This is the accessible text file for GAO report number GAO-10-693 entitled 'Contractor Integrity: Stronger Safeguards Needed for Contractor Access to Sensitive Information' which was released on September 10, 2010. This text file was formatted by the U.S. Government Accountability Office (GAO) to be accessible to users with visual impairments, as part of a longer term project to improve GAO products' accessibility. Every attempt has been made to maintain the structural and data integrity of the original printed product. Accessibility features, such as text descriptions of tables, consecutively numbered footnotes placed at the end of the file, and the text of agency comment letters, are provided but may not exactly duplicate the presentation or format of the printed version. The portable document format (PDF) file is an exact electronic replica of the printed version. We welcome your feedback. Please E-mail your comments regarding the contents or accessibility features of this document to Webmaster@gao.gov. This is a work of the U.S. government and is not subject to copyright protection in the United States. It may be reproduced and distributed in its entirety without further permission from GAO. Because this work may contain copyrighted images or other material, permission from the copyright holder may be necessary if you wish to reproduce this material separately. Report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate: United States Government Accountability Office: GAO: September 2010: Contractor Integrity: Stronger Safeguards Needed for Contractor Access to Sensitive Information: GAO-10-693: GAO Highlights: Highlights of GAO-10-693, a report to the Chairman, Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security, Committee on Homeland Security and Governmental Affairs, U.S. Senate. Why GAO Did This Study: In performing agency tasks, contractor employees often require access to sensitive information that must be protected from unauthorized disclosure or misuse. This report assesses the (1) extent to which agency guidance and contracts contain safeguards for contractor access to sensitive information, and (2) adequacy of governmentwide guidance on how agencies are to safeguard sensitive information to which contractors may have access. To conduct this work, GAO identified key attributes involving sensitive-information safeguards, analyzed guidance and met with officials at three agencies selected for their extensive reliance on contractor employees, analyzed 42 of their contract actions for services potentially requiring contractor access to sensitive information, and analyzed the Federal Acquisition Regulation (FAR) and pending FAR changes regarding governmentwide guidance on contractor safeguards for access to sensitive information. What GAO Found: GAO’s analysis of guidance and contract actions at three agencies found areas where sensitive information is not fully safeguarded and thus may remain at risk of unauthorized disclosure or misuse. The Departments of Defense (DOD), Homeland Security (DHS), and Health and Human Services (HHS) have all supplemented the FAR and developed some guidance and standard contract provisions, but the safeguards available in DOD’s and HHS’s guidance do not always protect all relevant types of sensitive information contractors may access during contract performance (examples of some types of sensitive information contractors may access are listed below). Also, DOD’s, DHS’s, and HHS’ s supplemental FAR guidance do not specify contractor responsibilities for prompt notification to the agency if unauthorized disclosure or misuse occurs. Almost half of the 42 contract actions analyzed lacked clauses or provisions that safeguarded against disclosure and inappropriate use of all potential types of sensitive information that contractors might access during contract performance. Additionally, DOD and HHS lack guidance on the use of nondisclosure agreements, while DHS has found that these help accountability by informing contractors of their responsibilities to safeguard confidentiality and appropriate use and the potential consequences they face from violations. There have been numerous recommendations for improved governmentwide guidance and contract provisions in the FAR, such as prohibiting certain types of contractor personnel from using sensitive information for personal gain. To address some of these areas, regulatory changes are pending to develop standardized approaches and contract clauses in the FAR that agencies could use to safeguard sensitive information, rather than developing such safeguards individually. However, similarly to issues identified in agency guidance, GAO found two key areas the FAR does not yet address. These include (1) agency use of nondisclosure agreements as a condition of contractor access to sensitive information, and (2) the need to establish clear requirements for contractors to promptly notify agencies of unauthorized disclosure and misuse of sensitive information. The ongoing rulemaking process provides an opportunity to address the need for additional FAR guidance in both areas. Table: Examples of Sensitive Information: Type of information: Personal; Examples: * Name; * Social Security number; * Date and place of birth; * Patient health and medical information. Type of information: Business proprietary; Examples: * Trade secrets; * Manufacturing processes, operations, or techniques; * Amount or source of any profits, losses, or expenditures. Type of information: Agency sensitive; Examples: * Security management information; * Predecisional planning and budgeting documents; * Continuity-of-operations information. Source: GAO analysis. [End of table] What GAO Recommends: GAO recommends that the Office of Federal Procurement Policy (OFPP) ensure pending changes to the FAR address two additional safeguards for contractor access to sensitive information: the use of nondisclosure agreements and prompt notification of unauthorized disclosure or misuse of sensitive information. In oral comments, OFPP agreed with the recommendations. DHS also concurred with the recommendations, while DOD and HHS had no comment. View [hyperlink, http://www.gao.gov/products/GAO-10-693] or key components. For more information, contact John Needham at (202) 512- 4841 or needhamjk1@gao.gov. [End of section] Contents: Letter: Background: Safeguards to Protect Sensitive Information Not Always Available in Agency Guidance or Included in Contract Actions: Efforts Underway to Improve Governmentwide Guidance in the FAR for Contractor Access to Sensitive Information: Conclusions: Recommendations for Executive Action: Agency Comments and Our Evaluation: Appendix I: Scope and Methodology: Appendix II: Sensitive But Unclassified Markings Identified by President's Task Force on Controlled Unclassified Information: Appendix III: Agency Contract Provisions Containing Contractor Safeguards for Sensitive Information: Appendix IV: Contractor Employee Nondisclosure Agreements Used by Agencies: Appendix V: Recent FAR Changes to Add Guidance and Contract Provisions for Information Technology (IT) Security: Appendix VI: Comments from the Department of Homeland Security: Appendix VII: GAO Contact and Staff Acknowledgments: Tables: Table 1: Examples of Sensitive Information: Table 2: Analysis of Control Practices in Agency FAR Supplements for Safeguarding Sensitive Information Accessed by Contractors: Table 3: Analysis of Contract Provisions Establishing Contractor Safeguards for Sensitive Information: Table 4: Analysis of Contract Requirements for Nondisclosure Agreements: Table 5: FAR Contract Provisions for Safeguarding Certain Types of Sensitive Information: Table 6: Status of Pending FAR Cases to Revise Policies and Clauses for Contractor Use and Confidentiality of Sensitive Information: Table 7: Selected SBU Markings Currently in Use: Figures: Figure 1: HSAR Clause 3052.204-71, Contractor Employee Access: Figure 2: DFARS Clause 252.204-7000, Disclosure of Information: Figure 3: HHSAR 352.224-70, Confidentiality of Information: Figure 4: Source Selection Non-disclosure Agreement Used by the Air Force: Figure 5: Confidentiality Agreement Used by DOD's TRICARE Management Activity for Contractor Employees Providing Administrative Support into the Source-Selection Process: Figure 6: Non-disclosure Agreement for Contractor Employees and Subcontractors Used by DOD's TRICARE Management Activity: Figure 7: DHS Form 11000-6, Sensitive But Unclassified Information Non- disclosure Agreement DHS Requires from Contractors and Consultants: Figure 8: Non-disclosure Agreement Used by the Department of the Treasury for TARP Contractor Employees and Management Officials: Abbreviations: AFFARS: Air Force Federal Acquisition Regulation Supplement: BPA: blanket purchase agreement: CMS: Centers for Medicare & Medicaid Services: CUI: controlled unclassified information: DFARS: Defense Federal Acquisition Regulation Supplement: DHS: Department of Homeland Security: DOD: Department of Defense: FAR: Federal Acquisition Regulation: FISMA: Federal Information Security Management Act of 2002: FOIA: Freedom of Information Act: FOUO: for official use only: FPDS-NG: Federal Procurement Data System-Next Generation: HHS: Department of Health and Human Services: HHSAR: Department of Health and Human Services Acquisition Regulation: HIPAA: Health Insurance Portability and Accountability Act of 1996: HSAR: Department of Homeland Security Acquisition Regulation: HSPD-12: Homeland Security Presidential Directive 12: IT: information technology: OFPP: Office of Federal Procurement Policy: OMB: Office of Management and Budget: Privacy Act: The Privacy Act of 1974: SBU: sensitive but unclassified: TARP: Troubled Asset Relief Program: TMA: TRICARE Management Activity: Treasury: Department of the Treasury: [End of section] United States Government Accountability Office: Washington, DC 20548: September 10, 2010: The Honorable Thomas R. Carper: Chairman: Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security: Committee on Homeland Security and Governmental Affairs: United States Senate: Dear Mr. Chairman: To a great extent, federal agencies rely on support contractor employees to help accomplish a broad array of complex and mission- critical functions.[Footnote 1] In carrying out their day-to-day tasks for federal agencies in what the Office of Management and Budget (OMB) calls the multisector workforce,[Footnote 2] contractor employees often require extensive access to and use of sensitive government information. Protection of sensitive information is critical because unauthorized disclosure can erode the integrity of government operations and lead to situations in which that information is misused for private gain, potentially harming important interests such as the privacy of individuals, commercial business proprietary rights, national security, and law enforcement. The risks associated with contractor misuse of sensitive information have been the subject of media attention, such as a recent case involving a contractor employee's theft of names, Social Security numbers, and dates of birth for Transportation Security Administration airport employees in Boston and a case involving State Department contractor employees' unauthorized viewing of the electronic passport files of three 2008 presidential candidates. With the growth in use of contractors supporting government operations, the question of how best to limit contractor misuse and unauthorized disclosure of sensitive information becomes increasingly important. Many of the rules governing how contractors operate are articulated in the Federal Acquisition Regulations (FAR) system, which establishes uniform policies and procedures for acquisition of supplies and services by all executive agencies. It consists of the FAR and agency-specific regulations that supplement and implement the FAR with additional guidance to meet specific needs of the agencies. [Footnote 3] In its 2007 report, the Acquisition Advisory Panel reported a concern that not all federal agencies had established guidance for how support-services contractor employees should protect sensitive information such as confidential or proprietary data from release or improper use.[Footnote 4] The panel concluded that substantial benefits could be achieved if governmentwide guidance and contract clauses were developed in the FAR that federal agencies could use to protect sensitive information, rather than having agencies develop such clauses individually. Our work has reported similar concerns and is generally consistent with the panel's recommendations about the proper role of contractor employees in the multisector workforce.[Footnote 5] Given the government's reliance on contractors and their access to sensitive information, you asked us to review safeguards in the federal acquisition system to manage risks and control contractor access to sensitive information. Specifically, we assessed the (1) extent to which agency guidance and contracts contain safeguards for contractor access to sensitive information, and (2) adequacy of governmentwide guidance in the FAR on how agencies are to contractually safeguard sensitive information to which contractor employees may have access. To assess agency guidance and contracts relating to contractor access to sensitive information, we analyzed the type of information agencies identify as requiring protection; limiting its disclosure; and prohibiting its misuse based on (1) review of agency practices related to controls over contractor access to sensitive information, (2) review of applicable standards drawn from GAO's Standards for Internal Controls in the Federal Government,[Footnote 6] and (3) discussions with government security and contracting officials responsible for administrative, information, and contractor personnel security functions. To assess the extent to which agency guidance required the use of contract clauses and provisions to safeguard sensitive information, we selected three agencies that rank among the top procurers of contracted services in fiscal year 2008 and that our prior work shows rely extensively on contractors--the (1) Department of Defense (DOD), (2) Department of Homeland Security (DHS), and (3) Department of Health and Human Services (HHS). At all three agencies, we analyzed agency FAR supplements as well as policy and guidance regarding sensitive information safeguards. We also interviewed acquisition policy, security, and privacy officials to discuss their supplements to the FAR and the contract provisions they use to meet their specific agency needs. To assess the extent to which agency contracts contain such safeguards, we analyzed contract actions [Footnote 7] for services potentially requiring contractor access to sensitive information at DOD, DHS, and HHS. More specifically, at each of five organizational locations at DOD, DHS, and HHS, we analyzed documentation for a nongeneralizable sample of 6 to 10 (for a total of 42) contract actions for support services, selected because they involve contractors working in close proximity to government employees and to provide a cross section of services contracts to review by type and functions performed. The purpose of this contract analysis was to determine whether they contained contract provisions consistent with attributes we identified for safeguarding sensitive information from unauthorized contractor disclosure and misuse. We used content analysis to classify and code the information in the contract documents. Two GAO analysts independently reviewed the provisions and clauses in each contract or task order and then reconciled any differences in how they were coded. For nine of the contract actions that we judgmentally selected for in-depth case studies, we also interviewed officials, such as contracting officers, program managers, contracting officers' representatives, and security and privacy officials. To assess the adequacy of governmentwide guidance, we analyzed FAR requirements that prescribe protections associated with sensitive information. We also reviewed proposed and pending amendments to the FAR. To further understand steps being taken to amend the FAR, we interviewed officials at the Office of Federal Procurement Policy (OFPP) in OMB and other agencies with FAR Council membership.[Footnote 8] We conducted this performance audit from May 2009 through September 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. Additional details of our objectives, scope, and methodology are included in appendix I. Background: Unauthorized disclosure of sensitive information by government or contractor employees through negligence or misconduct can have a significant effect on the government's ability to perform its primary functions, potentially resulting in financial loss, damaged reputation, and loss of public trust. Sensitive information may not always be explicitly designated or marked as such. For the purposes of this report, we use the term "sensitive information" to generally refer to information under an agency's authority or control that has a degree of confidentiality[Footnote 9] such that its loss, misuse, unauthorized access, or modification could compromise that confidentiality and harm important interests, such as personal and medical privacy to which individuals are entitled under laws,[Footnote 10] national security, law enforcement, proprietary commercial rights, or the conduct of agency programs. The large but unquantifiable amount of sensitive information generated by the government makes understanding its scope more difficult and agencies' safeguarding this information from unauthorized disclosure or inappropriate use by contractors a complex challenge. Table 1 shows examples of several types of sensitive information. Additional examples are listed in appendix II. All examples were drawn from a myriad of designations that agencies use to describe sensitive information. Table 1: Examples of Sensitive Information: Type of information: Personal; Description: The terms personal information and personally identifiable information can be used interchangeably to refer to any Privacy Act-protected information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity; (2) any other information that is linked or linkable to an individual; Examples: * Name; * Social Security number; * Date and place of birth; * Mother's maiden name; * Biometric records; * Patient health and medical information; * Educational information; * Financial information; * Employment information; * Census data; * Taxpayer data. Type of information: Source selection; Description: Nonpublic information prepared for use by an agency to evaluate a bid or proposal to enter into an agency procurement contract, such as contractor's proposed costs or the government's evaluation plans; Examples: * Contractor bid or proposal information, including cost or pricing data; * Source-selection plans; * Technical evaluation plans; * Technical evaluations of proposals; * Cost or price evaluations of proposals; * Rankings of bids, proposals, or competitors; * Competitive range determinations; * Evaluations of source-selection panels, boards, or advisory councils. Type of information: Business proprietary; Description: Nonpublic information that is used, produced, or marketed under legal rights of the business concern; Examples: * Information that may relate to trade secrets, processes, operations, style of work, or apparatus; * Information that may relate to the identity, confidential statistical data, amount or source of any income, profits, losses, or expenditures; * Information about manufacturing processes, operations, or techniques marked proprietary by a business concern. Type of information: Agency sensitive; Description: Information relating to an agency's mission, management operations, or staff that is generally not released to the public. Each agency may individually determine what qualifies as this type of information, therefore, the type of information covered by this category varies by agency; Examples: * Continuity-of-operations information; * Security management information; * System and network monitoring information; * Predecisional planning, programming, budgeting, and execution documents and information; * Protection services (building security); * Personnel records. Source: GAO analysis of laws, regulations, and other government sources. [End of table] The federal government uses a variety of means, whether prescribed by statute, executive order, or other authority, to limit dissemination and protect against the inadvertent disclosure of certain types of sensitive information. For information the government considers critical to our national security, the government may take steps to protect such information by classifying it as Top Secret, Secret, or Confidential pursuant to criteria established by law and executive order.[Footnote 11] Information that does not meet the thresholds established for classification as national security information but that an agency nonetheless considers sufficiently sensitive to warrant restricted dissemination has generally been referred to as sensitive but unclassified (SBU). In designating information this way, agencies determine that the information they use must therefore be safeguarded from public release. Some, but not all, SBU designations used by agencies have a specific basis in statute. For example, some agencies use the provisions of the Freedom of Information Act (FOIA)[Footnote 12] as their basis for designating information as SBU. FOIA establishes that federal agencies must generally provide the public with access to government information, thus enabling them to learn about government operations and decisions. FOIA establishes a legal right of access to government records and information, on the basis of the principles of openness and accountability in government. But the act also prescribes nine specific categories of information that are exempt from disclosure: for example, trade secrets and certain privileged commercial or financial information, certain personnel and medical files, and certain law enforcement records or information.