6 CFR 29
Listed by: NARA Registry, DoD Registry, Related authorities
Designation evidence
- NARA authority row: 6 CFR 29 | status: Specified | banner: CUI//SP-PCII.
- NARA sanctions field: 6 CFR 29.9.
- DoD authority row: 6 CFR 29. DoD lists this citation for the category; this DoD detail page does not display a separate Basic/Specified field.
- Related authority evidence: 6 CFR 29 | status: Specified | banner: CUI//SP-PCII | sanctions: 6 CFR 29.9
- Related authority evidence: DoD lists this authority for the category; the linked authority text is extracted below when available.
- Registry designation context: Specified, CUI//SP-PCII. The linked authority text contains category-scope or applicability language that helps determine when the information falls within this CUI category. The linked authority text contains disclosure, access, protection, release, dissemination, or distribution-control language relevant to handling. The linked authority text contains violation, penalty, sanction, or enforcement language that may affect consequences for mishandling.
- Registry designation for this category is Specified with banner CUI//SP-PCII.
Extracted authority meaning
- PART 29—PROTECTED CRITICAL
- Registry designation context: Specified, CUI//SP-PCII. The linked authority text contains category-scope or applicability language that helps determine when the information falls within this CUI category. The linked authority text contains disclosure, access, protection, release, dissemination, or distribution-control language relevant to handling. The linked authority text contains violation, penalty, sanction, or enforcement language that may affect consequences for mishandling.
Operating conditions
- NARA category scope used with this authority: As defined by 6 USC 131-134, and 6 CFR 29, PCII relates to threats, vulnerabilities, or operational experience related to the national infrastructure. PCII offers protection to private sector infrastructure information voluntarily shared with government entities for purposes of homeland security.
- DoD category scope used with this authority: PCII relates to threats, vulnerabilities, or operational experience related to the national infrastructure. PCII offers protection to private sector infrastructure information voluntarily shared with government entities for purposes of homeland security.
- 6 CFR 29 | status: Specified | banner: CUI//SP-PCII | sanctions: 6 CFR 29.9
- DoD lists this authority for the category; the linked authority text is extracted below when available.
- NARA registry status: Specified. Per-authority NARA status values: Specified. NARA banner marking evidence: CUI//SP-PCII. The registry evidence is preserved here; detailed primary-law or regulation text analysis remains pending for this category.
- NARA category scope: As defined by 6 USC 131-134, and 6 CFR 29, PCII relates to threats, vulnerabilities, or operational experience related to the national infrastructure. PCII offers protection to private sector infrastructure information voluntarily shared with government entities for purposes of homeland security.
- DoD category scope: PCII relates to threats, vulnerabilities, or operational experience related to the national infrastructure. PCII offers protection to private sector infrastructure information voluntarily shared with government entities for purposes of homeland security.
- Extracted authority condition: (a) CII shall receive the protections of section 214 of the CII Act when: (1) Such information is voluntarily submitted, directly or indirectly, to the PCII Program Manager or the PCII Program Manager’s designee; (2) The information is submitted for protected use regarding the security of critical infrastructure or protected sys- tems, analysis, warning, interdepend- ency study, recovery, reconstitution, or other appropriate purposes includ- ing, without limitation, for the identi- fication, analysis, prevention, preemp- tion, disruption, defense against and/or mitigation of terrorist threats to the homeland; (3) The information is labeled with an express statement as follows: (i) In the case of documentary sub- missions, written marking on the in- formation or records substantially similar to the following: ‘‘This infor- mation is voluntarily submitted to the Federal government in expectation of protection from disclosure as provided by the provisions of the Critical Infra- structure Information Act of 2002’’; or (ii) In the case of oral information: (A) Through an oral statement, made at the time of the oral submission or within a reasonable period thereafter, indicating an expectation of protection from disclosure as provided by the pro- visions of the CII Act;...
- Extracted authority condition: (b) Critical Infrastructure Information, or CII, has the same meaning as estab- lished in section 212 of the CII Act of 2002 and means information not cus- tomarily in the public domain and re- lated to the security of critical infra- structure or protected systems, includ- ing documents, records or other infor- mation concerning: (1) Actual, potential, or threatened interference with, attack on, com- promise of, or incapacitation of critical infrastructure or protected systems by either physical or computer-based at- tack or other similar conduct (includ- ing the misuse of or unauthorized ac- cess to all types of communications and data transmission systems) that violates Federal, State, local, or tribal law, harms interstate commerce of the United States, or threatens public health or safety; (2) The ability of any critical infra- structure or protected system to resist such interference, compromise, or inca- pacitation, including any planned or
- Extracted authority condition: I (1–1–19 Edition) § 29.7 (C) Advise the submitting person or entity that the submission can be with- drawn at any time before a final deter- mination is made; (D) Notify the submitting person or entity that until a final determination is made the submission will be treated as PCII; (E) Notify the submitting person or entity that any response to the notifi- cation must be received by the PCII Program Office no later than thirty calendar days after the date of the no- tification; and (F) Request the submitting person or entity to state whether, in the event the PCII Program Office makes a final determination that any such informa- tion is not PCII, the submitting person or entity prefers that the information be maintained without the protections of the CII Act or returned to the sub- mitter or destroyed.
Safeguarding and dissemination controls
- NARA registry control evidence: status Specified; banner marking CUI//SP-PCII.
