This is the accessible text file for GAO report number GAO-10-693 
entitled 'Contractor Integrity: Stronger Safeguards Needed for 
Contractor Access to Sensitive Information' which was released on 
September 10, 2010. 

This text file was formatted by the U.S. Government Accountability 
Office (GAO) to be accessible to users with visual impairments, as 
part of a longer term project to improve GAO products' accessibility. 
Every attempt has been made to maintain the structural and data 
integrity of the original printed product. Accessibility features, 
such as text descriptions of tables, consecutively numbered footnotes 
placed at the end of the file, and the text of agency comment letters, 
are provided but may not exactly duplicate the presentation or format 
of the printed version. The portable document format (PDF) file is an 
exact electronic replica of the printed version. We welcome your 
feedback. Please E-mail your comments regarding the contents or 
accessibility features of this document to Webmaster@gao.gov. 

This is a work of the U.S. government and is not subject to copyright 
protection in the United States. It may be reproduced and distributed 
in its entirety without further permission from GAO. Because this work 
may contain copyrighted images or other material, permission from the 
copyright holder may be necessary if you wish to reproduce this 
material separately. 

Report to the Chairman, Subcommittee on Federal Financial Management, 
Government Information, Federal Services, and International Security, 
Committee on Homeland Security and Governmental Affairs, U.S. Senate: 

United States Government Accountability Office: 
GAO: 

September 2010: 

Contractor Integrity: 

Stronger Safeguards Needed for Contractor Access to Sensitive 
Information: 

GAO-10-693: 

GAO Highlights: 

Highlights of GAO-10-693, a report to the Chairman, Subcommittee on 
Federal Financial Management, Government Information, Federal 
Services, and International Security, Committee on Homeland Security 
and Governmental Affairs, U.S. Senate. 

Why GAO Did This Study: 

In performing agency tasks, contractor employees often require access 
to sensitive information that must be protected from unauthorized 
disclosure or misuse. This report assesses the (1) extent to which 
agency guidance and contracts contain safeguards for contractor access 
to sensitive information, and (2) adequacy of governmentwide guidance 
on how agencies are to safeguard sensitive information to which 
contractors may have access. To conduct this work, GAO identified key 
attributes involving sensitive-information safeguards, analyzed 
guidance and met with officials at three agencies selected for their 
extensive reliance on contractor employees, analyzed 42 of their 
contract actions for services potentially requiring contractor access 
to sensitive information, and analyzed the Federal Acquisition 
Regulation (FAR) and pending FAR changes regarding governmentwide 
guidance on contractor safeguards for access to sensitive information. 

What GAO Found: 

GAO’s analysis of guidance and contract actions at three agencies 
found areas where sensitive information is not fully safeguarded and 
thus may remain at risk of unauthorized disclosure or misuse. The 
Departments of Defense (DOD), Homeland Security (DHS), and Health and 
Human Services (HHS) have all supplemented the FAR and developed some 
guidance and standard contract provisions, but the safeguards 
available in DOD’s and HHS’s guidance do not always protect all 
relevant types of sensitive information contractors may access during 
contract performance (examples of some types of sensitive information 
contractors may access are listed below). Also, DOD’s, DHS’s, and HHS’
s supplemental FAR guidance do not specify contractor responsibilities 
for prompt notification to the agency if unauthorized disclosure or 
misuse occurs. Almost half of the 42 contract actions analyzed lacked 
clauses or provisions that safeguarded against disclosure and 
inappropriate use of all potential types of sensitive information that 
contractors might access during contract performance. Additionally, 
DOD and HHS lack guidance on the use of nondisclosure agreements, 
while DHS has found that these help accountability by informing 
contractors of their responsibilities to safeguard confidentiality and 
appropriate use and the potential consequences they face from 
violations. 

There have been numerous recommendations for improved governmentwide 
guidance and contract provisions in the FAR, such as prohibiting 
certain types of contractor personnel from using sensitive information 
for personal gain. To address some of these areas, regulatory changes 
are pending to develop standardized approaches and contract clauses in 
the FAR that agencies could use to safeguard sensitive information, 
rather than developing such safeguards individually. However, 
similarly to issues identified in agency guidance, GAO found two key 
areas the FAR does not yet address. These include (1) agency use of 
nondisclosure agreements as a condition of contractor access to 
sensitive information, and (2) the need to establish clear 
requirements for contractors to promptly notify agencies of 
unauthorized disclosure and misuse of sensitive information. The 
ongoing rulemaking process provides an opportunity to address the need 
for additional FAR guidance in both areas. 

Table: Examples of Sensitive Information: 

Type of information: Personal; 
Examples: 
* Name; 
* Social Security number; 
* Date and place of birth; 
* Patient health and medical information. 

Type of information: Business proprietary; 
Examples: 
* Trade secrets; 
* Manufacturing processes, operations, or techniques; 
* Amount or source of any profits, losses, or expenditures. 

Type of information: Agency sensitive; 
Examples: 
* Security management information; 
* Predecisional planning and budgeting documents; 
* Continuity-of-operations information. 

Source: GAO analysis. 

[End of table] 

What GAO Recommends: 

GAO recommends that the Office of Federal Procurement Policy (OFPP) 
ensure pending changes to the FAR address two additional safeguards 
for contractor access to sensitive information: the use of 
nondisclosure agreements and prompt notification of unauthorized 
disclosure or misuse of sensitive information. In oral comments, OFPP 
agreed with the recommendations. DHS also concurred with the 
recommendations, while DOD and HHS had no comment. 

View [hyperlink, http://www.gao.gov/products/GAO-10-693] or key 
components. For more information, contact John Needham at (202) 512-
4841 or needhamjk1@gao.gov. 

[End of section] 

Contents: 

Letter: 

Background: 

Safeguards to Protect Sensitive Information Not Always Available in 
Agency Guidance or Included in Contract Actions: 

Efforts Underway to Improve Governmentwide Guidance in the FAR for 
Contractor Access to Sensitive Information: 

Conclusions: 

Recommendations for Executive Action: 

Agency Comments and Our Evaluation: 

Appendix I: Scope and Methodology: 

Appendix II: Sensitive But Unclassified Markings Identified by 
President's Task Force on Controlled Unclassified Information: 

Appendix III: Agency Contract Provisions Containing Contractor 
Safeguards for Sensitive Information: 

Appendix IV: Contractor Employee Nondisclosure Agreements Used by 
Agencies: 

Appendix V: Recent FAR Changes to Add Guidance and Contract Provisions 
for Information Technology (IT) Security: 

Appendix VI: Comments from the Department of Homeland Security: 

Appendix VII: GAO Contact and Staff Acknowledgments: 

Tables: 

Table 1: Examples of Sensitive Information: 

Table 2: Analysis of Control Practices in Agency FAR Supplements for 
Safeguarding Sensitive Information Accessed by Contractors: 

Table 3: Analysis of Contract Provisions Establishing Contractor 
Safeguards for Sensitive Information: 

Table 4: Analysis of Contract Requirements for Nondisclosure 
Agreements: 

Table 5: FAR Contract Provisions for Safeguarding Certain Types of 
Sensitive Information: 

Table 6: Status of Pending FAR Cases to Revise Policies and Clauses 
for Contractor Use and Confidentiality of Sensitive Information: 

Table 7: Selected SBU Markings Currently in Use: 

Figures: 

Figure 1: HSAR Clause 3052.204-71, Contractor Employee Access: 

Figure 2: DFARS Clause 252.204-7000, Disclosure of Information: 

Figure 3: HHSAR 352.224-70, Confidentiality of Information: 

Figure 4: Source Selection Non-disclosure Agreement Used by the Air 
Force: 

Figure 5: Confidentiality Agreement Used by DOD's TRICARE Management 
Activity for Contractor Employees Providing Administrative Support 
into the Source-Selection Process: 

Figure 6: Non-disclosure Agreement for Contractor Employees and 
Subcontractors Used by DOD's TRICARE Management Activity: 

Figure 7: DHS Form 11000-6, Sensitive But Unclassified Information Non-
disclosure Agreement DHS Requires from Contractors and Consultants: 

Figure 8: Non-disclosure Agreement Used by the Department of the 
Treasury for TARP Contractor Employees and Management Officials: 

Abbreviations: 

AFFARS: Air Force Federal Acquisition Regulation Supplement: 

BPA: blanket purchase agreement: 

CMS: Centers for Medicare & Medicaid Services: 

CUI: controlled unclassified information: 

DFARS: Defense Federal Acquisition Regulation Supplement: 

DHS: Department of Homeland Security: 

DOD: Department of Defense: 

FAR: Federal Acquisition Regulation: 

FISMA: Federal Information Security Management Act of 2002: 

FOIA: Freedom of Information Act: 

FOUO: for official use only: 

FPDS-NG: Federal Procurement Data System-Next Generation: 

HHS: Department of Health and Human Services: 

HHSAR: Department of Health and Human Services Acquisition Regulation: 

HIPAA: Health Insurance Portability and Accountability Act of 1996: 

HSAR: Department of Homeland Security Acquisition Regulation: 

HSPD-12: Homeland Security Presidential Directive 12: 

IT: information technology: 

OFPP: Office of Federal Procurement Policy: 

OMB: Office of Management and Budget: 

Privacy Act: The Privacy Act of 1974: 

SBU: sensitive but unclassified: 

TARP: Troubled Asset Relief Program: 

TMA: TRICARE Management Activity: 

Treasury: Department of the Treasury: 

[End of section] 

United States Government Accountability Office:
Washington, DC 20548: 

September 10, 2010: 

The Honorable Thomas R. Carper: 
Chairman: 
Subcommittee on Federal Financial Management, Government Information, 
Federal Services, and International Security: 
Committee on Homeland Security and Governmental Affairs: 
United States Senate: 

Dear Mr. Chairman: 

To a great extent, federal agencies rely on support contractor 
employees to help accomplish a broad array of complex and mission- 
critical functions.[Footnote 1] In carrying out their day-to-day tasks 
for federal agencies in what the Office of Management and Budget (OMB) 
calls the multisector workforce,[Footnote 2] contractor employees 
often require extensive access to and use of sensitive government 
information. Protection of sensitive information is critical because 
unauthorized disclosure can erode the integrity of government 
operations and lead to situations in which that information is misused 
for private gain, potentially harming important interests such as the 
privacy of individuals, commercial business proprietary rights, 
national security, and law enforcement. The risks associated with 
contractor misuse of sensitive information have been the subject of 
media attention, such as a recent case involving a contractor 
employee's theft of names, Social Security numbers, and dates of birth 
for Transportation Security Administration airport employees in Boston 
and a case involving State Department contractor employees' 
unauthorized viewing of the electronic passport files of three 2008 
presidential candidates. 

With the growth in use of contractors supporting government 
operations, the question of how best to limit contractor misuse and 
unauthorized disclosure of sensitive information becomes increasingly 
important. Many of the rules governing how contractors operate are 
articulated in the Federal Acquisition Regulations (FAR) system, which 
establishes uniform policies and procedures for acquisition of 
supplies and services by all executive agencies. It consists of the 
FAR and agency-specific regulations that supplement and implement the 
FAR with additional guidance to meet specific needs of the agencies. 
[Footnote 3] In its 2007 report, the Acquisition Advisory Panel 
reported a concern that not all federal agencies had established 
guidance for how support-services contractor employees should protect 
sensitive information such as confidential or proprietary data from 
release or improper use.[Footnote 4] The panel concluded that 
substantial benefits could be achieved if governmentwide guidance and 
contract clauses were developed in the FAR that federal agencies could 
use to protect sensitive information, rather than having agencies 
develop such clauses individually. Our work has reported similar 
concerns and is generally consistent with the panel's recommendations 
about the proper role of contractor employees in the multisector 
workforce.[Footnote 5] 

Given the government's reliance on contractors and their access to 
sensitive information, you asked us to review safeguards in the 
federal acquisition system to manage risks and control contractor 
access to sensitive information. Specifically, we assessed the (1) 
extent to which agency guidance and contracts contain safeguards for 
contractor access to sensitive information, and (2) adequacy of 
governmentwide guidance in the FAR on how agencies are to 
contractually safeguard sensitive information to which contractor 
employees may have access. 

To assess agency guidance and contracts relating to contractor access 
to sensitive information, we analyzed the type of information agencies 
identify as requiring protection; limiting its disclosure; and 
prohibiting its misuse based on (1) review of agency practices related 
to controls over contractor access to sensitive information, (2) 
review of applicable standards drawn from GAO's Standards for Internal 
Controls in the Federal Government,[Footnote 6] and (3) discussions 
with government security and contracting officials responsible for 
administrative, information, and contractor personnel security 
functions. To assess the extent to which agency guidance required the 
use of contract clauses and provisions to safeguard sensitive 
information, we selected three agencies that rank among the top 
procurers of contracted services in fiscal year 2008 and that our 
prior work shows rely extensively on contractors--the (1) Department 
of Defense (DOD), (2) Department of Homeland Security (DHS), and (3) 
Department of Health and Human Services (HHS). At all three agencies, 
we analyzed agency FAR supplements as well as policy and guidance 
regarding sensitive information safeguards. We also interviewed 
acquisition policy, security, and privacy officials to discuss their 
supplements to the FAR and the contract provisions they use to meet 
their specific agency needs. To assess the extent to which agency 
contracts contain such safeguards, we analyzed contract actions 
[Footnote 7] for services potentially requiring contractor access to 
sensitive information at DOD, DHS, and HHS. More specifically, at each 
of five organizational locations at DOD, DHS, and HHS, we analyzed 
documentation for a nongeneralizable sample of 6 to 10 (for a total of 
42) contract actions for support services, selected because they 
involve contractors working in close proximity to government employees 
and to provide a cross section of services contracts to review by type 
and functions performed. The purpose of this contract analysis was to 
determine whether they contained contract provisions consistent with 
attributes we identified for safeguarding sensitive information from 
unauthorized contractor disclosure and misuse. We used content 
analysis to classify and code the information in the contract 
documents. Two GAO analysts independently reviewed the provisions and 
clauses in each contract or task order and then reconciled any 
differences in how they were coded. For nine of the contract actions 
that we judgmentally selected for in-depth case studies, we also 
interviewed officials, such as contracting officers, program managers, 
contracting officers' representatives, and security and privacy 
officials. 

To assess the adequacy of governmentwide guidance, we analyzed FAR 
requirements that prescribe protections associated with sensitive 
information. We also reviewed proposed and pending amendments to the 
FAR. To further understand steps being taken to amend the FAR, we 
interviewed officials at the Office of Federal Procurement Policy 
(OFPP) in OMB and other agencies with FAR Council membership.[Footnote 
8] We conducted this performance audit from May 2009 through September 
2010 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. Additional 
details of our objectives, scope, and methodology are included in 
appendix I. 

Background: 

Unauthorized disclosure of sensitive information by government or 
contractor employees through negligence or misconduct can have a 
significant effect on the government's ability to perform its primary 
functions, potentially resulting in financial loss, damaged 
reputation, and loss of public trust. Sensitive information may not 
always be explicitly designated or marked as such. For the purposes of 
this report, we use the term "sensitive information" to generally 
refer to information under an agency's authority or control that has a 
degree of confidentiality[Footnote 9] such that its loss, misuse, 
unauthorized access, or modification could compromise that 
confidentiality and harm important interests, such as personal and 
medical privacy to which individuals are entitled under laws,[Footnote 
10] national security, law enforcement, proprietary commercial rights, 
or the conduct of agency programs. 

The large but unquantifiable amount of sensitive information generated 
by the government makes understanding its scope more difficult and 
agencies' safeguarding this information from unauthorized disclosure 
or inappropriate use by contractors a complex challenge. Table 1 shows 
examples of several types of sensitive information. Additional 
examples are listed in appendix II. All examples were drawn from a 
myriad of designations that agencies use to describe sensitive 
information. 

Table 1: Examples of Sensitive Information: 

Type of information: Personal; 
Description: The terms personal information and personally 
identifiable information can be used interchangeably to refer to any 
Privacy Act-protected information about an individual maintained by an 
agency, including (1) any information that can be used to distinguish 
or trace an individual's identity; (2) any other information that is 
linked or linkable to an individual; 
Examples: 
* Name; 
* Social Security number; 
* Date and place of birth; 
* Mother's maiden name; 
* Biometric records; 
* Patient health and medical information; 
* Educational information; 
* Financial information; 
* Employment information; 
* Census data; 
* Taxpayer data. 

Type of information: Source selection; 
Description: Nonpublic information prepared for use by an agency to 
evaluate a bid or proposal to enter into an agency procurement 
contract, such as contractor's proposed costs or the government's 
evaluation plans; 
Examples: 
* Contractor bid or proposal information, including cost or pricing 
data; 
* Source-selection plans; 
* Technical evaluation plans; 
* Technical evaluations of proposals; 
* Cost or price evaluations of proposals; 
* Rankings of bids, proposals, or competitors; 
* Competitive range determinations; 
* Evaluations of source-selection panels, boards, or advisory councils. 

Type of information: Business proprietary; 
Description: Nonpublic information that is used, produced, or marketed 
under legal rights of the business concern; 
Examples: 
* Information that may relate to trade secrets, processes, operations, 
style of work, or apparatus; 
* Information that may relate to the identity, confidential 
statistical data, amount or source of any income, profits, losses, or 
expenditures; 
* Information about manufacturing processes, operations, or techniques 
marked proprietary by a business concern. 

Type of information: Agency sensitive; 
Description: Information relating to an agency's mission, management 
operations, or staff that is generally not released to the public. 
Each agency may individually determine what qualifies as this type of 
information, therefore, the type of information covered by this 
category varies by agency; 
Examples: 
* Continuity-of-operations information; 
* Security management information; 
* System and network monitoring information; 
* Predecisional planning, programming, budgeting, and execution 
documents and information; 
* Protection services (building security); 
* Personnel records. 

Source: GAO analysis of laws, regulations, and other government 
sources. 

[End of table] 

The federal government uses a variety of means, whether prescribed by 
statute, executive order, or other authority, to limit dissemination 
and protect against the inadvertent disclosure of certain types of 
sensitive information. For information the government considers 
critical to our national security, the government may take steps to 
protect such information by classifying it as Top Secret, Secret, or 
Confidential pursuant to criteria established by law and executive 
order.[Footnote 11] Information that does not meet the thresholds 
established for classification as national security information but 
that an agency nonetheless considers sufficiently sensitive to warrant 
restricted dissemination has generally been referred to as sensitive 
but unclassified (SBU). In designating information this way, agencies 
determine that the information they use must therefore be safeguarded 
from public release. Some, but not all, SBU designations used by 
agencies have a specific basis in statute. 

