- Y Diweddaraf sydd Ar Gael (Diwygiedig)
- Gwreiddiol (Fel y’i mabwysiadwyd gan yr UE)
Pan adawodd y DU yr UE, cyhoeddodd legislation.gov.uk ddeddfwriaeth yr UE a gyhoeddwyd gan yr UE hyd at ddiwrnod cwblhau’r cyfnod gweithredu (31 Rhagfyr 2020 11.00 p.m.). Ar legislation.gov.uk, mae'r eitemau hyn o ddeddfwriaeth yn cael eu diweddaru'n gyson ag unrhyw ddiwygiadau a wnaed gan y DU ers hynny.
Mae legislation.gov.uk yn cyhoeddi fersiwn y DU. Mae EUR-Lex yn cyhoeddi fersiwn yr UE. Mae Archif Gwe Ymadael â’r UE yn rhoi cipolwg ar fersiwn EUR-Lex o ddiwrnod cwblhau’r cyfnod gweithredu (31 Rhagfyr 2020 11.00 p.m.).
Roedd y fersiwn hon o'r Penderfyniad hwn yn deillio o EUR-Lex ar ddiwrnod cwblhau’r cyfnod gweithredu (31 Rhagfyr 2020 11: 00 p.m.). Nid yw wedi cael ei diwygio gan y DU ers hynny. Darganfyddwch fwy am ddeddfwriaeth sy'n deillio o'r UE fel y'i cyhoeddwyd ar legislation.gov.uk
Revised legislation carried on this site may not be fully up to date. Changes and effects are recorded by our editorial team in lists which can be found in the ‘Changes to Legislation’ area. Where those effects have yet to be applied to the text of the legislation by the editorial team they are also listed alongside the legislation in the affected provisions. Use the ‘more’ link to open the changes and effects relevant to the provision you are viewing.
THE COUNCIL OF THE EUROPEAN UNION,
Having regard to the Treaty on the Functioning of the European Union, and in particular Article 240(3) thereof,
Having regard to Council Decision 2009/937/EU of 1 December 2009 adopting the Council’s Rules of Procedure(1), and in particular Article 24 thereof,
Whereas:
(1) In order to develop Council activities in all areas which require handling classified information, it is appropriate to establish a comprehensive security system for protecting classified information covering the Council, its General Secretariat and the Member States.
(2) This Decision should apply where the Council, its preparatory bodies and the General Secretariat of the Council (GSC) handle EU classified information (EUCI).
(3) In accordance with national laws and regulations and to the extent required for the functioning of the Council, the Member States should respect this Decision where their competent authorities, personnel or contractors handle EUCI, in order that each may be assured that an equivalent level of protection is afforded to EUCI.
(4) The Council and the Commission are committed to applying equivalent security standards for protecting EUCI.
(5) The Council underlines the importance of associating, where appropriate, the European Parliament and other EU institutions, agencies, bodies or offices with the principles, standards and rules for protecting classified information which are necessary in order to protect the interests of the Union and its Member States.
(6) EU agencies and bodies established under Title V, Chapter 2, of the Treaty on European Union, Europol and Eurojust apply, in the context of their internal organisation, the basic principles and minimum standards laid down in this Decision for protecting EUCI, as provided for in their respective founding acts.
(7) Crisis management operations established under Title V, Chapter 2, of the TEU and their personnel apply the security rules adopted by the Council for protecting EUCI.
(8) EU Special Representatives and the members of their teams apply the security rules adopted by the Council for protecting EUCI.
(9) This Decision is taken without prejudice to Articles 15 and 16 of the Treaty on the Functioning of the European Union (TFEU) and to instruments implementing them.
(10) This Decision is taken without prejudice to existing practices in Member States with regard to informing their national Parliaments about the activities of the Union,
HAS ADOPTED THIS DECISION:
1.This Decision lays down the basic principles and minimum standards of security for protecting EUCI.
2.These basic principles and minimum standards shall apply to the Council and the GSC and be respected by the Member States in accordance with their respective national laws and regulations, in order that each may be assured that an equivalent level of protection is afforded to EUCI.
3.For the purposes of this Decision, the definitions set out in Appendix A shall apply.
1.‘EU classified information’ (EUCI) means any information or material designated by an EU security classification, the unauthorised disclosure of which could cause varying degrees of prejudice to the interests of the European Union or of one or more of the Member States.
2.EUCI shall be classified at one of the following levels:
:
information and material the unauthorised disclosure of which could cause exceptionally grave prejudice to the essential interests of the European Union or of one or more of the Member States;
:
information and material the unauthorised disclosure of which could seriously harm the essential interests of the European Union or of one or more of the Member States;
:
information and material the unauthorised disclosure of which could harm the essential interests of the European Union or of one or more of the Member States;
:
information and material the unauthorised disclosure of which could be disadvantageous to the interests of the European Union or of one or more of the Member States.
3.EUCI shall bear a security classification marking in accordance with paragraph 2. It may bear additional markings to designate the field of activity to which it relates, identify the originator, limit distribution, restrict use or indicate releasability.
1.The competent authorities shall ensure that EUCI is appropriately classified, clearly identified as classified information and retains its classification level for only as long as necessary.
2.EUCI shall not be downgraded or declassified nor shall any of the markings referred to in Article 2(3) be modified or removed without the prior written consent of the originator.
3.The Council shall approve a security policy on creating EUCI which shall include a practical classification guide.
1.EUCI shall be protected in accordance with this Decision.
2.The holder of any item of EUCI shall be responsible for protecting it in accordance with this Decision.
3.Where Member States introduce classified information bearing a national security classification marking into the structures or networks of the European Union, the Council and the GSC shall protect that information in accordance with the requirements applicable to EUCI at the equivalent level as set out in the table of equivalence of security classifications contained in Appendix B.
4.Large quantities or a compilation of EUCI may warrant a level of protection corresponding to a higher classification.
1.Risk to EUCI shall be managed as a process. This process shall be aimed at determining known security risks, defining security measures to reduce such risks to an acceptable level in accordance with the basic principles and minimum standards set out in this Decision and at applying these measures in line with the concept of defence in depth as defined in Appendix A. The effectiveness of such measures shall be continuously evaluated.
2.Security measures for protecting EUCI throughout its life-cycle shall be commensurate in particular with its security classification, the form and the volume of the information or material, the location and construction of facilities housing EUCI and the locally assessed threat of malicious and/or criminal activities, including espionage, sabotage and terrorism.
3.Contingency plans shall take account of the need to protect EUCI during emergency situations in order to prevent unauthorised access, disclosure or loss of integrity or availability.
4.Preventive and recovery measures to minimise the impact of major failures or incidents on the handling and storage of EUCI shall be included in business continuity plans.
1.Where necessary, the Council, on recommendation by the Security Committee, shall approve security policies setting out measures for implementing this Decision.
2.The Security Committee may agree at its level security guidelines to supplement or support this Decision and any security policies approved by the Council.
1.Personnel security is the application of measures to ensure that access to EUCI is granted only to individuals who have:
a need-to-know,
been security cleared to the relevant level, where appropriate, and
been briefed on their responsibilities.
2.Personnel security clearance procedures shall be designed to determine whether an individual, taking into account his loyalty, trustworthiness and reliability, may be authorised to access EUCI.
3.All individuals in the GSC whose duties may require them to have access to EUCI classified CONFIDENTIEL UE/EU CONFIDENTIAL or above shall be security cleared to the relevant level before being granted access to such EUCI. The personnel security clearance procedure for GSC officials and other servants is set out in Annex I.
4.Member States’ personnel referred to in Article 14(3) whose duties may require access to EUCI classified CONFIDENTIEL UE/EU CONFIDENTIAL or above shall be security cleared to the relevant level or otherwise duly authorised by virtue of their functions, in accordance with national laws and regulations, before being granted access to such EUCI.
5.Before being granted access to EUCI and at regular intervals thereafter, all individuals shall be briefed on and acknowledge their responsibilities to protect EUCI in accordance with this Decision.
6.Provisions for implementing this Article are set out in Annex I.
1.Physical security is the application of physical and technical protective measures to prevent unauthorised access to EUCI.
2.Physical security measures shall be designed to deny surreptitious or forced entry by an intruder, to deter, impede and detect unauthorised actions and to allow for segregation of personnel in their access to EUCI on a need-to-know basis. Such measures shall be determined based on a risk management process.
