Www.ispcert.com SAFEGUARDING CLASSIFIED INFORMATION.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Barhale Procedure for Site Establishment
OSHA Office of Training and Education
Document &Record Control/Management Workshop Presenter: Gail Nelson Coffee Industry Board July 18, Central St. Catherine Coffee.
Review Questions Business 205
HIPAA Privacy Training. 2 HIPAA Background Health Insurance Portability and Accountability Act of 1996 Copyright 2010 MHM Resources LLC.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
HOW TO PREPARE FOR A NATIONAL SECURITY INFORMATION INSPECTION 1 SECRET Updated 09/27/11 Security is Everyone's Responsibility – See Something, Say Something!
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Developing a Records & Information Retention & Disposition Program:
Harvard Human Subjects Payments Policy Effective 1/1/11 1.
Information Systems Security Officer
4. Quality Management System (QMS)
1 Perimeter Security System. 2 Performance Objectives 1. List the four key duty posts of the Perimeter Security System. 2. Explain the purpose of perimeter.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
BRC Food Safety Quality Management System Training Guide
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Business Owners and Managers and the Fire Code
How The State Auditor Expects Districts to Comply With the Sunshine Law Susan Goldammer Missouri School Boards’ Association.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Process Safety Management
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
ISP Preparation Series 3- Chapter 6. NISPOM Chapter 6- Visits and Meetings  General- anticipate discussion  Classified visits- minimum and.
PERFORMING ON CLASSIFIED CONTRACTS.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (
ISP Preparation Series 1- Chapter 3. CHAPTER 3: SECURITY TRAINING AND BRIEFING SECTION 1: SECURITY TRAINING General (3-100) - Provide all with training.
MARKING CLASSIFIED MATERIAL
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
The Challenge and the Goal: Regaining the Custody/Control of Outpatient Medical Records.
RECORDS MANAGEMENT Office of Compliance. OBJECTIVES Four main objectives of a Records Management Program: –Increase efficiency of record keeping. –Protection.
Information Systems Security Operational Control for Information Security.
ZHRC/HTI Financial Management Training Session 9: Stores and Supplies Management.
OSU-CHS ALARA Statement The OSU-CHS radiation safety program will be conducted in such a manner so that exposure to faculty, staff, students, the public,
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Exit Routes and Fire Protection
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
SECURITY BRIEFING A threat awareness briefing A defensive security briefing An overview of the security classification system Employee reporting obligations.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
Texas Law Enforcement Best Practices Mid Year Training Conference.
Privacy Act United States Army (Managerial Training)
Managing a “Data Spill”
RECORDS MANAGEMENT Office of Business Affairs. OBJECTIVES Four main objectives of a Records Management Program: –Increase efficiency of record keeping.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
Information Security. Your responsibilities as a Government of Canada employee.
For Official Use Only (FOUO) and Similar Designations NPS Security Office
Financial Management Office Presented by Wendall Ho Cash and Check Handling Self-Assessment.
Exit Routes, Emergency Action Plans, Fire Prevention Plans, and Fire Protection.
Nassau Association of School Technologists
ISMS Information Security Management System
Managing a Security Container
NISPOM Basics What You Need to Know!
Obligations of Educational Agencies: Parents’ Bill of Rights
Domain 2 – Asset Security
Office of the President of the Philippines Memorandum Circular No. 78
Safety and Security of Radiation Sources
Managing the IT Function
Derivative Classification Overview
The Organized FSO Getting Control of the Paperwork and the Chaos
Document Custodian of the Drop Safe Log
RECORDS AND INFORMATION
Top 10 Security-Related Discrepancies
H2.9b Maintain Information
Defense Security Service Top 10 Vulnerabilities
Presentation transcript:

SAFEGUARDING CLASSIFIED INFORMATION

General Requirements Control and Accountability Storage Transmission Disclosure Reproduction CONTENTS

 Contractors protect classified material under their control  Individuals protect classified information entrusted to them GENERAL REQUIREMENTS The FSO leads and implements the security program designed to protect classified information and prevent unauthorized disclosure

 Protect oral discussion  Use secure devices  Speak in closed meetings  Ensure area is cleared for classified presentation Classified conversations should only be conducted in authorized areas. Classified meetings are sponsored by the government and all outside visitors will need to file a visit authorization ahead of time. Ensure classified phone conversations take place in a cleared area on a secure line. GENERAL REQUIREMENTS

 Complete end of day security checks  Ensure classified is stored properly  Checks are for last shift where classified material was removed from storage Security checks are necessary to ensure classified material has been returned to the authorized storage area and the classified storage has been properly secured. Checks are not necessary during 24hour operations. GENERAL REQUIREMENTS

 Establish perimeter controls  Deter and detect unauthorized removal or entry of classified  Persons entering or exiting facility is subject to search  Develop emergency procedures  Protect classified information in any emergency situation GENERAL REQUIREMENTS

 Perimeter controls help prevent unauthorized entry or exit of classified material. All classified material is to be introduced and removed only through the security office. This discourages losing control of classified material and the resulting security violation.  All personnel entering and exiting a cleared facility are subject to random search. Notices of such searches should be posted.  Regardless of motivation, employees provide the largest security risk. Unauthorized introduction or removal of classified material is far too common.  Procedures should be in place to arrange for the accountability of classified during any emergency. Define emergency procedures for: tornado, flood, fire, hurricane or tragedy at campus or during courier operations GENERAL REQUIREMENTS

 Classified material is on site for legal, U.S. Government purposes only. When contract expires, classified material must be returned to customer within two years or if approved for retention validated with final DD Form 254.  The FSO develops documenting and accounting procedure to ensure items are cataloged and retrievable within a reasonable amount of time. CONTROL AND ACCOUNTABILITY