[Footnote 13] Thus the need to safeguard sensitive information from public disclosure while striking the appropriate balance with the goal of government transparency is another challenge agencies must continually address. Protecting legitimate security, law enforcement, and privacy interests also must be carefully balanced with protecting civil liberties. Of critical importance are providing clear rules to those who handle sensitive information and ensuring that the handling and dissemination of information is not restricted unless there is compelling need. Government ethics rules prohibit federal employees from using sensitive nonpublic information, defined below, for personal gain or to further the interests of another, whether by advice or recommendation or through knowing unauthorized disclosure. For federal employees, certain activities and acts that affect a personal financial interest may also result in violations of criminal law with potentially serious consequences, including dismissal, prosecution, fines, and imprisonment.[Footnote 14] Because not all government ethics rules and related statutes apply to contractors, many of these prohibitions do not extend to contractor employees working in the multisector workforce. Nonpublic Information as Defined in Government Ethics Rules: Nonpublic information is information that the employee gains by reason of federal employment and that s/he knows or reasonably should know has not been made available to the general public. It includes information that s/he knows or reasonably should know: 1. Is routinely exempt from disclosure under the Freedom of Information Act, codified at 5 U.S.C. § 552, or otherwise protected from disclosure by statute, Executive order or regulation; 2. Is designated as confidential by an agency; or; 3. Has not actually been disseminated to the general public and is not authorized to be made available to the public on request. Source: GAO analysis of 5 C.F.R. 2635.703 (b). Safeguards to Protect Sensitive Information Not Always Available in Agency Guidance or Included in Contract Actions: Our analysis of guidance and contract actions at three agencies found areas where sensitive information is not fully safeguarded and thus may remain at risk of unauthorized disclosure or misuse. DHS, DOD, and HHS FAR supplements include some guidance and standard contract provisions--for example that address contractor safeguards for personal information. However, the policies and procedures available in DOD's and HHS's FAR guidance do not contain effective agency management controls for sensitive information needed to help ensure contractor compliance, prevent contractor disclosure and misuse, and promote contractor accountability. Such guidance could help contracting and program officials incorporate safeguards into their contract actions for protecting all types of relevant sensitive information contractors may access, such as agency sensitive information. At the contract level, almost half of the 42 contract actions reviewed did not include solicitation and contract provisions that safeguarded against unauthorized contractor disclosure and inappropriate use of sensitive information contractors may access in program offices during the course of contract performance.[Footnote 15] In cases where there was agency policy to include contract provisions to protect sensitive information on all contracts, such as regarding the medical privacy of individuals, it was not incorporated in 5 of the 42 contract actions that we reviewed. Additionally, DOD and HHS lack guidance on the use of nondisclosure agreements, while DHS has found that these help improve accountability by informing contractors of their responsibilities and the consequences that may result from their failure to meet those responsibilities. Attributes of Safeguards Needed in Agency Guidance and Contracts to Protect Sensitive Information: Contractor and subcontractor employees can be responsible for carrying out a range of mission-critical tasks--including studying ways to acquire desired capabilities, developing contract requirements, and advising or assisting on source selection, budget planning, financial management, and regulations development--potentially requiring access to many types of sensitive information. Agencies can use their FAR supplement authority to issue guidance, which may include contract provisions to establish contractor responsibility for safeguarding sensitive information.[Footnote 16] Review of agency practices and discussions with government security and contracting officials identified three key attributes for assessing the extent that agencies' guidance or the FAR contain effective safeguards for sensitive information in acquisition guidance and contracts. On the basis of these sources, in order to have more effective safeguards in place, contracts should contain provisions that (1) describe the relevant scope of sensitive information under the agency's authority or control that should be protected if contractors require access to it for contract purposes; (2) require the contractor to refrain from disclosing such sensitive information to anyone except as needed for contract performance; and (3) address conflicts of interest or other misuse by prohibiting the contractor from using such sensitive information for any purpose other than contract performance. Agency FAR guidance should help contracting and program officials incorporate effective safeguards for sensitive information into their contract actions by including certain management control practices. We identified a range of management control practices sometimes incorporated into acquisition guidance to help prevent contractor disclosure and misuse, and promote contractor accountability for sensitive information breaches that harm important interests. These control practices include requiring contractors to (1) train or inform employees on their obligations to maintain confidentiality and not misuse sensitive information; (2) obtain written consent from the agency to disclose sensitive information; (3) pass sensitive information provisions to subcontractors; (4) execute a nondisclosure agreement for each employee and subcontractor as a condition of access to sensitive information; (5) promptly notify key agency officials of the misuse or unauthorized disclosure of sensitive information; and (6) be informed of the consequences for violations. Agency Guidance for Two of Three Agencies Reviewed Lacks Needed Safeguards for Contractor Protection of Sensitive Information: Our review found DOD, DHS, and HHS all have guidance that supplements the FAR and addresses requirements or standard contract provisions for contractor protection of certain categories of sensitive information. For example, DOD supplements the protection of individual privacy requirements contained in the FAR by incorporating references to the agency rules and regulations.[Footnote 17] HHS also supplements the FAR with detailed policy that establishes Privacy Act requirements and requires the inclusion of contract provisions to protect the confidentiality of records and the privacy of individuals in contracts where the Privacy Act is not applicable but the contract would involve the collection of individually identifiable personal information by the contractors.[Footnote 18] However, with respect to other key attributes available in agency FAR policies and procedures reviewed at DOD, DHS, and HHS, the agencies' guidance differs in how well they help contracting and program officials incorporate necessary safeguards for sensitive information into their contract actions. Of the guidance analyzed at the three agencies, only DHS established effective management control practices through standard contract provisions in its FAR supplement and related guidance requiring contractors to safeguard sensitive information accessed by employees. In contrast, the FAR guidance of DOD and HHS does not contain effective agency management controls for sensitive information needed to help ensure contractor compliance, prevent contractor disclosure and misuse, and promote contractor accountability. (See appendix III for the standard contract provisions we identified in DHS, DOD, and HHS FAR supplements.) As shown in table 2, our analysis of agency guidance included in the DHS FAR supplement found that it contained five of six effective management control practices consistent with key attributes for establishing safeguards for sensitive information. For example, the DHS FAR supplement and related guidance aims to (1) make contractors aware of their responsibilities for maintaining confidentiality of sensitive information; (2) address conflicts of interest and potential misuse by prohibiting use of agency information processed, stored, or transmitted by the contractor for any purpose other than contract performance; and (3) deter noncompliance with these requirements and ensure accountability by explaining consequences related to violations. According to agency acquisition policy officials, recognition within DHS of the need for contractor safeguards for homeland security-sensitive information likely led to the establishment of extensive requirements when the agency updated its interim FAR supplement and related guidance in 2006. On the other hand, DHS acquisition policy and security officials acknowledge that the agency's FAR supplement and contract clause do not directly specify contractor responsibilities for promptly notifying contracting officers of unauthorized use or disclosure of sensitive information. [Footnote 19] Prompt contractor notification to key government officials is critical to avoid internal delays that would prevent officials from being aware of the unauthorized use or disclosure; delay agency decisions about how to respond; and deny the opportunity for affected parties to take precautions. Table 2: Analysis of Control Practices in Agency FAR Supplements for Safeguarding Sensitive Information Accessed by Contractors: Applicable FAR supplement guidance: DHS; HSAR Section 3004.470-- Security requirements for access to unclassified facilities, Information Technology resources and sensitive information[A]; Requires contractor employee training on protection and disclosure of sensitive information: [Check]; Requires written consent to disclose: [Check]; Requires prompt notification to agency of unauthorized disclosure or misuse: [Empty]; Requires employees sign nondisclosure agreements: [Check]; Requires passing of safeguards to subcontractors: [Check]; Explains that there are consequences for violations: [Check]. Applicable FAR supplement guidance: DOD; DFARS Subsection 204.404-70-- directs contracting officers to use the clause, Disclosure of Information[B], when the contractor will have access to or generate unclassified information that may be sensitive and inappropriate to release to the public; Requires contractor employee training on protection and disclosure of sensitive information: [Empty]; Requires written consent to disclose: [Check]; Requires prompt notification to agency of unauthorized disclosure or misuse: [Empty]; Requires employees sign nondisclosure agreements: [Empty]; Requires passing of safeguards to subcontractors: [Check]; Explains that there are consequences for violations: [Empty]. Applicable FAR supplement guidance: HHS; HHSAR Subpart 324.70-- Confidentiality of Information (deleted)[C]; Requires contractor employee training on protection and disclosure of sensitive information: [Empty]; Requires written consent to disclose: [Check]; Requires prompt notification to agency of unauthorized disclosure or misuse: [Empty]; Requires employees sign nondisclosure agreements: [Empty]; Requires passing of safeguards to subcontractors: [Empty]; Explains that there are consequences for violations: [Empty]. Source: GAO analysis of DOD, DHS, and HHS data. Notes: Data are from agency FAR supplements. See appendix III for the full text of the DHS, DOD, and HHS contract clauses cited in this analysis. [A] The Department of Homeland Security Acquisition Regulation (HSAR) directs contracting officers to include the basic clause, HSAR Subsection 3052.204-71, Contractor Employee Access, when contractor employees require recurring access to government facilities or access to sensitive information. Subsection 3004.470-2 requires compliance with the policies and procedures in a DHS security management directive that expressly requires contractor and consultants to execute the DHS Form 11000-6, Sensitive But Unclassified Information Non-disclosure Agreement, as a condition of access to sensitive information. See appendix IV for detailed information about DHS contractor nondisclosure agreement requirements. [B] Defense Federal Acquisition Regulation Supplement (DFARS) Subsection 252.204-7000. Our analysis on this chart is limited to the noted DFARS clause and corresponding subsection. Other DFARS clauses may contain some of these safeguards to protect sensitive information, but they are limited to specific categories of information. For example, as a condition of access to another contractor's technical data or computer software delivered to the government, DFARS 227.7103- 7 provides that an authorized company representative may execute a nondisclosure agreement directly with the other contractor that prohibits (1) use of such data for other than government contract purposes and (2) release, display, or disclosure of such technical data or computer software without the express written permission of the other contractor. Under this DFARS provision, execution of this nondisclosure agreement is for the benefit of the other contractor, and the recipient contractor agrees to hold harmless the government from every liability arising out of the misuse of the other contractor's technical data or computer software. [C] Contracting officers were directed to use the clause in Department of Health and Human Services Acquisition Regulation (HHSAR) Subsection 352.224-70, Confidentiality of Information, whenever the need existed to keep information confidential, such as when contracts involved the use of proprietary plans or processes or confidential financial information of organizations other than the contractor's. When HHS revised its FAR supplement effective as of January 2010, this guidance was removed in its entirety from the HHSAR. [End of table] DHS's guidance establishes stronger safeguards for sensitive information than what we found at DOD and HHS in their FAR supplements. In contrast with the DHS guidance, the analysis in table 2 shows that DOD's FAR supplement does not include the same amount of detail as to how contractors are to safeguard sensitive information. At present, DOD's FAR supplement is limited to requiring the use of a disclosure of information clause in solicitations and contracts when contractors have access to unclassified information that may be sensitive and inappropriate for release to the public--for example, DOD officials said the clause authorizes use in a contractor's press and marketing materials.[Footnote 20] In addition, since HHS revised its FAR supplement as of January 2010,[Footnote 21] guidance and a contract provision that required contractors to obtain written consent before disclosing certain kinds of sensitive information--not already subject to FAR and agency privacy restrictions--was deleted in its entirety.[Footnote 22] According to the director for acquisition policy, HHS deleted the "Confidentiality of Information" clause because the need for agency guidance will be obviated by pending changes to the FAR expected later in 2010.[Footnote 23] Besides the supplemental FAR guidance, agencies have developed other policies and control practices to establish additional contractor responsibilities for safeguarding certain categories of sensitive information obtained during contract performance. For example, a 2007 privacy breach involving a DOD contractor that potentially compromised the personal health information of 580,000 households led the privacy office in DOD's component agency TRICARE Management Activity (TMA) to determine that the agency's contract provisions did not adequately protect sensitive information.[Footnote 24] According to the TMA privacy office director, most TMA contracts before 2007 did not specifically require the contractor to safeguard personal health information, notify DOD or beneficiaries of privacy breaches, or to mitigate any harm, such as paying for the cost of free credit monitoring to affected individuals. To address this problem, TMA has required since 2007 that standard contract provisions be included whenever a contract is awarded that requires either the use of or access to personal information. The required contract language is posted on TMA's Web site and imposes protections for the privacy and security of personally identifiable information and protected health information. It seeks to ensure that contractors understand their responsibility in protecting TRICARE beneficiaries' sensitive information. Similarly, HHS's Centers for Medicare and Medicaid Services (CMS) issued an acquisition policy and procedure notice, which took effect in 2005, to advise contracting staff of the requirement to use a clause for contractor protection of health information. This standard CMS clause had been revised to integrate the HIPAA security standards along with the privacy standards that were previously adopted in standard contract provisions.[Footnote 25] Almost Half of Contract Actions Reviewed Lack Contract Provisions That Fully Safeguard Sensitive Information: For our analysis of contract documents for 42 contract actions at DHS, DOD, and HHS that involved contractor employees supporting mission- critical tasks, in order to be considered to fully safeguard all types of sensitive information, a contract had to contain provisions that specifically required contractors to refrain from (1) disclosing sensitive information to anyone except as needed for contract performance and (2) using such sensitive information for any purpose other than contract performance. In addition, the provisions had to cover the relevant types of sensitive information that may be accessed by a contractor during performance. As shown in table 3, our analysis found that slightly more than half of contract actions reviewed--23 of 42--contained contract provisions that fully safeguard the confidentiality and appropriate use of all types of sensitive information. In contrast, the remaining 19 contract actions reviewed did not extend safeguards to all relevant types of sensitive information that contractors may have had access to through the program offices they support. In the absence of such safeguards, there is higher risk of unauthorized disclosure or misuse of sensitive information by contractors.[Footnote 26] Table 3: Analysis of Contract Provisions Establishing Contractor Safeguards for Sensitive Information: Agency: DHS; Number of contracts reviewed: 14; Presence of provisions safeguarding sensitive information[A]: 11; Absence of provisions safeguarding sensitive information: 3. Agency: DOD; Number of contracts reviewed: 18; Presence of provisions safeguarding sensitive information[A]: 9; Absence of provisions safeguarding sensitive information: 9. Agency: HHS; Number of contracts reviewed: 10; Presence of provisions safeguarding sensitive information[A]: 3; Absence of provisions safeguarding sensitive information: 7. Agency: Total; Number of contracts reviewed: 42; Presence of provisions safeguarding sensitive information[A]: 23; Absence of provisions safeguarding sensitive information: 19. Source: GAO analysis of agency contracts. [A] Analysis of 23 contract actions found evidence of contract provisions that established requirements for appropriate disclosure, handling, access, and restrictions on misuse of a full range of nonpublic agency information, proprietary information, and privacy information. [End of table] Of the 19 contracts reviewed that did not have provisions for all safeguards, our content analysis found that one HHS blanket purchase agreement and an associated order we reviewed contained no evidence of contract provisions for contractor safeguarding of sensitive information, except for standard FAR clauses related to the Privacy Act in the base contract. In addition, some contract provisions included in 18 other contract actions provided too few safeguards, given the range of tasks being performed and the potential opportunities to gain access to many types of sensitive information. For example, at HHS several contract actions specified that contractors must safeguard certain types of sensitive information, but did not specify contractor protection of agency-sensitive information from nondisclosure or misuse. In other cases, clauses addressed limitations on the disclosure of certain types of sensitive information, but not its misuse, and therefore did not fully safeguard these types of information. Some HHS contract actions require that contractors perform acquisition functions related to other contractors, such as strategic planning in support of future task awards or auditing business proposals, and thus could require access to proprietary information. These contract actions did not always include safeguards addressing limits on unauthorized disclosure and misuse of proprietary information. Similarly, several DOD contract actions included provisions to prevent contractors from disclosing any nonpublic information they obtained during contract performance, but provisions to prohibit contractors from misusing the information for purposes other than contract performance were absent. In cases where there was agency policy to include specific contract provisions to protect sensitive information, it was not incorporated in five of the contract actions we reviewed. For example, 3 DHS task orders of the 14 contract actions reviewed did not include the contract clause required when contractors need recurring access to government facilities or sensitive information.