For example, some agencies use the provisions of the Freedom of 
Information Act (FOIA)[Footnote 12] as their basis for designating 
information as SBU. FOIA establishes that federal agencies must 
generally provide the public with access to government information, 
thus enabling them to learn about government operations and decisions. 
FOIA establishes a legal right of access to government records and 
information, on the basis of the principles of openness and 
accountability in government. But the act also prescribes nine 
specific categories of information that are exempt from disclosure: 
for example, trade secrets and certain privileged commercial or 
financial information, certain personnel and medical files, and 
certain law enforcement records or information.[Footnote 13] Thus the 
need to safeguard sensitive information from public disclosure while 
striking the appropriate balance with the goal of government 
transparency is another challenge agencies must continually address. 
Protecting legitimate security, law enforcement, and privacy interests 
also must be carefully balanced with protecting civil liberties. Of 
critical importance are providing clear rules to those who handle 
sensitive information and ensuring that the handling and dissemination 
of information is not restricted unless there is compelling need. 

Government ethics rules prohibit federal employees from using 
sensitive nonpublic information, defined below, for personal gain or 
to further the interests of another, whether by advice or 
recommendation or through knowing unauthorized disclosure. For federal 
employees, certain activities and acts that affect a personal 
financial interest may also result in violations of criminal law with 
potentially serious consequences, including dismissal, prosecution, 
fines, and imprisonment.[Footnote 14] Because not all government 
ethics rules and related statutes apply to contractors, many of these 
prohibitions do not extend to contractor employees working in the 
multisector workforce. 

Nonpublic Information as Defined in Government Ethics Rules: 

Nonpublic information is information that the employee gains by reason 
of federal employment and that s/he knows or reasonably should know 
has not been made available to the general public. It includes 
information that s/he knows or reasonably should know: 

1. Is routinely exempt from disclosure under the Freedom of 
Information Act, codified at 5 U.S.C. § 552, or otherwise protected 
from disclosure by statute, Executive order or regulation; 

2. Is designated as confidential by an agency; or; 

3. Has not actually been disseminated to the general public and is not 
authorized to be made available to the public on request. 

Source: GAO analysis of 5 C.F.R. 2635.703 (b). 

Safeguards to Protect Sensitive Information Not Always Available in 
Agency Guidance or Included in Contract Actions: 

Our analysis of guidance and contract actions at three agencies found 
areas where sensitive information is not fully safeguarded and thus 
may remain at risk of unauthorized disclosure or misuse. DHS, DOD, and 
HHS FAR supplements include some guidance and standard contract 
provisions--for example that address contractor safeguards for 
personal information. However, the policies and procedures available 
in DOD's and HHS's FAR guidance do not contain effective agency 
management controls for sensitive information needed to help ensure 
contractor compliance, prevent contractor disclosure and misuse, and 
promote contractor accountability. Such guidance could help 
contracting and program officials incorporate safeguards into their 
contract actions for protecting all types of relevant sensitive 
information contractors may access, such as agency sensitive 
information. At the contract level, almost half of the 42 contract 
actions reviewed did not include solicitation and contract provisions 
that safeguarded against unauthorized contractor disclosure and 
inappropriate use of sensitive information contractors may access in 
program offices during the course of contract performance.[Footnote 
15] In cases where there was agency policy to include contract 
provisions to protect sensitive information on all contracts, such as 
regarding the medical privacy of individuals, it was not incorporated 
in 5 of the 42 contract actions that we reviewed. Additionally, DOD 
and HHS lack guidance on the use of nondisclosure agreements, while 
DHS has found that these help improve accountability by informing 
contractors of their responsibilities and the consequences that may 
result from their failure to meet those responsibilities. 

Attributes of Safeguards Needed in Agency Guidance and Contracts to 
Protect Sensitive Information: 

Contractor and subcontractor employees can be responsible for carrying 
out a range of mission-critical tasks--including studying ways to 
acquire desired capabilities, developing contract requirements, and 
advising or assisting on source selection, budget planning, financial 
management, and regulations development--potentially requiring access 
to many types of sensitive information. Agencies can use their FAR 
supplement authority to issue guidance, which may include contract 
provisions to establish contractor responsibility for safeguarding 
sensitive information.[Footnote 16] 

Review of agency practices and discussions with government security 
and contracting officials identified three key attributes for 
assessing the extent that agencies' guidance or the FAR contain 
effective safeguards for sensitive information in acquisition guidance 
and contracts. On the basis of these sources, in order to have more 
effective safeguards in place, contracts should contain provisions 
that (1) describe the relevant scope of sensitive information under 
the agency's authority or control that should be protected if 
contractors require access to it for contract purposes; (2) require 
the contractor to refrain from disclosing such sensitive information 
to anyone except as needed for contract performance; and (3) address 
conflicts of interest or other misuse by prohibiting the contractor 
from using such sensitive information for any purpose other than 
contract performance. 

Agency FAR guidance should help contracting and program officials 
incorporate effective safeguards for sensitive information into their 
contract actions by including certain management control practices. We 
identified a range of management control practices sometimes 
incorporated into acquisition guidance to help prevent contractor 
disclosure and misuse, and promote contractor accountability for 
sensitive information breaches that harm important interests. These 
control practices include requiring contractors to (1) train or inform 
employees on their obligations to maintain confidentiality and not 
misuse sensitive information; (2) obtain written consent from the 
agency to disclose sensitive information; (3) pass sensitive 
information provisions to subcontractors; (4) execute a nondisclosure 
agreement for each employee and subcontractor as a condition of access 
to sensitive information; (5) promptly notify key agency officials of 
the misuse or unauthorized disclosure of sensitive information; and 
(6) be informed of the consequences for violations. 

Agency Guidance for Two of Three Agencies Reviewed Lacks Needed 
Safeguards for Contractor Protection of Sensitive Information: 

Our review found DOD, DHS, and HHS all have guidance that supplements 
the FAR and addresses requirements or standard contract provisions for 
contractor protection of certain categories of sensitive information. 
For example, DOD supplements the protection of individual privacy 
requirements contained in the FAR by incorporating references to the 
agency rules and regulations.[Footnote 17] HHS also supplements the 
FAR with detailed policy that establishes Privacy Act requirements and 
requires the inclusion of contract provisions to protect the 
confidentiality of records and the privacy of individuals in contracts 
where the Privacy Act is not applicable but the contract would involve 
the collection of individually identifiable personal information by 
the contractors.[Footnote 18] 

However, with respect to other key attributes available in agency FAR 
policies and procedures reviewed at DOD, DHS, and HHS, the agencies' 
guidance differs in how well they help contracting and program 
officials incorporate necessary safeguards for sensitive information 
into their contract actions. Of the guidance analyzed at the three 
agencies, only DHS established effective management control practices 
through standard contract provisions in its FAR supplement and related 
guidance requiring contractors to safeguard sensitive information 
accessed by employees. In contrast, the FAR guidance of DOD and HHS 
does not contain effective agency management controls for sensitive 
information needed to help ensure contractor compliance, prevent 
contractor disclosure and misuse, and promote contractor 
accountability. (See appendix III for the standard contract provisions 
we identified in DHS, DOD, and HHS FAR supplements.) 

As shown in table 2, our analysis of agency guidance included in the 
DHS FAR supplement found that it contained five of six effective 
management control practices consistent with key attributes for 
establishing safeguards for sensitive information. For example, the 
DHS FAR supplement and related guidance aims to (1) make contractors 
aware of their responsibilities for maintaining confidentiality of 
sensitive information; (2) address conflicts of interest and potential 
misuse by prohibiting use of agency information processed, stored, or 
transmitted by the contractor for any purpose other than contract 
performance; and (3) deter noncompliance with these requirements and 
ensure accountability by explaining consequences related to 
violations. According to agency acquisition policy officials, 
recognition within DHS of the need for contractor safeguards for 
homeland security-sensitive information likely led to the 
establishment of extensive requirements when the agency updated its 
interim FAR supplement and related guidance in 2006. On the other 
hand, DHS acquisition policy and security officials acknowledge that 
the agency's FAR supplement and contract clause do not directly 
specify contractor responsibilities for promptly notifying contracting 
officers of unauthorized use or disclosure of sensitive information. 
[Footnote 19] Prompt contractor notification to key government 
officials is critical to avoid internal delays that would prevent 
officials from being aware of the unauthorized use or disclosure; 
delay agency decisions about how to respond; and deny the opportunity 
for affected parties to take precautions. 

Table 2: Analysis of Control Practices in Agency FAR Supplements for 
Safeguarding Sensitive Information Accessed by Contractors: 

Applicable FAR supplement guidance: DHS; HSAR Section 3004.470--
Security requirements for access to unclassified facilities, 
Information Technology resources and sensitive information[A]; 
Requires contractor employee training on protection and disclosure of 
sensitive information: [Check]; 
Requires written consent to disclose: [Check]; 
Requires prompt notification to agency of unauthorized disclosure or 
misuse: [Empty]; 
Requires employees sign nondisclosure agreements: [Check]; 
Requires passing of safeguards to subcontractors: [Check]; 
Explains that there are consequences for violations: [Check]. 

Applicable FAR supplement guidance: DOD; DFARS Subsection 204.404-70-- 
directs contracting officers to use the clause, Disclosure of 
Information[B], when the contractor will have access to or generate 
unclassified information that may be sensitive and inappropriate to 
release to the public; 
Requires contractor employee training on protection and disclosure of 
sensitive information: [Empty]; 
Requires written consent to disclose: [Check]; 
Requires prompt notification to agency of unauthorized disclosure or 
misuse: [Empty]; 
Requires employees sign nondisclosure agreements: [Empty]; 
Requires passing of safeguards to subcontractors: [Check]; 
Explains that there are consequences for violations: [Empty]. 

Applicable FAR supplement guidance: HHS; HHSAR Subpart 324.70--
Confidentiality of Information (deleted)[C]; 
Requires contractor employee training on protection and disclosure of 
sensitive information: [Empty]; 
Requires written consent to disclose: [Check]; 
Requires prompt notification to agency of unauthorized disclosure or 
misuse: [Empty]; 
Requires employees sign nondisclosure agreements: [Empty]; 
Requires passing of safeguards to subcontractors: [Empty]; 
Explains that there are consequences for violations: [Empty]. 

Source: GAO analysis of DOD, DHS, and HHS data. 

Notes: Data are from agency FAR supplements. See appendix III for the 
full text of the DHS, DOD, and HHS contract clauses cited in this 
analysis. 

[A] The Department of Homeland Security Acquisition Regulation (HSAR) 
directs contracting officers to include the basic clause, HSAR 
Subsection 3052.204-71, Contractor Employee Access, when contractor 
employees require recurring access to government facilities or access 
to sensitive information. Subsection 3004.470-2 requires compliance 
with the policies and procedures in a DHS security management 
directive that expressly requires contractor and consultants to 
execute the DHS Form 11000-6, Sensitive But Unclassified Information 
Non-disclosure Agreement, as a condition of access to sensitive 
information. See appendix IV for detailed information about DHS 
contractor nondisclosure agreement requirements. 

[B] Defense Federal Acquisition Regulation Supplement (DFARS) 
Subsection 252.204-7000. Our analysis on this chart is limited to the 
noted DFARS clause and corresponding subsection. Other DFARS clauses 
may contain some of these safeguards to protect sensitive information, 
but they are limited to specific categories of information. For 
example, as a condition of access to another contractor's technical 
data or computer software delivered to the government, DFARS 227.7103- 
7 provides that an authorized company representative may execute a 
nondisclosure agreement directly with the other contractor that 
prohibits (1) use of such data for other than government contract 
purposes and (2) release, display, or disclosure of such technical 
data or computer software without the express written permission of 
the other contractor. Under this DFARS provision, execution of this 
nondisclosure agreement is for the benefit of the other contractor, 
and the recipient contractor agrees to hold harmless the government 
from every liability arising out of the misuse of the other 
contractor's technical data or computer software. 

[C] Contracting officers were directed to use the clause in Department 
of Health and Human Services Acquisition Regulation (HHSAR) Subsection 
352.224-70, Confidentiality of Information, whenever the need existed 
to keep information confidential, such as when contracts involved the 
use of proprietary plans or processes or confidential financial 
information of organizations other than the contractor's. When HHS 
revised its FAR supplement effective as of January 2010, this guidance 
was removed in its entirety from the HHSAR. 

[End of table] 

DHS's guidance establishes stronger safeguards for sensitive 
information than what we found at DOD and HHS in their FAR 
supplements. In contrast with the DHS guidance, the analysis in table 
2 shows that DOD's FAR supplement does not include the same amount of 
detail as to how contractors are to safeguard sensitive information. 
At present, DOD's FAR supplement is limited to requiring the use of a 
disclosure of information clause in solicitations and contracts when 
contractors have access to unclassified information that may be 
sensitive and inappropriate for release to the public--for example, 
DOD officials said the clause authorizes use in a contractor's press 
and marketing materials.[Footnote 20] In addition, since HHS revised 
its FAR supplement as of January 2010,[Footnote 21] guidance and a 
contract provision that required contractors to obtain written consent 
before disclosing certain kinds of sensitive information--not already 
subject to FAR and agency privacy restrictions--was deleted in its 
entirety.[Footnote 22] According to the director for acquisition 
policy, HHS deleted the "Confidentiality of Information" clause 
because the need for agency guidance will be obviated by pending 
changes to the FAR expected later in 2010.[Footnote 23] 

Besides the supplemental FAR guidance, agencies have developed other 
policies and control practices to establish additional contractor 
responsibilities for safeguarding certain categories of sensitive 
information obtained during contract performance. For example, a 2007 
privacy breach involving a DOD contractor that potentially compromised 
the personal health information of 580,000 households led the privacy 
office in DOD's component agency TRICARE Management Activity (TMA) to 
determine that the agency's contract provisions did not adequately 
protect sensitive information.[Footnote 24] According to the TMA 
privacy office director, most TMA contracts before 2007 did not 
specifically require the contractor to safeguard personal health 
information, notify DOD or beneficiaries of privacy breaches, or to 
mitigate any harm, such as paying for the cost of free credit 
monitoring to affected individuals. 

To address this problem, TMA has required since 2007 that standard 
contract provisions be included whenever a contract is awarded that 
requires either the use of or access to personal information. The 
required contract language is posted on TMA's Web site and imposes 
protections for the privacy and security of personally identifiable 
information and protected health information. It seeks to ensure that 
contractors understand their responsibility in protecting TRICARE 
beneficiaries' sensitive information. Similarly, HHS's Centers for 
Medicare and Medicaid Services (CMS) issued an acquisition policy and 
procedure notice, which took effect in 2005, to advise contracting 
staff of the requirement to use a clause for contractor protection of 
health information. This standard CMS clause had been revised to 
integrate the HIPAA security standards along with the privacy 
standards that were previously adopted in standard contract 
provisions.[Footnote 25] 

Almost Half of Contract Actions Reviewed Lack Contract Provisions That 
Fully Safeguard Sensitive Information: 

For our analysis of contract documents for 42 contract actions at DHS, 
DOD, and HHS that involved contractor employees supporting mission- 
critical tasks, in order to be considered to fully safeguard all types 
of sensitive information, a contract had to contain provisions that 
specifically required contractors to refrain from (1) disclosing 
sensitive information to anyone except as needed for contract 
performance and (2) using such sensitive information for any purpose 
other than contract performance. In addition, the provisions had to 
cover the relevant types of sensitive information that may be accessed 
by a contractor during performance. As shown in table 3, our analysis 
found that slightly more than half of contract actions reviewed--23 of 
42--contained contract provisions that fully safeguard the 
confidentiality and appropriate use of all types of sensitive 
information. In contrast, the remaining 19 contract actions reviewed 
did not extend safeguards to all relevant types of sensitive 
information that contractors may have had access to through the 
program offices they support. In the absence of such safeguards, there 
is higher risk of unauthorized disclosure or misuse of sensitive 
information by contractors.[Footnote 26] 

Table 3: Analysis of Contract Provisions Establishing Contractor 
Safeguards for Sensitive Information: 

Agency: DHS; 
Number of contracts reviewed: 14; 
Presence of provisions safeguarding sensitive information[A]: 11; 
Absence of provisions safeguarding sensitive information: 3. 

Agency: DOD; 
Number of contracts reviewed: 18; 
Presence of provisions safeguarding sensitive information[A]: 9; 
Absence of provisions safeguarding sensitive information: 9. 

Agency: HHS; 
Number of contracts reviewed: 10; 
Presence of provisions safeguarding sensitive information[A]: 3; 
Absence of provisions safeguarding sensitive information: 7. 

Agency: Total; 
Number of contracts reviewed: 42; 
Presence of provisions safeguarding sensitive information[A]: 23; 
Absence of provisions safeguarding sensitive information: 19. 

Source: GAO analysis of agency contracts. 

[A] Analysis of 23 contract actions found evidence of contract 
provisions that established requirements for appropriate disclosure, 
handling, access, and restrictions on misuse of a full range of 
nonpublic agency information, proprietary information, and privacy 
information. 

[End of table] 

Of the 19 contracts reviewed that did not have provisions for all 
safeguards, our content analysis found that one HHS blanket purchase 
agreement and an associated order we reviewed contained no evidence of 
contract provisions for contractor safeguarding of sensitive 
information, except for standard FAR clauses related to the Privacy 
Act in the base contract. In addition, some contract provisions 
included in 18 other contract actions provided too few safeguards, 
given the range of tasks being performed and the potential 
opportunities to gain access to many types of sensitive information. 
For example, at HHS several contract actions specified that 
contractors must safeguard certain types of sensitive information, but 
did not specify contractor protection of agency-sensitive information 
from nondisclosure or misuse. In other cases, clauses addressed 
limitations on the disclosure of certain types of sensitive 
information, but not its misuse, and therefore did not fully safeguard 
these types of information. Some HHS contract actions require that 
contractors perform acquisition functions related to other 
contractors, such as strategic planning in support of future task 
awards or auditing business proposals, and thus could require access 
to proprietary information. These contract actions did not always 
include safeguards addressing limits on unauthorized disclosure and 
misuse of proprietary information. Similarly, several DOD contract 
actions included provisions to prevent contractors from disclosing any 
nonpublic information they obtained during contract performance, but 
provisions to prohibit contractors from misusing the information for 
purposes other than contract performance were absent. 

In cases where there was agency policy to include specific contract 
provisions to protect sensitive information, it was not incorporated 
in five of the contract actions we reviewed. For example, 3 DHS task 
orders of the 14 contract actions reviewed did not include the 
contract clause required when contractors need recurring access to 
government facilities or sensitive information.[Footnote 27] At HHS, 2 
task orders of the 10 contract actions reviewed did not include 
standard contract provisions regarding HIPAA privacy and security 
standards required by agency policy to be in all contracts. 

