd »
Month/Year Month/Year
To
Month/Year Month/Year
To
Sex (mark one box)
| [Female [ JMale

four Mother's Maiden Name
C UNITED STATES CITIZENSHIP If you are a U.S. Citizen, but were not born in the U S., provide information about one or more of the following proofs of your citizenship.
Naturalization Csrtificsts (When wen you naturalized?)
     Court
                                                                 City
                                                                      State  Certificate Number
                                                                         |   |   I   I   I    I  I   I   I   I   I
                                                        Month/Day/Year Issued
     Citizenship Certificate (Whtn tm the cwt//fc«te issued?)
     City
                                                                      State  Certificate Number                 Month/Day/Year Issued
                                                                     I   I   I   I   I   I    I   I   I   I   I   I    I
     Stats Department Form 240 - Report ot Birth Abroad of • Citizen of tha United States
     Give the date the form was
     prepared and give an
     explanation if needed.
                Month/Day/Year
Explanation
U.S. Passport
TNs may be either a current or previous U.S. Passport.
(J DUAL CITIZENSHIP If you are (or were) a dual citizen of the United States and another
country, provide the name of that country in the space to the right.
Passport Number
1 1 1 I 1 1 1 1 1
Month/Day/Year Issued
Country
9 ALIEN If you are an alien, provide the following information:
Place You
Entered the
United States:
City
State
1
Date Y
Month
1
ou Ente
Day
1
edUS
Year
1
Alien Registration Number
1 1 1 1 1 1 1 1 1
Country of Citizenship
                                                                                                                                      Pagel

-------
TSCA CBI Security Manual
9     WHERE YOU HAVE LIVED
      Fill In your full address for every place you have lived beginning with the present (#1) and working backward 15 years.
       • If you attended school away from your permanent residence, list the address you lived at while attending school.
       • For any address in the past 3 years:
        - List a person who knew you at that address, preferably someone who still lives in that area.
        - If address listed is "General Delivery," a Rural Route, or Star Route, provide directions for locating the residence on an attached
         continuation sheet, and show the block #.
 7700
' 1/93
 •j 0   WHERE YOU WENT TO SCHOOL
      Fill in information about schools you have attended, beyond Junior High School, beginning with the most recent (#1) and working
      backward 15 years. Also list College or University degrees received beyond 15 years.
        • For schools you attended in the past 3 years, list a person who knew you at school (such as an instructor or a student).
        • For correspondence schools and extension classes, list records location address.
        • In the "Code" block, use one of these codes: 1 - High School         2 - College/University        3 - Vocational/Trade School
^ Month/Year Month/Year
Present To
Street Address Apt #
Name of Person Who Knows You
Month/Year Month/Year
*2
To
City (Country)
Street Address Apt. # City (Country)
Street Address Apt #
Name of Person Who Knows You
Month/Year Month/Year
#3
To
State
I
ZIP Code
I I I I
City (Country)
Street Address Apt # City (Country)
Street Address Apt. #
Name of Person Who Knows You
Month/Year Month/Year
#4
To
State
I
ZIP Code
I I I I
City (Country)
Street Address Apt # City (Country)
Street Address Apt #
Name of Person Who Knows You
Month/Year Month/Year
#5
To
State
I
ZIP Code
I I I I
City (Country)
Street Address Apt # City (Country)
Street Address Apt #
Name of Person Who Knows You
Month/Year Month/Year
#6
To
State
I
ZIP Code
I I I I
City (Country)
Street Address Ap! * City (Country)
Street Address Apt #
Name of Person Who Knows You
State
I
ZIP Code
I i I I
City (Country)
Street Address Apt # City (Country)
State
I
ZIP Code
I I I I
State
I
ZIP Code
I I I I
Telephone Number
( )
State
I
ZIP Code
I I I I
Telephone Number
( )
State
I
ZIP Code
I I I I
Telephone Number
( )
State
I
ZIP Code
I I I I
Telephone Number
( )
State
I
ZIP Code
I I I I
Telephone Number
( )
State
I
ZIP Code
I I I I
Telephone Number
( )
Month/Year Month/Year
#1
To
Code
Name of School
Degree/Diploma/Other (show eacn degree
and date received if Code 2)
Street Address and City (Country) of School
Name of Person Who Knew You
Month/Year Month/Year
#2
To
Code
Street Address and City (Country) State
I
Name of School
ZIP Code
I I I I
State
I
Month/Year
ZIP Code
1 1 1 1
Telephone Number
( )
Degree/Diploma/Other (show each degree
and date received if Code 2)
Street Address and City (Country) of School
Name of Person Who Knew You
Month/Year Month/Year
#3
To
Code
Street Address and City (Country) State
I
Name of School
ZIP Code
I I I I
State
I
Month/Year
ZIP Code
till
Telephone h1 "nber
( )
Degree/Diploma/Other (show each degree
and date received it Code 2)
Street Address and City (Country) of School
Name of Person Who Knew You
Street Address and City (Country) State
I
ZIP Code
I I I I
Enter your Social Security Number before going to the next page ->
State
1
Month/Year
ZIP Code
1 1 1 1
Telephone Number
( )
1 1 l-l 1 l-l 1 1 1 1
Page 2

-------
TSCA CBI Security Manual
                                                                                             7700
                                                                                             1/93
 11   YOUR EMPLOYMENT ACTIVITIES
      Fill in your employment activities, beginning with the present (#1) and working backward 15 years.  INCLUDE:
      • all full-time work                             • all paid work                                • self-employment
      • all part-time work                             • active military duty                          • all periods of unemployment
      IN THE NUMBERED ACTIVITY SECTION USE ONE OF THESE CODES IN THE CODE BLOCK:
      1 - Active military duty stations       £ - State Government (Non-
      2 - National Guard/Reserve             Federal) employment
      3 - U.S.P.H.S. Commissioned Corps  6 • Self-employment (Enter
      4 - Other Federal employment          business name and/or  name
                                           of person who can verify)
                                     7 - Unemployment (Enter name
                                        of person who can verify)
                                     8 - Federal Contractor (list Con-
                                        tractor, not Federal agency)
 9 - Other
      FOR EACH ACTIVITY SECTION, provide information requested.  For example, if you had worked at XY Plumbing in Denver, CO, for 3
      separate periods of time, you would enter dates and information concerning the most recent period of employment first, and provide dates,
      position titles, and supervisors for the two previous periods of employment in the appropriate blocks below that information.  (For locations
      outside the U.S , show aty and country)
^ Month/Year Month/Year
Present To
Employer's/Verifier's Street Address
Code

Employer's Name/Military Service/Unemployment or Self-Employment Verifier

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
City (Country)
City (Country)
City (Country)
Your Position Tide
State
I
State
t
State
1
ZIP Code
lilt
ZIP Code
i 1 I 1
ZIP Code
1 1 I I
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
 PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
 Month/Year Month/Year  Your Position Tide & Supervisor's Name
         To
                               Month/Year Month/Year  Your Position Title & Supervisor's Name
                                                                          To
         To
                                                                          To
   #2
         Month/Year Month/Year
                 To
                            Code
Employer's Name/Military Service/Unemployment or Self-Employment Vender
                                                                                             Your Position Title
 Employer's/Verifier's Street Address
                            City (Country)
                                                                                               State
                                                                                                         ZIP Code
             Telephone Number
 Street Address of JobTocation (rTdiTferent than Employer's Address)
                            City (Country)
                                                                                               State
 ZIP Code

I   I   I   I
Telephone Number
 Supervisor's Name & Street Address (if different than Job Location)
                            City (Country)
                                                                                               State
                                                                                                        ZIP Code
             Telephone Number
 PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year Month/Year
#3
To
Employer's/Verifier's Street Address
Code^

Month/Year Month/Year
To
To
Your Position Tide & Supervisor's Name

Employer's Name/Military Service/Unemployment or Self-Employment Venfier

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
City (Country)
City (Country)
City (Country)
Your Position Title
State
1
State
, 1
State
1
ZIP Code
1 1 1 1
ZIP Code
i I 1 t
ZIP Code
1 1 I t
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
 PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year Month/Year
To
To
Your Position Tide & Supervisor's Name

Enter your Social Security Number before going to the next page
                                                                                                                          Page 3

-------
TSCA CBI Security
Manual
7700
YOUR EMPLOYMENT ACTIVITIES (Continued)
Month^earMonth/Year
#4
To
Employer's/Verifier's Street Ad
Code
dress
Employer's N3 Tie/Military Sendee/Unemployment or "Self-Employment verifier

Street Address of Job Location (if different than Employer's 4odross!
Supervisor's Name & Street Address (if different (ban job Location)
Your Position Title
City (Country) Staie
j [
City (Country,
City ,Cour ry/
ZIP Code
III!
$ a, • Zi-1 Code
: i I I 1 I
"Slav "
7IP Code
III!
Telephone Number
Te!ophone Number
Teleohone Number
PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION ShEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position

Month/Year Month/Year
#5
To
Employer's/Verifier's Street Ad

Code
dress
Title & Supervisor's Name MonrtvYear Month'Yea' Your Posit on Title & Supervisor's Name
To
To
Employer's Name/Military Service/Unemployment or Self-Employment Vender

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
PREVIOUS PERIODS OF
Month/Year Month/Year
To
To
THE SAME ACTIVITY AND LOCATION - IF CONTINUA I
Your Position

Month/Year Month/Year
#6
To
Employer's/Verifier's Street Ad

Code
dress
City (Country)
City (Country)
City (Country)
Your Fos.ion Title
State
State
State
ZIP Code
1 1 1 1
ZIP Code
1 1 1 1
ZIP Code
i i : i
Telephone Number
Telephone Number
Telephone Number
ION SHEET IS USED, SHOW BLOCK *
Tide & Supervisor's Name Month/Year Month/Year Your Position Title & Supervisor's Name
To
To
Employer's Name/Military Service/Unemployment or Self-Employmentvenier^^^

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name S Street Address (if d fferent than Job Location)
PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION • IF CONTINUA1
Month/Year Month/Year
To
To
Your Position

Month/Year Month/Year
#7
TO
Employer's/Verifier's Street Ad

Code
dress
City (Country)
City (Country)
City (Country)
Your Position Tide
State
1
State
1
State
t
ZIP Code
1111
ZIP Code
ill!
ZIP Code
1 1 1 1
Telephone Number
Telephone Number
Telephone Number
ION SHEET IS USED, SHOW BLOCK *
Title & Supervisor's Name Month/Year Month/Year Your Position Tide & Supervisor's Name
To
To
Employer's Name/Military Service/Unemployment or Self-Employment Vender

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
PREVIOUS PERIODS OF
THE SAME ACTIVITY AND LOCATION - IF CONTINUA1
City (Country)
City (Country)
City (Country)
Your Position Tide
'State
1
State
1
State
1
ZIP Code
i 1 1 i
ZIP Code
ill!
ZIP Code
ill!
Telephone Number
Telephone Number
Telephone Number
ION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year (Month/Year
To
To
Enter your Social Security Number before going to the next page
Your Position Tide & Supervisor's Name

-* 1 1 l-l 1 l-l 1 . 1
Page 4

-------
TSCA CBI Security Manual
                                               7700
                                               1/93
12   PEOPLE WHO KNOW YOU WELL
      List two people who know you well and live in the United States.
       • Don't list spouse, other relatives, or former spouses.
• Try not to list anyone mentioned in item 9,10, or 11.
#1
Name
Home Address
#2
Number Years Known
City (Country)
Name
Home Address
Number Years Known
City (Country)
Telephone Number:
( )
D.y< ).rNl8M( )
State
I
ZIP Code
I I f I
Telephone Number:
( )
D.y( ) or Night ( )
State
I
ZIP Code
ill!
13     YOUR OUTSIDE ACTIVITIES
        List any activities which you may wish to have considered as reflecting favorably on your reputation for leadership, responsibility, honesty,
        and integrity in the last 15 years.   (Response Optional)
#1
#2
#3
14
Month/Year Month/Year
To


To
To
Activity


YOUR FOREIGN ACTIVITIES
a. Do you have any foreign property,
b.
c.
Location of Activity
City (Country)


business connections, or financial interests?
Are you now or have you ever been employed by or acted as a consultant for a foreign government, firm, or agency?
In the last 15 years, have you had
instructing you to fill out this form?
a list of countries.)
continuing contact with a national of any foreign country designated by the agency
(NOTE: If the agency wants you to answer this question, it will provide you with
Yes



State
I
I
I
No



      If you answered "Yes" to a, b, or c, explain in the space below:
15   FOREIGN COUNTRIES YOU HAVE VISITED
      List foreign countries you have visited, beginning with the most current (#1) and working backward 15 years.
        • Do not include countries covered in items 9,10, and 11.
        • In the "Code" block, use one of these codes: 1 - Business            2 - Pleasure           3 - Education            4 - Other
Month/Year Month/Year
f1 To
#2 To
Code

1 6 YOUR MILITARY HISTO
3. Have you served i
Have you served i
• If your answer 1
• If your answer t
Country

HY
n the United States military9
Month/Year Month/Year
#3 To
#4 To

Code


Country


n the United States Merchant Marine? 	 ...
o both questions is ".No/ GO TO QUESTION 17.
o either question is "Yes," GO TO b.

Yes



No



        b.   Starting with the most current (#1) and working backward, enter information for all periods of active service into the table below.
               • Mark "O" block for Officer or "E" block for Enlisted.
               • In the "Code" block, use one of these codes:
                1  - Air Force   2 - Army   3 - Navy  4 - Marine Corps   5 - Coast Guard   6 - Merchant Marine   7 - National Guard
Month/Year Month/Year
#1 To
#2 To
#3 To
#4 To
Code



Service/Certificate #



O



E



Status (Mark "X* in appropriate blocks - use State Code for National Guard)
None



Active Duty



Active Reserve



National Guard
(show State)
I
I
I
I
Enter your Social Security Number before going to the next page •*
Inactive
Reserve



I I l-l I
Retired



I- I I I
                                                                                                                      Pages

-------
TSCA CBI Security Manual
                                                                                       7700
                                                                                        1/93
17   YOUR RELATIVES
      Give full names and enter the correct code for all relatives, living or dead, specified below:
      1 - Mother (first)     4 - Stepfather              7 - Stepchild          10 - Stepbrother      13 - Half-sister
      2 - Father (second)  5 • Foster parent           8 - Brother            11 - Stepsister        14 - Father-in-law
      3 - Stepmother       6 - Child (adopted a/so)     9 - Sister             12 - Half-brother      15 - Mother-in-law
                                                                            16 - Guardian
Full Nam* (II dtctfafd, check box on the left
btfon tntfting ntrra)
LJ
LJ
LJ
LJ
LJ
LJ
LJ
LJ
LJ
LJ
Cod*
1
2








ftaaigftatHfg^afi: •
Kit* oTBirth
Month/Day/Year










SBcraenuaanBisrans
Country of Birth










Country ot
Citizenship










Current Street Address and City
(country) of Living Relatives










State
I
I
I
I
I
I
I
I
I
I
18
YOUR MARITAL STATUS
Mark one of the following boxes to show
R1 - Never married (go to question 19)
2 • Married
your current marital status:
R3 - Separated P"] 5 - Divorced
4 - Legally Separated 6 - Widowed
Current Spouse Complete the following about your current spouse

Full Name
Date of Birth
Place of Birth /Include country if outside the U S,l Social Security Number
II -| I -| I I I
      Other Names Used (Specify marten name, names byolrier marriages, etc., and show dates useoror eacfjnamej
Country of Citizenship
If Separated, Date of Separation (MoJDay/Yr.)
Date Married
Place Married (Include country it outside the U S.)
If Legally Separated, Where is the Record Located' City (Country)
Address of Current Spouse (Street, city, and country if outside the U S.)
State
I
ZIP Code
I I
State
I
State
I
I
      Former Spouses)  Complete the following about your former spouse(s), use blank sheets if needed
      Full Name

