CONTRACTOR REQUIREMENTS
          FOR THE
 CONTROL AND  SECURITY OF
    TSCA CONFIDENTIAL
   BUSINESS  INFORMATION

          October 1981
 United States Environmental Protection Agency
       Washington, D.C. 20460

-------
                                    Preface
     Contractor Requirements for the Control and Security of TSCA Confidential
Business  Information deals with  a  serious  obligation  EPA contractors  have
under  the  Toxic  Substances  Control Act  (TSCA)—the  need to  protect  TSCA
Confidential Business  Information  from  unauthorized disclosure.    It  outlines
security requirements that must be met by all EPA contractors who will receive
TSCA Confidential Business Information.

     TSCA requires industry to entrust large amounts of data to EPA concerning
the  tens  of  thousands  of  chemical   substances  in  U.S.  commerce.    This
information  has  never been compiled in such  a complete  way  before, and  it
forms the basis  for  EPA's ability to carry  out TSCA's  preventive approach  to
minimizing the health and environmental risks of toxic chemicals.  EPA in turn
must often entrust these data to our contractors.

     Some of these industry data  are claimed as  "confidential,"  meaning that
they  involve trade  secrets  or other  kinds of  information that  one company
doesn't want  another to have.   Understandably, industry  has  expressed  great
concern about EPA's  ability to  protect  confidential  business information from
unauthorized disclosure.

     It is  vitally  important  to  the successful  implementation  of TSCA that
confidential business  information submitted  to  EPA  by industry not  be
disclosed  in  an unauthorized  manner,   either  by  Agency  employees  or
contractors. To  ensure  that  this  doesn't  happen,  EPA  has developed  strict
security procedures  to protect  TSCA  Confidential  Business Information and'has
developed a training  program  to  familiarize  all EPA  employees with  their
responsibilities  and with  the consequences  of  failure   to  comply  with  the
security procedures.   EPA's basic  security  requirement  for its contractors  is
that they provide at least the same degree of protection for TSCA Confidential
Business Information as EPA does.

     The EPA Data Security Task Force has  developed  these Contractor  Security
Requirements after reviewing  suggestions and comments  from throughout EPA and
from  the  public,  including  contractors  themselves.   I  '"believe that  these
requirements properly  balance  the  need for data  security with  the  need for
access to the data.

     However, any security system  is only  as good as the  people  who  maintain
it.   It takes  all of us working  together  to make it succeed.   Any one  of  us
acting carelessly or negligently would cause us to fail.  Therefore, employees
must study  and learn the  procedures  developed by their  companies and  approved
by EPA.
                                     111

-------
     While  I  don't wish  to overemphasize  this  point,  TSCA  provides strict
criminal  penalties  for any  person who  discloses this  confidential business
information in a knowing and unauthorized way.   EPA  has  gone on public record
with the  promise  to prosecute  any acts of  wrongful  disclosure to the fullest
extent of the law.

     We are counting on our contractors to help us make this system work.
                JW
Date                                  Warren R. Muir
                                      Deputy Assistant Administrator
                                        for Toxic Substances
                                     IV

-------
                                 Contents
PREFACE	iii
GLOSSARY OF ACRONYMS	vii
BASIC REQUIREMENT	   ix

   I. GENERAL	.  .  .  .	    1

       A.   Purpose	    1
       B.   Policy		    1
       C.   Penalties for Violations	    1
       D.   Security Violation  ...  	    2
       E.   Procedures for Handling
           Security Violations  .....  	    2
       F.   Definitions 	    2
  II. RESPONSIBILITIES   .	    5

       A.   Deputy Assistant Administrator for
           Toxic Substances (DAA/OTS)   	  .....    5
       B.   Division Directors  	    5
       C.   Contracts Management Division  .  	    5
       D.   Project Officers  	    6
       E.   Office of the Inspector General	    6
       F.   Director, Management Information
           and Data Systems Division	    6
       G.   Contractor Document
           Control Officers  ........  	  ...    7
       H.   Contractor Employees	    8
  HI. PROCEDURES FOR AWARD OR MODIFICATION OF CONTRACTS INVOLVING
     THE USE OF TSCA CBI	    9


  IV. CONTRACTOR SECURITY PROCEDURES	'	   11

       A.  Security Plans  .....  	   11
       B.  Transfer of TSCA CBI to Contractor	   16
       C.  Notification of Affected .Business	   16
       D.  Audits	   17
       E.  Termination Inventory	   17
       F.  Physical Security 	   17
       G.  Contractor Acquired CBI	   17
       H.  Return  of CBI to EPA	   17
       I.  Additional Requirements ..  	   17

-------
                               Contents (cont.)
                                                                         Page

   V. COMPUTER SECURITY	.  .  .    19

       A.  Special Rules for Contractor Computer Use 	    19
       B.  Security Requirements  for
           Contractor Computer Centers  	    20
APPENDIX I:    TREATMENT OF CONFIDENTIAL
               BUSINESS INFORMATION	   25

APPENDIX II:    SECURITY REQUIREMENTS  FOR
               HANDLING TSCA CONFIDENTIAL
               BUSINESS INFORMATION	   27

APPENDIX in:   COMPUTER SECURITY	   29

APPENDIX IV:   SCREENING BUSINESS INFORMATION
               FOR CLAIMS OF CONFIDENTIALITY 	   31

APPENDIX V:    TSCA CONTRACTOR EMPLOYEE
               CONFIDENTIALITY. AGREEMENT	   33

APPENDIX VI:   CONFIDENTIALITY AGREEMENT FOR
               CONTRACTOR EMPLOYEES UPON
               TERMINATION OR TRANSFER ........  	   35

APPENDIX VII:  REQUEST FOR APPROVAL OF. CONTRACTOR
               ACCESS TO TSCA CONFIDENTIAL
               BUSINESS INFORMATION   ........  	   37

INDEX	  ...  .  .	   41

-------
                         Glossary of Acronyms
AA/OPTS     Assistant Administrator for Pesticides and Toxic Substances




ADP         Automated Data Processing




            Confidential Business Information




            Contracts Management Division




CFR         Code of Federal Regulations




DAA/OTS     Deputy Assistant Administrator for Toxic Substances




DCA         Document Control Assistant




DCO         Document Control Officer




DOJ         Department of Justice




EPA         United States Environmental Protection Agency




FSSD        Facilities and Support Services Division




IAG         Interagency Agreement




MIDSD       Management Information and Data Systems Division




OGC         Office of General Counsel




OIG         Office of the Inspector General




OPTS        Office of Pesticides and Toxic Substances




TSCA        Toxic Substances Control Act
                                   VII

-------
                       Basic Requirement
EPA's basic security requirement  for  its  contractors* is that they
provide at least the same degree of protection of TSCA Confidential
Business  Information as  that described in  EPA's TSCA Confidential
Business Information Security Manual.

It  is  vitally  important  to the  successful implementation  of the
Toxic Substances Control  Act (TSCA)  that EPA  ensure  that TSCA CBI
is not disclosed in an unauthorized manner.

EPA has  developed  strict security procedures  to protect  TSCA CBI
and  has  developed  a  training  program  to   familiarize  all  EPA
employees with  their responsibilities  and with the  consequences of
failure  to  comply  with the  requirements  of the TSCA Confidential
Business Information Security Manual-

Our  contractors must  meet  the  same  high  standards  we set  for
ourselves.
*Note:  For  the  purposes  of  this document, "contractor" shall mean
contractor or  subcontractor  and "contract"  shall  mean contract or
subcontract.
                                 IX

-------
                                  I. General
A. Purpose

These procedures prescribe minimum  standards  and establish responsibility and
accountability for the control  and  security of documents and computer systems
that contain confidential business  information (CBI)  received under the Toxic
Substances Control  Act  (TSCA)  (15  U.S.C.  § 2601 et  seq.)  and  furnished to a
contractor to perform work under an EPA contract.
B. Policy

EPA recognizes the trust placed  in it by the  submitters of TSCA Confidential
Business Information.  It is the policy of EPA to take all reasonable measures
to prevent  the  unauthorized disclosure of such  information.   EPA contractors
are prohibited  from  disclosing  any  TSCA CBI except in accordance  with the
terms of the  contract under which  they receive the  information.   TSCA CBI is
to be  held in confidence and  handled in accordance with contractor security
procedures approved by EPA.

EPA furnishes TSCA  CBI to EPA contractors  only  when  such  information  is
necessary  for  the  performance  of  the  work  specified  in  the contract.
Disclosures to  contractors  will be made  only when  the  procedures in  40 CFR
Part 2  have been followed,  when the  contract contains  the required clauses,
and when the procedures set forth in this document have been followed.
C. Penalties for Violations

Unauthorized  disclosure of  TSCA CBI  may  subject a  contractor  employee  to
criminal penalties under TSCA Section 14(d) as follows:

    Criminal Penalty for Wrongful Disclosure—

    (1) Any officer or employee of the United States or former officer or
    employee of  the  United States,  who by virtue of  such employment or
    official  position  has  obtained  possession  of,   or  has  access  to,
    material the disclosure of which is prohibited by  subsection (a), and
    who knowing  that disclosure of  such  material is  prohibited by such
    subsection,  willfully  discloses the  material in  any manner  to  any
    person not entitled to receive it, shall be guilty of misdemeanor and
    fined not more than $5,000 or imprisoned  for  not  more than one year,
    or both. . . .