Two of Three Agencies Reviewed Lack Guidance on Using Contractor 
Nondisclosure Agreements for Full Range of Sensitive Information: 

Several of the contract actions we reviewed used nondisclosure 
agreements as a mechanism to help protect sensitive information from 
conflicts of interest and preserve its confidentiality. These 
agreements generally outline the exchange of confidential information 
or knowledge that at least two parties need to share for certain 
purposes, but wish to restrict access to by third parties. When used 
by agencies as a condition of contractor access to sensitive 
information, a nondisclosure agreement may serve several important 
accountability purposes. These include informing contractor employees 
and subcontractors of (1) the trust that is placed in them by 
providing them access to sensitive information; (2) their 
responsibilities to protect that information from unauthorized 
disclosure and use; and (3) the consequences that may result from 
their failure to meet those responsibilities. 

All of the agencies we reviewed had established guidance requiring 
contractor employees participating in source-selection activities to 
sign an agreement to not disclose procurement sensitive, proprietary, 
or source-selection information. Beyond addressing this one area of 
sensitive information however, only DHS and TMA (in DOD) had guidance 
requiring the use of standard contractor nondisclosure agreements for 
a broader range of sensitive information that may be handled by 
contractors. Under the DHS and TMA guidance, certain contracts are to 
contain provisions that require contractors to submit to a designated 
agency official an executed nondisclosure agreement for each employee 
and subcontractor within a stipulated time following contract award or 
before they are given access to certain types of agency sensitive 
information. Appendix IV provides examples of standard nondisclosure 
agreements we reviewed. 

DHS and TMA security and acquisition policy officials responsible for 
jointly developing agency guidance on nondisclosure agreements view 
these agreements as critical to promoting contractor accountability. 
According to the DHS administrative security chief, the agencywide 
nondisclosure agreement was developed in coordination with agency 
acquisition policy, information technology (IT) security, and privacy 
officials to educate contractor personnel on the agency's standards 
for safeguarding sensitive information and provide a mechanism to hold 
them accountable should they violate the terms of the agreement. The 
agencywide form was also developed to eliminate use of nonstandard 
forms to cover different types of sensitive information that were 
causing confusion and required contractor employees to sign multiple 
forms.[Footnote 28] According to DOD's acquisition executive for TMA, 
having contractor employees sign nondisclosure agreements provides 
additional benefits for the government by (1) requiring that 
contractors will protect and not disclose sensitive information; (2) 
protecting against conflicts of interest that could occur if 
contractors use sensitive information for future competitive 
advantage; and (3) making contractors and their employees aware of the 
government's expectations and their obligations to safeguard sensitive 
information. 

As shown in table 4, due to the agencywide use of nondisclosure 
agreements at DHS and DOD's TMA, 20 of 42 contract actions reviewed 
contained contract provisions requiring nondisclosure agreements for 
each employee and subcontractor. All 10 of the Air Force contracts 
reviewed and 1 contract at HHS required contractors to enter into 
third-party agreements with other contractors about the 
confidentiality and use of their proprietary information obtained 
during contract performance. 

Table 4: Analysis of Contract Requirements for Nondisclosure 
Agreements: 

Agency: DHS; 
Number of contract actions reviewed: 14; 
Contract provisions relating to nondisclosure agreements: 
Requires contractor to submit executed nondisclosure agreement for 
each individual as a condition of access: 12; 
Requires contractor agreements with third-parties to protect their 
proprietary information: 0; 
Does not require nondisclosure agreements: 2[A]. 

Agency: DOD: TMA; 
Number of contract actions reviewed: 8; 
Contract provisions relating to nondisclosure agreements: 
Requires contractor to submit executed nondisclosure agreement for 
each individual as a condition of access: 8; 
Requires contractor agreements with third-parties to protect their 
proprietary information: 0; 
Does not require nondisclosure agreements: 0. 

Agency: DOD: Air Force; 
Number of contract actions reviewed: 10; 
Contract provisions relating to nondisclosure agreements: 
Requires contractor to submit executed nondisclosure agreement for 
each individual as a condition of access: 0; 
Requires contractor agreements with third-parties to protect their 
proprietary information: 10; 
Does not require nondisclosure agreements: 0. 

Agency: HHS; 
Number of contract actions reviewed: 10; 
Contract provisions relating to nondisclosure agreements: 
Requires contractor to submit executed nondisclosure agreement for 
each individual as a condition of access: 0; 
Requires contractor agreements with third-parties to protect their 
proprietary information: 1; 
Does not require nondisclosure agreements: 9. 

Agency: Total; 
Number of contract actions reviewed: 42; 
Contract provisions relating to nondisclosure agreements: 
Requires contractor to submit executed nondisclosure agreement for 
each individual as a condition of access: 20; 
Requires contractor agreements with third-parties to protect their 
proprietary information: 11; 
Does not require nondisclosure agreements: 11. 

Source: GAO analysis of agency contracts and task orders. 

[A] DHS policy requires nondisclosure agreements to be executed by 
contractors as a condition of access to sensitive information. 
Therefore, these contractors may have been required to sign 
nondisclosure agreements, but this requirement was not clearly stated 
in two contracts. 

[End of table] 

One case study of an Air Force contract illustrated the practical 
challenges for agency monitoring of such third-party agreements in 
contrast to agency use of its own contractor nondisclosure agreements. 
In this case study, although the contractor's conflict of interest 
mitigation plan indicated the company maintained nondisclosure 
agreements and proprietary protection agreements with many third-party 
contractors, no copies of executed nondisclosure agreements were 
available from the Air Force contracting and program officials 
responsible for administering the contract. In addition, officials 
told us they knew that the contractor had entered into such 
agreements, but they had not reviewed them.[Footnote 29] 

We discussed a less challenging approach for implementing agency 
contractor nondisclosure agreements with the Department of the 
Treasury's (Treasury) contract administrator responsible for 
management and oversight of contractors and financial agents 
supporting the Troubled Asset Relief Program (TARP).[Footnote 30] He 
agrees with DHS and TMA views that nondisclosure agreements are 
critical to promoting contractor accountability for maintaining 
confidentiality of sensitive information and providing other benefits, 
such as helping to prevent conflicts of interest that could arise from 
contractor misuse of the information. Treasury uses an alternative way 
to implement these agreements that reduces administrative burden 
without compromising contractor compliance for their use. Language 
included in certain TARP Financial Agency Agreements requires the 
financial agent to have each employee and all affiliate and contractor 
personnel to whom nonpublic information is or may be disclosed execute 
the agency's nondisclosure agreement form--included as an exhibit to 
the agreement--as a condition of access to sensitive government 
information.[Footnote 31] According to the Treasury official, it is 
better to have the contractor responsible for retaining the executed 
agreements in its own files, rather than have the government 
contracting officer or program office retain them. The official 
explained that as long as the terms of the contract require 
contractors to certify to the government they have collected the 
agency's nondisclosure agreement for all individuals they assign to 
perform on the contract, and the agreements are available to the 
government for inspection, it is better to hold contractors 
accountable for retaining the signed agreements. 

Efforts Underway to Improve Governmentwide Guidance in the FAR for 
Contractor Access to Sensitive Information: 

The FAR Council in recent years has made progress improving guidance 
for security and oversight related to contractor access to sensitive 
government facilities and information systems, but challenges remain. 
While the FAR establishes governmentwide guidance on certain 
contractor sensitive-information safeguards prescribed in statute--for 
example, to require contractor protection of individual privacy--FAR 
guidance does not address certain key areas relating to contractor 
access to sensitive information. Several amendments are pending before 
the FAR Council to implement recommended changes and to improve FAR 
guidance in the complex areas involving contractor access to sensitive 
information. Such changes to the FAR could provide agencies clear 
guidance on the use of contractor nondisclosure agreements as a 
condition of access to sensitive information and could include 
requirements for contractors to promptly notify agencies of 
unauthorized disclosure and misuse of sensitive information to enable 
timely decisions regarding an agency's response when use of sensitive 
information is compromised. With the rulemaking process underway to 
develop these amendments, the FAR Council has an opportunity to 
consider additional changes to strengthen FAR guidance to ensure 
remaining gaps in contractor safeguards identified in this review are 
addressed. 

Governmentwide Guidance Currently Addresses Certain Contractor 
Safeguards for Sensitive Information: 

The FAR is the primary regulation that provides uniform policies and 
procedures for acquisitions by executive agencies.[Footnote 32] During 
the acquisition process, the FAR emphasizes basic planning that has to 
be coordinated among agency personnel responsible for significant 
aspects of the acquisition, such as contracting, fiscal, legal, and 
technical personnel.[Footnote 33] In describing agency needs during 
acquisition planning, the FAR directs agencies to address all 
significant considerations that will control each acquisition, 
including security considerations for acquisitions requiring routine 
contractor physical access to a federal facility or IT system. 

The FAR has several provisions that establish policy and contract 
clauses implementing requirements prescribed in statute or executive 
order for contractor protection of certain categories of sensitive 
information, such as information related to the privacy of 
individuals. When these FAR provisions, which are described in table 
5, are applicable, certain sensitive-information requirements are 
included in solicitation and contract provisions that are intended to 
safeguard procurement integrity, classified information, 
organizational conflicts of interest, and privacy.[Footnote 34] 
Agencies use this guidance to incorporate requirements during 
acquisition planning and when describing agency needs. 

Table 5: FAR Contract Provisions for Safeguarding Certain Types of 
Sensitive Information: 

Covered information: Source selection; 
FAR provisions obliging contractor employee authorized use and 
confidentiality: Section 3.104--Procurement Integrity. Both federal 
employees and contractor employees that have access to contractor bid 
or proposal information or source-selection information are subject to 
laws and regulations to limit disclosure of protected procurement-
related information. Violations are punishable by both civil and 
criminal penalties and administrative actions, such as contract 
cancellation. 41 U.S.C. § 423. 

Covered information: Classified; 
FAR provisions obliging contractor employee authorized use and 
confidentiality: Subpart 4.4--Safeguarding Classified Information 
Within Industry. Contracting officers shall review all proposed 
solicitations to determine whether access to classified information 
may be required by offerors or by a contractor during contract 
performance. If so, the contracting officer shall follow the relevant 
agency's procedures for security clearances. Contracting officers 
shall also include the appropriate security requirements clause 
(52.204-2) in solicitations and contracts for security safeguards. 
During the award phase of a "classified" contract, contracting 
officers for agencies covered by the national industrial security 
program shall use the Contract Security Classification Specification 
(DD Form 254) to inform contractors and subcontractors of the security 
classifications and requirements assigned to the various documents, 
materials, tasks, and subcontracts. 

Covered information: Business proprietary; 
FAR provisions obliging contractor employee authorized use and 
confidentiality: Subsection 9.505-4--Obtaining Access to Proprietary 
Information. FAR subpart 9.5 requires contracting officers to identify 
and evaluate potential organizational conflicts of interest prior to 
contract award and take steps to address potential conflicts that they 
determine to be significant. The contracting officer may use 
solicitation provisions or a contract clause to require agreements 
about restrictions on the use of other contractors' proprietary 
information obtained during the course of contract performance to 
prevent the contractor from gaining an unfair advantage. These 
restrictions encourage companies to provide information necessary for 
contract performance. If the contracting officer imposes the 
restrictions, the contractor that gains access to proprietary 
information of other contractors must agree with other companies to 
protect their information from unauthorized use or disclosure and 
refrain from using the information for any purpose other than 
necessary for contract performance. If such agreements are required, 
the contracting officer shall obtain copies of these agreements and 
ensure that they are properly executed. 

Covered information: Personal; 
FAR provisions obliging contractor employee authorized use and 
confidentiality: Subpart 24.1--Protection of Individual Privacy. In 
implementing federal privacy requirements the FAR requires that when 
an agency contract will involve the design, development, or operation 
of a system of records on individuals to accomplish an agency 
function, the contracting officer shall (1) ensure that the contract 
identifies the system of records on individuals and the design, 
development, or operation work to be performed, and (2) make available 
agency rules and regulations implementing the Privacy Act. A 
contractor and its employees may be subject to criminal penalties for 
violation of the Privacy Act. 5 U.S.C. § 552a. 

Source: GAO analysis of the FAR. 

[End of table] 

Finally, to address the need for improved governmentwide contracting 
guidance required by presidential directive or law and to assist 
agencies in addressing identified risks from contractor access to 
sensitive federal facilities and information systems, OFPP and the FAR 
Council revised contractor personnel and IT security requirements in 
the FAR. Key aspects of the revised contractor personnel and IT 
security safeguards are summarized as follows: 

* Securing personal identity verification of contractor personnel--in 
2007 the FAR was amended in part to implement the August 2004 Homeland 
Security Presidential Directive 12 (HSPD-12), which required the 
establishment of a governmentwide standard for secure and reliable 
forms of identification for federal employees and contractors alike. 
[Footnote 35] Implementing HSPD-12 requirements through contract 
provisions may help address the risks of contractors gaining 
unauthorized physical or electronic access to federal information or 
contractors using outmoded identification cards that can be easily 
forged, stolen, or altered to allow unauthorized access. 

* Strengthening federal information security oversight of contractor 
IT operations--in 2005 an interim rule amended the FAR to implement 
the Federal Information Security Management Act of 2002 (FISMA) 
information-technology-security provisions.[Footnote 36] According to 
the FAR Council, the addition of specific FISMA-related provisions was 
intended to provide clear, consistent guidance to acquisition 
officials and program managers, and to encourage and strengthen 
communication with IT security officials, chief information officers, 
and other affected parties. 

See appendix V for greater detail on these changes to the FAR. 

Addition of Recommended Changes in FAR Contract Provisions Underway to 
Improve Sensitive Information Safeguards: 

There have been numerous recommendations in recent years for improved 
governmentwide guidance and contract provisions for contractor 
protection of sensitive information. The emphasis has been on 
standardizing approaches and establishing accountability mechanisms 
when access to information is compromised. Problems and 
recommendations to address them include the following: 

* In 2007, the Acquisition Advisory Panel found that increased use of 
contractor employees in the government workforce to support the 
evaluation of other contractors raises questions regarding the 
potential for organizational conflicts of interest and how to preserve 
the confidentiality of proprietary information. To address such risks, 
the panel recommended that the FAR Council provide additional 
regulatory guidance for contractor access to and responsibilities for 
protecting proprietary information belonging to other companies. It 
specifically called for developing standardized contract provisions 
and approaches for agencies' use of nondisclosure agreements and in 
creating remedies for improper information sharing. It also suggested 
the use of standardized clauses for organizational conflicts of 
interest to address issues of unfair competitive advantage when a firm 
gains access to information as part of its performance of government 
contract responsibilities. 

* Similarly, on the basis of lessons learned from agency responses to 
loss of personally identifiable information, in April 2007 we noted 
that agencies need to clearly define contractor responsibilities for 
protecting privacy information.[Footnote 37] In this report, 
contractors were prominently involved in privacy data breaches at 
three of six agencies reviewed, including one case in which a 
contractor inadvertently released informational compact discs to 
several FOIA requesters that contained Social Security numbers and tax 
identification data on 350,000 individuals receiving government 
program payments. We noted that contractor obligations for mitigating 
damage from data breaches, such as notifying affected individuals or 
providing credit monitoring, may be unclear unless specified in the 
contract. Consistent with and in response to our report, DHS 
acquisition policy officials told us in June 2009 of their 
recommendations for revisions to the FAR Subpart 24.1 to (1) expand 
existing Privacy Act coverage and (2) implement a standard approach 
that promotes contractor accountability. According to DHS officials, 
to avoid agency-by-agency development of inconsistent clauses or other 
contractual terms, the FAR needs a revised privacy policy and clause 
for establishing basic government and contractor and subcontractor 
expectations, roles, and responsibilities--including prompt breach 
notification procedures for contractors to inform officials of privacy 
data breaches to enable the agency's timely response. 

* Additionally, in 2008 we reported that certain defense contractor 
employees who support key mission-critical tasks that have the 
potential to significantly influence DOD decisions are not subject to 
the same ethical safeguards as federal employees.[Footnote 38] 
Furthermore, no FAR policy obliges government agencies using these 
contractor employees to require that they be free from personal 
conflicts of interest or addresses the issue of contractor employee 
misuse of the government's nonpublic information obtained while 
performing work under a contract for private gain. To address this 
problem, we recommended that DOD develop and implement policy that 
would require a contract clause, among other safeguards, to prohibit 
contractor personnel from using nonpublic government information for 
personal gain. DOD postponed implementing the recommendation once OFPP 
and the FAR Council began responding to legislation from 
Congress.[Footnote 39] Among other changes, the legislation required a 
standard policy to be developed and issued to prevent personal 
conflicts of interest by contractor employees performing acquisition 
functions closely associated with inherently governmental functions. 
This policy was to require each contractor whose employees performed 
these functions to prohibit covered employees with access to nonpublic 
government information from using it for personal gain. 

In response, since 2007 the FAR Council has opened several cases, 
shown in table 6, to amend the FAR to provide additional regulatory 
coverage and clauses. These open cases, with implementing regulations 
pending as of July 2010, have significant potential for addressing 
these identified problems. Discussions with OFPP and DOD officials 
responsible for these FAR changes, and review of information they 
provided on these cases, indicate that the steps the FAR Council has 
been taking to revise governmentwide guidance are consistent with the 
recommendations. For example, a review of information on these pending 
FAR cases indicates significant changes are being considered to amend 
the FAR so that it addresses access to nonpublic information and 
conflicts of interest. Changes being considered also contain other 
policies and clauses consistent with safeguards we identified for 
protecting contractor sensitive information, and these changes may 
mitigate the risks of unauthorized disclosure and misuse. FAR cases 
generally follow a lengthy process that allows the public, as well as 
federal agencies, to comment on proposed changes to the FAR. Because 
of other rulemaking priorities and the many steps involved--including 
legal and interagency reviews--FAR Council officials told us the 
rulemaking process could take many more months to complete. 

Table 6: Status of Pending FAR Cases to Revise Policies and Clauses 
for Contractor Use and Confidentiality of Sensitive Information: 

FAR case: 2007-019, Contractor Access to Non-public Information; 
Synopsis: Consideration of how to safeguard nonpublic information by 
including provisions and clauses in solicitations and contracts for 
the use of nondisclosure agreements; information sharing among 
contractors; and remedies for improper disclosure; 
Significance: Could potentially address gaps in the FAR's regulatory 
coverage responsive to Acquisition Advisory Panel's recommended 
improvements; 
Status as of July 2010: FAR case opened in 2007; proposed rule has yet 
to be published in Federal Register for consideration of public 
comment. FAR staff is awaiting additional government input on draft 
proposed rule after review by defense and civilian agency acquisition 
councils. 