      Country of Citizenship
      Check One, Then Give Date
      PI Divorced         |~~| Widowed
                                                Oate oT Birth
"T5aTe~M"aTne
-------
 TSCA CBI Security Manual
 Standard Form 86
 Revised December 1990
 U.S.Office of Personnel Management
 FPM Chapter 732
                                                                                                                        7700
                                                                                                                        1/93
                                            QUESTlOh^AiFit i-OK
                                            SLNsr-j.vt rcjsrnON^
                                            (For National Security)
                                                                                                       Torrn apc'oveo
                                                                                                       O M B No T206-0007
                                                                                                       N5N 7-xM,-
                                                                                                       86-110
   Part  2
20  YOUR SELECTIVE SERVICE RECORD
    3.  Are you a male born after December 31 , 1959? If "No," 90 to 21. If "Yes," go to b.
                                                                         j; teyisi.-di.of: number,  if "No," show the
b.  Have you registered with the Selective Service System?
    reason for your legal exemption below.
                                                          "Yes," (jrovidu
                                                                                                                   Yes
                                                                                                                         No
    Registration Number
                            Legal Exemption Explanation
21  YOUR MIUTARY RECORD
     a.   Have you ever received other than an honorable discharge from the military?  If "Yes," provide:
         Date of Discharge (Month and Year):                       Type of Discharge:
     b.   Have you ever been subject to court-martial or other disciplinary proceedings under the Uniform Code of Military Justice?
         If "Yes," list any disciplinary proceedings in the last 15 years and all courts-martial. (Include non-judicial and Captain's
         mast, etc.)
Month/Year

Charge or Specification / Action Taken

Place (City and county/country if outside the United States)

State
I
I
22  YOUR EMPLOYMENT RECORD
    Has any of the following happened to you in the last 15 years? If "Yes," begin with the most recent occurrence and go
    backward, providing date fired, quit, or left, and other information requested.

    Use the following codes and explain the reason your employment was ended:
    1 - Fired from a job           3 - Left a job by mutual agreement following allegations of misconduct   5 - Left a job for other reasons
    2 - Quit a job after being told   4 - Left a job by mutual agreement following allegations of                under unfavorable circumstances
       you'd be fired                unsatisfactory performance
Month/Year

Code

Specify Reason

Employer's Name and Address

State
I
I
23 YOUR POLICE RECORD (Do not include anything that happened before your 16th birthday.)
3. Have you ever been charged with or convicted of any felony offense?
b. Have you ever been charged with or convicted of a firearms or explosives offense?
C. Are there currently any charges pending against you for any criminal offense?
d. Have you ever been charged with or convicted of any offense(s) related to alcohol or drugs?
6. In the last 5 years, have you been arrested for, charged with, or convicted for any offense(s) not listed in response to a, b,
c, or d above? (Leave out traffic fines of less than $100.)
ZIP Code
I I I I
I I I I
Yes





No





        If you answered "Yes" to a, b, c, d, or e above, explain your answer(s) in the space provided.
Month/Year

Offense

Action Taken

Law Enforcement Authority or Court (City and county/country il outside the U.S.)

State
I
I
24 YOUR MEDICAL RECORD
3. Have you experienced problems on or off the job because of any emotional or mental condition?
b. Have you ever seen a health care professional for any of the types of problems mentioned above?
ZIP Code
I I I I
I I I I
Yes


No


        If you answered "Yes" to questions a or b, explain below.
Month/Year Month/Year
To
To
Explanation

Enter your Social Security Number before going to the next page -> ( ( - 1 i | - 1 i i i
                                                                                                                    Page?

-------
 TSCA CBI Security Manual
                                                                                                                     7700
                                                                                                                     1/93
25  ILLEGAL DRUGS AND ALCOHOL
     a.  In the last 5 years, have you used, possessed, supplied, or manufactured any illegal drugs?  When used without a
         prescription, illegal drugs include marijuana, cocaine, hashish, narcotics (opium, morphine, codeine, heroin, etc.), stimulants
         (cocaine, amphetamines, etc.), depressants (barbiturates, methaqualone, tranquillizers, etc.), hallucinogenics (LSD, PCP,
         etc.). (NOTE: The information you provide in response to this question will not be provided tor use in any criminal
         proceedings against you.)
     b.
Have you experienced problems (disciplinary actions, evictions, formal complaints, etc.) on or off a job from your use of
illegal drugs or alcohol?
If you answered "Yes" to question a or b above, provide information relating to the types of substance(s), the nature of the activity, and
any other details relating to your involvement with illegal drugs or alcohol. Include any treatment or counseling received.
                                                                                                                  Yes
                                                                          No
     Month/Year Month/Year

             To
            To
             To
               Type of Substance
Explanation
26  YOUR INVESTIGATIONS RECORD
     a.  Has the United States Government ever investigated your background?  If "Yes," use the codes that follow to provide the
         requested information below. If "Yes," but you can't recall the investigating agency and/or the security clearance received,
         enter "Other" agency code or clearance code, as appropriate, and "Don't know" or "Don't recall" under the "Other
         Agency" heading, below.  If your response is "No," or you don't know or can't recall if you were investigated and cleared,
         check the "No" box.
                                                                                                                  Yes
                                                                           No
     Codes tor Investigating Agency
     1 - Defense Department           4 - FBI
     2 - State Department             5 - Treasury Department
     3 - Office of Personnel Management 6 - Other (Specify)
     Month/Year
               Agency
                Code
                                              Codes for Security Clearance Received
                                              0 - Not Required           3 - Top Secret                      6 - O-Nonsensitive
                                              1 - Confidential            4 - Sensitive Compartmented Information  7 - L
                                              2 - Secret                5 - Q-Sensitive                      8 - Other
             Other Agency
       Clearance
         Code
                                                                       Month/Year
Agency
 Code
Other Agency
     b.  To your knowledge, have you ever had a clearance or access authorization denied, suspended, or revoked, or have you
         ever been debarred from government employment?  If "Yes," give date of action and agency.
     Month/Year
                    Department or Agency Taking Action
                                                                       Month/Year
Clearance
  Code
                                                                                                                  Yes
                                                                                              Department or Agency Taking Action
                                                                           No
27  YOUR FINANCIAL RECORD
     a.  In the last 5 years, have you, or a company over which you exercised some control, filed for bankruptcy, been declared
         bankrupt, been subject to a tax lien, or had legal judgment rendered against you for a debt? If you answered "Yes,"
         provide date of initial action and other information requested below.
      Month/Year
                   Type of Action
                                  Name Action Occurred Under
                                                                  Name/Address of Court or Agency Handling Case
                                                            State

                                                              I
                                                                                                                     I
                                                                                                                  Yes
                                                                           No
                                          ZIP Code

                                          I   I   I
                                                                                                                            I
                                                                                                                            I  I  I   I
         Are you now over 180 days delinquent on any loan or financial obligation? Include loans or obligations funded or
         guaranteed by the Federal Government.  (If an SF 171, Application for Federal Employment, will be attached, you do
         not need to repeat Federal Government delinquencies.  See the instructions headed, "How is the SF 171 used with
         this form?")
         If you answered "Yes," provide the information requested below:	
                                                                                                                  Yes
                                                                           No
     Month/Year
               Type of Loan or Obligation
                    and Account f
                            Name/Address of Creditor or Obligee
Enter your Social Security Number before going to the next page
                                                            State


                                                              I
                                          ZIP Code

                                          I   I   I   I
                                                                                                                              I   I   I
Pages
                                                                                                     i  i  l-l  i  l-l  i  i  i  I

-------
 TSCA CBI Security Manual
7700
1/93
28 YOUR ASSOCIATION RECORD
a. In the last 15 years, have you been an officer or a member or made a contribution to an organization dedicated to the
violent overthrow of the United States Government and which engages in illegal activities to that end, knowing that the
organization engages in such activities with the specific intent to further such activities?
b. In the last 15 years, have you knowingly engaged in any acts or activities designed to overthrow the United States
Government by force? If you answered "Yes" to a or b, explain in the space below:
Yes


No


                                                    Continuation Space •
Use the continuation sheet(s) (SF86A) for additional answers to questions 9, 10, and 11.  Use the space below to continue answers to all other
questions and any information you would like to add.  If more space is needed than what is provided below, use a blank sheet(s) of paper. Start
each sheet with your name and Social Security Number.  Before each answer, identify the number of the question.
After completing Parts 1 and 2 of this form and any attachments, you should review your answers to all questions to make sure the form is
complete and accurate, and then sign and date the following certification and sign and date the release on page 10. If you attach an SF 171,
Application for Federal Employment, make sure that it is updated and that any information added to the SF 171 is initialed and dated.

