Skip to main content (Press Enter).
Toggle navigation
National Security Agency Central Security Service
National Security Agency Central Security Service
Search
Search NSA CSS:
Search
Search NSA CSS:
Search
Documentation
Interactive Process
Job Reassignment
Implementation
Decisions
Denial
Reconsideration
Confidentiality
Statutory Claims
CryptoComics
NSA.gov Navigation Menu Button
About Us
Mission & Values
Current Leadership
Former Directors
Former D/Directors
Former D/CSS
Central Security Service (CSS)
Cryptologic Centers
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
NSA/CSS Texas
Diversity, Equality & Inclusion
Accommodations & Accessibility
Discrimination Complaints
No FEAR Act & Data
Employee Resource Groups
Civil Liberties and Privacy
About
Leadership
Reports
Resources
Contact
Cryptologic Heritage
Cryptologic Heritage FAQs
Center for Cryptologic History
Pre 1952 Timeline
Pearl Harbor Review
Voices from the Past
About the NSA/CSS Insignia
Historical Figures & Publications
African Americans
Cryptologic Hall of Honor
NSA 60th Anniversary
Publications
Women
National Cryptologic Memorial
National Cryptologic Museum
About the Museum
Exhibits & Artifacts
Hours of Operation
Tours & Education Programs
Map & Directions
Office of General Counsel
Office of the Inspector General
Frequently Asked Questions
Contact NSA
What We Do
Understanding the Threat
Signals Intelligence
SIGINT FAQs
Cybersecurity
Cybersecurity Advisories & Technical Guidance
Telework and Mobile Security Guides
Threat Intelligence & Assessments
Cybersecurity Products & Services
Cybersecurity Education
Cybersecurity Careers
Partnership
Press & Public Engagements
Support to the Military
Customers & Partners
Research
Cybersecurity Research
Math Sciences Program
Computer and Analytic Sciences Research
Technology Transfer Program
Publications
Research Papers
Science of Security
News & Features
Feature Stories
Press Room
Speeches and Testimonies
Declassified Documents
The Next Wave
Digital Media Center
Video Audio Clips
Image Galleries
Publications
Resources
Students and Educators
National Centers of Academic Excellence in Cybersecurity
Centers of Academic Excellence in Cyber Operations
Criteria for Measurement for CAE in Cyber Operations Advanced
Requirements
Application
Criteria for Measurement for CAE in Cyber Operations Fundamental
application
Application
CAE-Cyber Operations Announcements
K-12 Partnership
Research Partnership
Featured Schools
UMBC
North Carolina Agricultural & Technical State University (N.C. A&T)
University of Texas San Antonio
University of Hawaii
Illinois at Urbana-Chapaign
Carnegie Mellon University
OnRamp II Program
Cybersecurity Professionals
Request an NSA Speaker
Freedom of Information Act
Open Source @ NSA
Prepublication Review
Commercial Solutions for Classified Program (CSfC)
Threat Prevention
Capability Packages
Archived Capability Packages
Components List
Archived Components List
CNSA Suite
Solution Registration
Newsletter
Trusted Integrator List
Archived Trusted Integrator List
Customer Handbook
Frequently Asked Question
Coming Soon
Points of Contact
Media Destruction Guidance
Vendor Information
Classified Material Conversion
Join our Team
Apply Now!
Career Fields
Development Programs
Student Programs
Diversity at NSA
Doing Business With Us
Getting Started
Conferences & Events
Office of Small Business Programs
Acquisition Resource Center
Business Programs and Resources
Contacts
Home
About Us
Civil Liberties and Privacy
Resources
Civil Liberties and Privacy Resources
Civil Liberties and Privacy Reports
02/05/2016
Privacy and Civil Liberties Oversight Board § (215 and 702) Recommendations Assessment Report
02/03/2015
Administration PPD-28 Report: Signals Intelligence Reform - 2015 Anniversary Report
01/15/2015
National Research Council of the National Academy of Sciences Report - Bulk Collection of Signals Intelligence: Technical Options
07/02/2014
Privacy and Civil Liberties Oversight Board - Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act
05/01/2014
Executive Office of the President Report -- Big Data: Seizing Opportunities, Preserving Values (aka the Podesta Report)
05/01/2014
President's Council of Advisors on Science and Technology (PCAST) Report -- Big Data and Privacy: A Technological Perspective (aka the PCAST Report)
01/23/2014
Privacy and Civil Liberties Oversight Board - Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT ACT and on the Operations of the Foreign Intelligence Surveillance Court
Civil Liberties and Privacy Core Documents
The Constitution of the United States
United States Bill of Rights
Intelligence Reform and Terrorism Prevention Act of 2004 (Title I of Public Law 108-458; 118 Stat. 3688)
Public Law 110-53 - Aug. 3, 2007 - Implementing Recommendations of the 9/11 Commission Act of 2007
42 U.S.C.A. 2000ee-1 Privacy and Civil Liberties Officers
42 U.S.C.A. 2000ee-2 Privacy and Data Protection Procedures
Presidential Policy Directive/PPD-28
NSA Supplemental Procedures for PPD-28
Remarks by the President on Review of Signals Intelligence
DoD Instruction 1000.29 - DoD Civil Liberties Program
Liberty and Security in a Changing World - Report and Recommendations of The President's Review Group on Intelligence and Communications Technologies
OMB Circular A-130, Managing Information as a Strategic Resource
Civil Liberties and Privacy Guidance for Intelligence Community Professionals
ODNI Statistical Transparency Report Regarding use of National Security Authorities Annual Statistics for Calendar Year 2013
Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act
Privacy Act Systems of Records Notices
ODNI Annual Statistical Transparency Reports
Calendar Year 2019
Calendar Year 2018
Calendar Year 2017
Calendar Year 2016
Calendar Year 2015
Calendar Year 2014
Other Materials
Essential Elements of a Compliance Program
National Security Directive 42
Remarks by CLPO Director Rebecca Richards before European Member States Data Protection Authorities, 20 Nov. 2014
Remarks by CLPO Director Rebecca Richards at the 12 Nov. 2014 Privacy and Civil Liberties Oversight Board forum, "Defining Privacy"
Department of Defense Procedures Governing the Activities of DoD Intelligence Components that Affect United States Persons, DoD 5240 1-R Dec. 1982 (excerpts)
Department of Defense Supplemental Procedures Governing Communications Metadata Analysis
DNI 2014 National Intelligence Strategy
United States Signals Intelligence Directive - Legal Compliance and US Persons Minimization Procedures (USSID SP0018)
NSA/CSS Policy 2-4 Handling Requests for Release of U.S. Identities
Post by CLPT Director Rebecca Richards in the International Association of Privacy Professionals' (IAPP) Privacy Perspectives blog on COVID-19, privacy, and school recordings, 17 Sept. 2020
Partners and External Links
IC On The Record
Privacy and Civil Liberties Oversight Board
DoD Defense Privacy, Civil Liberties and Transparency Division
ODNI Civil Liberties and Privacy Office
NSA's Office of the Inspector General (OIG)
Freedom of Information/Privacy Act (FOIA/PA)
Declassification and Transparency
Civil Liberties and Privacy Home
About NSA's Civil Liberties and Privacy Office
Leadership
Reports
Resources
Contact NSA's Civil Liberties and Privacy Office