FAR case: 2007-018, Organizational Conflicts of Interest; 
Synopsis: Consideration of whether current guidance on organizational 
conflicts of interest is adequate for assisting current needs of 
agencies or whether providing standard provisions or clauses might be 
helpful; 
Significance: Could potentially address Acquisition Advisory Panel 
recommendations by changing current guidance under FAR 9.505-4 that 
allows agencies to impose restrictions on contractors gaining access 
to proprietary information from others in the performance of a 
government contract to avoid unfair advantage and protect their 
information from unauthorized use or disclosure; 
Status as of July 2010: FAR case opened in 2007; proposed rule has yet 
to be published in Federal Register for consideration of public 
comment. Draft proposed rule is under review by OFPP. 

FAR case: 2008-025, Preventing Personal Conflicts of Interest by 
Contractor Employees Performing Acquisition Functions; 
Synopsis: Implements § 841(a) of the Duncan Hunter National Defense 
Authorization Act for Fiscal Year 2009, Pub. L. No. 110-417, that 
required OFPP to develop and issue a policy and clauses for inclusion 
in solicitations, contracts, task orders, and delivery orders. 
Proposes a definition of "non-public government information," adapted 
from government ethics rules, as meaning any information that a 
covered employee gains by reason of work under a contract and that the 
covered employee knows, or reasonably should know, has not been made 
public (e.g., proprietary contractor information in the possession of 
the government); 
Significance: Also may address GAO recommendation for DOD to develop a 
policy that will prohibit contractors performing acquisition functions 
with access to nonpublic government information obtained while 
performing work under the contract from using it for personal gain. 
Use of the proposed clause would require contractors to obtain 
nondisclosure agreements from covered employees and report to the 
contracting officer any personal conflict of interest violation. Also 
lists remedies available to the government if a contractor fails to 
comply with the requirements, such as payment suspension or contract 
termination; 
Status as of July 2010: FAR case opened in 2008; proposed rule 
published in Federal Register for consideration of public comment in 
November 2009.[A] Public comments have been addressed by FAR staff for 
draft final FAR rule; awaiting interagency concurrence on open issues 
before final rule can be published in Federal Register. 

FAR case: 2009-022, Security of Systems Handling Sensitive Personally 
Identifiable Information; 
Synopsis: Would establish a uniform approach for handling of sensitive 
Privacy Act information; 
Significance: Could potentially address GAO recommendation and DHS-
proposed revision; 
Status as of July 2010: FAR case opened in 2009; proposed rule yet to 
be published in Federal Register for consideration of public comment. 
Draft proposed rule is under OMB review. 

Source: GAO analysis of FAR Council information. 

[A] The FAR Council issued the proposed rule, Federal Acquisition 
Regulation: FAR Case 2008-025, Preventing Personal Conflicts of 
Interest for Contractor Employees Performing Acquisition Functions. 
Public comments were due in January 2010. 74 Fed. Reg. 58584-89 (Nov. 
13, 2009). 

[End of table] 

Opportunity Exists for FAR Council to Consider Additional Changes in 
the FAR to Further Address Safeguards for Contractor Access to 
Sensitive Information: 

Until the FAR Council completes the rulemaking process for the pending 
cases listed in table 6, it is unclear the extent to which the changes 
will address risks and better control contractor confidentiality and 
authorized use of sensitive information. With regard to unauthorized 
disclosure and use of sensitive information, these risks include (1) 
unauthorized access by contractor employees or subcontractors not 
involved with contract performance, (2) conflicts of interest in using 
sensitive information for financial gain or unfair competitive 
advantage, and (3) unauthorized disclosure. 

Similarly to issues we identified in agency guidance, our review found 
that FAR guidance does not address certain areas relating to 
contractor access to sensitive information. Moreover, rather than 
having agencies develop stronger safeguards individually, the FAR 
Council is developing a standardized approach to address many of these 
areas. This is particularly relevant with regard to changes being 
considered under the open FAR Case 2007-019, Contractor Access to Non-
Public Information, listed above. Nevertheless, our review of 
potential changes to FAR guidance identified two key areas yet to be 
addressed where the FAR does not contain guidance that could help 
agencies address problems identified in this report. 

The first key area is the development and use of contractor 
nondisclosure agreements as a condition of access to sensitive 
information. Additional FAR guidance also could ensure nondisclosure 
agreements used across the government include clear and complete 
information to contractors. Without uniform emphasis in the FAR on how 
agencies use contractor nondisclosure agreements, contractors may not 
be adequately informed of their responsibilities to protect that 
information from unauthorized disclosure and use and the consequences 
that may result from their failure to meet those responsibilities. 

The second key area is the establishment of requirements for 
contractors to provide agencies prompt notification of deviations by 
their employees or subcontractors from provisions for use and 
confidentiality of all types of sensitive information.[Footnote 40] 
Without such guidance in the FAR, contractors may not be adequately 
required to make key government officials aware of unauthorized 
disclosure or inappropriate use of sensitive information involving 
their employees. A contractor's prompt notification is critical to 
avoiding delays in internal agency decisions about how to respond to 
the misuse or unauthorized disclosure of sensitive information and the 
opportunity for affected parties to take precautions. Also, without 
such guidance, agencies may be less able to act on a timely basis to 
hold contractors accountable for their failure to properly use and 
maintain confidentiality of sensitive information. 

Conclusions: 

The government's extensive use of contractors in the multisector 
workforce to support management activities and administrative 
functions, coupled with contractors' increasing access to government 
facilities, has in recent years prompted several constructive efforts 
by the FAR Council to establish uniform contract provisions. However, 
of the three agencies reviewed for this report, only DHS has 
established guidance for controlling contractor use and limiting 
unauthorized disclosure of sensitive information obtained during 
contract performance. OFPP and the FAR Council have recognized that 
FAR guidance does not address certain key areas. Rather than having 
agencies develop their own guidance and clauses individually, several 
amendments are pending to improve guidance and contract clauses in the 
FAR. While these are steps in the right direction, opportunities exist 
to address certain gaps we identified in pending FAR guidance. These 
include the need for guidance on agency use of contractor 
nondisclosure agreements and the need to establish requirements for 
contractors to promptly notify agencies of unauthorized disclosure or 
misuse of sensitive information, which is critical to enabling timely 
agency decisions and responses. 

Recommendations for Executive Action: 

To address the need for clearly defining contractor responsibilities 
in governmentwide guidance in the FAR, we recommend that the 
Administrator of OFPP ensures that the FAR Council incorporates 
changes in the FAR that address safeguards for contractor access to 
sensitive information by: 

* providing guidance to agency acquisition policy officials, in 
coordination with IT security and privacy officials, chief information 
officers, and other affected parties, on agency development and use of 
contractor nondisclosure agreements as a condition of access to 
sensitive information; and: 

* establishing a requirement for prompt notification to appropriate 
agency officials of a contractor's unauthorized disclosure or misuse 
of sensitive information so that timely agency responses are 
facilitated and appropriate contractor accountability mechanisms can 
be enforced. 

Agency Comments and Our Evaluation: 

We provided a draft of this report to OMB's OFPP, DOD, HHS, and DHS 
for review and comment. In oral comments, OFPP generally concurred 
with our recommendations. DOD provided technical comments that were 
incorporated into the report as appropriate and HHS did not have 
comments. 

In written comments, included in appendix VI, DHS generally concurred 
with our report. However, DHS took exception to the analysis for 1 of 
the 14 contract actions reviewed, which we found did not contain 
adequate safeguards to protect sensitive information. While we agree 
that the task order identified in DHS' response includes contract 
provisions with prohibitions against disclosing sensitive information, 
the language does not address safeguards to ensure contractors' 
appropriate use of sensitive information. 

DHS also stated that although this task order lacks a contract clause 
required in DHS acquisition regulations, it includes comparable 
provisions in the statement of work. We reviewed the task order and 
the guidance for the clause HSAR 3052.204-71, Contractor Employee 
Access, which requires the use of the clause or one substantially the 
same in solicitations and contracts when contractor employees require 
recurring access to government facilities or access to sensitive 
information. On the basis of our review, we continue to believe that 
the task order does not contain HSAR clause 3052.204-71 or a contract 
clause that is substantially the same as that clause. Although some 
provisions in the task order contain similar information and 
requirements, these provisions do not cover the same breadth or detail 
as HSAR clause 3052.204-71. For example, the task order does not 
include a comprehensive definition section such as the one in HSAR 
clause 3052.204-71. Without the use of such comprehensive definitions, 
it is not clear that the various provisions of the task order noted by 
DHS collectively and effectively protect the same range of sensitive 
government information as set forth in HSAR clause 3052.204-71. In 
addition, the task order specified in DHS' response does not include 
provisions that limit contractors from disclosing sensitive 
information without authorization from the contracting officer. Also, 
the portions of the statement of work cited as comparable with HSAR 
clause 3052.204-71(e) relate specifically to information technology, 
and not necessarily to information that contractors and their 
employees may otherwise gain access to in the course of their 
contractual responsibilities. 

DHS also provided technical comments, which were incorporated into the 
draft where appropriate. 

We are sending copies of this report to the Director of OMB; the 
Secretaries of Defense, Homeland Security, and Health and Human 
Services; and interested congressional committees. The report also is 
available at no charge on GAO's Web site at [hyperlink, 
http://www.gao.gov]. 

If you or your staff have any questions concerning this report, please 
contact me at (202) 512-4841 or needhamjk1@gao.gov. Contact points for 
our Offices of Congressional Relations and Public Affairs may be found 
on the last page of this report. GAO staff who made major 
contributions to this report are listed in appendix VII. 

Sincerely yours, 

Signed by: 

John K. Needham: 
Director, Acquisition and Sourcing Management: 

[End of section] 

Appendix I: Scope and Methodology: 

To assess the extent that agency guidance and contracts establish 
effective safeguards for sensitive information, we identified key 
attributes of the safeguards that should be contained in acquisition 
guidance and contracts to manage the risks of contractor unauthorized 
disclosure and misuse based on (1) review of agency practices related 
to controls over contractor access to sensitive information, (2) 
review of applicable standards drawn from GAO's Standards for Internal 
Control in the Federal Government,[Footnote 41] and (3) discussions 
with government security and contracting officials responsible for 
administrative, information, and contractor personnel security 
functions. Specifically the acquisition guidance and contracts should 
contain safeguards that (1) describe the relevant scope of sensitive 
information under the agency's authority or control that should be 
protected if contractors require access to it for contract purposes, 
(2) require the contractor to refrain from disclosing such sensitive 
information to anyone except as needed for contract performance, and 
(3) prohibit the contractor from using such sensitive information for 
any purpose other than contract performance. 

To assess the extent to which agency guidance contains safeguards for 
contractor protection of sensitive information, we analyzed applicable 
guidance available in the respective Federal Acquisition Regulation 
(FAR) supplements of the Department of Defense (DOD), the Department 
of Homeland Security (DHS), and the Department of Health and Human 
Services (HHS). We selected these departments for review because they 
ranked among the top procurers of contracted services in fiscal year 
2008, based on a review of the Federal Procurement Data System-Next 
Generation (FPDS-NG), and because prior GAO work shows that their 
component agencies and organizations rely extensively on support 
contractors to perform mission-critical tasks that would potentially 
require access to sensitive information. We assessed the reliability 
of the FPDS-NG data through corroboration with agency officials and 
contract files and determined they were sufficiently reliable for our 
purposes. We analyzed applicable policy and guidance available from 
the departments and some of their selected component agencies and 
organizations to identify the extent their guidance provides for 
contractor protection of sensitive information, including guidance 
contained in agency FAR supplements as well as security and privacy 
program policies and procedures applicable to contractor employees. We 
also interviewed acquisition policy, security, and privacy officials 
to discuss their supplements to FAR guidance and the contract 
provisions they use to meet their specific agency needs. 

To assess the extent to which agency contracts contain safeguards for 
contractor protection of sensitive information, we analyzed DOD, DHS, 
and HHS contract actions (defined as a contract, task order, and 
blanket purchase agreement and associated order) for services 
potentially requiring contractor access to sensitive information from 
the following five component agencies or organizations and locations: 

* within DOD, the (1) TRICARE Management Activity (TMA) in Falls 
Church, Virginia, and the contracting activity supporting TMA at the 
U.S. Army Medical Research Acquisition Activity at Fort Detrick, 
Maryland, and (2) the Air Force Materiel Command's Electronic Systems 
Center at Hanscom Air Force Base, Massachusetts; 

* within DHS in Washington, D.C., (3) U.S. Customs and Border 
Protection and (4) the Office of Procurement Operations within the 
Office of the Chief Procurement Officer, which is the contracting 
activity supporting headquarters organizations; and: 

* within HHS, the (5) Centers for Medicaid and Medicare Services (CMS) 
in Baltimore, Maryland. 

At each of these five organizations, we selected for review a 
nongeneralizable sample of 6 to 10 contract actions (42 in total) in 
which contractor employees worked in close proximity to government 
employees and provided professional and administrative services that 
supported the agencies' missions, in addition to providing a cross 
section of contract types and services. In making our selection, we 
reviewed lists of contract actions and reported dollar values drawn 
from data provided by DOD, DHS, and HHS component agency and 
organization officials to confirm that the contract actions belonged 
to their agencies and that they involved contractors working on-site 
or in close proximity with government employees, to perform services 
potentially requiring access to sensitive information. 

For each of the 42 contract actions, we analyzed the contract 
documentation provided, including base contracts from which task 
orders or blanket purchase agreements and their associated orders were 
issued, to determine whether they contained provisions or clauses that 
direct contractors to safeguard sensitive information consistent with 
key attributes we identified for safeguarding sensitive information. 
In conducting this content analysis, two GAO analysts independently 
reviewed the provisions in each contract or task order and then 
reconciled any differences in how they were coded. We determined 
whether the contract provisions addressed limiting disclosure of 
sensitive information and preventing its misuse. We also assessed the 
scope of information protected--whether these protections applied to 
certain categories or to all relevant types of sensitive information 
that may potentially have been accessed during contract performance. 
We also determined whether the contract actions required the use of 
contractor nondisclosure agreements. 

To obtain an in-depth understanding of the reasons why certain 
contract clauses and provisions to safeguard sensitive information 
were required and obtain views on their effectiveness and how 
contractor compliance with the requirements was being monitored by the 
government at a cross section of DOD, DHS, and HHS offices, we 
selected 9 of the 42 contract actions as case studies. For each case 
study, we conducted semistructured interviews with the DOD, DHS, or 
HHS officials responsible for developing contract requirements and 
monitoring contractor performance, including contracting officers, 
contracting officers' representatives, and program managers. 

To assess the adequacy of governmentwide guidance in the FAR on how 
agencies are to contractually safeguard sensitive information to which 
contractor employees have access, we analyzed FAR requirements that 
prescribe protections associated with sensitive information, including 
Part 4 (Administrative Matters); Part 7 (Acquisition Planning); 
Subpart 9.5 (Organizational and Consultant Conflicts of Interest); 
Part 24 (Protection of Privacy and Freedom of Information); and Part 
52 (Solicitation Provisions and Contract Clauses). We reviewed pending 
amendments to the FAR and legislation to determine the safeguards they 
might add to existing FAR guidance. To further understand steps being 
taken to amend the FAR, we interviewed government officials supporting 
members of the FAR Council, which oversees the development and 
maintenance of the FAR, and officials with the Office of Federal 
Procurement Policy (OFPP) in the Office of Management and Budget. The 
OFPP Administrator serves as chair of the FAR Council. 

We conducted this performance audit from May 2009 through September 
2010 in accordance with generally accepted government auditing 
standards. Those standards require that we plan and perform the audit 
to obtain sufficient, appropriate evidence to provide a reasonable 
basis for our findings and conclusions based on our audit objectives. 
We believe that the evidence obtained provides a reasonable basis for 
our findings and conclusions based on our audit objectives. 

[End of section] 

Appendix II: Sensitive But Unclassified Markings Identified by 
President's Task Force on Controlled Unclassified Information: 

In 2006 we reported on a survey of federal agencies that showed 26 
were using 56 different designations to protect information they deem 
critical to their missions--such as law-enforcement sensitive, 
sensitive security information, and unclassified controlled nuclear 
information.[Footnote 42] Because of the many different and sometimes 
confusing and contradictory ways that agencies identify and protect 
sensitive but unclassified (SBU) information, the sharing of 
information about possible threats to homeland security has been 
difficult.[Footnote 43] 

To address this challenge, efforts are underway to establish new 
governmentwide processes for designating, marking, safeguarding, and 
disseminating SBU information. Since 2008, in response to a 
presidential memorandum that replaced SBU information with "controlled 
unclassified information" (CUI) as the single categorical designation 
for SBU information, the executive branch is attempting to overhaul 
its CUI framework.[Footnote 44] The ongoing effort is also addressing 
a 2009 presidential task force report that found too many labels for 
sensitive information and recommended that agencies reduce them and 
balance the need for nondisclosure (to protect privacy or other 
legitimate interests) and transparency and openness in government. 
[Footnote 45] 

The task force found that currently, across the executive branch, this 
information is identified by over 100 unique markings and at least 130 
different labeling or handling regimes (a partial listing of SBU 
markings the task force found currently in use are shown below). The 
SBU challenge, according to the task force, is that although SBU 
regimes or markings are typically derived from an identifiable 
authority, collectively they reflect a disjointed, inconsistent, and 
unpredictable system for protecting, sharing, and disclosing sensitive 
information. 