                                    Certification That My Answers Are True
I read each question asked of me and understood each question.  My statements on this form, and any attachments to th  ,
form, are true, complete, and correct to the best of my knowledge and belief and are made in good faith.  I understand that
a knowing  and willful false statement on this form can be punished by fine or imprisonment or both.
Signature (Sign In Ink)
Date
Enter your Social Security Number before going to the next page •* i i I - 1 I I - 1
P
I I I I
age 9

-------
 TSCA CBI Security Manual
Standard Form 86
Revised December 1890
U.S.Offlce of Personnel Management
FPM Chapter 732
         7700

Form approtMd: 1/93
O.M.B. No. 3206-0007
NSN 7540-OOO4-4036
86-110
                     UNITED STATES OF AMERICA

                AUTHORIZATION FOR RELEASE OF INFORMATION
          Carefully read this authorization to release information about you, then sign and date it in ink.

  I Authorize any investigator, special agent, or other duly accredited representative of the U.S.
  Office of Personnel Management, the Federal Bureau of Investigation, the Department of Defense,
  and any authorized  Federal agency, to obtain any information relating to my activities from
  schools, residential management agents, employers, criminal justice agencies, retail  business
  establishments, or other sources of information. This information may include, but is not limited
  to, my academic, residential, achievement, performance,  attendance, disciplinary, employment
  history, and criminal history record information.

  I Understand that, for financial or lending institutions,  medical institutions, hospitals, health
  care professionals, and other sources of information, a separate specific release will or may be
  needed, and I may be contacted for such a release at a later date.

  I  Further Authorize the U.S. Office of Personnel Management,  the Federal Bureau  of
  Investigation, the Department of Defense, and any other authorized agency, to request criminal
  record information about me from criminal justice agencies for the purpose of determining my
  eligibility for, assignment to, or retention in, a sensitive position, in accordance with 5 U.S.C. 9101.

  I Authorize custodians of records and sources of information pertaining to me to release such
  information upon request of the investigator, special agent, or other duly accredited representative
  of any Federal agency authorized above regardless of any previous agreement to the contrary.

  I Understand that the information released by records custodians and sources of information is
  for official use by the Federal Government only for the purposes provided in this Standard Form
  86, and may be redisclosed by the Government only as authorized by law.

  Copies of this authorization that show my signature are as valid as the original release signed by
  me. This authorization is valid for two (2) years from the date signed.
Slgrwtur* (Sign M Ink)
Full Nairn (Typ» or Print Lrgibly)
Other NamM UMd
Gun-wit AddreM (Strut, CHy)
Suit*
1
ZIP Code
1 1 1 1
Social Sm
1 1
Date Signed
:urtly Number
-1 i l-li i <
Horn* Tatophon* Number
(Indotb Ant Cod*)
( )
page 10

-------
 TSCA CBI Security Manual
Standard Form 86A
Revised December 1990
U.S.Offlce of Personnel Management
FPM Chapter 736
                                                                                7700
     CONTINUATION SHEET FOR QUESTIONNAIRES       FO™ approved:  l/93
                 SF 86, SF 85P, AND SF 85                     O.M.B. NO 320^007
For use with the SF 86, Questionnaire for Sensitive Positions (for National Security);  NSN 7540-01 -268-4828
             SF 85P, Questionnaire for Public Trust Positions;                 86-202
             and SF 85, Questionnaire for Non-Sensitive Positions
INSTRUCTIONS: Use this form to continue your answers to "Where You Have Lived" and/or "Your Employment Activities " Follow the instructions on the form for the particular
questions you are answering and give information in the same sequence. Use as many continuation sheets as you need to furnish all the requested information.
Your Name
WHERE YOU HAVE LIVED (Continued)
Month/Year Month/Year
To
Street Address
Name of Person Who Knows You
Month/Year Month/Year
To
Your Social Security Number

Apt #



-1 1 l-l

1

City (Country)
Street Address Apt* City (Country)
Street Address
Name of Person Who Knew You
Month/Year Month/Year
To
Apt. #
State
1
3ity (Country)
Street Address Apt.ff City (Country)
Street Address
Name of Person Who Knew You
Month/Year Month/Year
To
Apt #
ZIP Code
1 1 1 1

State
1


ZIP Code
1 1 1 1
City (Country)
Street Address Apt # City (Country)
Street Address
Name of Person Who Knew You
Month/Year Month/Year
TO
Apt. #
State
1
ZIP Code
1 1 1 1
City (Country)
Street Address Apt.# City (Country)
Street Address
Name of Person Who Knew You
Apt. #
State
1
ZIP Code
1 1 1 1
City (Country)
Street Address Apt.# City (Country)
State
1
ZIP Code
1 1 1 1
State
1
Teleph
/
State
1
ZIP Code
1 1 1 1
one Number
ZIP Code
fill
Telephone Number
State
1
ZIP Code
1 1 1 1
Telephone Number
State
1
ZIP Code
1 1 1 1
Telephone Number
State
1
ZIP Code
1 1 1 1
Telephone Number
     YOUR EMPLOYMENT ACTIVITIES (Continued)
Month/Year Month/Year
To
Code
Employer's Name/Military Service/Unemployment or Self-Employment Verifier
Employer's/Verifier's Street Address
Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
City (Country)
City (Country)
City (Country)
Your Position Title
State
1
State
1
State
1
ZIP Code
1 1 1 1
ZIP Code
1 1 1 1
ZIP Code
1 1 1 1
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
 PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year Month/Year Code
TO
Employer's/Verifier's Street Address

Month/Year Month/Year
To
To
Your Pos tion Title & Supervisor's Name

Employer's Name/Military Service/Unemployment or Self-Employment Venfier

Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
City (Country)
City (Country)
City (Country)
Your Position Title
State
1
State
1
State
1
ZIP Code
1 1 1 1
ZIP Code
1 1 1 1
ZIP Code
1 1 1 1
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name


-------
 TSCA CBI Security Manual
                                                                                                       7700
                                                                                                       1/93
       YOUR EMPLOYMENT ACTIVITIES (Continued)
Month/Year Month/Year
To
Code
Employer's Name/Military Service/Unemployment or Self-Employment Vender
Employer's/Verifier's Street Address
Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
City (Country)
City (Country)
City (Country)
Your Position Title
State
1
State
1
State
1
ZIP Code
1 1 ! 1
ZIP Code
1 1 i 1
ZIP Code
1 1 t 1
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
 Month/Year Month/Year I Your Position Title & Supervisor's Name
                                      Month/Year Month/Year  Your Position Title & Supervisor's Name
         To
                                                                                To
         To
                                                                                To
     Month/Year Month/Year
             To
                         Code
Employer's Name/Military Service/Unemployment or Self-Employment Verifier
                                                                                                     Your Position Title
 Employer's/Verifier's Street Address
                                  City (Country)
State
  I
 ZIP Code
I   I  I   I
              Telephone Number
 {Street Address of Job Location (if different than Employer's Address)
                                  City (Country)
State
  I
 ZIP Code
I   I  I   I
              Telephone Number
 Supervisor's Name & Street Address (if different than Job Location)
                                  City (Country)
State
  I
 ZIP Code
I   I   I   I
              Telephone Number
 (SREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUATION SHEET IS USED, SHOW BLOCK *
Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Month/Year Month/Year
To
To
Month/Year Month/Year Code Employer's Name/Military Service/Unemployment or Self-Employment Veri
To
Employer's/Verifier's Street Address
Street Address of Job Location (if different than Employer's Address)
Supervisor's Name & Street Address (if different than Job Location)
PREVIOUS PERIODS OF THE SAME ACTIVITY AND LOCATION - IF CONTINUA1
Your Position Title & Supervisor's Name

ler
City (Country)
City (Country)
City (Country)