    (2) For the purposes of paragraph (1), any contractor with the United
    States  who  is   furnished  information  as  authorized by  subsection
    14(a)(2), and any employee of such contractor, shall be considered to
    be an employee of the United States.

-------
Also,  violations  of these  procedures by  contractor employees  may result in
removal from the Authorized Access List and disciplinary  action  with penalties
up  to and  including  dismissal,  under  conduct  and discipline  policies and
procedures that must be developed by the contractor.
D. Security Violations

If  a contractor discovers  or has  reason to  believe  that there has  been a
violation  of  the  contractor  security  provisions,  the contractor  DCO must
report  the  circumstances  to  the EPA  Project  Officer who  will  report  the
suspected  violation  to  the OIG  and  Chief,  ICB.   The  contractor must  allow
representatives of EPA to investigate such violations and must  cooperate  fully
and ensure the cooperation of its employees.


E. Procedures for Handling Violations

Upon receipt of  any allegation that  a contractor  or contractor  employee  has
violated  procedural  requirements under  the  terms  of the  contract concerning
security of TSCA CBI, the OIG shall initiate an  investigation.

In those  cases of  violation of  contract security provisions where there  is no
evidence  of  a criminal  violation,  the  OGI  shall  report  the  results  of  the
investigation to the DAA/OTS, CMD, and OGC.  The DAA/OTS shall,  in conjunction
with CMD and OGC,  initiate  appropriate  action under  the terms of  the contract
and in accordance with 40 CFR Part 2.

If the  investigation  by  the OIG indicates that  a  criminal violation has been
committed, the investigation shall  be referred  to  the Department of Justice.
When the Department of Justice assumes investigative  jurisdiction, any  further
action, including  notification  to the business  making the claim  of CBI, will
be dictated by them.

The DAA/OTS,  in  concert  with OGC and CMD, shall notify the affected business
of  the  circumstances and  the firm's  legal  rights under the  contract in  all
cases except those referred  to  the  Department of Justice.  The  cases referred
to the  Department  of Justice require that Department's approval  prior to  the
release of any of the investigative data to the  business.


F. Definitions

Access  is  the  ability and opportunity to gain knowledge of TSCA  Confidential
Business Information  (in any manner whatsoever).

An ADP  Application Security Plan is  a formal documented plan  that  addresses
the  administrative,   technical,   and  physical controls required  during each
phase in the life cycle of an application system processing TSCA CBI.

An Authorised Computer Facility is an EPA or contractor computer facility that
meets EPA  security standards.

-------
An Authorised Person is  any  employee  authorized by the  contractor  for  access
to TSCA CBI.

A Computer Center Security Plan is a formal documented plan that addresses the
administrative, technical, and physical controls required  to  protect  TSCA CBI
within the data center.

Confidential Business  Information  is  any  information in any  form  received by
EPA or an EPA contractor  from  any  person,  business,  partnership,  corporation,
or association;  local, State,  or  Federal  agency,  or foreign  government  that
contains trade secrets or commercial  or financial information, that  has  been
claimed as  confidential  by the person  submitting  it, and  that has  not  been
determined to be nonconfidential under the procedures in 40 CFR Part 2.

A Contractor is  any person,  association,  partnership,  corporation,  business,
educational institution,  governmental body, or  other entity  performing  work
for  EPA  under  a contract with EPA.   In  this  document   "contractor"  means
contractor or subcontractor.

A Contractor Computer  Document Control Officer is a  document control officer
(DCO) within a  contractor computer facility responsible for  the  security and
control of TSCA CBI contained in the computer facility.

A Contractor  Document  Control Officer  is  a person appointed  by  a  contractor
who is responsible for the security, control, and distribution of all  TSCA CBI
in the possession of the contractor.

A Document  is  any  recorded  information regardless  of  its  physical  form  or
characteristics, including, without limitation,  written or printed material;
data  processing  card  decks,  printouts,  and tapes;  maps;   charts;  paintings;
photographs; drawings;  engravings; sketches; samples;  working notes  and
papers;  reproductions  of  such things  by  any means  or process;  and  sound,
voice, or electronic recordings in any form.

A Document  Control Number is  the  unique  number assigned  by  an EPA  Document
Control Officer  (DCO), a  contractor DCO, or through  computer  system numbering
to a document containing TSCA CBI.

A Document Control Officer (EPA) is a person designated in, accordance  with the
requirements of  the  TSCA  Confidential Business Information Security Manual to
be responsible  for the security,  control,  and distribution  of all  TSCA  CBI
received by him/her.

Information is knowledge that can be communicated by any means.

The Project Officer  (EPA) is  the person responsible for serving as coordinator
in all matters relating to the security, control,  and distribution of  TSCA CBI
during the performance of a contract.

A  Secure Facility  is  a  building  or portion  of  a  building  that  meets  the
requirements  of  this  Manual  for  handling TSCA Confidential  Business
Information and has been approved by the Information Central Branch (ICB).

-------
A Secure Room or  area  is  a room or area which meets  the requirements of this
Manual for storage and/or use of TSCA CBI and has been approved by the ICB.

A Security Plan is a set  °f  security  procedures  developed by a contractor and
approved by ICB that provides  at least the same degree of protection as EPA's
TSCA Confidential Business Information Security Manual*

A  Violation  is the  failure to  comply with any provision in  the contractor
security  plan  whether or  not  such  failure  leads   to actual  unauthorized
disclosure of TSCA Confidential Business Information.

-------
                               II. Responsibilities
A. Deputy Assistant Administrator for Toxic Substances (DAA/OTS)

The DAA/OTS is responsible for approving all contractors  who will  receive TSCA
CBI,  and  for approving  the  Computer  Center Security  Plans and ADP  Security
Plans submitted by those contractors.

In the event of violations, the  DAA/OTS shall  take appropriate action  in all
cases  in  which there  is  no  evidence  of  criminal violation.   In all  cases
except those referred to the Department of Justice, the  DAA/OTS shall notify,
in concert  with  OGC and CMD,  the affected  business of  the  circumstances and
the business1  legal rights under the  contract.    The  cases  referred to  the
Department of Justice require  that  Department's approval prior to  the release
of any of the investigative data to an  affected business.
B. Division Directors

Division Directors are responsible  for  initiating requests for contractors  to
have access  to TSCA CBI, subject to  the approval of  the DAA/OTS.  The  form,
Request  for Approval  of  Contractor  Access  to  TSCA  Confidential  Business
Information  (Appendix  VII),   is  filled  out  for  this  purpose.    Division
Directors also appoint a project officer for  each contract involving the  use
of TSCA CBI.
C. Contracts Management Division (CMD)

The Director, CMD, Cincinnati; the  Director, CMD, Research Triangle. Park;  and
the Chief, Headquarters Contract Operations, under the overall  supervision of
the Director  of the Contracts Management Division,  share the  responsibility
for administering procurement actions and contracts under  which  TSCA CBI  is to
be furnished to a contractor to perform specific  work.

They must  ensure  that the proper  clauses and  provisions  are included in  all
contracts or RFPs that would involve access  to  or handling of TSCA CBI:

    •    The Treatment of  Confidential Business  Information  clause  (Appendix
         I), the Security Requirements for Handling TSCA Confidential 'Business
         Information clause  (Appendix  II),  and any other  clauses  requested by
         a program office must be  included  in  any  contract  or RFP  that  would
         involve the handling of TSCA CBI.

    •    The Computer Security clause  (Appendix  III)  must be included in  any
         contract or RFP that would involve the  introduction  of TSCA CBI into
         a contractor's computer.

    •    The  Screening Business  Information   for  Claims of Confidentiality
         clause (Appendix IV) must be included  in any  contract or  RFP in  which

-------
         a  contractor  would  be  required  to  collect  CBI  directly  from  a
         business.

         The proper provisions must be included in any RFP  for a contract that
         permits contractor access to TSCA CBI.

         CMD also evaluates proposals submitted by offerers or contractors and
         evaluates  any potential  organizational  conflicts of  interest that
         might  preclude handling of  TSCA Confidential  Business Information.
         In their evaluation,  they  will  take into consideration the  offerer's
         or contractor's  past  performance on similar  contracts  that involved
         the'handling of  CBI or other information of a sensitive nature, such
         as national defense information or privacy information.
D. Project Officers    .

EPA Project Officers  are  responsible  for coordination between elements of EPA
and the contractor on matters relating to the security and control of TSCA CBI
during the performance  of the  contract.   They  also  assist  CMD in considering
possible conflicts  of interest and past performance on  similar contracts by
the contractor or offerer.   -  .

