Bd. Min. 6-27-24.
- Statement of Purpose
- This rule addresses The Curators of the University of èapp (a.k.a., the University of èapp System (èappSystem)) compliance with U.S. industrial security policy, including applicable federal statutes, Executive Orders (E.O.), Code of Federal Regulations (CFR), Department of Defense Instructions (DoDI), and other applicable authorities. èappSystem is committed to compliance for the protection of classified information disclosed to or developed by contractors of the U.S. Government (USG), employed or the responsibility of èappSystem (contractors).
- This rule will be applied to achieve compliance with applicable federal authorities, including:
- E.O. 12829, National Industrial Security Program
- E.O. 10865, Safeguarding Classified Information within Industry
- 32 CFR Part 2004, National Industrial Security Program
- DoDI 5220.22, National Industrial Security Program
- 32 CFR Part 117, National Industrial Security Program Operating Manual (NISPOM)
- This rule implements policy, assigns responsibilities, and establishes requirements for the protection of classified information disclosed to, or developed by contractors across the èappSystem.
- Scope and Compliance Policy
- This rule applies to all cleared facilities (i.e., Facility Clearances or FCLs) within the èappSystem holding a FCL, to all personnel whose personnel security clearances are held by a èappSystem or subsidiary FCL, and to all personnel who hold roles related to ensuring compliance with the authorities outlined in subsection A.2 (e.g., Key Management Personnel or KMPs).
- The èappSystem is the “corporate family” for all classified work taking place at any FCL within the System. Individual universities may have subsidiary Facility Clearances under the èappSystem Facility Clearance if they have federal authorization to hold classified materials on-site, a secondary place-of-performance, or flow down to a sub-tier contractor.
- The èappSystem shall implement a corporate-wide Insider Threat Program to address insider threats throughout the èappSystem.
- The President will appoint the following personnel to oversee and implement the èappSystem industrial security program (ISP) (System ISP):
- Senior Management Official (SMO)
- Insider Threat Program Senior Management Official (ITPSO)
- Facility Security Officer (FSO)
- The personnel identified in subsection B.4 must:
- Oversee the implementation of the requirements of the NISPOM;
- Undergo the same security training that is required of all contractors, in addition to any position specific training;
- Be designated in writing; and
- Undergo a personnel security investigation and national security eligibility determination for access to classified information at the level of the entity’s eligibility determination for access to classified information.
- SMO: The President of the èappSystem is the SMO for the èappSystem FCL and for all subsidiary FCLs held by an individual university within the èappSystem. The SMO will:
- Ensure a system of security controls in accordance with the NISPOM;
- Appoint an èappSystem ITPSO and FSO in writing;
- Remain fully informed of the èappSystem ISP classified operations;
- Make decisions based on the threat reporting and information and the potential impacts to the èappSystem ISP; and
- Retain accountability for the management and operations of the System’s ISP without delegating that accountability.
- ITPSO: The Director, Research Security and Compliance is the ITPSO and will be designated in writing by the SMO. The ITPSO will:
- Ensure the FSO(s) is part of the insider threat program;
- Complete training in accordance with the NISPOM; and
- Develop an insider threat program that meets the requirements of the NISPOM.
- FSO: An FSO will be appointed in writing by the SMO for any University with an active FCL. Each FSO will:
- Supervise and direct security measures necessary for implementing the NISPOM to ensure the protection of classified information.
- Complete security training as deemed appropriate by the Cognizant Security Agency (CSA) who accredits the FCL. Both direct and reciprocity CSAs training must be met.
- Appoint an Information System Security Manager (ISSM) if classified information will be processed on an information system at a University with an FCL.
- ISSM: If classified information will be processed on an information system at a University with an FCL, the FSO will appoint an ISSM. Each ISSM will:
- Be adequately trained and possess the technical competence required to operate, maintain, and secure the contractor’s classified information system; and
- Oversee development, implementation, and evaluation of the University's classified information system program.
- University of èapp Research Security and Compliance Team
- èappResearch Security and Compliance Team
Each FCL within the èappSystem will have an appointed FSO who reports to the èappSystem Director of Research Security and Compliance. Each FSO shall be a member of the University of èapp Research Security and Compliance Team (“èappRSC Team”). - Collaboration
Recognizing both the necessity and administrative efficiencies gained, the èappRSC Team shall work in collaboration with each other and with those also holding responsibilities for compliance with the authorities outlined in subsection A.2. to ensure that no single point of failure exists within the System. - Accountability and Alignment
To ensure the accountability and alignment of the èappRSC Team, the Chancellors shall designate a Vice Chancellor to the èappSystem Director for Research Security and Compliance, who will jointly approve the following as it relates to the FSO at each institution:
- Recruitment and hiring decisions;
- Disciplinary and termination decisions; and,
- Annual performance evaluations and compensation decisions.
- èappResearch Security and Compliance Team
- Strategies
- The FSO(s) will develop the industrial security strategies for the èappSystem to establish, document, and implement processes and procedures to ensure the System remains in compliance with the authorities outlined in subsection A.2. These strategies will be brought before the èappRSC Team for approval before implementation.
- A Standard Practice Procedures (SPP) will be developed by èappRSC Team and maintained. This SPP will document the current processes and procedures used across the System. The SPP will contain information describing acceptable structures for the Security Executive Committee (SEC).
- University-specific appendices will be maintained within the SPP as needed.
- At least once annually, the Board of Curators will review and ratify a Security Resolution outlining the members of the SEC and those who are excluded from the SEC in alignment with the structure outlined in the SPP.
- Implementation
The èappRSC Team is responsible for the implementation of the industrial security program for the èappSystem.