Your Position Title
State
1
State
1
State
1
ZIP Code
1 1 1 1
ZIP Code
1 I 1 1
ZIP Code
1 1 1 1
Telephone Number
( )
Telephone Number
( )
Telephone Number
( )
ION SHEET IS USED, SHOW BLOCK *
 Month/Year Month/Year
         To
                      Your Position Title & Supervisor's Name
                                                                        Month/Year Month/Year
                                                                                To
                                                           Your Position Title & Supervisor's Name
         To
                                                                                To
     Month/Year Month/Year
    	To	
                         Code
Employer's Name/Military Service/Unemployment or Self-Employment Verifier
                                                                                                     Your Position Title
 Employer's/Verifier's Street Address
                                   City (Country)
State
  I	
 ZIP Code
I   I   I   I
              Telephone Number
 Street Address of Job Location (if different than Employer's Address)
                                   City (Country)
State
  I
           ZIP Code
              Telephone Number
 Supervisor's Name & Street Address (if different than Job Location)
                                   City (Country)
State
           ZIP Code
          I   I   I   I
              Telephone Number
 PREVIOUS PERIODS OF THE SAME ACTIVITY ANDTOCATION - IF CONTINUATION SHEET IS USED;SHOW BLOCK*
Month/Year Month/Year
Tp
To
Your Position Title & Supervisor's Name

Month/Year Month/Year
To
To
Your Position Title & Supervisor's Name

Enter your Social Security Number -* i i I - i - i i i |
Standard Form 86A (Back)
                                                                                       December 1990

-------
                   TSCA CBI Security Manual           Appendix 4
                                                7700
                                                1/93
    APPLICANT
                              LEAVE BLANK
SIGNATURE Of PERSON FINGERPRINTED
RESIDENCE OF PERSON FINGERPRINTED
DATE     SIGNATURE OF OFFICIAL TAKING FINGERPRINTS
EMPLOYER AND ADDRESS
REASON FINGERPRINTED
                                                             TYPE ®R PRINT ALL INFORMATION IN BLACK
                                                       LASTNAMI NAM
                                                                               FIRST NAME
                                                                                                  MKXX.ENAMI
                                                            ' AKA
                                                       ARMED FORCES NO MNU
                                                       SOCIAL SECURITY NO SOC
                                                       MISCELLANEOUS NO MNU
   i  :ff.:.*.l,  I

EF':.  F-
                                                                                                                 Eft      LEAVE BLANK
                                                                                    CLASS
                                                                                                                     HAIR
                                                                                                                          OATEOFURTH
                                                                                                                                      QQB
                                                                                                                                         '
                                                                                                                           PtACEOFURTH
                                                                                                                                       POB
                                                                                                            LEAVE BLANK
             LEFT FOUR FINGERS TAKEN SIMULTANEOUSLY
                                                                                                     RIGHT FOUR FINGfUS TAKEN SIMULTANEOUSLY

-------
TSCA CBI Security Manual
          I.  LOOP

  THE LINES BETWEEN CENTER OF
  LOOP AND DELTA MUST SHOW
    FEDERAL BUREAU OF INVESTIGATION
UNITED STATES DEPARTMENT OF JUSTICE
                   WASHINGTON, D.C. 20537
                          APPLICANT
         2. WHORL
  THESE LINES RUNNING BETWfcN
       DELTAS MUST 8E CLEAR
           3. ARCH
   ARCH"-' HAVE NO DELTAS
    =0-ZSI(rT». IZZMZt
                                                ro OBTAIN CLASSIFIABLE FINGERPRINTS

                                                I  USE BLACK PRINTER S INK
                                                1  DISTRIBUTE INK EVENLY ON INKING SLAB
                                                3  WASH AND DRY FINGERS THOROUGHLY
                                                »  ROLL FINGERS FROM NAIL TO NAIL AND AVOID ALLOWING FINGERS TO SLIP
                                                5  BE SURE IMPRESSIONS ARE RECORDED IN CORRECT ORDER
                                                6  IF AN AMPUTATION O= DEFORMITY MAKES IT IMPOSSIBLE TO PRINT A FINGER WAKi A NOTATION TO THAT EFFECT
                                                  IN THE INDIVIDUAL FlNOER BLOCK
                                                ^  IF SOME PHYSICAL CONDITION MAKES IT IMPOSSIBLE TO OBTAIN PERFECT IMP«5SIONS SUBMIT THE BEST THA' CAN BE
                                                  OBTAINED WITH A MEWO STAPLED TO THE CARD EXPLAINING THE CmC'jMST ANCES
                                                8  EXAWNE THE COMPLETED PRINTS TO SEE IF THEY CAN Bl CLASSIFIED Sf ASIMOIN MINOIMAT MOST WNGWRINTS
                                                  FALL INTO THE PATTERNS SHOWN ON THIS CARD (OTHER PATTERNS OCCUR IN*REQUENTIY AND ARE NOT SHOWN HERE
                 THIS CARD FOR USE BY:
                 1     LAW ENFORCEMENT AGENCIES  IN FINGERPRINTING  APPLI
                 CANTS FOR LAW ENFORCEMENT POSITIONS •
                 2    OFFICIALS OF STATE AND  LOCAL GOVERNMENTS FOR PUR
                 POSES OF EMPLO/MEN'  LICENSING  AND PERMITS AS AUTHOR
                 IZED  BY  STATE STATUTES AND APPROVED  BY  THE  ATTORNEY
                 GENERAL OF THE  UNi'EO STATES  LOCAL AND COUNTY OR01
                 NANCES  UNLESS  S°Et 'iCAgY  BASED  JN  APPLICABLE  STATE
                 STATUTES DO NOT SATIS" fHIS REOU.KEVENT '
                 5    US  GOvER^'AENt AGENCIES ANO OTHER ENTITIES REQUIRED
                 BY FEDERAL LAW "
                 4    OFFICIALS  OF fECERAUY CHARTERED O«  INSURED  8ANK
                 rNG  INSTITUtigNS  TO  PROMOTE OR MAINTAIN TH{ SECURITY
                 OF THOSE INSTITUTIONS


                 INSTRUCTIONS:
                 •I    PRINTS MUST  FIRST  BE CHECKED  THROUGH THE  APPRO
                 OPIATE STATE IDENTIF.CATION BUREAU AND ONLY THOSE FINGER
                 "RINTS FOR WHICH NO DISQUALIFYING RECORD HAS BEEN FOUND
                 LOCALLY SHOULD BE SUBM'TTEO FOK FBI SEARCH
                 1    PRIVACY ACT OF ">74 

INT CARD TO 'HE FBI i FBI NUMBER IF KNOWN SHOULD ALWAYS BE FURNISHED IN THE APPHOPRiAtt SPACE MISCELLANEOUS NO RECORD OTHER ARMED FORCES NO PASSBORT NO !PP! ALIEN REGISTRATION NO A*l PORT SE CUBITY CARD NO iPSi SELECTIVE SERVICE NO 'S5| VETERANS ADMINISTRATION CLAIM NO (VA) LEAVE TMS SPACE BLANK


-------
 TSCA CBI Security Manual
                                Appendix 5                            7700
                                                                  1/93

              UNITED STATES ENVIRONMENTAL PROTECTION AGENCY

                            WASHINGTON  OC  20460
                                JAN 18 (901
SUBJECT:   Request  for  Building  Pass
FROM:     Ann M.  Linnertz,£Chief
          Security and  Property Management Branch

TO:       Project Officers

     Building  passes are  intended only  to  identify contractors
entering one of the EPA  Headquarters buildings and are not intended
for  contractors to  use as identification to  cash checks,  enter
other government facilities, obtain airline tickets,  rent vehicles
or obtain hotel reservations.

     Building passes will  be issued only to contractor  employees
who work on-site for  24  hours or mor* a week.  Management  personnel
who  periodically visit on-site  personnel   shall  not  be  issued
Building Passes.  Project Officers whose personnel are on-site less
than 24 hours a week  must provide a memoranda-  explaining the need
for a building pass.

     Couriers shall  not be  issued  building passes.

     All information must be typed  or neatly printed on the request
form.  If the printed name  of the  Project Officer  cannot be read,
the form will be  returned without  action.

     The Pass and 10  Office is open from 8:30 an to 3:30 pm, Monday
through Friday  and  operates on  a  first  come  first  serve basis.
Individuals  requiring  building  passes  should  either  bring  the
Request for  Building Pass  with  them or  mail  it to  the Security
Office (PM-215).  Forms will be maintained in  a  suspense file for
30 days after it is received and then returned to sender indicating
that no action was  taken.   If a  request for  a building pass is
handcarried by  the applicant,  it shall be valid only for 30 days
from the date it  is  signed  by the  Project Officer.

