Enclosure (11) to COMDTINST 5230.60A
SECTION 508 DETERMINATION AND CERTIFICATION FOR ELECTRONIC AND INFORMATION
TECHNOLOGY (EIT) PURCHASE REQUESTS
TO BE COMPLETED BY THE REQUIRING OFFICIAL (PURCHASE REQUESTOR)
National Security Exemption Policy
1. Purpose: This enclosure provides guidance to program managers, requiring officials and contracting
officers on when, in the interests of national security, exemptions may be granted to the requirement
that all newly procured electronic and information technology (EIT) be accessible to persons with
disabilities.
2. Background:
a. Under certain circumstances, Federal agencies may acquire EIT that does not conform to the
provisions of the standard. One such exemption is in the interest of national security. This
exemption includes any EIT operated by Federal agencies, the function, operation, or use of
which
(1)
Involves intelligence activities,
(2)
Involves cryptologic activities related to national security,
(3)
Involves command and control of military forces,
(4)
Involves equipment that is an integral part of a weapon or weapons system, or
(5)
Subject to subsection (b), is critical to the direct fulfillment of military or intelligence
missions.
b. LIMITATION: Subsection (a)(5) does not include a system that is to be used for routine
administrative and business applications (including payroll, finance, logistics, and personnel
management applications).
3. Definitions:
The Coast Guard establishes the following definitions for this policy:
a. Cryptologic activities - are limited to encryption activities related to national security.
Cryptologic activities related to routine financial transactions, for example, would not be exempt.
b. Intelligence activities - means the collection, production, and dissemination of foreign
intelligence and counterintelligence.
(1) Foreign intelligence: information relating to the capabilities, intentions, and activities of
foreign powers, organizations, or persons, but not including counterintelligence except for
information on international terrorist activities.
(2) Counterintelligence: information gathered and activities conducted to protect against
espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf
of foreign powers, organizations, or persons, or international terrorist activities, but not
including personnel, physical, document, or communications security programs.
1