[Footnote 27] At HHS, 2 task orders of the 10 contract actions reviewed did not include standard contract provisions regarding HIPAA privacy and security standards required by agency policy to be in all contracts. Two of Three Agencies Reviewed Lack Guidance on Using Contractor Nondisclosure Agreements for Full Range of Sensitive Information: Several of the contract actions we reviewed used nondisclosure agreements as a mechanism to help protect sensitive information from conflicts of interest and preserve its confidentiality. These agreements generally outline the exchange of confidential information or knowledge that at least two parties need to share for certain purposes, but wish to restrict access to by third parties. When used by agencies as a condition of contractor access to sensitive information, a nondisclosure agreement may serve several important accountability purposes. These include informing contractor employees and subcontractors of (1) the trust that is placed in them by providing them access to sensitive information; (2) their responsibilities to protect that information from unauthorized disclosure and use; and (3) the consequences that may result from their failure to meet those responsibilities. All of the agencies we reviewed had established guidance requiring contractor employees participating in source-selection activities to sign an agreement to not disclose procurement sensitive, proprietary, or source-selection information. Beyond addressing this one area of sensitive information however, only DHS and TMA (in DOD) had guidance requiring the use of standard contractor nondisclosure agreements for a broader range of sensitive information that may be handled by contractors. Under the DHS and TMA guidance, certain contracts are to contain provisions that require contractors to submit to a designated agency official an executed nondisclosure agreement for each employee and subcontractor within a stipulated time following contract award or before they are given access to certain types of agency sensitive information. Appendix IV provides examples of standard nondisclosure agreements we reviewed. DHS and TMA security and acquisition policy officials responsible for jointly developing agency guidance on nondisclosure agreements view these agreements as critical to promoting contractor accountability. According to the DHS administrative security chief, the agencywide nondisclosure agreement was developed in coordination with agency acquisition policy, information technology (IT) security, and privacy officials to educate contractor personnel on the agency's standards for safeguarding sensitive information and provide a mechanism to hold them accountable should they violate the terms of the agreement. The agencywide form was also developed to eliminate use of nonstandard forms to cover different types of sensitive information that were causing confusion and required contractor employees to sign multiple forms.[Footnote 28] According to DOD's acquisition executive for TMA, having contractor employees sign nondisclosure agreements provides additional benefits for the government by (1) requiring that contractors will protect and not disclose sensitive information; (2) protecting against conflicts of interest that could occur if contractors use sensitive information for future competitive advantage; and (3) making contractors and their employees aware of the government's expectations and their obligations to safeguard sensitive information. As shown in table 4, due to the agencywide use of nondisclosure agreements at DHS and DOD's TMA, 20 of 42 contract actions reviewed contained contract provisions requiring nondisclosure agreements for each employee and subcontractor. All 10 of the Air Force contracts reviewed and 1 contract at HHS required contractors to enter into third-party agreements with other contractors about the confidentiality and use of their proprietary information obtained during contract performance. Table 4: Analysis of Contract Requirements for Nondisclosure Agreements: Agency: DHS; Number of contract actions reviewed: 14; Contract provisions relating to nondisclosure agreements: Requires contractor to submit executed nondisclosure agreement for each individual as a condition of access: 12; Requires contractor agreements with third-parties to protect their proprietary information: 0; Does not require nondisclosure agreements: 2[A]. Agency: DOD: TMA; Number of contract actions reviewed: 8; Contract provisions relating to nondisclosure agreements: Requires contractor to submit executed nondisclosure agreement for each individual as a condition of access: 8; Requires contractor agreements with third-parties to protect their proprietary information: 0; Does not require nondisclosure agreements: 0. Agency: DOD: Air Force; Number of contract actions reviewed: 10; Contract provisions relating to nondisclosure agreements: Requires contractor to submit executed nondisclosure agreement for each individual as a condition of access: 0; Requires contractor agreements with third-parties to protect their proprietary information: 10; Does not require nondisclosure agreements: 0. Agency: HHS; Number of contract actions reviewed: 10; Contract provisions relating to nondisclosure agreements: Requires contractor to submit executed nondisclosure agreement for each individual as a condition of access: 0; Requires contractor agreements with third-parties to protect their proprietary information: 1; Does not require nondisclosure agreements: 9. Agency: Total; Number of contract actions reviewed: 42; Contract provisions relating to nondisclosure agreements: Requires contractor to submit executed nondisclosure agreement for each individual as a condition of access: 20; Requires contractor agreements with third-parties to protect their proprietary information: 11; Does not require nondisclosure agreements: 11. Source: GAO analysis of agency contracts and task orders. [A] DHS policy requires nondisclosure agreements to be executed by contractors as a condition of access to sensitive information. Therefore, these contractors may have been required to sign nondisclosure agreements, but this requirement was not clearly stated in two contracts. [End of table] One case study of an Air Force contract illustrated the practical challenges for agency monitoring of such third-party agreements in contrast to agency use of its own contractor nondisclosure agreements. In this case study, although the contractor's conflict of interest mitigation plan indicated the company maintained nondisclosure agreements and proprietary protection agreements with many third-party contractors, no copies of executed nondisclosure agreements were available from the Air Force contracting and program officials responsible for administering the contract. In addition, officials told us they knew that the contractor had entered into such agreements, but they had not reviewed them.[Footnote 29] We discussed a less challenging approach for implementing agency contractor nondisclosure agreements with the Department of the Treasury's (Treasury) contract administrator responsible for management and oversight of contractors and financial agents supporting the Troubled Asset Relief Program (TARP).[Footnote 30] He agrees with DHS and TMA views that nondisclosure agreements are critical to promoting contractor accountability for maintaining confidentiality of sensitive information and providing other benefits, such as helping to prevent conflicts of interest that could arise from contractor misuse of the information. Treasury uses an alternative way to implement these agreements that reduces administrative burden without compromising contractor compliance for their use. Language included in certain TARP Financial Agency Agreements requires the financial agent to have each employee and all affiliate and contractor personnel to whom nonpublic information is or may be disclosed execute the agency's nondisclosure agreement form--included as an exhibit to the agreement--as a condition of access to sensitive government information.[Footnote 31] According to the Treasury official, it is better to have the contractor responsible for retaining the executed agreements in its own files, rather than have the government contracting officer or program office retain them. The official explained that as long as the terms of the contract require contractors to certify to the government they have collected the agency's nondisclosure agreement for all individuals they assign to perform on the contract, and the agreements are available to the government for inspection, it is better to hold contractors accountable for retaining the signed agreements. Efforts Underway to Improve Governmentwide Guidance in the FAR for Contractor Access to Sensitive Information: The FAR Council in recent years has made progress improving guidance for security and oversight related to contractor access to sensitive government facilities and information systems, but challenges remain. While the FAR establishes governmentwide guidance on certain contractor sensitive-information safeguards prescribed in statute--for example, to require contractor protection of individual privacy--FAR guidance does not address certain key areas relating to contractor access to sensitive information. Several amendments are pending before the FAR Council to implement recommended changes and to improve FAR guidance in the complex areas involving contractor access to sensitive information. Such changes to the FAR could provide agencies clear guidance on the use of contractor nondisclosure agreements as a condition of access to sensitive information and could include requirements for contractors to promptly notify agencies of unauthorized disclosure and misuse of sensitive information to enable timely decisions regarding an agency's response when use of sensitive information is compromised. With the rulemaking process underway to develop these amendments, the FAR Council has an opportunity to consider additional changes to strengthen FAR guidance to ensure remaining gaps in contractor safeguards identified in this review are addressed. Governmentwide Guidance Currently Addresses Certain Contractor Safeguards for Sensitive Information: The FAR is the primary regulation that provides uniform policies and procedures for acquisitions by executive agencies.[Footnote 32] During the acquisition process, the FAR emphasizes basic planning that has to be coordinated among agency personnel responsible for significant aspects of the acquisition, such as contracting, fiscal, legal, and technical personnel.[Footnote 33] In describing agency needs during acquisition planning, the FAR directs agencies to address all significant considerations that will control each acquisition, including security considerations for acquisitions requiring routine contractor physical access to a federal facility or IT system. The FAR has several provisions that establish policy and contract clauses implementing requirements prescribed in statute or executive order for contractor protection of certain categories of sensitive information, such as information related to the privacy of individuals. When these FAR provisions, which are described in table 5, are applicable, certain sensitive-information requirements are included in solicitation and contract provisions that are intended to safeguard procurement integrity, classified information, organizational conflicts of interest, and privacy.[Footnote 34] Agencies use this guidance to incorporate requirements during acquisition planning and when describing agency needs. Table 5: FAR Contract Provisions for Safeguarding Certain Types of Sensitive Information: Covered information: Source selection; FAR provisions obliging contractor employee authorized use and confidentiality: Section 3.104--Procurement Integrity. Both federal employees and contractor employees that have access to contractor bid or proposal information or source-selection information are subject to laws and regulations to limit disclosure of protected procurement- related information. Violations are punishable by both civil and criminal penalties and administrative actions, such as contract cancellation. 41 U.S.C. § 423. Covered information: Classified; FAR provisions obliging contractor employee authorized use and confidentiality: Subpart 4.4--Safeguarding Classified Information Within Industry. Contracting officers shall review all proposed solicitations to determine whether access to classified information may be required by offerors or by a contractor during contract performance. If so, the contracting officer shall follow the relevant agency's procedures for security clearances. Contracting officers shall also include the appropriate security requirements clause (52.204-2) in solicitations and contracts for security safeguards. During the award phase of a "classified" contract, contracting officers for agencies covered by the national industrial security program shall use the Contract Security Classification Specification (DD Form 254) to inform contractors and subcontractors of the security classifications and requirements assigned to the various documents, materials, tasks, and subcontracts. Covered information: Business proprietary; FAR provisions obliging contractor employee authorized use and confidentiality: Subsection 9.505-4--Obtaining Access to Proprietary Information. FAR subpart 9.5 requires contracting officers to identify and evaluate potential organizational conflicts of interest prior to contract award and take steps to address potential conflicts that they determine to be significant. The contracting officer may use solicitation provisions or a contract clause to require agreements about restrictions on the use of other contractors' proprietary information obtained during the course of contract performance to prevent the contractor from gaining an unfair advantage. These restrictions encourage companies to provide information necessary for contract performance. If the contracting officer imposes the restrictions, the contractor that gains access to proprietary information of other contractors must agree with other companies to protect their information from unauthorized use or disclosure and refrain from using the information for any purpose other than necessary for contract performance. If such agreements are required, the contracting officer shall obtain copies of these agreements and ensure that they are properly executed. Covered information: Personal; FAR provisions obliging contractor employee authorized use and confidentiality: Subpart 24.1--Protection of Individual Privacy. In implementing federal privacy requirements the FAR requires that when an agency contract will involve the design, development, or operation of a system of records on individuals to accomplish an agency function, the contracting officer shall (1) ensure that the contract identifies the system of records on individuals and the design, development, or operation work to be performed, and (2) make available agency rules and regulations implementing the Privacy Act. A contractor and its employees may be subject to criminal penalties for violation of the Privacy Act. 5 U.S.C. § 552a. Source: GAO analysis of the FAR. [End of table] Finally, to address the need for improved governmentwide contracting guidance required by presidential directive or law and to assist agencies in addressing identified risks from contractor access to sensitive federal facilities and information systems, OFPP and the FAR Council revised contractor personnel and IT security requirements in the FAR. Key aspects of the revised contractor personnel and IT security safeguards are summarized as follows: * Securing personal identity verification of contractor personnel--in 2007 the FAR was amended in part to implement the August 2004 Homeland Security Presidential Directive 12 (HSPD-12), which required the establishment of a governmentwide standard for secure and reliable forms of identification for federal employees and contractors alike. [Footnote 35] Implementing HSPD-12 requirements through contract provisions may help address the risks of contractors gaining unauthorized physical or electronic access to federal information or contractors using outmoded identification cards that can be easily forged, stolen, or altered to allow unauthorized access. * Strengthening federal information security oversight of contractor IT operations--in 2005 an interim rule amended the FAR to implement the Federal Information Security Management Act of 2002 (FISMA) information-technology-security provisions.[Footnote 36] According to the FAR Council, the addition of specific FISMA-related provisions was intended to provide clear, consistent guidance to acquisition officials and program managers, and to encourage and strengthen communication with IT security officials, chief information officers, and other affected parties. See appendix V for greater detail on these changes to the FAR. Addition of Recommended Changes in FAR Contract Provisions Underway to Improve Sensitive Information Safeguards: There have been numerous recommendations in recent years for improved governmentwide guidance and contract provisions for contractor protection of sensitive information. The emphasis has been on standardizing approaches and establishing accountability mechanisms when access to information is compromised. Problems and recommendations to address them include the following: * In 2007, the Acquisition Advisory Panel found that increased use of contractor employees in the government workforce to support the evaluation of other contractors raises questions regarding the potential for organizational conflicts of interest and how to preserve the confidentiality of proprietary information. To address such risks, the panel recommended that the FAR Council provide additional regulatory guidance for contractor access to and responsibilities for protecting proprietary information belonging to other companies. It specifically called for developing standardized contract provisions and approaches for agencies' use of nondisclosure agreements and in creating remedies for improper information sharing. It also suggested the use of standardized clauses for organizational conflicts of interest to address issues of unfair competitive advantage when a firm gains access to information as part of its performance of government contract responsibilities. * Similarly, on the basis of lessons learned from agency responses to loss of personally identifiable information, in April 2007 we noted that agencies need to clearly define contractor responsibilities for protecting privacy information.[Footnote 37] In this report, contractors were prominently involved in privacy data breaches at three of six agencies reviewed, including one case in which a contractor inadvertently released informational compact discs to several FOIA requesters that contained Social Security numbers and tax identification data on 350,000 individuals receiving government program payments. We noted that contractor obligations for mitigating damage from data breaches, such as notifying affected individuals or providing credit monitoring, may be unclear unless specified in the contract. Consistent with and in response to our report, DHS acquisition policy officials told us in June 2009 of their recommendations for revisions to the FAR Subpart 24.1 to (1) expand existing Privacy Act coverage and (2) implement a standard approach that promotes contractor accountability. According to DHS officials, to avoid agency-by-agency development of inconsistent clauses or other contractual terms, the FAR needs a revised privacy policy and clause for establishing basic government and contractor and subcontractor expectations, roles, and responsibilities--including prompt breach notification procedures for contractors to inform officials of privacy data breaches to enable the agency's timely response. * Additionally, in 2008 we reported that certain defense contractor employees who support key mission-critical tasks that have the potential to significantly influence DOD decisions are not subject to the same ethical safeguards as federal employees.[Footnote 38] Furthermore, no FAR policy obliges government agencies using these contractor employees to require that they be free from personal conflicts of interest or addresses the issue of contractor employee misuse of the government's nonpublic information obtained while performing work under a contract for private gain. To address this problem, we recommended that DOD develop and implement policy that would require a contract clause, among other safeguards, to prohibit contractor personnel from using nonpublic government information for personal gain. DOD postponed implementing the recommendation once OFPP and the FAR Council began responding to legislation from Congress.