Project  Officers are  also responsible  for ensuring  that  the  contractor is
ready to be  inspected prior to OIG performing  the inspections, arranging for
the  transfer  of  the  data  to  the  contractor,  and reporting all  alleged
violations of  contract  security provisions  to his/her Division Director, OIG,
and ICB.
E. Office of the Inspector General (OIG)

The OIG has  the inspection and review  responsibility for all contractors and
offerers   involved  in the  receipt,  -handling,  and storage of  TSCA  CBI.
Personnel from OIG:

    •    Review contractor security plans

    •    Inspect contractor facilities prior to the receip.t of TSCA CBI and on
         a periodic  basis,  announced  and  unannounced,  thereafter  to ensure
         compliance with security requirements

    •    Review employee training programs as specified in Chapter IV.

    •    Investigate  alleged wrongful  disclosures  of TSCA  CBI and certain
         other  serious violations by  the  contractor.   If  such investigation
         discloses that a possible criminal violation  has occurred, the matter
         will be referred to the Department of Justice.


F. Director, Management Information and Data Systems Division (MIDSD)

The Director  of  the  Management Information and  Data Systems Division (MIDSD)
will, upon request,  review and  comment on  contractor  ADP application  security

-------
plans,  and  assist the  OIG  in conducting  inspections of  contractor  computer
facilities for compliance with security requirements.
G. Contractor Document Control Officers

Contractor  Document  Control Officers  (DCOs)  are responsible  for controlling
TSCA  CBI  in  the possession  of  the  contractor.    Specifically,  their
responsibilities include:    -           .

    •    Serving  as   a  contact  person for  EPA  regarding  the   security  and
         control of TSCA.CBI while it is in the possession of the contractor.

    •    Conducting periodic audits of the contractor's security system.

    •    Maintaining  a  list of  contractor personnel  who are authorized  for
         access to TSCA  CBI,  including those authorized  for  computer  access,
         and releasing TSCA CBI only to such persons.

    •    Keeping on  file in a  secure manner  a record  of  the  locations  and
         .combinations of all locks, safes, and cabinets that contain TSCA  CBI,
         and ensuring that such combinations are  changed annually or whenever
         anyone who  knows  the combination terminates  or transfers,  whichever
         comes first.

    •    Obtaining a signed TSCA Contractor Employee Confidentiality Agreement
         (Appendix V)  from each- contractor .employee  who will have  access  to
         TSCA CBI before the employee is granted access.

   _• 	Obtaining assigned.Confidentiality,.'Agreement for. Contractor.Employees
         Upon  Termination  or  Transfer (Appendix  VI)  for  any   employee  who
         terminates or  transfers  to a position not requiring access to  TSCA
         CBI.

    •    The  original of  this  form  will  be  forwarded  to the  Information
         Control Branch and will be the basis for removing the individual  from
         the EPA TSCA CBI Access List.

    •    Logging  all   TSCA   CBI   received   or   generated,   including
         computer-generated printouts.

    •    Assigning  document control   numbers,  attaching  cover  sheets,   and
         properly  marking  all  documents  containing  TSCA CBI whenever  these
         things have not already been done.

    •    Releasing TSCA CBI only to employees authorized for access.

    •    Ensuring that TSCA CBI is properly stored when not in use.

    •    Authorizing and supervising  the  reproduction and destruction of  TSCA
         CBI.

-------
         Reporting all alleged violations of contractor  security procedures to
         the EPA Project Officer immediately.

         Maintaining a copy of the EPA-provided TSCA CBI Access List.
H. Contractor Employees

Contractor employees are responsible  for  the control and security of all TSCA
CBI received by them.  Specifically, their responsibilities include:

    •    Discussing TSCA CBI only with  authorized employees of the contractor
         or of EPA.

    •    Storing TSCA CBI as specified in Chapter IV.A.3 of this document when
       '  not in use or at the close of business.

    •    Safeguarding  TSCA  CBI  when  in  actual use  as  specified  in Chapter
         IV.A.5 of this document.

    •    Safeguarding combinations to locks, safes, and rooms that secure TSCA
         CBI.

    •    Reporting  alleged  violations  of   the  security  procedures  to  the
         contractor DCO.

    •    Giving  all TSCA  CBI  to  the. contractor  DCO  for  reproduction  or
         destruction and recording in the appropriate log.

    •    Refraining from discussions  of TSCA CBI on the  telephone.except with
         the  permission of  and following  guidelines  provided by the  EPA
         Project Officer.

-------
            III. Procedures for Award or Modification of Contracts
                       Involving the Use of TSCA CBI
The step-by-step procedure described here  must be followed  for a contractor to
become authorized for receipt of TSCA CBI.

1.  When an EPA program office decides,to  initiate a  contract (or to modify an
    existing contract)  that will  require  contractor  access  to TSCA  CBI to
    perform the  work,  the  appropriate Division  Director  or  equivalent  (or
    above) must  request  approval for such access  from the DAA/OTS using the
    form,  Request  for Approval of  Contractor  Access  to  TSCA Confidential
    Business  Information  (Appendix  VII).    The DAA/OTS will  approve or
    disapprove the request and notify the  requester.

2.  If the DAA/OTS approves the request, the Project Officer will send a copy
    of the approval to CMD.  This will  be  CMD's  signal  to  include  in the RFP
    (or modification) this  document,  -Contractor Requirements  for the Control
  •  and  Security of  TSCA Confidential Business Information,   including  the
    following contract clauses,  as  appropriate:

    •    Treatment of Confidential  Business Information  (Appendix I).

    •    Security Requirements for Handling Confidential Business Information
         (Appendix II).

    •    Computer Security (Appendix III).

    •    Screening Business. Information for  Claims of  Confidentiality
         (Appendix IV).

3.  Offerers  (or contractors,  in  the case  of  modifications)  will  submit
    Security Plans to CMD, who will,  in turn,  submit  them to the OIG.  The OIG
    will review the plans to  determine  if  they meet the minimum requirements
    of this Manual and forward  them to ICB.   No technical evaluation (in the
    case of offerers)  will be done until the security plan is approved by the
    ICB.

4.  In evaluating the proposals, CMD and the program office will evaluate any
    potential  organizational  conflicts  of interest that  might  preclude
    handling of  TSCA  CBI  by the  offerer.    They  will  also consider  the
    offerer's past performance on 'similar  contracts that involved the handling
    of  CBI or  other  information  of a sensitive nature,  such as  national
    defense information or privacy  information.

5.  ICB  will  approve  or  disapprove  the security  plan.    In  the  case  of an
    offerer, if the security plan is  rejected,  no technical evaluation will be
    done.  In the case -of a modification to an existing contract, if there are
    only minor problems with the security plan,  the project officer will work
    with the contractor to correct  them.  If  there are  major deficiencies, the
    contractor may be given 30 days to correct the deficiencies.  If, after 30

-------
    days, the deficiencies remain, the contractor  ir.ay be found in default and
    the contract cancelled.

6.  Contracts Management  Division  (CMD)  will  forward  the  proposals  of  all
    offerers to the appropriate project officer for evaluation by a technical
    evaluation panel.

7.  CMD will select  the  successful bidder and  award the contract, contingent
    upon a satisfactory inspection of the contractor's facilities by OIG.  CMD
    will notify the EPA Project Officer and OIG of its selection.

8.  The  Project  Officer   will  ensure  that  the contractor  is  ready  to  be
    inspected by  OIG and, when the  contractor is  ready,  will notify  OIG to
    perform the inspection.

9.  OIG  will inspect  the contractor's  facilities  for  compliance with  the
    contractor  security  plan,  including a  review  of the  employee  training
    awareness program, and inform ICB of the results.

10. If deficiencies  are  discovered during the  course of  the  inspection,  the
    contractor may be  given  30 days  to  correct them. .-  If after  30  days  the
    deficiencies  remain,   the  contractor  may  be  found  in  default  and  the
    contract cancelled.

11. If the contractor facility is approved by ICB, ICB will notify the Project
    Officer and CMD.

12. The Project Officer will  ensure that appropriate  notice  of data transfer
    to a  contractor  is given in accordance  with 40 CFR Part  2.   The Project
    Officer will arrange with the  appropriate DCO/DCA for the transfer of the
    required CBI.    The  Project  Officer will  provide  the  DCO/DCA  with  the
    identity of the  contractor, the  number of  the  contract,  a statement that
    the  required  clauses  have  been  included in the contract, a  copy  of  the
    approval by DAA/OTS.             .