Table 7: Selected SBU Markings Currently in Use: 

Acquisition Sensitive: 
Agency Internal Use Only (U//AIUO): 
Attorney Client: 
Attorney/Client Privileged: 
Attorney Work Product: 
Bank Secrecy Act Information (BSA): 
Budgetary Information: 
CALEA Cost Recovery Information (CALEA): 
CFIUS Information (CFIUS): 
Chemical-Terrorism Vulnerability Information (CVI): 
Child Victim/Witness (CH): 
Close Hold: 
Commercial Markings: 
Communication/Attorney Work Product (PRV): 
Computer Security Act Sensitive Information (CSASI): 
Confidential Business Information (CBI): 
Confidential Contract Proposal Information (CCPI): 
Confidential Information Protection and Statistical Efficiency Act of 
2002 (CIPSEA): 
Contractor Access Restricted Information (CARI): 
Contractual Sensitive Information: 
Controlled Nuclear Information (U//DCNI or U//ECNI): 
Copyright (Date) (Owner): 
Covered by Confidentiality Agreement: 
DEA Sensitive (DEA S): 
Deliberate Process Privilege: 
Dissemination Is Prohibited Except As Authorized by AR 20-1: 
Do Not Disseminate: 
DOD Unclassified Controlled Nuclear Information (DOD UCNI): 
Enforcement Confidential Information (ECI): 
Exclusive Distribution (EXDIS or XD): 
Export Controlled Information (Or Material) (ECI): 
Eyes Only: 
Federal Taxpayer Information: 
Financial Records (NON-NSL) (FR): 
Financial Records NSL (NSLF): 
For Internal Use Only: 
For Official Use Only (FOUO): 
For Official Use Only-Law Enforcement Sensitive (FOUO-LES): 
Foreign Intelligence Surveillance Act (FISA): 
Grand Jury Material (FGJ): 
Government Purpose Rights: 
Health Related Information (EM): 
Innocent Images Visual Information (IIVI): 
Innovation Research Information and Small Business: 
IT Security Related: 
Juvenile-Protect Identity in Accordance With 18 USC 5031 (JI): 
LAN Backup Sensitive Information: 
LAN Infrastructure: 
Law Enforcement Sensitive (LES): 
Limited Access: 
Limited Credit Information NSL (NSLC): 
Limited Distribution (LIMDIS): 
Limited Official Use (LOU): 
Limited Official Use Information (LOUI): 
Limited Official Use-Law Enforcement Sensitive (LOU-LES): 
Limited Rights: 
Limited Use Only (LUO: 
Medical Records: 
Naval Nuclear Propulsion Information (NOFORN): 
Naval Nuclear Propulsion Information (U-NNPI): 
No Distribution (NODIS or ND): 
Not For Distribution Safeguards Information (SGI): 
Official Use Only (OUO): 
Official Use Only-Applied Technology: 
Official Use Only-Export Controlled Information: 
Official Use Only-Patent Caution Information: 
Official Use Only-Protected Cooperative Census Confidential: 
Official Use Only-Sensitive Internal Information: 
Official Use Only-Small Business: 
Operations Security Protected Information (OSPI): 
Originator Controlled (ORCON): 
Personally Identifiable Information-Privacy Act of 1974: 
Personnel Data, Privacy Act of 1974 (5 U.S.C. 552A): 
Predecisional Product: 
Pre-decisional: 
Pre-Existing Markings: 
Privacy Act Protected Information (PAPI): 
Privileged FBI Attorney Client: 
Proprietary Information (PROPIN): 
Protected Critical Infrastructure Information (PCII): 
RELIDO: 
Research and Development Agreement Information: 
Restricted Access: 
Restricted By Court Order (CO): 
Restricted Rights: 
RSEN: 
SBU-GSA-BI: 
SBU-NF: 
SBU/NOFORN: 
Select Agent Sensitive Information (SASI): 
Sensitive (SENS): 
Sensitive But Unclassified (SBU): 
Sensitive Drinking Water Related Information (SDWRI): 
Sensitive Homeland Security Information (SHSI): 
Sensitive Information (SINFO): 
Sensitive Information-Special Handling Required: 
Sensitive Security Information (SSI): 
Sensitive Student Records (STR): 
Sensitive Treaty/MOU/NDA Information (STM): 
Sensitive Unclassified Non-Safeguards Information (SUNSI): 
Sensitive Water Vulnerability Assessment Information: 
Small Business Innovation Research (SBIR) Program: 
Special License Rights: 
Source Selection Information: 
Source Selection Sensitive: 
Substance Abuse Records (SAB): 
Technology Transfer Information: 
Telephone or Electronic Communications NSL (NSLT): 
Title III Communications (T3): 
Trade Secret: 
Trade Sensitive Information: 
Unlimited Rights. 

Source: Presidential Task Force on Controlled Unclassified Information: 

Note: Data are from the Report and Recommendations of the Presidential 
Task Force on Controlled Unclassified Information (Aug. 25, 2009). 

[End of table] 

[End of section] 

Appendix III: Agency Contract Provisions Containing Contractor 
Safeguards for Sensitive Information: 

Our analysis of agency Federal Acquisition Regulation (FAR) 
supplements for the Department of Homeland Security (DHS), the 
Department of Defense (DOD), and the Department of Health and Human 
Services (HHS) identified the following examples of contract clauses 
and provisions that establish safeguards for contractor access to 
sensitive information. 

DHS: 

The Department of Homeland Security Acquisition Regulation (HSAR) 
Subpart 3004.4, Safeguarding Classified and Sensitive Information 
Within Industry (48 C.F.R. 3004), states that contracting officers 
shall insert the clause at HSAR 3052.204-71, shown in figure 1, or one 
substantially the same, in solicitations and contracts when contractor 
employees require recurring access to government facilities or access 
to sensitive information. The clause shall not be used unless 
contractor employees will require recurring access to government 
facilities or access to sensitive information. 

Figure 1: HSAR Clause 3052.204-71, Contractor Employee Access: 

[Refer to PDF for image: illustration] 

3052.204-71 Contractor employee access. 

As prescribed in (HSAR) 48 CFR 3004.470-3(b), insert a clause 
substantially the same as follows with appropriate alternates: 

Contractor Employee Access: 
(June 2006) 

(a) Sensitive Information, as used in this Chapter, means any 
information, the loss, misuse, disclosure, or unauthorized access to 
or modification of which could adversely affect the national or 
homeland security interest, or the conduct of Federal programs, or the 
privacy to which individuals are entitled under section 552a of title 
5, United States Code (the Privacy Act), but which has not been 
specifically authorized under criteria established by an Executive 
Order or an Act of Congress to be kept secret in the interest of 
national defense, homeland security or foreign policy. This definition 
includes the following categories of information: 

(1) Protected Critical Infrastructure Information (PCII) as set out in 
the Critical Infrastructure Information Act of 2002 (Title II, 
Subtitle B, of the Homeland Security Act, Public Law 107-296, 196 
Stat. 2135), as amended, the implementing regulations thereto (Title 
6, Code of Federal Regulations, Part 29) as amended, the applicable 
PCII Procedures Manual, as amended, and any supplementary guidance 
officially communicated by an authorized official of the Department of 
Homeland Security (including the PCII Program Manager or his/her 
designee); 

(2) Sensitive Security Information (SSI), as defined in Title 49, Code 
of Federal Regulations, Part 1520, as amended, "Policies and 
Procedures of Safeguarding and Control of SSI," as amended, and any 
supplementary guidance officially communicated by an authorized 
official of the Department of Homeland Security (including the 
Assistant Secretary for the Transportation Security Administration or 
his/her designee); 

(3) Information designated as "For Official Use Only," which is 
unclassified information of a sensitive nature and the unauthorized 
disclosure of which could adversely impact a person's privacy or 
welfare, the conduct of Federal programs, or other programs or 
operations essential to the national or homeland security interest; 
and; 

(4) Any information that is designated "sensitive" or subject to other 
controls, safeguards or protections in accordance with subsequently 
adopted homeland security information handling procedures. 

(b) "Information Technology Resources" include, but are not limited 
to, computer equipment, networking equipment, telecommunications 
equipment, cabling, network drives, computer drives, network software, 
computer software, software programs, intranet sites, and internet 
sites. 

(c) Contractor employees working on this contract must complete such 
forms as may be necessary for security or other reasons, including the 
conduct of background investigations to determine suitability. 
Completed forms shall be submitted as directed by the Contracting 
Officer. Upon the Contracting Officer's request, the Contractor's 
employees shall be fingerprinted, or subject to other investigations 
as required. All contractor employees requiring recurring access to 
Government facilities or access to sensitive information or IT 
resources are required to have a favorably adjudicated background 
investigation prior to commencing work on this contract unless this 
requirement is waived under Departmental procedures. 

(d) The Contracting Officer may require the contractor to prohibit 
individuals from working on the contract if the government deems their 
initial or continued employment contrary to the public interest for 
any reason, including, but not limited to, carelessness, 
insubordination, incompetence, or security concerns. 

(e) Work under this contract may involve access to sensitive 
information. Therefore, the Contractor shall not disclose, orally or 
in writing, any sensitive information to any person unless authorized 
in writing by the Contracting Officer. For those contractor employees 
authorized access to sensitive information, the contractor shall 
ensure that these persons receive training concerning the protection 
and disclosure of sensitive information both during and after contract 
performance. 

(f) The Contractor shall include the substance of this clause in all 
subcontracts at any tier where the subcontractor may have access to 
Government facilities, sensitive information, or resources. 

(End of clause) 

Alternate I: 
(June 2006): 

When the contract will require contractor employees to have access to 
Information Technology (IT) resources, add the following paragraphs: 

(g) Before receiving access to TT resources under this contract the 
individual must receive a security briefing, which the Contracting 
Officer's Technical Representative (COTR) will arrange, and complete 
any nondisclosure agreement furnished by DHS. 

(h) The contractor shall have access only to those areas of DHS 
information technology resources explicitly stated in this contract or 
approved by the COTR in writing as necessary for performance of the 
work under this contract. Any attempts by contractor personnel to gain 
access to any information technology resources not expressly 
authorized by the statement of work, other terms and conditions in 
this contract, or as approved in writing by the COTR, is strictly 
prohibited. In the event of violation of this provision, DHS will take 
appropriate actions with regard to the contract and the individual(s) 
involved. 

(i) Contractor access to DHS networks from a remote location is a 
temporary privilege for mutual convenience while the contractor 
performs business for the DHS Component. It is not a right, a 
guarantee of access, a condition of the contract, or Government 
Furnished Equipment (GFE). 

(j) Contractor access will be terminated for unauthorized use. The 
contractor agrees to hold and save DHS harmless from any unauthorized 
use and agrees not to request additional time or money under the 
contract for any delays resulting from unauthorized use or access.
(k) Non-U.S. citizens shall not be authorized to access or assist in 
the development, operation, management or maintenance of Department IT 
systems under the contract, unless a waiver has been granted by the 
Head of the Component or designee, with the concurrence of both the 
Department's Chief Security Officer (CSO) and the Chief Information 
Officer (CIO) or their designees. Within DHS Headquarters, the waiver 
may be granted only with the approval of both the CSO and the CIO or 
their designees. In order for a waiver to be granted: 

(1) The individual must be a legal permanent resident of the U. S. or 
a citizen of Ireland, Israel, the Republic of the Philippines, or any 
nation on the Allied Nations List maintained by the Department of 
State; 

(2) There must be a compelling reason for using this individual as 
opposed to a U. S. citizen; and; 

(3) The waiver must be in the best interest of the Government. 

(l) Contractors shall identify in their proposals the names and 
citizenship of all non-U.S. citizens proposed to work under the 
contract. Any additions or deletions of non-U.S. citizens after 
contract award shall also be reported to the contracting officer. 

(End of clause) 

Alternate II: 
(June 2006): 

When the Department has determined contract employee access to 
sensitive information or Government facilities must be limited to U.S. 
citizens and lawful permanent residents, but the contract will not 
require access to IT resources, add the following paragraphs: 

(g) Each individual employed under the contract shall be a citizen of 
the United States of America, or an alien who has been lawfully 
admitted for permanent residence as evidenced by a Permanent Resident 
Card (USCIS I-551). Any exceptions must be approved by the 
Department's Chief Security Officer or designee. 

(h) Contractors shall identify in their proposals, the names and 
citizenship of all non-U.S. citizens proposed to work under the 
contract. Any additions or deletions of non-U.S. citizens after 
contract award shall also be reported to the contracting officer. 

(End of clause) 

Source: DHS. 

[End of figure] 

DOD: 

The Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 
204.4, Safeguarding Classified Information Within Industry (48 C.F.R. 
204.4), states DFARS clause 252.204-7000, Disclosure of Information 
(shown in figure 2), should be used in solicitations and contracts 
when the contractor will have access to or generate unclassified 
information that may be sensitive and inappropriate to release to the 
public. 

Figure 2: DFARS Clause 252.204-7000, Disclosure of Information: 

[Refer to PDF for image: illustration] 

252.204-7000 Disclosure of Information. 

As prescribed in 204.404-70(a), use the following clause: 

Disclosure Of Information (Dec 1991): 

(a) The Contractor shall not release to anyone outside the 
Contractor's organization any unclassified information, regardless of 
medium (e.g., film, tape, document), pertaining to any part of this 
contract or any program related to this contract, unless: 

(1) The Contracting Officer has given prior written approval; or; 

(2) The information is otherwise in the public domain before the date 
of release. 

(b) Requests for approval shall identify the specific information to 
be released, the medium to be used, and the purpose for the release. 
The Contractor shall submit its request to the Contracting Officer at 
least 45 days before the proposed date for release. 

(c) The Contractor agrees to include a similar requirement in each 
subcontract under this contract. Subcontractors shall submit requests 
for authorization to release through the prime contractor to the 
Contracting Officer. 

(End of clause) 

Source: DOD. 

[End of figure] 

HHS: 

Guidance and contract provisions available in the Department of Health 
and Human Services Acquisition Regulation (BHSAR) Subpart 324.70, 
Confidentiality of Information (48 C.F.R. 324.70) (2006), and the 
accompanying contract clause, shown in figure 3, were deleted when HHS 
revised the BHSAR, effective January 2010.[Footnote 56] The previous 
subpart stated that it was HHS policy to protect the personal interest 
of individuals, corporate interests of nongovernment organizations, 
and the capacity of the government to provide public services when 
information about those interests is obtained by contractors in 
performance of HHS contracts. The subpart further stated that this 
protection depended on the contractor's recognition and proper 
handling of the information. 

The "Confidentiality of Information" contract clause shown in figure 3 
was to be used in solicitations and resultant contracts whenever the 
need existed to keep information confidential, for example in 
contracts that involve the use of proprietary plans or processes or 
confidential financial information of organizations other than the 
contractors. In addition, any solicitation or contract including this 
clause was to indicate, as specifically as possible, the types of data 
that would be covered and the requirements for handling the data. 

Figure 3: HHSAR 352.224.70, Confidentiality if Information: 

[REfer to PDF for image: illustration] 

352.224-70 Confidentiality of information. 

The following clause covers the policy set forth in subpart 324.70 and 
is used in accordance with the instructions set forth in 324.7004. 

Confidentiality Of Information (Jan 2006): 

(a) Confidential information, as used in this clause, means 
information or data of a personal nature about an individual, or 
proprietary information or data submitted by or pertaining to an 
institution or organization. 

(b) The Contracting Officer and the Contractor may, by mutual consent, 
identify elsewhere in this contract specific information and/or 
categories of information which the Government will furnish to the 
Contractor or that the Contractor is expected to generate which is 
confidential. Similarly, the Contracting Officer and the Contractor 
may, by mutual consent, identify such confidential information from 
time to time during the performance of the contract. Failure to agree 
will be settled pursuant to the "Disputes" clause. 

(c) If it is established elsewhere in this contract that information 
to be utilized under this contract, or a portion thereof, is subject 
to the Privacy Act, the Contractor will follow the rules and 
procedures of disclosure set forth in the Privacy Act of 1974, 5 
U.S.C. 552a, and implementing regulations and policies, with respect 
to systems of records determined to be subject to the Privacy Act. 

(d) Confidential information, as defined in paragraph (a) of this 
clause, shall not be disclosed without the prior written consent of 
the individual, institution, or organization. 

(e) Whenever the Contractor is uncertain with regard to the proper 
handling of material under the contract, or if the material in 
question is subject to the Privacy Act or is confidential information 
subject to the provisions of this clause, the Contractor should obtain 
a written determination from the Contracting Officer prior to any 
release, disclosure, dissemination, or publication. 

(f) Contracting Officer determinations will reflect the result of 
internal coordination with appropriate program and legal officials.
(g) The provisions of paragraph (d) of this clause shall not apply to 
conflicting or overlapping provisions in other Federal, State, or 
local laws. 

(End of clause) 

Source: HHS. 

Note: Effective January 2010, HHS has removed this clause from the 
HHSAR. 

[End of figure] 

Appendix IV: Contractor Employee Nondisclosure Agreements Used by 
Agencies: 

[End of section] 

Our review of the Department of Defense (DOD) and the Department of 
Homeland Security (DHS) contract clauses and provisions to protect 
sensitive information identified examples of standard nondisclosure 
agreement forms in use by these agencies consistent with internal 
control standards that call for restrictions on access to and 
accountability for resources and records. 

Air Force Source Selection Non-disclosure Agreement: 

The Air Force Federal Acquisition Regulation Supplement (AFFARS) 
section on procurement integrity states that any individuals requiring 
access to source-selection information as a result of participating on 
a source selection or to perform their duties shall sign a Source 
Selection Non-disclosure Agreement identified in the Air Force 
mandatory procedure for source selection, and shown in figure 4. 
[Footnote 47] The Source Selection Non-disclosure Agreement may be 
used on an annual basis for individuals who must have access to source-
selection information in the performance of their official duties 
throughout the year, whether or not they participate as part of the 
actual source-selection team. 

Figure 4: Source Selection Non-disclosure Agreement Used by the Air 
Force: 

[Refer to PDF for image: illustration] 

Source Selection Non-Disclosure Agreement: 

Name: 
Grade:	
Job Title: 
Organization: 
Source Selection: (or title of position, if used as an Annual 
Certificate IAW AFFARS 5303.104-4.) 
Date: 

Briefing Acknowledgment: 

1. I acknowledge I have been assigned to the source selection (or 
position) indicated above. I am aware that unauthorized disclosure of 
source selection or proprietary information could damage the integrity 
of this procurement and that the transmission or revelation of such 
information to unauthorized persons could subject me to prosecution 
under the Procurement Integrity Laws or under other applicable laws. 

2. I do solemnly swear or affirm that I will not divulge, publish, or 
reveal by word, conduct, or any other means, such information or 
knowledge, except as necessary to do so in the performance of my 
official duties related to this source selection and in accordance 
with the laws of the United States, unless specifically authorized in 
writing in each and every case by a duly authorized representative of 
the United States Government. I take this obligation freely, without 
any mental reservation or purpose of evasion and in the absence of 
duress. 

3. I acknowledge that the information I receive will be given only to 
persons specifically granted access to the source selection 
information and may not be further divulged without specific prior 
written approval from an authorized individual. 

4. If, at any time during the source selection process, my 
participation might result in a real, apparent, possible, or potential 
conflict of interest, I will immediately report the circumstances to 
the Source Selection Authority. 

5. All personnel are requested to check the applicable block: 

I have submitted a current OGE Form 450 Executive Branch Confidential 
Financial Disclosure Report, as required by DODD 5500.07 Standards of 
Conduct. 

I am not required to submit an OGE Form 450. 

I have submitted a current SF278 Executive Branch Confidential 
Financial Disclosure Report, as required by DODD 5500.07 Standards of 
Conduct. 

I am not required to submit a Form SF278. 