3.Physical security measures shall be put in place for all premises, buildings, offices, rooms and other areas in which EUCI is handled or stored, including areas housing communication and information systems as defined in Article 10(2).
4.Areas in which EUCI classified CONFIDENTIEL UE/EU CONFIDENTIAL or above is stored shall be established as Secured Areas in accordance with Annex II and approved by the competent security authority.
5.Only approved equipment or devices shall be used for protecting EUCI at the level CONFIDENTIEL UE/EU CONFIDENTIAL or above.
6.Provisions for implementing this Article are set out in Annex II.
1.The management of classified information is the application of administrative measures for controlling EUCI throughout its life-cycle to supplement the measures provided for in Articles 7, 8 and 10 and thereby help deter, detect and recover from deliberate or accidental compromise or loss of such information. Such measures relate in particular to the creation, registration, copying, translation, carriage and destruction of EUCI.
2.Information classified CONFIDENTIEL UE/EU CONFIDENTIAL or above shall be registered for security purposes prior to distribution and on receipt. The competent authorities in the GSC and in the Member States shall establish a registry system for this purpose. Information classified TRÈS SECRET UE/EU TOP SECRET shall be registered in designated registries.
3.Services and premises where EUCI is handled or stored shall be subject to regular inspection by the competent security authority.
4.EUCI shall be conveyed between services and premises outside physically protected areas as follows:
(a)as a general rule, EUCI shall be transmitted by electronic means protected by cryptographic products approved in accordance with Article 10(6);
(b)when the means referred to in point (a) are not used, EUCI shall be carried either:
on electronic media (e.g. USB sticks, CDs, hard drives) protected by cryptographic products approved in accordance with Article 10(6); or
in all other cases, as prescribed by the competent security authority in accordance with the relevant protective measures laid down in Annex III.
5.Provisions for implementing this Article are set out in Annex III.
1.Information Assurance (IA) in the field of communication and information systems is the confidence that such systems will protect the information they handle and will function as they need to, when they need to, under the control of legitimate users. Effective IA shall ensure appropriate levels of confidentiality, integrity, availability, non-repudiation and authenticity. IA shall be based on a risk management process.
2.‘Communication and Information System’ means any system enabling the handling of information in electronic form. A communication and information system shall comprise the entire assets required for it to operate, including the infrastructure, organisation, personnel and information resources. This Decision shall apply to Communication and Information Systems handling EUCI (CIS).
3.CIS shall handle EUCI in accordance with the concept of IA.
4.All CIS shall undergo an accreditation process. Accreditation shall aim at obtaining assurance that all appropriate security measures have been implemented and that a sufficient level of protection of the EUCI and of the CIS has been achieved in accordance with this Decision. The accreditation statement shall determine the maximum classification level of the information that may be handled in a CIS as well as the corresponding terms and conditions.
5.CIS handling information classified CONFIDENTIEL UE/EU CONFIDENTIAL and above shall be protected in such a way that the information cannot be compromised by unintentional electromagnetic emanations (TEMPEST security measures).
6.Where the protection of EUCI is provided by cryptographic products, such products shall be approved as follows:
(a)the confidentiality of information classified SECRET UE/EU SECRET and above shall be protected by cryptographic products approved by the Council as Crypto Approval Authority (CAA), upon recommendation by the Security Committee;
(b)the confidentiality of information classified CONFIDENTIEL UE/EU CONFIDENTIAL or RESTREINT UE/EU RESTRICTED shall be protected by cryptographic products approved by the Secretary-General of the Council (hereinafter referred to as ‘the Secretary-General’) as CAA, upon recommendation by the Security Committee.
Notwithstanding point (b), within Member States’ national systems, the confidentiality of EUCI classified CONFIDENTIEL UE/EU CONFIDENTIAL or RESTREINT UE/EU RESTRICTED may be protected by cryptographic products approved by a Member State’s CAA.
7.During transmission of EUCI by electronic means, approved cryptographic products shall be used. Notwithstanding this requirement, specific procedures may be applied under emergency circumstances or specific technical configurations as specified in Annex IV.
8.The competent authorities of the GSC and of the Member States respectively shall establish the following IA functions:
(a)an IA Authority (IAA);
(b)a TEMPEST Authority (TA);
(c)a Crypto Approval Authority (CAA);
(d)a Crypto Distribution Authority (CDA).
9.For each system, the competent authorities of the GSC and of the Member States respectively shall establish:
(a)a Security Accreditation Authority (SAA);
(b)an IA Operational Authority.
10.Provisions for implementing this Article are set out in Annex IV.
1.Industrial security is the application of measures to ensure the protection of EUCI by contractors or subcontractors in pre-contract negotiations and throughout the life-cycle of classified contracts. Such contracts shall not involve access to information classified TRÈS SECRET UE/EU TOP SECRET.
2.The GSC may entrust by contract tasks involving or entailing access to or the handling or storage of EUCI by industrial or other entities registered in a Member State or in a third State which has concluded an agreement or an administrative arrangement in accordance with Article 12(2)(a) or (b).
3.The GSC, as contracting authority, shall ensure that the minimum standards on industrial security set out in this Decision, and referred to in the contract, are complied with when awarding classified contracts to industrial or other entities.
4.The National Security Authority (NSA), the Designated Security Authority (DSA) or any other competent authority of each Member State shall ensure, to the extent possible under national laws and regulations, that contractors and subcontractors registered in their territory take all appropriate measures to protect EUCI in pre-contract negotiations and when performing a classified contract.
5.The NSA, DSA or any other competent security authority of each Member State shall ensure, in accordance with national laws and regulations, that contractors or subcontractors registered in the said Member State participating in classified contracts or sub-contracts which require access to information classified CONFIDENTIEL UE/EU CONFIDENTIAL or SECRET UE/EU SECRET within their facilities, either in the performance of such contracts or during the pre-contractual stage, hold a Facility Security Clearance (FSC) at the relevant classification level.
6.Contractor or subcontractor personnel who, for the performance of a classified contract, require access to information classified CONFIDENTIEL UE/EU CONFIDENTIAL or SECRET UE/EU SECRET shall be granted a Personnel Security Clearance (PSC) by the respective NSA, DSA or any other competent security authority in accordance with national laws and regulations and the minimum standards laid down in Annex I.
7.Provisions for implementing this Article are set out in Annex V.
1.Where the Council determines that there is a need to exchange EUCI with a third State or international organisation, an appropriate framework shall be put in place to that effect.
2.In order to establish such a framework and define reciprocal rules on the protection of classified information exchanged:
(a)the Council shall conclude agreements on security procedures for exchanging and protecting classified information (hereinafter referred to as ‘security of information agreements’); or
(b)the Secretary-General may enter into administrative arrangements in accordance with paragraph 17 of Annex VI where the classification level of EUCI to be released is as a general rule no higher than RESTREINT UE/EU RESTRICTED.
3.Security of information agreements or administrative arrangements referred to in paragraph 2 shall contain provisions to ensure that when third States or international organisations receive EUCI, such information is given protection appropriate to its classification level and according to minimum standards which are no less stringent than those laid down in this Decision.
4.The decision to release EUCI originating in the Council to a third State or international organisation shall be taken by the Council on a case-by-case basis, according to the nature and content of such information, the recipient’s need-to-know and the measure of advantage to the EU. If the originator of the classified information for which release is desired is not the Council, the GSC shall first seek the originator’s written consent to release. If the originator cannot be established, the Council shall assume the former’s responsibility.
5.Assessment visits shall be arranged to ascertain the effectiveness of the security measures in place in a third State or international organisation for protecting EUCI provided or exchanged.
6.Provisions for implementing this Article are set out in Annex VI.
1.A breach of security occurs as the result of an act or omission by an individual which is contrary to the security rules laid down in this Decision.
2.Compromise of EUCI occurs when, as a result of a breach of security, it has wholly or in part been disclosed to unauthorised persons.
3.Any breach or suspected breach of security shall be reported immediately to the competent security authority.
4.Where it is known or where there are reasonable grounds to assume that EUCI has been compromised or lost, the competent security authority shall take all appropriate measures in accordance with the relevant laws and regulations to:
(a)inform the originator;
(b)ensure that the case is investigated by personnel not immediately concerned with the breach in order to establish the facts;
(c)assess the potential damage caused to the interests of the EU or of the Member States;
(d)take appropriate measures to prevent a recurrence; and
(e)notify the appropriate authorities of the action taken.
5.Any individual who is responsible for a breach of the security rules laid down in this Decision may be liable to disciplinary action in accordance with the applicable rules and regulations. Any individual who is responsible for compromising or losing EUCI shall be liable to disciplinary and/or legal action in accordance with the applicable laws, rules and regulations.
1.The Council shall take all necessary measures to ensure overall consistency in the application of this Decision.
2.The Secretary-General shall take all necessary measures to ensure that, when handling or storing EUCI or any other classified information, this Decision is applied in premises used by the Council and within the GSC, including in its liaison offices in third States, by GSC officials and other servants, by personnel seconded to the GSC and by GSC contractors.
3.Member States shall take all appropriate measures, in accordance with their respective national laws and regulations, to ensure that when EUCI is handled or stored, this Decision is respected by:
(a)personnel of Member States’ Permanent Representations to the European Union, and national delegates attending meetings of the Council or of its preparatory bodies, or participating in other Council activities;
(b)other personnel in Member States’ national administrations, including personnel seconded to those administrations, whether they serve on the territory of the Member States or abroad;
(c)other persons in the Member States duly authorised by virtue of their functions to have access to EUCI; and
(d)Member States’ contractors, whether on the territory of the Member States or abroad.
1.As part of its role in ensuring overall consistency in the application of this Decision, the Council shall approve:
(a)agreements referred to in Article 12(2)(a);
(b)decisions authorising the release of EUCI to third States and international organisations;
(c)an annual inspection programme proposed by the Secretary-General and recommended by the Security Committee for inspections of Member States’ services and premises and of EU agencies and bodies established under Title V, Chapter 2 of the TEU as well as of Europol and Eurojust, and assessment visits to third States and international organisations in order to ascertain the effectiveness of measures implemented for protecting EUCI; and
(d)security policies as foreseen in Article 6(1).
2.The Secretary-General shall be the GSC’s Security Authority. In that capacity, the Secretary-General shall:
(a)implement the Council’s security policy and keep it under review;
(b)coordinate with Member States’ NSAs on all security matters relating to the protection of classified information relevant for the Council’s activities;
(c)grant EU PSCs to GSC officials and other servants in accordance with Article 7(3) before they may be granted access to information classified CONFIDENTIEL UE/EU CONFIDENTIAL or above;
(d)as appropriate, order investigations into any actual or suspected compromise or loss of classified information held by or originating in the Council and request the relevant security authorities to assist in such investigations;
(e)undertake periodic inspections of the security arrangements for protecting classified information on GSC premises;
(f)undertake periodic inspections of the security arrangements for protecting EUCI in EU agencies and bodies established under Title V, Chapter 2, of the TEU, Europol, Eurojust, as well as in crisis management operations established under Title V, Chapter 2, of the TEU and by EU Special Representatives (EUSR) and the members of their teams;
(g)undertake, jointly and in agreement with the NSA concerned, periodic inspections of the security arrangements for protecting EUCI in Member States’ services and premises;
(h)coordinate security measures with the competent authorities of the Member States which are responsible for protecting classified information and, as appropriate, third States or international organisations, including on the nature of threats to the security of EUCI and the means of protection against them;
(i)enter into the administrative arrangements referred to in Article 12(2)(b); and
(j)undertake initial and periodic assessment visits to third States or international organisations in order to ascertain the effectiveness of measures implemented for protecting EUCI provided to or exchanged with them.
The Security Office of the GSC shall be at the disposal of the Secretary-General to assist in these responsibilities.
3.For the purposes of implementing Article 14(3), Member States should:
(a)designate an NSA responsible for security arrangements for protecting EUCI in order that:
EUCI held by any national department, body or agency, public or private, at home or abroad, is protected in accordance with this Decision;
security arrangements for protecting EUCI are periodically inspected;
all individuals employed within a national administration or by a contractor who may be granted access to information classified CONFIDENTIEL UE/EU CONFIDENTIAL or above are appropriately security cleared or are otherwise duly authorised by virtue of their functions in accordance with national laws and regulations;
security programmes are set up as necessary in order to minimise the risk of EUCI being compromised or lost;
security matters related to protecting EUCI are coordinated with other competent national authorities, including those referred to in this Decision; and
responses are given to appropriate security clearance requests from EU agencies and bodies established under Title V, Chapter 2 of the TEU, Europol, Eurojust, as well as crisis management operations established under Title V, Chapter 2, of the TEU and EUSRs and their teams.
NSAs are listed in Appendix C;
(b)ensure that their competent authorities provide information and advice to their governments, and through them to the Council, on the nature of threats to the security of EUCI and the means of protection against them.
1.A Security Committee is hereby established. It shall examine and assess any security matter within the scope of this Decision and make recommendations to the Council as appropriate.
2.The Security Committee shall be composed of representatives of the Member States’ NSAs and be attended by a representative of the Commission and of the European External Action Service. It shall be chaired by the Secretary-General or by his designated delegate. It shall meet as instructed by the Council, or at the request of the Secretary-General or of an NSA.
Representatives of EU agencies and bodies established under Title V, Chapter 2, of the TEU, as well Europol and Eurojust, may be invited to attend when questions concerning them are discussed.
3.The Security Committee shall organise its activities in such a way that it can make recommendations on specific areas of security. It shall establish an expert sub-area for IA issues and other expert sub-areas as necessary. It shall draw up terms of reference for such expert sub-areas and receive reports from them on their activities including, as appropriate, any recommendations for the Council.
1.This Decision shall repeal and replace Council Decision 2001/264/EC of 19 March 2001 adopting the Council’s security regulations(2).
2.All EUCI classified in accordance with Decision 2001/264/EC shall continue to be protected in accordance with the relevant provisions of this Decision.
This Decision shall enter into force on the date of its publication in the Official Journal of the European Union.
Done at Brussels, 31 March 2011.
For the Council
The President
Völner P.
Personnel security
Physical security
Management of classified information
Protection of EUCI handled in CIS
Industrial security
Exchange of classified information with third States and international organisations
his need-to-know has been determined;
he has been granted a PSC to the relevant level or is otherwise duly authorised by virtue of his functions in accordance with national laws and regulations; and
he has been briefed on the security rules and procedures for protecting EUCI and has acknowledged his responsibilities with regard to protecting such information.
has committed or attempted to commit, conspired with or aided and abetted another to commit any act of espionage, terrorism, sabotage, treason or sedition;
is, or has been, an associate of spies, terrorists, saboteurs, or of individuals reasonably suspected of being such or an associate of representatives of organisations or foreign states, including foreign intelligence services, which may threaten the security of the EU and/or Member States unless these associations were authorised in the course of official duty;
is, or has been, a member of any organisation which by violent, subversive or other unlawful means seeks, inter alia, to overthrow the government of a Member State, to change the constitutional order of a Member State or to change the form or the policies of its government;
is, or has been, a supporter of any organisation described in point (c), or who is, or who has been closely associated with members of such organisations;
has deliberately withheld, misrepresented or falsified information of significance, particularly of a security nature, or has deliberately lied in completing a personnel security questionnaire or during the course of a security interview;
has been convicted of a criminal offence or offences;
has a history of alcohol dependence, use of illegal drugs and/or misuse of legal drugs;
is or has been involved in conduct which may give rise to the risk of vulnerability to blackmail or pressure;
by act or through speech, has demonstrated dishonesty, disloyalty, unreliability or untrustworthiness;
has seriously or repeatedly infringed security regulations; or has attempted, or succeeded in, unauthorised activity in respect of communication and information systems;
may be liable to pressure (e.g. through holding one or more non-EU nationalities or through relatives or close associates who could be vulnerable to foreign intelligence services, terrorist groups or other subversive organisations, or individuals whose aims may threaten the security interests of the EU and/or Member States).
the completion of a national personnel security questionnaire for the level of EUCI to which the individual may require access; once completed, this questionnaire shall be forwarded to the competent security authority;
identity check/citizenship/nationality status — the individual’s date and place of birth shall be verified and his identity checked. Citizenship status and/or nationality, past and present, of the individual shall be established; this shall include an assessment of any vulnerability to pressure from foreign sources, for example, due to former residence or past associations; and
national and local records check — a check shall be made of national security and central criminal records, where the latter exist, and/or other comparable governmental and police records. The records of law enforcement agencies with legal jurisdiction where the individual has resided or been employed shall be checked.
financial status — information shall be sought on the individual’s finances in order to assess any vulnerability to foreign or domestic pressure due to serious financial difficulties, or to discover any unexplained affluence;
education — information shall be sought to verify the individual’s educational background at schools, universities and other education establishments attended since his 18th birthday, or during a period judged appropriate by the investigating authority;
employment — information covering present and former employment shall be sought, reference being made to sources such as employment records, performance or efficiency reports and to employers or supervisors;
military service — where applicable, the service of the individual in the armed forces and type of discharge shall be verified; and
interviews — where provided for and admissible under national law, an interview or interviews shall be conducted with the individual. Interviews shall also be conducted with other individuals who are in a position to give an unbiased assessment of the individual’s background, activities, loyalty, trustworthiness and reliability. When it is national practice to ask the subject of the investigation for referrals, referees shall be interviewed unless there are good reasons for not doing so.
