- Intelligence Community
- Contact Us
The purpose of pre-publication review is to prevent unauthorized disclosure of information and ensure the mission of the ODNI and the foreign relations and security of the United States are not adversely affected by public disclosure.
All information meant to be made available in a public forum must be submitted for review prior to release.
The obligation applies to current and former ODNI staff, including cadre, detailees, and contractors, who have access to classified information. There are two categories of material that must be reviewed:
Non-Official: Anything published or presented in your personal capacity. Examples include resumes, books, op-eds, personal blogs
Official: Anything created as part of your official duties on behalf of the ODNI. Examples include speeches, newsletters, official web pages, outreach documents, brochures.
The Pre-Pub Team coordinates with other IC agencies, as appropriate, and provides a single consolidated response to the requester.
1. Create material using:
2. For official publication or presentation, ensure your management chain has concurred, and any internal component review process for substance has been completed.
3. Submit your request via email for Pre-Pub Review (you will receive an automatic reply confirming your request). When doing so be sure to:
4. Protect the publication from release until approved from the ODNI Pre-Pub Team. In other words, do not send to editors or academics for peer reviews until the review is complete.
5. Upon approval from ODNI Pre-Pub, you are cleared to and publish or present.
This XML Data Encoding Specification for Access Rights and Handling (ARH.XML) defines detailed implementation guidance for using Extensible Markup Language (XML) to encode ARH data.
Information sharing within the national intelligence enterprise will increasingly rely on information assurance metadata (including enterprise data headers) to allow interagency access control, automated exchanges, and appropriate protection of shared intelligence. A structured, verifiable representation of security metadata bound to the intelligence data is required in order for the enterprise to become inherently "smarter" about the information flowing in and around it. Such a representation, when implemented with other data formats, improved user interfaces, and data processing utilities, can provide part of a larger, robust information assurance infrastructure capable of automating some of the management and exchange decisions today being performed by human beings.
The Intelligence Community (IC) has standardized the various classification and control markings established for information sharing within the Information Security Markings (ISM) and Need-To-Know (NTK) XML specifications of the Intelligence Community Enterprise Architecture (ICEA) Data Standards. The IC Access Requirements and Handling XML specification combines elements of the ISM and NTK specifications and extends them to access rights management and handling needs.
You have selected to open
If you would like to not see this alert again, please click the
"Do not show me this again" check box below