[Footnote 39] Among other changes, the legislation required a standard policy to be developed and issued to prevent personal conflicts of interest by contractor employees performing acquisition functions closely associated with inherently governmental functions. This policy was to require each contractor whose employees performed these functions to prohibit covered employees with access to nonpublic government information from using it for personal gain. In response, since 2007 the FAR Council has opened several cases, shown in table 6, to amend the FAR to provide additional regulatory coverage and clauses. These open cases, with implementing regulations pending as of July 2010, have significant potential for addressing these identified problems. Discussions with OFPP and DOD officials responsible for these FAR changes, and review of information they provided on these cases, indicate that the steps the FAR Council has been taking to revise governmentwide guidance are consistent with the recommendations. For example, a review of information on these pending FAR cases indicates significant changes are being considered to amend the FAR so that it addresses access to nonpublic information and conflicts of interest. Changes being considered also contain other policies and clauses consistent with safeguards we identified for protecting contractor sensitive information, and these changes may mitigate the risks of unauthorized disclosure and misuse. FAR cases generally follow a lengthy process that allows the public, as well as federal agencies, to comment on proposed changes to the FAR. Because of other rulemaking priorities and the many steps involved--including legal and interagency reviews--FAR Council officials told us the rulemaking process could take many more months to complete. Table 6: Status of Pending FAR Cases to Revise Policies and Clauses for Contractor Use and Confidentiality of Sensitive Information: FAR case: 2007-019, Contractor Access to Non-public Information; Synopsis: Consideration of how to safeguard nonpublic information by including provisions and clauses in solicitations and contracts for the use of nondisclosure agreements; information sharing among contractors; and remedies for improper disclosure; Significance: Could potentially address gaps in the FAR's regulatory coverage responsive to Acquisition Advisory Panel's recommended improvements; Status as of July 2010: FAR case opened in 2007; proposed rule has yet to be published in Federal Register for consideration of public comment. FAR staff is awaiting additional government input on draft proposed rule after review by defense and civilian agency acquisition councils. FAR case: 2007-018, Organizational Conflicts of Interest; Synopsis: Consideration of whether current guidance on organizational conflicts of interest is adequate for assisting current needs of agencies or whether providing standard provisions or clauses might be helpful; Significance: Could potentially address Acquisition Advisory Panel recommendations by changing current guidance under FAR 9.505-4 that allows agencies to impose restrictions on contractors gaining access to proprietary information from others in the performance of a government contract to avoid unfair advantage and protect their information from unauthorized use or disclosure; Status as of July 2010: FAR case opened in 2007; proposed rule has yet to be published in Federal Register for consideration of public comment. Draft proposed rule is under review by OFPP. FAR case: 2008-025, Preventing Personal Conflicts of Interest by Contractor Employees Performing Acquisition Functions; Synopsis: Implements § 841(a) of the Duncan Hunter National Defense Authorization Act for Fiscal Year 2009, Pub. L. No. 110-417, that required OFPP to develop and issue a policy and clauses for inclusion in solicitations, contracts, task orders, and delivery orders. Proposes a definition of "non-public government information," adapted from government ethics rules, as meaning any information that a covered employee gains by reason of work under a contract and that the covered employee knows, or reasonably should know, has not been made public (e.g., proprietary contractor information in the possession of the government); Significance: Also may address GAO recommendation for DOD to develop a policy that will prohibit contractors performing acquisition functions with access to nonpublic government information obtained while performing work under the contract from using it for personal gain. Use of the proposed clause would require contractors to obtain nondisclosure agreements from covered employees and report to the contracting officer any personal conflict of interest violation. Also lists remedies available to the government if a contractor fails to comply with the requirements, such as payment suspension or contract termination; Status as of July 2010: FAR case opened in 2008; proposed rule published in Federal Register for consideration of public comment in November 2009.[A] Public comments have been addressed by FAR staff for draft final FAR rule; awaiting interagency concurrence on open issues before final rule can be published in Federal Register. FAR case: 2009-022, Security of Systems Handling Sensitive Personally Identifiable Information; Synopsis: Would establish a uniform approach for handling of sensitive Privacy Act information; Significance: Could potentially address GAO recommendation and DHS- proposed revision; Status as of July 2010: FAR case opened in 2009; proposed rule yet to be published in Federal Register for consideration of public comment. Draft proposed rule is under OMB review. Source: GAO analysis of FAR Council information. [A] The FAR Council issued the proposed rule, Federal Acquisition Regulation: FAR Case 2008-025, Preventing Personal Conflicts of Interest for Contractor Employees Performing Acquisition Functions. Public comments were due in January 2010. 74 Fed. Reg. 58584-89 (Nov. 13, 2009). [End of table] Opportunity Exists for FAR Council to Consider Additional Changes in the FAR to Further Address Safeguards for Contractor Access to Sensitive Information: Until the FAR Council completes the rulemaking process for the pending cases listed in table 6, it is unclear the extent to which the changes will address risks and better control contractor confidentiality and authorized use of sensitive information. With regard to unauthorized disclosure and use of sensitive information, these risks include (1) unauthorized access by contractor employees or subcontractors not involved with contract performance, (2) conflicts of interest in using sensitive information for financial gain or unfair competitive advantage, and (3) unauthorized disclosure. Similarly to issues we identified in agency guidance, our review found that FAR guidance does not address certain areas relating to contractor access to sensitive information. Moreover, rather than having agencies develop stronger safeguards individually, the FAR Council is developing a standardized approach to address many of these areas. This is particularly relevant with regard to changes being considered under the open FAR Case 2007-019, Contractor Access to Non- Public Information, listed above. Nevertheless, our review of potential changes to FAR guidance identified two key areas yet to be addressed where the FAR does not contain guidance that could help agencies address problems identified in this report. The first key area is the development and use of contractor nondisclosure agreements as a condition of access to sensitive information. Additional FAR guidance also could ensure nondisclosure agreements used across the government include clear and complete information to contractors. Without uniform emphasis in the FAR on how agencies use contractor nondisclosure agreements, contractors may not be adequately informed of their responsibilities to protect that information from unauthorized disclosure and use and the consequences that may result from their failure to meet those responsibilities. The second key area is the establishment of requirements for contractors to provide agencies prompt notification of deviations by their employees or subcontractors from provisions for use and confidentiality of all types of sensitive information.[Footnote 40] Without such guidance in the FAR, contractors may not be adequately required to make key government officials aware of unauthorized disclosure or inappropriate use of sensitive information involving their employees. A contractor's prompt notification is critical to avoiding delays in internal agency decisions about how to respond to the misuse or unauthorized disclosure of sensitive information and the opportunity for affected parties to take precautions. Also, without such guidance, agencies may be less able to act on a timely basis to hold contractors accountable for their failure to properly use and maintain confidentiality of sensitive information. Conclusions: The government's extensive use of contractors in the multisector workforce to support management activities and administrative functions, coupled with contractors' increasing access to government facilities, has in recent years prompted several constructive efforts by the FAR Council to establish uniform contract provisions. However, of the three agencies reviewed for this report, only DHS has established guidance for controlling contractor use and limiting unauthorized disclosure of sensitive information obtained during contract performance. OFPP and the FAR Council have recognized that FAR guidance does not address certain key areas. Rather than having agencies develop their own guidance and clauses individually, several amendments are pending to improve guidance and contract clauses in the FAR. While these are steps in the right direction, opportunities exist to address certain gaps we identified in pending FAR guidance. These include the need for guidance on agency use of contractor nondisclosure agreements and the need to establish requirements for contractors to promptly notify agencies of unauthorized disclosure or misuse of sensitive information, which is critical to enabling timely agency decisions and responses. Recommendations for Executive Action: To address the need for clearly defining contractor responsibilities in governmentwide guidance in the FAR, we recommend that the Administrator of OFPP ensures that the FAR Council incorporates changes in the FAR that address safeguards for contractor access to sensitive information by: * providing guidance to agency acquisition policy officials, in coordination with IT security and privacy officials, chief information officers, and other affected parties, on agency development and use of contractor nondisclosure agreements as a condition of access to sensitive information; and: * establishing a requirement for prompt notification to appropriate agency officials of a contractor's unauthorized disclosure or misuse of sensitive information so that timely agency responses are facilitated and appropriate contractor accountability mechanisms can be enforced. Agency Comments and Our Evaluation: We provided a draft of this report to OMB's OFPP, DOD, HHS, and DHS for review and comment. In oral comments, OFPP generally concurred with our recommendations. DOD provided technical comments that were incorporated into the report as appropriate and HHS did not have comments. In written comments, included in appendix VI, DHS generally concurred with our report. However, DHS took exception to the analysis for 1 of the 14 contract actions reviewed, which we found did not contain adequate safeguards to protect sensitive information. While we agree that the task order identified in DHS' response includes contract provisions with prohibitions against disclosing sensitive information, the language does not address safeguards to ensure contractors' appropriate use of sensitive information. DHS also stated that although this task order lacks a contract clause required in DHS acquisition regulations, it includes comparable provisions in the statement of work. We reviewed the task order and the guidance for the clause HSAR 3052.204-71, Contractor Employee Access, which requires the use of the clause or one substantially the same in solicitations and contracts when contractor employees require recurring access to government facilities or access to sensitive information. On the basis of our review, we continue to believe that the task order does not contain HSAR clause 3052.204-71 or a contract clause that is substantially the same as that clause. Although some provisions in the task order contain similar information and requirements, these provisions do not cover the same breadth or detail as HSAR clause 3052.204-71. For example, the task order does not include a comprehensive definition section such as the one in HSAR clause 3052.204-71. Without the use of such comprehensive definitions, it is not clear that the various provisions of the task order noted by DHS collectively and effectively protect the same range of sensitive government information as set forth in HSAR clause 3052.204-71. In addition, the task order specified in DHS' response does not include provisions that limit contractors from disclosing sensitive information without authorization from the contracting officer. Also, the portions of the statement of work cited as comparable with HSAR clause 3052.204-71(e) relate specifically to information technology, and not necessarily to information that contractors and their employees may otherwise gain access to in the course of their contractual responsibilities. DHS also provided technical comments, which were incorporated into the draft where appropriate. We are sending copies of this report to the Director of OMB; the Secretaries of Defense, Homeland Security, and Health and Human Services; and interested congressional committees. The report also is available at no charge on GAO's Web site at [hyperlink, http://www.gao.gov]. If you or your staff have any questions concerning this report, please contact me at (202) 512-4841 or needhamjk1@gao.gov. Contact points for our Offices of Congressional Relations and Public Affairs may be found on the last page of this report. GAO staff who made major contributions to this report are listed in appendix VII. Sincerely yours, Signed by: John K. Needham: Director, Acquisition and Sourcing Management: [End of section] Appendix I: Scope and Methodology: To assess the extent that agency guidance and contracts establish effective safeguards for sensitive information, we identified key attributes of the safeguards that should be contained in acquisition guidance and contracts to manage the risks of contractor unauthorized disclosure and misuse based on (1) review of agency practices related to controls over contractor access to sensitive information, (2) review of applicable standards drawn from GAO's Standards for Internal Control in the Federal Government,[Footnote 41] and (3) discussions with government security and contracting officials responsible for administrative, information, and contractor personnel security functions. Specifically the acquisition guidance and contracts should contain safeguards that (1) describe the relevant scope of sensitive information under the agency's authority or control that should be protected if contractors require access to it for contract purposes, (2) require the contractor to refrain from disclosing such sensitive information to anyone except as needed for contract performance, and (3) prohibit the contractor from using such sensitive information for any purpose other than contract performance. To assess the extent to which agency guidance contains safeguards for contractor protection of sensitive information, we analyzed applicable guidance available in the respective Federal Acquisition Regulation (FAR) supplements of the Department of Defense (DOD), the Department of Homeland Security (DHS), and the Department of Health and Human Services (HHS). We selected these departments for review because they ranked among the top procurers of contracted services in fiscal year 2008, based on a review of the Federal Procurement Data System-Next Generation (FPDS-NG), and because prior GAO work shows that their component agencies and organizations rely extensively on support contractors to perform mission-critical tasks that would potentially require access to sensitive information. We assessed the reliability of the FPDS-NG data through corroboration with agency officials and contract files and determined they were sufficiently reliable for our purposes. We analyzed applicable policy and guidance available from the departments and some of their selected component agencies and organizations to identify the extent their guidance provides for contractor protection of sensitive information, including guidance contained in agency FAR supplements as well as security and privacy program policies and procedures applicable to contractor employees. We also interviewed acquisition policy, security, and privacy officials to discuss their supplements to FAR guidance and the contract provisions they use to meet their specific agency needs. To assess the extent to which agency contracts contain safeguards for contractor protection of sensitive information, we analyzed DOD, DHS, and HHS contract actions (defined as a contract, task order, and blanket purchase agreement and associated order) for services potentially requiring contractor access to sensitive information from the following five component agencies or organizations and locations: * within DOD, the (1) TRICARE Management Activity (TMA) in Falls Church, Virginia, and the contracting activity supporting TMA at the U.S. Army Medical Research Acquisition Activity at Fort Detrick, Maryland, and (2) the Air Force Materiel Command's Electronic Systems Center at Hanscom Air Force Base, Massachusetts; * within DHS in Washington, D.C., (3) U.S. Customs and Border Protection and (4) the Office of Procurement Operations within the Office of the Chief Procurement Officer, which is the contracting activity supporting headquarters organizations; and: * within HHS, the (5) Centers for Medicaid and Medicare Services (CMS) in Baltimore, Maryland. At each of these five organizations, we selected for review a nongeneralizable sample of 6 to 10 contract actions (42 in total) in which contractor employees worked in close proximity to government employees and provided professional and administrative services that supported the agencies' missions, in addition to providing a cross section of contract types and services. In making our selection, we reviewed lists of contract actions and reported dollar values drawn from data provided by DOD, DHS, and HHS component agency and organization officials to confirm that the contract actions belonged to their agencies and that they involved contractors working on-site or in close proximity with government employees, to perform services potentially requiring access to sensitive information. For each of the 42 contract actions, we analyzed the contract documentation provided, including base contracts from which task orders or blanket purchase agreements and their associated orders were issued, to determine whether they contained provisions or clauses that direct contractors to safeguard sensitive information consistent with key attributes we identified for safeguarding sensitive information. In conducting this content analysis, two GAO analysts independently reviewed the provisions in each contract or task order and then reconciled any differences in how they were coded. We determined whether the contract provisions addressed limiting disclosure of sensitive information and preventing its misuse. We also assessed the scope of information protected--whether these protections applied to certain categories or to all relevant types of sensitive information that may potentially have been accessed during contract performance. We also determined whether the contract actions required the use of contractor nondisclosure agreements. To obtain an in-depth understanding of the reasons why certain contract clauses and provisions to safeguard sensitive information were required and obtain views on their effectiveness and how contractor compliance with the requirements was being monitored by the government at a cross section of DOD, DHS, and HHS offices, we selected 9 of the 42 contract actions as case studies. For each case study, we conducted semistructured interviews with the DOD, DHS, or HHS officials responsible for developing contract requirements and monitoring contractor performance, including contracting officers, contracting officers' representatives, and program managers. To assess the adequacy of governmentwide guidance in the FAR on how agencies are to contractually safeguard sensitive information to which contractor employees have access, we analyzed FAR requirements that prescribe protections associated with sensitive information, including Part 4 (Administrative Matters); Part 7 (Acquisition Planning); Subpart 9.5 (Organizational and Consultant Conflicts of Interest); Part 24 (Protection of Privacy and Freedom of Information); and Part 52 (Solicitation Provisions and Contract Clauses). We reviewed pending amendments to the FAR and legislation to determine the safeguards they might add to existing FAR guidance. To further understand steps being taken to amend the FAR, we interviewed government officials supporting members of the FAR Council, which oversees the development and maintenance of the FAR, and officials with the Office of Federal Procurement Policy (OFPP) in the Office of Management and Budget. The OFPP Administrator serves as chair of the FAR Council. We conducted this performance audit from May 2009 through September 2010 in accordance with generally accepted government auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and conclusions based on our audit objectives. [End of section] Appendix II: Sensitive But Unclassified Markings Identified by President's Task Force on Controlled Unclassified Information: In 2006 we reported on a survey of federal agencies that showed 26 were using 56 different designations to protect information they deem critical to their missions--such as law-enforcement sensitive, sensitive security information, and unclassified controlled nuclear information.[Footnote 42] Because of the many different and sometimes confusing and contradictory ways that agencies identify and protect sensitive but unclassified (SBU) information, the sharing of information about possible threats to homeland security has been difficult.