Where the security investigation results in an assurance that nothing adverse is known which would call into question the loyalty, trustworthiness and reliability of the individual, the GSC Appointing Authority may grant an EU PSC to the individual concerned and authorise access to EUCI up to the relevant level until a specified date.
Where the security investigation does not result in such an assurance, the GSC Appointing Authority shall notify the individual concerned, who may ask to be heard by the Appointing Authority. The Appointing Authority may ask the competent NSA for any further clarification it can provide according to its national laws and regulations. If the outcome is confirmed, an EU PSC shall not be granted.
the compelling need for access to EUCI at a higher level shall be justified, in writing, by the individual’s superior;
access shall be limited to specific items of EUCI in support of the assignment;
the individual holds a valid national PSC or EU PSC;
action has been initiated to obtain authorisation for the level of access required for the position;
satisfactory checks have been made by the competent authority that the individual has not seriously or repeatedly infringed security regulations;
the assignment of the individual is approved by the competent authority; and
a record of the exception, including a description of the information to which access was approved, shall be kept by the registry or subordinate registry responsible.
ensuring that EUCI is handled and stored in an appropriate manner;
allowing for segregation of personnel in terms of access to EUCI on the basis of their need-to-know and, where appropriate, their security clearance;
deterring, impeding and detecting unauthorised actions; and
denying or delaying surreptitious or forced entry by intruders.
the classification level of EUCI;
the form and volume of EUCI, bearing in mind that large quantities or a compilation of EUCI may require more stringent protective measures to be applied;
the surrounding environment and structure of the buildings or areas housing EUCI; and
the assessed threat from intelligence services which target the EU or Member States and from sabotage, terrorist, subversive or other criminal activities.
a perimeter barrier: a physical barrier which defends the boundary of an area requiring protection;
intrusion detection systems (IDS): an IDS may be used to enhance the level of security offered by a perimeter barrier, or in rooms and buildings in place of, or to assist, security staff;
access control: access control may be exercised over a site, a building or buildings on a site or to areas or rooms within a building. Control may be exercised by electronic or electro-mechanical means, by security personnel and/or a receptionist, or by any other physical means;
security personnel: trained, supervised and, where necessary, appropriately security-cleared security personnel may be employed, inter alia, in order to deter individuals planning covert intrusion;
closed circuit television (CCTV): CCTV may be used by security personnel in order to verify incidents and IDS alarms on large sites or at perimeters;
security lighting: security lighting may be used to deter a potential intruder, as well as to provide the illumination necessary for effective surveillance directly by security personnel or indirectly through a CCTV system; and
any other appropriate physical measures designed to deter or detect unauthorised access or prevent loss of or damage to EUCI.
Administrative Areas; and
Secured Areas (including technically Secured Areas).
In this Decision, all references to Administrative Areas and Secured Areas, including technically Secured Areas, shall be understood as also referring to the national equivalents thereof.
a visibly defined perimeter shall be established which allows individuals and, where possible, vehicles to be checked;
unescorted access shall be granted only to individuals who are duly authorised by the competent authority; and
all other individuals shall be escorted at all times or be subject to equivalent controls.
a visibly defined and protected perimeter shall be established through which all entry and exit are controlled by means of a pass or personal recognition system;
unescorted access shall be granted only to individuals who are security-cleared and specifically authorised to enter the area on the basis of their need-to-know;
all other individuals shall be escorted at all times or be subject to equivalent controls.
the level of highest security classification of the information normally held in the area shall be clearly indicated;
all visitors shall require specific authorisation to enter the area, shall be escorted at all times and shall be appropriately security cleared unless steps are taken to ensure that no access to EUCI is possible.
such areas shall be IDS equipped, be locked when not occupied and be guarded when occupied. Any keys shall be controlled in accordance with Section VI;
all persons and material entering such areas shall be controlled;
such areas shall be regularly physically and/or technically inspected as required by the competent security authority. Such inspections shall also be conducted following any unauthorised entry or suspicion of such entry; and
such areas shall be free of unauthorised communication lines, unauthorised telephones or other unauthorised communication devices and electrical or electronic equipment.
the level of EUCI which may be handled and stored in the area;
the surveillance and protective measures to be maintained;
the individuals authorised to have unescorted access to the area by virtue of their need-to-know and security clearance;
where appropriate, the procedures for escorts or for protecting EUCI when authorising any other individuals to access the area;
any other relevant measures and procedures.
in a Secured Area;
in an Administrative Area provided the EUCI is protected from access by unauthorised individuals; or
outside a Secured Area or an Administrative Area provided the holder carries the EUCI in accordance with paragraphs 28 to 40 of Annex III and has undertaken to comply with compensatory measures laid down in security instructions issued by the competent security authority to ensure that EUCI is protected from access by unauthorised persons.
in a Secured Area;
in an Administrative Area provided the EUCI is protected from access by unauthorised individuals; or
outside a Secured Area or an Administrative Area provided the holder:
carries the EUCI in accordance with paragraphs 28 to 40 of Annex III;
has undertaken to comply with compensatory measures laid down in security instructions issued by the competent security authority to ensure that EUCI is protected from access by unauthorised persons;
keeps the EUCI at all times under his personal control; and
in the case of documents in paper form, has notified the relevant registry of the fact.
in a security container in line with paragraph 8 with one or more of the following supplementary controls:
continuous protection or verification by cleared security staff or duty personnel;
an approved IDS in combination with response security personnel;
or
in an IDS-equipped strong room in combination with response security personnel.
whenever there is a change in personnel knowing the combination;
whenever a compromise has occurred or is suspected;
when a lock has undergone maintenance or repair; and
at least every 12 months.
CONFIDENTIEL UE/EU CONFIDENTIAL
Without attachment(s) RESTREINT UE/EU RESTRICTED
an identifier to designate the originator;
any caveats, code-words or acronyms specifying the field of activity to which the document relates, a particular distribution on a need-to-know basis or restrictions on use;
releasability markings;
where applicable, the date or specific event after which it may be downgraded or declassified.
TS-UE/EU-TS
S-UE/EU-S
C-UE/EU-C
R-UE/EU-R
each page shall be marked clearly with the classification level;
each page shall be numbered;
the document shall bear a reference number and a subject, which is not itself classified information, unless it is marked as such;
the document shall be dated;
documents classified SECRET UE/EU SECRET or above shall bear a copy number on every page, if they are to be distributed in several copies.
military, government or diplomatic courier, as appropriate;
hand carriage, provided that:
EUCI does not leave the possession of the bearer, unless it is stored in accordance with the requirements set out in Annex II;
EUCI is not opened en route or read in public places;
individuals are briefed on their security responsibilities;
individuals are provided with a courier certificate where necessary;
postal services or commercial courier services, provided that:
they are approved by the relevant NSA in accordance with national laws and regulations;
they apply appropriate protective measures in accordance with minimum requirements to be laid down in security guidelines pursuant to Article 6(2).
In the case of carriage from one Member State to another, the provisions of point (c) shall be limited to information classified up to CONFIDENTIEL UE/EU CONFIDENTIAL.
military or diplomatic courier;
hand carriage, provided that:
the package bears an official seal, or is packaged so as to indicate that it is an official consignment and should not undergo customs or security scrutiny;
individuals carry a courier certificate identifying the package and authorising them to carry the package;
EUCI does not leave the possession of the bearer, unless it is stored in accordance with the requirements set out in Annex II;
EUCI is not opened en route or read in public places; and
individuals are briefed on their security responsibilities.
inspection in accordance with Article 9(3) and Article 15(2)(e), (f) and (g); or
assessment visit in accordance with Article 12(5),
to evaluate the effectiveness of measures implemented for protecting EUCI.
ensure that the required minimum standards for protecting EUCI laid down in this Decision are respected;
emphasise the importance of security and effective risk management within the entities inspected;
recommend countermeasures to mitigate the specific impact of loss of confidentiality, integrity or availability of classified information; and
reinforce security authorities’ ongoing security education and awareness programmes.
the draft inspection report will be forwarded to the NSA concerned to verify that it is factually correct and that it contains no information classified higher than RESTREINT UE/EU RESTRICTED;
unless the Member State NSA in question requests general distribution to be withheld, inspection reports shall be circulated to members of the Security Committee and to the ECSD; the report shall be classified RESTREINT UE/EU RESTRICTED.
A regular report shall be prepared under the responsibility of the GSC Security Authority (Security Office) to highlight the lessons learned from the inspections conducted in Member States over a specified period and examined by the Security Committee.
:
the guarantee that information is genuine and from bona fide sources;
:
the property of being accessible and usable upon request by an authorised entity;
:
the property that information is not disclosed to unauthorised individuals, entities or processes;
:
the property of safeguarding the accuracy and completeness of information and assets;
:
the ability to prove an action or event has taken place, so that this event or action cannot subsequently be denied.
:
security measures aimed at dissuading any adversary planning to attack the CIS;
:
security measures aimed at impeding or blocking an attack on the CIS;
:
security measures aimed at discovering the occurrence of an attack on the CIS;
:
security measures aimed at limiting impact of an attack to a minimum set of information or CIS assets and preventing further damage; and
:
security measures aimed at regaining a secure situation for the CIS.
The degree of stringency of such security measures shall be determined following a risk assessment.
that security failures may significantly harm the CIS;
the potential harm to others which may arise from interconnectivity and interdependency; and
their individual responsibility and accountability for the security of CIS according to their roles within the systems and processes.
business or operational requirements for such interconnections shall be stated and approved by the competent authorities;
the interconnection shall undergo a risk management and accreditation process and shall require the approval of the competent SAAs; and
Boundary Protection Services (BPS) shall be implemented at the perimeter of all CIS.
When the unprotected or public network is used solely as a carrier and the data is encrypted by a cryptographic product approved in accordance with Article 10, such a connection shall not be deemed to be an interconnection.
the sender and recipient do not have the required encryption facility or have no encryption facility; and
the classified material cannot be conveyed in time by other means.
developing IA security policies and security guidelines and monitoring their effectiveness and pertinence;
safeguarding and administering technical information related to cryptographic products;
ensuring that IA measures selected for protecting EUCI comply with the relevant policies governing their eligibility and selection;
ensuring that cryptographic products are selected in compliance with policies governing their eligibility and selection;
coordinating training and awareness on IA;
consulting with the system provider, the security actors and representatives of users in respect to IA security policies and security guidelines; and
ensuring appropriate expertise is available in the expert sub-area of the Security Committee for IA issues.
managing and accounting for EU crypto material;
ensuring that appropriate procedures are enforced and channels established for accounting, secure handling, storage and distribution of all EU crypto material; and
ensuring the transfer of EU crypto material to or from individuals or services using it.
ensuring that CIS comply with the relevant security policies and security guidelines, providing a statement of approval for CIS to handle EUCI to a defined level of classification in its operational environment, stating the terms and conditions of the accreditation, and criteria under which re-approval is required;
establishing a security accreditation process, in accordance with the relevant policies, clearly stating the approval conditions for CIS under its authority;
defining a security accreditation strategy setting out the degree of detail for the accreditation process commensurate with the required level of assurance;
examining and approving security-related documentation, including risk management and residual risk statements, system-specific security requirement statements (hereinafter referred to as ‘SSRSs’), security implementation verification documentation and security operating procedures (hereinafter referred to as ‘SecOPs’), and ensuring that it complies with the Council’s security rules and policies;
checking implementation of security measures in relation to the CIS by undertaking or sponsoring security assessments, inspections or reviews;
defining security requirements (e.g. personnel clearance levels) for sensitive positions in relation to the CIS;
endorsing the selection of approved cryptographic and TEMPEST products used to provide security for a CIS;
approving, or where relevant, participating in the joint approval of the interconnection of a CIS to other CIS; and
consulting the system provider, the security actors and representatives of the users with respect to security risk management, in particular the residual risk, and the terms and conditions of the approval statement.
The SAB shall be chaired by a representative of the GSC SAA. It shall act by consensus of SAA representatives of institutions, Member States and other entities with nodes on the CIS. It shall make periodic reports on its activities to the Security Committee and shall notify all accreditation statements to it.
developing security documentation in line with security policies and security guidelines, in particular the SSRS including the residual risk statement, the SecOPs and the crypto plan within the CIS accreditation process;
participating in selecting and testing the system-specific technical security measures, devices and software, to supervise their implementation and to ensure that they are securely installed, configured and maintained in accordance with the relevant security documentation;
participating in selecting TEMPEST security measures and devices if required in the SSRS and ensuring that they are securely installed and maintained in cooperation with the TA;
monitoring implementation and application of the SecOps and, where appropriate, delegating operational security responsibilities to the system owner;
managing and handling cryptographic products, ensuring the custody of crypto and controlled items and, if so required, ensuring the generation of cryptographic variables;
conducting security analysis reviews and tests, in particular to produce the relevant risk reports, as required by the SAA;
providing CIS-specific IA training;
implementing and operating CIS-specific security measures.
in preparing an SCG, the GSC shall take into account all relevant security aspects, including the security classification assigned to information provided and approved to be used for the contract by the originator of the information;
the overall level of classification of the contract may not be lower than the highest classification of any of its elements; and
where relevant, the GSC shall liaise with the Member States’ NSAs/DSAs or any other competent security authority concerned in the event of any changes regarding the classification of information created by or provided to contractors in the performance of a contract and when making any subsequent changes to the SCG.
evaluate the integrity of the industrial or other entity;
evaluate ownership, control, or the potential for undue influence that may be considered a security risk;
verify that the industrial or any other entity has established a security system at the facility which covers all appropriate security measures necessary for the protection of information or material classified CONFIDENTIEL UE/EU CONFIDENTIAL or SECRET UE/EU SECRET in accordance with the requirements laid down in this Decision;
verify that the personnel security status of management, owners and employees who are required to have access to information classified CONFIDENTIEL UE/EU CONFIDENTIAL or SECRET UE/EU SECRET has been established in accordance with the requirements laid down in this Decision;
verify that the industrial or any other entity has appointed a Facility Security Officer who is responsible to its management for enforcing the security obligations within such an entity.
security shall be assured at all stages during transportation from the point of origin to the final destination;
the degree of protection afforded to a consignment shall be determined by the highest classification level of material contained within it;
an FSC at the appropriate level shall be obtained for companies providing transportation. In such cases, personnel handling the consignment shall be security cleared in accordance with Annex I;
prior to any cross-border movement of material classified CONFIDENTIEL UE/EU CONFIDENTIAL or SECRET UE/EU SECRET, a transportation plan shall be drawn up by the consignor and approved by the NSA/DSAs or any other competent security authority concerned;
journeys shall be point to point to the extent possible, and shall be completed as quickly as circumstances permit;
whenever possible, routes should be only through Member States. Routes through States other than Member States should only be undertaken when authorised by the NSA/DSA or any other competent security authority of the States of both the consignor and the consignee.
a security of information agreement shall be concluded, or
an administrative arrangement shall be entered into,
in accordance with Article 12(2) and Sections III and IV and based on a recommendation from the Security Committee.
a framework participation agreement,
an ad hoc participation agreement, or
in the absence of either of the above, an ad hoc administrative arrangement.
the regulatory framework applicable for protecting classified information;
any specific features of the security policy and the way in which security is organised in the third State or international organisation which may have an impact on the level of classified information that may be exchanged;
the security measures and procedures actually in place; and
security clearance procedures for the level of EUCI to be released.
to the extent possible, verify with the security authorities of the third State or international organisation concerned that its security regulations, structures and procedures are such that EUCI released to it will be protected to standards no less stringent than those laid down in this Decision;
invite the Security Committee, on the basis of available information, to issue a recommendation regarding the confidence that can be placed in the security regulations, structures and procedures in the third State or international organisation to which the EUCI is to be released.
for matters relating to CFSP/CSDP, the Political and Security Committee shall discuss the matter and formulate a recommendation for a decision by COREPER;
for all other matters, COREPER shall discuss the matter and take a decision.
Definitions
Equivalence of security classifications
List of National Security Authorities (NSAs)
List of abbreviations
For the purposes of this Decision, the following definitions shall apply:
‘Accreditation’ means the process leading to a formal statement by the Security Accreditation Authority (SAA) that a system is approved to operate with a defined level of classification, in a particular security mode in its operational environment and at an acceptable level of risk, based on the premise that an approved set of technical, physical, organisational and procedural security measures has been implemented;
‘Asset’ means anything that is of value to an organisation, its business operations and their continuity, including information resources that support the organisation’s mission;
‘CIS life-cycle’ means the entire duration of existence of a CIS, which includes initiation, conception, planning, requirements analysis, design, development, testing, implementation, operation, maintenance and decommissioning;
‘Classified contract’ means a contract entered into by the GSC with a contractor for the supply of goods, execution of works or provision of services, the performance of which requires or involves access to or the creation of EUCI;
‘Classified subcontract’ means a contract entered into by a contractor of the GSC with another contractor (i.e. the subcontractor) for the supply of goods, execution of works or provision of services, the performance of which requires or involves access to or the creation of EUCI;
‘Communication and information system’ (CIS) — see Article 10(2);
‘Contractor’ means an individual or legal entity possessing the legal capacity to undertake contracts;
‘Cryptographic (Crypto) material’ means cryptographic algorithms, cryptographic hardware and software modules, and products including implementation details and associated documentation and keying material;
‘CSDP operation’ means a military or civilian crisis management operation under Title V, Chapter 2, of the TEU;
‘Declassification’ means the removal of any security classification;
‘Defence in depth’ means the application of a range of security measures organised as multiple layers of defence;
‘Designated Security Authority’ (DSA) means an authority responsible to the National Security Authority (NSA) of a Member State which is responsible for communicating to industrial or other entities national policy on all matters of industrial security and for providing direction and assistance in its implementation. The function of DSA may be carried out by the NSA or by any other competent authority;
‘Document’ means any recorded information regardless of its physical form or characteristics;
‘Downgrading’ means a reduction in the level of security classification;
‘EU classified information’ (EUCI) — see Article 2(1);
‘Facility Security Clearance’ (FSC) means an administrative determination by an NSA or DSA that, from the security viewpoint, a facility can afford an adequate level of protection to EUCI of a specified security classification level and its personnel who require access to EUCI have been appropriately security cleared and briefed on the relevant security requirements necessary to access and protect EUCI;
‘Handling’ of EUCI means all possible actions to which EUCI may be subject throughout its life-cycle. It comprises its creation, processing, carriage, downgrading, declassification and destruction. In relation to CIS it also comprises its collection, display, transmission and storage;
‘Holder’ means a duly authorised individual with an established need-to-know who is in possession of an item of EUCI and is accordingly responsible for protecting it;
‘Industrial or other entity’ means an entity involved in supplying goods, executing works or providing services; this may be an industrial, commercial, service, scientific, research, educational or development entity or a self-employed individual;
‘Industrial security’ — see Article 11(1);
‘Information Assurance’ — see Article 10(1);
‘Interconnection’ — see Annex IV, paragraph 31;
‘Management of classified information’ — see Article 9(1);
‘Material’ means any document or item of machinery or equipment, either manufactured or in the process of manufacture;
‘Originator’ means the EU institution, agency or body, Member State, third state or international organisation under whose authority classified information has been created and/or introduced into the EU’s structures;
‘Personnel security’ — see Article 7(1);
‘Personnel Security Clearance’ (PSC) means either or both of the following:
‘EU Personnel Security Clearance’ (EU PSC) for access to EUCI means an authorisation by the GSC Appointing Authority which is taken in accordance with this Decision following completion of a security investigation conducted by the competent authorities of a Member State and which certifies that an individual may, provided his ‘need-to-know’ has been determined, be granted access to EUCI up to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or above) until a specified date; the individual thus described is said to be ‘security cleared’,
‘National Personnel Security Clearance’ (national PSC) for access to EUCI means a statement by a competent authority of a Member State which is made following completion of a security investigation conducted by the competent authorities of a Member State and which certifies that an individual may, provided his ‘need-to-know’ has been determined, be granted access to EUCI up to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or above) until a specified date; the individual thus described is said to be ‘security cleared’;
‘Personnel Security Clearance Certificate’ (PSCC) means a certificate issued by a competent authority establishing that an individual is security cleared and holds a valid national or EU PSC, and which shows the level of EUCI to which that individual may be granted access (CONFIDENTIEL UE/EU CONFIDENTIAL or above), the date of validity of the relevant PSC and the date of expiry of the certificate itself;
‘Physical security’ — see Article 8(1);
‘Programme/Project Security Instruction’ (PSI) means a list of security procedures which are applied to a specific programme/project in order to standardise security procedures. It may be revised throughout the programme/project;
‘Registration’ — see Annex III, paragraph 18;
‘Residual risk’ means the risk which remains after security measures have been implemented, given that not all threats are countered and not all vulnerabilities can be eliminated;
‘Risk’ means the potential that a given threat will exploit internal and external vulnerabilities of an organisation or of any of the systems it uses and thereby cause harm to the organisation and to its tangible or intangible assets. It is measured as a combination of the likelihood of threats occurring and their impact.
‘Risk acceptance’ is the decision to agree to the further existence of a residual risk after risk treatment.
‘Risk assessment’ consists of identifying threats and vulnerabilities and conducting the related risk analysis, i.e. the analysis of probability and impact.
‘Risk communication’ consists of developing awareness of risks among CIS user communities, informing approval authorities such risks and reporting them to operating authorities.
‘Risk treatment’ consists of mitigating, removing, reducing (through an appropriate combination of technical, physical, organisational or procedural measures), transferring or monitoring the risk.
‘Security Aspects Letter’ (SAL) means a set of special contractual conditions issued by the contracting authority which forms an integral part of any classified contract involving access to or the creation of EUCI, that identifies the security requirements or those elements of the contract requiring security protection;
‘Security Classification Guide’ (SCG) means a document which describes the elements of a programme or contract which are classified, specifying the applicable security classification levels. The SCG may be expanded throughout the life of the programme or contract and the elements of information may be re-classified or downgraded; where an SCG exists it shall be part of the SAL;
‘Security investigation’ means the investigative procedures conducted by the competent authority of a Member State in accordance with its national laws and regulations in order to obtain an assurance that nothing adverse is known which would prevent an individual from being granted a national or EU PSC for access to EUCI up to a specified level (CONFIDENTIEL UE/EU CONFIDENTIAL or above);
‘Security mode of operation’ means the definition of the conditions under which a CIS operates based on the classification of information handled and the clearance levels, formal access approvals, and need-to-know of its users. Four modes of operation exist for handling or transmitting classified information: dedicated mode, system-high mode, compartmented mode and multilevel mode:
‘Dedicated mode’ means a mode of operation in which all individuals with access to the CIS are cleared to the highest classification level of information handled within the CIS, and with a common need-to-know for all of the information handled within the CIS,
‘System-high mode’ means a mode of operation in which all individuals with access to the CIS are cleared to the highest classification level of information handled within the CIS, but not all individuals with access to the CIS have a common need-to-know for the information handled within the CIS; approval to access information may be granted by an individual,
‘Compartmented mode’ means a mode of operation in which all individuals with access to the CIS are cleared to the highest classification level of information handled within the CIS, but not all individuals with access to the CIS have a formal authorisation to access all of the information handled within the CIS; formal authorisation implies a formal central management of access control as distinct from an individual’s discretion to grant access,
‘Multilevel mode’ means a mode of operation in which not all individuals with access to the CIS are cleared to the highest classification level of information handled within the CIS, and not all individuals with access to the CIS have a common need-to-know for the information handled within the CIS;
‘Security risk management process’ means the entire process of identifying, controlling and minimising uncertain events that may affect the security of an organisation or of any of the systems it uses. It covers the entirety of risk-related activities, including assessment, treatment, acceptance and communication;
‘TEMPEST’ means the investigation, study and control of compromising electromagnetic emanations and the measures to suppress them;
‘Threat’ means a potential cause of an unwanted incident which may result in harm to an organisation or any of the systems it uses; such threats may be accidental or deliberate (malicious) and are characterised by threatening elements, potential targets and attack methods;
‘Vulnerability’ means a weakness of any nature that can be exploited by one or more threats. A vulnerability may be an omission or it may relate to a weakness in controls in terms of their strength, completeness or consistency and may be of a technical, procedural, physical, organisational or operational nature.
