The use of methods, other than granting full access, to protect critical information while demonstrating compliance with an arms control treaty or agreement. Examples of managed access methods include: removal of nonrelated, sensitive items; shrouding of sensitive displays, stores, and equipment; logging off computer systems and turning off data-indicating devices; random selective access, whereby inspectors are requested to select only a certain number, or percentage, of areas, buildings, or items for inspection; exceptional access, whereby the inspected party limits access to certain parts of the inspectable area to individual inspectors rather than allowing the full team access; allowing inspectors to view a sensitive area only from a window or doorway rather than granting them full access to the area; restricting access to sensitive areas only during specified times; pre-planning the manner in which inspectors are escorted onto a site and from area-to-area, building-to-building, and room-to-room; limiting inspector access to personnel by dismissing nonessential personnel; monitoring the use of, or operating, inspection equipment for inspectors; proposing personnel for interviews; and volunteering records for review. Whenever less than full access is provided, the inspected party is obligated to make every reasonable effort to demonstrate compliance by alternate means; for example, by partially removing a shroud or by showing inspectors convincing photos or documentation related to the compliance concern rather than granting physical access to an area.
- Part of Speech: noun
- Industry/Domain: Military
- Category: Arms control
- Company: U.S. DOD
Creator
- AndyDS
- 100% positive feedback