[Footnote 43] To address this challenge, efforts are underway to establish new governmentwide processes for designating, marking, safeguarding, and disseminating SBU information. Since 2008, in response to a presidential memorandum that replaced SBU information with "controlled unclassified information" (CUI) as the single categorical designation for SBU information, the executive branch is attempting to overhaul its CUI framework.[Footnote 44] The ongoing effort is also addressing a 2009 presidential task force report that found too many labels for sensitive information and recommended that agencies reduce them and balance the need for nondisclosure (to protect privacy or other legitimate interests) and transparency and openness in government. [Footnote 45] The task force found that currently, across the executive branch, this information is identified by over 100 unique markings and at least 130 different labeling or handling regimes (a partial listing of SBU markings the task force found currently in use are shown below). The SBU challenge, according to the task force, is that although SBU regimes or markings are typically derived from an identifiable authority, collectively they reflect a disjointed, inconsistent, and unpredictable system for protecting, sharing, and disclosing sensitive information. Table 7: Selected SBU Markings Currently in Use: Acquisition Sensitive: Agency Internal Use Only (U//AIUO): Attorney Client: Attorney/Client Privileged: Attorney Work Product: Bank Secrecy Act Information (BSA): Budgetary Information: CALEA Cost Recovery Information (CALEA): CFIUS Information (CFIUS): Chemical-Terrorism Vulnerability Information (CVI): Child Victim/Witness (CH): Close Hold: Commercial Markings: Communication/Attorney Work Product (PRV): Computer Security Act Sensitive Information (CSASI): Confidential Business Information (CBI): Confidential Contract Proposal Information (CCPI): Confidential Information Protection and Statistical Efficiency Act of 2002 (CIPSEA): Contractor Access Restricted Information (CARI): Contractual Sensitive Information: Controlled Nuclear Information (U//DCNI or U//ECNI): Copyright (Date) (Owner): Covered by Confidentiality Agreement: DEA Sensitive (DEA S): Deliberate Process Privilege: Dissemination Is Prohibited Except As Authorized by AR 20-1: Do Not Disseminate: DOD Unclassified Controlled Nuclear Information (DOD UCNI): Enforcement Confidential Information (ECI): Exclusive Distribution (EXDIS or XD): Export Controlled Information (Or Material) (ECI): Eyes Only: Federal Taxpayer Information: Financial Records (NON-NSL) (FR): Financial Records NSL (NSLF): For Internal Use Only: For Official Use Only (FOUO): For Official Use Only-Law Enforcement Sensitive (FOUO-LES): Foreign Intelligence Surveillance Act (FISA): Grand Jury Material (FGJ): Government Purpose Rights: Health Related Information (EM): Innocent Images Visual Information (IIVI): Innovation Research Information and Small Business: IT Security Related: Juvenile-Protect Identity in Accordance With 18 USC 5031 (JI): LAN Backup Sensitive Information: LAN Infrastructure: Law Enforcement Sensitive (LES): Limited Access: Limited Credit Information NSL (NSLC): Limited Distribution (LIMDIS): Limited Official Use (LOU): Limited Official Use Information (LOUI): Limited Official Use-Law Enforcement Sensitive (LOU-LES): Limited Rights: Limited Use Only (LUO: Medical Records: Naval Nuclear Propulsion Information (NOFORN): Naval Nuclear Propulsion Information (U-NNPI): No Distribution (NODIS or ND): Not For Distribution Safeguards Information (SGI): Official Use Only (OUO): Official Use Only-Applied Technology: Official Use Only-Export Controlled Information: Official Use Only-Patent Caution Information: Official Use Only-Protected Cooperative Census Confidential: Official Use Only-Sensitive Internal Information: Official Use Only-Small Business: Operations Security Protected Information (OSPI): Originator Controlled (ORCON): Personally Identifiable Information-Privacy Act of 1974: Personnel Data, Privacy Act of 1974 (5 U.S.C. 552A): Predecisional Product: Pre-decisional: Pre-Existing Markings: Privacy Act Protected Information (PAPI): Privileged FBI Attorney Client: Proprietary Information (PROPIN): Protected Critical Infrastructure Information (PCII): RELIDO: Research and Development Agreement Information: Restricted Access: Restricted By Court Order (CO): Restricted Rights: RSEN: SBU-GSA-BI: SBU-NF: SBU/NOFORN: Select Agent Sensitive Information (SASI): Sensitive (SENS): Sensitive But Unclassified (SBU): Sensitive Drinking Water Related Information (SDWRI): Sensitive Homeland Security Information (SHSI): Sensitive Information (SINFO): Sensitive Information-Special Handling Required: Sensitive Security Information (SSI): Sensitive Student Records (STR): Sensitive Treaty/MOU/NDA Information (STM): Sensitive Unclassified Non-Safeguards Information (SUNSI): Sensitive Water Vulnerability Assessment Information: Small Business Innovation Research (SBIR) Program: Special License Rights: Source Selection Information: Source Selection Sensitive: Substance Abuse Records (SAB): Technology Transfer Information: Telephone or Electronic Communications NSL (NSLT): Title III Communications (T3): Trade Secret: Trade Sensitive Information: Unlimited Rights. Source: Presidential Task Force on Controlled Unclassified Information: Note: Data are from the Report and Recommendations of the Presidential Task Force on Controlled Unclassified Information (Aug. 25, 2009). [End of table] [End of section] Appendix III: Agency Contract Provisions Containing Contractor Safeguards for Sensitive Information: Our analysis of agency Federal Acquisition Regulation (FAR) supplements for the Department of Homeland Security (DHS), the Department of Defense (DOD), and the Department of Health and Human Services (HHS) identified the following examples of contract clauses and provisions that establish safeguards for contractor access to sensitive information. DHS: The Department of Homeland Security Acquisition Regulation (HSAR) Subpart 3004.4, Safeguarding Classified and Sensitive Information Within Industry (48 C.F.R. 3004), states that contracting officers shall insert the clause at HSAR 3052.204-71, shown in figure 1, or one substantially the same, in solicitations and contracts when contractor employees require recurring access to government facilities or access to sensitive information. The clause shall not be used unless contractor employees will require recurring access to government facilities or access to sensitive information. Figure 1: HSAR Clause 3052.204-71, Contractor Employee Access: [Refer to PDF for image: illustration] 3052.204-71 Contractor employee access. As prescribed in (HSAR) 48 CFR 3004.470-3(b), insert a clause substantially the same as follows with appropriate alternates: Contractor Employee Access: (June 2006) (a) Sensitive Information, as used in this Chapter, means any information, the loss, misuse, disclosure, or unauthorized access to or modification of which could adversely affect the national or homeland security interest, or the conduct of Federal programs, or the privacy to which individuals are entitled under section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense, homeland security or foreign policy. This definition includes the following categories of information: (1) Protected Critical Infrastructure Information (PCII) as set out in the Critical Infrastructure Information Act of 2002 (Title II, Subtitle B, of the Homeland Security Act, Public Law 107-296, 196 Stat. 2135), as amended, the implementing regulations thereto (Title 6, Code of Federal Regulations, Part 29) as amended, the applicable PCII Procedures Manual, as amended, and any supplementary guidance officially communicated by an authorized official of the Department of Homeland Security (including the PCII Program Manager or his/her designee); (2) Sensitive Security Information (SSI), as defined in Title 49, Code of Federal Regulations, Part 1520, as amended, "Policies and Procedures of Safeguarding and Control of SSI," as amended, and any supplementary guidance officially communicated by an authorized official of the Department of Homeland Security (including the Assistant Secretary for the Transportation Security Administration or his/her designee); (3) Information designated as "For Official Use Only," which is unclassified information of a sensitive nature and the unauthorized disclosure of which could adversely impact a person's privacy or welfare, the conduct of Federal programs, or other programs or operations essential to the national or homeland security interest; and; (4) Any information that is designated "sensitive" or subject to other controls, safeguards or protections in accordance with subsequently adopted homeland security information handling procedures. (b) "Information Technology Resources" include, but are not limited to, computer equipment, networking equipment, telecommunications equipment, cabling, network drives, computer drives, network software, computer software, software programs, intranet sites, and internet sites. (c) Contractor employees working on this contract must complete such forms as may be necessary for security or other reasons, including the conduct of background investigations to determine suitability. Completed forms shall be submitted as directed by the Contracting Officer. Upon the Contracting Officer's request, the Contractor's employees shall be fingerprinted, or subject to other investigations as required. All contractor employees requiring recurring access to Government facilities or access to sensitive information or IT resources are required to have a favorably adjudicated background investigation prior to commencing work on this contract unless this requirement is waived under Departmental procedures. (d) The Contracting Officer may require the contractor to prohibit individuals from working on the contract if the government deems their initial or continued employment contrary to the public interest for any reason, including, but not limited to, carelessness, insubordination, incompetence, or security concerns. (e) Work under this contract may involve access to sensitive information. Therefore, the Contractor shall not disclose, orally or in writing, any sensitive information to any person unless authorized in writing by the Contracting Officer. For those contractor employees authorized access to sensitive information, the contractor shall ensure that these persons receive training concerning the protection and disclosure of sensitive information both during and after contract performance. (f) The Contractor shall include the substance of this clause in all subcontracts at any tier where the subcontractor may have access to Government facilities, sensitive information, or resources. (End of clause) Alternate I: (June 2006): When the contract will require contractor employees to have access to Information Technology (IT) resources, add the following paragraphs: (g) Before receiving access to TT resources under this contract the individual must receive a security briefing, which the Contracting Officer's Technical Representative (COTR) will arrange, and complete any nondisclosure agreement furnished by DHS. (h) The contractor shall have access only to those areas of DHS information technology resources explicitly stated in this contract or approved by the COTR in writing as necessary for performance of the work under this contract. Any attempts by contractor personnel to gain access to any information technology resources not expressly authorized by the statement of work, other terms and conditions in this contract, or as approved in writing by the COTR, is strictly prohibited. In the event of violation of this provision, DHS will take appropriate actions with regard to the contract and the individual(s) involved. (i) Contractor access to DHS networks from a remote location is a temporary privilege for mutual convenience while the contractor performs business for the DHS Component. It is not a right, a guarantee of access, a condition of the contract, or Government Furnished Equipment (GFE). (j) Contractor access will be terminated for unauthorized use. The contractor agrees to hold and save DHS harmless from any unauthorized use and agrees not to request additional time or money under the contract for any delays resulting from unauthorized use or access. (k) Non-U.S. citizens shall not be authorized to access or assist in the development, operation, management or maintenance of Department IT systems under the contract, unless a waiver has been granted by the Head of the Component or designee, with the concurrence of both the Department's Chief Security Officer (CSO) and the Chief Information Officer (CIO) or their designees. Within DHS Headquarters, the waiver may be granted only with the approval of both the CSO and the CIO or their designees. In order for a waiver to be granted: (1) The individual must be a legal permanent resident of the U. S. or a citizen of Ireland, Israel, the Republic of the Philippines, or any nation on the Allied Nations List maintained by the Department of State; (2) There must be a compelling reason for using this individual as opposed to a U. S. citizen; and; (3) The waiver must be in the best interest of the Government. (l) Contractors shall identify in their proposals the names and citizenship of all non-U.S. citizens proposed to work under the contract. Any additions or deletions of non-U.S. citizens after contract award shall also be reported to the contracting officer. (End of clause) Alternate II: (June 2006): When the Department has determined contract employee access to sensitive information or Government facilities must be limited to U.S. citizens and lawful permanent residents, but the contract will not require access to IT resources, add the following paragraphs: (g) Each individual employed under the contract shall be a citizen of the United States of America, or an alien who has been lawfully admitted for permanent residence as evidenced by a Permanent Resident Card (USCIS I-551). Any exceptions must be approved by the Department's Chief Security Officer or designee. (h) Contractors shall identify in their proposals, the names and citizenship of all non-U.S. citizens proposed to work under the contract. Any additions or deletions of non-U.S. citizens after contract award shall also be reported to the contracting officer. (End of clause) Source: DHS. [End of figure] DOD: The Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 204.4, Safeguarding Classified Information Within Industry (48 C.F.R. 204.4), states DFARS clause 252.204-7000, Disclosure of Information (shown in figure 2), should be used in solicitations and contracts when the contractor will have access to or generate unclassified information that may be sensitive and inappropriate to release to the public. Figure 2: DFARS Clause 252.204-7000, Disclosure of Information: [Refer to PDF for image: illustration] 252.204-7000 Disclosure of Information. As prescribed in 204.404-70(a), use the following clause: Disclosure Of Information (Dec 1991): (a) The Contractor shall not release to anyone outside the Contractor's organization any unclassified information, regardless of medium (e.g., film, tape, document), pertaining to any part of this contract or any program related to this contract, unless: (1) The Contracting Officer has given prior written approval; or; (2) The information is otherwise in the public domain before the date of release. (b) Requests for approval shall identify the specific information to be released, the medium to be used, and the purpose for the release. The Contractor shall submit its request to the Contracting Officer at least 45 days before the proposed date for release. (c) The Contractor agrees to include a similar requirement in each subcontract under this contract. Subcontractors shall submit requests for authorization to release through the prime contractor to the Contracting Officer. (End of clause) Source: DOD. [End of figure] HHS: Guidance and contract provisions available in the Department of Health and Human Services Acquisition Regulation (BHSAR) Subpart 324.70, Confidentiality of Information (48 C.F.R. 324.70) (2006), and the accompanying contract clause, shown in figure 3, were deleted when HHS revised the BHSAR, effective January 2010.[Footnote 56] The previous subpart stated that it was HHS policy to protect the personal interest of individuals, corporate interests of nongovernment organizations, and the capacity of the government to provide public services when information about those interests is obtained by contractors in performance of HHS contracts. The subpart further stated that this protection depended on the contractor's recognition and proper handling of the information. The "Confidentiality of Information" contract clause shown in figure 3 was to be used in solicitations and resultant contracts whenever the need existed to keep information confidential, for example in contracts that involve the use of proprietary plans or processes or confidential financial information of organizations other than the contractors. In addition, any solicitation or contract including this clause was to indicate, as specifically as possible, the types of data that would be covered and the requirements for handling the data. Figure 3: HHSAR 352.224.70, Confidentiality if Information: [REfer to PDF for image: illustration] 352.224-70 Confidentiality of information. The following clause covers the policy set forth in subpart 324.70 and is used in accordance with the instructions set forth in 324.7004. Confidentiality Of Information (Jan 2006): (a) Confidential information, as used in this clause, means information or data of a personal nature about an individual, or proprietary information or data submitted by or pertaining to an institution or organization. (b) The Contracting Officer and the Contractor may, by mutual consent, identify elsewhere in this contract specific information and/or categories of information which the Government will furnish to the Contractor or that the Contractor is expected to generate which is confidential. Similarly, the Contracting Officer and the Contractor may, by mutual consent, identify such confidential information from time to time during the performance of the contract. Failure to agree will be settled pursuant to the "Disputes" clause. (c) If it is established elsewhere in this contract that information to be utilized under this contract, or a portion thereof, is subject to the Privacy Act, the Contractor will follow the rules and procedures of disclosure set forth in the Privacy Act of 1974, 5 U.S.C. 552a, and implementing regulations and policies, with respect to systems of records determined to be subject to the Privacy Act. (d) Confidential information, as defined in paragraph (a) of this clause, shall not be disclosed without the prior written consent of the individual, institution, or organization. (e) Whenever the Contractor is uncertain with regard to the proper handling of material under the contract, or if the material in question is subject to the Privacy Act or is confidential information subject to the provisions of this clause, the Contractor should obtain a written determination from the Contracting Officer prior to any release, disclosure, dissemination, or publication. (f) Contracting Officer determinations will reflect the result of internal coordination with appropriate program and legal officials. (g) The provisions of paragraph (d) of this clause shall not apply to conflicting or overlapping provisions in other Federal, State, or local laws. (End of clause) Source: HHS. Note: Effective January 2010, HHS has removed this clause from the HHSAR. [End of figure] Appendix IV: Contractor Employee Nondisclosure Agreements Used by Agencies: [End of section] Our review of the Department of Defense (DOD) and the Department of Homeland Security (DHS) contract clauses and provisions to protect sensitive information identified examples of standard nondisclosure agreement forms in use by these agencies consistent with internal control standards that call for restrictions on access to and accountability for resources and records. Air Force Source Selection Non-disclosure Agreement: The Air Force Federal Acquisition Regulation Supplement (AFFARS) section on procurement integrity states that any individuals requiring access to source-selection information as a result of participating on a source selection or to perform their duties shall sign a Source Selection Non-disclosure Agreement identified in the Air Force mandatory procedure for source selection, and shown in figure 4. [Footnote 47] The Source Selection Non-disclosure Agreement may be used on an annual basis for individuals who must have access to source- selection information in the performance of their official duties throughout the year, whether or not they participate as part of the actual source-selection team. Figure 4: Source Selection Non-disclosure Agreement Used by the Air Force: [Refer to PDF for image: illustration] Source Selection Non-Disclosure Agreement: Name: Grade: Job Title: Organization: Source Selection: (or title of position, if used as an Annual Certificate IAW AFFARS 5303.104-4.) Date: Briefing Acknowledgment: 1. I acknowledge I have been assigned to the source selection (or position) indicated above. I am aware that unauthorized disclosure of source selection or proprietary information could damage the integrity of this procurement and that the transmission or revelation of such information to unauthorized persons could subject me to prosecution under the Procurement Integrity Laws or under other applicable laws. 2. I do solemnly swear or affirm that I will not divulge, publish, or reveal by word, conduct, or any other means, such information or knowledge, except as necessary to do so in the performance of my official duties related to this source selection and in accordance with the laws of the United States, unless specifically authorized in writing in each and every case by a duly authorized representative of the United States Government. I take this obligation freely, without any mental reservation or purpose of evasion and in the absence of duress. 