Or: 

I am a non-government employee. I have signed a proprietary 
information non-disclosure agreement that has been included in the 
contract between my firm and the government that precludes me from 
divulging any proprietary data to which I may gain access during the 
evaluation of proposals. 

Neither I, nor anyone in my immediate family, have any financial 
interest in any company involved in this acquisition as either a prime 
contractor or as a subcontractor. 

Signature: 
Date: 

Debriefing Certificate: 

I have been debriefed orally by________________ as to my obligation to 
protect all information to which I have had access during this source 
selection. I no longer have any material pertinent to this source 
selection in my possession except material that I have been authorized 
in writing to retain by the SSA. I will not discuss, communicate, 
transmit, or release any information orally, in writing, or by any 
other means to anyone after this date unless specifically authorized 
to do so by a duly authorized representative of the United States 
Government. 

Signature:
Date: 

Source: Air Force. 

[End of figure] 

TRICARE Management Activity Confidentiality Agreement (Non-Federal 
Employee) and Non-disclosure Agreement for Contractor Employees and 
Subcontractors: 

Contractor conflict-of-interest-related procedures under the 
Department of Defense (DOD) TRICARE Management Activity's guidance on 
preparing nonpurchased care acquisition packages include the 
application of standard nondisclosure and confidentiality agreements 
with contractor employees. This guidance states that when evaluating 
contractor proposals, any contractor employees providing 
administrative support into the source selection process are required 
to review, sign, and adhere to a standard confidentiality agreement, 
shown in figure 5, which outlines their responsibilities. 

[Refer to PDF for image] 

[End of figure] 

Figure 5: Confidentiality Agreement Used by DOD's TRICARE Management 
Activity for Contractor Employees Providing Administrative Support 
into the Source-Selection Process: 

[Refer to PDF for image: illustration] 

Confidentiality Agreement (Non-Federal Employee)[Footnote 1]: 

As a non-federal employee with access to information to be used in the 
evaluation of proposals for (short title of TMA requirement): 

(hereafter referred to as "proposals") under Solicitation Number: 
	
issued by the Contracting Office, I acknowledge that my conduct is 
governed by the Procurement Integrity Regulations found at 48 CFR or 
FAR Part 3.104. I also recognize that the Contractor Bid or Proposal 
Information and Source Selection Information, relative to the TMA 
Procurements, may be subject to further restrictions under the Trade 
Secrets Act, 18 U.S.C. 1832, 18 U.S.C.1905 and the Privacy Act, 5 
U.S.C. 552a. 

By executing this Confidentiality Agreement I agree not to disclose 
any Contractor Bid or Proposal Information or Source Selection 
Information, relative to the TMA Procurements, outside the federal 
government. I further agree that I will only disclose, within the 
federal government, any Contractor Bid or Proposal Information or 
Source Selection Information, relative to the TMA Procurements, to 
persons authorized to receive such information, in accordance with 
applicable agency regulations or procedures. I also agree not to 
reproduce any Contractor Bid or Proposal Information or Source 
Selection Information relative to the TMA Procurements, except as 
authorized by the contracting officer or his or her authorized 
representative. I also agree that, if I am requested to do so by the 
contracting officer, or his or her authorized representative, I will 
promptly return, to the contracting officer, or to his or her 
authorized representative, all Contractor Bid or Proposal Information 
or Source Selection Information, relative to the TMA Procurements, 
that are in my possession. I also will promptly return all copies of 
those materials that are in my possession. 

By executing this Confidentiality Agreement I agree that, in the 
course of performing my duties in the evaluation of proposals under 
the TMA Procurements, I will not use my position, or any information 
contained in the Contractor Bid or Proposal Information or Source 
Selection Information, relative to the TMA Procurements, to further my 
own private interest, to further my business interest, or to further 
the private or business interests of another person or entity, whether 
through advice, recommendation or by knowing of unauthorized 
disclosure of information contained in the Contractor Bid or Proposal 
Information or Source Selection Information. I understand the 
requirements of DoD 5500.7-R, Joint Ethics Regulation, Chapter 5, 
Conflicts of Interest. To the best of my knowledge, neither I nor any 
members of my immediate family have a direct or indirect interest in 
any of the firms submitting a proposal for the consideration of the 
evaluation panel which conflict substantially, or appear to conflict 
substantially, with my duties in support thereof. I agree that, if in 
the course of performing my duties in the evaluation of proposals 
under the TMA Procurements, I become aware that my continued 
evaluation of proposals would conflict with my own private interest, 
my business interest, or the private or business interests of an 
immediate family member, I will notify the contracting activity 
immediately in writing and recuse myself from further evaluation of 
proposals under the TMA Procurements. 

Further, if I become aware of actions by any other person working with 
the proposals whose personal conduct may be in violation of the 
prohibitions in this paragraph or FAR Part 3.104, I will immediately 
notify the TMA Office of General Counsel in writing of this 
possibility. 

By executing this Confidentiality Agreement I recognize that I may 
also have access to trade secrets, proprietary information, technical 
data, or computer software submitted by offerors under the TMA 
Procurements. I agree to abide by any restrictive markings on any such 
trade secrets, proprietary information, technical data, or computer 
software. By executing this Confidentiality Agreement I also agree 
that, if I am requested to do so by the contracting officer, I will 
execute a separate Use and Non-Disclosure Agreement as prescribed 
under 48 CFR 227.7103-7 (c). 

A copy of the Procurement Integrity Regulations found in FAR Part 
3.104 has been provided for my review. I have read this Agreement 
carefully and my questions, if any, have been answered to my 
satisfaction. 

Printed name: 
Signature: 
Title: 
Date: 
Witness Signature: 

Source: TRICARE Management Activity. 

Footnote: 

[1] Executed in accordance with the requirements contained under 48 
CFR 15.207(b). 

[End of figure] 

In addition, the guidance states that contractors performing many 
types of contract services are required to execute a standard 
nondisclosure agreement, shown in figure 6. This includes contractors 
not involved in acquisition support, when working on an order 
requiring access to the data, code, or products of another contractor. 

[Refer to PDF for image] 

[End of figure] 

Figure 6: Non-disclosure Agreement for Contractor Employees and 
Subcontractors Used by DOD's TRICARE Management Activity: 

[Refer to PDF for image: illustration] 

Non-Disclosure Agreement For Contractor Employees And Their 
Subcontractors: 

I, _______ am an employee of or a subcontractor to ____________ 
(Company Name), a contractor acting under contract to the __________
(Name of TMA Directorate) under Prime Contract No. ____________ 
through Delivery Order ________________. 

I understand that in the performance of this task, I may have access 
to sensitive or proprietary business, technical, financial, and/or 
source selection information belonging to the Government or other 
contractors. Proprietary information includes, but is not limited to, 
cost/pricing data, Government spend plan data, contractor technical 
proposal data, independent government cost estimates, negotiation 
strategies and contractor data presented in negotiations, contracting 
plans, and statements of work. I agree not to discuss, divulge, or 
disclose any such information or data to any person or entity except 
those persons directly concerned with the performance of this delivery 
order. I have been advised that the unauthorized disclosure, use or 
negligent handling of the information by me could cause irreparable 
injury to the owner of the information. The injury could be source 
sensitive procurement information of the government or 
proprietary/trade secret information of another company. 

As used in this agreement, sensitive information is an overarching 
term that includes, but is not limited to, sensitive but unclassified 
(SBU) information/data, Protected Health Information (PHI), For 
Official Use Only (FOUO), and Privacy Information (PI). This includes 
information in routine DoD payroll, finance, logistics, inventory, and 
personnel management systems. The loss of, misuse of, or unauthorized 
access to or modification of this information could adversely affect 
the national interest or the conduct of Federal programs, or the 
privacy to which individuals are entitled under Section 552a of Title 
5, as amended, but which has not been specifically authorized under 
criteria established by an Executive Order or an Act of Congress to be 
kept secret in the interest of national defense or foreign policy. 

I attest that I am familiar with, and I will comply with the standards 
for access, dissemination, handling, and safeguarding of the 
information to which I am granted access as cited in the Agreement and 
in accordance with the guidance provided to me relative to the 
specific category of information. 

I understand that the United States Government may seek any remedy 
available to it to enforce this Agreement, including, but not limited 
to, application for a court order prohibiting disclosure of 
information in breach of this agreement. Court costs and reasonable 
attorney fees incurred by the United States Government may be assessed 
against me if I lose such action. I understand that another company 
might file a separate claim against me if I have misused its 
proprietary information. 

Proprietary information/data will be handled in accordance with 
Government regulations. This agreement shall continue for a term of 
three (3) years from the date upon which I last have access to the 
information there from. 

Sensitive information/data will be handled in accordance with 
Government regulations. The Statute of Limitation is indefinite for 
the unauthorized release of sensitive information. 

In the event that I seek other employment, I will reveal to any 
prospective employer the continuing obligation in this agreement prior 
to accepting any employment offer. 

The obligations imposed herein do not extend to information/data which: 

a) is in the public domain at the time of receipt, or it came into the 
public domain thereafter through no act of mine; 

b) is disclosed with the prior written approval of the TMA designated 
Contracting Officer; 

c) is demonstrated to have been developed by __________(Company Name), 
or me independently of disclosures made hereunder; 

d) is disclosed pursuant to court order, after notification to the TMA 
designated Contracting Officer; 

e) is disclosed inadvertently despite the exercise of the same 
reasonable degree of care a party normally uses to protect its own 
proprietary information. 

I have read this agreement carefully and my questions, if any, have 
been answered to my satisfaction. 

(Printed Name of Employee or Subcontractor): 
Date: 
(Signature of Employee or Subcontractor): 
Organization: 

(Witness Signature): 
Date: 

Source: TRICARE Management Activity. 

[End of figure] 

DHS Non-disclosure Agreement: 

The DHS FAR supplement subpart relating to safeguarding classified and 
sensitive information within industry requires compliance with the 
policies and procedures in the agency management directive, which 
addresses safeguarding sensitive information originated within DHS in 
all contracts that involve contractor access to facilities, 
information technology resources, or sensitive information.[Footnote 
48] Taken together, DHS's FAR supplement and security management 
directive require contractors and consultants with access to sensitive 
information to execute the DHS Form 11000-6, Sensitive But 
Unclassified Information Non-disclosure Agreement, shown in figure 7. 
According to the DHS security management directive, individual 
contractor employee execution of this nondisclosure agreement is a 
condition of access to such information. Additionally, to safeguard 
procurement integrity and personal conduct, DHS guidance states that 
government contractors who provide technical or other support services 
with respect to DHS source selections must complete this nondisclosure 
agreement. 

Figure 7: DHS Form 11000-6, Sensitive But Unclassified Information Non-
disclosure Agreement DHS Requires from Contractors and Consultants: 

[Refer to PDF for image: illustration] 

Department Of Homeland Security: 
Non-Disclosure Agreement: 

I,__________, an individual official, employee, consultant, or 
subcontractor of or to___________ (the Authorized Entity), intending 
to be legally bound, hereby consent to the terms in this Agreement in 
consideration of my being granted conditional access to certain 
information, specified below, that is owned by, produced by, or in the 
possession of the United States Government. 

(Signer will acknowledge the category or categories of information 
that he or she may have access to, and the signers willingness to 
comply with the standards for protection by placing his or her 
initials in front of the applicable category or categories.) 

Initials: 

Protected Critical Infrastructure Information (PCII): 

I attest that I am familiar with, and I will comply with all 
requirements of the PCII program set out in the Critical 
Infrastructure Information Act of 2002 (CII Act) (Title II, Subtitle 
B, of the Homeland Security Act of 2002, Public Law 107-296, 196 Stat. 
2135, 6 USC 101 et seq.), as amended, the implementing regulations 
thereto (6 CFR Part 29), as amended, and the applicable PCII 
Procedures Manual, as amended, and with any such requirements that may 
be officially communicated to me by the PCII Program Manager or the 
PCII Program Managers designee. 

Initials: 

Sensitive Security Information (SSI): 

I attest that I am familiar with, and I will comply with the standards 
for access, dissemination, handling, and safeguarding of SSI 
information as cited in this Agreement and in accordance with 49 CFR 
Part 1520, "Protection of Sensitive Security Information," "Policies 
and Procedures for Safeguarding and Control of SSI," as amended, and 
any supplementary guidance issued by an authorized official of the 
Department of Homeland Security. 

Initials: 

Other Sensitive but Unclassified (SBU): 

As used in this Agreement, sensitive but unclassified information is 
an over-arching term that covers any information, not otherwise 
indicated above, which the loss of, misuse of, or unauthorized access 
to or modification of could adversely affect the national interest or 
the conduct of Federal programs, or the privacy to which individuals 
are entitled under Section 552a of Title 5, as amended, but which has 
not been specifically authorized under criteria established by an 
Executive Order or an Act of Congress to be kept secret in the 
interest of national defense or foreign policy. This includes 
information categorized by DHS or other government agencies as: For 
Official Use Only (FOUO); Official Use Only (0U0); Sensitive Homeland 
Security Information (SHSI); Limited Official Use (LOU); Law 
Enforcement Sensitive (LES); Safeguarding Information (SGI); 
Unclassified Controlled Nuclear Information (UCNI); and any other 
identifier used by other government agencies to categorize information 
as sensitive but unclassified. 

I attest that I am familiar with, and I will comply with the standards 
for access, dissemination, handling, and safeguarding of the 
information to which I am granted access as cited in this Agreement 
and in accordance with the guidance provided to me relative to the 
specific category of information. 

I understand and agree to the following terms and conditions of my 
access to the information indicated above: 

1. I hereby acknowledge that I have received a security indoctrination 
concerning the nature and protection of information to which I have 
been provided conditional access, including the procedures to be 
followed in ascertaining whether other persons to whom I contemplate 
disclosing this information have been approved for access to it, and 
that I understand these procedures. 

2. By being granted conditional access to the information indicated 
above, the United States Government has placed special confidence and 
trust in me and I am obligated to protect this information from 
unauthorized disclosure, in accordance with the terms of this 
Agreement and the laws, regulations, and directives applicable to the 
specific categories of information to which I am granted access. 

3. I attest that I understand my responsibilities and that I am 
familiar with and will comply with the standards for protecting such 
information that I may have access to in accordance with the terms of 
this Agreement and the laws, regulations, and/or directives applicable 
to the specific categories of information to which I am granted 
access. I understand that the United States Government may conduct 
inspections, at any time or place, for the purpose of ensuring 
compliance with the conditions for access, dissemination, handling and 
safeguarding information under this Agreement. 

4. I will not disclose or release any information provided to me 
pursuant to this Agreement without proper authority or authorization. 
Should situations arise that warrant the disclosure or release of such 
information I will do so only under approved circumstances and in 
accordance with the laws, regulations, or directives applicable to the 
specific categories of information. I will honor and comply with any 
and all dissemination restrictions cited or verbally relayed to me by 
the proper authority. 

5. (a) For PCII - (1) Upon the completion of my engagement as an 
employee, consultant, or subcontractor under the contract, or the 
completion of my work on the PCII Program, whichever occurs first, I 
will surrender promptly to the PCII Program Manager or his designee, 
or to the appropriate PCII officer, PCII of any type whatsoever that 
is in my possession. 

(2) If the Authorized Entity is a United States Government contractor 
performing services in support of the PCII Program, I will not 
request, obtain, maintain, or use PCII unless the PCII Program Manager 
or Program Manager's designee has first made in writing, with respect 
to the contractor, the certification as provided for in Section 
29.8(c) of the implementing regulations to the CII Act, as amended. 

(b) For SSI and SBU - I hereby agree that material which I have in my 
possession and containing information covered by this Agreement, will 
be handled and safeguarded in a manner that affords sufficient 
protection to prevent the unauthorized disclosure of or inadvertent 
access to such information, consistent with the laws, regulations, or 
directives applicable to the specific categories of information. I 
agree that I shall return all information to which I have had access 
or which is in my possession 1) upon demand by an authorized 
individual; and/or 2) upon the conclusion of my duties, association, 
or support to DHS; and/or 3) upon the determination that my official 
duties do not require further access to such information. 

6. I hereby agree that I will not alter or remove markings, which 
indicate a category of information or require specific handling 
instructions, from any material I may come in contact with, in the 
case of SSI or SBU, unless such alteration or removal is consistent 
with the requirements set forth in the laws, regulations, or 
directives applicable to the specific category of information or, in 
the case of PCII, unless such alteration or removal is authorized by 
the PCII Program Manager or the PCII Program Manager's designee. I 
agree that if I use information from a sensitive document or other 
medium, I will carry forward any markings or other required 
restrictions to derivative products, and will protect them in the same 
matter as the original. 

7. I hereby agree that I shall promptly report to the appropriate 
official, in accordance with the guidance issued for the applicable 
category of information, any loss, theft, misuse, misplacement, 
unauthorized disclosure, or other security violation, I have knowledge 
of and whether or not I am personally involved. I also understand that 
my anonymity will be kept to the extent possible when reporting 
security violations. 

8. If I violate the terms and conditions of this Agreement, such 
violation may result in the cancellation of my conditional access to 
the information covered by this Agreement. This may serve as a basis 
for denying me conditional access to other types of information, to 
include classified national security information. 

9. (a) With respect to SSI and SBU, I hereby assign to the United 
States Government all royalties, remunerations, and emoluments that 
have resulted, will result, or may result from any disclosure, 
publication, or revelation of the information not consistent with the 
terms of this Agreement. 

(b) With respect to PCII I hereby assign to the entity owning the PCII 
and the United States Government, all royalties, remunerations, and 
emoluments that have resulted, will result, or may result from any 
disclosure, publication, or revelation of PCII not consistent with the 
terms of this Agreement. 

10. This Agreement is made and intended for the benefit of the United 
States Government and may be enforced by the United States Government 
or the Authorized Entity. By granting me conditional access to 
information in this context, the United States Government and, with 
respect to PCII, the Authorized Entity, may seek any remedy available 
to it to enforce this Agreement including, but not limited to, 
application for a court order prohibiting disclosure of information in 
breach of this Agreement. I understand that if I violate the terms and 
conditions of this Agreement, I could be subjected to administrative, 
disciplinary, civil, or criminal action, as appropriate, under the 
laws, regulations, or directives applicable to the category of 
information involved and neither the United States Government nor the 
Authorized Entity have waived any statutory or common law evidentiary 
privileges or protections that they may assert in any administrative 
or court proceeding to protect any sensitive information to which I 
have been given conditional access under the terms of this Agreement.
		
11. Unless and until I am released in writing by an authorized 
representative of the Department of Homeland Security (if permissible 
for the particular category of information), I understand that all 
conditions and obligations imposed upon me by this Agreement apply 
during the time that I am granted conditional access, and at all times 
thereafter. 

12. Each provision of this Agreement is severable. If a court should 
find any provision of this Agreement to be unenforceable, all other 
provisions shall remain in full force and effect. 

13. My execution of this Agreement shall not nullify or affect in any 
manner any other secrecy or non-disclosure Agreement which I have 
executed or may execute with the United States Government or any of 
its departments or agencies. 

14. These restrictions are consistent with and do not supersede, 
conflict with, or otherwise alter the employee obligations, rights, or 
liabilities created by Executive Order No. 12958, as amended; Section 
7211 of Title 5, United States Code (governing disclosures to 
Congress); Section 1034 of Title 10, United States Code, as amended by 
the Military Whistleblower Protection Act (governing disclosure to 
Congress by members of the military); Section 2302(b)(8) of Title 5, 
United States Code, as amended by the Whistleblower Protection Act 
(governing disclosures of illegality, waste, fraud, abuse or public 
health or safety threats): the Intelligence Identities Protection Act 
of 1982 (50 USC 421 et seq.) (governing disclosures that could expose 
confidential Government agents); and the statutes which protect 
against disclosure that may compromise the national security, 
including Sections 641, 793, 794, 798, and 952 of Title 18, United 
States Code, and Section 4(b) of the Subversive Activities Act of 1950 
(50 USC 783(b)). The definitions, requirements, obligations, rights, 
sanctions, and liabilities created by said Executive Order and listed 
statutes are incorporated into this agreement and are controlling. 

15. Signing this Agreement does not bar disclosures to Congress or to 
an authorized official of an executive agency or the Department of 
Justice that am essential to reporting a substantial violation of law. 

16. I represent and warrant that I have the authority to enter into 
this Agreement. 

17. I have read this Agreement carefully and my questions, if any, 
have been answered. I acknowledge that the briefing officer has made 
available to me any laws, regulations, or directives referenced in 
this document so that I may read them at this time, if I so choose. 

Department Of Homeland Security: 
Non-Disclosure Agreement: 
Acknowledgment: 

Typed/Printed Name: 
Government/Department/Agency/Business Address: 
Telephone Number: 

I make this Agreement in good faith, without mental reservation or 
purpose of evasion. 

Signature: 
Date: 

Witness: 
Typed/Printed Name: 
Government/Department/Agency/Business Address: 
Telephone Number: 
Signature: 
Date: 

This form is not subject to the requirements of P.L. 104-13, 
"Paperwork Reduction Act of 1995" 44 USC, Chapter 35. 
	
Source: DHS.		 

[End of figure] 

The Department of the Treasury's (Treasury) reliance on private-sector 
resources to assist with implementing the Troubled Asset Relief 
Program (TARP) since its 2008 beginning underscores the importance of 
addressing conflict-of-interest issues. As we have previously 
reported, Treasury has strengthened its processes for managing and 
monitoring conflicts of interest among contractors and financial 
agents.[Footnote 49] In January 2009, Treasury issued an interim 
regulation on TARP conflicts of interest, which was effective 
immediately.[Footnote 50] Among other provisions, the regulation 
requires a certification, in the form of a nondisclosure agreement, 
from each retained entity's management official and key individuals 
performing work under a contract or financial agency agreement stating 
that he or she will comply with the requirements for confidentiality 
of nonpublic information before performing work and annually 
thereafter. An example of a nondisclosure agreement Treasury uses with 
its TARP contractors is shown in figure 8. 

Figure 8: Non-disclosure Agreement Used by the Department of the 
Treasury for TARP Contractor Employees and Management Officials: 

[Refer to PDF for image: illustration] 

Non-Disclosure Agreement: 
Conditional Access to Nonpublic Information: 

I, __________________employee of ______________	(Organization) 
hereby consent to the terms in this Agreement in consideration of my 
being granted conditional access to certain United States Government 
nonpublic information. 

I understand and agree to the following terms and conditions: 

1. By being granted conditional access to nonpublic information, the 
_____________(Organization) and the U.S. Department of the Treasury 
(Treasury) have placed special confidence and trust in me, and I am 
obligated to protect this information from unauthorized disclosure, 
according to the terms of this Agreement. 

2. Nonpublic information refers to any information provided to me by 
the Treasury or __________________(Organization) in connection with my 
authorized services to the Treasury, or that I obtain or develop in 
providing authorized services to the Treasury, other than information 
designated as publicly available by the Treasury in writing or that 
becomes publicly available from a source other than the Financial 
Agent. Nonpublic information includes but is not limited to 
information about the Treasury's business, economic, and policy plans, 
financial information, trade secrets, information subject to the 
Privacy Act, personally identifiable information (PII) , and sensitive 
but unclassified (SBU) information. 

3. PII includes, but is not limited to, information pertaining to an 
individual's education, bank accounts, financial transactions, medical 
history, and criminal or employment history and other information 
which can be used to distinguish or trace an individual's identity, 
such as their name, social security number, date and place of birth, 
mother's maiden name, biometric records, etc., including any other 
personal information which is linked or linkable to an individual. 
This definition includes information that the loss, misuse, or 
unauthorized access to or modification of could adversely affect the 
privacy that individuals are entitled to under the Privacy Act. 

4. SBU information is any information where the loss, misuse, or 
unauthorized access to or modification of could adversely affect the 
national interest or the conduct of Federal programs. This definition 
includes trade secret or other information protected under the Trade 
Secrets Act, and may include other information designated by the 
Treasury or as defined by other Federal Government sources. 

5. I am being granted conditional access to nonpublic information, 
contingent upon my execution of this Agreement, to provide authorized 
services to the Treasury. 

6. Except as set forth in paragraph 14 below, 1 shall never divulge 
any nonpublic information provided to me pursuant to this Agreement to 
anyone, unless I have been advised in writing by the ____________ 
(Organization) and/or the Treasury that an individual is authorized to 
receive it. 

7. I will submit to the Treasury for security review, prior to any 
submission for publication, any book, article, column or other written 
work for general publication that is based upon any knowledge I obtain 
during the course of my work in connection with the Treasury. I hereby 
assign to the Federal Government all rights, royalties, remunerations 
and emoluments that have resulted or will result or may result from 
any disclosure, publication, or revelation of nonpublic information 
not consistent with the terms of this Agreement. 

8. If I violate the terms and conditions of this Agreement, I 
understand that the unauthorized disclosure of nonpublic information 
could compromise the security of individuals, the _______________
(Organization) and the Treasury. 

9. If I violate the terms and conditions of this Agreement, such 
violation may result in the cancellation of my conditional access to 
nonpublic information. Further, violation of the terms and conditions 
of this Agreement may result in the_______________(Organization) and/or 
the United States taking administrative, civil or any other 
appropriate relief. 

10. I understand that the willful disclosure of information to which I 
have agreed herein not to divulge may also constitute a criminal 
offense. 

11. Unless I am provided a written release by the Treasury from this 
Agreement, or any portions of it, all conditions and obligations 
contained in this Agreement apply both during my period of conditional 
access, and at which time and after my affiliation and/or employment 
with the _________________(Organization) ends. 

12. Each provision of this Agreement is severable. If a court should 
find any provision of this Agreement to be unenforceable, all other 
provisions shall remain in full force and effect. 

13. I understand that the Treasury may seek any remedy available to it 
to enforce this Agreement, including, but not limited to, application 
for a court order prohibiting disclosure of information in breach of 
this Agreement. 

14. I understand that if I am under U.S. Congressional or judicial 
subpoena, I may be required by law to release information, and that 
pursuant to 31 CFR Part 31, I shall provide prior notice to Treasury 
of any such disclosure or release. 

I make this Agreement in good faith, without mental reservation or 
purpose of evasion. 

Signature: 
Date: 

Source: Treasury. 

[End of figure] 

Figure 30: (Continued): 

[Refer to PDF for image] 

[End of figure] 

[End of section] 

Appendix V: Recent FAR Changes to Add Guidance and Contract Provisions 
for Information Technology (IT) Security: 

Between 2005 and 2007, contractor information-security and personnel- 
security requirements in the Federal Acquisition Regulation (FAR) were 
revised to assist agencies in reducing identified risks from 
contractors' access to sensitive federal facilities and information 
technology (IT) systems. 

Federal Information-Security Oversight of Contractor IT Operations: 

Our April 2005 report concerning the federal government's extensive 
reliance on contractors to provide IT systems and services found that 
without appropriate policies and guidance on how to develop effective 
information-security oversight of contractors, agencies may not 
develop sufficient policies to address the range of risks posed by 
contractors, and that as a result, federal information and operations 
can be placed at undue risk.[Footnote 51] Since FAR Council efforts to 
update the FAR provisions had stretched over 3 years, we recommended 
expeditious completion to ensure that agencies develop appropriate 
information-security oversight capabilities. 

Five months later, in September 2005, an interim rule amending the FAR 
was published.[Footnote 52] In implementing the IT security provisions 
of the Federal Information Security Management Act of 2002 (FISMA), 
the FAR Council stated that the interim rule change was necessary to 
ensure the government was not exposed to inappropriate and unknown 
risk. Unauthorized disclosure, theft, or denial of IT resources had 
the potential to disrupt agency operations and could have financial, 
legal, human safety, personal privacy, and public confidence effects, 
according to the FAR Council. Adding specific FISMA-related provisions 
was intended to provide clear, consistent guidance to acquisition 
officials and program managers, and to encourage and strengthen 
communication with IT security officials, chief information officers, 
and other affected parties. Among other changes this rule amended the 
FAR by: 

* adding a definition for the term "Information Security" to FAR 
Subpart 2.1, as shown in the text box below; 

* incorporating IT security requirements in acquisition planning and 
when describing agency needs; and: 

* revising the policy in FAR Subpart 39.101 for IT acquisitions to 
require including the appropriate agency security policy and 
requirements. 

FAR Subpart 2.1 Definition of Information Security Added in 2005: 
Information security means protecting information and information 
systems from unauthorized access, use, disclosure, disruption, 
modification, or destruction in order to provide: 

1. Integrity, which means guarding against improper information 
modification or destruction, and includes ensuring information 
nonrepudiation and authenticity; 

2. Confidentiality, which means preserving authorized restrictions on 
access and disclosure, including means for protecting personal privacy 
and proprietary information; and; 

3. Availability, which means ensuring timely and reliable access to, 
and use of, information. 

Source: 70 Fed. Reg. 57449-52 (Sept. 30, 2005). 

Personal Identity Verification of Contractor Personnel: 

In 2007 the FAR was amended to add personnel-security requirements, in 
recognition that contractors increasingly are required to have 
physical access to federally controlled facilities and information 
systems in the performance of government contracts and the President's 
issuance of Homeland Security Presidential Directive 12 (HSPD-12). 
Specifically, the FAR was amended to require agencies to include a 
standard clause in their solicitations and contracts when contractor 
performance requires recurring access to government facilities and 
systems. This clause states that the contractors shall comply with 
agency personal identity verification procedures for issuance of 
identification cards.[Footnote 53] This action to unify FAR guidance 
has assisted agencies in implementing HSPD-12, requiring the 
establishment of a governmentwide standard for secure and reliable 
forms of identification cards for federal employees and contractors 
alike. For example, updates issued since 2007 to some agency FAR 
supplements have added agency-specific HSPD-12 policies, procedures, 
contract clauses, and solicitation provisions for contractor employees 
requiring routine access to their facilities and sensitive information 
stored in agency networks.[Footnote 54] 

Implementing HSPD-12 requirements through contract provisions helps 
address the risks of contractors gaining unauthorized physical or 
electronic access to federal information or contractors using outmoded 
identification cards that can be easily forged, stolen, or altered to 
allow unauthorized access. In 2009 the FAR Council opened a FAR case 
in recognition of the need for return of the physical identification 
cards issued to contractors.[Footnote 55] According to the FAR 
Council, our review of contractor employees' access to sensitive 
information reinforced the need to resolve this shortcoming in FAR 
guidance. 

[End of section] 

Appendix VI: Comments from the Department of Homeland Security: 

Note: Page numbers in the draft report may differ from those in this 
report. 

U.S. Department of Homeland Security: 
Washington, DC 20528: 

September 1, 2010: 

Mr. John Needham: 
Director, Acquisition and Sourcing Management: 
Government Accountability Office: 
Washington, DC 20548: 

Dear Mr. Needham: 

Thank you for the opportunity to comment on the draft report GAO-10-
693 "Contractor Integrity: Stronger Safeguards Needed for Contractor 
Access to Sensitive Information." 

While DHS generally concurs with the contents of the GAO draft report, 
we take exception to Table 3 on Page 16 of the draft report and one 
comment on Page 17 of that report. 

As noted in the draft report, GAO analyzed a total of 42 contracts 
government-wide, including 14 DHS contracts. The GAO report asserts 
that three of these 14 DHS contracts lacked the necessary safeguards 
(per Table 3 of the draft report). The DHS Office of the Chief 
Procurement Officer (OCPO) believes that one of these three DHS 
contract actions contains adequate safeguards. Specific details for 
this contract action are provided below: 

* RSHQDC-06-J-00191, Systems Research and Applications Corp. (SRA), 
executed on July 3, 2006, is for support services for planning, 
implementing, and monitoring privacy regulations and guidelines. While 
the task order does not contain HSAR 3052.204-71, it does effectively 
contain the same language as HSAR 3052.204-71. The contract includes 
the following four requirements: 

- "(c) Contractor employees working on this contract must complete 
such forms as may be necessary for security or other reasons, 
including the conduct of background investigations to determine 
suitability." 

- "(d) The Contracting Officer may require the contractor to prohibit 
individuals from working on the contract if the government deems their 
initial or continued employment contrary to the public interest for 
any reason..." 

- "(e) ... the Contractor shall not disclose, orally or in writing, 
any sensitive information to any person unless authorized in writing 
by the Contracting Officer. For those contractor employees authorized 
access to sensitive information, the contractor shall ensure that 
these persons receive training concerning the protection and 
disclosure of sensitive information both during and after contract 
performance." 

- "(f) The Contractor shall include the substance of this clause in 
all subcontracts at any tier where the subcontractor may have access 
to Government facilities, sensitive information, or resources."
(paragraphs (a) and (b) consist of definitions) 

The following identifies language in the section of the task order 
titled "Security Requirements" that is comparable to the four 
requirements in HSAR 3052.204-71 ("Security Requirements" are on pages 
5-10 of the statement of work (SOW) — the task order pages are 
unnumbered): 

- Comparable to HSAR 3052.209-71(c): "Contract employees (to include 
applicants, temporaries, part-time and replacement employees) under 
the contract, needing access to sensitive information, shall undergo a 
position sensitivity analysis based on the duties each individual will 
perform on the contract. The results of the position sensitivity 
analysis shall identify the appropriate background investigation to be 
conducted. All background investigations will be processed through the 
Security Office. Prospective Contractor employees shall submit the 
following completed forms to the Security Office through the COTR no 
more than two (2) weeks after, whether a replacement, addition, 
subcontractor employee, or vendor: 

1. Standard Form 85P, 'Questionnaire for Public Trust Positions.' 

2. FD Form 258, 'Fingerprint Card' (2 copies). 

3. Conditional Access to Sensitive But Unclassified Information Non-
Disclosure Agreement. 

4. Disclosure and Authorization Pertaining to Consumer Reports 
Pursuant to the Fair Credit Reporting Act" (page 7 of the SOW). 

- Comparable to HSAR 3052 204-71(d): "DHS reserves the right and 
prerogative to deny and/or restrict the facility and information 
access of any Contractor employee whom DHS determines to present a 
risk of compromising sensitive Government information to which he or 
she would have access under this contract." (page 6 of the SOW). 

- Comparable to HSAR 3052.204-711d. Several portions of the SOW 
address disclosure and training: 

1. The requirement in HSAR 3052.204-71(c) that contractor and 
subcontractor employees complete the "Conditional Access to Sensitive 
But Unclassified Information Non-Disclosure Agreement" (see above) 

2. "When sensitive government information is processed on Department 
telecommunications and automated information systems, the Contractor 
agrees to provide for the administrative control of sensitive data 
being processed and to adhere to the procedures governing such data as 
outlined in OHS IT Security Program Publication DHS MD 4300.1" (page 9 
of the SOW, under "Information Technology Security Clearance"). 

3. "Contractors, who are involved in management, use, or operation of 
any IT systems that handle sensitive information within or under the 
supervision of the Department, shall receive periodic training at 
least annually in security awareness and accepted security practices 
and systems rules of behavior. Department contractors, with 
significant security operations, shall receive specialized training 
specific to their security responsibilities annually" (page 9 of the 
SOW, under "Information Technology Security Training and Oversight"). 

- Comparable to HSAR 3052104-71(1): Several portions of the SOW 
address the flow-down of requirements to subcontractors: 

1. Page 7 of the SOW requires each subcontractor employee to submit 
four forms (see above). 

2. "Some material will contain proprietary, sensitive, or classified 
data from various public or private sources. The contractor shall 
require all subcontractors to sign corporate and individual non-
disclosure agreements" (page 10 of the SOW, under "Other Pertinent 
Information or Special Considerations"). 

3. "The Contractor shall ensure that each of its employees, 
consultants, and subcontractors who work on the PCII [Protected 
Critical Infrastructure Information] Program have executed Non-
Disclosure Agreements (NDAs) in a form prescribed by the PCII Program 
Manager. The Contractor shall ensure that each of its employees, 
consultants and subcontractors has executed a NDA and agrees that none 
of its employees, consultants or subcontractors will be given access 
to Protected C11 without having previously executed a NDA" (page 10 of 
the SOW, under "Non-Disclosure of Protected Critical Infrastructure 
Information"). 

Therefore, DHS OCPO believes that although HSHQDC-06-J-00191 does not 
contain HSAR 3052.204-71, it dots contain comparable and adequate 
language. 

In addition, on Page 17, the second sentence of the first complete 
paragraph states that: "For example, three DHS task orders of the 14 
contract actions reviewed did not include the contract clause required 
when contractors need recurring access to government facilities or 
sensitive information." In accordance with the DHS OCPO comments 
provided above regarding page 16, table 3, we believe that the SRA 
task order, which is included as one of the three DHS task orders 
noted as deficient within this sentence, actually does contain 
adequate contract language with respect to contractor access to 
sensitive information. 

Thank you again for the opportunity to provide comments on he draft 
report. 

Sincerely, 

Signed by: 

Jerald E. Levine: 
Director: 
Departmental GAO/OIG Liaison Office: 

[End of section] 

Appendix VII: GAO Contact and Staff Acknowledgments: 

GAO Contact: 

John K. Needham, (202) 512-4841 or needhamjk1@gao.gov: 

Staff Acknowledgments: 

In addition to the contact named above, Carolyn Kirby, Assistant 
Director; Jennifer Dougherty; Guisseli Reyes-Turnell; Greg Campbell; 
Vijay D'Souza; Claudia Dickey; Ralph Roffo; Tina Shepper Ryen; Alyssa 
Weir; and Bill Woods made key contributions to this report. 