     Questions  should  be   addressed  to  the Security  Management
Section at 382-6352.

-------
 TSCA CBI Security Manual
                                                                / /uu
                                                                1/93
SUBJECT:  Request  for Building Pass

FROM:

          Project  Officer

TO:       H. Brooks Haalin, Chief
          Security Management Section

     I request that the  below listed personnel be issued a Building
Pass.  The following data  is furnished:
                         DATl OF BIMM       •OQML/'MMWOMl
CONTRACT NUMBER:  	      EXPIRATION DAT!
NORMAL HOUR* OF WORKI	
SPECIAL ACCESS:  After <:30 pm 	 Weekend 	 Holiday	
LOCATIONS  WSM	 CM-2	 FAIRC1ILD 	 CRYSTAL STATION 	

     I  understand  as  Project  Officer,  I  am  responsible  for
retrieving the above building pass(es)  should:

     1.   The individual(s) transfer or terminate and no longer
          requires access.
     2.   The individual(s) need for access to EPA be changed to
          less than 24-hours  a  week.
     3.   The) contract expires.
PROJECT OFFICER'S  SIGNATURE   TELEPHONE t         MAIL CODE
PC'S ID NUMBER                PO'S DIVISION        DATS

-------
TSCA CBI Security Manual
                                                Appendix 6
                                                          7700
                                                          1/93
                                     United States Environmental Protection Agency
                                             Washington. D.C. 20460
                       Request  for Approval  of  Contractor Access

                       to TSCA Confidential Business Information
Requesting Official
Signature
                                                                                       Date
Title and Office
Contractor and contract number (if modification)
   I. Brief description of contract, including purposes, scope, length, and other important details. (Continue on the back of this form
   if necessary)
   II. What TSCA CBI will be required, and why? (Continue on back if necessary)
 I. Will computer access to TSCA CBI be required by the contract? If so, explain why and to what extent on the back of this form.
   If you approve this request, this office will initiate procedures to ensure compliance with the "TSCA-CBI Security Manual".
                           Approval of the Director, OPPT Information Management Division
Approved (Signature)
                                               Date
EPA Form 7740-17 (Rev. 9-92). Replaces EPA Form 7710-15a, which is obsolete.

-------
TSCA CBI Security Manual Appendix 7 770°
1/Q3
A CDA CONTRACTOR INFORMATION SHEET
OtnH CONTRACTOR TSCA CBI ACCESS/TRANSFER
1 . Contractor Name (list all subcontractors on separate contractor information sheets)
2. Contract
Number
3. Prime
Sub
4. Corporate Address 5. Site Address (where TSCA CBI will be stored)
6. List Previous Contract Number if renewal

7. EPA Project
Officer
8. EPA DOPO/WAM
9. EPA Task Mgr.
10. Contractor
Project Officer
1 1 . Contractor DCO
12. Contractor Alt.
DCO
a) Name






b) Soc. Sec. No.






c) Telephone






d) Address/Mail Code






13. Description of duties to be performed by contractor that require TSCA CBI access (use attachment if necessary):
14. By Section of TSCA, type(s) of data to be accessed:
15a. Will CBI be
transferred off EPA
site under contract?
(Y/N)
17. Desired Date for
access to commence
15b. If CBI will transferred to
a site other than listed in
item 5 above, list site.
18. Access desired until
what date?
1 6a. Has a contractor Security
Certification Statement been
approved by TSCA Security Staff?
(Y/N)
19. Contract Expiration Date
16b. TSCA Security Staff
Facility Inspection Date.
20. Is contract
renewable?
21 . EPA Project Officer Signature and Date
Please return this form with a copy of:
1. Statement of Work, 2. EPA form 7740-17, 3. CBI Clause from contract, and 4. Security Certification Statement
to: U.S. EPA, TSCA CBI Access Staff, TS-790, 401 M Street, SW, Washington, DC 20460
(202-260-1532)
EPA Form 7740-27 (10/92)

-------
 TSCA CBI Security Manual           APPendix 8
                        PROPOSED LANGUAGE

           DATA SECURITY  For TSCA CONFIDENTIAL BUSINESS
           INFORMATION (EP 52.235-120 November 1992)


     The  Contractor shall  handle Toxic  Substances  Control Act
(TSCA) confidential  business information in  accordance with the
contract  clause  entitled  "Treatment of  Confidential  Business
Information"  and  "Screening Business  Information for  Claims of
Confidentiality."

     (a)  The  Contracting officer, after a written determination by
the  appropriate program office,  may disclose  TSCA confidential
business information to the Contractor necessary to carry out the
work required  under  this  contract.   The Contractor shall protect
the  TSCA  confidential  business  information  and  confidential
business information used in its computer operations (once approved
by EPA) in accordance with the following requirements:

           (1)   The  Contractor  and  Contractor's employees   shall
follow the security procedures set forth in the TSCA Confidential
Business Information Security Manual.  The manual may be obtained
from  the   Director,  Information Management  Division,  Office of
Pollution Prevention and Toxics, Environmental Protection Agency,
401 M St.,  S.W., Washington, D. C. 20460. Prior to  receipt of TSCA
CBI by the Contractor, the Contractor will submit a certification
statement  to   the  Director  of  the  EPA, Information  Management
Division, with a copy to the Contracting Officer, certifying that
all employees who will be cleared for access to TSCA confidential
business information have been briefed on the handling,  control and
security requirements set forth in the TSCA Confidential Business
Information Security Manual.

           (2)  The Contractor shall, upon request by  the contracting
officer,  permit access  to  and inspection  of  the  Contractor's
facilities in use under this contract by representatives of  EPA's
Assistant  Administrator for  Administration  and Resources Manage-
ment,  and  the  TSCA Security Staff  in  the  Office  of Pollution
Prevention and Toxics, or by the EPA project officer.

           (3) The Contractor Document Control Officer  (DCO)  shall
obtain a signed copy of EPA Form 7740-6,  " TSCA CBI Access Request,
Agreement, and  Approval" from each  of the  Contractor's employees
who  will  have access to  the  information before the  employee is
allowed access.  In addition, the Contractor will obtain from each
employee who will be cleared for  TSCA CBI  access all information
required by EPA or the U. S. Office of Personnel Management for EPA
to conduct a Minimum Background Investigation (MBI).

-------
TSCA CBI Security Manual                                             7700
                                                             1/93
      (b) The Contractor agrees that these requirements concerning
protection of TSCA confidential business information are included
for the benefit of, and shall be enforceable by, both EPA and any
affected business having a proprietary interest in the information.

      (c)  The Contractor  understands that confidential business
information obtained by EPA under TSCA may not be disclosed except
as authorized by the Act, and that any unauthorized disclosure by
the  Contractor  or  the  Contractor's  employees  may subject  the
Contractor and the Contractor's employees to the criminal penalties
specified  in TSCA  {15  U.S.C.  2613(d)}.   For  purpose  of  this
contract, the only disclosures that EPA authorizes the Contractor
to make  are  those disclosures  set forth in  the  clause entitled
"Treatment of Confidential Business Information."

      (d)  The  Contractor agrees to include  the provisions of this
clause, including this paragraph  (d),  in all subcontracts awarded
pursuant to this contract that require the furnishing of confiden-
tial business information to the subcontractor.

      (e)  At the request of EPA or at  the end  of the contract, the
Contractor shall return  to  EPA all documents, logs, and magnetic
media which contain TSCA CBI. In addition, each Contractor employee
who has  received TSCA CBI clearance  will  sign  EPA Form 7740-18,
"Confidentiality Agreement  for Contractor  Employees  Upon Relin-
quishing TSCA CBI Access Authority".  The Contractor DCO will also
forward those agreements to EPA at the end of the contract.

      (f)    If,  subsequent to the date of  this  contract,  the
Government  changes  the  security  requirements,  the  contracting
officer shall equitably adjust affected provisions of this contract
in accordance with the "Changes" clause when:

           (1)  The Contractor submits  a timely written request for
an equitable adjustment; and

           (2)  The facts warrant an equitable adjustment.

-------
 TSCA CBI Security Manual          Appendix 9                           7700
                                                                1/93


   Confidentiality Agreement for United States Employees
       Upon Relinquishing TSCA CBI Access Authority
In accordance with my official duties as an employee of the United States, I have
had access to Confidential Business Information under the Toxic Substances
Control Act (TSCA, 15 U.S.C. 2601 et seq.). I understand that TSCA Confidential
Business Information may not be disclosed except as  authorized by TSCA or
Agency regulations.
I certify that  I have returned all copies of any materials containing  TSCA
Confidential Business Information in my possession to the appropriate docu-
ment control  officer specified in the procedures set forth in the TSCA Con-
fidential Business Information Security Manual.
I agree  that  I will not remove any copies  of  materials containing  TSCA
Confidential Business Information from the premises of the Agency upon my
termination or transfer.  I further agree that I will not disclose any  TSCA
Confidential  Business Information to any person  after  my termination  or
transfer.
I understand that as an employee of the United States  who has had access to
TSCA Confidential Business Information, under section 14(d) of TSCA (15 U.S.C.
2613(d)) I am liable for a possible fine of up to $5,000 and/or imprisonment for
up to one year if I willfully disclose TSCA Confidential Business Information to
any person.
If I am still employed by the United States, I also understand that I may be subject
to disciplinary action for violation of this agreement.
I am aware that I may be subject to criminal penalties under 18 U.S.C.  1001  if I
have made any statement of material facts knowing that such statement is false
or  if I willfully conceal any material fact.
Name (Please type or print)
Signature
EPA ID Number
Date
EPA Form 7740-16 (10-85) Replaces EPA Form 7710-17,            COPY 1 — TSCA SECURITY STAFF
which is obsolete.

-------
 TSCA CBI Security Manual                                                     7700
                                                                          1/93

                         Privacy Act Statement

Collection of the information on this  form  is authorized  by Section  14 of the Toxic
Substances Control Act (TSCA), 15 USC 2613.  EPA uses this information to  maintain
a record of those persons cleared for access to TSCA Confidential Business Information
(CBI) and to maintain the security of TSCA CBI.

Disclosure of this information may be made to Office of Pollution Prevention and Toxics
(OPPT) contractors in order to carry out functions for EPA compatible with the purpose
for which  this information is collected; to other Federal agencies when they possess
TSCA CBI and need to verify clearance of EPA and EPA contractor employees for
access; to the Department of Justice  when related to litigation or anticipated litigation
involving  the records or the subject matter  of the records; to the appropriate Federal,
State, or  local agency charged with enforcing a statute or regulation, violation of which
is indicated by a record in this system; where necessary, to a State,  Federal, or local
agency maintaining information pertinent to hiring, retention or clearance of an employee,
letting of a contract, or issuance of a grant or other magistrate or administrative tribunal;
to  opposing counsel in the  course of settlement  negotiations;  and to a member of
Congress acting on behalf of an individual to whom records in the system pertain.

Furnishing the  information  on this form, including your Social Security Number, is
voluntary but may prevent the contracting organization from being given access to TSCA
CBI and  may therefore make impossible the performance of  any task which requires
access to TSCA CBI.

-------
 TSCA CBI Security Manual                Appendix 10                              7700
                                                                       1/93
 	fjaaaa >»ad ftpvacy Act Sttttment on ravar*a oa/ar* coavbtmg (hit form.
                               unitad SUMS envwonmantal Protection Aaaocy
                                     Washington. DC 20480
 A f~ M A                           Washington. DC 2O460
t>t rA       Confidentiality Agreement for Contractor Employees
	Upon Relinquishing TSCA CBI Access Authority
Nama ot Emptoyar
                                     D
                             Contractor  LJ Subcontractor
                                                  Contract Numbar
       As an employee of the contractor/subcontractor named above per-
       forming work for the United States, I have been authorized access to
       confidential  business  information (CBI) submitted under the Toxic
       Substances Control Act (TSCA) (15 USC Section 2601 et seq.). This
       access authority was granted to me in order to perform my work under
       the contract number cited above.

       I understand that TSCA CBI to which I have had access under the
       contract may be used only for the purposes of performing the contract. I
       also understand that TSCA CBI may not be disclosed except as autho-
       rized by TSCA or EPA regulation.

       I certify that I have returned all copies of TSCA CBI materials in my
       possession to either the appropriate document control officer specified
       in the EPA-approved security plan in effect at my company or an EPA
       TSCA document control officer.

       I agree that I will not remove any copies of materials containing TSCA
       CBI from the premises  of my company or from EPA premises upon my
       relinquishment of TSCA CBI access authority. I further agree that I will
       not disclose any TSCA CBI to any person after my relinquishment of
       TSCA CBI access authority.

       I understand that as a  contractor employee who has been authorized
       access to TSCA CBI, under Section 14
-------
TSCA CBI Security Manual                        Appendix 11

  Please read Privacy Act Statement on reverse before completing. 	
                                                                                                7700
                                                                                                1/93
 AEPA
                 United States Environmental Protection Agency
                           Washington, DC 20460
    Employee Separation or Transfer Checklist
                                                                                                   Social Security Number
                                         Part 1.  To Be Completed by Employee
Employee Name
                                     Current Organization and Location
                                                                                                   Effective Date
Type of Action

    Separation from Government

    Transfer to Other Government Unit
                                     Address (Forwarding or that of gaining Government unit or agency)
 Reason for Leaving
                          Part 2.  Responsible Officials Must Complete All Items in this Part
 Please clear the above-named employee. Final salary payment and application for retirement will be delayed until clearance is completed.
                                Item
                                                                        Clearance
                                                                       Yes
                                                                          Signature and Date
 Payroll/Travel
                    Advance Leave
                    LWOP/Health Benefits
                    Outstanding Travel Advance
                    Outstanding Travel Voucher
                    GTR/Airline Ticket
                    Diners' Club (TM) Credit Card
                    Permanent Change of Station Requirements
                    Imprest Fund
                    Jury Duty Fees
                    Salary Checks
 Personnel
                    Training Termination Statements
                    Completion of Employment Agreements
 Other
                    Library Issuances
                    Security Termination Statements
                    Audiovisual Equipment
                    EPA ID Card
 Security/
 Facilities
Keys
                    Parking Permit
                    Special Credentials
                                           Part 3.  Certification and Clearance
 The Administrative Officer/Supervisor must certify that the above-named employee has accounted for the items listed below.
                      Item
                                                   Clearance
                                                                                    Item
                                                                                            Clearance
 Personal property
                                           CBI documents
 Telephone credit cards
                                           NCC computer user ID
 Property pass(es)
                                           U.S.-Government-lssued Credit Card(s)
 SF-44, Purchase Orders
                                           Official Passport (If yes, phone QIA/Passport Office)
    Cleared
    Not Cleared (Explain under Remarks)
                                                  Signature of Administrative Officer or Supervisor
Remarks
                                                        Certification
        I certify that the statements I have made on this form and all attachments thereto are true, accurate, and complete. I acknowledge
        that any knowingly false or misleading statement may be punishable by fine or imprisonment or both under applicable law.
                                                    Employee Certification
I certify that all U.S. Government property (including an official passport) and records have been returned (Signature)
                                                                               Date
                                           Personnel Office Affirmation of Clearance
Signature of Servicing Personnel Office
                             Title
                                                                                                    Date
EPA Form 3110-1 (Rev. 2-88)  Previous editions are obsolete.
                                                                       Original .... Personnel
                                                                       Copy....  Payroll

-------
                          Privacy Act Statement

Authority

Social Security Number: Executive Order 9397 dated November 22,1943.

Forwarding Address: Reorganization Plan Number 3 of December 2,1970.

Purposes and Uses

Social Security Number: Disclosure by you of your Social Security Number (SSN) is voluntary. It will
be used to properly identify your records on file with the U.S. EPA in various program areas from which
you are obtaining certification of clearance. The information gathered will be used only as needed to
complete the clearance process as required by EPA Order 3110.5A.

Forwarding Address: Disclosure by you of your forwarding address is voluntary. It will be used in
forwarding official papers or appropriate information, and to mail documents to you or to a gaining
Government unit or agency.

Effects of Nondisclosure

Social Security Number: Withholding the SSN will cause a delay in the separation process or may result
in your not being cleared for separation.