3. I acknowledge that the information I receive will be given only to persons specifically granted access to the source selection information and may not be further divulged without specific prior written approval from an authorized individual. 4. If, at any time during the source selection process, my participation might result in a real, apparent, possible, or potential conflict of interest, I will immediately report the circumstances to the Source Selection Authority. 5. All personnel are requested to check the applicable block: I have submitted a current OGE Form 450 Executive Branch Confidential Financial Disclosure Report, as required by DODD 5500.07 Standards of Conduct. I am not required to submit an OGE Form 450. I have submitted a current SF278 Executive Branch Confidential Financial Disclosure Report, as required by DODD 5500.07 Standards of Conduct. I am not required to submit a Form SF278. Or: I am a non-government employee. I have signed a proprietary information non-disclosure agreement that has been included in the contract between my firm and the government that precludes me from divulging any proprietary data to which I may gain access during the evaluation of proposals. Neither I, nor anyone in my immediate family, have any financial interest in any company involved in this acquisition as either a prime contractor or as a subcontractor. Signature: Date: Debriefing Certificate: I have been debriefed orally by________________ as to my obligation to protect all information to which I have had access during this source selection. I no longer have any material pertinent to this source selection in my possession except material that I have been authorized in writing to retain by the SSA. I will not discuss, communicate, transmit, or release any information orally, in writing, or by any other means to anyone after this date unless specifically authorized to do so by a duly authorized representative of the United States Government. Signature: Date: Source: Air Force. [End of figure] TRICARE Management Activity Confidentiality Agreement (Non-Federal Employee) and Non-disclosure Agreement for Contractor Employees and Subcontractors: Contractor conflict-of-interest-related procedures under the Department of Defense (DOD) TRICARE Management Activity's guidance on preparing nonpurchased care acquisition packages include the application of standard nondisclosure and confidentiality agreements with contractor employees. This guidance states that when evaluating contractor proposals, any contractor employees providing administrative support into the source selection process are required to review, sign, and adhere to a standard confidentiality agreement, shown in figure 5, which outlines their responsibilities. [Refer to PDF for image] [End of figure] Figure 5: Confidentiality Agreement Used by DOD's TRICARE Management Activity for Contractor Employees Providing Administrative Support into the Source-Selection Process: [Refer to PDF for image: illustration] Confidentiality Agreement (Non-Federal Employee)[Footnote 1]: As a non-federal employee with access to information to be used in the evaluation of proposals for (short title of TMA requirement): (hereafter referred to as "proposals") under Solicitation Number: issued by the Contracting Office, I acknowledge that my conduct is governed by the Procurement Integrity Regulations found at 48 CFR or FAR Part 3.104. I also recognize that the Contractor Bid or Proposal Information and Source Selection Information, relative to the TMA Procurements, may be subject to further restrictions under the Trade Secrets Act, 18 U.S.C. 1832, 18 U.S.C.1905 and the Privacy Act, 5 U.S.C. 552a. By executing this Confidentiality Agreement I agree not to disclose any Contractor Bid or Proposal Information or Source Selection Information, relative to the TMA Procurements, outside the federal government. I further agree that I will only disclose, within the federal government, any Contractor Bid or Proposal Information or Source Selection Information, relative to the TMA Procurements, to persons authorized to receive such information, in accordance with applicable agency regulations or procedures. I also agree not to reproduce any Contractor Bid or Proposal Information or Source Selection Information relative to the TMA Procurements, except as authorized by the contracting officer or his or her authorized representative. I also agree that, if I am requested to do so by the contracting officer, or his or her authorized representative, I will promptly return, to the contracting officer, or to his or her authorized representative, all Contractor Bid or Proposal Information or Source Selection Information, relative to the TMA Procurements, that are in my possession. I also will promptly return all copies of those materials that are in my possession. By executing this Confidentiality Agreement I agree that, in the course of performing my duties in the evaluation of proposals under the TMA Procurements, I will not use my position, or any information contained in the Contractor Bid or Proposal Information or Source Selection Information, relative to the TMA Procurements, to further my own private interest, to further my business interest, or to further the private or business interests of another person or entity, whether through advice, recommendation or by knowing of unauthorized disclosure of information contained in the Contractor Bid or Proposal Information or Source Selection Information. I understand the requirements of DoD 5500.7-R, Joint Ethics Regulation, Chapter 5, Conflicts of Interest. To the best of my knowledge, neither I nor any members of my immediate family have a direct or indirect interest in any of the firms submitting a proposal for the consideration of the evaluation panel which conflict substantially, or appear to conflict substantially, with my duties in support thereof. I agree that, if in the course of performing my duties in the evaluation of proposals under the TMA Procurements, I become aware that my continued evaluation of proposals would conflict with my own private interest, my business interest, or the private or business interests of an immediate family member, I will notify the contracting activity immediately in writing and recuse myself from further evaluation of proposals under the TMA Procurements. Further, if I become aware of actions by any other person working with the proposals whose personal conduct may be in violation of the prohibitions in this paragraph or FAR Part 3.104, I will immediately notify the TMA Office of General Counsel in writing of this possibility. By executing this Confidentiality Agreement I recognize that I may also have access to trade secrets, proprietary information, technical data, or computer software submitted by offerors under the TMA Procurements. I agree to abide by any restrictive markings on any such trade secrets, proprietary information, technical data, or computer software. By executing this Confidentiality Agreement I also agree that, if I am requested to do so by the contracting officer, I will execute a separate Use and Non-Disclosure Agreement as prescribed under 48 CFR 227.7103-7 (c). A copy of the Procurement Integrity Regulations found in FAR Part 3.104 has been provided for my review. I have read this Agreement carefully and my questions, if any, have been answered to my satisfaction. Printed name: Signature: Title: Date: Witness Signature: Source: TRICARE Management Activity. Footnote: [1] Executed in accordance with the requirements contained under 48 CFR 15.207(b). [End of figure] In addition, the guidance states that contractors performing many types of contract services are required to execute a standard nondisclosure agreement, shown in figure 6. This includes contractors not involved in acquisition support, when working on an order requiring access to the data, code, or products of another contractor. [Refer to PDF for image] [End of figure] Figure 6: Non-disclosure Agreement for Contractor Employees and Subcontractors Used by DOD's TRICARE Management Activity: [Refer to PDF for image: illustration] Non-Disclosure Agreement For Contractor Employees And Their Subcontractors: I, _______ am an employee of or a subcontractor to ____________ (Company Name), a contractor acting under contract to the __________ (Name of TMA Directorate) under Prime Contract No. ____________ through Delivery Order ________________. I understand that in the performance of this task, I may have access to sensitive or proprietary business, technical, financial, and/or source selection information belonging to the Government or other contractors. Proprietary information includes, but is not limited to, cost/pricing data, Government spend plan data, contractor technical proposal data, independent government cost estimates, negotiation strategies and contractor data presented in negotiations, contracting plans, and statements of work. I agree not to discuss, divulge, or disclose any such information or data to any person or entity except those persons directly concerned with the performance of this delivery order. I have been advised that the unauthorized disclosure, use or negligent handling of the information by me could cause irreparable injury to the owner of the information. The injury could be source sensitive procurement information of the government or proprietary/trade secret information of another company. As used in this agreement, sensitive information is an overarching term that includes, but is not limited to, sensitive but unclassified (SBU) information/data, Protected Health Information (PHI), For Official Use Only (FOUO), and Privacy Information (PI). This includes information in routine DoD payroll, finance, logistics, inventory, and personnel management systems. The loss of, misuse of, or unauthorized access to or modification of this information could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under Section 552a of Title 5, as amended, but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. I attest that I am familiar with, and I will comply with the standards for access, dissemination, handling, and safeguarding of the information to which I am granted access as cited in the Agreement and in accordance with the guidance provided to me relative to the specific category of information. I understand that the United States Government may seek any remedy available to it to enforce this Agreement, including, but not limited to, application for a court order prohibiting disclosure of information in breach of this agreement. Court costs and reasonable attorney fees incurred by the United States Government may be assessed against me if I lose such action. I understand that another company might file a separate claim against me if I have misused its proprietary information. Proprietary information/data will be handled in accordance with Government regulations. This agreement shall continue for a term of three (3) years from the date upon which I last have access to the information there from. Sensitive information/data will be handled in accordance with Government regulations. The Statute of Limitation is indefinite for the unauthorized release of sensitive information. In the event that I seek other employment, I will reveal to any prospective employer the continuing obligation in this agreement prior to accepting any employment offer. The obligations imposed herein do not extend to information/data which: a) is in the public domain at the time of receipt, or it came into the public domain thereafter through no act of mine; b) is disclosed with the prior written approval of the TMA designated Contracting Officer; c) is demonstrated to have been developed by __________(Company Name), or me independently of disclosures made hereunder; d) is disclosed pursuant to court order, after notification to the TMA designated Contracting Officer; e) is disclosed inadvertently despite the exercise of the same reasonable degree of care a party normally uses to protect its own proprietary information. I have read this agreement carefully and my questions, if any, have been answered to my satisfaction. (Printed Name of Employee or Subcontractor): Date: (Signature of Employee or Subcontractor): Organization: (Witness Signature): Date: Source: TRICARE Management Activity. [End of figure] DHS Non-disclosure Agreement: The DHS FAR supplement subpart relating to safeguarding classified and sensitive information within industry requires compliance with the policies and procedures in the agency management directive, which addresses safeguarding sensitive information originated within DHS in all contracts that involve contractor access to facilities, information technology resources, or sensitive information.[Footnote 48] Taken together, DHS's FAR supplement and security management directive require contractors and consultants with access to sensitive information to execute the DHS Form 11000-6, Sensitive But Unclassified Information Non-disclosure Agreement, shown in figure 7. According to the DHS security management directive, individual contractor employee execution of this nondisclosure agreement is a condition of access to such information. Additionally, to safeguard procurement integrity and personal conduct, DHS guidance states that government contractors who provide technical or other support services with respect to DHS source selections must complete this nondisclosure agreement. Figure 7: DHS Form 11000-6, Sensitive But Unclassified Information Non- disclosure Agreement DHS Requires from Contractors and Consultants: [Refer to PDF for image: illustration] Department Of Homeland Security: Non-Disclosure Agreement: I,__________, an individual official, employee, consultant, or subcontractor of or to___________ (the Authorized Entity), intending to be legally bound, hereby consent to the terms in this Agreement in consideration of my being granted conditional access to certain information, specified below, that is owned by, produced by, or in the possession of the United States Government. (Signer will acknowledge the category or categories of information that he or she may have access to, and the signers willingness to comply with the standards for protection by placing his or her initials in front of the applicable category or categories.) Initials: Protected Critical Infrastructure Information (PCII): I attest that I am familiar with, and I will comply with all requirements of the PCII program set out in the Critical Infrastructure Information Act of 2002 (CII Act) (Title II, Subtitle B, of the Homeland Security Act of 2002, Public Law 107-296, 196 Stat. 2135, 6 USC 101 et seq.), as amended, the implementing regulations thereto (6 CFR Part 29), as amended, and the applicable PCII Procedures Manual, as amended, and with any such requirements that may be officially communicated to me by the PCII Program Manager or the PCII Program Managers designee. Initials: Sensitive Security Information (SSI): I attest that I am familiar with, and I will comply with the standards for access, dissemination, handling, and safeguarding of SSI information as cited in this Agreement and in accordance with 49 CFR Part 1520, "Protection of Sensitive Security Information," "Policies and Procedures for Safeguarding and Control of SSI," as amended, and any supplementary guidance issued by an authorized official of the Department of Homeland Security. Initials: Other Sensitive but Unclassified (SBU): As used in this Agreement, sensitive but unclassified information is an over-arching term that covers any information, not otherwise indicated above, which the loss of, misuse of, or unauthorized access to or modification of could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under Section 552a of Title 5, as amended, but which has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy. This includes information categorized by DHS or other government agencies as: For Official Use Only (FOUO); Official Use Only (0U0); Sensitive Homeland Security Information (SHSI); Limited Official Use (LOU); Law Enforcement Sensitive (LES); Safeguarding Information (SGI); Unclassified Controlled Nuclear Information (UCNI); and any other identifier used by other government agencies to categorize information as sensitive but unclassified. I attest that I am familiar with, and I will comply with the standards for access, dissemination, handling, and safeguarding of the information to which I am granted access as cited in this Agreement and in accordance with the guidance provided to me relative to the specific category of information. I understand and agree to the following terms and conditions of my access to the information indicated above: 1. I hereby acknowledge that I have received a security indoctrination concerning the nature and protection of information to which I have been provided conditional access, including the procedures to be followed in ascertaining whether other persons to whom I contemplate disclosing this information have been approved for access to it, and that I understand these procedures. 2. By being granted conditional access to the information indicated above, the United States Government has placed special confidence and trust in me and I am obligated to protect this information from unauthorized disclosure, in accordance with the terms of this Agreement and the laws, regulations, and directives applicable to the specific categories of information to which I am granted access. 3. I attest that I understand my responsibilities and that I am familiar with and will comply with the standards for protecting such information that I may have access to in accordance with the terms of this Agreement and the laws, regulations, and/or directives applicable to the specific categories of information to which I am granted access. I understand that the United States Government may conduct inspections, at any time or place, for the purpose of ensuring compliance with the conditions for access, dissemination, handling and safeguarding information under this Agreement. 4. I will not disclose or release any information provided to me pursuant to this Agreement without proper authority or authorization. Should situations arise that warrant the disclosure or release of such information I will do so only under approved circumstances and in accordance with the laws, regulations, or directives applicable to the specific categories of information. I will honor and comply with any and all dissemination restrictions cited or verbally relayed to me by the proper authority. 5. (a) For PCII - (1) Upon the completion of my engagement as an employee, consultant, or subcontractor under the contract, or the completion of my work on the PCII Program, whichever occurs first, I will surrender promptly to the PCII Program Manager or his designee, or to the appropriate PCII officer, PCII of any type whatsoever that is in my possession. (2) If the Authorized Entity is a United States Government contractor performing services in support of the PCII Program, I will not request, obtain, maintain, or use PCII unless the PCII Program Manager or Program Manager's designee has first made in writing, with respect to the contractor, the certification as provided for in Section 29.8(c) of the implementing regulations to the CII Act, as amended. (b) For SSI and SBU - I hereby agree that material which I have in my possession and containing information covered by this Agreement, will be handled and safeguarded in a manner that affords sufficient protection to prevent the unauthorized disclosure of or inadvertent access to such information, consistent with the laws, regulations, or directives applicable to the specific categories of information. I agree that I shall return all information to which I have had access or which is in my possession 1) upon demand by an authorized individual; and/or 2) upon the conclusion of my duties, association, or support to DHS; and/or 3) upon the determination that my official duties do not require further access to such information. 6. I hereby agree that I will not alter or remove markings, which indicate a category of information or require specific handling instructions, from any material I may come in contact with, in the case of SSI or SBU, unless such alteration or removal is consistent with the requirements set forth in the laws, regulations, or directives applicable to the specific category of information or, in the case of PCII, unless such alteration or removal is authorized by the PCII Program Manager or the PCII Program Manager's designee. I agree that if I use information from a sensitive document or other medium, I will carry forward any markings or other required restrictions to derivative products, and will protect them in the same matter as the original. 7. I hereby agree that I shall promptly report to the appropriate official, in accordance with the guidance issued for the applicable category of information, any loss, theft, misuse, misplacement, unauthorized disclosure, or other security violation, I have knowledge of and whether or not I am personally involved. I also understand that my anonymity will be kept to the extent possible when reporting security violations. 8. If I violate the terms and conditions of this Agreement, such violation may result in the cancellation of my conditional access to the information covered by this Agreement. This may serve as a basis for denying me conditional access to other types of information, to include classified national security information. 9. (a) With respect to SSI and SBU, I hereby assign to the United States Government all royalties, remunerations, and emoluments that have resulted, will result, or may result from any disclosure, publication, or revelation of the information not consistent with the terms of this Agreement. (b) With respect to PCII I hereby assign to the entity owning the PCII and the United States Government, all royalties, remunerations, and emoluments that have resulted, will result, or may result from any disclosure, publication, or revelation of PCII not consistent with the terms of this Agreement. 10. This Agreement is made and intended for the benefit of the United States Government and may be enforced by the United States Government or the Authorized Entity. By granting me conditional access to information in this context, the United States Government and, with respect to PCII, the Authorized Entity, may seek any remedy available to it to enforce this Agreement including, but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement. I understand that if I violate the terms and conditions of this Agreement, I could be subjected to administrative, disciplinary, civil, or criminal action, as appropriate, under the laws, regulations, or directives applicable to the category of information involved and neither the United States Government nor the Authorized Entity have waived any statutory or common law evidentiary privileges or protections that they may assert in any administrative or court proceeding to protect any sensitive information to which I have been given conditional access under the terms of this Agreement. 11. Unless and until I am released in writing by an authorized representative of the Department of Homeland Security (if permissible for the particular category of information), I understand that all conditions and obligations imposed upon me by this Agreement apply during the time that I am granted conditional access, and at all times thereafter. 12. Each provision of this Agreement is severable. If a court should find any provision of this Agreement to be unenforceable, all other provisions shall remain in full force and effect. 13. My execution of this Agreement shall not nullify or affect in any manner any other secrecy or non-disclosure Agreement which I have executed or may execute with the United States Government or any of its departments or agencies. 14. These restrictions are consistent with and do not supersede, conflict with, or otherwise alter the employee obligations, rights, or liabilities created by Executive Order No. 12958, as amended; Section 7211 of Title 5, United States Code (governing disclosures to Congress); Section 1034 of Title 10, United States Code, as amended by the Military Whistleblower Protection Act (governing disclosure to Congress by members of the military); Section 2302(b)(8) of Title 5, United States Code, as amended by the Whistleblower Protection Act (governing disclosures of illegality, waste, fraud, abuse or public health or safety threats): the Intelligence Identities Protection Act of 1982 (50 USC 421 et seq.) (governing disclosures that could expose confidential Government agents); and the statutes which protect against disclosure that may compromise the national security, including Sections 641, 793, 794, 798, and 952 of Title 18, United States Code, and Section 4(b) of the Subversive Activities Act of 1950 (50 USC 783(b)). The definitions, requirements, obligations, rights, sanctions, and liabilities created by said Executive Order and listed statutes are incorporated into this agreement and are controlling. 15. Signing this Agreement does not bar disclosures to Congress or to an authorized official of an executive agency or the Department of Justice that am essential to reporting a substantial violation of law. 16. I represent and warrant that I have the authority to enter into this Agreement. 17. I have read this Agreement carefully and my questions, if any, have been answered. I acknowledge that the briefing officer has made available to me any laws, regulations, or directives referenced in this document so that I may read them at this time, if I so choose. Department Of Homeland Security: Non-Disclosure Agreement: Acknowledgment: Typed/Printed Name: Government/Department/Agency/Business Address: Telephone Number: I make this Agreement in good faith, without mental reservation or purpose of evasion. Signature: Date: Witness: Typed/Printed Name: Government/Department/Agency/Business Address: Telephone Number: Signature: Date: This form is not subject to the requirements of P.L. 104-13, "Paperwork Reduction Act of 1995" 44 USC, Chapter 35. Source: DHS. [End of figure] The Department of the Treasury's (Treasury) reliance on private-sector resources to assist with implementing the Troubled Asset Relief Program (TARP) since its 2008 beginning underscores the importance of addressing conflict-of-interest issues. As we have previously reported, Treasury has strengthened its processes for managing and monitoring conflicts of interest among contractors and financial agents.[Footnote 49] In January 2009, Treasury issued an interim regulation on TARP conflicts of interest, which was effective immediately.[Footnote 50] Among other provisions, the regulation requires a certification, in the form of a nondisclosure agreement, from each retained entity's management official and key individuals performing work under a contract or financial agency agreement stating that he or she will comply with the requirements for confidentiality of nonpublic information before performing work and annually thereafter. An example of a nondisclosure agreement Treasury uses with its TARP contractors is shown in figure 8. Figure 8: Non-disclosure Agreement Used by the Department of the Treasury for TARP Contractor Employees and Management Officials: [Refer to PDF for image: illustration] Non-Disclosure Agreement: Conditional Access to Nonpublic Information: I, __________________employee of ______________ (Organization) hereby consent to the terms in this Agreement in consideration of my being granted conditional access to certain United States Government nonpublic information. I understand and agree to the following terms and conditions: 1. By being granted conditional access to nonpublic information, the _____________(Organization) and the U.S. Department of the Treasury (Treasury) have placed special confidence and trust in me, and I am obligated to protect this information from unauthorized disclosure, according to the terms of this Agreement. 2. Nonpublic information refers to any information provided to me by the Treasury or __________________(Organization) in connection with my authorized services to the Treasury, or that I obtain or develop in providing authorized services to the Treasury, other than information designated as publicly available by the Treasury in writing or that becomes publicly available from a source other than the Financial Agent. Nonpublic information includes but is not limited to information about the Treasury's business, economic, and policy plans, financial information, trade secrets, information subject to the Privacy Act, personally identifiable information (PII) , and sensitive but unclassified (SBU) information. 3. PII includes, but is not limited to, information pertaining to an individual's education, bank accounts, financial transactions, medical history, and criminal or employment history and other information which can be used to distinguish or trace an individual's identity, such as their name, social security number, date and place of birth, mother's maiden name, biometric records, etc., including any other personal information which is linked or linkable to an individual. This definition includes information that the loss, misuse, or unauthorized access to or modification of could adversely affect the privacy that individuals are entitled to under the Privacy Act. 4. SBU information is any information where the loss, misuse, or unauthorized access to or modification of could adversely affect the national interest or the conduct of Federal programs. This definition includes trade secret or other information protected under the Trade Secrets Act, and may include other information designated by the Treasury or as defined by other Federal Government sources. 5. I am being granted conditional access to nonpublic information, contingent upon my execution of this Agreement, to provide authorized services to the Treasury. 6. Except as set forth in paragraph 14 below, 1 shall never divulge any nonpublic information provided to me pursuant to this Agreement to anyone, unless I have been advised in writing by the ____________ (Organization) and/or the Treasury that an individual is authorized to receive it. 7. I will submit to the Treasury for security review, prior to any submission for publication, any book, article, column or other written work for general publication that is based upon any knowledge I obtain during the course of my work in connection with the Treasury. I hereby assign to the Federal Government all rights, royalties, remunerations and emoluments that have resulted or will result or may result from any disclosure, publication, or revelation of nonpublic information not consistent with the terms of this Agreement. 8. If I violate the terms and conditions of this Agreement, I understand that the unauthorized disclosure of nonpublic information could compromise the security of individuals, the _______________ (Organization) and the Treasury. 9. If I violate the terms and conditions of this Agreement, such violation may result in the cancellation of my conditional access to nonpublic information. Further, violation of the terms and conditions of this Agreement may result in the_______________(Organization) and/or the United States taking administrative, civil or any other appropriate relief. 10. I understand that the willful disclosure of information to which I have agreed herein not to divulge may also constitute a criminal offense. 11. Unless I am provided a written release by the Treasury from this Agreement, or any portions of it, all conditions and obligations contained in this Agreement apply both during my period of conditional access, and at which time and after my affiliation and/or employment with the _________________(Organization) ends. 12. Each provision of this Agreement is severable. If a court should find any provision of this Agreement to be unenforceable, all other provisions shall remain in full force and effect. 13. I understand that the Treasury may seek any remedy available to it to enforce this Agreement, including, but not limited to, application for a court order prohibiting disclosure of information in breach of this Agreement. 14. I understand that if I am under U.S. Congressional or judicial subpoena, I may be required by law to release information, and that pursuant to 31 CFR Part 31, I shall provide prior notice to Treasury of any such disclosure or release. I make this Agreement in good faith, without mental reservation or purpose of evasion. Signature: Date: Source: Treasury. [End of figure] Figure 30: (Continued): [Refer to PDF for image] [End of figure] [End of section] Appendix V: Recent FAR Changes to Add Guidance and Contract Provisions for Information Technology (IT) Security: Between 2005 and 2007, contractor information-security and personnel- security requirements in the Federal Acquisition Regulation (FAR) were revised to assist agencies in reducing identified risks from contractors' access to sensitive federal facilities and information technology (IT) systems. Federal Information-Security Oversight of Contractor IT Operations: Our April 2005 report concerning the federal government's extensive reliance on contractors to provide IT systems and services found that without appropriate policies and guidance on how to develop effective information-security oversight of contractors, agencies may not develop sufficient policies to address the range of risks posed by contractors, and that as a result, federal information and operations can be placed at undue risk.[Footnote 51] Since FAR Council efforts to update the FAR provisions had stretched over 3 years, we recommended expeditious completion to ensure that agencies develop appropriate information-security oversight capabilities. Five months later, in September 2005, an interim rule amending the FAR was published.[Footnote 52] In implementing the IT security provisions of the Federal Information Security Management Act of 2002 (FISMA), the FAR Council stated that the interim rule change was necessary to ensure the government was not exposed to inappropriate and unknown risk. Unauthorized disclosure, theft, or denial of IT resources had the potential to disrupt agency operations and could have financial, legal, human safety, personal privacy, and public confidence effects, according to the FAR Council. Adding specific FISMA-related provisions was intended to provide clear, consistent guidance to acquisition officials and program managers, and to encourage and strengthen communication with IT security officials, chief information officers, and other affected parties. Among other changes this rule amended the FAR by: * adding a definition for the term "Information Security" to FAR Subpart 2.1, as shown in the text box below; * incorporating IT security requirements in acquisition planning and when describing agency needs; and: * revising the policy in FAR Subpart 39.101 for IT acquisitions to require including the appropriate agency security policy and requirements. FAR Subpart 2.1 Definition of Information Security Added in 2005: Information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide: 1. Integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; 2. Confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and; 3. Availability, which means ensuring timely and reliable access to, and use of, information. Source: 70 Fed. Reg. 57449-52 (Sept. 30, 2005). Personal Identity Verification of Contractor Personnel: In 2007 the FAR was amended to add personnel-security requirements, in recognition that contractors increasingly are required to have physical access to federally controlled facilities and information systems in the performance of government contracts and the President's issuance of Homeland Security Presidential Directive 12 (HSPD-12). Specifically, the FAR was amended to require agencies to include a standard clause in their solicitations and contracts when contractor performance requires recurring access to government facilities and systems. This clause states that the contractors shall comply with agency personal identity verification procedures for issuance of identification cards.[Footnote 53] This action to unify FAR guidance has assisted agencies in implementing HSPD-12, requiring the establishment of a governmentwide standard for secure and reliable forms of identification cards for federal employees and contractors alike. For example, updates issued since 2007 to some agency FAR supplements have added agency-specific HSPD-12 policies, procedures, contract clauses, and solicitation provisions for contractor employees requiring routine access to their facilities and sensitive information stored in agency networks.[Footnote 54] Implementing HSPD-12 requirements through contract provisions helps address the risks of contractors gaining unauthorized physical or electronic access to federal information or contractors using outmoded identification cards that can be easily forged, stolen, or altered to allow unauthorized access. In 2009 the FAR Council opened a FAR case in recognition of the need for return of the physical identification cards issued to contractors.[Footnote 55] According to the FAR Council, our review of contractor employees' access to sensitive information reinforced the need to resolve this shortcoming in FAR guidance. [End of section] Appendix VI: Comments from the Department of Homeland Security: Note: Page numbers in the draft report may differ from those in this report. U.S. Department of Homeland Security: Washington, DC 20528: September 1, 2010: Mr. John Needham: Director, Acquisition and Sourcing Management: Government Accountability Office: Washington, DC 20548: Dear Mr. Needham: Thank you for the opportunity to comment on the draft report GAO-10- 693 "Contractor Integrity: Stronger Safeguards Needed for Contractor Access to Sensitive Information." While DHS generally concurs with the contents of the GAO draft report, we take exception to Table 3 on Page 16 of the draft report and one comment on Page 17 of that report. As noted in the draft report, GAO analyzed a total of 42 contracts government-wide, including 14 DHS contracts. The GAO report asserts that three of these 14 DHS contracts lacked the necessary safeguards (per Table 3 of the draft report). The DHS Office of the Chief Procurement Officer (OCPO) believes that one of these three DHS contract actions contains adequate safeguards. Specific details for this contract action are provided below: * RSHQDC-06-J-00191, Systems Research and Applications Corp. (SRA), executed on July 3, 2006, is for support services for planning, implementing, and monitoring privacy regulations and guidelines. While the task order does not contain HSAR 3052.204-71, it does effectively contain the same language as HSAR 3052.204-71. The contract includes the following four requirements: - "(c) Contractor employees working on this contract must complete such forms as may be necessary for security or other reasons, including the conduct of background investigations to determine suitability." - "(d) The Contracting Officer may require the contractor to prohibit individuals from working on the contract if the government deems their initial or continued employment contrary to the public interest for any reason..." - "(e) ... the Contractor shall not disclose, orally or in writing, any sensitive information to any person unless authorized in writing by the Contracting Officer. For those contractor employees authorized access to sensitive information, the contractor shall ensure that these persons receive training concerning the protection and disclosure of sensitive information both during and after contract performance." - "(f) The Contractor shall include the substance of this clause in all subcontracts at any tier where the subcontractor may have access to Government facilities, sensitive information, or resources." (paragraphs (a) and (b) consist of definitions) The following identifies language in the section of the task order titled "Security Requirements" that is comparable to the four requirements in HSAR 3052.204-71 ("Security Requirements" are on pages 5-10 of the statement of work (SOW) — the task order pages are unnumbered): - Comparable to HSAR 3052.209-71(c): "Contract employees (to include applicants, temporaries, part-time and replacement employees) under the contract, needing access to sensitive information, shall undergo a position sensitivity analysis based on the duties each individual will perform on the contract. The results of the position sensitivity analysis shall identify the appropriate background investigation to be conducted. All background investigations will be processed through the Security Office. Prospective Contractor employees shall submit the following completed forms to the Security Office through the COTR no more than two (2) weeks after, whether a replacement, addition, subcontractor employee, or vendor: 1. Standard Form 85P, 'Questionnaire for Public Trust Positions.' 2. FD Form 258, 'Fingerprint Card' (2 copies). 3. Conditional Access to Sensitive But Unclassified Information Non- Disclosure Agreement. 4. Disclosure and Authorization Pertaining to Consumer Reports Pursuant to the Fair Credit Reporting Act" (page 7 of the SOW). - Comparable to HSAR 3052 204-71(d): "DHS reserves the right and prerogative to deny and/or restrict the facility and information access of any Contractor employee whom DHS determines to present a risk of compromising sensitive Government information to which he or she would have access under this contract." (page 6 of the SOW). - Comparable to HSAR 3052.204-711d. Several portions of the SOW address disclosure and training: 1. The requirement in HSAR 3052.204-71(c) that contractor and subcontractor employees complete the "Conditional Access to Sensitive But Unclassified Information Non-Disclosure Agreement" (see above) 2. "When sensitive government information is processed on Department telecommunications and automated information systems, the Contractor agrees to provide for the administrative control of sensitive data being processed and to adhere to the procedures governing such data as outlined in OHS IT Security Program Publication DHS MD 4300.1" (page 9 of the SOW, under "Information Technology Security Clearance"). 3. "Contractors, who are involved in management, use, or operation of any IT systems that handle sensitive information within or under the supervision of the Department, shall receive periodic training at least annually in security awareness and accepted security practices and systems rules of behavior. Department contractors, with significant security operations, shall receive specialized training specific to their security responsibilities annually" (page 9 of the SOW, under "Information Technology Security Training and Oversight"). - Comparable to HSAR 3052104-71(1): Several portions of the SOW address the flow-down of requirements to subcontractors: 1. Page 7 of the SOW requires each subcontractor employee to submit four forms (see above). 2. "Some material will contain proprietary, sensitive, or classified data from various public or private sources. The contractor shall require all subcontractors to sign corporate and individual non- disclosure agreements" (page 10 of the SOW, under "Other Pertinent Information or Special Considerations"). 