[End of section] 

Footnotes: 

[1] In fiscal year 2009 alone, federal agencies obligated $332 billion 
for contracted services, such as support for acquisition management, 
program management, and quality assurance, which together accounted 
for approximately 61 percent of total fiscal year 2009 procurement 
dollars. 

[2] Office of Management and Budget Memorandum, Managing the Multi- 
Sector Workforce, M-09-26 (July 29, 2009). As used in this report, 
"multisector workforce" includes the nongovernment contractor 
employees (and subcontractors to prime contractors) working in various 
agency offices with government employees. This can include situations 
in which the contractor personnel may be physically separated from 
government personnel at the agency worksite, but working in close 
proximity at adjacent locations to enable routine access to agency 
offices, officials, and information. 

[3] FAR Subparts 1.1 and 1.3. The FAR and agency supplements are 
codified in title 48 of the Code of Federal Regulations. 

[4] Report of the Acquisition Advisory Panel to the Office of Federal 
Procurement Policy and the United States Congress (January 2007). The 
Services Acquisition Reform Act of 2003, Pub. L. No. 108-136, § 1423 
(2003) established an Acquisition Advisory Panel to make 
recommendations for improving acquisition practices. 

[5] GAO, Federal Acquisition: Oversight Plan Needed to Help Implement 
Acquisition Advisory Panel Recommendations, [hyperlink, 
http://www.gao.gov/products/GAO-08-160] (Washington, D.C.: Dec. 20, 
2007). 

[6] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). For example, the internal control 
standards call for restrictions on access to and accountability for 
resources and records, so that management assigns and maintains 
accountability. 

[7] For purposes of this report, we define a contract action as a 
contract or task order, or both, and blanket purchase agreement (BPA) 
and its associated orders. The FAR defines a task order as an order 
for services placed against an established contract or with government 
sources. FAR Section 2.101. The FAR allows agencies to establish BPAs 
under the General Services Administration's schedules program, where 
contracts are awarded to multiple vendors for commercial goods and 
services and made available for agency use. FAR Subsection 8.405-3. 
BPAs are agreements between agencies and vendors with terms in place 
for future use; funds are obligated when orders are placed. 

[8] The FAR Council--whose members include the DOD Director of Defense 
Procurement and Acquisition Policy, the National Aeronautics and Space 
Administration Associate Administrator for Procurement, and the 
General Services Administration Chief Acquisition Officer--oversees 
development and maintenance of the FAR. The Administrator of OFPP in 
OMB serves as chair of the FAR Council, which meets quarterly to 
discuss and resolve significant or controversial FAR changes. Proposed 
and final revisions to the FAR are published in the Federal Register. 

[9] For the purposes of this report, we use the definition of 
confidentiality provided in the Federal Information Security 
Management Act of 2002, Pub. L. No. 107-296, § 1001 (44 U.S.C. § 
3532). The act states that confidentiality means preserving authorized 
restrictions on information access and disclosure, including means for 
protecting personal privacy and proprietary information. 

[10] The Privacy Act of 1974 (Privacy Act), Pub. L. No. 93-579 
(codified at 5 U.S.C. § 552a) regulates the federal government's use 
of personal information by placing limitations on agencies' 
collection, disclosure, and use of personal information in systems of 
records. The Health Insurance Portability and Accountability Act of 
1996, Pub. L. No. 104-191(HIPAA) among other things, addresses the 
personal and medical privacy of individuals. Issued under HIPAA, the 
federal Privacy Rule provided individuals with new protections 
regarding the confidentiality of their health information and 
established new responsibilities for health care providers, health 
plans, and other entities, including the federal government, to 
protect such information. 

[11] See Executive Order 13526, Classified National Security 
Information (Dec. 29, 2009). Among other provisions, the executive 
order prescribes the categories of information that warrant 
classification and prescribes standards for safeguarding classified 
materials. 

[12] 5 U.S.C. § 552. See GAO, Freedom of Information Act: Requirements 
and Implementation Continue to Evolve, GAO-10-537T (Washington, D.C.: 
Mar. 18, 2010). 

[13] See [hyperlink, http://www.gao.gov/products/GAO-10-537T], which 
provides the complete list of the nine categories of information that 
are exempt from disclosure under FOIA, in attachment 1. In denying 
access to material, agencies may cite these exemptions. The act 
requires agencies to notify requesters of the reasons for any adverse 
determination (that is, a determination not to provide records) and 
grants requesters the right to appeal agency decisions to deny access. 

[14] 18 U.S.C. § 1905 (disclosure of confidential information 
generally) and 18 U.S.C. § 208 (acts affecting a personal financial 
interest). 

[15] Our review included contracts, task orders, and BPAs and their 
associated orders. We reviewed one BPA that did not include provisions 
that fully safeguarded against unauthorized contractor disclosure and 
inappropriate use of sensitive information; however, we did not review 
any orders off this agreement, and these may have contained additional 
clauses to protect sensitive data. 

[16] Agencies are authorized to issue regulations that implement or 
supplement the FAR and incorporate agency policies, procedures, 
contract clauses, solicitation provisions, and forms that govern the 
contracting process or otherwise control the relationship between the 
agency and contractors or prospective contractors. FAR Subpart 1.3. 

[17] Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 
224.1, Protection of Individual Privacy. 

[18] Department of Health and Human Services Acquisition Regulation 
(HHSAR), Subpart 324.1, Protection of Individual Privacy. 

[19] Under incident reporting procedures contained in a DHS security 
management directive, with which the Department of Homeland Security 
Acquisition Regulation (HSAR) states compliance is required in all 
contracts that require access to sensitive information, DHS employees 
or employees of contractors who observe or become aware of the loss, 
compromise, suspected compromise, or unauthorized disclosure of "for 
official use only" (FOUO) information (a type of sensitive 
information) are required to report it immediately, but not later than 
the next duty day, to the originator and the local security official. 
Other than this requirement, the DHS directive does not establish 
other contractor responsibilities, such as prompt notification to the 
contracting officer. 

[20] DFARS 204.4, Safeguarding Classified Information Within Industry. 
In March 2010, an advance notice of proposed rulemaking was published 
in the Federal Register. These proposed changes would add a new 
subpart and associated contract clauses to DFARS for the safeguarding, 
proper handling, and cyber intrusion reporting of unclassified DOD 
information resident or transiting on contractor IT systems. 75 Fed. 
Reg. 9563 (Mar. 3, 2010). The proposed changes do not address 
safeguards for contractor employee access to sensitive information in 
DOD's IT systems. A revised draft proposed rule is planned for 
September 2010. 

[21] HHS revised its FAR supplement effective January 2010 to reflect 
statutory, FAR, and governmentwide and HHS policy changes since the 
last revision in December 2006. Final Rule, Health and Human Services 
Acquisition Regulation (HHSAR), 74 Fed. Reg. 62396-472 (Nov. 27, 2009). 

[22] HHSAR 324.70--Confidentiality of Information (Dec. 20, 2006). 
This clause related to confidential information, which was defined as 
(1) information or data of a personal nature about an individual or 
(2) proprietary information or data submitted by or pertaining to an 
institution or organization. 

[23] The pending changes referred to by the official are included in 
FAR Case No. 2007-019, Contractor Access to Non-Public Information. 

[24] According to DOD's privacy incident report, the information that 
was breached was from a single contractor-owned server in Florida used 
to hold and transfer data between individuals in different locations 
to perform contract services. Potentially compromised files included 
sensitive personal information such as name, social security number, 
address, date of birth, medical record number, insurance information, 
and information related to medical appointments and delivery of health 
care services. 

[25] Centers for Medicare and Medicaid Services (CMS), Acquisition 
Policy & Procedure Notice 12, Privacy Rule HIPAA Business Associate 
Contract Provision II (Baltimore, Md.: Apr. 21, 2005). 

[26] We did not consider the absence of such contract provisions as a 
deficiency unless they were also required by agency policy or the FAR. 

[27] HSAR 3052.204-71. 

[28] In May 2010, DHS notified the heads of its contracting activities 
to caution their acquisition personnel to use only the official agency 
nondisclosure agreement, DHS Form 11000-6, from the agency's internal 
forms Web site. DHS took this action after we alerted them that case 
study contracts we had reviewed were using an unauthorized variation 
of the form that was missing date blocks for both the agreement 
signatory and witness. According to DHS, any agreement that lacks 
signature dates is incomplete and provides inadequate protection to 
the signatories since there is no record of when the agreement takes 
effect. The May 2010 updates to agency guidance and electronic 
contract writing system require contracting personnel to use the forms 
Web site to access DHS Form 11000-6. 

[29] Air Force informational guidance on the use of such third-party 
"associate contractor agreements" suggests standard contract 
provisions requiring the contractor to provide the contracting officer 
a copy of the document for review before execution by the cooperating 
contractors. 

[30] We have reported extensively on Treasury's management and 
oversight of contractors and financial agents to support TARP. For 
more information, see GAO, Troubled Asset Relief Program: One Year 
Later, Actions Are Needed to Address Remaining Transparency and 
Accountability Challenges, [hyperlink, 
http://www.gao.gov/products/GAO-10-16] (Washington, D.C.: Oct. 8, 
2009). 

[31] An example of Treasury's nondisclosure agreement used for TARP 
support contractors is included in appendix IV. 

[32] The FAR contains the rules, standards, and requirements for the 
award, administration, and termination of government contracts. 

[33] FAR Subpart 7.1. 

[34] An organizational conflict of interest may result when factors 
create an actual or potential conflict of interest on an instant 
contract, or when the nature of the work to be performed on the 
contract creates an actual or potential conflict of interest on a 
future acquisition. For example, these conflicts may arise in 
situations in which a current or prospective contractor or 
subcontractor will have access to, or had access to, nonpublic 
information that may provide an unfair competitive advantage in a 
future acquisition. 

[35] Final Rule, FAR Case 2005-017, Requirement to Purchase Approved 
Authentication Products and Services, amended FAR Subpart 4.13 and 
52.204-9. 72 Fed. Reg. 46333-35 (Aug. 17, 2007). 

[36] Interim Rule, FAR Case 2004-018, Information Technology Security, 
70 Fed. Reg. 57449-52, (Sept. 30, 2005). A year later, after 
consideration of public comments, the interim rule was adopted without 
change. 

[37] GAO, Privacy: Lessons Learned about Data Breach Notification, 
[hyperlink, http://www.gao.gov/products/GAO-07-657] (Washington, D.C.: 
Apr. 30, 2007). The loss of personally identifiable information, such 
as an individual's Social Security number, name, and date of birth can 
result in serious harm, including identity theft. Identity theft 
occurs when such information is used without authorization to commit 
fraud or other crimes. 

[38] GAO, Defense Contracting: Additional Personal Conflict of 
Interest Safeguards Needed for Certain DOD Contractor Employees, 
[hyperlink, http://www.gao.gov/products/GAO-08-169] (Washington, D.C.: 
Mar. 7, 2008). A proposed FAR rule would define "personal conflict of 
interest" as a situation in which a contractor employee has a 
financial interest, personal activity, or relationship that could 
impair the employee's ability to act impartially and in the best 
interest of the government when performing under the contract. 

[39] Duncan Hunter National Defense Authorization Act for Fiscal Year 
2009, Pub. L. No. 110-417, § 841 (2008). In addition, section 841 
requires that the Administrator of OFPP develop FAR policies and 
clauses effective no later than August 10, 2009, for inclusion in 
solicitations, contracts, task orders, and delivery orders to prevent 
personal conflicts of interest by contractor employees performing 
acquisition functions closely associated with inherently governmental 
functions. 

[40] Pending FAR cases may result in requirements for prompt 
notification of unauthorized disclosure or misuse, but will not 
necessarily apply to all types of sensitive information. 

[41] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] 
(Washington, D.C.: November 1999). 

[42] GAO, Information Sharing: The Federal Government Needs to 
Establish Policies and Processes for Sharing Terrorism-Related and 
Sensitive but Unclassified Information, [hyperlink, 
http://www.gao.gov/products/GAO-06-385] (Washington, D.C.: Mar. 17, 
2006). 

[43] Since 2005, the issue of establishing effective mechanisms for 
sharing terrorism-related information to protect the homeland has been 
on GAO's high-risk list of federal functions needing broad-based 
transformation. Since then, we have monitored the government's 
progress in resolving barriers to sharing. See GAO, Information 
Sharing: Definition of the Results to Be Achieved in Terrorism-Related 
Information Sharing Is Needed to Guide Implementation and Assess 
Progress, [hyperlink, http://www.gao.gov/products/GAO-08-637T] 
(Washington, D.C.: July 23, 2008). 

[44] See Presidential Memorandum, Memorandum for the Heads of 
Executive Departments and Agencies: Designation and Sharing Controlled 
Unclassified Information (May 9, 2008). 

[45] Report and Recommendations of the Presidential Task Force on 
Controlled Unclassified Information (Aug. 25, 2009). The president's 
memorandum of May 27, 2009, on Classified Information and Controlled 
Unclassified Information directed the task force, led by the Secretary 
of Homeland Security and the Attorney General, to review the 
controlled unclassified information framework established in 2008 for 
the management of sensitive but unclassified terrorism-related 
information. 

[46] HHS, Final Rule, Health and Human Services Acquisition 
Regulation, 74 Fed. Reg. 62396-472 (Nov. 26, 2009). 

[47] AFFARS Section 5303.104. 

[48] The Department of Homeland Security Acquisition Regulation (HSAR) 
Subpart 3004.470, Safeguarding Classified and Sensitive Information 
within Industry and DHS Management Directive System, Safeguarding 
Sensitive But Unclassified (For Official Use Only) Information, 
Management Directive (MD) No. 11042.1 (Washington, D.C.: Jan. 6, 2005). 

[49] GAO, Troubled Asset Relief Program: One Year Later, Actions Are 
Needed to Address Remaining Transparency and Accountability 
Challenges, [hyperlink, http://www.gao.gov/products/GAO-10-16] 
(Washington, D.C.: Oct. 8, 2009). 

[50] TARP Conflicts of Interest, 74 Fed. Reg. 3431-3436 (Jan. 21, 
2009) (codified at 31 C.F.R. Part 31). 

[51] GAO, Information Security: Improving Oversight of Access to 
Federal Systems and Data by Contractors Can Reduce Risk, [hyperlink, 
http://www.gao.gov/products/GAO-05-362] (Washington, D.C.: Apr. 22, 
2005). The IT systems and services provided by contractors include 
computer and telecommunication systems and services, as well as the 
testing, quality control, installation, and operation of computer 
equipment. Additionally, contractors provide services and systems on 
behalf of agencies at contractor facilities or to an agency via remote 
access. We found that the methods that agencies were using to ensure 
information security oversight of contractor operations had 
limitations and needed strengthening. For example, most agencies had 
not incorporated the Federal Information Security Management Act of 
2002 (FISMA) requirements, such as annual testing of controls, into 
their contract language. Few agencies had established specific 
information-security oversight policies for contractor IT operations. 

[52] Interim Rule, FAR Case 2004-018, Information Technology Security, 
70 Fed. Reg. 57449-52, (Sept. 30, 2005). A year later, after 
consideration of public comments, the interim rule was adopted without 
change. 

[53] Final Rule, FAR Case 2005-017, Requirement to Purchase Approved 
Authentication Products and Services, amended FAR Subpart 4.13 and 
52.204-9. 72 Fed. Reg. 46333-35 (Aug. 17, 2007). 

[54] For example, effective January 26, 2010, the Department of Health 
and Human Services (HHS) revised its FAR supplement to reflect FAR 
policy and other changes since the last update in December 2006. A new 
Subpart 304.13, Personal Identity Verification, was added with new 
policy to implement HSPD-12 in HHS. The HHS implementation includes 
applicable solicitation provisions and contract clauses to provide a 
consistent and systematic approach to ensure the security of HHS 
facilities and information systems. 74 Fed. Reg. 62396-97 (Nov. 27, 
2009). 

[55] FAR case number 2009-027--Personal Identity Verification of 
Contractor Personnel. The proposed rule for this case was published in 
the Federal Register for public comment. 75 Fed. Reg. 28771 (May 24, 
2010). The proposed rule seeks to provide additional regulatory 
coverage in FAR Subpart 4.13 and clause 52.204-9 to reinforce the 
requirement of collecting from contractors all forms of government- 
provided identification once they are no longer needed to support a 
contract. Public comments were due July 23, 2010. 

[56] HHS, Final Rule, Health and Human Services Acquisition 
Regulation, 74 Fed. Reg. 62396472 (Nov. 26, 2009). 

[End of section] 

GAO's Mission: 

The Government Accountability Office, the audit, evaluation and 
investigative arm of Congress, exists to support Congress in meeting 
its constitutional responsibilities and to help improve the performance 
and accountability of the federal government for the American people. 
GAO examines the use of public funds; evaluates federal programs and 
policies; and provides analyses, recommendations, and other assistance 
to help Congress make informed oversight, policy, and funding 
decisions. GAO's commitment to good government is reflected in its core 
values of accountability, integrity, and reliability. 

Obtaining Copies of GAO Reports and Testimony: 

The fastest and easiest way to obtain copies of GAO documents at no 
cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each 
weekday, GAO posts newly released reports, testimony, and 
correspondence on its Web site. To have GAO e-mail you a list of newly 
posted products every afternoon, go to [hyperlink, http://www.gao.gov] 
and select "E-mail Updates." 

Order by Phone: 

The price of each GAO publication reflects GAO’s actual cost of
production and distribution and depends on the number of pages in the
publication and whether the publication is printed in color or black and
white. Pricing and ordering information is posted on GAO’s Web site, 
[hyperlink, http://www.gao.gov/ordering.htm]. 

Place orders by calling (202) 512-6000, toll free (866) 801-7077, or
TDD (202) 512-2537. 

Orders may be paid for using American Express, Discover Card,
MasterCard, Visa, check, or money order. Call for additional 
information. 

To Report Fraud, Waste, and Abuse in Federal Programs: 

Contact: 

Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: 
E-mail: fraudnet@gao.gov: 
Automated answering system: (800) 424-5454 or (202) 512-7470: 

Congressional Relations: 

Ralph Dawn, Managing Director, dawnr@gao.gov: 
(202) 512-4400: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7125: 
Washington, D.C. 20548: 

Public Affairs: 

Chuck Young, Managing Director, youngc1@gao.gov: 
(202) 512-4800: 
U.S. Government Accountability Office: 
441 G Street NW, Room 7149: 
Washington, D.C. 20548: