🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Create CUI Privacy and Security Notice Templates to Meet NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - AC.L2-3.1.9 Compliance

Step-by-step guidance and ready-to-deploy templates to create CUI privacy and security notices that satisfy NIST SP 800-171 Rev.2 and CMMC 2.0 Level 2 (AC.L2-3.1.9) requirements.

•
March 30, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Controlled Unclassified Information (CUI) handling requires clear, consistent privacy and security notices so that users, partners, and systems understand how to treat sensitive data—this post gives small businesses an actionable plan, real-world examples, and ready-to-adopt templates to meet the intent of NIST SP 800-171 Rev.2 / CMMC 2.0 Level 2 control AC.L2-3.1.9.

Understanding AC.L2-3.1.9 and Compliance Framework expectations

At a practical level, AC.L2-3.1.9 expects organizations to provide notices that communicate the presence of CUI, acceptable use, monitoring, handling constraints, and reporting channels. For the Compliance Framework practice, treat these notices as artifacts that demonstrate policy implementation and evidence collection: you must show where notices are displayed (login banners, email, document headers), how they are versioned, and that staff and contractors received and acknowledged them.

What to include in a CUI privacy and security notice

A robust notice contains: (1) purpose and authority (e.g., "Contains CUI protected under DFARS/agency rules"), (2) handling instructions (encryption, storage location restrictions, printing/printing controls), (3) access restrictions and authorized uses, (4) monitoring and audit notice, (5) reporting contact and incident process, (6) retention and destruction guidance, and (7) classification and marking guidance (e.g., "CUI//SP – Sensitive Program"). Make each element short, clear, and actionable—auditors look for explicit statements like "Do not forward outside approved organizations without an authorized DD254/POAM" or "Encrypt at rest using AES-256." Map each statement back to a policy control ID in your Compliance Framework repository.

Designing practical templates

Login banner / system access notice

Place an explicit login banner on workstations, VPNs, and SSH systems. Example text: "NOTICE: This system contains Controlled Unclassified Information (CUI). Unauthorized access or disclosure is prohibited and may be subject to disciplinary and legal action. Activity on this system may be monitored. For policy and reporting, contact security@yourcompany.example." Implement technically: Windows GPO (HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System: LegalNoticeCaption / LegalNoticeText), SSH Banner by setting Banner /etc/issue.net in /etc/ssh/sshd_config and adding your notice to /etc/issue.net, and web apps using an application-level banner on the login page. Capture configuration screenshots and GPO exports as evidence.

Email, attachment, and file header notices

Use an email disclaimer for outgoing messages and embed file headers for attachments that convey CUI status. Example email footer: "Contains CUI – handling restrictions apply. Do not distribute outside authorized recipients. Report suspected disclosure to security@yourcompany.example." For Exchange Online, implement a transport rule that appends disclaimers to messages or uses message classifications; for file attachments, configure DLP/CASB to add an X-Data-Class header and automatically encrypt messages with CUI-inferred labels. Maintain a template library in SharePoint with versioning enabled and export the change history to show reviewers you maintain authoritative notice text.

Physical labels and document templates

Create Word/PDF templates and physical labels for printed CUI. Example header for a Word template: "CUI//SP — Authorized Personnel Only — See Handling Instructions at https://intranet/handling-cui." Use PDF metadata fields and XMP tags to store classification, and control printing via printer ACLs or secure print release. For small businesses, place pre-printed coversheets in the office for CUI packages and require a chain-of-custody form when transporting physical media; collect signed acknowledgements as compliance evidence.

Implementation steps for a small business (Compliance Framework practice)

1) Inventory systems that store/process CUI. 2) Map where notices are required (endpoints, cloud apps, email, physical). 3) Create baseline templates (login, email, document) and store them in a version-controlled policy library (SharePoint/Confluence with versioning). 4) Deploy technically—GPO for Windows, sshd config for Linux, IdP/SAML custom pages for cloud SSO, Exchange transport rules, DLP rules for automated labeling/encryption, and printer/security settings for physical output. 5) Train staff and collect acknowledgements (LMS completion or signed forms). 6) Produce evidence package for auditors: template files, change logs, policy mapping spreadsheet, screenshots of deployed notices, and training records. Example: A subcontractor with 25 employees uses Azure AD SSO custom branding to add a CUI notice on sign-in, Exchange Online transport rules for email footers, and a SharePoint library with templates and logged acknowledgements—this meets the evidence requirements for a small shop.

Risks of not implementing the requirement & best practices

Failing to provide clear CUI notices increases the risk of accidental disclosure, contract non-compliance, and losing DoD/defense-related contracts. Auditors commonly cite missing system banners, inconsistent document headers, and lack of evidence for staff awareness. Best practices: centralize templates, enforce notices via automation (DLP, Exchange, GPO), apply consistent markings (machine-readable X-headers), rotate notice versions with change control, and tie notices to training modules so acknowledgements are timestamped and searchable.

In summary, meeting AC.L2-3.1.9 is about consistent, documented communication of CUI handling rules across systems and media—build concise templates for login banners, email disclaimers, file headers, and physical labels; deploy them using GPOs, IdP custom pages, DLP, and transport rules; and retain versioned artifacts and training records as audit evidence. With these practical steps and small-business examples, you can create deployable notices that satisfy Compliance Framework expectations and reduce the operational risk of CUI mishandling.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes