Search Legislation

Council Decision of 19 March 2001 adopting the Council's security regulations (2001/264/EC) (repealed)

 Help about what version

What Version

 Help about UK-EU Regulation

Legislation originating from the EU

When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.

Close

This item of legislation originated from the EU

Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).

Changes to legislation:

This version of this Decision was derived from EUR-Lex on IP completion day (31 December 2020 11:00 p.m.). It has not been amended by the UK since then. Find out more about legislation originating from the EU as published on legislation.gov.uk. Help about Changes to Legislation

Close

Changes to Legislation

Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.

  1. Introductory Text

  2. Article 1.. . . . . . . . . ....

  3. Article 2.. . . . . . . . . ....

  4. Article 3.. . . . . . . . . ....

  5. Article 4.. . . . . . . . . ....

  6. Article 5.. . . . . . . . . ....

    1. ANNEX

      SECURITY REGULATIONS OF THE COUNCIL OF THE EUROPEAN UNION

      1. PART I BASIC PRINCIPLES AND MINIMUM STANDARDS OF SECURITY

        1. INTRODUCTION

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. 5. . . . . . . . . . ....

          6. 6. . . . . . . . . . ....

        2. BASIC PRINCIPLES

          1. 7. . . . . . . . . . ....

        3. ORGANISATION OF SECURITY

          1. Common minimum standards

            1. 8. . . . . . . . . . ....

        4. SECURITY OF PERSONNEL

          1. Clearance of personnel

            1. 9. . . . . . . . . . ....

            2. 10. . . . . . . . . . ....

          2. Records of personnel clearances

            1. 11. . . . . . . . . . ....

          3. Security instruction of personnel

            1. 12. . . . . . . . . . ....

          4. Management responsibilities

            1. 13. . . . . . . . . . ....

          5. Security status of personnel

            1. 14. . . . . . . . . . ....

        5. PHYSICAL SECURITY

          1. Need for protection

            1. 15. . . . . . . . . . ....

          2. Checking

            1. 16. . . . . . . . . . ....

          3. Security of buildings

            1. 17. . . . . . . . . . ....

            2. 18. . . . . . . . . . ....

          4. Contingency plans

            1. 19. . . . . . . . . . ....

        6. SECURITY OF INFORMATION (INFOSEC)

          1. 20. . . . . . . . . . ....

        7. COUNTER-SABOTAGE AND OTHER FORMS OF MALICIOUS WILFUL DAMAGE

          1. 21. . . . . . . . . . ....

        8. RELEASE OF CLASSIFIED INFORMATION TO THIRD STATES OR INTERNATIONAL ORGANISATIONS...

          1. 22. . . . . . . . . . ....

          2. 23. . . . . . . . . . ....

          3. 24. . . . . . . . . . ....

      2. PART II

        1. SECTION I THE ORGANISATION OF SECURITY IN THE COUNCIL OF THE EUROPEAN UNION

          1. The Secretary-General/High Representative

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

          2. The Security Committee of the Council

            1. 3. . . . . . . . . . ....

            2. 4. . . . . . . . . . ....

          3. The Security Office of the General Secretariat of the Council...

            1. 5. . . . . . . . . . ....

            2. 6. . . . . . . . . . ....

            3. 7. . . . . . . . . . ....

          4. EU decentralised agencies

            1. 8. . . . . . . . . . ....

          5. Member States

            1. 9. . . . . . . . . . ....

            2. 10. . . . . . . . . . ....

          6. Mutual security inspections

            1. 11. . . . . . . . . . ....

            2. 12. . . . . . . . . . ....

        2. SECTION II CLASSIFICATIONS AND MARKINGS

          1. LEVELS OF CLASSIFICATION

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

            3. 3. . . . . . . . . . ....

            4. 4. . . . . . . . . . ....

          2. MARKINGS

            1. 5. . . . . . . . . . ....

            2. 6. . . . . . . . . . ....

            3. 7. . . . . . . . . . ....

          3. AFFIXING OF CLASSIFICATION AND MARKINGS

            1. 8. . . . . . . . . . ....

        3. SECTION III CLASSIFICATION MANAGEMENT

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. APPLICATION OF CLASSIFICATIONS

            1. 5. . . . . . . . . . ....

            2. 6. . . . . . . . . . ....

            3. 7. . . . . . . . . . ....

            4. 8. . . . . . . . . . ....

          6. DOWNGRADING AND DECLASSIFICATION

            1. 9. . . . . . . . . . ....

            2. 10. . . . . . . . . . ....

        4. SECTION IV PHYSICAL SECURITY

          1. GENERAL

            1. 1. . . . . . . . . . ....

          2. SECURITY REQUIREMENTS

            1. 2. . . . . . . . . . ....

            2. 3. . . . . . . . . . ....

            3. 4. . . . . . . . . . ....

          3. PHYSICAL SECURITY MEASURES

            1. Security areas

              1. 5. . . . . . . . . . ....

            2. Administrative area

              1. 6. . . . . . . . . . ....

            3. Entry and exit controls

              1. 7. . . . . . . . . . ....

            4. Guard patrols

              1. 8. . . . . . . . . . ....

            5. Security containers and strong rooms

              1. 9. . . . . . . . . . ....

              2. 10. . . . . . . . . . ....

            6. Locks

              1. 11. . . . . . . . . . ....

            7. Control of keys and combinations

              1. 12. . . . . . . . . . ....

              2. 13. . . . . . . . . . ....

            8. Intrusion detection devices

              1. 14. . . . . . . . . . ....

            9. Approved equipment

              1. 15. . . . . . . . . . ....

            10. Physical protection of copying and telefax machines

              1. 16. . . . . . . . . . ....

          4. PROTECTION AGAINST OVERLOOKING AND EAVESDROPPING

            1. Overlooking

              1. 17. . . . . . . . . . ....

            2. Eavesdropping

              1. 18. . . . . . . . . . ....

              2. 19. . . . . . . . . . ....

              3. 20. . . . . . . . . . ....

          5. TECHNICALLY SECURE AREAS

            1. 21. . . . . . . . . . ....

            2. 22. . . . . . . . . . ....

        5. SECTION V GENERAL RULES ON THE NEED-TO-KNOW PRINCIPLE AND SECURITY CLEARANCE

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. SPECIFIC RULES ON ACCESS TO TRÈS SECRET UE/EU TOP SECRET...

            1. 5. . . . . . . . . . ....

            2. 6. . . . . . . . . . ....

            3. 7. . . . . . . . . . ....

            4. 8. . . . . . . . . . ....

            5. 9. . . . . . . . . . ....

          6. SPECIFIC RULES ON ACCESS TO SECRET UE AND CONFIDENTIEL UE...

            1. 10. . . . . . . . . . ....

            2. 11. . . . . . . . . . ....

            3. 12. . . . . . . . . . ....

          7. SPECIFIC RULES ON ACCESS TO RESTREINT UE INFORMATION

            1. 13. . . . . . . . . . ....

          8. TRANSFERS

            1. 14. . . . . . . . . . ....

          9. SPECIAL INSTRUCTIONS

            1. 15. . . . . . . . . . ....

            2. 16. . . . . . . . . . ....

            3. 17. . . . . . . . . . ....

        6. SECTION VI SECURITY CLEARANCE PROCEDURE FOR GSC OFFICIALS AND OTHER SERVANTS

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. 5. . . . . . . . . . ....

          6. 6. . . . . . . . . . ....

          7. 7. . . . . . . . . . ....

          8. 8. . . . . . . . . . ....

          9. 9. . . . . . . . . . ....

          10. 10. . . . . . . . . . ....

          11. 11. . . . . . . . . . ....

          12. 12. . . . . . . . . . ....

          13. 13. . . . . . . . . . ....

          14. 14. . . . . . . . . . ....

          15. 15. . . . . . . . . . ....

          16. 16. . . . . . . . . . ....

        7. SECTION VII PREPARATION, DISTRIBUTION, TRANSMISSION, STORAGE AND DESTRUCTION OF EU CLASSIFIED MATERIAL

          1. General provisions

            1. Chapter I Preparation and distribution of EU classified documents

              1. PREPARATION

                1. 1. . . . . . . . . . ....

                2. 2. . . . . . . . . . ....

              2. DISTRIBUTION

                1. 3. . . . . . . . . . ....

                2. 4. . . . . . . . . . ....

                3. 5. . . . . . . . . . ....

                4. 6. . . . . . . . . . ....

            2. Chapter II Transmission of EU classified documents

              1. PACKAGING

                1. 7. . . . . . . . . . ....

                2. 8. . . . . . . . . . ....

                3. 9. . . . . . . . . . ....

                4. 10. . . . . . . . . . ....

                5. 11. . . . . . . . . . ....

              2. TRANSMISSION WITHIN A BUILDING OR GROUP OF BUILDINGS

                1. 12. . . . . . . . . . ....

              3. TRANSMISSION OF EU DOCUMENTS WITHIN A COUNTRY

                1. 13. . . . . . . . . . ....

                2. 14. . . . . . . . . . ....

                3. 15. . . . . . . . . . ....

                4. 16. . . . . . . . . . ....

                5. 17. . . . . . . . . . ....

              4. TRANSMISSION FROM ONE MEMBER STATE TO ANOTHER

                1. 18. . . . . . . . . . ....

                2. 19. . . . . . . . . . ....

                3. 20. . . . . . . . . . ....

              5. TRANSMISSION OF RESTREINT UE DOCUMENTS

                1. 21. . . . . . . . . . ....

              6. COURIER PERSONNEL SECURITY

                1. 22. . . . . . . . . . ....

            3. Chapter III Electrical and other means of technical transmission

              1. 23. . . . . . . . . . ....

              2. 24. . . . . . . . . . ....

            4. Chapter IV Extra copies and translations of and extracts from EU classified...

              1. 25. . . . . . . . . . ....

              2. 26. . . . . . . . . . ....

              3. 27. . . . . . . . . . ....

            5. Chapter V Musters and checks, storage and destruction of EU classified documents...

              1. MUSTERS AND CHECKS

                1. 28. . . . . . . . . . ....

              2. ARCHIVE STORAGE OF EU CLASSIFIED INFORMATION

                1. 29. . . . . . . . . . ....

                2. 30. . . . . . . . . . ....

              3. ROUTINE DESTRUCTION OF EU CLASSIFIED DOCUMENTS

                1. 31. . . . . . . . . . ....

                2. 32. . . . . . . . . . ....

                3. 33. . . . . . . . . . ....

                4. 34. . . . . . . . . . ....

              4. DESTRUCTION IN EMERGENCIES

                1. 35. . . . . . . . . . ....

                2. 36. . . . . . . . . . ....

            6. CHAPTER VI Specific rules applicable to documents intended for the Council

              1. 37. . . . . . . . . . ....

              2. 38. . . . . . . . . . ....

              3. 39. . . . . . . . . . ....

        8. SECTION VIII TRÈS SECRET UE/EU TOP SECRET REGISTRIES

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. 5. . . . . . . . . . ....

          6. 6. . . . . . . . . . ....

          7. CENTRAL TRÈS SECRET UE/EU TOP SECRET REGISTRIES

            1. 7. . . . . . . . . . ....

          8. TRÈS SECRET UE/EU TOP SECRET SUBREGISTRIES

            1. 8. . . . . . . . . . ....

          9. INVENTORIES

            1. 9. . . . . . . . . . ....

            2. 10. . . . . . . . . . ....

            3. 11. . . . . . . . . . ....

        9. SECTION IX SECURITY MEASURES TO BE APPLIED AT THE TIME OF SPECIFIC MEETINGS HELD OUTSIDE THE COUNCIL PREMISES AND INVOLVING HIGH SENSITIVITY ISSUES

          1. GENERAL

            1. 1. . . . . . . . . . ....

          2. RESPONSIBILITIES

            1. Host Member States

              1. 2. . . . . . . . . . ....

            2. Member States

              1. 3. . . . . . . . . . ....

            3. Meeting Security Officer

              1. 4. . . . . . . . . . ....

            4. GSC Security Office

              1. 5. . . . . . . . . . ....

              2. 6. . . . . . . . . . ....

          3. SECURITY MEASURES

            1. Security areas

              1. 7. . . . . . . . . . ....

            2. Passes

              1. 8. . . . . . . . . . ....

              2. 9. . . . . . . . . . ....

              3. 10. . . . . . . . . . ....

            3. Control of photographic and audio equipment

              1. 11. . . . . . . . . . ....

            4. Checking of briefcases, portable computers and packages

              1. 12. . . . . . . . . . ....

            5. Technical security

              1. 13. . . . . . . . . . ....

            6. Delegations' documents

              1. 14. . . . . . . . . . ....

            7. Safe custody of documents

              1. 15. . . . . . . . . . ....

            8. Inspection of offices

              1. 16. . . . . . . . . . ....

            9. Disposal of EU classified waste

              1. 17. . . . . . . . . . ....

              2. 18. . . . . . . . . . ....

        10. SECTION X BREACHES OF SECURITY AND COMPROMISE OF EU CLASSIFIED INFORMATION

          1. 1. . . . . . . . . . ....

          2. 2. . . . . . . . . . ....

          3. 3. . . . . . . . . . ....

          4. 4. . . . . . . . . . ....

          5. 5. . . . . . . . . . ....

          6. 6. . . . . . . . . . ....

          7. 7. . . . . . . . . . ....

          8. 8. . . . . . . . . . ....

          9. 9. . . . . . . . . . ....

          10. 10. . . . . . . . . . ....

        11. SECTION XI PROTECTION OF INFORMATION HANDLED IN INFORMATION TECHNOLOGY AND COMMUNICATION SYSTEMS

          1. Chapter I Introduction

            1. GENERAL ASPECTS

              1. 1. . . . . . . . . . ....

              2. 2. . . . . . . . . . ....

              3. 3. . . . . . . . . . ....

            2. THREATS TO, AND VULNERABILITIES OF SYSTEMS

              1. 4. . . . . . . . . . ....

              2. 5. . . . . . . . . . ....

            3. SECURITY MEASURES

              1. 6. . . . . . . . . . ....

              2. 7. . . . . . . . . . ....

              3. 8. . . . . . . . . . ....

            4. SYSTEM-SPECIFIC SECURITY REQUIREMENT STATEMENT (SSRS)

              1. 9. . . . . . . . . . ....

              2. 10. . . . . . . . . . ....

              3. 11. . . . . . . . . . ....

              4. 12. . . . . . . . . . ....

            5. SECURITY MODES OF OPERATION

              1. 13. . . . . . . . . . ....

          2. Chapter II Definitions

            1. ADDITIONAL MARKINGS

              1. 14. . . . . . . . . . ....

              2. 15. . . . . . . . . . ....

              3. 16. . . . . . . . . . ....

              4. 17. . . . . . . . . . ....

              5. 18. . . . . . . . . . ....

              6. 19. . . . . . . . . . ....

              7. 20. . . . . . . . . . ....

              8. 21. . . . . . . . . . ....

              9. 22. . . . . . . . . . ....

              10. 23. . . . . . . . . . ....

              11. 24. . . . . . . . . . ....

              12. 25. . . . . . . . . . ....

              13. 26. . . . . . . . . . ....

              14. 27. . . . . . . . . . ....

              15. 28. . . . . . . . . . ....

              16. 29. . . . . . . . . . ....

              17. 30. . . . . . . . . . ....

              18. 31. . . . . . . . . . ....

          3. Chapter III Security responsibilities

            1. GENERALITIES

              1. 32. . . . . . . . . . ....

              2. 33. . . . . . . . . . ....

              3. 34. . . . . . . . . . ....

            2. SECURITY ACCREDITATION AUTHORITY (SAA)

              1. 35. . . . . . . . . . ....

              2. 36. . . . . . . . . . ....

            3. INFOSEC AUTHORITY (IA)

              1. 37. . . . . . . . . . ....

            4. IT SYSTEM OPERATIONAL AUTHORITY (ITSOA)

              1. 38. . . . . . . . . . ....

              2. 39. . . . . . . . . . ....

              3. 40. . . . . . . . . . ....

            5. USERS

              1. 41. . . . . . . . . . ....

            6. INFOSEC TRAINING

              1. 42. . . . . . . . . . ....

          4. Chapter IV Non-technical security measures

            1. PERSONNEL SECURITY

              1. 43. . . . . . . . . . ....

              2. 44. . . . . . . . . . ....

              3. 45. . . . . . . . . . ....

            2. PHYSICAL SECURITY

              1. 46. . . . . . . . . . ....

              2. 47. . . . . . . . . . ....

            3. CONTROL OF ACCESS TO A SYSTEM

              1. 48. . . . . . . . . . ....

              2. 49. . . . . . . . . . ....

          5. Chapter V Technical security measures

            1. SECURITY OF INFORMATION

              1. 50. . . . . . . . . . ....

              2. 51. . . . . . . . . . ....

              3. 52. . . . . . . . . . ....

              4. 53. . . . . . . . . . ....

              5. 54. . . . . . . . . . ....

              6. 55. . . . . . . . . . ....

            2. CONTROL AND ACCOUNTABILITY OF INFORMATION

              1. 56. . . . . . . . . . ....

              2. 57. . . . . . . . . . ....

              3. 58. . . . . . . . . . ....

            3. HANDLING AND CONTROL OF REMOVABLE COMPUTER STORAGE MEDIA

              1. 59. . . . . . . . . . ....

              2. 60. . . . . . . . . . ....

            4. DECLASSIFICATION AND DESTRUCTION OF COMPUTER STORAGE MEDIA

              1. 61. . . . . . . . . . ....

              2. 62. . . . . . . . . . ....

              3. 63. . . . . . . . . . ....

            5. COMMUNICATIONS SECURITY

              1. 64. . . . . . . . . . ....

              2. 65. . . . . . . . . . ....

              3. 66. . . . . . . . . . ....

              4. 67. . . . . . . . . . ....

              5. 68. . . . . . . . . . ....

              6. 69. . . . . . . . . . ....

            6. INSTALLATION AND RADIATION SECURITY

              1. 70. . . . . . . . . . ....

              2. 71. . . . . . . . . . ....

              3. 72. . . . . . . . . . ....

              4. 73. . . . . . . . . . ....

          6. Chapter VI Security during handling

            1. SECURITY OPERATING PROCEDURES

              1. 74. . . . . . . . . . ....

            2. SOFTWARE PROTECTION/CONFIGURATION MANAGEMENT

              1. 75. . . . . . . . . . ....

              2. 76. . . . . . . . . . ....

            3. CHECKING FOR THE PRESENCE OF MALICIOUS SOFTWARE/COMPUTER VIRUSES

              1. 77. . . . . . . . . . ....

              2. 78. . . . . . . . . . ....

            4. MAINTENANCE

              1. 79. . . . . . . . . . ....

              2. 80. . . . . . . . . . ....

          7. Chapter VII Procurement

            1. 81. . . . . . . . . . ....

            2. 82. . . . . . . . . . ....

            3. ACCREDITATION

              1. 83. . . . . . . . . . ....

              2. 84. . . . . . . . . . ....

            4. EVALUATION AND CERTIFICATION

              1. 85. . . . . . . . . . ....

              2. 86. . . . . . . . . . ....

              3. 87. . . . . . . . . . ....

              4. 88. . . . . . . . . . ....

              5. 89. . . . . . . . . . ....

            5. ROUTINE CHECKING OF SECURITY FEATURES FOR CONTINUED ACCREDITATION

              1. 90. . . . . . . . . . ....

              2. 91. . . . . . . . . . ....

              3. 92. . . . . . . . . . ....

          8. Chapter VIII Temporary or occasional use

            1. SECURITY OF MICROCOMPUTERS/PERSONAL COMPUTERS

              1. 93. . . . . . . . . . ....

              2. 94. . . . . . . . . . ....

            2. USE OF PRIVATELY-OWNED IT EQUIPMENT FOR OFFICIAL COUNCIL WORK

              1. 95. . . . . . . . . . ....

              2. 96. . . . . . . . . . ....

            3. USE OF THE CONTRACTOR-OWNED OR NATIONALLY-SUPPLIED IT EQUIPMENT FOR OFFICIAL...

              1. 97. . . . . . . . . . ....

        12. SECTION XII RELEASE OF EU CLASSIFIED INFORMATION TO THIRD STATES OR INTERNATIONAL ORGANISATIONS

          1. PRINCIPLES REGULATING THE RELEASE OF EU CLASSIFIED INFORMATION

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

            3. 3. . . . . . . . . . ....

          2. LEVELS

            1. 4. . . . . . . . . . ....

            2. 5. . . . . . . . . . ....

            3. 6. . . . . . . . . . ....

          3. THE AGREEMENTS

            1. 7. . . . . . . . . . ....

            2. 8. . . . . . . . . . ....

            3. 9. . . . . . . . . . ....

            4. 10. . . . . . . . . . ....

        13. SECTION XIII COMMON MINIMUM STANDARDS ON INDUSTRIAL SECURITY

          1. 1. . . . . . . . . . ....

          2. DEFINITIONS

            1. 2. For the purposes of these common minimum standards, the following...

          3. ORGANISATION

            1. 3. . . . . . . . . . ....

            2. 4. . . . . . . . . . ....

            3. 5. . . . . . . . . . ....

            4. 6. . . . . . . . . . ....

            5. 7. . . . . . . . . . ....

          4. CLASSIFIED CONTRACTS

            1. 8. The security classification of classified contracts must take account of...

            2. 9. . . . . . . . . . ....

            3. 10. . . . . . . . . . ....

            4. 11. . . . . . . . . . ....

            5. 12. . . . . . . . . . ....

            6. 13. . . . . . . . . . ....

            7. 14. . . . . . . . . . ....

            8. 15. . . . . . . . . . ....

            9. 16. . . . . . . . . . ....

            10. 17. . . . . . . . . . ....

            11. 18. . . . . . . . . . ....

            12. 19. . . . . . . . . . ....

            13. 20. . . . . . . . . . ....

            14. 21. . . . . . . . . . ....

            15. 22. . . . . . . . . . ....

          5. VISITS

            1. 23. . . . . . . . . . ....

          6. TRANSMISSION AND TRANSPORTATION OF EU CLASSIFIED INFORMATION

            1. 24. . . . . . . . . . ....

            2. 25. The international transportation of EU classified material relating to classified...

      3. Appendix 1

        1. List of national security authorities

          1. BELGIUM

          2. BULGARIA

          3. CZECH REPUBLIC

          4. DENMARK

          5. GERMANY

          6. ESTONIA

          7. GREECE

          8. SPAIN

          9. FRANCE

          10. IRELAND

          11. ITALY

          12. CYPRUS

          13. LATVIA

          14. LITHUANIA

          15. LUXEMBOURG

          16. HUNGARY

          17. MALTA

          18. NETHERLANDS

          19. AUSTRIA

          20. POLAND

          21. PORTUGAL

          22. ROMANIA

          23. SLOVENIA

          24. SLOVAKIA

          25. FINLAND

          26. SWEDEN

          27. UNITED KINGDOM

      4. Appendix 2

      5. Appendix 3

        Practical classification guide

        1. . . . . . . . . . ....

      6. Appendix 4

        Guidelines for release of EU classified information to third States or international organisations

        1. Level 1 Cooperation

          1. PROCEDURES

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

            3. 3. . . . . . . . . . ....

            4. 4. . . . . . . . . . ....

            5. 5. . . . . . . . . . ....

          2. SECURITY REGULATIONS TO BE APPLIED BY BENEFICIARIES

            1. 6. . . . . . . . . . ....

            2. 7. . . . . . . . . . ....

            3. 8. . . . . . . . . . ....

            4. 9. . . . . . . . . . ....

            5. 10. . . . . . . . . . ....

            6. 11. . . . . . . . . . ....

            7. 12. . . . . . . . . . ....

            8. 13. . . . . . . . . . ....

            9. 14. . . . . . . . . . ....

            10. 15. . . . . . . . . . ....

      7. Appendix 5

        Guidelines for release of EU classified information to third States or international organisations

        1. Level 2 Cooperation

          1. PROCEDURES

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

            3. 3. . . . . . . . . . ....

            4. 4. . . . . . . . . . ....

            5. 5. . . . . . . . . . ....

            6. 6. . . . . . . . . . ....

          2. SECURITY REGULATIONS TO BE APPLIED BY BENEFICIARIES

            1. 7. . . . . . . . . . ....

            2. 8. . . . . . . . . . ....

            3. 9. . . . . . . . . . ....

            4. 10. . . . . . . . . . ....

            5. 11. . . . . . . . . . ....

            6. 12. . . . . . . . . . ....

            7. 13. . . . . . . . . . ....

            8. 14. . . . . . . . . . ....

            9. 15. . . . . . . . . . ....

            10. 16. . . . . . . . . . ....

            11. 17. . . . . . . . . . ....

      8. Appendix 6

        Guidelines for release of EU classified information to third States or international organisations

        1. Level 3 Cooperation

          1. PROCEDURES

            1. 1. . . . . . . . . . ....

            2. 2. . . . . . . . . . ....

            3. 3. . . . . . . . . . ....

            4. 4. . . . . . . . . . ....

            5. 5. . . . . . . . . . ....

            6. 6. . . . . . . . . . ....

            7. 7. . . . . . . . . . ....

            8. 8. . . . . . . . . . ....

            9. 9. . . . . . . . . . ....

            10. 10. . . . . . . . . . ....

          2. SECURITY REGULATIONS TO BE APPLIED BY BENEFICIARIES

            1. 11. . . . . . . . . . ....

            2. 12. . . . . . . . . . ....

            3. 13. . . . . . . . . . ....

            4. 14. . . . . . . . . . ....

            5. 15. . . . . . . . . . ....

            6. 16. . . . . . . . . . ....

Back to top

Options/Help

Print Options

You have chosen to open the Whole Decision

The Whole Decision you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

You have chosen to open Schedules only

The Schedules you have selected contains over 200 provisions and might take some time to download. You may also experience some issues with your browser, such as an alert box that a script is taking a long time to run.

Would you like to continue?

Close

Legislation is available in different versions:

Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.

Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.

Close

Opening Options

Different options to open legislation in order to view more content on screen at once

Close

More Resources

Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the EU Official Journal
  • lists of changes made by and/or affecting this legislation item
  • all formats of all associated documents
  • correction slips
  • links to related legislation and further information resources
Close

Timeline of Changes

This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.

The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.

For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.

Close

More Resources

Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the print copy
  • correction slips

Click 'View More' or select 'More Resources' tab for additional information including:

  • lists of changes made by and/or affecting this legislation item
  • confers power and blanket amendment details
  • all formats of all associated documents
  • links to related legislation and further information resources