Lead Opinion
Opinion for the Court filed by Circuit Judge RANDOLPH.
Dissenting opinion filed by Circuit Judge TATEL.
Steven D.C. Bigelow, while a major in the United States Air Force, worked in the Information Warfare and Special Technical Operations Center, a part of the Office of the Joint Chiefs of Staff in the Pentagon. The chief of that section and Major Bige-low’s immediate supervisor, United States Army Colonel Nathan W. Noyes, learned of allegations of misconduct concerning Bigelow, perhaps the most serious of which was that he sometimes disappeared in foreign countries near sensitive international borders. Major Bigelow’s position demanded that he hold the highest security classification, above “Top Secret” (the name of the classification is itself classified). Colonel Noyes’s position, so it is claimed, demanded that he continually assess the trustworthiness of those under his command. To this end, and because he thought Bigelow might be lying about his past, Noyes went to the Joint Staff Security Office and requested Bigelow’s personnel security file. Convinced that his suspicions had been confirmed, Colonel Noyes referred the matter to the Air Force for disciplinary action, as a result of which Major Bigelow was relieved of his duties at the Pentagon (he is now a Lieutenant Colonel at Bolling Air Force Base).
Bigelow brought this action under the Privacy Act, 5 U.S.C. § 552a, seeking damages and other relief against the Department of Defense on the ground that Colonel Noyes unlawfully reviewed his personnel security file in violation of the Act. The district court, Judge Thomas P. Jackson, granted the government’s motion for summary judgment and declared moot Bigelow’s motion for discovery pursuant to Rule 56(f) of the Federal Rules of Civil Procedure.
The appeal comes down to the question whether Colonel Noyes, as an officer of the agency maintaining the file, had “a need for the [Bigelow’s] record in the performance of [his] duties.” 5 U.S.C. § 552a(b)(l). Among other things the Privacy Act generally prohibits government agencies from disclosing personnel files. To this general prohibition there are several exceptions, one of which is the “need-to-know” provision of § 552a(b)(l). The Defense Department assures us, through a brief filed on its behalf by the United States Attorney, and through a sworn declaration of Colonel Noyes, that Noyes’s duties entailed examining Bigelow’s personnel security file because Bigelow was under his supervision. We believe the Department’s regulations support this position.
At the Pentagon, “personnel security investigative reports” may be revealed only to “those designated DoD officials who require access in connection with specifically assigned personnel duties, or other activities specifically identified under
Bigelow and our dissenting colleague read § 154.60(a) differently than does the Defense Department. Judge Ta-tel asserts that despite the unconditional wording of § 154.60(a), military supervisors do not have an official need to examine personnel files in assessing the trustworthiness of any individual under their command. Why not? Because only commanders and security officers have access to personnel security files, which of course begs the question. Bigelow, at least, is willing to concede that a supervisor is responsible for assuring the trustworthiness of those under him. The question is how the supervisor may go about this. Bigelow says that the various ways of fulfilling the supervisor’s duty are spelled out in § 154.60(c). Searching personnel files for derogatory information is not listed. We think his line of reasoning misses the point of the need-to-know exemption in the Privacy Act. Section 552a(b)(l) does not require an agency to list those of its officers eligible to look at protected records, nor does it demand that an agency official be specifically assigned to examining records. What must be determined — and what Judge Tatel does not confront — is whether the official examined the record in connection with the performance of duties assigned to him and whether he had to do so in order to perform those duties properly. See Pippinger v. Rubin,
Bigelow points to § 154.55, which gives commanders, upon the receipt of certain kinds of “derogatory information” about an individual, the power to take actions including temporarily suspending the individual’s access to classified materials in the interest of national security. 32 C.F.R. § 154.55(c). Although Colonel Noyes was the “Chief’ of his unit, all agree that he was not a commander within the regulation’s intent. Still, we cannot see how this regulation helps Bigelow’s case. From all that appears, § 154.55, together with its procedural counterpart (32 C.F.R. § 154.56), simply spells out in detail the formal administrative adjudicatory scheme for revoking or suspending security clearances. The regulation nowhere mentions who shall have access to personnel security records; that is the subject of § 154.65 and § 154.67, which we have already cited. It does not relieve supervisors of their duty, spelled out in § 154.60(a), to assess continually the reliability and loyalty of those working under them. While § 154.55(b) does require the reporting of
If we were somewhat less sure of our reading of the Defense Department’s regulations, the interpretation advanced in the Department’s brief would still carry the day. Although the Supreme Court held in Christensen v. Harris County, — U.S. -,-,
Because we are unpersuaded that discovery would have reaped anything pertinent to resolving these issues, we will not upset the district court’s discretionary decision to refuse to grant Major Bigelow’s Rule 56(f) motion before acting on the motion for summary judgment. See White v. Fraternal Order of Police,
Affirmed.
Dissenting Opinion
dissenting:
To maintain national security, Department of Defense employees whose official duties require access to classified information undergo extensive, very personal background investigations. The regulatory scheme at issue in this case protects the sensitive information collected during those investigations and maintained in personnel security files — information about political associations, criminal or dishonest conduct, mental illness, family relationships, financial circumstances, drug and alcohol use, sexual behavior, etc. See 32 C.F.R. § 154.7 & Pt. 154, App. H. Relying on the government’s appellate brief in this case, which in turn relies solely on a declaration of the non-policymaking employee whose behavior is the target of this suit, this court interprets the regulations to give access to personnel files not just to officials specified in the regulation, but to any supervisor anywhere in the Department who doubts an employee’s loyalty. Because there is more than ample “reason to suspect” that this counterintuitive interpretation of the regulation represents a convenient litigating position rather than the “fair and considered judgment” of the Secretary of Defense or any other official with policy-making responsibility, Auer v. Robbins,
The Privacy Act prevents non-consensual release of personnel records except “to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties.” 5 U.S.C. § 552a(b)(l). Reinforcing this protection, Defense Department regulations provide:
In recognition of the sensitivity of personnel security reports and records, particularly with regard to individual privacy, it is Department of Defense policy that such personal information be handled with the highest degree of discretion. Access to such information shall be afforded only for the purposes cited herein and only to persons whose official duties require such information.
32 C.F.R. § 154.65. To protect the privacy of personnel security files, the regulation requires them to be stored only in approved locked cabinets, vaults, or safes; transmitted only in sealed double envelopes bearing a special restricted access notation; and reproduced only to the minimum extent necessary. See id. § 154.68. Information contained in these files may not be made available without the consent of the subject except to those personnel who have an official need for the information, and then only for specified limited purposes: “determining eligibility ... for access to classified information, assignment or retention in sensitive duties, ... or for law enforcement and counterintelligence investigations.” Id. § 154.65. Commanders and security officers who have “specifically assigned personnel security duties” may. access the files. Id. § 154.67(b). But “[r]ank, position, or title alone do not authorize access to personal information about others. An official need for the information must exist before disclosure.” Id. § 310.41(a)(2).
Despite these regulatory safeguards, Colonel Noyes obtained Major Bigelow’s file solely on the basis of his status as Bigelow’s supervisor. The government does not contend that Noyes has any law enforcement, counterintelligence, or other “specifically assigned personnel security duties.” Id. § 154.67(b). Nor does it claim that Noyes is one of the specifically enumerated persons empowered to make decisions about Bigelow’s security clearance or duty assignment. See id. Pt. 154, App. E; § 154.47(b); § 154.55(c). Indeed, the regulations make it quite clear that if Noyes was “aware of ... significant adverse information” about Bigelow, his obligation was to forward that information to the Defense Investigative Service for further investigation. Id. § 154.60(c)(3). That agency, not Noyes, was responsible for reviewing the information and determining whether Bigelow’s conduct required further investigation. Id. § 154.9 (“No other DoD component [other than the Defense Investigative Service] shall conduct personnel security investigations unless specifically authorized by the Deputy Under Secretary of Defense for Policy.”).
Citing section 154.60 of the regulations, my colleagues conclude that Noyes had an “official need” for access to Bigelow’s file because “[a]n ‘individual’s trustworthiness is a matter of continuing assessment,’ and the ‘responsibility for such assessment must be shared by the organizational commander or manager, [and] the individual’s supervisor’” — in this case, Noyes. Maj. Op. at 877 (quoting 32 C.F.R. § 154.60(a)). Although I agree with my colleagues that the regulations impose on supervisors a “shared” duty to assess the trustworthiness of those they supervise, I do not agree that this duty gives supervisors a per se “official need” — -indeed duty — to go through security files. The regulations protect the privacy of personnel security files by providing access only to certain
The Supreme Court made clear in Auer that under certain circumstances we may defer to regulatory interpretations that appear “only in the context of’ litigation.
Bowen, not Auer, controls this case. The record indicates that the Secretary of Defense has never “grappled with” or “exercised [his] judgment over ... the conundrum posed by [this] regulation’s clear ambiguity”: whether all supervisors have a per se duty to review the personnel security files of employees they supervise. Id. The government’s brief cites only one source in support of its interpretation of the regulation: a declaration prepared for
Of course, we could rely on the government’s appellate brief alone if its interpretation of the regulation reflected the agency’s “fair and considered judgment.” Auer,
It misses the point to say that “we have been pointed to no past practices or pronouncements that are inconsistent with the Defense Department’s current interpretation.” Maj. Op. at 878. The point is that we have good “reason to suspect that this interpretation does not reflect the agency’s fair and considered judgment” (Acer’s words) and is nothing more than the position of the U.S. Attorney and the two AUSAs who signed the brief. As the Supreme Court observed in a similar situation where counsel “rationalized the basis of [a regulation] with great professional competence ... this is hardly tantamount to an administrative interpretation of [the relevant statutory provisions].... Congress has delegated to the administrative official and not to appellate counsel the responsibility for elaborating and enforcing statutory commands.” Investment Co. Institute v. Camp,
For these reasons, I believe that the U.S. Attorney’s brief represents a classic example of “ ‘post hoc rationalization ]’ advanced by an agency seeking to defend past agency action against attack.” Auer,