13. When the TSCA  CBI  is  furnished to the  contractor, it will be handled in
    accordance with established procedures and a receipt will be obtained from
    the contractor DCO and given to the appropriate EPA DCO/DCA.
                                      10

-------
                     IV.  Contractor Security Procedures
A. Security Plans

EPA's basic requirement is that the contractor's security plan must provide at
least the same degree of protection  for TSCA CBI as that provided by the TSCA
Confidential Business Information  Security Manual-   Specific procedures must
be set  forth in the contractor  security plan to cover  each of the following
areas.
    1 •   Authorization for Access

Each contractor employee who will be  receiving,  handling, or storing TSCA CBI
must:

    •    Be  screened by a designated  official  of  the  contractor  to ensure
         his/her honesty and trustworthiness.

    •    Be  given  written  authorization  for  access  to  TSCA  CBI  by  the
         designated official.

    •    Be  fully  informed of his/her  responsibilities  for  the  security and
         control  of  TSCA  CBI  before  being  given  access  to any  document
         containing TSCA CBI.

    •    Sign  a Contractor  Employee  Confidentiality Agreement  (Appendix  V)
         before receiving any TSCA CBI.


    2.   Logging and Control of Documents

All TSCA  logs  must be treated as CBI.   The contractor must develop a logging
and control  system that includes the following elements.

    •    Appointment  of a  Contractor   Document Control Officer  (DCO)  with
         overall responsibility for the system.   The DCO. must maintain a list
        • of"  all authorized contractor  personnel,  along with a copy of their
         signed  confidentiality  agreements.    The  original  of  the  signed
         confidentiality  agreements  will  be  forwarded  to the  Information
         Control Branch and will be the basis for listing employees on the EPA
         TSCA CBI Access List.

    •    An  inventory log  to record receipt and disposition of TSCA CBI from
         EPA or from another source.

    •    Procedures  for the logging  and  control   of  TSCA  CBI  within  the
         contractor  facility.   A system must be devised that includes a log
         with the  name  of  the person using the  information, the signature of
         the user, and  document control number,  the  date  checked out, and the
         date  returned.    All  logs  and other control  documents,  as  well  as
         copies  of all  the  TSCA CBI,  must be  available  for  inspection and

                                      11

-------
         copying  by EPA.   All logs  must be  returned to EPA  at the  end  of
         contract performance.

         Assigning  of  a unique  document  control  number  to  each document
         .containing  TSCA CBI  and  attaching a  TSCA CBI  cover  sheet to every
         such document whenever these things have not  already been done by EPA
         or.the contractor...                    .      .

         Ensuring that  each page containing  TSCA CBI  is properly  designated
         .and .marking the back of the  last .page  of each TSCA CBI document.
         This  requirement  applies  also  to  documents  generated  by  the
         contractor or acquired from other sources.
    3.   Storage


         a.   At the Contractor Facility

The  contractor  must  provide  secure  storage  for  TSCA  CBI.   ...The  minimum
acceptable  storage  container is a  metal  cabinet with  a bar  and a three-way
changeable combination padlock of a type approved by EPA.

Combinations to all CBI storage containers  must be controlled and issued only
to  authorized  persons requiring  access  to the  containers.    A  record of all
combinations, must  be. maintained by  the  contractor DCO,  and each combination
must  be  changed  once each year  or  whenever,  an  employee, who  knows  the
combination terminates or transfers, whichever comes first.

When the volume  of  TSCA CBI or other  considerations  warrant it, secure rooms
or  areas  may be  designated.   Such rooms  or areas  should be "equipped with
combination-lock doors, special alarms, and other remote intrusion devices as
required by the  location,  construction.,  and  configuration of the .room.   Any
such room must be inspected, prior to use, by the EPA DIG and approved by ICB.


         b.   When Traveling

With  EPA  permission,  TSCA  CBI may be taken home  by  authorized  contractor
employees prior to a trip when it would be impractical to return  to the office
to  pick up the information.   Contractor employees  must  take  all  reasonable
measures;,, to safeguard, the   information.    When traveling  by plane  or  other
public .conveyance, employees must  keep TSCA  CBI. in their  possession  and may
not check it. with their luggage.

When a contractor employee  is traveling with  TSCA CBI (including samples) and
is  unable  to deliver or ship the CBI to  an authorized facility, TSCA CBI may
be  stored (for as short a period as possible) inside a locked container inside
a locking portion of a motor vehicle..  TSCA CBI may.be stored in  hotel safes.


    4.   Transmittal

TSCA  CBI  will  usually be   transmitted  by  registered  mail,  return  receipt
requested,  in a double envelope.   The inner envelope must reflect the name and

                                      12

-------
address of  the  recipient  with the  following  additional wording on  the  front
side:   "TSCA CBI To Be  Opened By  Addressee  Only."   The  outer  envelope must
reflect only the name and address without the additional wording.

When registered  mail would take too  long or other  circumstances  warrant it,
the  contractor  may,  with prior  consent  of the EPA  Project Officer,  use the
Express Mail  Service of  the  U.S.  Postal Service,  or private  carriers
previously approved by the ICB.

Physical samples collected  by a contractor employee, such as  those  collected
during a TSCA Inspection,  which are claimed to be TSCA CBI, shall be  placed in
a  package  or   container  and  the  seal   marked  "TSCA  Confidential  Business
Information."  Such  samples shall  be  delivered  or shipped as soon as possible
to the  appropriate DCO/DCA  in the Laboratory.   If shipping or.  delivering is
not  immediately  possible, as  when  an employee  is  traveling,  the sample  shall
be  stored  inside  a  locked  container inside  a  locking  portion  of  a  motor
vehicle or in a hotel safe.

Authorized contractor personnel may hand-carry  TSCA  CBI  to an  EPA facility or
to  persons  outside  EPA  (with  the  approval  of  the  EPA Project  Officer),
providing  the  dispatching  contractor DCO maintains  a  record and  obtains  a
receipt from  the  person  at  the  facility  receiving  the  information.
Information being hand-carried should be  packaged  as  registered  mail or  in an
alternate manner approved by ICB.

When circumstances warrant,  and with DIG approval, special arrangements may be
made for  transporting TSCA CBI within  a local  area,  e.g.,  the  Washington,
D.C., metropolitan area.


     5.    Safeguards During Use

When TSCA CBI is in  actual  use by  an  authorized person it  must  be kept  under
constant surveillance.   The user  must  situate  himself/herself  in a physical
position where he/she  can exercise direct security control over  the  material.
The  material must  be  covered, .turned face down,  or  otherwise protected when
unauthorized persons are present.


     6.    Destruction

CBI  documents provided the  contractor by ah  EPA DCO/DCA may not be  destroyed
except with  the  permission  of the providing EPA  DCO/DCA.   The contractor DCO
shall remove the cover sheet, make  a-notation of  the destruction on  the  cover
sheet,  and  return  it to  the providing EPA DCO/DCA.   Other TSCA  CBI  documents
in  the  possession of  the  contractor may not  be  destroyed  except  with the
permission  of  the  EPA Project  Officer  or as specified  in the security  plan.
Destruction  must take  place under  the  supervision  of  the contractor DCO by
shredding or burning or other  means approved  by EPA.  A record of destruction
must be kept by the contractor in the appropriate log.
                                      13

-------
    7.   Reproduction

TSCA  CBI  may  not be  reproduced  except  upon  approval  by  and  under   the
supervision of the contractor DCO.  Reproduction  should be  kept to an absolute
minimum.   The  DCO must  enter all 'copies into  the document control  system  and
apply the  same control requirements to the copies as those  for the original.


    8.   Photographs

Whenever it  is necessary for a  contractor employee to  take photographs that
contain TSCA CBI, as during a TSCA Inspection, either an  "instant" camera must
be used  or the film must be  processed by an  authorized EPA' photo  lab or an
authorized private photo lab contractor.


    9.   Generating TSCA CBI Documents

When  a  contractor employee  generates  a  document that contains  TSCA 'CBI,  the
newly generated document shall be taken as soon as possible  to the  contractor
DCO, who shall enter it into the  document control system  and  protect it as  all
other TSCA CBI.   Generation  of  CBI documents by contractor employees shall be
kept  to  a  minimum.   Documents -generated from  existing CBI documents shall be
presumed to  contain CBI and  shall be treated as CBI until  determined to be
nonconfidential by EPA.
    10.  Training of Employees

The  contractor's  training .program must  be  designed  to  fully  inform  all
employees  of  their security responsibilities  and of  the  consequences of  any
failure  to comply  with  any requirements  of  the  contractor  security  plan.
Document  control  officers will  require  special training because  of  their
unique responsibilities.   Employees must be trained prior to gaining  access to
TSCA  CBI.   Records  of employee  attendance at  training sessions  and of  the
content  of -the training  sessions  must be kept  and  must be  available to  EPA
upon request.
    11.  Facility Security

The contractor  must provide  a brief  description of  its  facility, including
location ;and physical  security provisions for the building and the area where
the TSCA CBI will be stored and used. • This should include how building access
is controlled  (guards,  alarms, locks, etc.)  and  any other pertinent security
information.
    12.  Lost or Unaccounted-for Documents

Any lost  or  unaccounted-for document must be  reported immediately to the EPA
Project Officer or DCO/DCA, as  appropriate,  who shall forward a report to the
ICB with a copy to the OIG.
                                      14

-------
    13.  Incoming Mail

Any incoming  mail,  whether from  EPA,  a business,  or any other  source,  that
contains  TSCA CBI  must be  taken  to  the  contractor  DCO immediately to  be
entered into the document control system.  Whenever there  is reason to believe
that a  particular piece of mail  may contain  TSCA CBI, whether  it  is marked
properly or not, that piece of mail should be taken to the DCO for opening and
proper disposition.