a Diffusion Restreinte/Beperkte Verspreiding is not a security classification in Belgium. Belgium handles and protects ‘RESTREINT UE/EU RESTRICTED’ information in a manner no less stringent than the standards and procedures described in the security rules of the Council of the European Union. | ||||
b Germany: VS = Verschlusssache. | ||||
c France does not use the classification ‘RESTREINT’ in its national system. France handles and protects ‘RESTREINT UE/EU RESTRICTED’ information in a manner no less stringent than the standards and procedures described in the security rules of the Council of the European Union. | ||||
d Sweden: the security classification markings in the top row are used by the defence authorities and the markings in the bottom row by other authorities. | ||||
EU | TRÈS SECRET UE/EU TOP SECRET | SECRET UE/EU SECRET | CONFIDENTIEL UE/EU CONFIDENTIAL | RESTREINT UE/EU RESTRICTED |
---|---|---|---|---|
Belgium | Très Secret (Loi 11.12.1998) Zeer Geheim (Wet 11.12.1998) | Secret (Loi 11.12.1998) Geheim (Wet 11.12.1998) | Confidentiel (Loi 11.12.1998) Vertrouwelijk (Wet 11.12.1998) | notaa below |
Bulgaria | Cтpoгo ceкретно | Ceкретно | Поверително | За служебно ползване |
Czech Republic | Přísně tajné | Tajné | Důvěrné | Vyhrazené |
Denmark | Yderst hemmeligt | Hemmeligt | Fortroligt | Til tjenestebrug |
Germany | STRENG GEHEIM | GEHEIM | VSb— VERTRAULICH | VS — NUR FÜR DEN DIENSTGEBRAUCH |
Estonia | Täiesti salajane | Salajane | Konfidentsiaalne | Piiratud |
Ireland | Top Secret | Secret | Confidential | Restricted |
Greece | Άκρως Απόρρητο Abr: ΑΑΠ | Απόρρητο Abr: (ΑΠ) | Εμπιστευτικό Αbr: (ΕΜ) | Περιορισμένης Χρήσης Abr: (ΠΧ) |
Spain | SECRETO | RESERVADO | CONFIDENCIAL | DIFUSIÓN LIMITADA |
France | Très Secret Défense | Secret Défense | Confidentiel Défense | notac below |
Italy | Segretissimo | Segreto | Riservatissimo | Riservato |
Cyprus | Άκρως Απόρρητο Αbr: (AΑΠ) | Απόρρητο Αbr: (ΑΠ) | Εμπιστευτικό Αbr: (ΕΜ) | Περιορισμένης Χρήσης Αbr: (ΠΧ) |
Latvia | Sevišķi slepeni | Slepeni | Konfidenciāli | Dienesta vajadzībām |
Lithuania | Visiškai slaptai | Slaptai | Konfidencialiai | Riboto naudojimo |
Luxembourg | Très Secret Lux | Secret Lux | Confidentiel Lux | Restreint Lux |
Hungary | Szigorúan titkos! | Titkos! | Bizalmas! | Korlátozott terjesztésű! |
Malta | L-Ogħla Segretezza | Sigriet | Kunfidenzjali | Ristrett |
Netherlands | Stg. ZEER GEHEIM | Stg. GEHEIM | Stg. CONFIDENTIEEL | Dep. VERTROUWELIJK |
Austria | Streng Geheim | Geheim | Vertraulich | Eingeschränkt |
Poland | Ściśle Tajne | Tajne | Poufne | Zastrzeżone |
Portugal | Muito Secreto | Secreto | Confidencial | Reservado |
Romania | Strict secret de importanță deosebită | Strict secret | Secret | Secret de serviciu |
Slovenia | Strogo tajno | Tajno | Zaupno | Interno |
Slovakia | Prísne tajné | Tajné | Dôverné | Vyhradené |
Finland | ERITTÄIN SALAINEN YTTERST HEMLIG | SALAINEN HEMLIG | LUOTTAMUKSELLINEN KONFIDENTIELL | KÄYTTÖ RAJOITETTU BEGRÄNSAD TILLGÅNG |
Swedend | HEMLIG/TOP SECRET HEMLIG AV SYNNERLIG BETYDELSE FÖR RIKETS SÄKERHET | HEMLIG/SECRET HEMLIG | HEMLIG/CONFIDENTIAL HEMLIG | HEMLIG/RESTRICTED HEMLIG |
United Kingdom | Top Secret | Secret | Confidential | Restricted |
Autorité nationale de Sécurité
SPF Affaires étrangères, Commerce extérieur et Coopération au Développement
15, rue des Petits Carmes
1000 Bruxelles
Tel. Secretariat: +32 25014542
Fax: +32 25014596
E-mail: nvo-ans@diplobel.fed.be
Politiets Efterretningstjeneste
(Danish Security Intelligence Service)
Klausdalsbrovej 1
2860 Søborg
Tel.: +45 33148888
Fax: +45 33430190
Forsvarets Efterretningstjeneste
(Danish Defence Intelligence Service)
Kastellet 30
2100 Copenhagen Ø
Tel.: +45 33325566
Fax: +45 33931320
State Commission on Information Security
90 Cherkovna Str.
1505 Sofia
Tel.: +359 29215911
Fax: +359 29873750
E-mail: dksi@government.bg
Website: www.dksi.bg
Bundesministerium des Innern
Referat ÖS III 3
Alt-Moabit 101 D
D-11014 Berlin
Tel.: +49 30186810
Fax: +49 30186811441
E-mail: oesIII3@bmi.bund.de
Národní bezpečnostní úřad
(National Security Authority)
Na Popelce 2/16
150 06 Praha 56
Tel.: +420 257283335
Fax: +420 257283110
E-mail: czech.nsa@nbu.cz
Website: www.nbu.cz
National Security Authority Department
Estonian Ministry of Defence
Sakala 1
15094 Tallinn
Tel.: +372 7170113, +372 7170117
Fax: +372 7170213
E-mail: nsa@kmin.ee
National Security Authority
Department of Foreign Affairs
76 - 78 Harcourt Street
Dublin 2
Tel.: +353 14780822
Fax: +353 14082959
Autoridad Nacional de Seguridad
Oficina Nacional de Seguridad
Avenida Padre Huidobro s/n
28023 Madrid
Tel.: +34 913725000
Fax: +34 913725808
E-mail: nsa-sp@areatec.com
Γενικό Επιτελείο Εθνικής Άμυνας (ΓΕΕΘΑ)
Διακλαδική Διεύθυνση Στρατιωτικών Πληροφοριών (ΔΔΣΠ)
Διεύθυνση Ασφαλείας και Αντιπληροφοριών
ΣΤΓ 1020 -Χολαργός (Αθήνα)
Ελλάδα
Τηλ.: +30 2106572045 (ώρες γραφείου)
+ 30 2106572009 (ώρες γραφείου)
Φαξ: +30 2106536279
+ 30 2106577612
Hellenic National Defence General Staff (HNDGS)
Military Intelligence Sectoral Directorate
Security Counterintelligence Directorate
GR-STG 1020 Holargos – Athens
Tel.: +30 2106572045
+30 2106572009
Fax: +30 2106536279
+30 2106577612
Secrétariat général de la défense et de la sécurité nationale
Sous-direction Protection du secret (SGDSN/PSD)
51 Boulevard de la Tour-Maubourg
75700 Paris 07 SP
Tel.: +33 171758177
Fax: + 33 171758200
Presidenza del Consiglio dei Ministri
Autorità Nazionale per la Sicurezza
D.I.S. - U.C.Se.
