Legal Lexicon

Wiki»Legal Lexikon»Verwaltungsrecht»Security Clearance

Security Clearance

Definition and Legal Basis of Security Vetting

Die Security Vetting is a legally regulated procedure for determining the reliability, trustworthiness, and integrity of individuals who are to be given access to security-relevant, particularly state-protected, information or security-critical areas. The legal basis for security vetting in Germany is found in particular in the Security Vetting Act (SÜG) as well as various sector-specific regulations at the state or federal level. The goal of security vetting is to prevent risks to the security of the state, its institutions, and the public from unauthorized access to information or security-endangering activities.


Areas of Application for Security Vetting

Security vetting is carried out wherever a risk to the state, the public, or particularly sensitive facilities could arise from an individual’s activities. Typical areas of application include:

  • Employees in the public sector with access to classified information
  • Members of security-relevant companies (e.g., in the defense sector)
  • Individuals with access to security-sensitive areas of airports or energy facilities
  • Service providers with privileged access to sensitive government facilities

Types of Security Vetting

Basic Security Vetting (Ü1)

In the basic security vetting, only personal data of the individual is collected and compared with information held in government databases. The basic vetting applies in particular to persons with access to ‘Classified Information – For Official Use Only.’

Extended Security Vetting (Ü2)

In addition to the basic vetting, the extended security vetting includes interviews with reference persons and, where applicable, investigations in the personal environment of the individual concerned. It is used, for example, for access to more sensitive ‘classified confidential information’ or equivalently classified areas.

Extended Security Vetting with Security Investigations (Ü3)

The most comprehensive form is the extended security vetting with security investigations. This includes the examination of information relating to partners, family members or other close associates, as well as in-depth analysis of information from various sources. The Ü3 is used in particular for highly security-critical tasks, e.g. where a high level of secrecy is required (‘classified secret’ and higher-level classified areas).


Legal Bases

Security Vetting Act (SÜG)

Das Security Vetting Act (SÜG) regulates the comprehensive execution and requirements for security vetting at the federal level. It defines the different levels of vetting, the process, the authorities responsible, as well as the rights and obligations of those affected. The SÜG is to be applied in conjunction with subordinate legal provisions and administrative regulations.

Security Vetting Ordinance (SÜV)

In addition to the SÜG, the Security Vetting Ordinance (SÜV) specifies procedural details, particularly with regard to data collection, information management, and cooperation between the vetting authorities and security agencies.

State-Specific Regulations

In addition to the SÜG, individual federal states have their own regulations for security vetting, especially for areas under the exclusive jurisdiction of the states such as police authorities or state administrations.

Specific Provisions in Special Legal Areas

In the fields of defense, aerospace, nuclear energy, or in the area of critical infrastructures, there are additional special statutory requirements for security vetting, regulated, for example, in the Atomic Energy Act (AtG), Aviation Security Act (LuftSiG), or as part of the implementation of EU security standards.


Process and Procedure of Security Vetting

Initiation and Application

The security vetting is requested by the authority responsible for personnel matters. The basis is usually a planned activity that is security-sensitive. The individual to be vetted receives documents for the collection of the necessary information, including the declaration of consent for data processing and interviews.

Data Collection and Interview

As part of the vetting, the following information, among others, is collected:

  • Information on the individual and close associates
  • Details on previous career, residence, and stays within and outside Germany
  • Details on financial circumstances, any criminal or disciplinary investigations
  • Information from police and intelligence service records

At higher vetting levels, the person’s personal and professional environment is also included through interviews and further inquiries.

Data Protection and Restriction of Fundamental Rights

The conduct of security vetting is subject to strict data protection requirements. Individuals affected must be thoroughly informed about the type, scope, and purpose of data collection, as well as their rights (access, deletion, correction). Security vetting involves an interference with fundamental rights, particularly the right to informational self-determination, which is justified by law and subordinate legal provisions.

Assessment and Notification of the Result

The final result of the vetting is communicated to the decision-making authority in the form of a security assessment (e.g., ‘no objections’ or ‘concerns exist’). A rejection or restriction may include an individual explanation as well as information on legal remedies.


Legal Consequences of Security Vetting

Successful completion is a prerequisite in many security-sensitive areas for the establishment of an employment or contractual relationship or for maintaining a given activity. Failure or rejection can result in exclusion from certain activities, denial of access rights, or revocation of existing access permissions.


Rights of the Individual Concerned and Legal Protection

Right to Information and Right to Object

The individual concerned has the right to information regarding the personal data stored as part of the vetting process. Appeal against negative decisions is generally possible, especially through objection proceedings or lawsuits before the administrative courts.

Protection of Confidentiality and Informants

Information obtained from third parties during security vetting (e.g., from sources) is subject to special confidentiality requirements. The identity of informants is generally not disclosed to prevent jeopardizing them.


Special Requirements for Companies: Security Vetting in Classified Information Protection

Companies acting for governmental clients, especially in defense or security-related sectors, are required to have their employees undergo security vetting and to comply with relevant confidentiality standards. The conditions for this are defined in the SÜG as well as in the classified protection regulations of the federal government and the states.


International Aspects

In the context of cooperation with other states or international organizations (e.g., NATO, EU, UN), national security vetting standards are coordinated on the basis of reciprocal recognition of security checks. The requirements for security vetting at the international level are often derived from international treaties and classified information agreements.