    14.  Telephone Calls

With the  approval  of,  and following guidelines provided  by,  the EPA Project
Officer,  authorized  contractor  employees  may  discuss .TSCA CBI  over  the
telephone with authorized EPA employees in Headquarters  and other EPA offices.
The contractor  employee must verify that  the  EPA  employee  is authorized for
access and must  indicate at what  point in the  conversation TSCA  CBI  is to be
discussed.   In  verifying  that  the EPA  employee is  authorized for  access  to
TSCA CBI,, the contractor employee will first check the access list, which will
be .maintained by the.contractor DCO.

With the  permission of the submitter,  and after  verifying  his/her identity,
authorized contractor  employees may discuss TSCA CBI over the telephone  with
the submitter.   If  submitters discuss  CBI  over the telephone, employees shall
notify  them  that  such discussion  does  not  constitute a waiver of  any  CBI
claims.
    15.  Secretarial Procedures

Any person who is responsible  for  typing anything that contains TSCA CBI must
be an authorized person.  Typists are responsible for:

    •    Safeguarding  the  original  and  all ."mag"   cards,  disks,  one-time
         ribbons; drafts,  scratch  paper, notes,  and  any other materials that
         .may contain TSCA CBI.  No carbons or  copies are to be  made  by the
         typists.

    •    Taking all reasonable measures  to ensure that no unauthorized person
         can see or otherwise gain access to what he/she  is typing.

    •    Protecting the materials  at all  times and  storing  them in approved
         containers when the work  must be interrupted, such as at lunch or at
         close of business.

    •    Leaving nothing on the  desk or  in the typewriter (or word-processor,
         etc.) that might lead to the unauthorized disclosure of TSCA CBI.  If
         the keyboard and  printer  are separate units,  both  must be under the
         direct physical control of the  using employee.  If a processing unit
         or  storage medium  is  part of  the  system,  and if  either  can  be
         electronically  or physically  accessed  by  other persons,  then the
         entire  system  must be  approved by EPA  prior to use.   MIDSD  may be
         asked for assistance in evaluating the security  of the  system.
                                       15

-------
    •    Taking the original and all  other  materials at the completion of the
         task to the  author who will in  turn  take them to  the  DCO.   The DCO
         will enter the original into the document control system and destroy
         all other material.


    16.  Meetings

For any meeting at which  TSCA  CBI  will be  discussed,  the meeting chairperson
shall provide a  sign-in sheet  if  there are attendees who  have  not had prior
access to the CBI to  be discussed.   In addition,  the  chairperson retains the
option to  require a  sign-in sheet whenever he/she thinks it  prudent.   The
sign-in sheet shall include the date, time, place, chairperson,  and subject of
the meeting.   All  attendees must  sign  it.    The chairperson  will  give the
sign-in sheet to  the  Contractor Document  Control Officer  who will  retain it
and return it to EPA at the end of contract performance.

The chairperson must  ensure that only authorized persons are present and must
announce that TSCA CBI is to be discussed.  The chairperson must also review
with the attendees their responsibility for safeguarding confidential business
information in  any and all forms, including,  but not limited  to,  any notes
taken and any subsequent discussions.                    '

The chairperson must  ensure that no  recording  is made of  the  meeting unless
he/she has authorized it.   If authorized, the recording must be  treated as all
other TSCA CBI and entered into the document control system.

Finally,  the  chairperson  must  ensure that  the meeting  room is  secured after
the meeting.  This shall include cleaning all chalkboards,  destroying all tear
sheets and  other  notes, and ensuring that nothing  is left in  the  room that
could lead to the unauthorized disclosure of TSCA CBI;    •
B. Transfer of TSCA CBI to Con tractor from EPA                  -
                                                        j
The transfer of TSCA CBI to the contractor is initiated by the project officer
responsible  for  the  contract,  who requests  the  required TSCA CBI  from the
appropriate EPA  Document  Control  Officer (DCO) or  Document  Control Assistant
'(DCA).  The request always includes the identity of the;contractor, the number
of the contract,  a statement that  the  appropriate  clauses are included in the
contract, a  copy of the  approval  given by the DAA/OTS,  and a description of
the CBI to be  released.   Upon  receipt  of such a request  the DCO/DCA provides
the requested information in accordance with established-procedures.

The DCO/DCA  then furnishes  the  information  to  the  contractor  in accordance
with established procedures.   The  DCO/DCA obtains a  written receipt for the
information from the contractor and enters it into the log.


C. Notification of Affected Business

When required by 40 CFR Part 2, the program office shall notify each affected
business in  advance  of any  disclosure  of  TSCA  Confidential  Business
Information.
                                      16

-------
D. Audits

Each contractor  shall  conduct periodic  audits  of its  facilities,  employees,
and TSCA  CBI  security  system to  ensure compliance  with its  security  plan.
Records of such audits will be available to EPA OIG upon request.
E. Termination Inventory

At ,the  completion  of  all contract  work,  the  contractor  shall  conduct  a
complete inventory  to  ensure  that all  TSCA CBI is  accounted for  and furnish
the results of the inventory to the EPA OIG and other EPA offices as directed.
F. Physical Security

Each contractor must have secure work areas where TSCA  CBI  is used.   When not
in use,  for  example,  at lunchtime or at the  close  of business,  TSCA CBI must
be locked up in secure cabinets, safes, or  special  locked rooms.  The minimum
acceptable  storage container  is a  metal  cabinet  with  a  bar  and  three-way
changeable combination padlock of a type approved by EPA.  The contractor must
also  have building  or  office  security  sufficient  to  prevent unauthorized
entry.
G. Contractor-Acquired TSCA CBI

All  of  the  above  procedures  shall  apply  when  the  contract  requires  the
contractor to obtain  TSCA CBI directly from  any  business.   Any contract with
this  requirement  must  include  the  clause  entitled  Screening Business
Information for Claims of Confidentiality (Appendix IV).
H. Return of TSCA CBI to EPA

Upon completion of the  contract,  the contractor shall  return  all  TSCA CBI to
the  appropriate  DCO/DCA.    However,  if  the  same  information  is  needed in
another unexpired contract  with the same contractor,  the DCO/DCA may instead
obtain a written  receipt for the information.


I. Additional Requirements

Any  contract  involving  the  use. of  TSCA  CBI  may  include  additional
requirements, providing such requirements are  as  stringent or more stringent
than those required by  the EPA TSCA Confidential Business Information Security
Manual.
                                      17

-------
                             V. Computer Security
A. Special Rules for Contractor Computer Use

If,  under  a  proposed contract  or  a proposed  modification  to  an  existing
contract,  TSCA CBI  is  to be  entered  into the  contractor's  computer,  the
following additional security procedures must be enforced:

    •    Request for Approval of Contractor  Access  to TSCA CBI (Appendix VII)
         initiated by  a  Division  Director  (or  equivalent)  must  specify  the
         need for computer use.

    •    The  offerer or  contractor  must develop  and  submit  for review  a
         Computer Center  Security Plan addressing all of the computer security
         standards  and  procedures  for  EPA  computers  as  specified in  this
         chapter.  Any deviation  from these standards shall  be identified in
         the  Security Plan,  along  with a rationale  explaining  why  the
         deviation  would  not  significantly  affect   the  level   of  security
         provided by the  contractor.

    •    If the contractor will  be developing an ADP application system that
         will  process  TSCA  CBI,  the contractor  must  also  develop  an  ADP
         Application Security Plan in accordance with the requirements of this
         chapter.

    •    The DIG will review  the  Computer Center Security  Plan and forward a
         report  through  ICB  to  the  DAA/OTS.   MIDSD  will  review the  ADP
         Application Security Plan and recommend approval/disapproval  to  the
         DAA/OTS.              .

    •    If the DAA/OTS determines  that  these  security plans would provide at
         least the same degree of protection as provided by the EPA procedures
         set  forth  in the TSCA  Confidential  Business   Information  Security
         Manuali he/she will approve the plans.

    •    In the  case of  an offerer,  after  such approval the  offerer  may be
         considered for the award of a contract.

    •    In the case of a  proposal to modify an existing contract to include
         computer use,  after such approval the contract may be so modified.

    •    The  contract  must  include  the  clause entitled  Computer  Security
         (Appendix III).

    •    In no case will  any TSCA CBI be transferred to the contractor for use
         in  a  computer  until  the  contractor  computer  facility  has  been
         inspected by  OIG  and approved  by  ICB.    When  necessary,  MIDSD  may
         assist OIG on such inspections.

    •    The  contractor  must  appoint  a  contractor computer  DCO  who will be
         responsible for  all security aspects of the contractor's  computer use
                                      19

-------
         of  TSCA CBI and  who will  log and  control  all use  of the  computer
         facilities.

The  contractor  must maintain records of computer  use and make  them  available
to EPA upon  request by the EPA Project  Officer.  The  contractor  must  also make
its  computer facilities  available for  inspection  by EPA upon request by  the
EPA  Project  Officer.


B. Security Requirements for Contractor Computer Centers

     1.   .General

In  addition  to  the  applicable  Federal  statutes and  regulations  cited  in
Chapter  I.  C. of the Manual,  the computer processing of TSCA CBI must be  in
compliance  with  the following  directives   issued  to  all  Federal   agencies
processing sensitive data by computer.

     •    Office of, Management and Budget   OMB Circular A71
     •    OfficeiofPersonnel- Management   FPM Ltr. 732-7
     •    National Bureau of Standards      FIPS  PUBS
     •    General  Services Administration   41  CFR,  Ch. 101

All  TSCA contractor  computer support  facilities, whether dedicated to  CBI
processing or shared with non-CBI programs,  must  meet  the basic  requirements
for  protection  of TSCA CBI.
         a.   Basic Security Requirement

The  system must provide  a  level  of security adequate to protect TSCA CBI  that
is being processed from unauthorized access by users and other persons having
access to the facility.


         b.   Computer Center 'Security. Plan

The .contractor's  computer  DCO  shall develop and maintain, a plan  containing a
comprehensive set of  documented  data security standards an.d procedures.   This
plan  must  include  provisions  for periodic  risk  analyses,  provisions  for
.obtaining confidentiality  agreements frpm  all  contractor personnel working for
the  facility,  such  as  equipment  maintenance contractors,  and provisions  to
meet all requirements specified  below.  This  security plan  shall be  subject to
approval by  the  DAA/OTS or his/her designee and shall be available  to EPA OIG
as required.

-------
    2.   Hardware and Software Characteristics
         a.    Hardware

The computer hardware  supporting  the system shall  be  capable of maintaining
isolation between user tasks,  and shall prevent  normal  users from executing
instructions reserved for the operating system.  Since a well-designed system
of software, as specified below, can adequately compensate for many desirable
hardware features, no  further specific hardware  requirements are  set  forth
here.
         b.    Software System Design

The operating system software shall have data  security  as  one of its primary
design  requirements.    This  operating  system shall  provide mechanisms  to
implement the following principles.

Note  that the  software  system  design requirements  discussed below  are
essentially identical to the hardware requirements specified above and may be
substituted for  the  hardware   requirements  if  proven  effective.    The
requirements are:

    •    User/Task Isolation—Separate users or  tasks  operating concurrently
         in the system shall be,  within system limits,  totally isolated from
         one another.

    •    Control of Interfaces and Security Sensitive  Work  Spaces—Operating
         system  interfaces shall  prevent users from  gaining access  to
         instructions or  data reserved  for the operating system.    The
         operating  system  shall  not use user-accessible  work areas  for
         passwords or other  system sensitive data.

    •    Audit Trails—The  system shall provide  extensive  auditing  data  to
         record significant  system activities that are of a  security concern,
         such as log-on attempts, file accesses,  and  program execution.   The
         system shall provide to  EPA  a list of  all  attempts at unauthorized
         access of EPA or contractor  data  files  and/or programs by users and
         others.                                    *

    •    User Identification and  Authorization—There  shall  be mechanisms in
         the operating system to  identify  individual  users  of the system and
         to specify  the system .resources and privileges to  which the user is
         authorized.
         c.   Applications Software Management

Any employee responsible  for  developing software  that will process TSCA CBI is
required  to prepare  an   ADP  Application  Security Plan.    This plan  shall
describe the components of the system or subsystems that may be  accessible by
authorized  DCOs  and  DCAs including  computer  programs,  inputs,  outputs,  and
data bases.   The plan shall  also state how this security  is to be enforced,
                                      21

-------
and,  in  particular, how  unauthorized, modifications  to  the programs  will  be
prevented.    The  plan  must address  controls  to ensure  data  integrity  and
systems  assurance,  including audit  trails.    The plan  must be  reviewed  and
approved by the DAA/OTS or  his/her  designee,  following review by the Director
of  the  Management  Information  and  Data  Systems  Division,  and  the Inspector
General.   The  program  instituted must   be  periodically  reviewed  for
effectiveness and- shall-be subject to periodic audit.
         d.   File-Catalog Structure         . .

The  operating system shall provide  resource control  at the file  level that
permits  isolation  of  one  user's  files  from  another's.    It  shall  not  be
possible for one user to access  another's  files simply by having knowledge of
the  file name and account number.
         e.   File Access Control/Permission Mechanism

The 'operating  system. • shall  provide   for* file  access ..through  a  specific
permission mechanism capable of:         •-.-:.

    •    Specific User Permissions—It must be possible to give selected users
         access to  a  particular file without  giving all users  access  to the
         file.

    •    Access Type Control—it must be possible for a,file owner to restrict
         the  type  of  access  to a file.   Two  minimum  categories must  be
         supported:  Read Only Access and Read/Write Access.  Additionally,  it
     1   '; is- highly desirable that it be possible to restrict access to program
         files  on an  execute  only  (i.e.,  no  read)  basis,  and  to  restrict
   .  ,   ••. '"control" access to files  (i.e., scratching .or renaming the file).
         f.   User Features
        	        "        •'".;.,(''     './; - ;  ' ' '
To  enable  user  flexibility in  adding  security features  to  applications,  the
system should provide a range of optional protection features, including:

    •    Password  Change  Capability—Individual  users   (DCOs  and DCAs
         authorized for  computer  access)  should ensure that  their own log-on
         and file-access passwords are changed at frequent intervals.

    •    Idle Terminal  Disconnect—The system  should provide a  mechanism to
         automatically disconnect a  user  terminal  after  a fixed  period of no
         activity.   If  the  terminal is  a  CRT type,  then the  system should
         clear the screen before the automatic disconnect.
         g.   Communications Facilities

The communications network must be adequately protected against intentional or
accidental misrouting  of  data traffic.  Line  protocol and concentrator-modem
interfaces must  be designed  to  detect and  protect against  anomalous  events
                                      22

-------
(such  as  spurious  data  or  line  disconnects)   that  might  otherwise  cause
misrouting or loss of data.

Communications equipment (modems, multiplexors, concentrators, etc.)  shall  be
located in secure areas accessible only to authorized personnel.

When TSCA CBI is transmitted electronically through communications lines,  such
lines must be protected  in  accordance with the National  Bureau  of Standards'
Data  Encryption  Standards.    Such encryption  is   not  required  for  hardwired
connections within a secure  facility.

Any terminal or  printer  used to read or  print TSCA CBI must be  located  in a
secure room  and  used for this purpose  only by a person with  computer  access
authorization.


    3.   Media Handling

Policies and procedures must be included in the security plan to  fully control
access to  and handling  of  various  data media  used in  processing TSCA  CBI
including  magnetic  tape,  disk  packs,   printed   output,  cards,   micrographic
output, and other such media.

Media  shall   be   labeled  only  with  such  information  as  is  necessary  for
retrieval and media management.

Storage  areas for  various  media,  including mountable  volumes,  should  be
separate from the main operations areas.

Input and output media shall be transmitted only  between  the  computer  DCO and
the appropriate  program  area DCO.  In  no case shall input media be  accepted
from or delivered to  a  third party.   Positive user  identification procedures
must be  in effect.    Detailed  logs of all  media  transmitted to  and  from the
computer facility shall be maintained.

When  authorized  in  writing by  a DCO,  media shall be  disposed  of  by  the
computer DCO in  a manner that will prevent any disclosure of  data to outside
parties.


    4.   Facility Protection

All necessary steps must  be taken to  protect facilities, equipment, and the
data  they  contain  from  inadvertent  or  intentional  access,  damage,  or
destruction.

The computer DCO  shall enforce a policy of permitting  no  unescorted  visitors
into computer operations areas or into areas where sensitive  data are  handled.
Only  designated personnel having  an ongoing   need  shall  be authorized
unescorted access to such areas.

Any computer facility processing  TSCA CBI must have, prior to receiving  such
data,  an  adequate   facility   or   building  security  system  to  protect  the
equipment and data approved  by the ICB.
                                      23

-------
    5.   Backup and Recovery Capability

There  shall  be documented procedures  to ensure  adequate  backup and recovery
capability  in the  event  of  loss  of  data  or processing  capability through
accident  or  disaster.     These  procedures  should  include  a  provision  for
periodic testing of the backup and recovery capabilities.

All files resident on the  system shall be  copied to backup media on a regular
basis.

A  complement  of  backup  files  that will  enable  recovery  to  the  previous
end-of-week  position  in the  event of a major disaster resulting  in loss of
on-site  copies shall be  stored off-site.   An  off-site storage  facility is
defined as one that is so  located that it is highly unlikely  to  be affected by
a major disaster (fire, explosion, etc.) striking the main  facility.  Off-site
storage shall  be  as  secure as that  at the  primary location of  data and shall
be approved by the ICB.
                                      24

-------
                                Appendix I
The Contracting Officer has  determined that during the performance of  this
contract,  EPA  may  furnish  confidential  business  information to  the
Contractor that  EPA obtained  under the  Clean Air . Act (2  U.S.C.  1857  et
seq.), the Federal Water Pollution  Control  Act (33 U.S.C.  §  1251 et  seq.),
the  Safe  Drinking  Water  Act  (42  U.S.C.   §  300f  et seq.),  the Federal
Insecticide,  Fungicide, and Rodenticide  Act (7. U.S.C.  §  136 et seq.), the
Federal Food, Drug,  and Cosmetic Act (2.1  U.S.C. §  301  et seq.),  the  Resource
Conservation  and  Recovery Act  (42  U.S^C.  §  2901  et seq.), or the Toxic
Substances Control  Act (15  U.S.C.  §  2601   et  seq.).    EPA regulations  on
confidentiality of business information  in  40  CFR Part 2 Subpart B require
that the Contractor agree  to .the clause entitled  "Treatment  of  CBI"  before
any confidential business  information may be furnished to the Contractor.


               Treatment of Confidential Business Information

A.   The  EPA  Project  Officer,  after  a  written  determination by  the
appropriate program office,  may disclose confidential  business  information
to  the Contractor  necessary to  carry  out the  work  required  under  this
contract.  The  Contractor agrees  to use the confidential  information  only
under the following conditions:

   1.    The  Contractor and  Contractor's  Employees  shall:    (i)   use  the
   confidential business  information only for the purposes of  carrying out
   the work required by the  contract;  (ii)  not disclose the  information  to
   anyone other than EPA employees without the prior written approval  of the
   Deputy   Associate   General  Counsel   for   Contracts  and   General
   Administration; and (iii)  return to the Contracting Officer all  copies  of
   the information,  and any abstracts or excerpts  therefrom,  upon request  by
   the Project  Officer, whenever the  information  is  no longer  required  by
   the Contractor for the  performance  of the work  required  by the  contract,
   or upon completion of the  contract.

   2.  The Contractor  shall  obtain  a  written  agreement to honor the above
   limitations from such of the Contractor's Employees .who  will  have  access
   to the information,  before the employee is allowed access.

   3.  The Contractor  agrees  that these contract  conditions  concerning the
   use and disclosure of confidential  business information  are  included for
   the benefit  of,  and shall be  enforceable by,  both EPA and  any  affected
   business having a proprietary interest in the information.

   4.  The Contractor  shall not  use any confidential  business  information
   supplied by EPA or obtained  during  performance  hereunder  to  compete  with
   any business to which the  confidential information relates.


B.  The  Contractor agrees  to  obtain the written consent of  the  Contracting
Officer,  after  a written   determination  by  the appropriate program office,


                                     25

-------
prior to entering  into  any subcontract that will  involve the disclosure of
confidential business  information by  the Contractor  to the subcontractor.
The Contractor agrees to  include  this  clause,  including this paragraph  (B),
in  all  subcontracts  awarded pursuant  to  this contract  that  require  the
furnishing of confidential business information to the subcontractor.
                                    26

-------
                                Appendix II
The Contracting Officer has  determined that during the performance of  this
contract, EPA may  furnish confidential  business  information to  the
Contractor that EPA has obtained under the  Toxic  Substances  Control Act (15
U.S.C. §  2601  et seq.).  The Contractor  must agree to this  clause entitled
"Security Requirements for Handling  TSCA Confidential  Business  Information"
before  any  confidential  business   information  obtained  under  the  Toxic
Substances Control  Act may  be  furnished  to  the Contractor.   The  clause
entitled  "Treatment of Confidential  Business Information" is also included
in this contract.
                     Security Requirements for Handling

                   TSCA Confidential Business Information

A.  The  Project Officer,  after a  written determination by  the  appropriate
program  office,  may  disclose  confidential  business  information  to  the
Contractor necessary  to carry out the work  required under this  contract.
The Contractor  agrees to protect  the  confidential business information  in
accordance with the following requirements:

   1.    The   Contractor and  Contractor's  Employees  shall  follow  the
   security  procedures set  forth  in   the  contractor  security  plan(s)
   approved by EPA.

   2.   The  Contractor shall  permit  access  to  and  inspection  of  the
   Contractor's facilities in use  under this  contract by representatives
   of EPA's OIG.

   3.   The  Contractor DCO  shall  obtain a  signed  copy of  the  "TSCA
   Contractor  Employee Confidentiality Agreement" from  each of  the
   Contractor's Employees who will have access to the information,  before
   the employee is allowed access.
B.  The Contractor agrees  that  these requirements concerning protection  of
confidential business information are included for the benefit of,  and shall
be enforceable by, both  EPA  and any affected business having  a  proprietary
interest in the information.

C.  The Contractor  understands that  confidential  business  information
obtained by EPA under the  Toxic  Substances  Control Act may not be  disclosed
except as authorized by the Act  and  that  any unauthorized disclosure  by  the
Contractor or the Contractor's Employees  may subject  the  Contractor and  the
Contractor's Employees  to the  criminal penalties in  section  14(d)  of  the
Act.    For  purposes of  this   contract,   the  only  disclosures  that  EPA
authorizes the  Contractor to make  are  those disclosures  set  forth in  the
clause entitled "Treatment of Confidential Business Information."
                                    27

-------
D.  The Contractor agrees  to  include this clause,  including this paragraph
(D), in all subcontracts awarded pursuant  to this contract that require the
furnishing of confidential business information to the subcontractor.

E.  The  Contractor  shall   return   all   logs  and employee  confidentiality
agreements to EPA at the end of the contract.
                                    28

-------
                               Appendix III
The Contracting Officer has  determined that during the  performance  of this
contract,  EPA may  furnish  to  the  Contractor  confidential  business
information that EPA has obtained under the Toxic Substances Control Act (15
U.S.C. § 2601 et seq.).  The Contractor  will  use this confidential business
information  in a  computer.    The Contractor  must  agree  to  this  clause
entitled "Computer  Security"  before  any confidential business  information
obtained under the Toxic  Substances  Control  Act may be furnished  to  the
Contractor.   The  clause entitled  "Security Requirements  for Handling TSCA
Confidential Business Information" is also included in this contract.
                              Computer Security

A.  The Contractor agrees to protect  confidential business information used
in its computer operations in accordance with the following requirements:

   1.   The  Contractor  and the  Contractor's  Employees  shall  follow  the
   computer security  procedures  set forth  in  the Computer  Center  Security
   Plan and/or ADP Application Security  Plan proposed by the Contractor and
   accepted by EPA.

   2.   The  Contractor  and the  Contractor's  Employees  shall  follow  the
   procedures  required  by  the  clause entitled  "Security Requirements  for
   Handling TSCA Confidential Business Information" of this contract for all
   confidential business information removed from the computer.

   3.   The Contractor  shall,  upon  request by  EPA,  permit access to  and
   inspection  of  the  Contractor's  computer  facilities  in  use under  this
   contract by representatives of EPA's DIG and EPA's Management Information
   and Data Systems Division.
B.   The  Contractor  agrees  that  these  requirements  concerning  computer
    security  of  confidential  business  information  are  included  for  the-
    benefit  of,  and  shall  be enforceable by,  both  EPA  and any  affected
    business having a proprietary interest in the information.
    The Contractor agrees  to  include this clause,  including  this  paragraph
    (C), in all subcontracts awarded pursuant  to this contract that require
    use of confidential business information in computers.
                                    29

-------
                                Appendix IV
The  Contracting  Officer  has  determined that  during  performance  of  this
contract the Contractor  may be required to collect information  to  perform
the work required under this contract.   Some  of the information may  consist
of  trade secrets  or  commercial  or  financial  information that would  be
considered as proprietary or confidential by the business that  has the right
to the  information.   The following clause  is  included in this  contract  to
enable  EPA  to  resolve  any  claims  of confidentiality concerning the
information  that the  Contractor  will .furnish  under  this  contract.   The
clause  entitled  "Treatment of  Confidential Business  Information"  is  also
included in this  contract.
        Screening Business Information for Claims of Confidentiality

(a)   Whenever collecting  information under  this  contract, the  Contractor
agrees to comply with the following requirements:

(1)   If the  Contractor  collects information  from  public sources, such  as
books, reports, journals, periodicals, public records,  or other sources that
are available to be public without  restriction,  the Contractor shall  submit
a list of these sources  to the  appropriate 'program office at  the  time that
information is initially submitted to EPA.   The Contractor shall  identify
the information according to source.

