Ms. Vakare Valaitis December 30, 2016 Page 1 James A. Hughes 3734 N. Woodrow St. Arlington, VA 22207 [email protected] December 30, 2016 Via Regulations.gov Department of Defense Attn: Vakare Valaitis Office of the Deputy Chief Management Officer Directorate for Oversight and Compliance 4800 Mark Center Drive, Mailbox #24 Alexandria, VA 22350–1700 Re: Withholding of Unclassified Technical Data and Technology From Public Disclosure (DOD–2015–OS–0126), 81 Fed. Reg. 75352 (October 31, 2016) Dear Ms. Valaitis: On behalf of the American Bar Association (“ABA”) Section of Public Contract Law (“Section”), I am submitting comments on the Proposed Rule cited above.1 The Section consists of attorneys and associated professionals in private practice, industry, and government service. The Sections’ governing Councils and substantive committees include members representing these three segments to ensure that all points of view are considered. By presenting their consensus view, the Section seeks to improve the process of public contracting for needed supplies, services, and public works. The views expressed herein are being presented on behalf of the Section of Public Contract Law and have not been approved by the House of Delegates or the Board of Governors of the ABA and, therefore, should not be construed as representing the policy of the ABA.2 1 Mary Ellen Coster Williams, Section Delegate to the ABA House of Delegates, and Marian Blank Horn, Kristine B. Kassekert, and Heather K. Weiner, members of the Section’s Council, did not participate in the Section’s consideration of these comments and abstained from the voting to approve and send this letter. 2 This letter is available in pdf format at http://www.americanbar.org/groups/public_contract_law/resources/prior_section_comments.html under the topic “Cybersecurity; Access to and Protection of Information.” Ms. Vakare Valaitis December 30, 2016 Page 2 I. INTRODUCTION The Section applauds the Department of Defense (“DoD”) for drafting the Proposed Rule. The Section agrees with revising out-of-date references in the current version of 32 C.F.R. part 250 and with recognizing the importance of safeguarding export-controlled information in the context of DoD procurements. This latter point includes implementing requirements associated with the provision of DoD-origin information to qualified contractors and release of such information either by DoD or by its contractors. The Section believes that the Proposed Rule has certain elements that could benefit from further clarification or that could cut against the important public policy goal of complying with export-control laws and regulations. Most specifically, the Section is concerned that, in the present environment, the seemingly non-discretionary disqualification provisions of the Proposed Rule (if actually exercised by DoD) may reduce self-reporting of potential violations of export-control laws and regulations to the Departments of State and Commerce, which have legal jurisdiction over the International Traffic in Arms Regulations (“ITAR”) and the Export Administration Regulations (“EAR”). The Section offers recommendations below on this and other issues. II. COMMENTS A. The Section Recommends Altering the Provision on Access Revocation and Disqualification. The Proposed Rule calls for DoD to revoke access and implement an initial disqualification process for qualified contractors for which DoD has “substantial and credible information” of export-control violations or for contractors that have submitted potentially false certifications on the contractor qualification form. See Proposed 32 C.F.R. § 250.6(e). The export-control violations apparently encompass violations involving shipments of hardware as well as technical data, which otherwise appear to be the focus of most other aspects of this rule. Although the Section recognizes the important security interest that DoD has in its own information and that DoD controls its own procurement process, DoD is not legally charged with administering export-control laws and regulations. Therefore, having DoD itself determine whether “substantial and credible information” of export-control violations exists, and take action against contractors as a result, is at odds with the lead roles of the Departments of State and Commerce in making such determinations, which they often undertake while coordinating with DoD to determine potential national security exposure. Moreover, companies typically self-disclose violations (including routine civil/administrative violations) to the Departments of State and Commerce and are actively encouraged by these agencies to do so. The Proposed Rule’s disqualification provision and the possibility of parallel engagement with DoD and the Departments of State and Commerce may discourage contractors from submitting such disclosures to the Departments of State and Commerce; this inhibition may be contrary to the overall policy goal of export-control compliance, which DoD no doubt also strives to encourage. Ms. Vakare Valaitis December 30, 2016 Page 3 The Section recognizes that DoD already has the disqualification power under the preexisting version of 32 C.F.R. part 250, albeit under a different standard (“credible and sufficient information”). But the Section believes that this power has not been routinely exercised and that in the current environment of frequent contractor disclosures to the Departments of State and Commerce, exercising this power might not promote export-control compliance in DoD programs. In addition, DoD contractors also must report cyber-breaches to DoD’s Defense Industrial Base office under the Network Penetration Rule at Department of Defense Federal Acquisition Regulation Supplement 252.204-7012. See 81 Fed. Reg. 72986 (Oct. 21, 2016) (final rule). Such breaches could involve export-controlled information, although for a contractor with adequate cyber controls in place consistent with what is called for by the clause, the breach would be tantamount to a “theft” and not an “export.” The Section encourages DoD to recognize this important distinction and not seek to disqualify contractors that have suffered cyber exfiltrations but that have not necessarily committed export-control violations. In view of the above concerns, the Section recommends that DoD alter the revocation/disqualification provision to cover only those instances when it has “substantial and credible evidence” of “significant, willful violations” of export-control laws and regulations not otherwise voluntarily disclosed to the underlying export-control agencies. This alternative standard would provide a more definitive, measured standard that also appropriately recognizes the roles of DoD and the Departments of State and Commerce.3 At the same time, the focus on “evidence,” as opposed to “information,” would inject more discretion into DoD’s determinations and thus prevent the provision from being over- (or erroneously) applied. DoD and the responsible export-control agencies would thus be able to focus their resources on serious offenders, which in the Section’s view would better promote the Proposed Rule’s goal of ensuring the proper safeguarding of export-controlled information in DoD programs.4 B. The Section Recommends Similar Alterations to the Provision on Law Enforcement Reporting For many of the same reasons as above, the Section is concerned with the Proposed Rule’s requirement that DoD report “substantial and credible information” of export-control violations to law enforcement agencies. See Proposed 32 C.F.R. § 250.6(g). Not only could DoD over-report potential cyber breaches, which are not necessarily export violations, but if DoD were also required to report minor, administrative export violations (or possible violations) Of course, the Section recognizes that DoD is not the ultimate arbiter of “evidence” or “willfulness.” In the same regard, the certification to be completed by U.S. and Canadian contractors states that the contractor does not employ persons who have committed export-control violations. 81 Fed. Reg. at 75356. Because export controls are a highly technical and broad area, and because companies (and individuals) not uncommonly commit relatively minor apparent administrative/civil errors, a number of companies could have employees who have (or may have) committed such technical violations, although such violations have never been formally adjudicated by the Departments of State/Commerce or law enforcement agencies as actual violations. For that reason, the Section recommends that the certification provisions be removed or be clarified to include only persons who have been found in formal proceedings with the Departments of State, Commerce, or Justice to have committed violations or been penalized under the underlying regimes for apparent violations. 3 4 Ms. Vakare Valaitis December 30, 2016 Page 4 to law enforcement, then the Department of Justice and other investigative agencies, such as Customs and Border Protection or Immigration and Customs Enforcement (or the Departments of State/Commerce), could be overburdened with many reports of minor administrative violations of export-control laws (including ones seemingly outside the Proposed Rule’s scope, such as exports of hardware). This over-reporting could include erroneous reports filed by DoD components whose personnel might not have specialized training in export controls. The Section accordingly recommends that DoD consider altering the law-enforcement reporting provision to include only instances in which DoD has “substantial and credible evidence” of “significant willful violations” of export-control laws and regulations involving DoD-owned technical data not otherwise disclosed to the underlying export-control agencies. C. The Section Recommends Harmonizing the Marking Provision with the NARA Rule on Controlling Unclassified Information. Certain aspects of the Proposed Rule’s “marking” provisions may benefit from clarification. The Proposed Rule notes that export-controlled information associated with DoD procurements should be marked by DoD and contractors in accordance with DoD Directive 5230.24, Distribution Statements on Technical Documents, which sets forth a variety of “distribution statements” associated with controlled technical information. See, e.g., Proposed 32 C.F.R. § 250.4(i). Although the distribution statements in DoD Directive 5230.24 focus on “releasability” and that Directive has existed for several years, the Section notes that DoD’s apparent singular focus on releasability, as opposed to the underlying export-control status of particular technical information, might not promote the proper treatment of such information within an organization. This focus also might not promote compliant dissemination of such information down the supply chain. The Section believes that the Proposed Rule’s apparent focus on DoD Directive 5230.24’s marking requirements may ultimately prove to be inconsistent with the new National Archives and Records Administration (“NARA”) rule regarding Controlled Unclassified Information (“CUI”).5 See 81 Fed. Reg. 63323 (Sept. 14, 2016). This is because the NARA rules purport to standardize marking protocols for CUI, including export-controlled information. For example, according to the NARA CUI Registry, when an agency implements the NARA CUI program, export-controlled documents should be marked “EXPT,” and controlled technical information (which overlaps with export-controlled information) should be marked “CTI,” although the CUI Registry’s explanatory entry for “CTI” also notes that CTI consists of information that is marked with distribution statements pursuant to DoD Directive 5230.24. See generally CUI Registry – Categories and Subcategories at https://www.archives.gov/cui/registry/category-list. Therefore, although the Section recognizes that DoD has a legitimate interest in restricting “releasability,” when fully implemented the NARA regulatory construct would appear 5 The NARA rule is effective on November 14, 2016, for agencies (though full implementation may take some time) and will eventually cover nonfederal entities such as contractors through agreements with disseminating agencies such as DoD. Ms. Vakare Valaitis December 30, 2016 Page 5 to call for an export-controlled drawing to be marked “EXPT” and “CTI” and have a distribution statement. DoD’s Proposed Rule, however, appears to focus exclusively on the distribution statement. With this in mind, we encourage DoD to consider revising the final rule to note that export-controlled documents should be marked consistently with NARA protocols upon DoD’s adoption of the NARA CUI program, in addition to requiring distribution statements under the Proposed Rule.6 III. CONCLUSION The Section appreciates the opportunity to provide these comments and is available to provide additional information or assistance as you may require. Sincerely, James A. Hughes Chair, Section of Public Contract Law cc: Aaron P. Silberman Kara M. Sacilotto Linda Maramba Jennifer L. Dauer Council Members, Section of Public Contract Law Chairs and Vice Chairs, Cybersecurity, Privacy, and Data Protection Committee Chairs and Vice Chairs, International Procurement Committee Craig Smith Samantha S. Lee 6 Separately, the Section encourages DoD to coordinate with NARA and the Departments of State and Commerce to consider updating NARA’s CUI markings to facilitate the separate identification of ITAR and EAR controlled technical information as opposed to the singular “EXPT” and “CTI” designations. Not only do ITAR/EAR designations assist others with downstream compliance, the act of determining whether a document is ITAR or EAR controlled (or possibly not controlled at all) may help ensure that documents are not over (or under) marked.
© Copyright 2026 Paperzz