Literature and Further Regulations

  • Security Vetting Act (SÜG)
  • Security Vetting Ordinance (SÜV)
  • Atomic Energy Act (AtG)
  • Aviation Security Act (LuftSiG)
  • Guidelines and Administrative Provisions on Classified Information Protection
  • General Data Protection Regulation (GDPR), Federal Data Protection Act (BDSG)

Summary

Security vetting is a legally regulated, multi-stage process for determining security reliability, applied in a wide range of governmental, economic, and international contexts. It serves to protect state secrets, critical infrastructures, and to prevent security-threatening actions, while representing an intrusion into fundamental rights that is controlled and limited by strict legal requirements. The process is characterized by differentiated gradations depending on the level of secrecy required and includes extensive information and legal protection options for affected individuals.

Frequently Asked Questions

What legal bases govern security vetting in Germany?

The legal basis for security vetting in Germany is primarily found in the Security Vetting Act (SÜG) of the Federal Government as well as in the respective state laws of the federal states. The SÜG sets out in detail which groups of persons and in which areas of activity security vetting is mandatory, for example for individuals with access to classified information, those employed in the public sector, or those performing security-sensitive activities. In addition to the SÜG, supplementary regulations such as the Classified Information Directive (VSA) and specific administrative rules apply. The task of conducting these checks lies with the federal or state domestic intelligence authorities. Data protection regulations, in particular the provisions of the General Data Protection Regulation (GDPR) and the Federal Data Protection Act (BDSG), must be strictly observed in the collection, processing, and storage of personal data in the context of security vetting. Furthermore, the fundamental rights of the individuals involved, such as the fundamental right to informational self-determination pursuant to Article 2(1) in conjunction with Article 1(1) of the Basic Law, must be respected at every stage of the vetting process.

What rights do affected persons have during security vetting?

Affected persons have extensive rights during security vetting, arising both from the Security Vetting Act and from general data protection and procedural law standards. This includes in particular the right to information about the data stored about them (§ 19 SÜG). In addition, the individual has the right to be heard regarding any potentially adverse findings before any decision is made (right to be heard). In the case of an intended refusal or restriction of clearance, the person must be informed of the reasons, provided this does not compromise security-sensitive interests. There is also generally a right to inspect the file kept on their person, with the scope and modalities of this inspection governed by the specific provisions of the SÜG and general rules of administrative procedure. Individuals can generally appeal measures and decisions within the vetting process; they can file objections and, where applicable, bring legal action before the administrative courts.

What obligations to cooperate exist for individuals undergoing vetting?

According to statutory provisions, particularly § 12 SÜG, individuals subject to security vetting are obliged to actively cooperate. This includes the complete and truthful provision of all requested information in the issued questionnaire. Furthermore, individuals must provide the necessary documents and evidence and, where necessary for the vetting, declare a waiver of confidentiality regarding certain information, such as from doctors or employers. The obligation to cooperate also extends to providing information about relatives and close persons where needed for evaluating the security-relevant situation. If the individual does not fulfill these obligations, this can result in the rejection of the security check or the denial of clearance. Providing false information or deliberately concealing relevant facts may additionally lead to criminal consequences.

What is the legal procedure following a negative security assessment?

In the event of a negative assessment as part of the security vetting – i.e., if security clearance is refused or restricted – a special legal process applies. First, the person concerned has the right to a hearing under § 13 SÜG before a final decision is made. The main reasons for the intended decision will be communicated to them, provided this does not endanger state or security-sensitive interests. The person may submit comments and exculpatory evidence. Only then will a formal decision be issued in writing and with reasons by the competent authority. There is a right of objection and, subsequently, an administrative court action. The prospects of a successful challenge depend in particular on whether the legal requirements were met during the process, whether the balancing of interests was correct, and whether the decision has been adequately justified. In individual cases, judicial proceedings may also be held in camera, especially when particularly sensitive information is involved.

Are information and data from a security vetting subject to confidentiality?

Yes, information obtained in the context of security vetting is subject to strict confidentiality and data protection requirements. According to § 18 SÜG, personal data collected during the vetting process can, in principle, only be used for the original purpose—namely, to assess security-relevant reliability—and only be passed on to those authorities authorized for this purpose. Any transfer or further use outside the narrowly defined legal framework is prohibited and can be sanctioned under both employment and criminal law. The affected person must be protected against unauthorized access, manipulation, and disclosure of data, for example through technical and organizational measures. Disclosure to third parties, such as employers or other authorities, is only permitted as expressly provided for and required by law. Even after the end of an employment or service relationship, the data remain generally protected and are deleted after predetermined retention periods.

What legal remedies exist in the event of an incorrect or unjustified security vetting?

Individuals affected by an incorrect or unjustified security check have access to a comprehensive system of legal protection. They can initially file an objection against adverse administrative decisions (e.g., denial of security clearance), whereupon the responsible authority will review the decision. If relief is not granted, the affected person may bring an action before the competent administrative court. In addition, there is the right to contact the data protection officer of the relevant authority if violations of data protection regulations are suspected. In serious cases, criminal proceedings (for example, due to unauthorized disclosure of data) or civil claims—such as for compensation for non-material damage under Art. 82 GDPR—may also be considered. The entire procedure is governed by the principles of proportionality and fair process, and the decisions of authorities and courts are subject to judicial review, taking into account all relevant fundamental rights.