Implementing Electronic Signature Technologies
|ATTENTION! This page has been superseded. The information listed below is no longer accurate. For NARA's current guidance please visit www.archives.gov/records-mgmt/bulletins/2015/2015-03.html. Please note that this page is available only as a technical and historical reference.
Government Paperwork Elimination Act (GPEA)
|This guidance is available in two formats- — HTML and PDF [82 KBytes, 21 pages]. The HTML text appears below.
Records Management Guidance for Agencies Implementing Electronic Signature Technologies
October 18, 2000*
- Executive Summary
- Trustworthy Records
- Other Records Management Issues
- What new records may be created by electronic signature technology?
- How do agencies determine which of these electronic signature records to retain?
- Transferring electronic signature record material from contractors to agencies.
- When must an agency modify its records schedule to cover electronic signature records?
- Special considerations relating to long-term, electronically-signed records that preserve legal rights.
- NARA requirements for permanent, electronically-signed records.
- Appendix A - Key Terms and Definitions
- Appendix B - For Further Information and Assistance
An agency's decisions concerning how to adequately document program functions, its risk assessment methodologies, and its records management practices are essential and interrelated aspects of an electronic signature initiative. The following key points are discussed more fully in this guidance:
- Agencies must consider records management requirements when implementing the Government Paperwork Elimination Act (GPEA). (See: Section 2.0)
- If the electronically signed record needs to be preserved, whether for a finite period of time or permanently, then the agency needs to ensure its trustworthiness over time. (See: Section 4.0)
- There are various approaches to ensure the trustworthiness of electronically-signed records. (See: Section 4.3)
- Information systems that agencies use to implement the electronic signature requirements of GPEA, will produce new records or augment existing records. (See: Section 5.1.)
- Agencies determine which electronic signature records to retain based on their operational needs and perceptions of risk. (See: Section 5.2)
- Agencies are not authorized to dispose of records without an approved records disposition authority from the National Archives and Records Administration (NARA). (See: Section 2.0)
- Agencies should develop records schedules with proposed retention periods for new records for NARA to review. Records disposition authorities for existing records may need to be modified. (See: Sections 5.1 and 5.4)
- Electronically-signed records documenting legal rights and electronically-signed records that must be retained permanently have special considerations. (See: Sections 5.5 and 5.6)
- When agencies use third party contractors they can use specific contract language to help ensure that records management requirements are met. (See: Section 5.3)
The Government Paperwork Elimination Act (GPEA, Pub. L. 105-277) requires that, when practicable, Federal agencies use electronic forms, electronic filing, and electronic signatures to conduct official business with the public by 2003. In doing this, agencies will create records with business, legal and, in some cases, historical value. This guidance focuses on records management issues involving records that have been created using electronic signature technology. It supplements the Office of Management and Budget (OMB) guidance for agencies implementing the GPEA, as well as other National Archives and Records Administration (NARA) guidance.
A sound records management program is an integral part of an agency's standard business operations. Agencies must consider records management requirements when implementing the GPEA, or whenever they design or augment an electronic information system. Federal agencies are required by the Federal Records Act (44 U.S.C. 3101) to "make and preserve records containing adequate and proper documentation of the organization, functions, policies, decisions, procedures, and essential transactions of the agency." This requirement applies to electronic records as well. Agencies that do not consistently adhere to standard records management practices run the risk of not having records that can be depended upon in the course of subsequent business transactions or activities.
This guidance is directed both toward information technology (IT) specialists who establish electronic signature systems and who may not be familiar with the records management implications, and toward agency records management personnel. Good IT practices complement or parallel good records management practices. In systems implemented as a result of the GPEA, records management requirements will form the core of the IT system requirements. In implementing electronic signature technologies, IT professionals need to be aware that signatures are an integral part of a record. If the record needs to be preserved, whether for a finite period of time or permanently, then the agency needs to ensure the trustworthiness of the electronically-signed record over time.
The Archivist of the United States must approve the disposition of Federal records by means of a NARA-approved records disposition authority or records control schedule before agencies can destroy them. (44 USC 3303a(a)). New information systems or records series that have not been scheduled (i.e. do not have a records disposition authority) need to be appraised by NARA. Agency records management staff should contact NARA to begin the scheduling process. Further information on scheduling records and NARA records management guidance is available on the NARA web site and in NARA publications. See Appendix B for further information about NARA's records management programs and services.
This guidance discusses the records management principles that apply to electronic signature technology generally. Electronic signatures may be accomplished by several different technologies, such as Personal Identification Number (PIN), digital signatures, smart cards and biometrics. If additional technology-specific records management guidance is necessary, NARA will work with agencies to develop it.
This guidance does not deal with records management issues associated with the electronic information systems used to generate electronic signatures. Those issues are covered in other NARA guidance documents. This guidance also does not deal with issues related to the Freedom of Information Act (FOIA) and the Privacy Act, which fall under the purview of the Department of Justice and the Office of Management and Budget, respectively.
The terms "records life cycle" and "system development life cycle" are important concepts that are sometimes confused in information technology and records management discussions.
Records life cycle: The records life cycle is the life span of a record from its creation or receipt to its final disposition. It is usually described in three stages: creation, maintenance and use, and final disposition. Much of this guidance deals with the creation stage because the electronic signature record is created during the first stage of the records life cycle. The second stage, maintenance and use, is the portion of the records life cycle in which the record is either maintained at the agency while in active use, or is maintained off-line when use is less frequent. The final stage of the records life cycle is disposition, which describes the ultimate fate of the record. Federal records are categorized as having either a "temporary" or "permanent" disposition status. Temporary records are held by agencies for specified time periods before they are destroyed or deleted. Permanent records are first held by agencies and then legally transferred to NARA. Electronically-signed records may be either temporary or permanent. The eventual disposition of electronically-signed records is subject to negotiation between the agency and NARA, but agencies are not authorized to dispose of records without approval from NARA.
System development life cycle: The "system development life cycle" describes the phases of development of an electronic information system. These phases typically include initiation, definition, design, development, deployment, operation, maintenance, enhancement, and retirement. A significant step in several of the stages is the definition, development, and refinement of the data model that includes treatment of the records being created or managed. Information systems developed according to system development methodologies, including those that agencies use to implement the electronic signature requirements of GPEA, will produce new records or augment existing records.
The records life cycle often exceeds the system development life cycle. When it does the agency needs to retain the record for a period of time longer than the life of the electronic information system that generated the electronic signature. This presents special challenges, such as maintaining the trustworthiness of the record when migrating from one system to another.
Reliability, authenticity, integrity, and usability are the characteristics used to describe trustworthy records from a records management perspective. An agency needs to consider these characteristics when planning to implement an electronic signature technology so that it can meet its internal business and legal needs, and external regulations or requirements. The degree of effort an agency expends on ensuring that these characteristics are attained is dependent on the agency's business needs or perception of risk. (See: Section 5.2 for a discussion of risk assessment.) Transactions that are critical to the agency business needs may need a greater assurance level that they are reliable, authentic, maintain integrity and are usable than transactions of less critical importance. For guidance on whether records are trustworthy for legal purposes, consult your Office of General Counsel.
Reliability: A reliable record is one whose content can be trusted as a full and accurate representation of the transactions, activities, or facts to which it attests and can be depended upon in the course of subsequent transactions or activities.
Authenticity: An authentic record is one that is proven to be what it purports to be and to have been created or sent by the person who purports to have created and sent it.
A record should be created at the point in time of the transaction or incident to which it relates, or soon afterwards, by individuals who have direct knowledge of the facts or by instruments routinely used within the business to conduct the transaction.
To demonstrate the authenticity of records, agencies should implement and document policies and procedures which control the creation, transmission, receipt, and maintenance of records to ensure that records creators are authorized and identified and that records are protected against unauthorized addition, deletion, and alteration.
Integrity: The integrity of a record refers to it being complete and unaltered.
It is necessary that a record be protected against alteration without appropriate permission. Records management policies and procedures should specify what, if any, additions or annotations may be made to a record after it is created, under what circumstances additions or annotations may be authorized, and who is authorized to make them. Any authorized annotation or addition to a record made after it is complete should be explicitly indicated as annotations or additions.
Another aspect of integrity is the structural integrity of a record. The structure of a record, that is, its physical and logical format and the relationships between the data elements comprising the record, should remain physically or logically intact. Failure to maintain the record's structural integrity may impair its reliability and authenticity.
Usability: A usable record is one which can be located, retrieved, presented, and interpreted. In any subsequent retrieval and use, the record should be capable of being directly connected to the business activity or transaction which produced it. It should be possible to identify a record within the context of broader business activities and functions. The links between records which document a sequence of activities should be maintained. These contextual linkages of records should carry the information needed for an understanding of the transaction that created and used them.
For a record to remain reliable, authentic, with its integrity maintained, and usable for as long as the record is needed, it is necessary to preserve its content, context, and sometimes its structure. A trustworthy record preserves the actual content of the record itself and information about the record that relates to the context in which it was created and used. Specific contextual information will vary depending upon the business, legal, and regulatory requirements of the business activity (e.g., issuing land use permits on Federal lands). It also may be necessary to preserve the structure or arrangement of its parts. Failure to preserve the structure of the record will impair its structural integrity. That, in turn, may undermine the record's reliability and authenticity.
There are special considerations when dealing with the preservation of the content, context, and structure of records that are augmented by electronic signatures:
- Content: The electronic signature or signatures in a record are part of the content. They indicate who signed a record and whether that person approved the content of the record. Multiple signatures can indicate initial approval and subsequent concurrences. Signatures are often accompanied by dates and other identifiers such as organization or title. All of this is part of the content of the record and needs to be preserved. Lack of this information seriously affects a document's reliability and authenticity.
- Context: Some electronic signature technologies rely on individual identifiers that are not embedded in the content of the record, trust paths, and other means to create and verify the validity of an electronic signature (see Section 5.1). This information is outside of the content of the record, but is nevertheless important to the context of the record as it provides additional evidence to support the reliability and authenticity of the record. Lack of these contextual records seriously affects one's ability to verify the validity of the signed content.
- Structure: Preserving the structure of a record means its physical and logical format and the relationships between the data elements comprising the record remain physically and logically intact. An agency may determine that it is necessary to maintain the structure of the electronic signature. In that case it is necessary to retain the hardware and software that created the signature (e.g., chips or encryption algorithms) so that the complete record could be revalidated at a later time as needed.
There are various approaches agencies can use to ensure the trustworthiness of electronically-signed records over time. Agencies will choose an approach that is practical for them and will fit their business needs and risk assessment. Below is a discussion of two different approaches that agencies have used.
One approach: An agency may choose to maintain adequate documentation of the records' validity, such as trust verification records, gathered at or near the time of record signing. This approach requires agencies to retain contextual information to adequately document the processes in place at the time the record was electronically-signed, along with the electronically-signed record itself. The additional contextual information must be retained for as long as the electronically-signed record is retained. Thus the agency preserves the signature's validity and meets the adequacy of documentation requirements by retaining the contextual information that documented the validity of the electronic signature at the time the record was signed.
Maintaining adequate documentation of validity gathered at or near the time of record signing may be preferable for records that have permanent or long-term retentions since it is less dependent on technology and much more easily maintained as technology evolves over time. However, using this approach, the signature name may not remain readable over time because of bit-wise deterioration in the record or as a result of technological obsolescence. Agencies must ensure that for permanent records the printed name of the signer and the date when the signature was executed be included as part of any human readable form (such as electronic display or printout) of the electronic record.
Another approach: An agency may choose to maintain the ability to re-validate digital signatures. The re-validation approach requires agencies to retain the capability to revalidate the digital signature, along with the electronically-signed record itself. The information necessary for revalidation (i.e., the public key used to validate the signature, the certificate related to that key, and the certificate revocation list from the certificate authority that corresponds to the time of signing) must be retained for as long as the digitally-signed record is retained. Both contextual and structural information of the record must be retained, as described in Section 4.2.
This approach is potentially more burdensome, particularly for digitally-signed records with long retention needs, due to issues of hardware and software obsolescence. If an agency chooses this approach for permanent records, it must contact NARA to discuss what they will need to do to transfer the records to NARA. As in the first approach, the agency must ensure that the printed name of the electronic signer and the date when the signature was executed be included as part of any human readable form (such as electronic display or printout) of the electronic record.
Irrespective of the approach an agency takes, some form of technical non-repudiation services must be implemented to protect the reliability, authenticity, integrity, and usability, as well as the confidentiality, and legitimate use of electronically-signed information. Non-repudiation is one of the essential security services in computing environments, being mainly applied in message handling systems and electronic commerce. The non-repudiation services that are being used in e-commerce can also be used in ascertaining the reliability of electronically-signed records. Non-repudiation services provide irrefutable evidence that an action took place. The services protect one party to a transaction (e.g., electronically signing a record) against the denial of the other party that a particular event or action took place. The services also provide safeguards that protect all parties from a false claim that a record was tampered with or not sent or received.
There are multiple frameworks for non-repudiation and agencies will choose the framework that matches their needs. One possible framework is the ISO (International Organization for Standardization) non-repudiation model (Non-repudiation - Part 1: General Model, ISO/IEC JTC1/SC27 N1503, November 1996; Non-repudiation - Part 2: Using symmetric techniques, ISO/IEC JTC1/SC27 N1505, November 1996). The essential elements of the ISO model are listed below:
- Evidence of the Origin of the Message & Verification: This shows that the originator created the message (electronically-signed record). The sender (person signing the record electronically) has to create a proof-of-origin certificate using the non-repudiation service. The electronically-signed record can be sent to another party (receiver of the electronically-signed record or another application for further processing) using the non-repudiation delivery authority service. The receiver has to store this evidence using the non-repudiation storage service. In case of dispute, the sender can later retrieve this evidence.
- Evidence of Message Receipt: This proves that the message (electronically-signed record) was delivered. The recipient must create and send a proof of receipt certificate using non-repudiation delivery authority service. The sender receives this evidence and stores it using the non-repudiation storage service; it can later be retrieved if there is a dispute.
- Transaction Timestamp: This timestamp is generated by the non-repudiation service as part of the evidence that an event or action took place.
- Long-term Storage Facility: This is used to store the certificates of origin and receipt. If there is a dispute, the adjudicator uses this storage facility to retrieve the evidence. Depending on the length of storage, it might be necessary to address software and hardware migration concerns as part of the design of this facility.
- The Adjudicator: The adjudicator is used to settle disputes based on stored evidence if either the sender or the receiver of electronically-signed records makes false claims.
Modified from: Orfali, Robert, Harkey, Dan, & Jeri Edwards. Client-Server Survival Guide. John Wiley & Sons: New York, 1999, p. 144.
To create trustworthy records with electronic signatures an agency should:
- Create and maintain documentation of the systems used to create the records that contain electronic signatures.
- Ensure that the records that include electronic signatures are created and maintained in a secure environment that protects the records from unauthorized alteration or destruction.
- Implement standard operating procedures for the creation, use, and management of records that contain electronic signatures and maintain adequate written documentation of those procedures.
- Create and maintain records according to these documented standard operating procedures.
- Train agency staff in the standard operating procedures.
- Obtain official disposition authorities from NARA for both the records that contain electronic signatures and for the associated records which are necessary for trustworthy records (see Section 4.0). (Having official disposition authorities will assist the agency when faced with demands to produce records that have been destroyed according to these authorities.)
5.1 What new records may be created by electronic signature technology? Agency decisions to accept or create electronically-signed records will generate new types of associated records. Agencies must identify the content, context, and structure of records with electronic signatures and determine what they will need to preserve to have trustworthy records for the agency's purposes. The following list includes many of the records that might be associated with an electronic signature initiative. These records need to be scheduled (have approved disposition authorities from NARA) in coordination with the electronically-signed records to which they relate.
- Documentation of individual identities: Information the agency uses to identify and authenticate a particular person as the source of an electronically-signed record. Examples of this would be a pin number or digital certificate assigned to an individual. This information may be passed to individuals via written correspondence, and do not necessarily appear in the electronically-signed record. Depending on method of implementation, this is either content or context.
- Electronic signatures: A method of signing an electronic document that identifies and authenticates a particular person as the source of the message and indicates such person's approval of the information contained in the electronic message. The electronic signature may be embedded in the content of the record, or it may be stored separately.
- If an electronic signature technology separates the signature from the rest of the record, it must be associated in some way and captured in the recordkeeping system to preserve the complete content of the record.
- Trust verification records: Records that the agency deems necessary to document when and how the authenticity of the signature was verified. An example of this would be an Online Certificate Status Protocol (OCSP) or other response from a Certificate Authority server. This is context information.
- Certificates: The electronic document that binds a verified identity to the public key that is used to verify the digital signature in public key infrastructure implementations. This is context information.
- Certificate Revocation List: In public key infrastructure implementations, a list of certificates that a Certificate Authority has revoked at a particular time. When a Certificate Authority places a certificate on a revocation list, an agency application may reject the digital signature. This is context information.
- Trust paths: In public key infrastructure implementations, a chain of certificates of trusted third parties between parties to a transaction which ends with the issuance of a certificate that the relying party trusts. The trust path is one of the data necessary for validation of a received digital signature. This is context information.
- Certificate policy: In public key infrastructure implementations, a set of rules that defines the applicability of a certificate to a particular community and/or class of application with common security requirements. This is context information.
- Certificate practice statements: In public key infrastructure implementations, a certification authority's statement of practice for issuing certificates. This is context information.
- Hashing/encryption/signing algorithms: Software for generating computational calculations used to create or validate digital signatures. This is structure information.
Agencies establish records management practices based on their operational needs and perceptions of risks. Operational needs are determined on the basis of the approach taken to ensuring the trustworthiness of electronically-signed records over time (see Section 4.3). Risk assessment and risk mitigation, along with other methodologies, are used to establish documentation requirements for agency activities. A risk assessment should consider the possible consequences of lost or unrecoverable records, including the legal risk and financial costs of potential losses, the likelihood that a damaging event will occur, and the costs of taking mitigating actions. Risk is defined here, from NARA's perspective, as (1) a risk of challenge to the records (e.g., legal challenge) that can be expected over the life of the record, and (2) the degree to which the agency or citizens would suffer loss if the trustworthiness of the electronically-signed records could not be adequately documented. Risk assessment also can be applied to records of electronic signature programs to determine the level of documentation required for signature validation. The concepts of reliability, authenticity, integrity, and usability as discussed in Section 4.1, may help agencies establish criteria for the types of electronic signature-related records they need to retain to document their programs.
As the Government begins to interact with citizens electronically, agencies may employ third party contractors to integrate electronic signature technology into their business processes. The General Services Administration's Access Certificates for Electronic Services (ACES) program is an example. Use of a third party contractor does not relieve an agency of its obligation to provide adequate and proper documentation of electronic signature record material. When agencies use third party contractors they can use specific contract language to help ensure that records management requirements are met. It may be necessary for agencies to make special provisions for obtaining electronic signature record material from third parties or to ensure that the third parties adhere to the records schedule retention requirements.
Records schedules are the business rules that describe the types of records an agency produces and the retention periods for those records. Records schedules need to be modified when:
- new records, such as those listed in Section 5.1 are created;
- the agency determines that incorporation of an electronic signature into a record will result in changes to the retention period for that record;
- incorporation of the electronic signature and/or resulting parallel changes in the work process significantly changes the character of the record.
NARA will provide agency records officers with specific guidance on scheduling. If an agency is applying electronic signature technology to records scheduled for permanent retention, please contact NARA.
When implementing electronic signature technology, agencies should give special consideration to the use of electronic signatures in electronic records that preserve legal rights. Because long-term temporary and permanent electronically signed records have greater longevity than typical software obsolescence cycles, it is virtually certain that agencies will have to migrate those records to newer versions of software to maintain access. The software migration (as opposed to media migration) process may invalidate the digital signature embedded in the record. This may adversely affect an agency's ability to recognize or enforce the legal rights documented in those records.
For permanent records, agencies must ensure that the printed name of the electronic signer, as well as the date when the signature was executed, be included as part of any human readable form (such as electronic display or printout) of the electronic record. NARA requires this so that the name of the signer will be preserved as part of the record.
NOTE: Many of these definitions are taken from Lewis J. Bellardo and Lynn Lady Bellardo, comps., A Glossary for Archivists, Manuscript Curators, and Records Managers, Archival Fundamentals Series (Chicago: The Society of American Archivists, 1992). For the most up-to-date definitions see the online SAA Glossary, http://www.archivists.org/glossary/
Appraisal: The process of determining the value and thus the disposition of records (i.e., designating them temporary or permanent) based upon their current administrative, legal, and fiscal use; their evidential and informational value; their arrangement and condition; their intrinsic value; and their relationship to other records. (Society of American Archivists Glossary)
Authenticity: An authentic record is one that is proven to be what it purports to be and to have been created or sent by the person who purports to have created and sent it.
Certificate Authority [CA]: As part of a public key infrastructure, an authority in a network that issues and manages security credentials and public keys for message encryption and decryption.
Content: The information that a document is meant to convey (Society of American Archivists Glossary). Words, phrases, numbers, or symbols comprising the actual text of the record that were produced by the record creator.
Context: The organizational, functional, and operational circumstances in which documents are created and/or received and used (Society of American Archivists Glossary). The placement of records within a larger records classification system providing cross-references to other related records.
Documentation: 1. In archival usage, the creation or acquisition of documents to provide evidence of the creator, an event, or an activity. 2. In electronic records, an organized series of descriptive documents explaining the operating system and software necessary to use and maintain a file and the arrangement, content, and coding of the data which it contains. (Society of American Archivists Glossary)
Electronic signature: A technologically neutral term indicating various methods of signing an electronic message that (a) identify and authenticate a particular person as source of the electronic message; and (b) indicate such person's approval of the information contained in the electronic message (definition from GPEA, Pub.L. 105-277). Examples of electronic signature technologies include PINs, user identifications and passwords, digital signatures, digitized signatures, and hardware and biometric tokens.
General records schedule: A records schedule governing specified series of records common to several or all agencies or administrative units of a corporate body (Society of American Archivists Glossary). The NARA General Records Schedules (GRS) provide disposition authority for temporary administrative records common to several or all agencies of the Federal Government.
Integrity: The integrity of a record refers to its being complete and unaltered.
Non-repudiation: Steps taken by an agency to provide assurance, via the use of an audit trail, that a sender cannot deny being the source of a message, and that a recipient cannot deny receipt of a message.
Online Certificate Status Protocol [OCSP]: A draft Internet communications protocol of the IETF X.509 PKI Working Group that is useful in determining the current status of a digital certificate without requiring certificate revocation lists.
Public Key Infrastructure [PKI]: An IT infrastructure that enables users of a basically unsecure public network such as the Internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority.
Record: All books, papers, maps, photographs, machine readable materials, or other documentary materials, regardless of physical form or characteristics, made or received by an agency of the U.S. Government under Federal law or in connection with the transaction of public business and preserved or appropriate for preservation by that agency or its legitimate successor as evidence of the organization, functions, policies, decisions, procedures, operations, or other activities of the Government or because of the informational value of data in them (44 U.S.C. 3301).
Recordkeeping System: A manual or automated system in which records are collected, organized, and categorized to facilitate their preservation, retrieval, use, and disposition.
Records Schedule: A document describing records of an agency, organization, or administrative unit, establishing a timetable for their life cycle, and providing authorization for their disposition (Society of American Archivists Glossary), i.e., off-site storage followed by destruction or transfer to the National Archives.
Record Series: File units or documents arranged in accordance with a filing system or maintained as a unit because they result from the same accumulation or filing process, the same function, or the same activity; have a particular form; or because of some other relationship arising out of their creation, receipt, or use. (Society of American Archivists Glossary)
Reliability: A reliable record is one whose contents can be trusted as a full and accurate representation of the transactions, activities, or facts to which they attest and can be depended upon in the course of subsequent transactions or activities.
Re-validation: Re-confirming the validation process for a previously validated electronic signature.
Structure: The physical and logical format of a record and the relationships between the data elements.
Usability: A usable record is one which can be located, retrieved, presented and interpreted.
Validation: The process by which a message/record is confirmed to have originated from an authenticated network user, that is, one who has appropriately established his/her identity on the network.
In addition to the policy guidance available from the agency's records officer, information resource management officials, legal counsel, and inspector general, records management assistance is available to Federal agencies through several NARA offices and programs. Agencies will find the most current list of NARA records management contacts and programs posted on the NARA Records Management web page.
Records management policy and guidance is also available through the NARA web site. Links to Federal regulations, records management publications, NARA Bulletins, and other valuable resources are available at http://www.archives.gov/records-mgmt/policy/index.html . Agency staff looking for up to date information and help with electronic records issues should visit the Fast Track Guidance Development Project site. ). The Fast Track Project is an initiative to get available electronic records information out to agencies while NARA continues to develop more complete and longer-term solutions.
Agencies may also write or call for further information:
Office of Records Services - Washington, DC, Modern Records Programs
Life Cycle Management Division, NWML
National Archives at College Park
8601 Adelphi Road
College Park, MD 20740-6001
The Life Cycle Management Division receives and reviews all records disposition requests submitted to NARA by Federal agencies and provides records management training open to all Federal employees. The division is organized into six workgroups, each of which is assigned responsibilities for specific Federal Agencies. This liaison structure ensures that agencies will be able to discuss their records issues with someone who is familiar with their agency and their records. The list of workgroups and agency assignments is available. The schedule of records management training classes is available.
Agency offices and programs outside of Washington, DC, may also contact the records management staff at one of the NARA regional records services facilities. A list of these facilities is available on the web . The NARA regional facilities also offer records management training. The schedule of regional classes is available.
Agencies may write or call for further information about NARA's regional records services:
Office of Regional Records Services, NR
National Archives at College Park
8601 Adelphi Road
College Park, MD 20740-6001
*Web site addresses and telephone numbers were updated 11/14/02 per NARA Bulletin 2003-02. Additional updates to Appendix A were made 02/14/2006