Forwarding Address: Withholding the forwarding address will cause a delay in the separation process
or may deter your receipt of outstanding paychecks or other authorized documents.
 EPA Form 3110-1 (Rev. 2-88)

-------
TSCA CBI Security Manual

                                                                1/93
                                Appendix 12
                            TSCA «5HRB2aiAL
                                     E£;s}£M?J10
                         DOES NOT CONTAIN NATIONAL
                       ^FCURITY INFORMATION  (E.O. 12065'

-------
  iii"i<
   !"
    '"!
   >'!
     !"'
    >> !'
   1  n l|
   ID EPA
                  United States Environmental Protection Agency
                         Washington, DC 20460
       Document Description
                                          Date
       CONFIDENTIAL
              TOXIC SUBSTANCES CONTROL ACT
           CONFIDENTIAL BUSINESS INFORMATION

              Does not contain National Security Information (E.O. 12065)
           The attached document contains Confidential Business Information obtained
           under the Toxic Substances Control Act (TSCA 15 U.S.C. 2601 et seq.)
           TSCA Confidential Business Information may not be disclosed further or
           copied by you except as authorized in the procedures set forth in the TSCA
           Confidential Business Information Security Manual.

           If you willfully disclose TSCA Confidential Business Information to any
           person not authorized to receive it, you may be liable under section 14(d) of
           TSCA (15 U.S.C. 2613(d)) for a possible fine up to $5,000 and/or imprison-
           ment for up to one year.  In addition, disclosure of TSCA Confidential
           Business Information or violation of the procedures cited above may subject
           you to disciplinary action with penalties ranging up to and including dis-
           missal.
       CONFIDENTIAI
          'V!
               ! } i
               1 ;
  EPA Form 7740-9 (rev. 10/92) Previous edition is obsolete
111!
ill

-------
TSCA CBI Security Manual Appendix 14 770°
1/93
United States Environmental Protection Agency
fl Washington, DC 20460
OC PA TSCA CBI Visitors Loa
Individual's Name


















Organization


















Date


















Time


















Purpose of Visit


















EPA Form 7740-1 3 (10-85)

-------
TSCA CBI Security Manual
Appendix 15
7700
1/93
























































































































































































































































































































































3
o D
l$
§
3
?§
11
33
"" c
?f
(Q CT
CD CD
(rt ""•

"m
ct
O
O
TJ
| ^
m g

> 5-
O §.
I -
_CD 3
o 3
0)
a
w
s;







o
CD
q
T3'
o'






C
&
fi>
^^
m
sS
^^H^^^^


s
"n «
3g
3
H «'
£> g.
> 5?
n i?
o S
& 30 g1
o. m 3
CD '" *•
s o §•
E 
O Cfp
3 2
3
O


CO O
§Q
(D
is
3 O
*J* ^J
^j «5
7 z
j^~
P 1.

1

-------
TSCA CBI Security Manual
Appendix 16
7700
1/93
















































































































































































































































































































































































































































o
|o
o
o
o
2
3
O (D
0 3
•S o
z °
c 3
3 3
IT —
5 z
^ C
3
cr
o>
m
-0
6
z
c
3
o-
CD
C
tn
1
§
C £.
OT ??•
 g5
O g
O ^^T ^3

""^i ^£ W
5. ** 2
g 
o era
3 2
3
0
*-<


CO O
f» o
Q 
S

-------
TSCA CBI Security Manual
Appendix 17
7700
1/93
United States Environmental Protection Agency
Washington, DC 20460
cy P PA Temporary Loan Receipt for TSCA
Confidential Business Information
1 acknowledge receipt of the following documents containing
TSCA Confidential Business Information
1 . DCN/Copy Number
2. OCN/Copy Number
3. DCN/Copy Number
4. DCN/Copy Number
5. DCN/Copy Number
6. DCN/Copy Number
7. DCN/Copy Number
Date Loaned
Name of Recipient
Description
Description
Description
Description
Description
Description
Description
Name of Lender
Signature of Recipient
Instructions
1 . To be used only for temporary transfer of TSCA
CBI. Transfers for more than thirty (30) days must
be made through a DCO.
2. The lender must keep the original of this form
after it has been completed and signed by the recip-
ient, and give the copy to the recipient.
3. The lender must give his or her copy of this form
to the recipient when the recipient returns the doc-
ument^) to the lender. The recipient should destroy
both copies.
         EPA Form 7740-14 (10-85) Replaces EPA Form 7710-44. which is obsolete

-------
 TSCA CBI Security Manual
            Appendix 18
7700
1/93
                     United States Environmental Protection Agency
                              Washington, DC 20460
                    Permanent Transfer Receipt for TSCA
                       Confidential Business Information
               I acknowledge receipt of the following documents containing
                       TSCA Confidential Business Information.
 1. DCN/Copy Number    Description
 2. DCN/Copy Number
Description
 3. DCN/Copy Number
Description
 4. DCN/Copy Number
Description
 5. DCN/Copy Number
Description
 6TDCN/Copy Number
Description
 7. DCN/Copy Number
Description
 8. DCN/Copy Number
Description
 Date of transfer
Name of Sending DCO/DCA
 Name of Recipient
Signature of Recipient DCO/DCA
                              INSTRUCTIONS

    1. To be used only for permanent transfer of TSCA CBI. Transfers must be made by a
    DCO/DCA.

    2.The sending DCO/DCA must keep the original of this form after it has been signed and
    returned by the recipient DCO/DCA. The Recipient DCO/DCA must keep a copy of the
    receipt after returning the original to the sending DCO/DCA.
EPA Form 7740-26 (10/92)

-------
 TSCA CBI Security Manual
                         Appendix 19
                                                                                                 1/93
                                  United States Environmental Protection Agency
                                           Washington, DC 20460
               Memorandum of TSCA CBI Telephone Conversation
                                        I. EPA Employee Identification
Name of Employee
                                                              Date
Organization
                                                              Time
                                        II. Second Party Identification
Call Is
   DTO   D
              From
                     Name
Number
Organization
III. Concerning what TSCA CBI?
IV. Content
EPA Form 7740-12 (10-85)

-------
   TSCA CBI Security Manual
Appendix 20
7700

1/93
m
T3
























































































































































































































































































































































































































































































s
«a O
a> 9>
P
O
0
8
3
§•§
||
""" c
3
o-

2, 2
"O 5
P) 3
(O ty
(D '

|o
3 m

Q.
5" O
s: o
a o
(o
m
fcJU
^^B^^^ta
m^^p
^^H^^^

•£ a
» 2"
= H

a *" Q.
= S (D
3_

(Q
Ig
i i %^^ ^~|*
" j ^« rt

/•^ ^^
!>• o ^
— i P
^ <3 o
3 T ^L
g —
g Q.^3
i— i 
o c ^
3 "^ 3
•^ o
C/)^<
(5*
3
O
c
r-
o
(Q

^J O
2 o
O (D
i. ^
•< 0
If
2. 5'
i'f
T?i o

P S.
0
•52


-------
TSCA CBI Security Manual
Appendix 21
7700
1/93
United States Environmental Protection Agency
Washington, DC 20460
V>EPA TSCA CBI Security Manual Update Transmittal Sheet
Transmittal Number

















Date Received

















Page(s) Replaced

















Date and Initials

















EPA Form 7740-23 (10/92)

-------
TSCA CBI Security Manual
            Appendix 22
SIGNA
RE
   I
   O

   m
             a H
             o X
             g£
             HH W

n
G

W
z
H
               E
               00
W
O

W

H
ffi
W
               00
               O

               w
               >
               O
    ta
    o
    §
                                3
                                W
                                fa

                                n
                                o
                                o-
                                 r o
                                CD" ^
                                  c
                                CD Hi.
                                00

                        z u
                                              c^ 2j
                                              GO ^
                                              2 3
                                                f
                               _ D
                               ^\ *"*
                               o  "
                                              o
                                                              J/93
                                            C
                                          H ^-
                                       O  oo 2
                                       o  O a
                                       0  h  00
                                       ill
                                       l»i
                                         H
                                       ~  » 2
                                       ^"  o5 £«•
                                       h^rf;  ^^ L.^1 •
                                       0  3 °

                                       Is. >
                                       o  o cro
                                          3 2
                                           
-------
U.S. Environmental Protection Agency
Region 5, Li  ' -V /L-12J)
77 West Jackvon Boulevarjd, 12th Floor
Chicago, 1L  60604-3590

-------