- DoD applicable policies: DoDD 3020.40, DoDI 3020.45
- Nara basic or specified: Specified
- Nara authority rows: 6 CFR 29 | status: Specified | banner: CUI//SP-PCII | sanctions: 6 CFR 29.9
- Nara banner markings: CUI//SP-PCII
- Nara sanctions: 6 CFR 29.9
- Dod applicable policies: DoDD 3020.40, DoDI 3020.45
- No DoD required dissemination control is listed on the registry page. Apply approved limited dissemination controls only when required or permitted by the designating agency or governing authority.
- Use the registry assertions, NARA authority rows, DoD authorities, DoD policies, warning statements, required dissemination controls, and examples first. Where the cited authority does not specify a handling detail, apply CUI Basic safeguards and dissemination rules so long as they do not conflict with the authority or agency-specific controls.
- Extracted authority control: Notice of the final change in status of PCII shall be pro- vided to all recipients of that PCII under 6 CFR 29.8. § 29.7 Safeguarding of Protected Crit- ical Infrastructure Information.
- Extracted authority control: (4) The issuance of advisories, notices and warnings related to the protection of critical infrastructure or protected systems in such a manner as to protect from unauthorized disclosure the source of critical infrastructure infor- mation that forms the basis of the warning, and any information that is proprietary or business sensitive, might be used to identify the submit- ting person or entity, or is otherwise not appropriately in the public domain.
- Extracted authority control: As required by the CII Act, these rules establish procedures regarding: (1) The acknowledgement of receipt by DHS of voluntarily submitted CII; (2) The receipt, validation, handling, storage, proper marking and use of in- formation as PCII; (3) The safeguarding and mainte- nance of the confidentiality of such in- formation, appropriate sharing of such information with State and local gov- ernments pursuant to section 214(a) through (g) of the HSA.
- Extracted authority control: (a) CII shall receive the protections of section 214 of the CII Act when: (1) Such information is voluntarily submitted, directly or indirectly, to the PCII Program Manager or the PCII Program Manager’s designee; (2) The information is submitted for protected use regarding the security of critical infrastructure or protected sys- tems, analysis, warning, interdepend- ency study, recovery, reconstitution, or other appropriate purposes includ- ing, without limitation, for the identi- fication, analysis, prevention, preemp- tion, disruption, defense against and/or mitigation of terrorist threats to the homeland; (3) The information is labeled with an express statement as follows: (i) In the case of documentary sub- missions, written marking on the in- formation or records substantially similar to the following: ‘‘This infor- mation is voluntarily submitted to the Federal government in expectation of protection from disclosure as provided by the provisions of the Critical Infra- structure Information Act of 2002’’; or (ii) In the case of oral information: (A) Through an oral statement, made at the time of the oral submission or within a reasonable period thereafter, indicating an expectation of protection from disclosure as provided by the pro- visions of the CII Act;...
- Extracted authority control: Pursuant to section 214(a)(1)(C) of the Homeland Security Act of 2002, PCII shall not, without the written consent of the person or entity submit- ting such information, be used directly by any Federal, State or local author- ity, or by any third party, in any civil action arising under Federal, State, local, or tribal law. § 29.9 Investigation and reporting of violation of PCII procedures.
- Extracted authority control: PCII may be provided to a State or local government entity for the purpose of protecting critical infrastructure or protected systems, or in furtherance of an investigation or the prosecution of a criminal act.
Authority excerpts
Most relevant extracted authority passageNotice of the final change in status of PCII shall be pro- vided to all recipients of that PCII under 6 CFR 29.8. § 29.7 Safeguarding of Protected Crit- ical Infrastructure Information.
Extracted authority passage 2(4) The issuance of advisories, notices and warnings related to the protection of critical infrastructure or protected systems in such a manner as to protect from unauthorized disclosure the source of critical infrastructure infor- mation that forms the basis of the warning, and any information that is proprietary or business sensitive, might be used to identify the submit- ting person or entity, or is otherwise not appropriately in the public domain.
Extracted authority passage 4As required by the CII Act, these rules establish procedures regarding: (1) The acknowledgement of receipt by DHS of voluntarily submitted CII; (2) The receipt, validation, handling, storage, proper marking and use of in- formation as PCII; (3) The safeguarding and mainte- nance of the confidentiality of such in- formation, appropriate sharing of such information with State and local gov- ernments pursuant to section 214(a) through (g) of the HSA.
Extracted authority passage 5(a) CII shall receive the protections of section 214 of the CII Act when: (1) Such information is voluntarily submitted, directly or indirectly, to the PCII Program Manager or the PCII Program Manager’s designee; (2) The information is submitted for protected use regarding the security of critical infrastructure or protected sys- tems, analysis, warning, interdepend- ency study, recovery, reconstitution, or other appropriate purposes includ- ing, without limitation, for the identi- fication, analysis, prevention, preemp- tion, disruption, defense against and/or mitigation of terrorist threats to the homeland; (3) The information is labeled with an express statement as follows: (i) In the case of documentary sub- missions, written marking on the in- formation or records substantially similar to the following: ‘‘This infor- mation is voluntarily submitted to the Federal government in expectation of protection from disclosure as provided by the provisions of the Critical Infra- structure Information Act of 2002’’; or (ii) In the case of oral information: (A) Through an oral statement, made at the time of the oral submission or within a reasonable period thereafter, indicating an expectation of protection from disclosure as provided by the pro- visions of the CII Act;...