3. "The Contractor shall ensure that each of its employees, consultants, and subcontractors who work on the PCII [Protected Critical Infrastructure Information] Program have executed Non- Disclosure Agreements (NDAs) in a form prescribed by the PCII Program Manager. The Contractor shall ensure that each of its employees, consultants and subcontractors has executed a NDA and agrees that none of its employees, consultants or subcontractors will be given access to Protected C11 without having previously executed a NDA" (page 10 of the SOW, under "Non-Disclosure of Protected Critical Infrastructure Information"). Therefore, DHS OCPO believes that although HSHQDC-06-J-00191 does not contain HSAR 3052.204-71, it dots contain comparable and adequate language. In addition, on Page 17, the second sentence of the first complete paragraph states that: "For example, three DHS task orders of the 14 contract actions reviewed did not include the contract clause required when contractors need recurring access to government facilities or sensitive information." In accordance with the DHS OCPO comments provided above regarding page 16, table 3, we believe that the SRA task order, which is included as one of the three DHS task orders noted as deficient within this sentence, actually does contain adequate contract language with respect to contractor access to sensitive information. Thank you again for the opportunity to provide comments on he draft report. Sincerely, Signed by: Jerald E. Levine: Director: Departmental GAO/OIG Liaison Office: [End of section] Appendix VII: GAO Contact and Staff Acknowledgments: GAO Contact: John K. Needham, (202) 512-4841 or needhamjk1@gao.gov: Staff Acknowledgments: In addition to the contact named above, Carolyn Kirby, Assistant Director; Jennifer Dougherty; Guisseli Reyes-Turnell; Greg Campbell; Vijay D'Souza; Claudia Dickey; Ralph Roffo; Tina Shepper Ryen; Alyssa Weir; and Bill Woods made key contributions to this report. [End of section] Footnotes: [1] In fiscal year 2009 alone, federal agencies obligated $332 billion for contracted services, such as support for acquisition management, program management, and quality assurance, which together accounted for approximately 61 percent of total fiscal year 2009 procurement dollars. [2] Office of Management and Budget Memorandum, Managing the Multi- Sector Workforce, M-09-26 (July 29, 2009). As used in this report, "multisector workforce" includes the nongovernment contractor employees (and subcontractors to prime contractors) working in various agency offices with government employees. This can include situations in which the contractor personnel may be physically separated from government personnel at the agency worksite, but working in close proximity at adjacent locations to enable routine access to agency offices, officials, and information. [3] FAR Subparts 1.1 and 1.3. The FAR and agency supplements are codified in title 48 of the Code of Federal Regulations. [4] Report of the Acquisition Advisory Panel to the Office of Federal Procurement Policy and the United States Congress (January 2007). The Services Acquisition Reform Act of 2003, Pub. L. No. 108-136, § 1423 (2003) established an Acquisition Advisory Panel to make recommendations for improving acquisition practices. [5] GAO, Federal Acquisition: Oversight Plan Needed to Help Implement Acquisition Advisory Panel Recommendations, [hyperlink, http://www.gao.gov/products/GAO-08-160] (Washington, D.C.: Dec. 20, 2007). [6] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: November 1999). For example, the internal control standards call for restrictions on access to and accountability for resources and records, so that management assigns and maintains accountability. [7] For purposes of this report, we define a contract action as a contract or task order, or both, and blanket purchase agreement (BPA) and its associated orders. The FAR defines a task order as an order for services placed against an established contract or with government sources. FAR Section 2.101. The FAR allows agencies to establish BPAs under the General Services Administration's schedules program, where contracts are awarded to multiple vendors for commercial goods and services and made available for agency use. FAR Subsection 8.405-3. BPAs are agreements between agencies and vendors with terms in place for future use; funds are obligated when orders are placed. [8] The FAR Council--whose members include the DOD Director of Defense Procurement and Acquisition Policy, the National Aeronautics and Space Administration Associate Administrator for Procurement, and the General Services Administration Chief Acquisition Officer--oversees development and maintenance of the FAR. The Administrator of OFPP in OMB serves as chair of the FAR Council, which meets quarterly to discuss and resolve significant or controversial FAR changes. Proposed and final revisions to the FAR are published in the Federal Register. [9] For the purposes of this report, we use the definition of confidentiality provided in the Federal Information Security Management Act of 2002, Pub. L. No. 107-296, § 1001 (44 U.S.C. § 3532). The act states that confidentiality means preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. [10] The Privacy Act of 1974 (Privacy Act), Pub. L. No. 93-579 (codified at 5 U.S.C. § 552a) regulates the federal government's use of personal information by placing limitations on agencies' collection, disclosure, and use of personal information in systems of records. The Health Insurance Portability and Accountability Act of 1996, Pub. L. No. 104-191(HIPAA) among other things, addresses the personal and medical privacy of individuals. Issued under HIPAA, the federal Privacy Rule provided individuals with new protections regarding the confidentiality of their health information and established new responsibilities for health care providers, health plans, and other entities, including the federal government, to protect such information. [11] See Executive Order 13526, Classified National Security Information (Dec. 29, 2009). Among other provisions, the executive order prescribes the categories of information that warrant classification and prescribes standards for safeguarding classified materials. [12] 5 U.S.C. § 552. See GAO, Freedom of Information Act: Requirements and Implementation Continue to Evolve, GAO-10-537T (Washington, D.C.: Mar. 18, 2010). [13] See [hyperlink, http://www.gao.gov/products/GAO-10-537T], which provides the complete list of the nine categories of information that are exempt from disclosure under FOIA, in attachment 1. In denying access to material, agencies may cite these exemptions. The act requires agencies to notify requesters of the reasons for any adverse determination (that is, a determination not to provide records) and grants requesters the right to appeal agency decisions to deny access. [14] 18 U.S.C. § 1905 (disclosure of confidential information generally) and 18 U.S.C. § 208 (acts affecting a personal financial interest). [15] Our review included contracts, task orders, and BPAs and their associated orders. We reviewed one BPA that did not include provisions that fully safeguarded against unauthorized contractor disclosure and inappropriate use of sensitive information; however, we did not review any orders off this agreement, and these may have contained additional clauses to protect sensitive data. [16] Agencies are authorized to issue regulations that implement or supplement the FAR and incorporate agency policies, procedures, contract clauses, solicitation provisions, and forms that govern the contracting process or otherwise control the relationship between the agency and contractors or prospective contractors. FAR Subpart 1.3. [17] Defense Federal Acquisition Regulation Supplement (DFARS) Subpart 224.1, Protection of Individual Privacy. [18] Department of Health and Human Services Acquisition Regulation (HHSAR), Subpart 324.1, Protection of Individual Privacy. [19] Under incident reporting procedures contained in a DHS security management directive, with which the Department of Homeland Security Acquisition Regulation (HSAR) states compliance is required in all contracts that require access to sensitive information, DHS employees or employees of contractors who observe or become aware of the loss, compromise, suspected compromise, or unauthorized disclosure of "for official use only" (FOUO) information (a type of sensitive information) are required to report it immediately, but not later than the next duty day, to the originator and the local security official. Other than this requirement, the DHS directive does not establish other contractor responsibilities, such as prompt notification to the contracting officer. [20] DFARS 204.4, Safeguarding Classified Information Within Industry. In March 2010, an advance notice of proposed rulemaking was published in the Federal Register. These proposed changes would add a new subpart and associated contract clauses to DFARS for the safeguarding, proper handling, and cyber intrusion reporting of unclassified DOD information resident or transiting on contractor IT systems. 75 Fed. Reg. 9563 (Mar. 3, 2010). The proposed changes do not address safeguards for contractor employee access to sensitive information in DOD's IT systems. A revised draft proposed rule is planned for September 2010. [21] HHS revised its FAR supplement effective January 2010 to reflect statutory, FAR, and governmentwide and HHS policy changes since the last revision in December 2006. Final Rule, Health and Human Services Acquisition Regulation (HHSAR), 74 Fed. Reg. 62396-472 (Nov. 27, 2009). [22] HHSAR 324.70--Confidentiality of Information (Dec. 20, 2006). This clause related to confidential information, which was defined as (1) information or data of a personal nature about an individual or (2) proprietary information or data submitted by or pertaining to an institution or organization. [23] The pending changes referred to by the official are included in FAR Case No. 2007-019, Contractor Access to Non-Public Information. [24] According to DOD's privacy incident report, the information that was breached was from a single contractor-owned server in Florida used to hold and transfer data between individuals in different locations to perform contract services. Potentially compromised files included sensitive personal information such as name, social security number, address, date of birth, medical record number, insurance information, and information related to medical appointments and delivery of health care services. [25] Centers for Medicare and Medicaid Services (CMS), Acquisition Policy & Procedure Notice 12, Privacy Rule HIPAA Business Associate Contract Provision II (Baltimore, Md.: Apr. 21, 2005). [26] We did not consider the absence of such contract provisions as a deficiency unless they were also required by agency policy or the FAR. [27] HSAR 3052.204-71. [28] In May 2010, DHS notified the heads of its contracting activities to caution their acquisition personnel to use only the official agency nondisclosure agreement, DHS Form 11000-6, from the agency's internal forms Web site. DHS took this action after we alerted them that case study contracts we had reviewed were using an unauthorized variation of the form that was missing date blocks for both the agreement signatory and witness. According to DHS, any agreement that lacks signature dates is incomplete and provides inadequate protection to the signatories since there is no record of when the agreement takes effect. The May 2010 updates to agency guidance and electronic contract writing system require contracting personnel to use the forms Web site to access DHS Form 11000-6. [29] Air Force informational guidance on the use of such third-party "associate contractor agreements" suggests standard contract provisions requiring the contractor to provide the contracting officer a copy of the document for review before execution by the cooperating contractors. [30] We have reported extensively on Treasury's management and oversight of contractors and financial agents to support TARP. For more information, see GAO, Troubled Asset Relief Program: One Year Later, Actions Are Needed to Address Remaining Transparency and Accountability Challenges, [hyperlink, http://www.gao.gov/products/GAO-10-16] (Washington, D.C.: Oct. 8, 2009). [31] An example of Treasury's nondisclosure agreement used for TARP support contractors is included in appendix IV. [32] The FAR contains the rules, standards, and requirements for the award, administration, and termination of government contracts. [33] FAR Subpart 7.1. [34] An organizational conflict of interest may result when factors create an actual or potential conflict of interest on an instant contract, or when the nature of the work to be performed on the contract creates an actual or potential conflict of interest on a future acquisition. For example, these conflicts may arise in situations in which a current or prospective contractor or subcontractor will have access to, or had access to, nonpublic information that may provide an unfair competitive advantage in a future acquisition. [35] Final Rule, FAR Case 2005-017, Requirement to Purchase Approved Authentication Products and Services, amended FAR Subpart 4.13 and 52.204-9. 72 Fed. Reg. 46333-35 (Aug. 17, 2007). [36] Interim Rule, FAR Case 2004-018, Information Technology Security, 70 Fed. Reg. 57449-52, (Sept. 30, 2005). A year later, after consideration of public comments, the interim rule was adopted without change. [37] GAO, Privacy: Lessons Learned about Data Breach Notification, [hyperlink, http://www.gao.gov/products/GAO-07-657] (Washington, D.C.: Apr. 30, 2007). The loss of personally identifiable information, such as an individual's Social Security number, name, and date of birth can result in serious harm, including identity theft. Identity theft occurs when such information is used without authorization to commit fraud or other crimes. [38] GAO, Defense Contracting: Additional Personal Conflict of Interest Safeguards Needed for Certain DOD Contractor Employees, [hyperlink, http://www.gao.gov/products/GAO-08-169] (Washington, D.C.: Mar. 7, 2008). A proposed FAR rule would define "personal conflict of interest" as a situation in which a contractor employee has a financial interest, personal activity, or relationship that could impair the employee's ability to act impartially and in the best interest of the government when performing under the contract. [39] Duncan Hunter National Defense Authorization Act for Fiscal Year 2009, Pub. L. No. 110-417, § 841 (2008). In addition, section 841 requires that the Administrator of OFPP develop FAR policies and clauses effective no later than August 10, 2009, for inclusion in solicitations, contracts, task orders, and delivery orders to prevent personal conflicts of interest by contractor employees performing acquisition functions closely associated with inherently governmental functions. [40] Pending FAR cases may result in requirements for prompt notification of unauthorized disclosure or misuse, but will not necessarily apply to all types of sensitive information. [41] [hyperlink, http://www.gao.gov/products/GAO/AIMD-00-21.3.1] (Washington, D.C.: November 1999). [42] GAO, Information Sharing: The Federal Government Needs to Establish Policies and Processes for Sharing Terrorism-Related and Sensitive but Unclassified Information, [hyperlink, http://www.gao.gov/products/GAO-06-385] (Washington, D.C.: Mar. 17, 2006). [43] Since 2005, the issue of establishing effective mechanisms for sharing terrorism-related information to protect the homeland has been on GAO's high-risk list of federal functions needing broad-based transformation. Since then, we have monitored the government's progress in resolving barriers to sharing. See GAO, Information Sharing: Definition of the Results to Be Achieved in Terrorism-Related Information Sharing Is Needed to Guide Implementation and Assess Progress, [hyperlink, http://www.gao.gov/products/GAO-08-637T] (Washington, D.C.: July 23, 2008). [44] See Presidential Memorandum, Memorandum for the Heads of Executive Departments and Agencies: Designation and Sharing Controlled Unclassified Information (May 9, 2008). [45] Report and Recommendations of the Presidential Task Force on Controlled Unclassified Information (Aug. 25, 2009). The president's memorandum of May 27, 2009, on Classified Information and Controlled Unclassified Information directed the task force, led by the Secretary of Homeland Security and the Attorney General, to review the controlled unclassified information framework established in 2008 for the management of sensitive but unclassified terrorism-related information. [46] HHS, Final Rule, Health and Human Services Acquisition Regulation, 74 Fed. Reg. 62396-472 (Nov. 26, 2009). [47] AFFARS Section 5303.104. [48] The Department of Homeland Security Acquisition Regulation (HSAR) Subpart 3004.470, Safeguarding Classified and Sensitive Information within Industry and DHS Management Directive System, Safeguarding Sensitive But Unclassified (For Official Use Only) Information, Management Directive (MD) No. 11042.1 (Washington, D.C.: Jan. 6, 2005). [49] GAO, Troubled Asset Relief Program: One Year Later, Actions Are Needed to Address Remaining Transparency and Accountability Challenges, [hyperlink, http://www.gao.gov/products/GAO-10-16] (Washington, D.C.: Oct. 8, 2009). [50] TARP Conflicts of Interest, 74 Fed. Reg. 3431-3436 (Jan. 21, 2009) (codified at 31 C.F.R. Part 31). [51] GAO, Information Security: Improving Oversight of Access to Federal Systems and Data by Contractors Can Reduce Risk, [hyperlink, http://www.gao.gov/products/GAO-05-362] (Washington, D.C.: Apr. 22, 2005). The IT systems and services provided by contractors include computer and telecommunication systems and services, as well as the testing, quality control, installation, and operation of computer equipment. Additionally, contractors provide services and systems on behalf of agencies at contractor facilities or to an agency via remote access. We found that the methods that agencies were using to ensure information security oversight of contractor operations had limitations and needed strengthening. For example, most agencies had not incorporated the Federal Information Security Management Act of 2002 (FISMA) requirements, such as annual testing of controls, into their contract language. Few agencies had established specific information-security oversight policies for contractor IT operations. [52] Interim Rule, FAR Case 2004-018, Information Technology Security, 70 Fed. Reg. 57449-52, (Sept. 30, 2005). A year later, after consideration of public comments, the interim rule was adopted without change. [53] Final Rule, FAR Case 2005-017, Requirement to Purchase Approved Authentication Products and Services, amended FAR Subpart 4.13 and 52.204-9. 72 Fed. Reg. 46333-35 (Aug. 17, 2007). [54] For example, effective January 26, 2010, the Department of Health and Human Services (HHS) revised its FAR supplement to reflect FAR policy and other changes since the last update in December 2006. A new Subpart 304.13, Personal Identity Verification, was added with new policy to implement HSPD-12 in HHS. The HHS implementation includes applicable solicitation provisions and contract clauses to provide a consistent and systematic approach to ensure the security of HHS facilities and information systems. 74 Fed. Reg. 62396-97 (Nov. 27, 2009). [55] FAR case number 2009-027--Personal Identity Verification of Contractor Personnel. The proposed rule for this case was published in the Federal Register for public comment. 75 Fed. Reg. 28771 (May 24, 2010). The proposed rule seeks to provide additional regulatory coverage in FAR Subpart 4.13 and clause 52.204-9 to reinforce the requirement of collecting from contractors all forms of government- provided identification once they are no longer needed to support a contract. Public comments were due July 23, 2010. [56] HHS, Final Rule, Health and Human Services Acquisition Regulation, 74 Fed. Reg. 62396472 (Nov. 26, 2009). [End of section] GAO's Mission: The Government Accountability Office, the audit, evaluation and investigative arm of Congress, exists to support Congress in meeting its constitutional responsibilities and to help improve the performance and accountability of the federal government for the American people. GAO examines the use of public funds; evaluates federal programs and policies; and provides analyses, recommendations, and other assistance to help Congress make informed oversight, policy, and funding decisions. GAO's commitment to good government is reflected in its core values of accountability, integrity, and reliability. Obtaining Copies of GAO Reports and Testimony: The fastest and easiest way to obtain copies of GAO documents at no cost is through GAO's Web site [hyperlink, http://www.gao.gov]. Each weekday, GAO posts newly released reports, testimony, and correspondence on its Web site. To have GAO e-mail you a list of newly posted products every afternoon, go to [hyperlink, http://www.gao.gov] and select "E-mail Updates." Order by Phone: The price of each GAO publication reflects GAO’s actual cost of production and distribution and depends on the number of pages in the publication and whether the publication is printed in color or black and white. Pricing and ordering information is posted on GAO’s Web site, [hyperlink, http://www.gao.gov/ordering.htm]. Place orders by calling (202) 512-6000, toll free (866) 801-7077, or TDD (202) 512-2537. Orders may be paid for using American Express, Discover Card, MasterCard, Visa, check, or money order. Call for additional information. To Report Fraud, Waste, and Abuse in Federal Programs: Contact: Web site: [hyperlink, http://www.gao.gov/fraudnet/fraudnet.htm]: E-mail: fraudnet@gao.gov: Automated answering system: (800) 424-5454 or (202) 512-7470: Congressional Relations: Ralph Dawn, Managing Director, dawnr@gao.gov: (202) 512-4400: U.S. Government Accountability Office: 441 G Street NW, Room 7125: Washington, D.C. 20548: Public Affairs: Chuck Young, Managing Director, youngc1@gao.gov: (202) 512-4800: U.S. Government Accountability Office: 441 G Street NW, Room 7149: Washington, D.C. 20548: