COMDTINST 5512.2
for retirement, separation, or special recognition. Mementos will be documented on the Letter of
Certification and kept on file IAW paragraph 15. (It is also recommended that Credentials be turned
in to the custodian for temporary safekeeping when the bearer is hospitalized for a protracted period,
or when traveling outside the United States not on official business.)
15. RECORDS. The Program Managers will maintain all Program Manager Letters of Certification, and
records of retirement and destruction of Credentials IAW Schedule 18 of the General Records
Schedule.
16. MISUSE.
a. Use of USCG Credentials for other than their intended purpose or when other means of
identification (i.e., a USCG Identification Card) would be more appropriate is considered an
abuse and may be grounds for revocation of the Credential, removal of the bearer from the
duties that require Credentials, and other disciplinary action. USCG members who have
knowledge of an alleged abuse are responsible for reporting it to their chain of command. The
following are additional examples of what may constitute abuse of Credentials:
(1) Alteration or tampering with Credentials.
(2) Photocopying, or copying of Credentials.
(3) Using a Credential to present oneself as a Law Enforcement Official beyond the scope of the
authority specified for that Credential.
(4) Using a Credential to gain access to areas/facilities or information not warranted by the
authority specified in the Credential.
(5) Using a Credential to garner some privilege or special access while off-duty.
(6) Using a Credential in an attempt to avoid a legal citation (i.e., parking ticket).
b. When a possible abuse of Credentials has been reported, the Program Manager responsible for
the element that has custodial responsibility for that Credential will:
(1) Initiate an administrative inquiry concerning the allegation of abuse, and report the incident
to Commandant (CG-86).
(2) Consider withdrawing the Credential of the alleged abuser, pending completion of the
investigation.
(3) Refer the case to CGIS, if criminal intent or activity is indicated.
(4) Consider a request to the commander with non-judicial authority over the alleged abuser to
take non-judicial action or refer the matter for judicial action, if the investigation
substantiates the allegation of abuse.
8