 Contractors designate TOP SECRET control officials to:  Receive  Transmit  Maintain access and accountability  Conduct annual inventory  TOP SECRET has continuous transmittal receipt process to maintain accountability and prevent loss or compromise. CONTROL AND ACCOUNTABILITY

 Each TOP SECRET item must be numbered in series  Received classified  Check for tamper  Check for accuracy against receipt  If all good, sign and return receipt to sender CONTROL AND ACCOUNTABILITY

 Maintain a continuous record for all documents transmitted from your site. This includes mail, courier, , and etc. Each item of TOP SECRET material has to be catalogued and numbered in a series.  Those who receive classified material are responsible that they are receiving items as indicated on the receipt. They should inspect the package for evidence of tampering and compare the classified items with the receipt. The classified item should have an unclassified title. CONTROL AND ACCOUNTABILITY

 Account for all produced TOP SECRET when:  A finished product  Retained for over 30 days (notes, files, workbook, final)  Transmitted outside of facility  Classified information not a finished product-No problem  Mark date created  Mark classification level  Annotate “Working Papers”  Working papers are to be marked as finished document when:  Over 30 days old for TOP SECRET  Over 180 days for SECRET and CONFIDENTIAL  Sent outside of facility CONTROL AND ACCOUNTABILITY

Re-cap:  TOP SECRET material must also be accounted for when in an unfinished state for over 30 days or transmitted outside of the facility. This process further reduces employee error and security violations.  SECRET and CONFIDENTIAL material should be brought into accountability 180 days after creation if in an unfinished state.  Regardless of stated, classified information should be accounted for prior to release from a facility. CONTROL AND ACCOUNTABILITY

 TOP SECRET and SECRET is stored in GSA approved container, approved vault or approved closed area with supplemental controls  SECRET can also be stored as followed until Oct 1, 2012  Safe, steel file cabinet or safe type container with automatic lock  Requires supplemental protection after hour  Any steel cabinet with four sides, top, bottom and a rigid bar with approved locks  CONFIDENTIAL material doesn’t need supplemental controls CLASSIFIED STORAGE

Restricted areas are used when controlling access to classified material in a large area. There does not need to be physical barriers, but access control is necessary. Restricted areas are for temporary use of classified material and all classified material needs to be returned to the repository.  Only used during working areas  Used for unique size, mission or other issues  Classified must be returned to proper storage when complete  Employees challenge all who enter to ensure clearance and NTK CLASSIFIED STORAGE

 Closed areas are a more permanent solution for the classified items that are difficult to store. These difficulties arise from size, bulk or unique mission requirements. FSO’s limit access and provide supplemental controls for anything SECRET or above in closed areas. CLASSIFIED STORAGE

 Closed areas are used to store classified material that won’t fit into a GSA approved container  Access is controlled  Supplemental protection for SECRET and TOP SECRET  Qualify structural integrity at required intervals  CSA approves open shelf/bin storage of SECRET and CONFIDENTIAL  No open shelf or bin storage of TOP SECRET CLASSIFIED STORAGE

As with security clearances, keep the amount of authorized employees having knowledge of combinations to the minimum amount necessary. Keep records of those who have the combination. Remind employees that the combinations are to be protected at the highest level of classified stored inside the container. CLASSIFIED STORAGE

 Lock combinations given as few employees as necessary  Keep a record of those knowledgeable  Protect combinations at the highest level stored  Only assign to those with clearance and NTK (not the locksmith)  Lock all approved containers when not under direct viewing of authorized persons CLASSIFIED STORAGE

 Security containers should not be altered, painted or labeled with the security classification level of the contents  Change combinations upon initial use, change in status of authorized users, compromise or suspected compromise of container or combination, when safe is left open or when required by FSO or CSA CLASSIFIED STORAGE SECRET

 Control access and accountability to keys and locks and:  Appoint a custodian  Maintain register of lock and keys  Audit keys and locks monthly  Inventory keys upon change of custody  Keep keys on premises  Rotate or change locks annually CLASSIFIED STORAGE

 Repairs to GSA approved containers shall be made by cleared or escorted personnel trained in approved methods. Repairs should be made with approved parts or approved cannibalized parts. Ensure certificate of repair is on file.  Access control can be used to limit access to closed areas DURING WORK HOURS. Must be approved by FSO and meet criteria in and of NISPOM CLASSIFIED STORAGE

Click on the correct answers TEST

1.All of the following are methods of protecting classified conversations EXCEPT: A.Use secure phone linesUse secure phone lines B.Speak in a closed areaSpeak in a closed area C.Whisper when in public areasWhisper when in public areas 2.When should combinations be changed on GSA approved containers? A.Upon change in status of knowledgeable personUpon change in status of knowledgeable person B.When safe is left unattendedWhen safe is left unattended C.Upon compromise of combinationUpon compromise of combination D.All the aboveAll the above 3.Lock combinations should be changed by a training lock smith A.TrueTrue B.FalseFalse 4.All apply to Restricted areas EXCEPT: A.Does not require physical boundariesDoes not require physical boundaries B.For permanent continuous useFor permanent continuous use C.Control access of personnelControl access of personnel D.For temporary useFor temporary use TEST-SELECT THE CORRECT ANSWER

5.What should one receiving classified material NOT do? A.Assign a classified titleAssign a classified title B.Check for tamperCheck for tamper C.Match receipt with contentsMatch receipt with contents 6.All of the following are duties of the TOP SECRET official EXCEPT: A.Receive classified materialReceive classified material B.Execute company privacy policyExecute company privacy policy C.Conduct annual inventoryConduct annual inventory TEST-SELECT THE CORRECT ANSWER

Go Back!

Go Back!

Go Back!

Go Back!

CERTIFICATE