(2)  If the Contractor collects information from a State or local government
or  from a  Federal  agency,  the Contractor  shall  submit a  list of  these
sources to  the appropriate  program office  at the  time the information  is
initially submitted to EPA.   The Contractor shall identify  the information
according to source.

(3)  If the Contractor collects information directly from a business or from
a  source  that  represents   a  business  or  businesses,  such  as  a  trade
association:

(i)    Before  asking  for the  information,  the Contractor  shall  identify
itself,  explain   that it  is  performing  contractual  work  for  the  U.S.
Environmental Protection  Agency, identify the information that it is seeking
to  collect,  explain what will  be  done with  the information,   and  give  the
following notice:

(A)    You  may,  if  you  desire,  assert a  business  confidentiality  claim
covering part  or  all of the information.   If  you do assert  a  claim,  the
information will be  disclosed by EPA only to the extent and' by means  of  the
procedures set forth  in  40  CFR Part 2 Subpart B, 41 FR 36906, September  1,
1976.

(B)   If  no  such  claim is made  at  the time this information is received  by
(the   Contractor),   it  may  be  made  available  to   the  public by the
Environmental Protection  Agency without further notice  to you.
                                    31

-------
(ii)  Upon  receiving  the information, the  Contractor shall make  a written
notation that the notice set out above was  given to the source, by whom, in
what form, and on what date.

(iii)  At the time the  Contractor  initially submits  the  information  to the
appropriate program  office,  the  Contractor shall  submit  a  list  of  .these
sources, identify the information according  to  source,  and indicate whether
the source made  any  confidentiality .claim and  the  nature and  extent  of the
claim.

(b)   The Contractor  shall keep  all information  collected from  nonpublic
sources confidential  in accordance with .the clause in this contract entitled
"Treatment of Confidential Business Information" as if it had been furnished
to the Contractor by  EPA.

(c)  The Contractor agrees to obtain  the  written consent of the Contracting
Officer, after  a written determination  by the  appropriate program office,
prior to entering  into  any subcontract  that will  require the  subcontractor
to  collect  information.   The :.Contractor .agrees  .to  include   this .clause,
including this  paragraph  (c),  and the clause : entitled .."Treatment of
Confidential Business Information"  in all subcontracts  awarded pursuant to
this contract that require the subcontractor to collect information.
                                    32

-------
                                              Appendix  V
                       TSCA CONTRACTOR EMPLOYEE CONFIDENTIALITY AGREEMENT
  I understand that as an employee of	;	, a contractor performing work for the United
  States Environmental Protection Agency, I  will have access to certain TSCA Confidential Business Information submitted
  under the Toxic Substances Control Act (TSCA) '(15 U.S.C. Section 2601 et seq.l. This access has been granted to me in
  order to perform my work under the contract.


  I understand that TSCA Confidential Business Information may not be disclosed by me except as authorized by TSCA, the
  contract, and the security procedures used  by my company under the contract. I understand that under Section  14 Id) of
  TSCA (15 U.S.C. Section 2613 Id)), I am liable for a possible fine of up to $5,000 and/or imprisonment for up to one year if I
  willfully disclose TSCA Confidential Business Information to any person not authorized to receive it. In addition, I  understand
  that I may be subject to disciplinary action for violation of this agreement up to and including dismissal.


  I agree that I will treat any TSCA Confidential Business Information furnished to me as confidential arid that I will follow the
  security procedures used by my company under the contract. I have been informed of and understand the procedures.
TYPED NAME AND SIGNATURE OF CONTRACTOR EMPLOYEE
DATE
EPA Form 7710-19 (Rev. 9/81)
                                                     33

-------
                                Appendix VI


CONFIDENTIALITY AGREEMENT FOR CONTRACTOR EMPLOYEES
UPON TERMINATION OR TRANSFER
As an employee of , a contractor performing work for the United States
Environmental Protection Agency, 1 have had access to certain confidential business information submitted under the Toxic
Substances Control Act (TSCA) (15 U.S.C. Section 2601 et seq.). This access was granted to me in order to perform my work
under a contract.
I certify that I have returned all copies of any TSCA Confidential Business Information in my possession to the appropriate
document control officer specified in the security plan in effect at my company.
I agree that I will not remove any copies of TSCA Confidential Business Information from the premises of the company upon
my termination or transfer. I further agree that I will not disclose any TSCA Confidential Business Information to any person
after my termination or transfer.
I understand that as a contractor employee who has had access to TSCA Confidential Business Information, under Section
14 (d) of TSCA (15 U.S.C. Section 2613 (dl) I am liable for a possible fine of up to $5,000 and/or imprisonment for up to one
year if I willfully disclose TSCA Confidential Business Information to any person.
If I am still employed by the contractor, I also understand that I may be subject to disciplinary action for violation of this
agreement.
I am aware that I may be subject to criminal penalties under 18 U.S.C. Section 1001 if 1 have made any statement of material
facts knowing that such statement is false or if 1 willfully conceal any material fact.
TYPED NAME AND SIGNATURE OF CONTRACTOR EMPLOYEE ' DATE

EPA Form 7710-43 (9/811
                                      35

-------
                                    Appendix VII
                                         (Front)

                          (Actual  Size  8  1/2"  x  11")
                      REQUEST FOR APPROVAL OF CONTRACTOR ACCESS
                       TO TSCA CONFIDENTIAL BUSINESS INFORMATION
 Requesting Official*
Signature
Date
 Title and Office
 Contractor and contract number (if modification)
 I. Brief description of contract, including purpose, scope, length, and other important details. (Continue on the
   back of this form if, necessary.)
 II. What TSCA CBI will be required, and why? (Continue on back if necessary.)
   . Will computer access to TSCA CBI be required by the contract? If so, explain why and to what extent on
    the back of this form.
 If you approve this request, this office will initiate procedures to ensure compliance with the "TSCA CBI
 Security Manual" and "Contractor Requirements for the Control and Security of TSCA Confidential Business
 Information."
'Mint be Division Director (or equivalent) or above.
                                               Office Director for
                                               Toxic Substances
                                               Approved

                                               Date  	
EPA Form 7710-15* (9-811
                                             37

-------
                                Appendix VII
                                     (Back)

                         (Actual Size 8  1/2"  x 11")
 I. (Continued)
 II. (Continued)
 III. (Continued)
EPA Form 7710-15. 19-81) RmtrM
                                      39

-------
                                     Index
Access, Defined  	     2
Access, How To Gain	    11
ADP Application Security Plan
     Defined	 . . . .     2
     Audits . .	    17
Authorized Computer Facility
     Defined 	     2
Authorized Person, Defined 	     3

Backup Capability  	    24
Computer Center Security Plan
     Defined 	     3
     Discussed	    20
Computer Security  	  	    19
Confidential Business Information (CBI), Defined 	     3
Contractor	   3,7
Contractor DCO
     Defined	. .     3
     Responsibilities of	  .	     7
Contracts Management Division  	 ....     5

DAA/OTS, Responsibilities of	     5
Destruction	    13
Director, MIDSD, Responsibilities of    	 	 . .     6
Division Directors, Responsibilities of  	     5
Document Control Officer, DCO, EPA, Defined   	     3
Document, Defined	 . .     3
Documents, Lost	14,24

Employees,.Contractor, Responsibilities of    	 .-.     8

Facility Protection  	 .....    23
Facility Security  	 .   .14

Hardware Requirements	  21

Information, Defined 	     3

Logging of Documents	    11
Lost Documents 	 .14,24

Mail	    15
Media Handling	    23
Meetings	    16
                                      41

-------
                                  Index (cont.)
                                                                             Page

Notes	     16

Office of the Inspector General
     Responsibilities of	      6

Penalties, Criminal	      1
Policy, EPA	      1
Procedures, Award  	 ......  	     9
Project Officer  (EPA)
     Defined	      3
     Responsibilities of  	      6

Recovery Capability	     24
Reproduction	     14

Safeguards During  Use of  TSCA CBI  ......	     13
Secretarial Procedures	     15
Secure Facility, Defined		      3
Secure Room, Defined 	 	  .........      4
Security Plans
     Defined	      4
     Discussed  	  ...........      4
Security Violations	. .	      2
Software System  Design  	  		  .....     21
Storage  	 ..........  	     12

Telephone Calls	     15
Termination Inventory   	 	     17
Training of Employees   	     14
Transmittal		     12
Travel	     12
TSCA	  .	      1
Typing Procedures  	  	 ........  	     15

Violations
     Appropriate Action by DAA/OTS   	      2
     Defined	      4
     Penalties for	      1
     of Contracts	      6
     Reporting of, by Contractors  	      2
     Reporting of, by DCOs	-.	      7
     Reporting of, by Employees	      8
                                       42
                                                            •U.S. GOVERNMENT PRINTING OFFICE 341-082/255

-------