Via di Santa Susanna, 15
00187 Roma
Tel.: +39 0661174266
Fax: +39 064885273
National Security Authority
Constitution Protection Bureau of the Republic of Latvia
P.O.Box 286
LV-1001 Riga
Tel.: +371 67025418
Fax: +371 67025454
E-mail: ndi@sab.gov.lv
ΥΠΟΥΡΓΕΙΟ ΑΜΥΝΑΣ
ΣΤΡΑΤΙΩΤΙΚΟ ΕΠΙΤΕΛΕΙΟ ΤΟΥ ΥΠΟΥΡΓΟΥ
Εθνική Αρχή Ασφάλειας (ΕΑΑ)
Υπουργείο Άμυνας
Λεωφόρος Εμμανουήλ Ροΐδη 4
1432 Λευκωσία, Κύπρος
Τηλέφωνα: +357 22807569, +357 22807643, +357 22807764
Τηλεομοιότυπο: +357 22302351
Ministry of Defence
Minister’s Military Staff
National Security Authority (NSA)
4 Emanuel Roidi street
1432 Nicosia
Tel.: +357 22807569, +357 22807643, +357 22807764
Fax: +357 22302351
E-mail: cynsa@mod.gov.cy
Lietuvos Respublikos paslapčių apsaugos koordinavimo komisija
(The Commission for Secrets Protection Coordination of the Republic of Lithuania
National Security Authority)
Gedimino 40/1
LT-01110 Vilnius
Tel.: +370 52663201, +370 52663202
Fax: +370 52663200
E-mail: nsa@vsd.lt
Autorité nationale de Sécurité
Boîte postale 2379
1023 Luxembourg
Tel.: +352 24782210 central
+352 24782253 direct
Fax: +352 24782243
Ministerie van Binnenlandse Zaken en Koninkrijksrelaties
Postbus 20010
2500 EA Den Haag
Tel.: +31 703204400
Fax: +31 703200733
Ministerie van Defensie
Beveiligingsautoriteit
Postbus 20701
2500 ES Den Haag
Tel.: +31 703187060
Fax: +31 703187522
Nemzeti Biztonsági Felügyelet
(National Security Authority)
P.O. Box 2
1357 Budapest
Tel.: +361 3469652
Fax: +361 3469658
E-mail: nbf@nbf.hu
Website: www.nbf.hu
Ministry of Justice and Home Affairs
P.O. Box 146
MT-Valletta
Tel.: +356 21249844
Fax: +356 25695321
Informationssicherheitskommission
Bundeskanzleramt
Ballhausplatz 2
1014 Wien
Tel.: +43 1531152594
Fax: +43 1531152615
E-mail: ISK@bka.gv.at
Agencja Bezpieczeństwa Wewnętrznego – ABW
(Internal Security Agency)
2A Rakowiecka St.
00-993 Warszawa
Tel.: +48 225857360
Fax: +48 225858509
E-mail: nsa@abw.gov.pl
Website: www.abw.gov.pl
Służba Kontrwywiadu Wojskowego
(Military Counter-Intelligence Service)
Classified Information Protection Bureau
Oczki 1
02-007 Warszawa
Tel.: +48 226841247
Fax: +48 226841076
E-mail: skw@skw.gov.pl
Oficiul Registrului Național al Informațiilor Secrete de Stat
(Romanian NSA – ORNISS
National Registry Office for Classified Information)
4 Mures Street
012275 Bucharest
Tel.: +40 212245830
Fax: +40 212240714
E-mail: nsa.romania@nsa.ro
Website: www.orniss.ro
Presidência do Conselho de Ministros
Autoridade Nacional de Segurança
Rua da Junqueira, 69
1300-342 Lisboa
Tel.: +351 213031710
Fax: +351 213031711
Urad Vlade RS za varovanje tajnih podatkov
Gregorčičeva 27
1000 Ljubljana
Tel.: +386 14781390
Fax: +386 14781399
Národný bezpečnostný úrad
(National Security Authority)
Budatínska 30
P.O. Box 16
850 07 Bratislava
Tel.: +421 268692314
Fax: +421 263824005
Website: www.nbusr.sk
Utrikesdepartementet
(Ministry for Foreign Affairs)
SSSB
S-103 39 Stockholm
Tel.: +46 84051000
Fax: +46 87231176
E-mail: ud-nsa@foreign.ministry.se
National Security Authority
Ministry for Foreign Affairs
P.O. Box 453
FI-00023 Government
Tel. 1: +358 916056487
Tel. 2: +358 916056484
Fax: +358 916055140
E-mail: NSA@formin.fi
UK National Security Authority
Room 335, 3rd Floor
70 Whitehall
London
SW1A 2AS
Tel. 1: +44 2072765649
Tel. 2: +44 2072765497
Fax: +44 2072765651
E-mail: UK-NSA@cabinet-office.x.gsi.gov.uk
Acronym | Meaning |
---|---|
AQUA | Appropriately Qualified Authority |
BPS | Boundary Protection Services |
CAA | Crypto Approval Authority |
CCTV | Closed Circuit Television |
CDA | Crypto Distribution Authority |
CFSP | Common Foreign and Security Policy |
CIS | Communication and Information Systems handling EUCI |
COREPER | Committee of Permanent Representatives |
CSDP | Common Security and Defence Policy |
DSA | Designated Security Authority |
ECSD | European Commission Security Directorate |
EUCI | EU Classified Information |
EUSR | EU Special Representative |
FSC | Facility Security Clearance |
GSC | General Secretariat of the Council |
IA | Information Assurance |
IAA | Information Assurance Authority |
IDS | Intrusion Detection System |
IT | Information Technology |
NSA | National Security Authority |
PSC | Personnel Security Clearance |
PSCC | Personnel Security Clearance Certificate |
PSI | Programme/Project Security Instructions |
SAA | Security Accreditation Authority |
SAB | Security Accreditation Board |
SAL | Security Aspects Letter |
SecOPs | Security Operating Procedures |
SCG | Security Classification Guide |
SSRS | System-Specific Security Requirement Statement |
TA | TEMPEST Authority |
The Whole Decision you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Y Rhestrau you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.
Would you like to continue?
Y Diweddaraf sydd Ar Gael (diwygiedig):Y fersiwn ddiweddaraf sydd ar gael o’r ddeddfwriaeth yn cynnwys newidiadau a wnaed gan ddeddfwriaeth ddilynol ac wedi eu gweithredu gan ein tîm golygyddol. Gellir gweld y newidiadau nad ydym wedi eu gweithredu i’r testun eto yn yr ardal ‘Newidiadau i Ddeddfwriaeth’.
Gwreiddiol (Fel y’i mabwysiadwyd gan yr UE): Mae'r wreiddiol version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.
Rhychwant ddaearyddol: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.
Dangos Llinell Amser Newidiadau: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.
Gallwch wneud defnydd o ddogfennau atodol hanfodol a gwybodaeth ar gyfer yr eitem ddeddfwriaeth o’r tab hwn. Yn ddibynnol ar yr eitem ddeddfwriaeth sydd i’w gweld, gallai hyn gynnwys:
Mae’r llinell amser yma yn dangos y fersiynau gwahanol a gymerwyd o EUR-Lex yn ogystal ag unrhyw fersiynau dilynol a grëwyd ar ôl y diwrnod ymadael o ganlyniad i newidiadau a wnaed gan ddeddfwriaeth y Deyrnas Unedig.
Cymerir dyddiadau fersiynau’r UE o ddyddiadau’r dogfennau ar EUR-Lex ac efallai na fyddant yn cyfateb â’r adeg pan ddaeth y newidiadau i rym ar gyfer y ddogfen.
Ar gyfer unrhyw fersiynau a grëwyd ar ôl y diwrnod ymadael o ganlyniad i newidiadau a wnaed gan ddeddfwriaeth y Deyrnas Unedig, bydd y dyddiad yn cyd-fynd â’r dyddiad cynharaf y daeth y newid (e.e. ychwanegiad, diddymiad neu gyfnewidiad) a weithredwyd i rym. Am ragor o wybodaeth gweler ein canllaw i ddeddfwriaeth ddiwygiedig ar Ddeall Deddfwriaeth.
Defnyddiwch y ddewislen hon i agor dogfennau hanfodol sy’n cyd-fynd â’r ddeddfwriaeth a gwybodaeth am yr eitem hon o ddeddfwriaeth. Gan ddibynnu ar yr eitem o ddeddfwriaeth sy’n cael ei gweld gall hyn gynnwys:
liciwch ‘Gweld Mwy’ neu ddewis ‘Rhagor o Adnoddau’ am wybodaeth ychwanegol gan gynnwys