Title 50War and National DefenseRelease 119-73

§2425 Government access to information on Administration computers

Title 50 › Chapter CHAPTER 41— - NATIONAL NUCLEAR SECURITY ADMINISTRATION › Subchapter SUBCHAPTER II— - MATTERS RELATING TO SECURITY › § 2425

Last updated Apr 6, 2026|Official source

Summary

The Administrator must create rules for who can access information on Administration computers. Anyone given access must sign written permission allowing authorized investigative agencies to examine any Administration computer they used for work while they had access and for three years after. Users have no expectation of privacy when using Administration computers, even if other laws (for example, the Electronic Communications Privacy Act of 1986) say otherwise. "Authorized investigative agency" means an agency allowed by law or regulation to do counterintelligence checks or screen people proposed for access to classified information.

Full Legal Text

Title 50, §2425

War and National Defense — Source: USLM XML via OLRC

(a)The Administrator shall establish procedures to govern access to information on Administration computers. Those procedures shall, at a minimum, provide that any individual who has access to information on an Administration computer shall be required as a condition of such access to provide to the Administrator written consent which permits access by an authorized investigative agency to any Administration computer used in the performance of the duties of such employee during the period of that individual’s access to information on an Administration computer and for a period of three years thereafter.
(b)Notwithstanding any other provision of law (including any provision of law enacted by the Electronic Communications Privacy Act of 1986 (Public Law 99–508; 100 Stat. 1848)), no user of an Administration computer shall have any expectation of privacy in the use of that computer.
(c)For purposes of this section, the term “authorized investigative agency” means an agency authorized by law or regulation to conduct a counterintelligence investigation or investigations of persons who are proposed for access to classified information to ascertain whether such persons satisfy the criteria for obtaining and retaining access to such information.

Legislative History

Notes & Related Subsidiaries

Editorial Notes

References in Text

The Electronic Communications Privacy Act of 1986, referred to in subsec. (b), is Pub. L. 99–508, Oct. 21, 1986, 100 Stat. 1848. For complete classification of this Act to the Code, see

Short Title

of 1986 Amendment note set out under section 2510 of Title 18, Crimes and Criminal Procedure, and Tables.

Amendments

2013—Subsec. (b). Pub. L. 113–66 inserted “(Public Law 99–508; 100 Stat. 1848)” after “of 1986”.

Reference

Citations & Metadata

Citation

50 U.S.C. § 2425

Title 50War and National Defense

Last Updated

Apr 6, 2026

Release point: 119-73