As prescribed in 239.7411(d), use the following clause:

Telecommunications Security Equipment, Devices, Techniques, and Services (DEC 1991)

(a) Definitions. As used in this clause—

(1) Securing means the application of Government-approved telecommunications security equipment, devices, techniques, or services to contractor telecommunications systems.

(2) Sensitive information means any information the loss, misuse, or modification of which, or unauthorized access to, could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under 5 U.S.C. 552a (the Privacy Act), but which has not been specifically authorized under criteria established by an Executive Order or Act of Congress to be kept secret in the interest of national defense or foreign policy.

(3) Telecommunications systems means voice, record, and data communications, including management information systems and local data networks that connect to external transmission media, when employed by Government agencies, contractors, and subcontractors to transmit—

(i) Classified or sensitive information;

(ii) Matters involving intelligence activities, cryptologic activities related to national security, the command and control of military forces, or equipment that is an integral part of a weapon or weapons system; or

(iii) Matters critical to the direct fulfillment of military or intelligence missions.

(b) This solicitation/contract identifies classified or sensitive information that requires securing during telecommunications and requires the Contractor to secure telecommunications systems. The Contractor agrees to secure information and systems at the following location: (Identify the location.)

(c) To provide the security, the Contractor shall use Government-approved telecommunications equipment, devices, techniques, or services. A list of the approved equipment, etc. may be obtained from (identify where list can be obtained). Equipment, devices, techniques, or services used by the Contractor must be compatible or interoperable with (list and identify the location of any telecommunications security equipment, device, technique, or service currently being used by the technical or requirements organization or other offices with which the Contractor must communicate).

(d) Except as may be provided elsewhere in this contract, the Contractor shall furnish all telecommunications security equipment, devices, techniques, or services necessary to perform this contract. The Contractor must meet ownership eligibility conditions for communications security equipment designated as controlled cryptographic items.

(e) The Contractor agrees to include this clause, including this paragraph (e), in all subcontracts which require securing telecommunications.

(End of clause)


Tried the LawStack mobile app?

Join thousands and try LawStack mobile for FREE today.

  • Carry the law offline, wherever you go.
  • Download CFR, USC, rules, and state law to your mobile device.